turbot/aws_compliance

Query: secretsmanager_secret_encrypted_with_kms_cmk

Usage

powerpipe query aws_compliance.query.secretsmanager_secret_encrypted_with_kms_cmk

SQL

with encryption_keys as (
select
distinct s.arn,
k.aliases as alias
from
aws_secretsmanager_secret as s
left join aws_kms_key as k on k.arn = s.kms_key_id
where
jsonb_array_length(k.aliases) > 0
)
select
s.arn as resource,
case
when kms_key_id is null
or kms_key_id = 'alias/aws/secretsmanager'
or k.alias @> '[{"AliasName":"alias/aws/secretsmanager"}]' then 'alarm'
else 'ok'
end as status,
case
when kms_key_id is null then title || ' not encrypted with KMS.'
when kms_key_id = 'alias/aws/secretsmanager'
or k.alias @> '[{"AliasName":"alias/aws/secretsmanager"}]' then title || ' encrypted with AWS managed key.'
else title || ' encrypted with CMK.'
end as reason,
region,
account_id
from
aws_secretsmanager_secret as s
left join encryption_keys as k on s.arn = k.arn;

Controls

The query is being used by the following controls: