Skip to content

Commit

Permalink
docs(client-secrets-manager): Documentation updates for Secrets Manager
Browse files Browse the repository at this point in the history
  • Loading branch information
awstools committed Mar 27, 2024
1 parent 86e40c9 commit 7238c53
Show file tree
Hide file tree
Showing 2 changed files with 13 additions and 1 deletion.
12 changes: 12 additions & 0 deletions clients/client-secrets-manager/src/models/models_0.ts
Original file line number Diff line number Diff line change
Expand Up @@ -1659,6 +1659,18 @@ export interface PutResourcePolicyRequest {

/**
* <p>Specifies whether to block resource-based policies that allow broad access to the secret, for example those that use a wildcard for the principal. By default, public policies aren't blocked.</p>
* <important>
* <p>Resource policy validation and the BlockPublicPolicy parameter help protect your resources by preventing public access from being granted through the resource policies that are directly attached to your secrets. In addition to using these features, carefully inspect the following policies to confirm that they do not grant public access:</p>
* <ul>
* <li>
* <p>Identity-based policies attached to associated Amazon Web Services principals (for example, IAM roles)</p>
* </li>
* <li>
* <p>Resource-based policies attached to associated Amazon Web Services resources (for example, Key Management Service (KMS) keys)</p>
* </li>
* </ul>
* <p>To review permissions to your secrets, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/determine-acccess_examine-iam-policies.html">Determine who has permissions to your secrets</a>.</p>
* </important>
* @public
*/
BlockPublicPolicy?: boolean;
Expand Down
2 changes: 1 addition & 1 deletion codegen/sdk-codegen/aws-models/secrets-manager.json
Original file line number Diff line number Diff line change
Expand Up @@ -1790,7 +1790,7 @@
"target": "com.amazonaws.secretsmanager#BooleanType",
"traits": {
"smithy.api#default": null,
"smithy.api#documentation": "<p>Specifies whether to block resource-based policies that allow broad access to the secret, for example those that use a wildcard for the principal. By default, public policies aren't blocked.</p>"
"smithy.api#documentation": "<p>Specifies whether to block resource-based policies that allow broad access to the secret, for example those that use a wildcard for the principal. By default, public policies aren't blocked.</p>\n <important>\n <p>Resource policy validation and the BlockPublicPolicy parameter help protect your resources by preventing public access from being granted through the resource policies that are directly attached to your secrets. In addition to using these features, carefully inspect the following policies to confirm that they do not grant public access:</p>\n <ul>\n <li>\n <p>Identity-based policies attached to associated Amazon Web Services principals (for example, IAM roles)</p>\n </li>\n <li>\n <p>Resource-based policies attached to associated Amazon Web Services resources (for example, Key Management Service (KMS) keys)</p>\n </li>\n </ul>\n <p>To review permissions to your secrets, see <a href=\"https://docs.aws.amazon.com/secretsmanager/latest/userguide/determine-acccess_examine-iam-policies.html\">Determine who has permissions to your secrets</a>.</p>\n </important>"
}
}
},
Expand Down

0 comments on commit 7238c53

Please sign in to comment.