Creating an Data Encryption Key (DEK)

This section describes how to create the Data Encryption Key. This key is the AWS customer master key that is used to encrypt the policy package.

To create a Data Encryption Key:

  1. Log in to the AWS environment.
  1. Navigate to Services.

    A list of AWS services appears.

  2. In Security, Identity, & Compliance, click Key Management Service.

    The AWS Key Management Service (KMS) console opens. By default, the Customer managed keys screen appears.

  3. Click Create key.

    The Configure key screen appears.

  4. In the Key type section, select the Asymmetric option to create a single customer master key that will be used to perform the encrypt and decrypt operations.

  5. In the Key usage section, select the Encrypt and decrypt option.

  6. In the Key spec section, select one option.

    For example, select RSA_4096.

  7. In the Advanced options section, select the Single-Region Key option.

  8. Click Next.

    The Add labels screen appears.

  9. In the Alias field, specify the display name for the key, and then click Next.

    The Review and edit key policy screen appears.

  10. Click Finish.

    The Customer managed keys screen appears, displaying the newly created customer master key.

  11. Click the key alias.

    A screen specifying the configuration for the selected key appears.

  12. In the General Configuration section, copy the value specified in the ARN field, and save it on your local machine.

    You need to attach the key to the KMSDecryptAccess policy. You also need to specify this ARN value in the command for creating a Kubernetes secret for the key.

  13. Navigate to Services > IAM.

  14. Click Policies.

    The Policies screen appears.

  15. Select the KMSDecryptAccess policy.

    The Permissions tab appears.

  16. Click Edit policy to edit the policy in JSON format.

  17. Modify the policy to add the ARN of the key that you have copied in step 13 to the Resource parameter.

    {
        "Version": "2012-10-17",
        "Statement": [
            {
                "Sid": "VisualEditor0",
                "Effect": "Allow",
                "Action": "kms:Decrypt",
                "Resource": [
                    "<ARN of the AWS Customer Master Key>"
                ]
            }
        ]
    }
    
  18. Click Review policy, and then click Save changes to save the changes to the policy.


Last modified : January 17, 2026