Benchmark: ElastiCache
Description
This benchmark provides a set of controls that detect Terraform AWS ElastiCache resources deviating from security best practices.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-terraform-aws-compliance
Start the Powerpipe server:
steampipe service startpowerpipe server
Open http://localhost:9033 in your browser and select ElastiCache.
Run this benchmark in your terminal:
powerpipe benchmark run terraform_aws_compliance.benchmark.elasticache
Snapshot and share results via Turbot Pipes:
powerpipe benchmark run terraform_aws_compliance.benchmark.elasticache --share
Controls
- ElastiCache cluster should have subnet group
- ElastiCache Redis cluster should have auto minor version upgrade enabled
- ElastiCache Redis cluster automatic backup should be enabled with retention period of 15 days or greater
- ElastiCache replication group should be encrypted with KMS CMK
- ElastiCache replication group should be encrypted at rest
- ElastiCache replication group should be encrypted at transit
- ElastiCache replication group should be encrypted at transit