Which solution will meet these requirements?

1 Comment

  1. Nicole
    Author

    I guess:
    Use a tag-based approach by attaching a resource policy to the secret. Apply tags to the secret and the IAM principals. Use the aws:PrincipalTag and aws:ResourceTag IAM condition keys to control access.

Leave a Reply

Your email address will not be published. Required fields are marked *

3 × 1 =