Control: Azure Monitor Logs clusters should be created with infrastructure-encryption enabled (double encryption)
Description
To ensure secure data encryption is enabled at the service level and the infrastructure level with two different encryption algorithms and two different keys, use an Azure Monitor dedicated cluster. This option is enabled by default when supported at the region, see https://docs.microsoft.com/azure/azure-monitor/platform/customer-managed-keys\#customer-managed-key-overview.
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.monitor_log_cluster_infrastructure_encryption_enabled
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.monitor_log_cluster_infrastructure_encryption_enabled --share
SQL
This control uses a named query:
manual_control