From 0126d2f77ce52ad6f2ab57b7c6be26877b30ef79 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Michael=20G=C3=B6hler?= Date: Mon, 3 Apr 2023 11:01:29 +0200 Subject: [PATCH] fix(secretsmanager_automatic_rotation_enabled): Improve description for Secrets Manager secret rotation (#2156) --- .../secretsmanager_automatic_rotation_enabled.metadata.json | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/prowler/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled.metadata.json b/prowler/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled.metadata.json index 4f26952c..4696d854 100644 --- a/prowler/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled.metadata.json +++ b/prowler/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled.metadata.json @@ -1,15 +1,15 @@ { "Provider": "aws", "CheckID": "secretsmanager_automatic_rotation_enabled", - "CheckTitle": "Check if Secrets Manager key rotation is enabled.", + "CheckTitle": "Check if Secrets Manager secret rotation is enabled.", "CheckType": [], "ServiceName": "secretsmanager", "SubServiceName": "", "ResourceIdTemplate": "arn:aws:secretsmanager:region:account-id:secret:secret-name", "Severity": "medium", "ResourceType": "AwsSecretsManagerSecret", - "Description": "Check if Secrets Manager key rotation is enabled.", - "Risk": "Rotating secrets minimizes exposure to attacks using stolen keys.", + "Description": "Check if Secrets Manager secret rotation is enabled.", + "Risk": "Rotating secrets minimizes exposure to attacks using stolen secrets.", "RelatedUrl": "https://docs.aws.amazon.com/secretsmanager/latest/userguide/rotating-secrets_strategies.html", "Remediation": { "Code": {