turbot/terraform_azure_compliance

GitHub
Loading controls...

Control: PostgreSQL servers should use customer-managed keys to encrypt data at rest

Description

Use customer-managed keys to manage the encryption at rest of your PostgreSQL servers. By default, the data is encrypted at rest with service-managed keys, but customer-managed keys are commonly required to meet regulatory compliance standards. Customer-managed keys enable the data to be encrypted with an Azure Key Vault key created and owned by you. You have full control and responsibility for the key lifecycle, including rotation and management.

Usage

Run the control in your terminal:

steampipe check terraform_azure_compliance.control.postgres_sql_server_encrypted_at_rest_using_cmk

Snapshot and share results via Steampipe Cloud:

steampipe login
steampipe check --share terraform_azure_compliance.control.postgres_sql_server_encrypted_at_rest_using_cmk

SQL

This control uses a named query:

postgres_sql_server_encrypted_at_rest_using_cmk

Tags