Secrets Manager secret encrypted with AWS-managed key
Ce produit n'est pas pris en charge par le
site Datadog que vous avez sélectionné. (
).
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel,
n'hésitez pas à nous contacter.
Id: b0d3ef3f-845d-4b1b-83d6-63a5a380375f
Cloud Provider: AWS
Platform: Terraform
Severity: Medium
Category: Encryption
Learn More
Description
AWS Secrets Manager secrets should be encrypted with customer-managed KMS keys rather than the default AWS-managed keys. Relying on AWS managed keys limits an organization’s ability to control, rotate, and audit encryption keys, which are important factors in enforcing robust security policies and compliance requirements. Without customer-managed KMS keys, there may be a greater risk of unauthorized access or insufficient key lifecycle management. If left unaddressed, sensitive information stored in Secrets Manager could be compromised due to weaker or less transparent key management practices.
Compliant Code Examples
resource "aws_secretsmanager_secret" "test222" {
name = "test-cloudrail-1"
kms_key_id = "alias/MyAlias"
}
Non-Compliant Code Examples
provider "aws" {
region = "us-east-1"
}
data "aws_kms_key" "by_alias" {
key_id = "alias/aws/secretsmanager"
}
resource "aws_secretsmanager_secret" "test" {
name = "test-cloudrail-1"
kms_key_id = data.aws_kms_key.by_alias.arn
}
resource "aws_secretsmanager_secret" "test2" {
name = "test-cloudrail-1"
kms_key_id = "alias/aws/secretsmanager"
}