Monitor Amazon Secrets Manager secrets for compliance by using Amazon Config
You can use Amazon Config to evaluate your secrets to see if they are in compliance with your standards. You define your internal security and compliance requirements for secrets using Amazon Config rules. Then Amazon Config can identify secrets that don't conform to your rules. You can also track changes to secret metadata, rotation configuration, the KMS key used for secret encryption, the Lambda rotation function, and tags associated with a secret.
You can configure Amazon Config to notify you of changes. For more information, see Notifications that Amazon Config sends to an Amazon SNS topic.
If you have secrets in multiple Amazon Web Services accounts and Amazon Web Services Regions in your organization, you can aggregate that configuration and compliance data. For more information, see Multi-account Multi-Region data aggregation.
To assess whether secrets are in compliance
-
Follow the instructions on Evaluating your resources with Amazon Config rules, and choose one of the following rules:
-
secretsmanager-secret-unused
— Checks whether secrets were accessed within the specified number of days. -
secretsmanager-using-cmk
— Checks whether secrets are encrypted using the Amazon managed keyaws/secretsmanager
or a customer managed key you created in Amazon KMS. -
secretsmanager-rotation-enabled-check
— Checks whether rotation is configured for secrets stored in Secrets Manager. -
secretsmanager-scheduled-rotation-success-check
— Checks whether the last successful rotation is within the configured rotation frequency. The minimum frequency for the check is daily. -
secretsmanager-secret-periodic-rotation
— Checks whether secrets were rotated within the specified number of days.
-