Skip to main content

aws_secretsmanager_secret Resource

Use the aws_secretsmanager_secret InSpec audit resource to test properties of a single AWS Secret Manager secret.

The AWS::SecretsManager::Secret resource creates a secret and stores it in Secrets Manager.

For additional information, including details on parameters and properties, see the AWS documentation on AWS Secret Manager Secret.

Installation

This resource is available in the Chef InSpec AWS resource pack.

See the Chef InSpec documentation on cloud platforms for information on configuring your AWS environment for InSpec and creating an InSpec profile that uses the InSpec AWS resource pack.

Syntax

Ensure that a secret ID exists.

describe aws_secretsmanager_secret(secret_id: 'SECRET_ID') do
  it { should exist }
end

Parameters

secret_id (required)

Properties

arn
The Amazon Resource Name (ARN) of the secret.
name
The friendly name of the secret.
description
The user-provided description of the secret.
kms_key_id
The ARN or alias of the AWS KMS customer master key (CMK) used to encrypt the SecretString and SecretBinary fields in each version of the secret.
rotation_enabled
Indicates whether automatic, scheduled rotation is enabled for this secret.
rotation_lambda_arn
The ARN of an AWS Lambda function invoked by Secrets Manager to rotate and expire the secret either automatically per the schedule or manually by a call to RotateSecret.
rotation_rules (automatically_after_days)
Specifies the number of days between automatic scheduled rotations of the secret.
last_rotated_date
The most recent date and time that the Secrets Manager rotation process was successfully completed. This value is null if the secret hasn’t ever rotated.
last_changed_date
The last date and time that this secret was modified in any way.
last_accessed_date
The last date that this secret was accessed. This value is truncated to midnight of the date and therefore shows only the date, not the time.
deleted_date
The date and time the deletion of the secret occurred. Not present on active secrets. The secret can be recovered until the number of days in the recovery window has passed, as specified in the RecoveryWindowInDays parameter of the DeleteSecret operation.
tags
The list of user-defined tags associated with the secret.
secret_versions_to_stages
A list of all of the currently assigned SecretVersionStage staging labels and the SecretVersionId attached to each one. Staging labels are used to keep track of the different versions during the rotation process.
owning_service
Returns the name of the service that created the secret.
created_date
The date and time when a secret was created.
primary_region
The region where Secrets Manager originated the secret.

Examples

Ensure the ARN is available.

describe aws_secretsmanager_secret(secret_id: 'SECRET_ID') do
  its('arn') { should eq 'arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3' }
end

Ensure the name is available.

describe aws_secretsmanager_secret(secret_id: 'SECRET_ID') do
    its('name') { should eq 'MyTestDatabaseSecret' }
end

Matchers

This InSpec audit resource has the following special matchers. For a full list of available matchers, please visit our Universal Matchers page.

The controls will pass if the describe method returns at least one result.

exist

Use should to test that the entity exists.

describe aws_secretsmanager_secret(secret_id: 'SECRET_ID') do
  it { should exist }
end

Use should_not to test the entity does not exist.

describe aws_secretsmanager_secret(secret_id: 'SECRET_ID') do
  it { should_not exist }
end

be_available

Use should to check if the secret ID is available.

describe aws_secretsmanager_secret(secret_id: 'SECRET_ID') do
  it { should be_available }
end

AWS Permissions

Your Principal will need the SecretsManager:Client:DescribeSecretResponse action with Effect set to Allow.

Edit this page on GitHub

Thank you for your feedback!

×









Search Results