Control: Ensure VM disks for critical VMs are encrypted with Customer-Supplied Encryption Keys (CSEK)
Customer-Supplied Encryption Keys (CSEK) are a feature in Google Cloud Storage and Google Compute Engine. If you supply your own encryption keys, Google uses your key to protect the Google-generated keys used to encrypt and decrypt your data. By default, Google Compute Engine encrypts all data at rest. Compute Engine handles and manages this encryption for you without any additional actions on your part. However, if you wanted to control and manage this encryption yourself, you can provide your own encryption keys.
Run the control in your terminal:
steampipe check terraform_gcp_compliance.control.compute_disk_encrypted_with_csk
Snapshot and share results via Steampipe Cloud:
steampipe loginsteampipe check --share terraform_gcp_compliance.control.compute_disk_encrypted_with_csk
This control uses a named query:compute_disk_encrypted_with_csk