Control: Log group encryption at rest should be enabled
Description
To help protect sensitive data at rest, ensure encryption is enabled for your Amazon CloudWatch Log Group.
Usage
Run the control in your terminal:
powerpipe control run terraform_aws_compliance.control.log_group_encryption_at_rest_enabledSnapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run terraform_aws_compliance.control.log_group_encryption_at_rest_enabled --shareSQL
This control uses a named query:
select  address as resource,  case    when (attributes_std -> 'kms_key_id') is not null then 'ok'    else 'alarm'  end status,  split_part(address, '.', 2) || case    when (attributes_std -> 'kms_key_id') is not null then ' encrypted at rest'    else ' not encrypted at rest'  end || '.' reason    , path || ':' || start_linefrom  terraform_resourcewhere  type = 'aws_cloudwatch_log_group';