Policy: AWS > Secrets Manager > Secret > Policy > Trusted Access
Take an action when AWS Secrets Manager secret policy is not trusted based on the AWS > Secrets Manager > Secret > Policy > Trusted Access > *
policies.
The Trusted Access control evaluates the secret policy against the list of allowed members in each of the Trusted Access sub-policies (Trusted Access > Accounts, Trusted Access > Services etc.), this control raises an alarm and takes the defined enforcement action.
The account that owns the secret will always be trusted, even if its account ID is not included in the Trusted Accounts policy.
If set to Enforce: Revoke untrusted access
, access to non-trusted members will be removed.
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Related Policies
Controls
Policy Specification
Schema Type |
|
---|---|
Default |
|
Valid Values [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/turbot#/control/categories/securityTrustedAccess
- tmod:@turbot/aws-secretsmanager#/policy/types/secretPolicyTrustedAccess
- turbot graphql policy-type --id "tmod:@turbot/aws-secretsmanager#/policy/types/secretPolicyTrustedAccess"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/aws-secretsmanager#/policy/types/secretPolicyTrustedAccess"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI