Rotating cluster secrets in AWS PCS - AWS PCS

Rotating cluster secrets in AWS PCS

Use AWS Secrets Manager Managed Rotation to rotate cluster secrets in AWS PCS. Regular secret rotation is a security best practice for maintaining strong security posture in HPC environments. This capability enables you to meet industry compliance standards including HIPAA and FedRAMP, which mandate regular credential rotation.

The cluster secret serves dual purposes: authenticating compute nodes joining the cluster and as the JWT key for Slurm REST API authentication. When rotated, both aspects are affected simultaneously.

How cluster secret rotation works

Prepare manually to maintain cluster stability during secret rotation:

  1. Preparation – Scale all compute node groups to 0 capacity and ensure no jobs are running

  2. Rotation – Initiate rotation through Secrets Manager console or API

  3. Monitoring – Track progress through CloudTrail events

  4. Recovery – Scale compute node groups back to desired capacity

During rotation, your cluster remains in ACTIVE state and billing continues normally. The process typically takes a few minutes.

Requirements and limitations

Before rotating cluster secrets, complete these requirements:

  • Cluster must be in ACTIVE or UPDATE_FAILED state

  • IAM role must have secretsmanager:RotateSecret permission

  • All compute node groups must be scaled to 0 capacity

  • Stop all jobs before rotation

Limitations:

  • Manual preparation required for each rotation

  • Existing JWT tokens become invalid and require reissuance

  • BYO login nodes require manual secret update after rotation