turbot/azure_compliance

Control: Azure Monitor Logs clusters should be created with infrastructure-encryption enabled (double encryption)

Description

To ensure secure data encryption is enabled at the service level and the infrastructure level with two different encryption algorithms and two different keys, use an Azure Monitor dedicated cluster. This option is enabled by default when supported at the region, see https://docs.microsoft.com/azure/azure-monitor/platform/customer-managed-keys\#customer-managed-key-overview.

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.monitor_log_cluster_infrastructure_encryption_enabled

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.monitor_log_cluster_infrastructure_encryption_enabled --share

SQL

This control uses a named query:

manual_control

Tags