Managing AWS Resources
This section describes prerequisites to manage AWS resources on the CCKM.
Prerequisites
- Before you can add an AWS account to the CCKM, an AWS connection must already exist on the CipherTrust Manager. A CipherTrust Manager administrator manages connections to external resources on the Access Management > Connections Management page of the CipherTrust Manager GUI. Refer to Connections Management for details. 
- Appropriate permissions to manage the AWS KMS must be added on the AWS console. - Permissions to list regions: Add the IAM permission - ec2:DescribeRegionsto list the AWS regions.
 For example:- { "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Allow", "Action": "ec2:DescribeRegions", "Resource": "*" } ] }
- Permissions to manage AWS resources: Add the following IAM permissions to manage AWS resources: - kms:ListAliases 
- kms:ListKeyPolicies 
- kms:ListKeys 
- kms:ListResourceTags 
- kms:DescribeKey 
- kms:GetKeyPolicy 
- kms:GetKeyRotationStatus 
- kms:GetParametersForImport 
- kms:GetPublicKey 
- kms:TagResource 
- kms:UntagResource 
- kms:CancelKeyDeletion 
- kms:CreateAlias 
- kms:CreateKey 
- kms:DeleteAlias 
- kms:DeleteImportedKeyMaterial 
- kms:DisableKey 
- kms:DisableKeyRotation 
- kms:EnableKey 
- kms:EnableKeyRotation 
- kms:ImportKeyMaterial 
- kms:ScheduleKeyDeletion 
- kms:UpdateAlias 
- kms:UpdateKeyDescription 
- kms:PutKeyPolicy 
- iam:ListGroups 
- iam:ListRoles 
- iam:ListUsers 
- logs:DescribeLogGroups 
- logs:FilterLogEvents 
 - For example: - { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "kms:DisableKey", "kms:ListAliases", "kms:ListKeyPolicies", "kms:ListKeys", "kms:ListResourceTags", "kms:DescribeKey", "kms:GetKeyPolicy", "kms:GetKeyRotationStatus", "kms:GetParametersForImport", "kms:GetPublicKey", "kms:TagResource", "kms:UntagResource", "kms:CancelKeyDeletion", "kms:CreateAlias", "kms:CreateKey", "kms:DeleteAlias", "kms:DeleteImportedKeyMaterial", "kms:DisableKey", "kms:DisableKeyRotation", "kms:EnableKey", "kms:EnableKeyRotation", "kms:ImportKeyMaterial", "kms:ScheduleKeyDeletion", "kms:UpdateAlias", "kms:UpdateKeyDescription", "kms:PutKeyPolicy", "iam:ListGroups", "iam:ListRoles", "iam:ListUsers", "logs:DescribeLogGroups", "logs:FilterLogEvents" ], "Resource": "*" } ] }
 
Note
Permissions might take some time to be effective on AWS. Until then, a permission error might occur. Wait for some time and retry.
Now, AWS accounts and AWS keys can be managed on the CipherTrust Manager.