diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md index 1d583fd..c4b6a1c 100755 --- a/CONTRIBUTING.md +++ b/CONTRIBUTING.md @@ -23,7 +23,7 @@ reported the issue. Please try to include as much information as you can. Detail ## Contributing via Pull Requests Contributions via pull requests are much appreciated. Before sending us a pull request, please ensure that: -1. You are working against the latest source on the *master* branch. +1. You are working against the latest source on the *main* branch. 2. You check existing open, and recently merged, pull requests to make sure someone else hasn't addressed the problem already. 3. You open an issue to discuss any significant work - we would hate for your time to be wasted. diff --git a/README.md b/README.md index 1412b17..136034c 100755 --- a/README.md +++ b/README.md @@ -1,5 +1,5 @@ ## AWS IAM Key Rotation -This set of CloudFormation templates and Python scripts will set up an auto-rotation function that will automatically rotate your AWS IAM User Access Keys every 90 days. At 100 days it will then disable the old Access Keys. And finally at 110 days it will delete the old Access Keys. It will also set up a secret inside AWS Secrets Manager to store the new Access Keys, with a resource policy that permits only the AWS IAM User access to them. There is also automation to send emails with a custome email template via SES that will alert account owners when rotation occurs. +This set of CloudFormation templates and Python scripts will set up an auto-rotation function that will automatically rotate your AWS IAM User Access Keys every 90 days. At 100 days it will then disable the old Access Keys. And finally at 110 days it will delete the old Access Keys. It will also set up a secret inside AWS Secrets Manager to store the new Access Keys, with a resource policy that permits only the AWS IAM User access to them. There is also automation to send emails with a custom email template via SES that will alert account owners when rotation occurs. ## Security See [CONTRIBUTING](CONTRIBUTING.md#security-issue-notifications) for more information. @@ -17,4 +17,4 @@ a. https://docs.aws.amazon.com/ses/latest/DeveloperGuide/request-production-acce b. Note: There is about a 24 hour wait for approval 2. While in Amazon Simple Email Service (SES), verify the senders address or the sender domain that you will use as the email source.
a. This is the email that will be in the ‘Sender’ section of the email sent to your end users. -3. The AWS resources needed for this tool will deploy with the main CloudFormation template. \ No newline at end of file +3. The AWS resources needed for this tool will deploy with the main CloudFormation template.