

本文属于机器翻译版本。若本译文内容与英语原文存在差异，则一律以英文原文为准。

# 资源
<a name="resources"></a>

## AWS 文档
<a name="aws-documentation"></a>
+ [轮换 AWS Secrets Manager 密钥](https://docs.aws.amazon.com/secretsmanager/latest/userguide/rotating-secrets.html)
+ [立即轮换 AWS Secrets Manager 密钥](https://docs.aws.amazon.com/secretsmanager/latest/userguide/rotate-secrets_now.html)
+ [AWS Secrets Manager 旋转函数模板](https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_available-rotation-templates.html)
+ [中的数据保护 AWS Secrets Manager](https://docs.aws.amazon.com/secretsmanager/latest/userguide/data-protection.html)
+ [使用 AWS Secrets Manager VPC 端点](https://docs.aws.amazon.com/secretsmanager/latest/userguide/vpc-endpoint-overview.html)
+ [S3 存储桶策略和用户策略](https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-iam-policies.html)
+ [安全地存储和使用机AWS 密](https://docs.aws.amazon.com/wellarchitected/latest/framework/sec_identities_secrets.html)（Well-Architected Framework）
+ [定期审计和轮换证书](https://docs.aws.amazon.com/wellarchitected/latest/framework/sec_identities_audit.html)（WellArchitect AWS ed Framework）

## AWS 博客文章
<a name="aws-blog-posts"></a>
+ [如何 AWS 账户 通过附加基于资源的策略来访问密钥](https://aws.amazon.com/blogs/security/how-to-access-secrets-across-aws-accounts-by-attaching-resource-based-policies/)
+ [如何在 Kubernetes S AWS ecrets Store CSI 驱动程序中使用密钥和配置提供程序](https://aws.amazon.com/blogs/security/how-to-use-aws-secrets-configuration-provider-with-kubernetes-secrets-store-csi-driver/)
+ [使用外部 AWS 机密操作员利用来自 EKS Fargate 的机密存储库](https://aws.amazon.com/blogs/containers/leverage-aws-secrets-stores-from-eks-fargate-with-external-secrets-operator/)

## 其他资源
<a name="other-resources"></a>
+ [亚马逊 S3 后端](https://developer.hashicorp.com/Terraform/language/settings/backends/s3)（Terraform文档）