Pre-Configuration

Configuration steps before installing the protector.

    Provide AWS sub-account

    Identify or create an AWS account where the Protegrity solution will be installed. It is recommended that a new AWS sub-account be created. This can provide greater security controls and help avoid conflicts with other applications that might impact regional account limits. An individual with the Cloud Administrator role will be required for some subsequent installation steps.

    AWS Account ID: ___________________

    AWS Region (AwsRegion): ___________________

    Create S3 bucket for Installing Artifacts

    This S3 bucket will be used for the artifacts required by the CloudFormation installation steps. This S3 bucket must be created in the region that is defined in Determine AWS Region.

    To create S3 bucket for installing artifacts:

    1. Access the AWS S3 Management Console.

    2. Change region to the one determined in Determine AWS Region

    3. Click Create Bucket.

    4. Enter a unique bucket name:

      For example, protegrity-install.us-west-2.example.com.

    5. Click Create Bucket.

    6. Upload the installation artifacts to this bucket. Protegrity will provide the following three artifacts.

      • protegrity-athena-protect-udfs-<version>.jar
      • protegrity-agent-<version>.zip
      • protegrity-sample-policy-<version>.zip
      • protegrity-external-extension-<version>.zip

      S3 Bucket name (ArtifactS3Bucket): ___________________

    Create KMS Key

    The Amazon Key Management Service (KMS) provides the ability for the Protegrity Serverless solution to encrypt and decrypt the Protegrity Security Policy.

    To create KMS key:

    1. In the AWS sub-account where the KMS key will reside, select the region.

    2. Navigate to Key Management Service > Create Key.

    3. Configure the key settings:

      • Key type: Asymmetric
      • Key usage: Encrypt and decrypt
      • Key spec: RSA_4096
      • Click Next
    4. Create alias and optional description, such as, Protegrity-Serverless and click Next.

    5. Define key administrative permissions, the IAM user who will administrate the key.

    6. Click Next.

    7. Define the key usage permissions.

    8. In Other AWS accounts, enter the AWS account id used for the Protegrity Serverless installation.

    9. Continue on to create the key. If there is a concern this permission is overly broad, then you can return later to restrict access to the role of two Protegrity Serverless Lambda as principals. Click to open the key in the list and record the ARN.

      KMS Key ARN (AWS_KMS_KEY_ID): ___________________

    10. Download the public key from the KMS key. Navigate to the key in KMS console, select the Public key tab, and click Download. Save the PEM file. This public key will be added to the ESA data store as an export key. Refer to Exporting Keys to Datastore for instructions on adding the public key to the data store.

      KMS Public Key PEM file: ___________________

    What’s Next


    Last modified : January 21, 2026