Control: GuardDuty RDS protection should be enabled
Description
This control checks whether GuardDuty RDS protection is enabled. For a standalone account, the control fails if GuardDuty RDS protection is disabled in the account. In a multi-account environment, the control fails if the delegated GuardDuty administrator account and all member accounts don't have RDS protection enabled.
Usage
Run the control in your terminal:
powerpipe control run aws_compliance.control.guardduty_detector_rds_protection_enabledSnapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_compliance.control.guardduty_detector_rds_protection_enabled --shareSQL
This control uses a named query:
with rds_protection as (  select    arn  from    aws_guardduty_detector,    jsonb_array_elements(features) as f  where    f ->> 'Name' = 'RDS_LOGIN_EVENTS'    and f ->> 'Status' = 'ENABLED')select  d.arn as resource,  case    when m.arn is not null then 'ok'    else 'alarm'  end as status,  case    when m.arn is not null then title || ' has RDS protection enabled.'    else title || ' has RDS protection disabled.'  end as reason    , region, account_idfrom  aws_guardduty_detector as d  left join rds_protection as m on m.arn = d.arn