Control: Ensure Legacy Authorization is set to Disabled on Kubernetes Engine Clusters
Usage
Run the control in your terminal:
powerpipe control run gcp_compliance.control.disable_gke_legacy_abac
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run gcp_compliance.control.disable_gke_legacy_abac --share
SQL
This control uses a named query:
select self_link resource, case when legacy_abac_enabled then 'alarm' else 'ok' end as status, case when legacy_abac_enabled then title || ' Legacy Authorization enabled.' else title || ' Legacy Authorization disabled.' end as reason , location as location, project as projectfrom gcp_kubernetes_cluster;