A developer configures AWS Secrets Manager to rotate a database password automatically every 30 days. What happens during the rotation process?
Think about how the secret and the service using it stay in sync during rotation.
During rotation, Secrets Manager creates a new version of the secret, updates the database password to match, and then marks the new version as current so applications use the updated secret seamlessly.
Which Terraform configuration snippet correctly sets up the Vault provider to authenticate using AWS IAM role?
Look for the correct block and keys used in Vault provider for AWS login.
The Vault provider uses the auth_login block with path set to auth/aws/login and parameters including the role name for AWS IAM authentication.
You have multiple microservices running in Kubernetes that need to access different secrets stored in Vault. Which architecture ensures least privilege and automatic secret renewal?
Think about security best practices for secret access and token management.
Assigning unique roles with scoped policies limits access to only needed secrets. Vault Agent sidecar handles token renewal automatically, improving security and reliability.
Which Terraform snippet introduces a security risk when managing AWS Secrets Manager secrets?
resource "aws_secretsmanager_secret" "db_password" {
name = "db_password"
}
resource "aws_secretsmanager_secret_version" "db_password_version" {
secret_id = aws_secretsmanager_secret.db_password.id
secret_string = var.db_password
}Consider where secret values are stored and risks of exposure.
Storing secrets directly in Terraform variables risks exposure in logs and state files. Best practice is to use external secret injection or encrypted storage for sensitive values.
You deploy AWS Lambda functions that require database credentials stored in AWS Secrets Manager. Which approach follows best practices for secret injection and minimizes cold start latency?
Think about balancing security, performance, and cold start impact.
Passing the secret ARN as an environment variable and fetching the secret with caching reduces latency and avoids hardcoding secrets, following security best practices.