turbot/terraform_aws_compliance

Control: Ensure CloudWatch Logs destination policy has no wildcards

Description

Amazon CloudWatch Logs destination policy should avoid wildcard in 'principals' and 'actions'.

Usage

Run the control in your terminal:

powerpipe control run terraform_aws_compliance.control.cloudwatch_destination_policy_wildcards

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run terraform_aws_compliance.control.cloudwatch_destination_policy_wildcards --share

SQL

This control uses a named query:

cloudwatch_destination_policy_wildcards

Tags