Checks whether a dynamic ApsaraDB RDS secret is created for each ApsaraDB RDS instance. If so, the evaluation result is Compliant.
Scenarios
This rule applies when you need to create dynamic ApsaraDB RDS secrets and enable periodical auto-rotation for the secrets. This reduces the risk of secret leaks.
Risk level
Default risk level: medium.
When you apply this rule, you can change the risk level based on your business requirements.
Compliance evaluation logic
- If a dynamic ApsaraDB RDS secret is created for each ApsaraDB RDS instance, the evaluation result is Compliant.
- If no dynamic ApsaraDB RDS secret is created for each ApsaraDB RDS instance, the evaluation result is Incompliant. For more information about how to remediate an incompliant configuration, see Incompliance remediation.
Rule details
Item | Description |
---|---|
Rule name | rds-account-managed-by-kms |
Rule identifier | rds-account-managed-by-kms |
Tag | RDS |
Automatic remediation | Not supported |
Trigger type | Periodic execution |
Evaluation frequency | Interval of 24 hours |
Supported resource type | ApsaraDB RDS instance |
Input parameter | None. |
Incompliance remediation
Create a dynamic ApsaraDB RDS secret for an ApsaraDB RDS instance. For more information, see Manage dynamic ApsaraDB RDS secrets.