Control: SSM managed instance patching should be compliant
Description
Enable this rule to help with identification and documentation of AWS Elastic Compute Cloud (AWS EC2) vulnerabilities.
Usage
Run the control in your terminal:
powerpipe control run aws_compliance.control.ssm_managed_instance_compliance_patch_compliant
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_compliance.control.ssm_managed_instance_compliance_patch_compliant --share
SQL
This control uses a named query:
ssm_managed_instance_compliance_patch_compliant