Benchmark: Cryptographic Key Establishment And Management (SC-12)
Description
The organization establishes and manages cryptographic keys for required cryptography employed within the information system in accordance with [Assignment: organization-defined requirements for key generation, distribution, storage, access, and destruction].
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-azure-compliance
Start the Powerpipe server:
steampipe service startpowerpipe server
Open http://localhost:9033 in your browser and select Cryptographic Key Establishment And Management (SC-12).
Run this benchmark in your terminal:
powerpipe benchmark run azure_compliance.benchmark.fedramp_high_sc_12
Snapshot and share results via Turbot Pipes:
powerpipe benchmark run azure_compliance.benchmark.fedramp_high_sc_12 --share
Controls
- Azure Batch account should use customer-managed keys to encrypt data
- Cognitive Services accounts should enable data encryption with a customer-managed key
- OS and data disks should be encrypted with a customer-managed key
- Managed disks should be double encrypted with both platform-managed and customer-managed keys
- Container registries should be encrypted with a customer-managed key
- Azure Cosmos DB accounts should use customer-managed keys to encrypt data at rest
- Event Hub namespaces should use a customer-managed key for encryption
- Azure HDInsight clusters should use customer-managed keys to encrypt data at rest
- Azure HDInsight clusters should use encryption at host to encrypt data at rest
- Azure API for FHIR should use a customer-managed key to encrypt data at rest
- HPC Cache accounts should use customer-managed key for encryption
- Both operating systems and data disks in Azure Kubernetes Service clusters should be encrypted by customer-managed keys
- Azure Data Explorer encryption at rest should use a customer-managed key
- Azure Machine Learning workspaces should be encrypted with a customer-managed key
- SQL managed instances should use customer-managed keys to encrypt data at rest
- MySQL servers should use customer-managed keys to encrypt data at rest
- PostgreSQL servers should use customer-managed keys to encrypt data at rest
- Service Bus Premium namespaces should use a customer-managed key for encryption
- SQL servers should use customer-managed keys to encrypt data at rest
- Storage accounts should use customer-managed key for encryption
- Storage account encryption scopes should use customer-managed keys to encrypt data at rest
- Azure Synapse workspaces should use customer-managed keys to encrypt data at rest