<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>AWS on</title><link>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/</link><description>Recent content in AWS on</description><generator>Hugo</generator><language>en</language><atom:link href="https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/index.xml" rel="self" type="application/rss+xml"/><item><title/><link>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/common/agent/architecture/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/common/agent/architecture/</guid><description>&lt;p>The following diagram shows a reference architecture for synchronizing the security policy from ESA.&lt;/p>
&lt;p>&lt;img src="https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/common/agent/cp_agent_high_level_architecture.png" alt="" title="Policy Agent high-level architecture">&lt;/p>
&lt;p>The Protegrity Policy Agent requires network access to an Enterprise Security Administrator (ESA). Most organizations install the ESA on-premise. Therefore, it is recommended that the Policy Agent is installed into a private subnet with a Cloud VPC using a NAT Gateway to enable this communication through a corporate firewall.&lt;/p>
&lt;p>The ESA is a soft appliance that must be pre-installed on a separate server. It is used to create and manage security policies.&lt;/p></description></item><item><title/><link>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/common/ppc/install_with_ppc/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/common/ppc/install_with_ppc/</guid><description>&lt;p>This guide describes how to configure the Protegrity Policy Agent and Log Forwarder to connect to a Protegrity Provisioned Cluster (PPC), highlighting the differences from connecting to ESA.&lt;/p>
&lt;h2 id="key-differences-ppc-vs-esa">Key Differences: PPC vs ESA&lt;/h2>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Feature&lt;/th>
 &lt;th>ESA 10.2&lt;/th>
 &lt;th>PPC (this guide)&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>Datastore Key Fingerprint&lt;/td>
 &lt;td>Optional/Recommended&lt;/td>
 &lt;td>&lt;strong>Required&lt;/strong>&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>CA Certificate on Agent&lt;/td>
 &lt;td>Optional/Recommended&lt;/td>
 &lt;td>&lt;strong>Optional/Recommended&lt;/strong>&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>CA Certificate on Log Forwarder&lt;/td>
 &lt;td>Optional/Recommended&lt;/td>
 &lt;td>&lt;strong>Not supported&lt;/strong>&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Client Certificate Authentication from Log Forwarder&lt;/td>
 &lt;td>Optional/Recommended&lt;/td>
 &lt;td>&lt;strong>Not supported&lt;/strong>&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>IP Address&lt;/td>
 &lt;td>ESA IP address&lt;/td>
 &lt;td>&lt;strong>PPC address&lt;/strong>&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;h2 id="prerequisites">Prerequisites&lt;/h2>
&lt;ul>
&lt;li>Access to PPC and required credentials.&lt;/li>
&lt;li>Tools: &lt;code>curl&lt;/code>, &lt;code>kubectl&lt;/code> installed.&lt;/li>
&lt;/ul>
&lt;h2 id="policy-agent-setup-with-ppc">Policy Agent Setup with PPC&lt;/h2>


&lt;div class="alert alert-warning" role="alert">
&lt;h4 class="alert-heading">Important&lt;/h4>

 When connecting to PPC, the Policy Agent &lt;strong>requires&lt;/strong> the &lt;code>PTY_DATASTORE_KEY fingerprint&lt;/code>. For ESA 10.2, the fingerprint is optional but recommended. See &lt;a href="../installation/agent/">Policy Agent Installation&lt;/a> for general setup steps.

