turbot/aws_compliance
Loading controls...

Control: RDS PostgreSQL DB instances should not be exposed to local file read vulnerability

Description

This control checks whether AWS PostgreSQL DB isntance are exposed to local file read vulnerability by ensuring that AWS RDS PostgreSQL instances use a non-vulnerable version of the log_fdw.

Usage

Run the control in your terminal:

powerpipe control run aws_compliance.control.rds_db_instance_postgres_not_exposed_to_local_file_read_vulnerability

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run aws_compliance.control.rds_db_instance_postgres_not_exposed_to_local_file_read_vulnerability --share

SQL

This control uses a named query:

rds_db_instance_postgres_not_exposed_to_local_file_read_vulnerability

Tags