Control: AWS Redshift audit logging should be enabled
Description
This control ensures if redshift clusters are logging audits to a specific bucket. The rule is no compliant if audit logging is not enabled for a redshift cluster or if the 'bucketNames' parameter is provided but the audit logging destination does not match.
Usage
Run the control in your terminal:
powerpipe control run aws_compliance.control.redshift_cluster_audit_logging_enabled
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_compliance.control.redshift_cluster_audit_logging_enabled --share
SQL
This control uses a named query:
redshift_cluster_audit_logging_enabled