turbot/steampipe-mod-aws-compliance

Control: AWS Redshift audit logging should be enabled

Description

This control ensures if redshift clusters are logging audits to a specific bucket. The rule is no compliant if audit logging is not enabled for a redshift cluster or if the 'bucketNames' parameter is provided but the audit logging destination does not match.

Usage

Run the control in your terminal:

powerpipe control run aws_compliance.control.redshift_cluster_audit_logging_enabled

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run aws_compliance.control.redshift_cluster_audit_logging_enabled --share

SQL

This control uses a named query:

select
arn as resource,
case
when logging_status ->> 'LoggingEnabled' = 'true' then 'ok'
else 'alarm'
end as status,
case
when logging_status ->> 'LoggingEnabled' = 'true' then title || ' logging enabled.'
else title || ' logging disabled.'
end as reason
, region, account_id
from
aws_redshift_cluster;

Tags