Control: Azure Batch account should use customer-managed keys to encrypt data
Use customer-managed keys to manage the encryption at rest of your Batch account's data. By default, customer data is encrypted with service-managed keys, but customer-managed keys are commonly required to meet regulatory compliance standards. Customer-managed keys enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management.
Run the control in your terminal:
steampipe check terraform_azure_compliance.control.batch_account_encrypted_with_cmk
Snapshot and share results via Steampipe Cloud:
steampipe loginsteampipe check --share terraform_azure_compliance.control.batch_account_encrypted_with_cmk
This control uses a named query:batch_account_encrypted_with_cmk