standard
turbot/aws_compliance
Get Involved
Version
Pipeline: Detect & correct CloudTrail trail logs not encrypted with KMS CMK
Detect CloudTrail trail logs not encrypted with KMS CMK and then skip or encrypt with KMS CMK.
Run the pipeline
To run this pipeline from your terminal:
flowpipe pipeline run aws_compliance.pipeline.detect_and_correct_cloudtrail_trail_logs_not_encrypted_with_kms_cmk \ --arg 'kms_key_id=<string>'
Use this pipeline
To call this pipeline from your pipeline, use a step:
step "pipeline" "step_name" { pipeline = aws_compliance.pipeline.detect_and_correct_cloudtrail_trail_logs_not_encrypted_with_kms_cmk args = { kms_key_id = <string> }}
Params
Name | Type | Required | Description | Default |
---|---|---|---|---|
database | connection.steampipe | Yes | Database connection string. | connection.steampipe.default |
kms_key_id | string | Yes | Specifies the KMS key ID to use to encrypt the logs delivered by CloudTrail. | - |
notifier | notifier | Yes | The name of the notifier to use for sending notification messages. | notifier.default |
notification_level | string verbose , info , error | Yes | The verbosity level of notification messages to send. | info |
approvers | list(notifier) | Yes | List of notifiers to be used for obtaining action/approval decisions. | notifier.default |
default_action | string notify , skip , encrypt_cloud_trail_logs | Yes | The default action to use when there are no approvers. | notify |
enabled_actions | list(string) skip , encrypt_cloud_trail_logs | Yes | The list of enabled actions approvers can select. |
|
Outputs
This pipeline has no outputs.
Tags
category = Compliance
mod = aws
service = AWS/Cloudtrail