Use Existing AWS KMS Key | VantageCloud Enterprise - Using an Existing AWS KMS Key - Teradata Vantage

Teradata® VantageCloud Enterprise

Deployment
VantageCloud
Edition
Enterprise
Product
Teradata Vantage
Release Number
2.4.4
Published
February 2024
Language
English (United States)
Last Update
2024-02-16
dita:mapPath
wec1649710665916.ditamap
dita:ditavalPath
lwe1652211139768.ditaval
dita:id
wec1649710665916
Product Category
Teradata Vantage

To use an existing AWS KMS key to create a customer managed key, you must modify the key policy of that key so the IAM role is able to use the key to perform encryption.

  1. Set up the key policy to allow the Vantage account to use the key by setting the following permissions:
    "kms:Encrypt",
    
    "kms:Decrypt"
    
    "kms:ReEncrypt*"
    
    "kms:GenerateDataKey*"
    
    "kms:DescribeKey"
    
    "kms:CreateGrant",
    
    "kms:ListGrants",
    
    "kms:RevokeGrant"
  2. Share the Alias ARN for the key with Teradata and your cloud operations contact.
    • This is not the same as the key ARN.
    • The Alias ARN must remain the same throughout the life cycle of the site. When a KMS key is rotated, the Alias ARN must be remapped to the newly created KMS key.