Steampipe MCP Server →
Steampipe Hub 
Hub
  • Plugins
  • Mods
  • Docs
  • Home
PluginsModsDocsHome
Plugins
turbot/terraform
GitHub Repo Stars
Overview
7
Tables
829
Queries
PowerpipeModsGitHub
steampipe plugin install terraformsteampipe plugin install terraform
Get Involved
Edit on GitHubDiscuss on Slack

Query: CloudTrail trail logs should be encrypted with KMS CMK

Description

To help protect sensitive data at rest, ensure encryption is enabled for your AWS CloudWatch Log Groups.

Query

Tables used in this query:

  • terraform_resource

Controls using this query:

  • 2 CloudTrail should have encryption at rest enabled
  • 2.7 Ensure CloudTrail logs are encrypted at rest using KMS CMKs
  • 3.5 Ensure CloudTrail logs are encrypted at rest using KMS CMKs
  • 3.5 Ensure CloudTrail logs are encrypted at rest using KMS CMKs
  • 3.5 Ensure CloudTrail logs are encrypted at rest using KMS CMKs
  • 3.7 Ensure CloudTrail logs are encrypted at rest using KMS CMKs
  • 3.7 Ensure CloudTrail logs are encrypted at rest using KMS CMKs
  • 3.7 Ensure CloudTrail logs are encrypted at rest using KMS CMKs
  • 3.7 Ensure CloudTrail logs are encrypted at rest using KMS CMKs
  • 4.5 Ensure CloudTrail logs are encrypted at rest using KMS CMKs
  • CloudTrail trail logs should be encrypted with KMS CMK

SQL

Steampipe
Steampipe
  • Hub
  • Docs
  • Blog
  • Changelog
Products
  • GuardrailsGuardrails
  • PipesPipes
  • SteampipeSteampipe
  • PowerpipePowerpipe
  • FlowpipeFlowpipe
  • TailpipeTailpipe
Turbot
  • Home
  • About us
  • We're hiring!
  • Contact us
Community

Our community of 3,000+ practitioners love to discuss Steampipe, cloud intelligence & security.

Slack logoJoin us on Slack →

System StatusLegalSecurity
Terms of UseSecurityPrivacy