Skip to content
This repository has been archived by the owner on Jan 25, 2023. It is now read-only.

Example request: Best practice KMS usage for vault in AWS #233

Open
queglay opened this issue Mar 2, 2021 · 2 comments
Open

Example request: Best practice KMS usage for vault in AWS #233

queglay opened this issue Mar 2, 2021 · 2 comments
Labels

Comments

@queglay
Copy link
Contributor

queglay commented Mar 2, 2021

I've been looking into how to provide appropriate controls on the KMS key used to auto unseal vault. It seems like a difficult topic though, and hard to know the best route. It would be great to have some kind of example on what would be best practice. Some of my questions on the way forward were:

@brikis98
Copy link
Collaborator

As always, the answer is, "it depends," but I think the standard approach would be to attach an IAM role to whatever servers / containers are running Vault, and in your KMS key policy, to grant that IAM role (via it's static ARN) the permissions it needs.

@queglay
Copy link
Contributor Author

queglay commented Mar 10, 2021

Ahh of course thanks for the advice @brikis98 !

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Projects
None yet
Development

No branches or pull requests

2 participants