Control: AWS > ECR > Repository > Allowed > Encryption at Rest
Take an action when a resource is not allowed based on encryption at rest configuration.
The Allowed > Encryption at Rest control checks if the resource encryption configuration complies with the defined policy levels. If the resource encryption is not allowed, this control raises an alarm and takes the defined enforcement action.
For any enforcement actions that specify if new, e.g., Enforce: Delete if not allowed and repository is new, this control will only take the enforcement actions for resources created within the last 60 minutes.
Resource Types
This control targets the following resource types:
Policies
The following policies can be used to configure this control:
This control type relies on these other policies when running actions:
- AWS > ECR > Repository > Allowed > Encryption at Rest > Level
- AWS > ECR > Repository > Allowed > Encryption at Rest > Level > Customer Managed Key
Permissions
Cloud permissions used by this control and its actions:
ecr:DeleteRepository
Category
In Your Workspace
Developers
- tmod:@turbot/aws-ecr#/control/types/repositoryAllowedEncryptionAtRest
- tmod:@turbot/turbot#/control/categories/resourceAllowed
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/aws-ecr#/control/types/repositoryAllowedEncryptionAtRest"
Get Controls