action_trail_enabledaction_trail_oss_bucket_not_publiccs_kubernetes_cluster_cloud_monitor_enabledcs_kubernetes_cluster_ipvlan_enabledcs_kubernetes_cluster_log_service_enabledcs_kubernetes_cluster_network_policy_enabledcs_kubernetes_cluster_private_cluster_enabledecs_disk_encryption_enabledecs_instance_latest_os_patches_appliedecs_instance_with_no_legacy_networkecs_security_center_agent_installedecs_security_group_remote_administrationecs_security_group_restrict_ingress_rdp_allecs_security_group_restrict_ingress_ssh_allecs_unattached_disk_encryption_enabledlog_store_retention_period_365_daysmanual_controloss_bucket_encrypted_with_byokoss_bucket_encrypted_with_service_keyoss_bucket_enforces_ssloss_bucket_logging_enabledoss_bucket_public_access_blockedram_account_password_policy_min_length_14ram_account_password_policy_one_lowercase_letterram_account_password_policy_one_numberram_account_password_policy_one_symbolram_account_password_policy_one_uppercase_letterram_account_password_policy_reuse_5ram_password_policy_expire_365_or_greaterram_password_policy_expire_90ram_password_policy_max_login_attempts_5ram_policy_no_full_wildcard_privilegesram_root_account_mfa_enabledram_root_account_no_access_keysram_root_account_unusedram_user_access_key_rotated_90ram_user_console_access_mfa_enabledram_user_no_policiesram_user_unused_90rds_instance_postgresql_log_connections_parameter_onrds_instance_postgresql_log_disconnections_parameter_onrds_instance_postgresql_log_duration_parameter_onrds_instance_restrict_access_to_internetrds_instance_sql_audit_enabledrds_instance_sql_audit_retention_period_180_daysrds_instance_ssl_enabledrds_instance_tde_enabledrds_instance_tde_encrypted_with_byoksecurity_center_advanced_or_enterprise_editionsecurity_center_all_assets_installed_with_agentsls_alert_cloud_firewall_changessls_alert_console_authentication_failuressls_alert_console_signin_without_mfasls_alert_kms_key_disable_deletionsls_alert_oss_bucket_policy_changessls_alert_oss_permission_changessls_alert_ram_role_changessls_alert_rds_configuration_changessls_alert_root_account_usagesls_alert_security_group_changessls_alert_unauthorized_api_callssls_alert_vpc_changessls_alert_vpc_route_changesvpc_and_vswitch_flow_log_integrated_with_log_servicevpc_flow_logs_enabled
Query: rds_instance_tde_encrypted_with_byok
Usage
powerpipe query alicloud_compliance.query.rds_instance_tde_encrypted_with_byokSteampipe Tables
SQL
select r.arn as resource, case when r.tde_status = 'Enabled' and r.tde_encryption_key is not null and k.key_id is not null and k.creator = k.account_id then 'ok' else 'alarm' end as status, case when r.tde_status != 'Enabled' then r.title || ' TDE is not enabled.' when r.tde_encryption_key is null then r.title || ' TDE enabled but not using a custom key (BYOK).' when k.key_id is null then r.title || ' TDE enabled with key ' || r.tde_encryption_key || ' but key not found in KMS. Verify the key exists and is accessible.' when k.creator is null or k.creator != k.account_id then r.title || ' TDE enabled but encryption key is not customer-managed (BYOK). Key creator: ' || coalesce(k.creator, 'unknown') || ', Account ID: ' || coalesce(k.account_id, 'unknown') when r.tde_status = 'Enabled' and r.tde_encryption_key is not null and k.creator = k.account_id then r.title || ' TDE enabled with BYOK (custom key ' || k.key_id || ').' else r.title || ' TDE not configured with BYOK.' end as reason , r.account_id as account_id, r.region as regionfrom alicloud_rds_instance r left join alicloud_kms_key k on r.tde_encryption_key = k.key_id;
Controls
The query is being used by the following controls: