Skip to main content

aws_ssm_parameter resource

[edit on GitHub]

Use the aws_ssm_parameter InSpec audit resource to test properties of a ssm parameter.


An aws_ssm_parameter resource block uses the parameter to select a ssm parameter.

describe aws_ssm_parameter(name: 'ssm-parameter-name-1234') do
  it { should exist }


name (required)

This resource accepts a single parameter, the SSM Parameter Name. This can be passed either as a string or as a aws_ssm_parameter: 'value' key-value entry in a hash.

with*decryption *(optional)_

This decrypts the value associated with the ssm parameter. This must be passed as a string with_decryption: "true".

See also the AWS documentation on SSM Parameters.


arnProvides the Amazon Resource Name (ARN) of the parameter.
data_typeProvides the data type of the parameter.
last_modified_dateProvides the date the parameter was last changed or updated and the parameter version was created.
nameProvides the name of the parameter.
selectorProvides the version number or label used to retrieve the parameter value.
source_resultApplies to parameters that reference information in other AWS services.
typeProvides the type of the parameter.
valueProvides the value of the parameter.
versionProvides the version of the parameter.

For a comprehensive list of properties available, see the API reference documentation


Check the Name of a SSM Parameter

describe aws_ssm_parameter(name: 'ssm_parameter-name-1234') do
  its('name')  { should eq 'ssm_parameter-name-1234' }


This InSpec audit resource has the following special matchers. For a full list of available matchers, please visit our matchers page.


The control will pass if the describe returns at least one result.

Use should_not to test the entity should not exist.

describe aws_ssm_parameter(name: 'ssm_parameter-name-1234') do
  it { should exist }

describe aws_ssm_parameter(name: 'ssm_parameter-name-6789') do
  it { should_not exist }

AWS Permissions

Your Principal will need the ssm:GetParameter action with Effect set to Allow.

You can find detailed documentation at Actions, Resources, and Condition Keys for Amazon Systems Manager.

Was this page helpful?


Search Results