Control: Both operating systems and data disks in Azure Kubernetes Service clusters should be encrypted by customer-managed keys
Description
Encrypting OS and data disks using customer-managed keys provides more control and greater flexibility in key management. This is a common requirement in many regulatory and industry compliance standards.
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.kubernetes_cluster_os_and_data_disks_encrypted_with_cmk
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.kubernetes_cluster_os_and_data_disks_encrypted_with_cmk --share
SQL
This control uses a named query:
select c.id as resource, case when disk_encryption_set_id is not null then 'ok' else 'alarm' end as status, case when disk_encryption_set_id is not null then c.name || ' os and data diska encrypted with CMK.' else c.name || ' os and data diska not encrypted with CMK.' end as reason , c.resource_group as resource_group , sub.display_name as subscriptionfrom azure_kubernetes_cluster c, azure_subscription subwhere sub.subscription_id = c.subscription_id;