Control: Ensure Cloud Guard is enabled in the root compartment of the tenancy
Cloud Guard detects misconfigured resources and insecure activity within a tenancy and provides security administrators with the visibility to resolve these issues. Upon detection, Cloud Guard can suggest, assist, or take corrective actions to mitigate these issues. Cloud Guard should be enabled in the root compartment of your tenancy with the default configuration, activity detectors and responders.
Run the control in your terminal:
steampipe check terraform_oci_compliance.control.cloudguard_enabled
Snapshot and share results via Steampipe Cloud:
steampipe loginsteampipe check --share terraform_oci_compliance.control.cloudguard_enabled
This control uses a named query:cloudguard_enabled