Editing
IAM Credential Management
Jump to navigation
Jump to search
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== Key Age Recommendations == === Internal === * '''Rotation Frequency''': Access keys should be rotated every '''90 days''' or fewer. * '''Unused Keys''': Disable keys not used for '''30 days'''. * '''Automation''': Use AWS Lambda and EventBridge to automate key rotation and notify users. === External === * '''Rotation Frequency''': Access keys for external suppliers should be rotated every '''180 days''' (6 months). This allows suppliers sufficient time to update their scripts and minimize disruptions. * '''Notifications''': Notify suppliers 30 days before key rotation deadlines and provide clear instructions on updating credentials. * '''Unused Keys''': Flag keys that have been inactive for '''90 days''' and disable them if not used or updated. == Supplier Contact Information == === Valentia === * '''Company Name''': Valentia Technologies * '''Primary Contact''': [https://www.valentiatech.com/sectors/primary-care Valentia - Primary care] * '''Integration Points''': AWS S3 ( kpa-valentia bucket), IAM key, daily delta file transfers. For more info refer to [[Indici data]] === Kotahi (Karo) === * '''Company Name''': Karo * '''Primary Contact ''': [mailto:isabelle@karo.co.nz Isabelle Beaumont] * '''Integration Points''': The kotahi-writer IAM user is used by Karo to securely upload files to the <code>s3://kpt-kotahi</code> bucket using its access keys. Refer to [[Kotahi data supply]] for detail ==Key Rotation Process for Valentia== The following process outlines the proposed steps required to rotate access keys for the Valentia IAM user and ensure seamless data uploads to the <code>s3://kpa-valentia</code> bucket. For access keys, the rotation process involves creating a new key, securely sharing it with Valentia, and deactivating the old key after confirmation of successful integration. In order to ensure a smooth key rotation, the general approach is as follows: # '''Create a new access key''': A new access key is generated for the '''valentia''' IAM user in the AWS Console or via CLI. The old key remains active during this process to avoid disruptions. # '''Notify Valentia''': Submit a ticket to Valentia with details of the new Access Key ID and offer to securely share the Secret Access Key. # '''Test the new key''': Valentia tests the new key by uploading a test file to the S3 bucket <code>s3://kpa-valentia</code>. Validate the key's activity and confirm successful uploads. # '''Disable the old key''': Once Valentia confirms the new key is in use and testing is successful, the old key is disabled in the AWS Console or CLI. # '''Delete the old key''': After a buffer period with no errors in data uploads, the old key is permanently deleted. # '''Document the process''': Record the key rotation possibly in the audit log(?) and update any relevant documentation. '''Note''': This process is currently under development and has not yet been executed. Additional refinements or adjustments may be needed once the initial rotation is completed. == Internal IAM User Automated Access Key Process == The following outlines the automated process for rotating access keys for internal IAM users, ensuring compliance with security best practices while minimizing manual intervention. === Automated Key Rotation Process === # '''Lambda Function''': #* A <code>access-key-rotation-check</code> Lambda function automatically checks the age of access keys for all internal IAM users. #* Keys older than 90 days are flagged for rotation. # '''Key Management''': #* If a user has: ## '''Two keys''': The oldest key is deleted ## '''One key''': The key is deactivated # '''Notifications''': #* The Lambda function sends an email notification to the user stating that the key has been deleted/deactivated ## Access Key ID. ## Secret Access Key. #* Emails are sent using Amazon SES to ensure secure delivery. # The process is triggered weekly on Monday using an '''Amazon EventBridge''' schedule.
Summary:
Please note that all contributions to Kautepedia are considered to be released under the Creative Commons Attribution-NonCommercial-ShareAlike (see
Kautepedia:Copyrights
for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource.
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Navigation menu
Personal tools
British English
Not logged in
Talk
Contributions
Log in
Namespaces
Page
Discussion
British English
Views
Read
Edit
Edit source
View history
More
Search
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Tools
What links here
Related changes
Special pages
Page information