Control: EMR cluster Kerberos should be enabled
Description
The access permissions and authorizations can be managed and incorporated with the principles of least privilege and separation of duties, by enabling Kerberos for Amazon EMR clusters.
Usage
Run the control in your terminal:
powerpipe control run terraform_aws_compliance.control.emr_cluster_kerberos_enabledSnapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run terraform_aws_compliance.control.emr_cluster_kerberos_enabled --shareSQL
This control uses a named query:
select  address as resource,  case    when (attributes_std -> 'kerberos_attributes') is null then 'alarm'    else 'ok'  end as status,  split_part(address, '.', 2) || case    when (attributes_std -> 'kerberos_attributes') is null then ' kerberos disabled'    else ' kerberos enabled'  end || '.' as reason    , path || ':' || start_linefrom  terraform_resourcewhere  type = 'aws_emr_cluster';