turbot/terraform_azure_compliance

Control: Resource logs in Azure Key Vault Managed HSM should be enabled

Description

To recreate activity trails for investigation purposes when a security incident occurs or when your network is compromised, you may want to audit by enabling resource logs on Managed HSMs.

Usage

Run the control in your terminal:

powerpipe control run terraform_azure_compliance.control.keyvault_managed_hms_logging_enabled

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run terraform_azure_compliance.control.keyvault_managed_hms_logging_enabled --share

SQL

This control uses a named query:

keyvault_managed_hms_logging_enabled

Tags