Skip to Content
Use AWS auth to Secure EC2 Instances with HashiCorp Vault
shortcut

Use AWS auth to Secure EC2 Instances with HashiCorp Vault

by Prachi Jain
August 2024
Intermediate
5 pages
3m
English
O'Reilly Media, Inc.
Content preview from Use AWS auth to Secure EC2 Instances with HashiCorp Vault

Use AWS auth to Secure EC2 Instances with HashiCorp Vault

HashiCorp Vault’s aws auth method provides an easy and secure way to authenticate EC2 instances to Vault and retrieve secrets. There are two ways of using aws auth - ec2 and iam. Both ways have a completely different workflow, and this Shortcut is focused on the ec2 way.

Prerequisites

  1. You need a running Vault cluster. Refer to the Shortcut “Run HashiCorp Vault with Helm” for a refresher on running Vault. Ensure that your Vault cluster is available over the internet to allow your EC2 instance to connect to it.

  2. You also need a running EC2 instance. If needed, refer to the official AWS documentation on launching an EC2 instance.

Update EC2 Instance

  1. Create an IAM role in AWS with the following policy attached to it:

    {
      "Version": "2012-10-17",
      "Statement": [
        {
          "Effect": "Allow",
          "Action": "sts:AssumeRole",
          "Resource": "*"
        }
      ]
    }
      
  2. Attach the IAM role to your EC2 instance.

  3. Install Vault on the EC2 instance per the official HashiCorp documentation.

Set Up AWS auth Method in Vault

  1. Enable the aws auth method:

    vault auth enable aws

    You should see a success message.

  2. Configure the aws auth method:

    vault write auth/aws/config/client access_key=<your-aws-access-key> secret_key=<your-aws-secret-key> region=<your-aws-region>

    You should see a success message like the following:

    Success! Data written to: auth/aws/config/client
  3. Create a role.

    1. Copy your EC2 ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

Use Terraform to Install and Configure Vault

Use Terraform to Install and Configure Vault

Prachi Jain
Kubernetes Security and Observability

Kubernetes Security and Observability

Brendan Creane, Amit Gupta

Publisher Resources

ISBN: 9781098170431