Control: GKE clusters should have database encryption enabled
Description
This control ensures that GKE clusters have database encryption enabled.
Usage
Run the control in your terminal:
powerpipe control run gcp_compliance.control.kubernetes_cluster_database_encryption_enabled
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run gcp_compliance.control.kubernetes_cluster_database_encryption_enabled --share
SQL
This control uses a named query:
select self_link resource, case when database_encryption_state <> 'ENCRYPTED' then 'alarm' else 'ok' end as status, case when database_encryption_state <> 'ENCRYPTED' then title || ' database encryption disabled.' else title || ' database encryption enabled.' end as reason , location as location, project as projectfrom gcp_kubernetes_cluster;