Control: DocDB cluster audit logging should be enabled
Description
Ensure DocDB cluster audit logging is enabled.
Usage
Run the control in your terminal:
powerpipe control run terraform_aws_compliance.control.docdb_cluster_audit_logs_enabled
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run terraform_aws_compliance.control.docdb_cluster_audit_logs_enabled --share
SQL
This control uses a named query:
select address as resource, case when (attributes_std -> 'enabled_cloudwatch_logs_exports') is null then 'alarm' when '"audit"' in (select jsonb_array_elements(attributes_std -> 'enabled_cloudwatch_logs_exports') from terraform_resource where type = 'aws_docdb_cluster') then 'ok' else 'alarm' end as status, split_part(address, '.', 2) || case when (attributes_std -> 'enabled_cloudwatch_logs_exports') is null then ' logging not enabled' when '"audit"' in (select jsonb_array_elements(attributes_std -> 'enabled_cloudwatch_logs_exports') from terraform_resource where type = 'aws_docdb_cluster') then ' audit logging enabled' else ' audit logging not enabled' end || '.' as reason , path || ':' || start_linefrom terraform_resourcewhere type = 'aws_docdb_cluster';