turbot/steampipe-mod-aws-compliance

Control: EC2 Client VPN endpoints should have client connection logging enabled

Description

This rule ensures that EC2 client VPN endpoints have client connection logging enabled. The rule is non-compliant if client connection logging is not enabled.

Usage

Run the control in your terminal:

powerpipe control run aws_compliance.control.ec2_client_vpn_endpoint_client_connection_logging_enabled

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run aws_compliance.control.ec2_client_vpn_endpoint_client_connection_logging_enabled --share

SQL

This control uses a named query:

select
client_vpn_endpoint_id as resource,
case
when (connection_log_options ->> 'Enabled')::bool then 'ok'
else 'alarm'
end as status,
case
when (connection_log_options ->> 'Enabled')::bool then title || ' client connection logging enabled.'
else title || ' client connection logging disabled.'
end as reason
, region, account_id
from
aws_ec2_client_vpn_endpoint;

Tags