Control: Resource logs in Azure Key Vault Managed HSM should be enabled
Description
To recreate activity trails for investigation purposes when a security incident occurs or when your network is compromised, you may want to audit by enabling resource logs on Managed HSMs.
Usage
Run the control in your terminal:
powerpipe control run terraform_azure_compliance.control.keyvault_managed_hms_logging_enabled
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run terraform_azure_compliance.control.keyvault_managed_hms_logging_enabled --share
SQL
This control uses a named query:
keyvault_managed_hms_logging_enabled