Remediation
Rotate the Secretβ
From Command Lineβ
-
Rotate the secret by updating its value:
aws secretsmanager update-secret \
--secret-id {{secret-id}} \
--secret-string file://{{secret-value.json}} -
Validate that dependent applications and services can retrieve and use the updated secret value.
-
Confirm that the
AWSCURRENTversion reflects the new value:aws secretsmanager list-secret-version-ids \
--secret-id {{secret-id}}
Enable Automatic Rotationβ
From Command Lineβ
-
Confirm that the secret type supports automatic rotation and that a rotation Lambda function exists or can be deployed.
-
Enable automatic rotation:
aws secretsmanager rotate-secret \
--secret-id {{secret-id}} \
--rotation-lambda-arn {{rotation-lambda-arn}} \
--rotation-rules AutomaticallyAfterDays=90 -
Validate the rotation configuration and confirm that dependent applications can use values produced by the rotation workflow.
For more detailed setup steps, see the remediation for AWS Secrets Manager Secret Automatic Rotation is not enabled.
Notesβ
This policy excludes secrets with automatic rotation enabled. For secrets that remain manually rotated, document the procedure and schedule recurring rotations so the AWSCURRENT version does not exceed the 90-day threshold again.