bigquery_dataset_encrypted_with_cmkbigquery_dataset_not_publicly_accessiblebigquery_table_encrypted_with_cmkcompute_disk_encrypted_with_cskcompute_instance_block_project_wide_ssh_enabledcompute_instance_confidential_computing_enabledcompute_instance_ip_forwarding_disabledcompute_instance_oslogin_enabledcompute_instance_serial_port_connection_disabledcompute_instance_shielded_vm_enabledcompute_instance_with_no_default_service_accountcompute_instance_with_no_default_service_account_with_full_accesscompute_instance_with_no_public_ip_addressescompute_network_contains_no_default_networkcompute_network_contains_no_legacy_networkcompute_subnetwork_flow_log_enabledcompute_subnetwork_private_ip_google_accessdns_managed_zone_dnssec_enableddns_managed_zone_key_signing_not_using_rsasha1dns_managed_zone_zone_signing_not_using_rsasha1iam_service_account_gcp_managed_keykms_key_rotated_within_100_daykms_key_rotated_within_90_daykubernetes_cluster_auto_repair_enabledkubernetes_cluster_auto_upgrade_enabledkubernetes_cluster_legacy_abac_enabledkubernetes_cluster_legacy_endpoints_disabledkubernetes_cluster_network_policy_installedkubernetes_cluster_node_config_image_cos_containerdkubernetes_cluster_private_cluster_config_enabledlogging_bucket_retention_policy_enabledsql_instance_automated_backups_enabledsql_instance_mysql_local_infile_database_flag_offsql_instance_mysql_skip_show_database_flag_onsql_instance_postgresql_log_checkpoints_database_flag_onsql_instance_postgresql_log_connections_database_flag_onsql_instance_postgresql_log_disconnections_database_flag_onsql_instance_postgresql_log_duration_database_flag_onsql_instance_postgresql_log_executor_stats_database_flag_offsql_instance_postgresql_log_hostname_database_flag_configuredsql_instance_postgresql_log_lock_waits_database_flag_onsql_instance_postgresql_log_min_duration_statement_database_flag_disabledsql_instance_postgresql_log_parser_stats_database_flag_offsql_instance_postgresql_log_planner_stats_database_flag_offsql_instance_postgresql_log_statement_stats_database_flag_offsql_instance_postgresql_log_temp_files_database_flag_0sql_instance_require_ssl_enabledsql_instance_sql_3625_trace_database_flag_offsql_instance_sql_contained_database_authentication_database_flag_offsql_instance_sql_cross_db_ownership_chaining_database_flag_offsql_instance_sql_external_scripts_enabled_database_flag_offsql_instance_sql_remote_access_database_flag_offsql_instance_sql_user_options_database_flag_not_configuredstorage_bucket_not_publicly_accessiblestorage_bucket_uniform_access_enabled
Query: dns_managed_zone_zone_signing_not_using_rsasha1
Usage
steampipe query terraform_gcp_compliance.query.dns_managed_zone_zone_signing_not_using_rsasha1
Plugins & Tables
SQL
select type || ' ' || name as resource, case when (arguments ->> 'visibility') = 'private' then 'skip' when (arguments -> 'dnssec_config') is null or coalesce((arguments -> 'dnssec_config' ->> 'state'), '') in ('', 'off') then 'alarm' when ( arguments -> 'dnssec_config' -> 'default_key_specs' ->> 'algorithm' ) = 'rsasha1' and ( arguments -> 'dnssec_config' -> 'default_key_specs' ->> 'key_type' ) = 'zoneSigning' then 'alarm' else 'ok' end as status, name || case when (arguments -> 'dnssec_config') is null then ' ''dnssec_config'' is not defined' when coalesce((arguments -> 'dnssec_config' ->> 'state'), '') = '' then ' ''dnssec_config.state'' is not defined' when (arguments ->> 'visibility') = 'private' then ' is private' when coalesce((arguments -> 'dnssec_config' ->> 'state'), '') = 'off' then ' DNSSEC not enabled' when ( arguments -> 'dnssec_config' -> 'default_key_specs' ->> 'algorithm' ) = 'rsasha1' and ( arguments -> 'dnssec_config' -> 'default_key_specs' ->> 'key_type' ) = 'zoneSigning' then ' using RSASHA1 algorithm for zone-signing' else ' not using RSASHA1 algorithm for zone-signing' end || '.' reason, path || ':' || start_linefrom terraform_resourcewhere type = 'google_dns_managed_zone';
Controls
The query is being used by the following controls: