Complico Guide
  • 🏠Complico User Guide
  • 🧠Virtual Compliance Assistant
    • About
    • Dashboard
    • Task Management
    • Progress
    • Templates and Steps
    • Supervisors
    • Responsibles
    • Delegated Tasks
    • Mutual Evidences & Filters
  • 🖥️Frameworks infrastructure
    • About
    • Adopt Frameworks
    • Inside a Framework
    • Inside the Evidence
    • Upload Files
    • Add Statements
    • Comments
    • Change Status
    • Similar Evidences
    • Remove Frameworks
    • Export Frameworks
    • Generate Reports
  • 🗃️Reports Management
    • About
    • Generate New Reports
    • Review Reports (Auditor)
    • NCRs (Auditor)
    • Generated Reports
    • Report Status
    • Respond To NCRs
    • Report Archive
  • 📃Document Governance
    • About
    • Folders & Documents
    • Templates & Template Gallery
    • Approvers Workflow
    • Recipients
    • Editing
    • ETA (Estimated Time of Completion)
    • Upload a File
    • Document Status
    • Trash & File Options
    • Filter Documents
  • 🧰Asset Management
    • About
    • Add & Delete Assets
    • Create Asset Categories
    • Manage Requests
    • Release
    • Import & Export
  • 👥HR Management
    • About
    • Managing Employees
    • Organization Tree
    • Import & Export
    • Release
    • Employee Issues
    • Incoming Requests
    • Time-Off Requests
    • Job Title
    • Settings
  • 🚚Vendor Management
    • About
    • Add & Remove Vendors
    • Vendor Settings
    • Release
    • Import & Export
  • 🤵‍♀️Employee Portal
    • About
    • HR
      • Edit Profile
      • Organization Tree
      • Employee Issues
      • Time-Off Requests
      • Time-Off Management
    • Assets
      • Create Asset Requests
      • Manage Asset Requests
    • Required Actions
      • Perform Required Actions
      • Filter Tasks
    • Staff (COMING SOON)
    • Vendors (COMING SOON)
    • Training (COMING SOON)
    • Risk Treatment (COMING SOON)
    • Incident Reporting (COMING SOON)
  • 🔐Access Management
    • About
    • Applications
    • Campaign Configuration
    • Campain Review
    • Duties
    • SOD Rule Sets
    • Conflicts
  • 🙋‍♀️KYC Management
    • About
    • Use Templates
    • Creating & Editing Templates
    • Matches & Screenings
    • Send To Client & Requests
    • Client Risk & Edit Info
    • Client History
    • Client Lists & Crypto Wallets
    • OTS (One-Time Screening)
    • Archive & Blacklist Clients
    • Import & Export
  • 🚗Automation Management
    • About
    • Create Automations
    • Triggers (Schedule)
    • Documents
    • Actors
    • Saving To Evidences
    • Managing Automation
  • ☢️Vulnerability Scanner
    • COMING SOON
    • COMING SOON
  • 📱Integrations
    • About
    • Install Integrations
      • GitHub
      • Jira
      • Confluence
      • Azure AD
      • Intune
      • BambooHR
      • Google Workspace
      • AWS CloudTrail
      • Aws Elastic Compute Cloud
      • AWS Key Management Service
      • AWS Relational Database Service
      • AWS Security Hub
      • AWS Simple Storage Service
    • Use Integrations
    • Remove Integrations
    • Integration Details (Auditor)
  • 🛒Collectors
    • About
    • Collectors
  • 🔨Framework Builder
    • About
    • Creating Frameworks
    • Creating Controls
    • Creating Evidences
    • Unifying a Built Framework
    • Adopting a Built Framework
  • 🧯Risk Management
    • About
    • Models
    • Registries
    • Manage Risks
    • Export & Import
    • Release
  • ⚙️Settings
    • About
    • Organization
    • Invites
    • Profile
    • Change Language
    • Security
    • Contact Us
Powered by GitBook
On this page
  • Add Key Management Service Integration
  • The AWS System
  • Add Permissions to a User Group
  • Get the Access and Secret Keys
  • Adding the Integration in Complico's System
  • Vendor Management for an Integration
  1. Integrations
  2. Install Integrations

AWS Key Management Service

PreviousAws Elastic Compute CloudNextAWS Relational Database Service

Last updated 1 year ago

Add Key Management Service Integration

To incorporate the AWS Key Management Service into the Complico system, navigate to the Available Integrations page and select the Key Management Service icon, as indicated by the arrow below.

