turbot/terraform_gcp_compliance

GitHub
Loading controls...

Control: Ensure that RSASHA1 is not used for key-signing key in Cloud DNS

Usage

Run the control in your terminal:

steampipe check terraform_gcp_compliance.control.dnssec_prevent_rsasha1_ksk

Snapshot and share results via Steampipe Cloud:

steampipe login
steampipe check --share terraform_gcp_compliance.control.dnssec_prevent_rsasha1_ksk

SQL

This control uses a named query:

dns_managed_zone_key_signing_not_using_rsasha1

Tags