-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathkms_key.tf
93 lines (83 loc) · 2.08 KB
/
kms_key.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
# KMS key used by Secrets Manager for RDS
resource "aws_kms_key" "secrets_manager" {
description = "KMS key for RDS"
deletion_window_in_days = 30
is_enabled = true
enable_key_rotation = true
tags = {
Name = var.default_tag
}
}
resource "aws_kms_key" "kafka_key" {
description = "Kafka key"
deletion_window_in_days = 30
is_enabled = true
enable_key_rotation = true
tags = {
Name = var.default_tag
}
}
resource "aws_kms_key" "cloudwatch_key" {
description = "Cloudwatch key"
deletion_window_in_days = 30
is_enabled = true
enable_key_rotation = true
key_usage = "ENCRYPT_DECRYPT"
policy = jsonencode({
"Version" : "2012-10-17",
"Id" : "cloudwatch-key-policy",
"Statement" : [
{
"Sid" : "Allow CloudWatch Logs to use the KMS key",
"Effect" : "Allow",
"Principal" : {
"Service" : "logs.${var.aws_region}.amazonaws.com"
},
"Action" : [
"kms:Encrypt",
"kms:Decrypt",
"kms:ReEncrypt*",
"kms:GenerateDataKey*",
"kms:DescribeKey"
],
"Resource" : "*"
},
{
"Sid" : "Allow key policy updates",
"Effect" : "Allow",
"Principal" : {
"AWS" : "*" # Replace with your actual user or role ARN
},
"Action" : [
"kms:Create*",
"kms:Describe*",
"kms:Enable*",
"kms:List*",
"kms:Put*",
"kms:Update*",
"kms:Revoke*",
"kms:Disable*",
"kms:Get*",
"kms:Delete*",
"kms:TagResource",
"kms:UntagResource",
"kms:ScheduleKeyDeletion",
"kms:CancelKeyDeletion"
],
"Resource" : "*"
}
]
})
tags = {
Name = var.default_tag
}
}
resource "aws_kms_key" "rds_key" {
description = "RDS key"
deletion_window_in_days = 30
is_enabled = true
enable_key_rotation = true
tags = {
Name = var.default_tag
}
}