Was this helpful?
Set Up the AWS Key Management Service (AKMS)
 Early Adoption Program—EAP 
To enable an AKMS for data encryption, you must:
1. Initiate adding an access key in Avalanche
2. Create a symmetric key in AWS
3. Complete your access key in Avalanche
4. Select your AWS-managed key for encryption when creating warehouse
Add an Access Key in Avalanche
To add an access key in Avalanche
1. In the Avalanche console, click your user ID in the upper right corner of the browser and select Administration from the dropdown menu:
2. In the navigation pane on the left, click Key Management:
The Key Management panel is displayed:
If you have created no warehouses or any key aliases, “No Encryption Key” will be displayed for the default Avalanche-managed encryption as well as the AWS Key Management Service.
3. Click the Add New button.
The Add Key Details dialog opens:
4. Add a Key Name, specify AWS KMS, and copy the Avalanche Account ID to add the Avalanche account ID to your AKMS policy.
5. Add the Avalanche AWS Account ID to Your AKMS Policy. After you finish this task in AWS, return back to Avalanche to finish creating and validating key.
6. Add the Amazon Resource Name (ARN) generated from AWS. The ARN and corresponding region are mandatory for requests that the AKMS makes on your behalf. If you enter an incorrect region, your key connection validation will fail. Warehouse regions are independent of the KMS master key ID’s region of origin.
7. Validate key before using to create your database instance.
After you create a database instance, this key alias will be displayed in the Encryption Key field of the database details page.
Add the Avalanche AWS Account ID to Your AKMS Policy
To add the Avalanche AWS account ID to your AKMS policy
1. Sign into the AWS Management Console and open the AKMS (https://console.aws.amazon.com/kms) and select Customer managed keys.
Note: If you need to change the AWS Region, use the Region selector in the upper-right.
2. Choose Create key.
3. Choose Symmetric for Key type, verify the Encrypt and decrypt option selection, and click Next.
4. Create an alias for the KMS key and add a description, if necessary.
5. (Optional) Type a tag key and an optional tag value and click Next.
6. (Optional) Select the IAM users and roles that can administer the KMS key.
7. (Optional) To prevent the selected IAM users and roles from deleting this KMS key, in the Key deletion section at the bottom of the page, clear the Allow key administrators to delete this key check box and click Next.
9. Allow Avalanche AWS account to use this KMS key for cryptographic operations. To do so, in the Other AWS accounts section at the bottom of the page, choose Add another AWS account and enter the AWS account identification number of Avalanche AWS account.
10. Add the Avalanche account ID from Avalanche Add Access Key dialog.
11. (Optional) You can verify that the account ID has been added to your KMS policy. It should contain something like this:
"Principal": {"AWS": [ "arn:aws:iam::your_account_id:user/user_name", "arn:aws:iam::123456789012:root" ]
Last modified date: 05/15/2024