Skip to content

nickj/cdk-secure-parameter-store

 
 

Repository files navigation

Secure Parameter Store

Why

AWS CDK not having a way to create secure parameter store, and it recommends secret manager, which is costly. This construct provides a way to create secure parameter store using CDK Custom Resource

Usage

Similar to how other CDK constructs are used

new SecureParameterStore(stack, 'MySecureParameterStore', {
  name: 'ParameterName',
  value: 'Parameter Value',
});

How it works

This construt creates a Lambda backed Custom Resource, the lambda is using aws-sdk to create and delete parameter store, whenever Custom Resource is created and destroyed

For more info refer aws docs

For Contributors

Build

  • npx projen build

Deploy

  • yarn dev:deploy

Destroy

  • npx cdk destroy --app='./lib/integ.default.js'

About

CDK custom resource to create secure paramter store

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • TypeScript 64.8%
  • JavaScript 35.2%