Benchmark: 2.1.1.2.1 Ensure Critical Data is Encrypted with Customer Managed Keys (CMK)
Description
Customer Managed Keys introduce additional depth to security by providing a means to manage access control for encryption keys.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-azure-compliance
Start the Powerpipe server:
steampipe service startpowerpipe server
Open http://localhost:9033 in your browser and select 2.1.1.2.1 Ensure Critical Data is Encrypted with Customer Managed Keys (CMK).
Run this benchmark in your terminal:
powerpipe benchmark run azure_compliance.benchmark.cis_v400_2_1_1_2_1
Snapshot and share results via Turbot Pipes:
powerpipe benchmark run azure_compliance.benchmark.cis_v400_2_1_1_2_1 --share
Controls
- Azure Batch account should use customer-managed keys to encrypt data
- Cognitive Services accounts should enable data encryption with a customer-managed key
- OS and data disks should be encrypted with a customer-managed key
- Container Instance container group should use customer-managed key for encryption
- Container registries should be encrypted with a customer-managed key
- Azure Cosmos DB accounts should use customer-managed keys to encrypt data at rest
- Databricks workspaces should have a customer-managed key configured
- Event Hub namespaces should use a customer-managed key for encryption
- Azure HDInsight clusters should use customer-managed keys to encrypt data at rest
- Azure API for FHIR should use a customer-managed key to encrypt data at rest
- HPC Cache accounts should use customer-managed key for encryption
- Azure Data Explorer encryption at rest should use a customer-managed key
- Azure Machine Learning workspaces should be encrypted with a customer-managed key
- MySQL servers should use customer-managed keys to encrypt data at rest
- Service Bus Premium namespaces should use a customer-managed key for encryption
- SQL servers should use customer-managed keys to encrypt data at rest
- Storage accounts should use customer-managed key for encryption
- Azure Synapse workspaces should use customer-managed keys to encrypt data at rest