Secrets Manager Secret

An AWS Secrets Manager Secret is a secure resource used to store, manage, and retrieve sensitive information such as database credentials, API keys, and other secrets. It helps eliminate the need to hardcode secrets in applications by providing controlled access through AWS Identity and Access Management (IAM). Secrets can be automatically rotated, encrypted at rest, and accessed programmatically, ensuring better security and compliance.

aws.secretsmanager_secret

Fields

TitleIDTypeData TypeDescription
_keycorestring
account_idcorestring
arncorestringThe ARN of the secret.
created_datecoretimestampThe date the secret was created.
deleted_datecoretimestampThe date the secret is scheduled for deletion. If it is not scheduled for deletion, this field is omitted. When you delete a secret, Secrets Manager requires a recovery window of at least 7 days before deleting the secret. Some time after the deleted date, Secrets Manager deletes the secret, including all of its versions. If a secret is scheduled for deletion, then its details, including the encrypted secret value, is not accessible. To cancel a scheduled deletion and restore access to the secret, use RestoreSecret.
descriptioncorestringThe description of the secret.
kms_key_idcorestringThe key ID or alias ARN of the KMS key that Secrets Manager uses to encrypt the secret value. If the secret is encrypted with the Amazon Web Services managed key aws/secretsmanager, this field is omitted. Secrets created using the console use an KMS key ID.
last_accessed_datecoretimestampThe date that the secret was last accessed in the Region. This field is omitted if the secret has never been retrieved in the Region.
last_changed_datecoretimestampThe last date and time that this secret was modified in any way.
last_rotated_datecoretimestampThe last date and time that Secrets Manager rotated the secret. If the secret isn't configured for rotation or rotation has been disabled, Secrets Manager returns null.
namecorestringThe name of the secret.
next_rotation_datecoretimestampThe next rotation is scheduled to occur on or before this date. If the secret isn't configured for rotation or rotation has been disabled, Secrets Manager returns null. If rotation fails, Secrets Manager retries the entire rotation process multiple times. If rotation is unsuccessful, this date may be in the past. This date represents the latest date that rotation will occur, but it is not an approximate rotation date. In some cases, for example if you turn off automatic rotation and then turn it back on, the next rotation may occur much sooner than this date.
owning_servicecorestringThe ID of the service that created this secret. For more information, see Secrets managed by other Amazon Web Services services.
policiescorejson
primary_regioncorestringThe Region the secret is in. If a secret is replicated to other Regions, the replicas are listed in ReplicationStatus.
replication_statuscorejsonA list of the replicas of this secret and their status: Failed, which indicates that the replica was not created. InProgress, which indicates that Secrets Manager is in the process of creating the replica. InSync, which indicates that the replica was created.
resource_policycorestringA JSON-formatted string that contains the permissions policy attached to the secret. For more information about permissions policies, see Authentication and access control for Secrets Manager.
rotation_enabledcoreboolSpecifies whether automatic rotation is turned on for this secret. If the secret has never been configured for rotation, Secrets Manager returns null. To turn on rotation, use RotateSecret. To turn off rotation, use CancelRotateSecret.
rotation_lambda_arncorestringThe ARN of the Lambda function that Secrets Manager invokes to rotate the secret.
rotation_rulescorejsonThe rotation schedule and Lambda function for this secret. If the secret previously had rotation turned on, but it is now turned off, this field shows the previous rotation schedule and rotation function. If the secret never had rotation turned on, this field is omitted.
tagscorehstore
version_ids_to_stagescorestringA list of the versions of the secret that have staging labels attached. Versions that don't have staging labels are considered deprecated and Secrets Manager can delete them. Secrets Manager uses staging labels to indicate the status of a secret version during rotation. The three staging labels for rotation are: AWSCURRENT, which indicates the current version of the secret. AWSPENDING, which indicates the version of the secret that contains new secret information that will become the next current version when rotation finishes. During rotation, Secrets Manager creates an AWSPENDING version ID before creating the new secret version. To check if a secret version exists, call GetSecretValue. AWSPREVIOUS, which indicates the previous current version of the secret. You can use this as the last known good version. For more information about rotation and staging labels, see How rotation works.