standard
turbot/aws_compliance
Get Involved
Version
Pipeline: Encrypt CloudTrail logs
Encrypts CloudTrail logs with a cmk.
Run the pipeline
To run this pipeline from your terminal:
flowpipe pipeline run aws_compliance.pipeline.encrypt_cloud_trail_logs \ --arg 'key_id=<string>' \ --arg 'region=<string>' \ --arg 'trail_name=<string>' \ --arg 'conn=<connection.aws>'
Use this pipeline
To call this pipeline from your pipeline, use a step:
step "pipeline" "step_name" { pipeline = aws_compliance.pipeline.encrypt_cloud_trail_logs args = { key_id = <string> region = <string> trail_name = <string> conn = <connection.aws> }}
Params
Name | Type | Required | Description | Default |
---|---|---|---|---|
key_id | string | Yes | The id of the cmk to use for encryption. | - |
region | string | Yes | AWS Region of the resource(s). | - |
trail_name | string | Yes | The name of the CloudTrail trail. | - |
conn | connection.aws | Yes | Name of the AWS connection to be used for any authenticated actions. | - |
Outputs
This pipeline has no outputs.
Tags
category = Compliance
folder = Internal
mod = aws
service = AWS/Cloudtrail