turbot/steampipe-mod-aws-compliance

Control: 3 Amazon EMR security configurations should be encrypted at rest

Description

This control checks whether an Amazon EMR security configuration has encryption at rest enabled. The control fails if the security configuration doesn't enable encryption at rest.

Data at rest refers to data that's stored in persistent, non-volatile storage for any duration. Encrypting data at rest helps you protect its confidentiality, which reduces the risk that an unauthorized user can access it.

Remediation

To enable encryption at rest in an Amazon EMR security configuration, see Configure data encryption in the Amazon EMR Management Guide.

Usage

Run the control in your terminal:

powerpipe control run aws_compliance.control.foundational_security_emr_3

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run aws_compliance.control.foundational_security_emr_3 --share

SQL

This control uses a named query:

select
name as resource,
case
when (encryption_configuration -> 'EnableAtRestEncryption')::bool then 'ok'
else 'alarm'
end as status,
case
when (encryption_configuration -> 'EnableAtRestEncryption')::bool then title || ' encryption at rest enabled.'
else title || ' encryption at rest disabled.'
end as reason
, region, account_id
from
aws_emr_security_configuration;

Tags