Control: Secrets Manager secrets should have automatic rotation enabled
Description
This rule ensures AWS Secrets Manager secrets have rotation enabled. Rotating secrets on a regular schedule can shorten the period a secret is active, and potentially reduce the business impact if the secret is compromised.
Usage
Run the control in your terminal:
powerpipe control run terraform_aws_compliance.control.secretsmanager_secret_automatic_rotation_enabled
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run terraform_aws_compliance.control.secretsmanager_secret_automatic_rotation_enabled --share
SQL
This control uses a named query:
secretsmanager_secret_automatic_rotation_enabled