Fortanix Key Insight User Interface Components - AWS

1.0 Introduction

This article describes the user interface (UI) features of the Amazon Web Services (AWS) cloud connection on Fortanix Key Insight.

2.0 Terminology References

For Fortanix Key Insight - AWS terminologies, refer to the Fortanix Key Insight - AWS Concepts Guide.

3.0 AWS Connection Overview

Users can access the AWS connection Overview page after adding an AWS cloud account. The Overview page summarizes AWS keys and services based on the applied Key Insight policy.

For more details on the Key Insight policy, refer to the Fortanix Key Insight – Getting Started with Cloud Connection.

Figure 1: Access AWS Overview

NOTE

  • You can click any numerical value on the Overview page to view the list of corresponding AWS keys and services.

  • If you added any external key source during the AWS cloud connection onboarding, the Overview page will display the total key count, reflecting the correlated keys from the external key source after a successful scan.

The Overview page helps users get a summary of the AWS keys and services, as described in the following sections:

3.1 Cloud Discovery Accounts

This section summarizes the count of all the parameters for a CSP organization. It shows the count of:

  • Total number of accounts within the cloud organization

  • Total number of regions under all the cloud accounts

  • Total number of keys in all the cloud regions

  • Total number of services in all the cloud regions

Dashboard1.png

Figure 2: Cloud Discovery Accounts

Clicking the Keys and Services labels in the Cloud Discovery Accounts section takes you to their list view.

3.2 Assessment Report

This section allows the user to view the assessment report on the Assessment page. The report allows you to assess your key’s security posture to ensure the safety of your data.

Dashboard11.png

Figure 3: Assessment

Click ASSESSMENT REPORT to go to the Assessment page.

For more details about the Assessment page, refer to Section 4.0: AWS Connection - Assessments.

3.3 Accounts Requiring Attention

This section gives you a quick overview of the AWS Services map that shows the top accounts whose services are vulnerable due to either using shared keys or they are not encrypted.

Click the Services map to go to the detailed view of the Services map page.

Figure 4: Top Accounts That Need Attention

3.4 Top Accounts by Keys and Status

This section lists, in descending order, the top five accounts with the greatest number of keys since the last key scan operation. The count for each account includes both enabled and disabled keys. Blue color indicators denote enabled keys, while orange color indicators denote disabled keys in each account.

Figure 5: Accounts With Top Keys

Click the account ID to go to the list view of the account that shows all the keys in the account.

3.5 Protected Services

This section presents a summary of the number of encrypted cloud services compared to the number of unencrypted services.

Dashboard12.png

Figure 6: Protected Services

  • Clicking the Encrypted label takes you to the Services table, which shows all the encrypted services.

  • Clicking the Unencrypted cell takes you to the Services table, which shows all the services that are not encrypted.

3.6 Keys by Type

This section provides a count of the key specifications in the cloud accounts. For AWS CSP, it shows the total number of keys that are configured in all the AWS cloud accounts based on the applied Key Insight policy.

Figure 7: Key Types

You can click each key type to access its corresponding list view.

3.7 Keys by Status

This section provides a summary of the status of the cloud keys across all the cloud accounts in an organization. It provides a count of the enabled keys and the count of the disabled keys. Click the Keys by Status label to go to the list view of the keys.

Figure 8: Key Status

3.8 Key Source

This section summarizes the source of all the cloud keys. For AWS CSP, it provides a count of the following:

Figure 9: Key Source

  • AWS KMS: count of all the keys that were directly created in AWS KMS.

  • Bring Your Own Key (BYOK): count of all the keys that were imported into AWS using an external source, for example: Fortanix DSM using the Bring Your Own Key (BYOK) concept, where the key material of the key is imported into AWS KMS.

  • External Key Store (XKS): count of all the keys that are stored in an external key store, for example: a key store created by connecting AWS XKS with Fortanix DSM to encrypt or decrypt the customer’s data in AWS.

