Steampipe MCP Server →
Steampipe Hub 
Hub
  • Plugins
  • Mods
  • Docs
  • Home
PluginsModsDocsHome
Plugins
turbot/gcp
GitHub Repo Stars
Overview
118
Tables
613
Queries
PowerpipeModsGitHub
steampipe plugin install gcpsteampipe plugin install gcp
Loading...
Get Involved
Edit on GitHubDiscuss on Slack

Query: Ensure that Cloud KMS cryptokeys are not anonymously or publicly accessible

Description

It is recommended that the IAM policy on Cloud KMS cryptokeys should restrict anonymous and/or public access.

Query

Tables used in this query:

  • gcp_kms_key

Controls using this query:

  • 1.9 Ensure that Cloud KMS cryptokeys are not anonymously or publicly accessible
  • 1.9 Ensure that Cloud KMS cryptokeys are not anonymously or publicly accessible
  • 1.9 Ensure that Cloud KMS cryptokeys are not anonymously or publicly accessible
  • 1.9 Ensure That Cloud KMS Cryptokeys Are Not Anonymously or Publicly Accessible
  • 1.9 Ensure That Cloud KMS Cryptokeys Are Not Anonymously or Publicly Accessible
  • Ensure that Cloud KMS cryptokeys are not anonymously or publicly accessible

SQL

Steampipe
Steampipe
  • Hub
  • Docs
  • Blog
  • Changelog
Products
  • GuardrailsGuardrails
  • PipesPipes
  • SteampipeSteampipe
  • PowerpipePowerpipe
  • FlowpipeFlowpipe
  • TailpipeTailpipe
Turbot
  • Home
  • About us
  • We're hiring!
  • Contact us
Community

Our community of 2,900+ practitioners love to discuss Steampipe, cloud intelligence & security.

Slack logoJoin us on Slack →

System StatusLegalSecurity
Terms of UseSecurityPrivacy