-
-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy path02-kms-keys.tf
29 lines (24 loc) · 908 Bytes
/
02-kms-keys.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
# KMS key creation
resource "aws_kms_key" "kms_key_1" {
description = "KMS key for terraform state storage bucket"
deletion_window_in_days = var.kms_key_1_default_retention_days
enable_key_rotation = true
}
# Creating an AWS KMS alias
resource "aws_kms_alias" "kms_key_1_alias" {
name = "alias/terraform-bucket-key-route53-1"
target_key_id = aws_kms_key.kms_key_1.key_id
depends_on = [aws_kms_key.kms_key_1]
}
# Creating an AWS KMS alias
resource "aws_kms_key" "kms_key_2" {
description = "KMS key for DynamoDB table encryption"
deletion_window_in_days = var.kms_key_2_default_retention_days
enable_key_rotation = true
}
# Creating an AWS KMS alias
resource "aws_kms_alias" "kms_key_2_alias" {
name = "alias/dynamodb-table-encryption-route53-1"
target_key_id = aws_kms_key.kms_key_2.key_id
depends_on = [aws_kms_key.kms_key_2]
}