    NOTE

    If you added an external key source (Fortanix DSM SaaS) during AWS cloud connection onboarding, the BYOK key source label will be replaced with “Fortanix”, displaying the count of the BYOK key source. This indicates that the BYOK keys are now correlated from the external key source, “Fortanix”.

Clicking the key source labels will take you to the tabular view of the keys for the selected key source.

4.0 AWS Connection - Assessments

Users can access the Fortanix Key Insight Assessment menu after adding a cloud account.

The Assessment page shows:

  • How good or bad the key security posture is for the cloud accounts.

  • Violations that must be remediated to improve the security status.

  • Remediation advice to improve the security status.

Figure 10: AWS Assessment Report

NOTE

  • You can click any numerical value on the Assessment page to view the list of corresponding AWS keys and services.

  • If you added any external key source during the AWS cloud connection onboarding, the Assessment page will display the total key count, reflecting the correlated keys from the external key source after a successful scan.

These are described in detail in the following sections:

4.1 Risk Score

This section provides the overall risk score of the CSP keys and services. There are three types of risks:

  • High – A high score signifies the total number of shared keys, overly permissive (usage) keys, or non-compliant keys in use.

  • Critical – A critical risk score indicates the total number of deleted keys and unencrypted cloud services detected that need attention.

  • Medium – A medium risk score indicates the total number of CSP-generated and overly permissive (management) keys in use.

RiskScore.png

Figure 11: Risk Score

In the above example, the overall risk score is Critical. The priority of the overall risk score is based on the count of risks in the following order:

  • Critical

  • High

  • Medium

4.2 Key Count by Sources

For AWS CSP, this section will provide information about the security and risk assessment of the natively managed keys (key source is AWS KMS or AWS Cloud HSM) and externally managed keys (key source is External or External Key Store). The various circles show the total key count in the cloud account.

Figure 12: Key Source Assessment

4.2.1 Cloud Generated

This section displays the details of natively managed keys (the key source is AWS KMS or AWS Cloud HSM). It is represented as a blue circle.

  • KMS: The KMS represents the total number of keys directly generated in AWS KMS. These keys increase the risk of unauthorized access to encrypted data. For better security, you can use the Fortanix Data Security Manager. Click the circle or the warning icon  WarningIcon.png to go to the list view of the KMS keys.

  • Cloud HSM: These keys in Fortanix refer to cryptographic keys that are stored and managed within Fortanix using their Hardware Security Module (HSM) services.

4.2.2 External

This section displays the details on externally managed keys (the key source is External or External Key Store). It is represented as a green circle.

  • BYOK: The circle represents the total number of keys that were imported into AWS using an external source. Refer to the Fortanix DSM using the Bring Your Own Key (BYOK) guide, where the key material of the key is imported into AWS KMS. Users bringing their keys must ensure that their key storage mechanisms are secure, preventing unauthorized access or key exposure. Click the circle or the warning icon  WarningIcon.png to go to the list view of the BYOK keys.

  • External Key Store (XKS): The XKS circle represents the count of all the keys that are stored in an external key store, for example: a key store created by connecting AWS XKS with Fortanix DSM to encrypt or decrypt the customer’s data in AWS. Keys present in an External Key Store are more secure than BYOK or KMS keys.

  • Fortanix: This key source refers to the external key source configured during AWS connection onboarding. The key count represents the number of keys correlated with Fortanix Key Insight from Fortanix DSM SaaS.

4.3 Top Security Issues

This section provides the following information about the keys:

  • Shared Keys: This section shows the total number of keys in the cloud account that are shared by two or more services for encrypting the services. This information will help you determine which keys are at risk so that you can use unique encryption keys for better security.

  • Cryptography Policy: This section shows the total number of keys in the cloud account that are violating the cryptographic policy that is set for a Fortanix Key Insight account. This information will help you determine which keys are non-compliant with the Key Insight Cryptographic policy so that you can generate new keys to encrypt the AWS services.

