Skip to main content

Secrets Manager

Retrieves and monitors secrets information from AWS Secrets Manager.

Details

The AWS Secrets Manager input collects secrets metadata from AWS Secrets Manager. It retrieves secret ARNs, names, descriptions, and related secret information based on the configured filters.

Requirements

{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "SecretsManagerPermissions",
"Effect": "Allow",
"Action": [
"secretsmanager:ListSecrets",
"secretsmanager:DescribeSecret"
],
"Resource": "*"
}
]
}

Configuration

Settings

SettingTypeRequiredDefaultDescription
role_arnstringYes-The ARN of the role to assume to access the secrets manager
cronstringYes-Cron expression for scheduling the input
include_planned_deletionbooleanNo-Include secrets that are scheduled for deletion
regionarrayYes-Filter the secrets list by region (us-east-1, us-east-2, us-west-1, us-west-2, af-south-1, ap-east-1, ap-south-1, ap-northeast-1, ap-northeast-2, ap-northeast-3, ap-southeast-1, ap-southeast-2, ca-central-1, cn-north-1, cn-northwest-1, eu-central-1, eu-west-1, eu-west-2, eu-west-3, eu-north-1, eu-south-1, me-south-1, sa-east-1, us-gov-east-1, us-gov-west-1)
FiltersArrayNo[]Filter secrets based on various criteria (see Filters section below)

Filters

You can filter secrets using the following keys:

Filter KeyDescriptionExample Values
nameFilter by secret name (prefix match, case-sensitive)["prod/", "app/database/"]
descriptionFilter by description (prefix match, not case-sensitive)["database", "api key"]
tag-keyFilter by tag key (prefix match, case-sensitive)["Environment", "Team"]
tag-valueFilter by tag value (prefix match, case-sensitive)["production", "backend"]
primary-regionFilter by primary region (prefix match, case-sensitive)["us-west-2", "us-east-1"]
owning-serviceFilter by owning service (prefix match, case-sensitive)["rds", "lambda", "ecs"]
allSearch all attributes (not case-sensitive)["database", "production"]

Note: Prefix filter values with ! for negation (e.g., ["!test/", "!dev/"] to exclude test and dev secrets).

Filter Examples:

Production secrets only:

"filters": [
{
"key": "name",
"values": ["prod/"]
}
]

Secrets (Static Credentials Only)

SettingTypeRequiredDescription
Access KeystringConditionalAWS Access Key ID
Secret KeystringConditionalAWS Secret Access Key

⚠️ Authentication: Choose either Role ARN (recommended) or static credentials. See AWS Authentication Guide for setup instructions.

Sample Record

{
"ARN": "arn:aws:secretsmanager:ap-southeast-1:772057037646:secret:prod/api/keys-AbcDef",
"CreatedDate": "2025-08-11T23:46:57.642505Z",
"DeletedDate": "null",
"Description": "Redis connection credentials",
"KmsKeyId": "arn:aws:kms:us-east-1:123456789012:key/12345678-1234-1234-1234-123456789012",
"LastAccessedDate": "null",
"LastChangedDate": "2025-08-11T23:46:57.642568Z",
"LastRotatedDate": "{{timestampISO8601}}",
"Name": "my-app/database/password",
"NextRotationDate": "{{timestampISO8601}}",
"OwningService": "elasticache",
"PrimaryRegion": "null",
"RotationEnabled": "false",
"RotationLambdaARN": "null",
"RotationRules": {
"AutomaticallyAfterDays": "311",
"Duration": "1h",
"ScheduleExpression": "null"
},
"SecretVersionsToStages": {
"ed926b69-4b3c-44ef-8f56-385d94e7eed8": [
"AWSCURRENT"
]
},
"Tags": [
{
"Key": "Environment",
"Value": "Production"
},
{
"Key": "Environment",
"Value": "Development"
}
]
}