Control: EMR clusters encryption in transit should be enabled
Description
This control checks whether EMR clusters have encryption in transit enabled. This control fails if an EMR cluster isn't encrypted in transit.
Usage
Run the control in your terminal:
powerpipe control run aws_compliance.control.emr_cluster_encryption_in_transit_enabled
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_compliance.control.emr_cluster_encryption_in_transit_enabled --share
SQL
This control uses a named query:
select cluster_arn as resource, case when s.name is null then 'alarm' when s.name is not null and (encryption_configuration -> 'EnableInTransitEncryption')::bool then 'ok' else 'alarm' end as status, case when s.name is null then c.title || ' security configuration disabled.' when s.name is not null and (encryption_configuration -> 'EnableInTransitEncryption')::bool then c.title || ' encryption in transit enabled.' else c.title || ' encryption in transit disabled.' end as reason , c.region, c.account_idfrom aws_emr_cluster as c left join aws_emr_security_configuration as s on c.security_configuration = s.name and s.region = s.region and s.account_id = c.account_id;