Skip to main content

πŸ›‘οΈ AWS Secrets Manager Secret has not been rotated within the last 90 days🟒

  • Contextual name: πŸ›‘οΈ Secret has not been rotated within the last 90 days🟒
  • ID: /ce/ca/aws/secrets-manager/secret-rotated-within-90-days
  • Tags:
  • Policy Type: COMPLIANCE_POLICY
  • Policy Categories: SECURITY

Logic​

Similar Policies​

Description​

Open File

Description​

This policy identifies AWS Secrets Manager secrets whose current secret value has not been rotated within the last 90 days.

Rationale​

Secrets stored in AWS Secrets Manager often protect database credentials, API keys, tokens, and other sensitive values. If a secret remains unchanged for long periods, any compromised credential can stay valid long enough to be reused by an attacker.

Regular rotation reduces this exposure window and supports stronger credential lifecycle management.

Impact​

Rotating a secret can interrupt dependent applications, functions, or services if they are not prepared to consume the new value. Validate the rotation workflow and downstream integrations before rotating a production secret or enabling automatic rotation.

Audit​

This policy excludes secrets that have automatic rotation enabled. For the remaining secrets, it evaluates the AWSCURRENT secret version when version records are available. It flags an AWS Secrets Manager Secret as INCOMPLIANT when either of the following conditions is met:

... see more

Remediation​

Open File

Remediation​

Rotate the Secret​

From Command Line​
  1. Rotate the secret by updating its value:

    aws secretsmanager update-secret \
    --secret-id {{secret-id}} \
    --secret-string file://{{secret-value.json}}
  2. Validate that dependent applications and services can retrieve and use the updated secret value.

  3. Confirm that the AWSCURRENT version reflects the new value:

    aws secretsmanager list-secret-version-ids \
    --secret-id {{secret-id}}

Enable Automatic Rotation​

From Command Line​
  1. Confirm that the secret type supports automatic rotation and that a rotation Lambda function exists or can be deployed.

  2. Enable automatic rotation:

    aws secretsmanager rotate-secret \
    --secret-id {{secret-id}} \
    --rotation-lambda-arn {{rotation-lambda-arn}} \
    --rotation-rules AutomaticallyAfterDays=90
  3. Validate the rotation configuration and confirm that dependent applications can use values produced by the rotation workflow.

... see more

policy.yaml​

Open File

Linked Framework Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [SecretsManager.4] Secrets Manager secrets should be rotated within a specified number of days1no data
πŸ’Ό Cloudaware Framework β†’ πŸ’Ό Expiration Management21no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό AC-2(1) Automated System Account Management (M)(H)32no data
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό AC-2(1) Automated System Account Management (M)(H)32no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό AC-2(1) Account Management _ Automated System Account Management432no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό AC-3(15) Access Enforcement _ Discretionary and Mandatory Access Control27no data
πŸ’Ό PCI DSS v3.2.1 β†’ πŸ’Ό 8.2.4 Change user passwords/passphrases at least once every 90 days.4no data
πŸ’Ό PCI DSS v4.0.1 β†’ πŸ’Ό 8.3.9 If passwords/passphrases are used as the only authentication factor for user access then either passwords/passphrases are changed at least once every 90 days, or the security posture of accounts is dynamically analyzed.4no data
πŸ’Ό PCI DSS v4.0.1 β†’ πŸ’Ό 8.3.10 If passwords/passphrases are used as the only authentication factor for customer user access to cardholder data, then guidance is provided to customer users.15no data
πŸ’Ό PCI DSS v4.0.1 β†’ πŸ’Ό 8.6.3 Passwords/passphrases for any application and system accounts are protected against misuse.3no data
πŸ’Ό PCI DSS v4.0 β†’ πŸ’Ό 8.3.9 If passwords/passphrases are used as the only authentication factor for user access then either passwords/passphrases are changed at least once every 90 days, or the security posture of accounts is dynamically analyzed.4no data
πŸ’Ό PCI DSS v4.0 β†’ πŸ’Ό 8.3.10 If passwords/passphrases are used as the only authentication factor for customer user access to cardholder data, then guidance is provided to customer users.115no data
πŸ’Ό PCI DSS v4.0 β†’ πŸ’Ό 8.6.3 Passwords/passphrases for any application and system accounts are protected against misuse.3no data