New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(aws-key-pair): enable the ssm parameter store to record the key-pair distribution #77
feat(aws-key-pair): enable the ssm parameter store to record the key-pair distribution #77
Conversation
Hi @Gowiem & @korenyoni , Thank you |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@haidargit generally, looks good, but I changed around some naming + description + style to fit the Cloud Posse guidelines.
Let me know if you have any questions. Once you accept + commit these changes, you'll need to pull them and run make init && make readme
locally and then commit + push the result.
Thanks for your contribution!
…pair distribution enforce ssm parameter to SecureString Co-authored-by: Matt Gowie <matt@masterpoint.io> enforce ssm parameter to SecureString Co-authored-by: Matt Gowie <matt@masterpoint.io> adjust ssm parameter path prefix Co-authored-by: Matt Gowie <matt@masterpoint.io> fix bool-typed variable naming Co-authored-by: Matt Gowie <matt@masterpoint.io> ssm parameter enabled var name Co-authored-by: Matt Gowie <matt@masterpoint.io> ssm parameter path prefix Co-authored-by: Matt Gowie <matt@masterpoint.io> feat(aws-key-pair): enable the ssm parameter store to record the key-pair distribution
ad34190
to
57a696c
Compare
Thanks! @Gowiem can you help to check again? Thank you |
/terratest |
/terratest |
/terratest |
/terratest |
what
In this PR, we can use the AWS SSM Parameter store resource to facilitate the secure management of private key information. This resource allows us to gather the private key information generated by the current module and securely store it in the parameter store.
why
The objective behind this enhancement is to ensure the secure distribution of private key ownership within the AWS infrastructure. We can centrally manage and protect sensitive information, increasing operational efficiency and reducing the likelihood of unauthorized access to critical resources.
references
No issue relates to current improvement.
I have run these required commands,
make init
make readme
Kindly review this PR for module improvements. Thank you