Control: Secrets Manager secrets should have automatic rotation enabled
Description
This rule ensures AWS Secrets Manager secrets have rotation enabled. Rotating secrets on a regular schedule can shorten the period a secret is active, and potentially reduce the business impact if the secret is compromised.
Usage
Run the control in your terminal:
powerpipe control run terraform_aws_compliance.control.secretsmanager_secret_automatic_rotation_enabled
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run terraform_aws_compliance.control.secretsmanager_secret_automatic_rotation_enabled --share
SQL
This control uses a named query:
select address as resource, case when (attributes_std -> 'rotation_rules') is null then 'alarm' else 'ok' end as status, split_part(address, '.', 2) || case when (attributes_std -> 'rotation_rules') is null then ' automatic rotation disabled' else ' automatic rotation enabled' end || '.' as reason , path || ':' || start_linefrom terraform_resourcewhere type = 'aws_secretsmanager_secret';