    Any key that utilizes the following algorithm and key size combinations is considered Non-Compliant in Fortanix Key Insight, according to the National Institute of Standards and Technology (NIST) 800-57 standard:

    • AES: Any key size less than 192 bits.

    • 3DES: Keys with size 112 bits and 168 bits.

    • DES: Keys with size 56 bits.

    • RSA: Keys with size less than 2048 bits.

    • DSA: Keys with size less than 2048 bits.

    • ECC: Keys with size less than 224 bits.

    The non-compliant keys increase the data security risk. They will be flagged as vulnerabilities on the Keys page.

    Fortanix Key Insight recommends using stronger key algorithms and ensuring that the key strength aligns with your defined policies and NIST standards.

  • Quantum-vulnerable keys: For AWS CSP, this is the total number of keys in the AWS cloud account that utilizes Quantum-vulnerable algorithms. These are symmetric keys such as RSA, EC, and so on. This information will help you determine which services are encrypted using Quantum-vulnerable keys so that you can select to re-encrypt the services using a symmetric key such as AES 256.

  • Unused keys: This section shows the total number of AWS keys that remain unused for encryption in the scanned data and supported services. You can use this information to identify unused keys and remove them for enhanced security.

    NOTE

    Fortanix Key Insight recommends removing any unused keys from your cloud as a best practice.

  • Overly permissive keys [Usage]: This section displays the total number of AWS KMS keys with excessive usage permissions. Such keys can result in service violations and are assigned a high-risk score. This information helps analyze key usage to improve security.
    The overly permissive keys (usage) check examines Key Policies and Grants to determine if an AWS service principal is allowed to execute cryptographic operations without utilizing EncryptionContext or aws:SourceArn condition keys. Additionally, it identifies wildcard entries in the Principal field of policy statements that grant broad permissions for cryptographic operations on AWS KMS.

  • Overly permissive keys [Management]: This section displays the total number of AWS KMS keys with excessive management permissions. Keys with overly permissive management permissions can lead to service violations and are assigned a medium risk score. This information helps analyze key usage to improve security.
    The overly permissive keys (management) check specifically examines Key Policies to identify policy statements that allow actions to modify keys where the Principal field contains wildcard entries. These wildcards (for example, users/*) can grant broad permissions and may expose the keys to unauthorized modifications.

    NOTE

    Fortanix Key Insight recommends reviewing and revalidating the AWS key policies as a best practice to avoid overly permissions.

Violations-Fortanix Key Insight.png

Figure 13: Top Security Issues

4.4 Service Violations

For an AWS CSP, this section provides insights into service violations across your AWS cloud environment.

You can view the total number of cloud accounts and their associated services, along with specific violations tied to each service. These violations may result from the use of shared, deleted, or soon-to-be-deleted keys, excessive permissions, non-compliant configurations, or unencrypted keys. This data will help you identify which services are at risk, enabling you to implement unique, compliant, and encrypted keys for enhanced security.

Also,

  • You can view risk levels for each service that are color-coded for easy identification.

  • Select VIEW ALL to navigate to the Services page and explore individual key violations for each service.

  • You can click any service to view a detailed list of key violations associated with that service.

NOTE

For S3, RDS, and EBS the count of Non-Compliant keys will always be 0 since all keys are compliant by default.

Figure 14: Service Violations

  • You can click any service to view a detailed list of the top 10 key violations associated with it, sorted by severity. Click each violation type to navigate to the corresponding list view.

  • Click BACK to navigate to the service violations card view.

Figure 15: Service Violations List View

4.5 Download Report

Click DOWNLOAD REPORT on the top-right corner of the Assessment page to view the Data Security Assessment Report for the CSP account in PDF format.

Figure 16: Download the Assessment Report

5.0 Rescan an AWS Connection

Click RESCAN on the Overview page to perform a rescan and verify if any keys have been added, deleted, or updated in the CSP organization.

NOTE

The RESCAN option is accessible only to users with the Account Administrator and Group Administrator roles.

