Skip to main content
AWS secrets store IAM credentials that allow your workloads to authenticate with AWS services. Use them to access S3, DynamoDB, SQS, or any other AWS service directly from your applications.

Use Cases

  • S3 Access: Read/write files to S3 buckets
  • Database Connections: Connect to RDS, DynamoDB, or ElastiCache
  • Message Queues: Send/receive messages from SQS or SNS
  • AWS SDK Integration: Any application using the AWS SDK
  • Cross-Account Access: Access resources in other AWS accounts via role assumption

Configuration Options

FieldDescriptionRequired
accessKeyAWS Access Key ID (starts with AKIA...)Yes
secretKeyAWS Secret Access KeyYes
roleArnIAM Role ARN to assume for cross-account accessNo
externalIdExternal ID for role assumption (additional security)No
For enhanced security, use role assumption with roleArn instead of long-lived access keys. This allows you to grant temporary, scoped access to AWS resources.

Create an AWS Secret

1

Navigate to Secrets

In the Console, navigate to Secrets and click New, or use the Create dropdown in the top-right corner and select Secret.
2

Enter basic information

Enter a Name and optional Description.
3

Select secret type

Select AWS as the secret type.
4

Configure credentials

Click Data in the left pane. Enter the Access Key and Secret Key. Optionally enter a Role ARN and External ID for role assumption.
5

Create the secret

Click Create.

Best Practices

Create IAM users or roles with only the permissions your workload needs. Avoid using root credentials or overly permissive policies.
Set up a rotation schedule for your AWS access keys. Control Plane makes it easy to update secrets without redeploying workloads.
When accessing cross-account resources, use roleArn with temporary credentials instead of sharing long-lived access keys.

Next Steps