Control: Route 53 zones should have query logging enabled
Description
Ensure Route 53 zones have query logging enabled.
Usage
Run the control in your terminal:
powerpipe control run aws_compliance.control.route53_zone_query_logging_enabled
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_compliance.control.route53_zone_query_logging_enabled --share
SQL
This control uses a named query:
select id as resource, case when private_zone then 'skip' when query_logging_configs is not null or jsonb_array_length(query_logging_configs) > 0 then 'ok' else 'alarm' end as status, case when private_zone then title || ' is private hosted zone.' when query_logging_configs is not null or jsonb_array_length(query_logging_configs) > 0 then title || ' query logging to CloudWatch enabled.' else title || ' query logging to CloudWatch disabled.' end as reason , region, account_idfrom aws_route53_zone;