turbot/steampipe-mod-gcp-compliance

Control: GKE clusters should have database encryption enabled

Description

This control ensures that GKE clusters have database encryption enabled.

Usage

Run the control in your terminal:

powerpipe control run gcp_compliance.control.kubernetes_cluster_database_encryption_enabled

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run gcp_compliance.control.kubernetes_cluster_database_encryption_enabled --share

SQL

This control uses a named query:

select
self_link resource,
case
when database_encryption_state <> 'ENCRYPTED' then 'alarm'
else 'ok'
end as status,
case
when database_encryption_state <> 'ENCRYPTED' then title || ' database encryption disabled.'
else title || ' database encryption enabled.'
end as reason
, location as location, project as project
from
gcp_kubernetes_cluster;

Tags