In the "Add Integration" window depicted below, it is essential to furnish the AWS Access Key and Secret Key.

Prior to acquiring these keys, it is imperative to verify that our Security Hub users within the AWS system possess Read-Only Permissions.

These permissions play a vital role in enabling the Complico system to collect information from the Integration App.

Complico exclusively necessitates Read-Only access, utilizing the retrieved data solely for compliance purposes, without initiating any alterations, deletions, or additions to the Key Management Service system.

The AWS System

Initiate this process by utilizing the search bar to access the Policies page, circled below.

Navigate to the top-right corner and select the 'Create Policy' button, as indicated by the arrow below.

Choose KMS (Key Management Service) from the drop-down options menu, as denoted by the arrow below.

Now, opt for the three permissions indicated by the arrows below.

These permissions are essential for providing Read-Only access to users.

  1. ListAliases

  2. ListKeys

  3. DescribeKey

Once these permissions have been selected, proceed by clicking on "Next" to advance to the next page.

After assigning a name to the policy, click once again on the 'Create Policy' button, as indicated by the arrow below, to finalize and create the policy.

On the AWS Console home page, proceed by clicking on the IAM (Identity and Access Management) button, as marked by the arrow below, to access User Groups and Permissions.

In case the IAM button is not visible on the main Console page, use the site's search bar and enter "IAM" to locate it.

In the User Groups tab, initiate the process by clicking on the "Create Group" button, as indicated by the arrow below.

Subsequently, provide the created group with Read-Only Permission for the Key Management Service, ensuring that any user added to the group automatically inherits these permissions.

Add Permissions to a User Group

On the Create Group page, after assigning a name to the group and adding users to it, choose the Key Management Service (KMS) Read Only Access Permission Policy, as highlighted by the arrow below.

Following the selection of the appropriate permission, click on the "Create Group" button, circled below.

Get the Access and Secret Keys

Having ensured that our users possess the Read-Only permissions for the Key Management Service, proceed by clicking on the Admin name to reveal the drop-down options menu, as indicated by the arrow below.

From this menu, highlighted in the circle below, choose "Security Credentials."

Within the 'Access Keys' section, select the 'Create Access Key' button, as denoted by the arrow below.

Adding the Integration in Complico's System

Return to Complico's 'Add Integration' window and input a custom integration name along with the keys you have created.

Vendor Management for an Integration

Now, choose the appropriate Vendor that offers the Security Hub service.

If there isn't a suitable Vendor available, you can also create a Vendor directly in the 'Add Integration' window.

Click on the 'Create Vendor' button, as indicated by the arrow below.

Once all mandatory fields are completed, proceed by clicking on the 'Add Integration' button, as indicated by the arrow below.

On the Installed Integration page, you can review the integrations that have been installed.

In the image below, you can observe an example of the Key Management Service Integration that has already been installed.

Within the AWS System, unlike other Integration Applications that provide pre-configured Permission Policies for attachment to a User Group (as illustrated in other AWS Integration options in), the Key Management necessitates the creation of a new Policy to grant Read-Only access Permissions to Users.

To return to the

To return to the

📱
this guide
Integrations Guide hub, click here.
main guide hub, click here.
The Key Management Service icon is marked with an arrow
the Add Integration window
the Policies page search option is circled
the 'Create Policy' button is marked with an arrow
the SKM option is marked with an arrow
the needed Permissions are marked with arrows
the 'Create Policy' button is marked with an arrow
the IAM button is marked with an arrow below
the Create Group button is marked with an arrow
the Key Management Service Read Only Access permission policy is marked with an arrow
navigating to Security Credentials
the 'Create Access Key' button is marked with an arrow
entering the mandatory Keys in the Add Integration window
the Create Vendor button is marked with an arrow
the Add Integration button is marked with an arrow
the new Key Management Service integration is installed