turbot/gcp_compliance

Query: dns_managed_zone_key_signing_not_using_rsasha1

Usage

powerpipe query gcp_compliance.query.dns_managed_zone_key_signing_not_using_rsasha1

Steampipe Tables

SQL

select
self_link resource,
case
when visibility = 'private' then 'skip'
when dnssec_config_state is null then 'alarm'
when dnssec_config_default_key_specs @> '[{"keyType": "keySigning", "algorithm": "rsasha1"}]' then 'alarm'
else 'ok'
end as status,
case
when visibility = 'private'
then title || ' is private.'
when dnssec_config_state is null
then title || ' DNSSEC not enabled.'
when dnssec_config_default_key_specs @> '[{"keyType": "keySigning", "algorithm": "rsasha1"}]'
then title || ' using RSASHA1 algorithm for key-signing.'
else title || ' not using RSASHA1 algorithm for key-signing.'
end as reason
, project as project
from
gcp_dns_managed_zone;

Controls

The query is being used by the following controls: