turbot/terraform_gcp_compliance

GitHub
Loading controls...

Control: Ensure KMS encryption keys are rotated within a period of 90 days

Description

Google Cloud Key Management Service stores cryptographic keys in a hierarchical structure designed for useful and elegant access control management. The format for the rotation schedule depends on the client library that is used. For the gcloud command-line tool, the next rotation time must be in ISO or RFC3339 format, and the rotation period must be in the form INTEGER[UNIT], where units can be one of seconds (s), minutes (m), hours (h) or days (d).

Usage

Run the control in your terminal:

steampipe check terraform_gcp_compliance.control.kms_key_rotated_within_90_day

Snapshot and share results via Steampipe Cloud:

steampipe login
steampipe check --share terraform_gcp_compliance.control.kms_key_rotated_within_90_day

SQL

This control uses a named query:

kms_key_rotated_within_90_day

Tags