Figure 17: Scan Again

If you click RESCAN and start the scan, you can monitor the progress bar while the scan is running.

After the scan is completed successfully,

  • The Last scanned label will be updated with the date and time of the completion.

  • The Overview page will reflect the new state of the AWS CSP keys and services.

You can also click RESCAN on the Assessment page to perform the rescan. After the scan is completed, the Assessment page will reflect the new state of the CSP keys and services.

Figure 18: Scan Again

6.0 Keys

After onboarding the AWS organization, click the Keys menu in the Fortanix Key Insight left navigation bar.

Clicking the Keys menu will take you to the Keys page that shows a map of all the AWS KMS accounts grouped by key source (KMS, Cloud HSM, BYOK, XKS, and others) as described in Section 3.8: Key Source.

On the Keys page, you can toggle between the GRAPH and LIST views using on the top left corner. The GRAPH view is set as the default.

6.1 Keys Graph View

The graph view shows the following information:

  • For every key source, it shows the account names, and for each account, it shows the map of all the keys in that account that are used to encrypt the AWS services.

    • If the AWS cloud connection is linked to an external key source, you can also view the details of the correlated key and the associated service mapping.

  • Each key displays all the services encrypted by it.

  • If a key is used by more than one AWS service, is non-compliant, and has overly usage or management permissions, it shows a vulnerability warning, and Key Insight recommends proceeding with the appropriate action items to minimize those warnings.

  • The keys display the non-compliance vulnerabilities based on the configured key sizes and types, following the NIST standards specified in the applied Key Insight policy,  

KeyInsight-KeyVulnerability.png

Figure 19: Key Vulnerability

Figure 20: Shared Key and Overly Permissive Vulnerability

Based on the configured key sizes and types, non-compliance vulnerabilities will be displayed following the NIST standards specified in the applied Key Insight policy.

You can click various points in the keymap to go to the tabular view of that entity.

Figure 21: Clickable Points in the Map

For example, click the account icon for the AWS KMS key source to go to the tabular view of the keys for that account.

6.1.1 Filter Keys - Graph View

In the key graph view, you can filter the keys by Key Sources, Accounts, Key ID, Vulnerabilities, and Services on the key map.

To apply the filter on the key map:

  1. Click the Key Source drop down menu to select or search keys by key source. For AWS the key sources are KMS, Cloud HSM, BYOK, XKS, and Fortanix.

  2. Click SEARCH.

    Figure 22: Filter Keys by Service Type

    You will see that the key map displays only the keys for the KMS key source.  

    Figure 23: Filter Applied

You can further filter the keys by selecting the following other filter options:

  • Accounts: Filter the keys by the selected account.

  • Key ID: Filter the keys by the key ID entered.

  • Vulnerabilities: Filter the keys by the vulnerability types - Non-compliant keys, Shared keys, and Overly permissive keys.

  • Services: Filter the keys by the AWS services - S3, RDS, EBS, DynamoDB, EKS, Redshift, and EFS.

6.2 Keys List View

The keys list view displays all keys in a table, along with details such as key ID, state, violations, region, owners, usage description, AWS account ID, key creation date, last rotation date, next rotation date, auto-rotation status, key specification, and key source.

NOTE

You can view up to six columns on the Keys list view. For more details on how to configure the columns display, refer to the Section 6.2.3: Customize Keys List Columns Display.

Figure 24: AWS Keys List View

Click in the VIOLATIONS column to view detailed information about the associated vulnerabilities.

6.2.1 Filter Keys - List View

In the list view, you can filter the keys using the Search with the following criteria and available values:

  • AWS Account ID

  • Compliance: Compliant keys, Non-compliant keys

  • Expiration: Less than 30 days, More than 30 days

  • Key Identifier

  • Key Source: KMS, Cloud HSM, BYOK, XKS, Fortanix

  • Key Spec

  • Key State

  • Key Usage Status: Used for Encryption, Unused

  • Encryption: Encrypted, Unencrypted

  • Region

  • Vulnerability: Quantum-vulnerable, Quantum-safe, Shared keys, Overly permissive usage, Overly permissive management

  • Owner

  • Usage Description

    NOTE

    Please wait up to 15 minutes after adding or updating the ownership information before filtering the keys by Owner or Usage Description.

