Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

Rule: Secrets Manager Secrets Rotation Schedule

Ensure Secrets Manager secrets are rotated based on the scheduled frequency to maintain security standards.

RuleSecrets Manager secrets should be rotated as per the rotation schedule
FrameworkNIST 800-53 Revision 5
Severity
Medium

Rule Description:

According to the NIST 800-53 Revision 5 standard, it is mandatory to set up a rotation schedule for Secrets Manager secrets. This rule ensures that secrets, such as passwords, API keys, or database credentials, are regularly updated or rotated to enhance the security posture of the system. By rotating secrets, the risk of unauthorized access or misuse of sensitive information is minimized, ensuring compliance with security best practices.

Policy Details:

  1. 1.
    Determine the frequency of secret rotation based on the sensitivity of the information and the risk assessment of the system.
  2. 2.
    Implement a schedule for secret rotation, ensuring that administrative, service, and application passwords are included.
  3. 3.
    Adopt a secure mechanism to generate new secrets, such as using random password generators or cryptographic methods, ensuring complexity and uniqueness.
  4. 4.
    Store and manage the secrets securely in the Secrets Manager service, ensuring appropriate access controls and encryption mechanisms.
  5. 5.
    Update all dependent systems and applications with the new secrets after each rotation.
  6. 6.
    Regularly audit and monitor secret rotation activities to ensure compliance and identify any potential issues or non-compliance.

Troubleshooting Steps (if applicable):

If there are any issues or errors encountered during secret rotation, you can follow these troubleshooting steps:

  1. 1.
    Check the rotation schedule settings in the Secrets Manager service to ensure it is correctly configured.
  2. 2.
    Verify that the rotation process has the necessary permissions to access and modify the secrets.
  3. 3.
    Review any error messages or logs generated during the rotation process to identify the specific problem.
  4. 4.
    Ensure that the new secrets generated meet the complexity requirements and are compatible with the systems or applications that rely on them.
  5. 5.
    Validate that the dependent systems or applications have been updated with the new secrets after rotation.
  6. 6.
    If the issue persists, consult the Secrets Manager documentation or contact the technical support for further assistance.

Necessary Codes (if applicable):

There are no specific codes associated with this rule. However, if you are using AWS Secrets Manager, you can utilize the AWS Command Line Interface (CLI) to manage secret rotation. Below are some useful AWS CLI commands for Secrets Manager:

  1. 1.
    To create a new secret:
aws secretsmanager create-secret --name my-secret --secret-string "password123" --tags Key=Environment,Value=Production
  1. 1.
    To update a secret with a new value:
aws secretsmanager update-secret --secret-id my-secret --secret-string "newpassword456" --tags Key=Environment,Value=Staging
  1. 1.
    To rotate a secret manually:
aws secretsmanager rotate-secret --secret-id my-secret

Note: Ensure that you have the necessary permissions and AWS CLI configured correctly before executing these commands.

Remediation Steps:

To remediate any non-compliance with the rotating schedule for Secrets Manager secrets as per NIST 800-53 Revision 5, follow these steps:

  1. 1.
    Assess the current secret rotation process and determine the appropriate frequency for rotating secrets based on organizational policies and risk assessments.
  2. 2.
    Configure or update the rotation schedule in the Secrets Manager service to align with the determined frequency.
  3. 3.
    Implement mechanisms or tools to generate strong and unique secrets automatically during each rotation.
  4. 4.
    Validate that all administrative, service, and application passwords are included in the rotation schedule.
  5. 5.
    Ensure that access controls and encryption mechanisms are properly configured to protect the stored secrets.
  6. 6.
    Update all systems and applications that rely on the secrets with the new values after each rotation.
  7. 7.
    Regularly monitor and audit the secret rotation activities to detect any deviations or non-compliant actions.
  8. 8.
    If any issues arise during the rotation process, refer to the troubleshooting steps provided above to diagnose and resolve them.

By following these steps, you will effectively comply with the NIST 800-53 Revision 5 requirement for rotating Secrets Manager secrets on a scheduled basis, enhancing the security posture of your systems and data.

Is your System Free of Underlying Vulnerabilities?
Find Out Now