turbot/steampipe-mod-aws-compliance

Control: OpenSearch domains node-to-node encryption should be enabled

Description

This control checks if AWS OpenSearch Service nodes are encrypted end to end. The rule is non-compliant if the node-to-node encryption is not enabled on the domain.

Usage

Run the control in your terminal:

powerpipe control run aws_compliance.control.opensearch_domain_node_to_node_encryption_enabled

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run aws_compliance.control.opensearch_domain_node_to_node_encryption_enabled --share

SQL

This control uses a named query:

select
arn as resource,
case
when region = any(array['af-south-1', 'eu-south-1', 'cn-north-1', 'cn-northwest-1']) then 'skip'
when node_to_node_encryption_options_enabled then 'ok'
else 'alarm'
end as status,
case
when region = any(array['af-south-1', 'eu-south-1', 'cn-north-1', 'cn-northwest-1']) then title || ' node-to-node encryption not supported in ' || region || '.'
when node_to_node_encryption_options_enabled then title || ' node-to-node encryption enabled.'
else title || ' node-to-node encryption disabled.'
end as reason
, region, account_id
from
aws_opensearch_domain;

Tags