Control: Ensure instances stopped for over 90 days are removed
Description
Enable this rule to help with the baseline configuration of Amazon Elastic Compute Cloud (Amazon EC2) instances by checking whether Amazon EC2 instances have been stopped for more than the allowed number of days, according to your organization's standards.
Usage
Run the control in your terminal:
powerpipe control run aws_compliance.control.ec2_stopped_instance_90_daysSnapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_compliance.control.ec2_stopped_instance_90_days --shareSQL
This control uses a named query:
select  arn as resource,  case    when instance_state not in ('stopped', 'stopping') then 'skip'    when state_transition_time <= (current_date - interval '90' day) then 'alarm'    else 'ok'  end as status,  case    when instance_state not in ('stopped', 'stopping') then title || ' is in ' || instance_state || ' state.'    else title || ' stopped since ' || to_char(state_transition_time , 'DD-Mon-YYYY') || ' (' || extract(day from current_timestamp - state_transition_time) || ' days).'  end as reason    , region, account_idfrom  aws_ec2_instance;