Which solution will meet these requirements?

1 Comment

  1. Nicole
    Author

    I guess:
    Use a tag-based approach by attaching a resource policy to the secret. Apply tags to the secret and the IAM principals. Use the aws:PrincipalTag and aws:ResourceTag IAM condition keys to control access.

Leave a Reply to Nicole Cancel reply

Your email address will not be published. Required fields are marked *

5 × five =