turbot/steampipe-mod-terraform-aws-compliance

Control: ElastiCache replication group should be encrypted at transit

Description

This control checks whether all data stored in the Elasticache Replication Group is securely encrypted at transit.

Usage

Run the control in your terminal:

powerpipe control run terraform_aws_compliance.control.elasticache_replication_group_encryption_in_transit_enabled_auth_token

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run terraform_aws_compliance.control.elasticache_replication_group_encryption_in_transit_enabled_auth_token --share

SQL

This control uses a named query:

select
address as resource,
case
when (attributes_std ->> 'transit_encryption_enabled')::boolean and (attributes_std ->> 'auth_token') is not null then 'ok'
else 'alarm'
end status,
split_part(address, '.', 2) || case
when (attributes_std ->> 'transit_encryption_enabled')::boolean and (attributes_std ->> 'auth_token') is not null then ' encrypted in transit and auth token set'
when (attributes_std ->> 'transit_encryption_enabled')::boolean and (attributes_std ->> 'auth_token') is null then ' encrypted in transit but auth token not set'
when (attributes_std ->> 'auth_token') is not null then 'not encrypted in transit but auth token set'
else ' not encrypted in transit and auth token not set'
end || '.' as reason
, path || ':' || start_line
from
terraform_resource
where
type = 'aws_elasticache_replication_group';

Tags