&lt;/div>

&lt;p>Follow these instructions as a guide for understanding specific inputs for Policy Agent integrating with PPC:&lt;/p></description></item><item><title/><link>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/common/protector/iam-execution-policy/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/common/protector/iam-execution-policy/</guid><description>&lt;h2 id="create-protect-lambda-iam-execution-policy">Create Protect Lambda IAM Execution Policy&lt;/h2>
&lt;p>This task defines a policy used by the Protegrity Lambda function to write CloudWatch logs and access the KMS encryption key to decrypt the policy.&lt;/p>
&lt;p>Perform the following steps to create the Lambda execution role and required policies:&lt;/p>
&lt;ol>
&lt;li>
&lt;p>From the AWS IAM console, select &lt;strong>Policies&lt;/strong> &amp;gt; &lt;strong>Create Policy&lt;/strong>.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Select the &lt;strong>JSON&lt;/strong> tab and copy the following sample policy.&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>{
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &amp;#34;Version&amp;#34;: &amp;#34;2012-10-17&amp;#34;,
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &amp;#34;Statement&amp;#34;: [
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> {
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &amp;#34;Sid&amp;#34;: &amp;#34;CloudWatchWriteLogs&amp;#34;,
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &amp;#34;Effect&amp;#34;: &amp;#34;Allow&amp;#34;,
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &amp;#34;Action&amp;#34;: [
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &amp;#34;logs:CreateLogGroup&amp;#34;,
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &amp;#34;logs:CreateLogStream&amp;#34;,
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &amp;#34;logs:PutLogEvents&amp;#34;
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> ],
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &amp;#34;Resource&amp;#34;: &amp;#34;*&amp;#34;
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> },
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> {
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &amp;#34;Sid&amp;#34;: &amp;#34;KmsDecrypt&amp;#34;,
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &amp;#34;Effect&amp;#34;: &amp;#34;Allow&amp;#34;,
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &amp;#34;Action&amp;#34;: [
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &amp;#34;kms:Decrypt&amp;#34;
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> ],
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &amp;#34;Resource&amp;#34;: [
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &amp;#34;arn:aws:kms:*:*:key/*&amp;#34;
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> ]
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> }
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> ]
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>}
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;/li>
&lt;li>
&lt;p>For the KMS policy, replace the &lt;strong>Resource&lt;/strong> with the ARN for the KMS key created in a previous step.&lt;/p></description></item><item><title/><link>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/common/protector/iam-role/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/common/protector/iam-role/</guid><description>&lt;h2 id="create-protect-lambda-iam-role">Create Protect Lambda IAM Role&lt;/h2>
&lt;p>The following steps create the role to utilize the policy defined in &lt;a href="https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/common/protector/iam-role/#create-protect-lambda-iam-execution-policy">Create Protect Lambda IAM Execution Policy&lt;/a>.&lt;/p>
&lt;p>To create protect lambda IAM execution role:&lt;/p>
&lt;ol>
&lt;li>
&lt;p>From the AWS IAM console, select &lt;strong>Roles&lt;/strong> &amp;gt; &lt;strong>Create Role&lt;/strong>.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Select &lt;strong>AWS Service&lt;/strong> &amp;gt; &lt;strong>Lambda&lt;/strong> &amp;gt; &lt;strong>Next&lt;/strong>.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>In the list, search and select the policy created in &lt;a href="https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/common/protector/iam-role/#create-protect-lambda-iam-execution-policy">Create Protect Lambda IAM Execution Policy&lt;/a>.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Click &lt;strong>Next&lt;/strong>&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Type the role name, for example, &lt;strong>ProtegrityProtectRole&lt;/strong>&lt;/p></description></item><item><title/><link>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/common/upgrading/cp_aws_agent_upgrade/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/common/upgrading/cp_aws_agent_upgrade/</guid><description>&lt;h2 id="upgrading-policy-agent-lambda">Upgrading Policy Agent Lambda&lt;/h2>


&lt;div class="alert alert-info" role="alert">
&lt;h4 class="alert-heading">Note&lt;/h4>

 If the release version of the artifact zip file has not changed since the previous installation, you can skip the Agent Lambda upgrade.

&lt;/div>

&lt;ol>
&lt;li>
&lt;p>Go to AWS Lambda console and select existing &lt;strong>Protegrity Agent Lambda&lt;/strong>.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Click &lt;strong>Actions&lt;/strong> in top right portion of the screen. Select &lt;strong>Publish new version&lt;/strong>. Click &lt;strong>Publish&lt;/strong>. The version of Agent Lambda you just created will serve as restore point in the case you needed to rollback the upgrade.&lt;/p></description></item><item><title/><link>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/common/upgrading/cp_aws_cloud_api_forwarder_upgrade/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/common/upgrading/cp_aws_cloud_api_forwarder_upgrade/</guid><description>&lt;h2 id="upgrading-log-forwarder-lambda">Upgrading Log Forwarder Lambda&lt;/h2>


&lt;div class="alert alert-info" role="alert">
&lt;h4 class="alert-heading">Note&lt;/h4>

 If you are upgrading protector to one of these versions: [3.2.2, 3.2.3], skip this section and follow instruction to install new Log Forwarder &lt;a href="../installation/log-forwarder/">Audit Log Forwarder Installation&lt;/a>.

&lt;/div>

&lt;ul>
&lt;li>
&lt;p>&lt;strong>Publish Log Forwarder Lambda Version&lt;/strong>&lt;/p>
&lt;p>Publishing a version of the Log Forwarder Lambda allows to roll-back to pre-existing version if upgrade fails&lt;/p>
&lt;ol>
&lt;li>
&lt;p>Go to AWS Lambda console and select existing &lt;strong>Protegrity Log Forwarder Lambda&lt;/strong>.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Click &lt;strong>Actions&lt;/strong> in top right portion of the screen. Select &lt;strong>Publish new version&lt;/strong>. Click &lt;strong>Publish&lt;/strong>.&lt;/p></description></item><item><title/><link>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/common/upgrading/cp_aws_protect_upgrade/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/common/upgrading/cp_aws_protect_upgrade/</guid><description>&lt;h2 id="upgrading-protect-lambda">Upgrading Protect Lambda&lt;/h2>


&lt;div class="alert alert-info" role="alert">
&lt;h4 class="alert-heading">Note&lt;/h4>

 If the release version of the artifact zip file has not changed since the previous installation, you can skip the Protect Lambda upgrade.

