Skip to content

AWS IAM Permissions

AWS permissions are only needed if you’re using DynamoDB-backed features. Filesystem keystores with SQLite or PostgreSQL anti-slashing require no AWS access at all.

Two features need IAM permissions:

  • DynamoDB anti-slashing — stores EIP-3076 slashing protection data in DynamoDB
  • DynamoDB + KMS key source — stores encrypted BLS validator keys in DynamoDB, protected by AWS KMS

The DynamoDB anti-slashing backend uses transactions for atomicity. It never uses BatchWriteItem or BatchGetItem.

ActionPurpose
dynamodb:DescribeTableTable existence check at startup
dynamodb:GetItemRead watermarks and signing roots
dynamodb:PutItemWrite watermark updates
dynamodb:TransactGetItemsAtomic multi-item reads
dynamodb:TransactWriteItemsAtomic conditional writes (slashing protection)

No GSI is needed, so the resource ARN is the table only.

{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "DynamoDBAntiSlashing",
"Effect": "Allow",
"Action": [
"dynamodb:DescribeTable",
"dynamodb:GetItem",
"dynamodb:PutItem",
"dynamodb:TransactGetItems",
"dynamodb:TransactWriteItems"
],
"Resource": "arn:aws:dynamodb:REGION:ACCOUNT_ID:table/TABLE_NAME"
}
]
}

Replace REGION, ACCOUNT_ID, and TABLE_NAME with your values.

The terraform/examples/ configurations create the table and wire up this policy to your signer IAM role.

On first boot, the signer generates a random master key, splits it into N Shamir shares (one per KMS key ARN), and encrypts each share with its corresponding KMS key. This requires kms:Encrypt.

On every subsequent boot, the signer reads the encrypted shares from DynamoDB and decrypts at least kms_threshold of them to reconstruct the master key. This only needs kms:Decrypt.

kms:Encrypt is granted in the KMS key policy, not the IAM role policy. The Terraform module handles this automatically. Your signer role’s IAM policy only ever holds kms:Decrypt and kms:DescribeKey.

Each KMS key used for Shamir shares must have a key policy granting the signer role access. If you use the Terraform modules, this is configured automatically. For manual key creation:

{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "EnableIAMDelegation",
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::ACCOUNT_ID:root"
},
"Action": "kms:*",
"Resource": "*"
},
{
"Sid": "AllowSignerRole",
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::ACCOUNT_ID:role/SIGNER_ROLE_NAME"
},
"Action": ["kms:Encrypt", "kms:Decrypt", "kms:DescribeKey"],
"Resource": "*"
}
]
}

On EKS, use IAM Roles for Service Accounts (IRSA) or EKS Pod Identity to bind the IAM role to your signer pod without static credentials.

ServiceAccount annotation (IRSA):

apiVersion: v1
kind: ServiceAccount
metadata:
name: containment-chamber
namespace: validators
annotations:
eks.amazonaws.com/role-arn: arn:aws:iam::ACCOUNT_ID:role/ROLE_NAME

Trust policy for the IAM role:

{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Federated": "arn:aws:iam::ACCOUNT_ID:oidc-provider/oidc.eks.REGION.amazonaws.com/id/OIDC_ID"
},
"Action": "sts:AssumeRoleWithWebIdentity",
"Condition": {
"StringEquals": {
"oidc.eks.REGION.amazonaws.com/id/OIDC_ID:sub": "system:serviceaccount:validators:containment-chamber",
"oidc.eks.REGION.amazonaws.com/id/OIDC_ID:aud": "sts.amazonaws.com"
}
}
}
]
}

The signer uses the standard AWS SDK credential chain, so IRSA works without any configuration changes. See the Kubernetes deployment guide for the full pod spec and ServiceAccount setup.

For maximum custody separation, split the master key across KMS keys in separate AWS accounts. A 2-of-3 setup means any two accounts can reconstruct the master key, but no single account can do so alone.

Account A (primary, runs signer)
KMS Key 1 + DynamoDB table + IAM signer role
Account B (secondary custody)
KMS Key 2 — key policy grants kms:Decrypt + kms:DescribeKey to Account A signer role
Account C (tertiary custody)
KMS Key 3 — key policy grants kms:Decrypt + kms:DescribeKey to Account A signer role

The terraform/examples/multi-account/ example uses provider aliases to create KMS keys in secondary accounts with cross-account key policies, and adds all key ARNs to the signer IAM role policy.

See the KMS Key Management guide for the full multi-account deployment sequence.

ExampleWhat it creates
terraform/examples/single-account/DynamoDB tables (keystore + antislashing), 3 KMS Shamir keys, table encryption CMKs, IAM role with instance profile — all in one account
terraform/examples/multi-account/Same resources, but KMS keys split across 3 AWS accounts using provider aliases with cross-account key policies

Each example includes a README with usage instructions and the matching signer config.yaml.