π‘οΈ AWS Secrets Manager Secret has not been rotated within the last 90 daysπ’
- Contextual name: π‘οΈ Secret has not been rotated within the last 90 daysπ’
- ID:
/ce/ca/aws/secrets-manager/secret-rotated-within-90-days - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
Similar Policiesβ
- AWS Security Hub: [SecretsManager.4] Secrets Manager secrets should be rotated within a specified number of days
Descriptionβ
Descriptionβ
This policy identifies AWS Secrets Manager secrets whose current secret value has not been rotated within the last 90 days.
Rationaleβ
Secrets stored in AWS Secrets Manager often protect database credentials, API keys, tokens, and other sensitive values. If a secret remains unchanged for long periods, any compromised credential can stay valid long enough to be reused by an attacker.
Regular rotation reduces this exposure window and supports stronger credential lifecycle management.
Impactβ
Rotating a secret can interrupt dependent applications, functions, or services if they are not prepared to consume the new value. Validate the rotation workflow and downstream integrations before rotating a production secret or enabling automatic rotation.
Auditβ
This policy excludes secrets that have automatic rotation enabled. For the remaining secrets, it evaluates the
AWSCURRENTsecret version when version records are available. It flags an AWS Secrets Manager Secret asINCOMPLIANTwhen either of the following conditions is met:... see more
Remediationβ
Remediationβ
Rotate the Secretβ
From Command Lineβ
Rotate the secret by updating its value:
aws secretsmanager update-secret \
--secret-id {{secret-id}} \
--secret-string file://{{secret-value.json}}Validate that dependent applications and services can retrieve and use the updated secret value.
Confirm that the
AWSCURRENTversion reflects the new value:aws secretsmanager list-secret-version-ids \
--secret-id {{secret-id}}Enable Automatic Rotationβ
From Command Lineβ
Confirm that the secret type supports automatic rotation and that a rotation Lambda function exists or can be deployed.
Enable automatic rotation:
aws secretsmanager rotate-secret \
--secret-id {{secret-id}} \
--rotation-lambda-arn {{rotation-lambda-arn}} \
--rotation-rules AutomaticallyAfterDays=90Validate the rotation configuration and confirm that dependent applications can use values produced by the rotation workflow.
... see more