turbot/gcp_compliance

Query: compute_instance_confidential_computing_enabled

Usage

powerpipe query gcp_compliance.query.compute_instance_confidential_computing_enabled

Steampipe Tables

SQL

select
self_link resource,
case
when confidential_instance_config @> '{"enableConfidentialCompute": true}' then 'ok'
else 'alarm'
end as status,
case
when confidential_instance_config @> '{"enableConfidentialCompute": true}' then title || ' confidential computing enabled.'
else title || ' confidential computing not enabled.'
end as reason,
location as location,
project as project
from
gcp_compute_instance;

Controls

The query is being used by the following controls: