You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jan 25, 2023. It is now read-only.
I've been looking into how to provide appropriate controls on the KMS key used to auto unseal vault. It seems like a difficult topic though, and hard to know the best route. It would be great to have some kind of example on what would be best practice. Some of my questions on the way forward were:
Should it be restricted based on the iam profile of the instance? Perhaps not possible since that name is dynamically generated when this repo is deployed.
As always, the answer is, "it depends," but I think the standard approach would be to attach an IAM role to whatever servers / containers are running Vault, and in your KMS key policy, to grant that IAM role (via it's static ARN) the permissions it needs.
I've been looking into how to provide appropriate controls on the KMS key used to auto unseal vault. It seems like a difficult topic though, and hard to know the best route. It would be great to have some kind of example on what would be best practice. Some of my questions on the way forward were:
The text was updated successfully, but these errors were encountered: