turbot/aws_compliance

Control: Secrets Manager secrets that have not been used in 90 days should be removed

Description

Ensure that AWS Secrets Manager secrets have been accessed within a specified number of days. The rule is non-compliant if a secret has not been accessed in 'unusedForDays' number of days. The default value is 90 days.

Usage

Run the control in your terminal:

powerpipe control run aws_compliance.control.secretsmanager_secret_unused_90_day

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run aws_compliance.control.secretsmanager_secret_unused_90_day --share

SQL

This control uses a named query:

secretsmanager_secret_unused_90_day

Tags