  • Violations: All violations, No violations

You can use a combination of the above filter options to display the keys with specific results.

Figure 25: Key Filter in the List View

6.2.2 Export Keys Data

For more details, refer to Section 8.0: Scanned Data Export.

6.2.3 Customize Keys List Columns Display

To modify the Keys table column display in the list view:

  1. Click Columns Filter Icon.png.

  2. On the Customize Columns dialog box, select a maximum of Six columns that you want to display in the table.

  3. Click APPLY to view only those columns on the table.

  4. Click RESET TO DEFAULT to display the default columns if needed.

Figure 26: Customize Keys Table

6.2.4 Add Key Details

After an AWS connection is onboarded to Fortanix Key Insight, you can assign owners to the scanned keys to enhance key management, simplify tracking, and improve remediation workflows.

To add the key(s) details,

  1. Select key(s) in the list.

  2. Click ADD DETAILS on the top right corner.

    NOTE

    If your AWS connection was last scanned before the KI 25.03 release and a new scan was not performed, clicking the ADD DETAILS option will show a Rescan Required to Add Details dialog box. To ensure your key details are correctly added, you must rescan the AWS connection and then add the key details.

    For more details on how to perform a rescan, refer to Section 5.0: Rescan an AWS Connection.

  3. On the Add Details dialog box, enter the following details:

    1. Primary owner: Enter the primary owner’s name or employee ID.

    2. Email ID: Enter the primary owner’s valid email ID.

    3. Click ADD SECONDARY OWNER to add the secondary owner’s details, if required.

    4. Description (Optional): Enter an optional description.

    5. Click ADD to add the ownership details to the selected key(s).

    NOTE

    To add ownership details, specifying a primary owner is mandatory before adding a secondary owner.

    On the Keys page, the primary and secondary owners’ name or employee ID and email address will appear in the OWNERS column, and the description will appear in the USAGE DESCRIPTION column.

Figure 27: Add Key Details

NOTE

Only users with Account Administrator permissions can add or edit key details.

6.2.5 Edit Key Details

You can modify the details of the selected key(s).

To edit the key(s) details,

  1. Select key(s) in the list.

  2. Click EDIT DETAILS on the top right corner.

  3. On the Edit Details dialog box,

    1. Update the primary owner’s name or employee ID and email ID.

    2. Update the secondary owner’s name or employee ID and email ID.

    3. Update the description if required.

    4. Click UPDATE to save the details to the selected key(s).

You can also update the details while viewing the key details. For more details, refer to the Section 6.2.6: View Key Details.

6.2.6 View Key Details

Click any key in the Keys list to view the key's properties, rotation history, associated violations, and service mappings.

  • The KEY DETAILS tab includes the following:

    • Key Properties: This section displays key specifications, such as Amazon Resource Name (ARN), key ID, status, creation date, expiration date, usage, AWS account ID, region, key type, key source, and so on.

    • Ownership: This section is available if owner details have been added to the key. It displays the primary and secondary owner's name or employee ID, email ID, and description.

    • Automatic Key Rotation Policy: This section includes key rotation details, such as the rotation status, next rotation date, and last rotation date.

Figure 28: Access Key Details View

NOTE

The Key Correlation section is only visible if you have configured an external key source (DSM SaaS) for the Fortanix Key Insight AWS cloud connection. For the selected correlated key, it displays details such as the key source, key source type, last correlated date, and source key ID. You can click Key Id to navigate to Fortanix DSM SaaS to view the key details.

You can filter these keys by Key Source is Fortanix to access the relevant details.

Figure 29: Access Keys Correlated Data

  • The VIOLATIONS tab displays any violations linked to the key. These violations may include issues such as shared keys, overly usage or management permissions, key expiration, and so on.

