turbot/terraform_gcp_compliance

Query: compute_instance_confidential_computing_enabled

Usage

powerpipe query terraform_gcp_compliance.query.compute_instance_confidential_computing_enabled

Steampipe Tables

SQL

select
address as resource,
case
when (attributes_std -> 'confidential_instance_config') is null then 'alarm'
when (
attributes_std -> 'confidential_instance_config' -> 'enable_confidential_compute'
) :: bool then 'ok'
else 'alarm'
end status,
split_part(address, '.', 2) || case
when (attributes_std -> 'confidential_instance_config') is null then ' confidential computing disabled'
when (
attributes_std -> 'confidential_instance_config' -> 'enable_confidential_compute'
) :: bool then ' confidential computing enabled'
else ' confidential computing disabled'
end || '.' reason,
path || ':' || start_line
from
terraform_resource
where
type = 'google_compute_instance';

Controls

The query is being used by the following controls: