What You Need
- AWS Access Key ID
- AWS Secret Access Key
- Optional: default region (e.g.,
us-east-1)
Create Credentials
Open the IAM console
Log into AWS Console → IAM → Users.
Create a dedicated user
Click Create user. Name it something like
monk-deploy. Do not grant console access — Monk only needs programmatic access.Attach the Monk policy
On the permissions step, choose Attach policies directly and create a custom policy with the JSON below. Name it
MonkClusterPolicy.Create an access key
After the user is created, go to the user → Security credentials tab → Create access key. Choose “Third-party service” as the use case. Copy the Access Key ID and Secret Access Key.
Required Permissions
You can use the broad managed policies for a quick start:AmazonEC2FullAccessAmazonVPCFullAccessIAMReadOnlyAccess
GetCallerIdentity. iam:PassRole for the DLM service role.
Minimum IAM policy JSON
Minimum IAM policy JSON
CLI setup (alternative to console)
CLI setup (alternative to console)
How Credentials Are Stored
Credentials are encrypted at rest in your IDE’s secret storage and on your Monk cluster using your cloud provider’s KMS — so your infrastructure can manage itself autonomously. They are never sent to Monk servers and never exposed to the LLM. See Security for full details.Troubleshooting
Access keys disabled — check the user in the IAM console and confirm the key is active. Missing permissions — if Monk reports permission errors, compare the attached policy against the minimum policy above. Region mismatch — if you specified a default region, make sure it matches an available AWS region. Ask your agent for help:Deploy your first app
Credentials ready — now deploy

