Control: Ensure that all the expired ACM certificates are removed
Description
This control ensures that all expired ACM certificates are removed from AWS account.
Usage
Run the control in your terminal:
powerpipe control run aws_compliance.control.acm_certificate_not_expired
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_compliance.control.acm_certificate_not_expired --share
SQL
This control uses a named query:
select certificate_arn as resource, case when renewal_eligibility = 'INELIGIBLE' then 'skip' when date(not_after) < (current_date - interval '1' minute) then 'alarm' else 'ok' end as status, case when renewal_eligibility = 'INELIGIBLE' then title || ' not eligible for renewal.' when date(not_after) < (current_date - interval '1' minute) then title || ' expired ' || to_char(not_after, 'DD-Mon-YYYY') || ' (' || extract(day from not_after - current_date) || ' days ago).' else title || ' expires ' || to_char(not_after, 'DD-Mon-YYYY') || ' (' || extract(day from not_after - current_date) || ' days).' end as reason , region, account_idfrom aws_acm_certificate;