AWS Secrets Manager

2022/12/29 - 2 updated api methods

Changes   Added owning service filter, include planned deletion flag, and next rotation date response parameter in ListSecrets.

2022/01/28 - 3 updated api methods

Changes   Feature are ready to release on Jan 28th

2021/07/30 - 1 updated api methods

Changes   Add support for KmsKeyIds in the ListSecretVersionIds API response

2021/03/03 - 3 new 3 updated api methods

Changes   Added support for multi-Region secrets APIs ReplicateSecretToRegions, RemoveRegionsFromReplication, and StopReplicationToReplica

2020/07/09 - 1 new 3 updated api methods

Changes   Adds support for filters on the ListSecrets API to allow filtering results by name, tag key, tag value, or description. Adds support for the BlockPublicPolicy option on the PutResourcePolicy API to block resource policies which grant a wide range of IAM principals access to secrets. Adds support for the ValidateResourcePolicy API to validate resource policies for syntax and prevent lockout error scenarios and wide access to secrets.

2019/07/23 - 2 updated api methods

Changes   This release increases the maximum allowed size of SecretString or SecretBinary from 7KB to 10KB in the CreateSecret, UpdateSecret, PutSecretValue and GetSecretValue APIs. This release also increases the maximum allowed size of ResourcePolicy from 4KB to 20KB in the GetResourcePolicy and PutResourcePolicy APIs.

2018/08/08 - 1 updated api methods

Changes   This release introduces a ForceDeleteWithoutRecovery parameter to the DeleteSecret API enabling customers to force the deletion of a secret without any recovery window

2018/06/26 - 3 new api methods

Changes   This release adds support for resource-based policies that attach directly to your secrets. These policies provide an additional way to control who can access your secrets and what they can do with them. For more information, see in the Secrets Manager User Guide.

2018/04/04 - 15 new api methods

Changes   AWS Secrets Manager enables you to easily create and manage the secrets that you use in your customer-facing apps. Instead of embedding credentials into your source code, you can dynamically query Secrets Manager from your app whenever you need credentials. You can automatically and frequently rotate your secrets without having to deploy updates to your apps. All secret values are encrypted when they're at rest with AWS KMS, and while they're in transit with HTTPS and TLS.