Control: SSM managed instance patching should be compliant
Description
Enable this rule to help with identification and documentation of AWS Elastic Compute Cloud (AWS EC2) vulnerabilities.
Usage
Run the control in your terminal:
powerpipe control run aws_compliance.control.ssm_managed_instance_compliance_patch_compliantSnapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_compliance.control.ssm_managed_instance_compliance_patch_compliant --shareSQL
This control uses a named query:
select id as resource, case when c.status = '' then 'skip' when c.status = 'COMPLIANT' then 'ok' else 'alarm' end as status, case when c.status = '' then 'Patch is not applicable for instance ' || i.title || '.' when c.status = 'COMPLIANT' then c.resource_id || ' patch ' || c.title || ' is compliant.' else c.resource_id || ' patch ' || c.title || ' is non-compliant.' end as reason , c.region, c.account_idfrom aws_ssm_managed_instance as i, aws_ssm_managed_instance_compliance as cwhere c.resource_id = i.instance_id and c.compliance_type = 'Patch';