turbot/steampipe-mod-aws-compliance

Control: EMR cluster Kerberos should be enabled

Description

The access permissions and authorizations can be managed and incorporated with the principles of least privilege and separation of duties, by enabling Kerberos for AWS EMR clusters.

Usage

Run the control in your terminal:

powerpipe control run aws_compliance.control.emr_cluster_kerberos_enabled

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run aws_compliance.control.emr_cluster_kerberos_enabled --share

SQL

This control uses a named query:

select
cluster_arn as resource,
case
when kerberos_attributes is null then 'alarm'
else 'ok'
end as status,
case
when kerberos_attributes is null then title || ' Kerberos not enabled.'
else title || ' Kerberos enabled.'
end as reason
, region, account_id
from
aws_emr_cluster;

Tags