Is it good to have a password for the database which is generated by the secret manager?
I am using it this way now.
Type: 'AWS::SecretsManager::Secret'
Properties:
Description: 'Description'
GenerateSecretString:
SecretStringTemplate: '{"username": "username"}'
GenerateStringKey: 'password'
PasswordLength: 40
ExcludeCharacters: '"@/\'
What are the best practices? Do I need a separate secret manager for every RDS? What about storing other values in secret manager? Do I need one per application?