-
**Describe the issue**
Hi,
Some AWS checks failed when resource is created with for_each or count element in modules.
Checks example :
- CKV2_AWS_6: "Ensure that S3 bucket has a Public Access blo…
-
The current parameters of the kms-tool doesn't have support for encryption context
https://docs.aws.amazon.com/kms/latest/developerguide/encrypt_context.html
Can you add the support for this para…
-
### Acknowledgements
- [X] I have searched (https://github.com/aws/aws-sdk/issues?q=is%3Aissue) for past instances of this issue
- [X] I have verified all of my SDK modules are up-to-date (you can pe…
-
I'm trying to use two KMS keys living in two different AWS accounts, so that each account can access the encrypted contents. Similar to the setup in #1093 .
I've created the following `.sops.yaml`:…
-
Does this implement RFC 6979? Was using `aws-kms-ethers-signer` and it seems like it's not?
Was getting different signatures each time. Ethers.js looks like it does (use [noble-secp256k1](https://g…
-
### Community Note
* Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help…
-
### Terraform Core Version
1.9.5 on darwin_arm64
### AWS Provider Version
5.65.0
### Affected Resource(s)
aws_elasticache_serverless_cache
### Expected Behavior
Create a Redis Ser…
-
### Describe the feature
### Short description
I'd like a way to use secret.grantRead(role) that would automatically generate the appropriate policy using the alias condition for cross-account sec…
-
**Is your feature request related to a problem? Please describe.**
This issue separates out one of the two enhancement requests described by https://github.com/kroxylicious/kroxylicious/issues/1282…
-
### Describe the bug
Generally, states added to a state machine will grant all necessary policy permissions to the execution role of the state machine. When using the `DistributedMap` construct, howe…