.amazonaws.com" }, "Action" : [ "kms:Encrypt", "kms:Decrypt", "kms:ReEncrypt*", "kms:GenerateDataKey*", "> .amazonaws.com" }, "Action" : [ "kms:Encrypt", "kms:Decrypt", "kms:ReEncrypt*", "kms:GenerateDataKey*", "> .amazonaws.com" }, "Action" : [ "kms:Encrypt", "kms:Decrypt", "kms:ReEncrypt*", "kms:GenerateDataKey*", ">
data "aws_caller_identity" "current" {
}

resource "aws_kms_key" "cw" {
    key_usage = "ENCRYPT_DECRYPT"
    deletion_window_in_days = 7

    policy = jsonencode({
        "Version" : "2012-10-17",
        "Id" : "key-default-1",
        "Statement" : [
            {
                "Sid" : "Enable IAM User Permissions",
                "Effect" : "Allow",
                "Principal" : {
                    "AWS" : "arn:aws:iam::${data.aws_caller_identity.current.account_id}:root"
                },
                "Action" : "kms:*",
                "Resource" : "*"
            },
            {
                "Sid" : "Allow CloudWatch Logs use of the key",
                "Effect" : "Allow",
                "Principal" : {
                    "Service" : "logs.<region>.amazonaws.com"
                },
                "Action" : [
                    "kms:Encrypt",
                    "kms:Decrypt",
                    "kms:ReEncrypt*",
                    "kms:GenerateDataKey*",
                    "kms:DescribeKey"
                ],
                "Resource" : "*"
            }
        ]
    })

    tags = {
        Name = "cw-kms"
    }
}

resource "aws_kms_alias" "cw" {
    target_key_id = aws_kms_key.cw.key_id
    name = "alias/cw-kms"
}

resource "aws_cloudwatch_log_group" "cw" {
    name = "<name>"
    kms_key_id = aws_kms_key.cw.arn
    
    tags = {
        Name = "<name>"
    }
}

output "cw" {
    value = aws_cloudwatch_log_group.cw.id
}