Figure 30: View Key Violations

  • The SERVICE MAPPING tab displays the mapping between the key and AWS service(s), if any. You can view the details of the key and its associated services through Legends.

Figure 31: Key and Service Mapping

7.0 Services

After onboarding the AWS organization, click the Services menu in the Fortanix Key Insight left navigation bar.

Clicking the Services menu will take you to the Services page, which shows a map of all the AWS services (S3 BUCKET, RDS INSTANCE, EBS, DynamoDB, EKS, Redshift, and EFS services) grouped by AWS accounts.

On the Services page, you can toggle between the GRAPH and LIST views using on the top left corner. The GRAPH view is set as the default.

7.1 Services Graph View

In the services graph view, the services are grouped into the following categories, and you can also view the total counts for services, violations, regions, and accounts within each category:

  • Service Type: Selecting this category allows you to view all services grouped by type and their corresponding risk levels. The color of each service indicates its associated risk level. This category is selected by default.

    Figure 32: Access Services Graph View

    Click any service to view the types of violations for that service and the count for each violation, sorted by severity, if applicable.    

    • Clicking a specific violation in the list will take you to the corresponding service list view, filtered accordingly.  

    Figure 33: Select and View AWS Service Details

  • Violation Type: Selecting this category allows you to view all services grouped by violation type, along with their corresponding risk levels.

    Figure 34: AWS Services by Violation Types

    Click any violation to view the types of services that share the violation and the count for each service type, if applicable.  

    • Clicking a specific service type in the list will take you to the corresponding service list view, which will be filtered accordingly.

    Figure 35: Select and View AWS Service Violations Details

  • Accounts and Regions: Selecting this category allows you to view all services grouped by different accounts and regions, along with their associated risk levels.

    Figure 36: AWS Services by Accounts and Regions

    Click any accounts and regions to view the types of services that share the same account and regions.

    • Click any service to view the types of violations and the count for each violation, sorted by severity, if applicable.

      • Clicking a specific service type in the list will take you to the corresponding service list view, filtered accordingly.

    Figure 37: View and Select Services by Accounts and Regions

7.1.1 Filter Services - Graph View

In the service graph view, you can filter the services by Account, Region, Vulnerability, and Service Type for each category explained in Section 7.1: Services Graph View.

For example, to filter services by Region,

  1. Select the category. For example, Service Type.

  2. Click the Region drop down menu to select the region. For example, us-east-1.

  3. Click APPLY.

Figure 38: Filter AWS Service by Regions

The Services page will display only the services for the selected region. Additionally, the count for the total number of services, violations, regions, and accounts shown in the top bar will be updated accordingly.

Figure 39: Services Filter Applied

You can further filter the services by selecting the following other filter options:

  • Service Type: Filter the services by the AWS services namely S3, RDS, EBS, DynamoDB, Redshift, EKS, and EFS.

  • Vulnerability: Filter the services by the vulnerability types – Unencrypted services, Using deleted keys, Using non-compliant keys, Using overly permissive usage keys, Using overly permissive management keys, Using shared keys, Using keys scheduled for deletion, Using quantum vulnerable keys, and Using expired keys.

  • Account: Filter the services by a selected account.

You can use a combination of the above filter options to display the service map with specific results.

Click RESET to clear all filters or select the All (Default) option from the dropdown in the desired filter to reset that specific filter.

7.2 Services List View

The services list view displays all services in a table, along with details such as name, type, encryption, violations, region, and AWS account ID.

Figure 40: AWS Services List View

  • Click ENCRYPTION column values to check whether the service was encrypted. Clicking the cell opens a dialog box that shows details such as the server-side encryption (SSE) algorithm, key state, origin, key manager, key specification, and key usage.

    Figure 41: AWS Services Encryption Details

  • Click in the VIOLATIONS column to view detailed information about the associated vulnerabilities.

