Control: AWS Redshift audit logging should be enabled
Description
This control ensures if redshift clusters are logging audits to a specific bucket. The rule is no compliant if audit logging is not enabled for a redshift cluster or if the 'bucketNames' parameter is provided but the audit logging destination does not match.
Usage
Run the control in your terminal:
powerpipe control run aws_compliance.control.redshift_cluster_audit_logging_enabled
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_compliance.control.redshift_cluster_audit_logging_enabled --share
SQL
This control uses a named query:
select arn as resource, case when logging_status ->> 'LoggingEnabled' = 'true' then 'ok' else 'alarm' end as status, case when logging_status ->> 'LoggingEnabled' = 'true' then title || ' logging enabled.' else title || ' logging disabled.' end as reason , region, account_idfrom aws_redshift_cluster;