Cloud Defense Logo

Products

Solutions

Company

Rule: Secrets Manager Secrets Rotation Schedule

Ensure Secrets Manager secrets are rotated according to the schedule to enhance security.

RuleSecrets Manager secrets should be rotated as per the rotation schedule
FrameworkNIST 800-53 Revision 5
Severity
Critical

Rule/Policy: Secrets Manager Secrets Rotation as per NIST 800-53 Rev. 5

Rule Description:

According to the NIST 800-53 Revision 5 guidelines, it is recommended to rotate secrets stored in AWS Secrets Manager on a regular basis. This ensures that access credentials, database passwords, API keys, and other sensitive information are periodically changed, reducing the risk of unauthorized access or misuse of these secrets.

Troubleshooting Steps (if applicable):

  1. 1.
    Identify the Secrets Manager secret that needs to be rotated.
  2. 2.
    Check if the rotation schedule has been defined for the specific secret.
  3. 3.
    Ensure that the secret's rotation configuration is correctly set up in AWS Secrets Manager.
  4. 4.
    Check for any error messages or rotation failures in the Secret Rotation tab of the Secrets Manager console or through AWS CLI/API calls.
  5. 5.
    Confirm if the necessary permissions and role assignments have been given to allow rotation of the secret.
  6. 6.
    Review the prior rotation and any relevant logs to identify the root cause of any rotation issues.

Necessary Codes (if applicable):

There are no specific codes required for this rule. However, implementation of rotation schedules and configuration of Secrets Manager secrets appropriately are necessary.

Step-by-Step Guide for Remediation:

  1. 1.

    Identify the Secrets Manager secret that needs to be rotated.

  2. 2.

    Review the NIST 800-53 Revision 5 guidelines to understand the frequency and requirements for secret rotation.

  3. 3.

    Calculate the rotation schedule based on the guidelines. For example, if the recommendation is to rotate secrets every 90 days, set up your rotation frequency accordingly.

  4. 4.

    Ensure you have the necessary permissions and access to manage Secrets Manager secrets.

  5. 5.

    Open the AWS Management Console and navigate to the Secrets Manager service.

  6. 6.

    Search or locate the specific secret that requires rotation.

  7. 7.

    Select the secret, and in the configuration options, click on "Rotate Secret."

  8. 8.

    Follow the prompts and provide the updated secret information or generate a new secret value.

  9. 9.

    Review and confirm the rotation settings, which may include rotation Lambda functions or custom scripts.

  10. 10.

    Save the changes and verify the successful rotation of the secret.

  11. 11.

    Monitor the rotation process for any errors or failures.

  12. 12.

    Repeat these steps for other secrets as required by the NIST 800-53 Revision 5 guidelines.

Note: It is recommended to automate the secret rotation process using AWS Lambda functions or other scripting options to ensure seamless and timely rotation of secrets.

Conclusion:

Following the NIST 800-53 Revision 5 recommendation to rotate Secrets Manager secrets helps ensure the security and integrity of sensitive information. By regularly changing secrets, you can mitigate the risks associated with unauthorized access or misuse of these critical resources. The step-by-step guide provided above assists in implementing and managing secret rotation in AWS Secrets Manager effectively.

Is your System Free of Underlying Vulnerabilities?
Find Out Now