7.2.1 Filter Services - List View

In the list view, you can filter the keys using the Search field with the following criteria and available values:

  • Type: S3, RDS, EBS, DynamoDB, Redshift, EKS, and EFS.

  • Name

  • AWS Account ID

  • Encryption: Encrypted, Unencrypted

  • Region

  • Key Violation

  • Violation Type: All violations, No Violations

You can use a combination of the above filter options to display the services with specific results.

Figure 42: Services Filter in the List View

7.2.2 Export Services Data

For more details, refer to Section 8.0: Scanned Data Export.

7.2.3 Service Details

You can click any AWS service in the Services list to view its configuration details and associated violations.

  • The SERVICE DETAILS tab includes the following:

    • Service Configurations: This section displays service configurations such as service ID, type, encryption status, account region, account ID, and so on.

    • Key Data: This section provides details of the associated key, including the key ARN, ID, and origin for the encrypted service. If the service is not encrypted, if the encrypted service has a deleted key, or if the cryptographic key details are inaccessible, the appropriate messages will appear.

Figure 43: Access Services Details View

NOTE

The Key Correlation section is visible only when the selected service is encrypted and associated with a correlated key from an external key source connection. It displays details such as the key source, key source type, last correlated date, linked key ID, and source key ID.

You can click Key Id and Linked Key Id to navigate to Fortanix DSM (SaaS) to view the corresponding keys details.

Figure 44: Key Correlation in Service Details

  • The VIOLATIONS tab displays any violations linked to the service. These violations may include issues such as shared keys, overly usage or management permissions, key expiration, and so on.

Figure 45: View Service Violations

8.0 Scanned Data Export

This feature allows you to export the AWS scanned key and service-related data from Fortanix Key Insight in Comma-Separated Values (CSV) format. Also, it provides flexibility, enabling you to download data for detailed analysis, audits, or reporting, and to access real-time status.

In the AWS Keys and Services list view, you can click EXPORT to export the scanned data using any of the available options:

Figure 46: Access Data Export Feature

  • Export current page: Use this option to export all column data from the current page in CSV format.

NOTE

You can download a maximum of 100 items at a time, based on the settings specified in the Items per page drop down menu.

  • Export all raw data: Use this option to export all scanned data shown in the keys and services tables in CSV format. If you select this option, you can read the details on the Export All Raw Data dialog box and click PROCEED to export all the data.

    After the export process begins, you can track its progress. The export status will be logged with a message under the Activities tab in Fortanix Key Insight. For more details, refer to Section 8.1: Manage Export Activities.

  • Export selected rows: This option is disabled by default. You can select the required rows on the current page and then use this option to export them in CSV format.

NOTE

  • Users with the Account Administrator and Group Administrator roles can only perform the scanned data export.

  • Within the same account, you can have multiple exports running simultaneously from different cloud, on-premises, and external key source connections.

8.1 Manage Export Activities

After you initiate the export process using Export all raw data, you can monitor the export status on the Activities tab.

You can see the following details for each export:

  • Name of the activity. For example, the activity would be named Export_all_keys if you had exported all the AWS keys.

  • Name of the file. For example, Keys.csv.

  • Activity status: This indicates the current state of the data export. This can be,

    • Completed: The data export has been successful, and the CSV file will automatically download to the location specified on your local machine.

    • In Progress: The data export is in progress, and you can cancel it using if required.

    • Cancelled: The data export has been canceled due to switching accounts or manually canceling it while it was in progress.

    • Failed: The data export was not completed and failed due to errors.

  • Name of the connection

  • Export creation date and time

Figure 47: Access Export Activities

NOTE

  • If you switch to a different account during export, the export will be cancelled and logged in the Activities tab.

  • If you navigate to a different solution (for example, Identity and Access Management), the export will continue, but no logs will appear in the Activities tab. The export status will be confirmed using toast a message.

  • If you refresh the web page during the export, the confirmation dialog box will appear. If you refresh, the export will be cancelled, and all entries in the Activities tab will be removed. Therefore, it is recommended not to refresh the page during the export.