Prerequisites for Installing the Policy Workbench

Prerequisites to install Policy Workbench.

Ensure that the jumpbox can connect to the required repositories. If not already authenticated, then log in to the required repository.

  • For connecting and deploying from the Protegrity Container Registry (PCR), use the following command and the credentials obtained from the My.Protegrity portal during account creation:
helm registry login registry.protegrity.com:9443
  • For connecting and deploying to the local repository, use your local credentials and local repository endpoint as required.

Ensure that the PPC Cluster is installed and accessible, before installing Policy Workbench on PPC.

For more information about installing PPC, refer to the section Installing PPC.

Required Tools

Ensure that the following tools are available on the jump box on which Policy Workbench is installed.

ToolVersionDescription
OpenTofu>=1.10.0Used to run the installer.
AWS CLIAny versionMust be configured with credentials that have EKS and IAM permissions. The default region must also be set using either the AWS_DEFAULT_REGION or the AWS_REGION environment variables or the ~/.aws/config configuration file.
kubectlAny versionRequired for validating the deployment. It must be configured for the target PPC cluster where Policy Workbench is deployed.

IAM Permissions

The following IAM permissions are automatically created by the OpenTofu script.

PermissionPurpose
iam:CreatePolicy / iam:DeletePolicy / iam:GetPolicyCreate and manage the AWS KMS access policy.
iam:CreateRole / iam:DeleteRole / iam:GetRole / iam:UpdateAssumeRolePolicyCreate and manage the AWS KMS pod identity role.
iam:AttachRolePolicy / iam:DetachRolePolicyAttach the AWS KMS policy to the role.

EKS Permissions

The following EKS permissions are automatically created by the OpenTofu script.

PermissionPurpose
eks:DescribeClusterRead the cluster endpoint and the certificate authority data for the Helm provider in OpenTofu. The Helm provider requires this information to connect to the PPC.
eks:DescribeAddonVerify that the eks-podidentity-agent is installed.
eks:CreatePodIdentityAssociation /eks:DeletePodIdentityAssociation /eks:DescribePodIdentityAssociationAssociate the AWS KMS role with the Policy Workbench service account.

Last modified : April 13, 2026