turbot/steampipe-mod-aws-compliance

Control: Route 53 zones should have query logging enabled

Description

Ensure Route 53 zones have query logging enabled.

Usage

Run the control in your terminal:

powerpipe control run aws_compliance.control.route53_zone_query_logging_enabled

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run aws_compliance.control.route53_zone_query_logging_enabled --share

SQL

This control uses a named query:

select
id as resource,
case
when private_zone then 'skip'
when query_logging_configs is not null or jsonb_array_length(query_logging_configs) > 0 then 'ok'
else 'alarm'
end as status,
case
when private_zone then title || ' is private hosted zone.'
when query_logging_configs is not null or jsonb_array_length(query_logging_configs) > 0 then title || ' query logging to CloudWatch enabled.'
else title || ' query logging to CloudWatch disabled.'
end as reason
, region, account_id
from
aws_route53_zone;

Tags