Control: Ensure Compute instances are launched with Shielded VM enabled
Description
To defend against advanced threats and ensure that the boot loader and firmware on your VMs are signed and untampered, it is recommended that Compute instances are launched with Shielded VM enabled.
Usage
Run the control in your terminal:
powerpipe control run gcp_compliance.control.compute_instance_shielded_vm_enabledSnapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run gcp_compliance.control.compute_instance_shielded_vm_enabled --shareSQL
This control uses a named query:
select  self_link resource,  case    when shielded_instance_config @> '{"enableVtpm": true, "enableIntegrityMonitoring": true}' then 'ok'    else 'alarm'  end as status,  case    when shielded_instance_config @> '{"enableVtpm": true, "enableIntegrityMonitoring": true}'      then title || ' shielded VM enabled.'    else title || ' shielded VM not enabled.'  end as reason    , location as location, project as projectfrom  gcp_compute_instance;