secretsmanager-using-cmk
Checks if all secrets in AWS Secrets Manager are encrypted using the AWS managed key (aws/secretsmanager
)
or a customer managed key that was created in AWS Key Management Service (AWS KMS). The rule is COMPLIANT if a secret is encrypted using a customer managed key.
This rule is NON_COMPLIANT if a secret is encrypted using aws/secretsmanager
.
Note
This rule does not have access to cross-account customer managed keys and evaluates secrets as NON_COMPLIANT when a cross-account key is used.
Identifier: SECRETSMANAGER_USING_CMK
Resource Types: AWS::SecretsManager::Secret
Trigger type: Configuration changes
AWS Region: All supported AWS regions
Parameters:
- kmsKeyArns (Optional)
- Type: CSV
-
Comma-separated list of KMS key Amazon Resource Names (ARNs) to check if the keys are used in the encryption.
AWS CloudFormation template
To create AWS Config managed rules with AWS CloudFormation templates, see Creating AWS Config Managed Rules With AWS CloudFormation Templates.