turbot/steampipe-mod-terraform-aws-compliance

Control: MSK Cluster Nodes should have encryption in transt enabled

Description

This control checks whether the MSK Cluster has encryption in transit enabled.

Usage

Run the control in your terminal:

powerpipe control run terraform_aws_compliance.control.msk_cluster_encryption_in_transit_enabled

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run terraform_aws_compliance.control.msk_cluster_encryption_in_transit_enabled --share

SQL

This control uses a named query:

select
address as resource,
case
when (attributes_std -> 'encryption_info') is null then 'alarm'
when ((attributes_std -> 'encryption_info' ->> 'client_broker') = 'TLS' and (attributes_std -> 'encryption_info' ->> 'in_cluster')::bool) then 'ok'
else 'alarm'
end as status,
split_part(address, '.', 2) || case
when (attributes_std -> 'encryption_info') is null then ' not encrypted'
when ((attributes_std -> 'encryption_info' ->> 'client_broker') = 'TLS' and (attributes_std -> 'encryption_info' ->> 'in_cluster')::bool) then ' encryption in transit enabled'
else ' encryption in transit disabled'
end || '.' as reason
, path || ':' || start_line
from
terraform_resource
where
type = 'aws_msk_cluster';

Tags