turbot/gcp_compliance

Query: dns_managed_zone_zone_signing_not_using_rsasha1

Usage

powerpipe query gcp_compliance.query.dns_managed_zone_zone_signing_not_using_rsasha1

Steampipe Tables

SQL

select
self_link resource,
case
when visibility = 'private' then 'skip'
when dnssec_config_state is null then 'alarm'
when dnssec_config_default_key_specs @> '[{"keyType": "zoneSigning", "algorithm": "rsasha1"}]' then 'alarm'
else 'ok'
end as status,
case
when visibility = 'private' then title || ' is private.'
when dnssec_config_state is null then title || ' DNSSEC not enabled.'
when dnssec_config_default_key_specs @> '[{"keyType": "zoneSigning", "algorithm": "rsasha1"}]' then title || ' using RSASHA1 algorithm for zone-signing.'
else title || ' not using RSASHA1 algorithm for zone-signing.'
end as reason,
project as project
from
gcp_dns_managed_zone;

Controls

The query is being used by the following controls: