Control: Infrastructure encryption should be enabled for Azure Database for PostgreSQL servers
Description
Enable infrastructure encryption for Azure Database for PostgreSQL servers to have higher level of assurance that the data is secure. When infrastructure encryption is enabled, the data at rest is encrypted twice using FIPS 140-2 compliant Microsoft managed keys.
Usage
Run the control in your terminal:
powerpipe control run terraform_azure_compliance.control.postgresql_server_infrastructure_encryption_enabledSnapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run terraform_azure_compliance.control.postgresql_server_infrastructure_encryption_enabled --shareSQL
This control uses a named query:
select  address as resource,  case    when (attributes_std ->> 'infrastructure_encryption_enabled') is null then 'alarm'    when (attributes_std ->> 'infrastructure_encryption_enabled')::boolean then 'ok'    else 'alarm'  end status,  split_part(address, '.', 2) || case    when (attributes_std ->> 'infrastructure_encryption_enabled') is null then ' ''infrastructure_encryption_enabled'' not set'    when (attributes_std ->> 'infrastructure_encryption_enabled')::boolean then ' infrastructure encryption enabled'    else ' infrastructure encryption disabled'  end || '.' reason    , path || ':' || start_linefrom  terraform_resourcewhere  type = 'azurerm_postgresql_server';