DeletionPolicy for secretsmanager.Secret #6527
Labels
@aws-cdk/aws-secretsmanager
Related to AWS Secrets Manager
effort/small
Small work item – less than a day of effort
feature-request
A feature should be added or improved.
in-progress
This issue is being actively worked on.
Why we add DeletionPolicy to secretsmanager.Secret?
Use Case
In production environment, we often store important values on secretsmanager.Secret.
For example, password-salt, cookie encryption key, or API key for other services.
To keep secure, these variables shouldn't be stored in other place.
But, without DeletionPolicy(Retain), it can be deleted by human error.
I think, sometimes it should be kept if cloudformation resource are deleted.
Proposed Solution
Add DeletionPolicy to secretsmanager.Secret's initialization Props.
Other
I thought it might be issue of cloudformation at first.
But cloudformation have this.
aws-cloudformation/cloudformation-coverage-roadmap#405
This is a 🚀 Feature Request
The text was updated successfully, but these errors were encountered: