turbot/terraform_oci_compliance

Control: Ensure Cloud Guard is enabled in the root compartment of the tenancy

Description

Cloud Guard detects misconfigured resources and insecure activity within a tenancy and provides security administrators with the visibility to resolve these issues. Upon detection, Cloud Guard can suggest, assist, or take corrective actions to mitigate these issues. Cloud Guard should be enabled in the root compartment of your tenancy with the default configuration, activity detectors and responders.

Usage

Run the control in your terminal:

powerpipe control run terraform_oci_compliance.control.cloudguard_enabled

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run terraform_oci_compliance.control.cloudguard_enabled --share

SQL

This control uses a named query:

cloudguard_enabled

Tags