&lt;/div>

&lt;p>Diagram below illustrates upgrade steps.&lt;/p>

&lt;!-- Hidden tab for tabpane initialization, following tabbed pane with diagrams will not render properly if you remove this workaround... could not find better "fix" -->
&lt;ul class="nav nav-tabs" id="tabs-1" role="tablist">
 
&lt;/ul>

&lt;div class="tab-content" id="tabs-1-content">
&lt;/div>






&lt;ul class="nav nav-tabs" id="tabs-2" role="tablist">
 &lt;li class="nav-item">
 &lt;button class="nav-link active"
 id="tabs-02-00-tab" data-bs-toggle="tab" data-bs-target="#tabs-02-00" role="tab"
 data-td-tp-persist="snowflake" aria-controls="tabs-02-00" aria-selected="true">
 Snowflake
 &lt;/button>
 &lt;/li>&lt;li class="nav-item">
 &lt;button class="nav-link"
 id="tabs-02-01-tab" data-bs-toggle="tab" data-bs-target="#tabs-02-01" role="tab"
 data-td-tp-persist="redshift" aria-controls="tabs-02-01" aria-selected="false">
 Redshift
 &lt;/button>
 &lt;/li>&lt;li class="nav-item">
 &lt;button class="nav-link"
 id="tabs-02-02-tab" data-bs-toggle="tab" data-bs-target="#tabs-02-02" role="tab"
 data-td-tp-persist="cloud api" aria-controls="tabs-02-02" aria-selected="false">
 Cloud API
 &lt;/button>
 &lt;/li>&lt;li class="nav-item">
 &lt;button class="nav-link"
 id="tabs-02-03-tab" data-bs-toggle="tab" data-bs-target="#tabs-02-03" role="tab"
 data-td-tp-persist="athena" aria-controls="tabs-02-03" aria-selected="false">
 Athena
 &lt;/button>
 &lt;/li>
&lt;/ul>

&lt;div class="tab-content" id="tabs-2-content">
 &lt;div class="tab-body tab-pane fade show active"
 id="tabs-02-00" role="tabpanel" aria-labelled-by="tabs-02-00-tab" tabindex="2">
 &lt;p>&lt;img src="https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/common/upgrading/aws_upgrade_snowflake_protect_steps.png" alt="Snowflake Function Upgrade Steps" title="Protect Snowflake Lambda Upgrade Steps">&lt;/p></description></item><item><title/><link>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/common/upgrading/cp_aws_upgrade_finalize/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/common/upgrading/cp_aws_upgrade_finalize/</guid><description>&lt;h2 id="re-enable-protegrity-agent-function-cloudwatch-event-rule">Re-enable Protegrity Agent Function CloudWatch Event Rule&lt;/h2>
&lt;p>If the Event Rule was disabled at the beginning of the upgrade process, you must re-enabled it. Follow the steps below to re-enable Policy Agent Event rule.&lt;/p>
&lt;ol>
&lt;li>
&lt;p>Go to the Protegrity Agent Cloud Formation Stack.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Select &lt;strong>Resources&lt;/strong> tab from the top portion of the screen.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Click on the &lt;strong>Physical ID&lt;/strong> link in the &lt;strong>ScheduledRule&lt;/strong> row. The link opens Policy Agent Event Rule configuration.&lt;/p></description></item><item><title/><link>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/common/upgrading/cp_aws_upgrade_prerequisite/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/common/upgrading/cp_aws_upgrade_prerequisite/</guid><description>&lt;h2 id="disable-protegrity-agent-function-cloudwatch-event-rule">Disable Protegrity Agent Function CloudWatch Event Rule&lt;/h2>
&lt;p>Cloud Watch Event Rule is used to periodically run Protegrity Agent Function to synchronize policy from ESA.
This functionality is optional when deploying Protegrity Serverless Solution.
If the Event Rule is enabled, it must be disabled temporarily for the time of the upgrade process.&lt;/p>
&lt;p>Follow the steps below to determine if your deployment uses Event Rule and disable it.&lt;/p>
&lt;ol>
&lt;li>
&lt;p>Go to AWS Cloud Formation and select existing Protegrity deployment stack.&lt;/p></description></item><item><title/><link>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/common/upgrading/download-latest/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/cloud-protect/4.0.0/docs/aws/common/upgrading/download-latest/</guid><description>&lt;h2 id="download-the-latest-version">Download the Latest Version&lt;/h2>
&lt;p>You can download the latest version of the deployment package from &lt;a href="https://my.protegrity.com">https://my.protegrity.com&lt;/a>.
Navigate to &lt;strong>Data Protection&lt;/strong> &amp;gt; &lt;strong>Cloud Protect&lt;/strong> to download the latest version.&lt;/p>
&lt;p>After downloading the deployment package from the Protegrity Portal, unzip the package to extract the artifact files.
In the AWS Console, navigate to the S3 bucket that was previously created to upload deployment artifacts
(see: &lt;a href="../installation/preconfiguration/#create-s3-bucket-for-installing-artifacts">Create S3 bucket for Installing Artifacts&lt;/a>).&lt;/p>


&lt;div class="alert alert-info" role="alert">
&lt;h4 class="alert-heading">Note&lt;/h4>

 Only extract the deployment package and not the files in it.

&lt;/div>

&lt;p>Upload the following artifacts to the S3 bucket:&lt;/p></description></item></channel></rss>