Turbot Guardrails Hub 
Hub
  • Mods
  • Policy Packs
  • Docs
  • Home
ModsPolicy PacksDocsHome
Mods
AWS
Loading policies...

Policy: AWS > RDS > DB Cluster Snapshot [Manual] > Approved > Custom

Determine whether the AWS RDS db cluster snapshot [manual] is allowed to exist. This policy will be evaluated by the Approved control. If an AWS RDS db cluster snapshot [manual] is not approved, it will be subject to the action specified in the AWS > RDS > DB Cluster Snapshot [Manual] > Approved policy. See Approved for more information.

Note: The policy value must be a string with a value of Approved, Not approved or Skip, or in the form of YAML objects. The object(s) must contain the key result with its value as Approved or Not approved. A custom title and message can also be added using the keys title and message respectively.

Targets

This policy targets the following resource types:

  • AWS > RDS > DB Cluster Snapshot [Manual]

Primary Policy

This policy is used with the following primary policy:

  • AWS > RDS > DB Cluster Snapshot [Manual] > Approved

Controls

Setting this policy configures this control:

  • AWS > RDS > DB Cluster Snapshot [Manual] > Approved

Policy Packs

This policy setting is used by the following policy packs:

  • Enforce AWS RDS DB Cluster Manual Snapshots Are Shared With Approved Accounts

Policy Specification

Default
Skip
Examples [YAML]
  • Approved
    
  • Not approved
    
  • Skip
    
  • result: Approved
    
  • title: string
    result: Not approved
    
  • title: string
    result: Approved
    message: string
    
  • - title: string
      result: Approved
      message: string
    - title: string
      result: Not approved
      message: string
    

Category

  • Resource > Approved

In Your Workspace

  • Policy Settings by Type report

Developers

    Category URI
    • tmod:@turbot/turbot#/control/categories/resourceApproved
  • Policy Type URI
    • tmod:@turbot/aws-rds#/policy/types/dbClusterSnapshotManualApprovedCustom
  • GraphQL
    • query policyType(id: "tmod:@turbot/aws-rds#/policy/types/dbClusterSnapshotManualApprovedCustom") { … }
    • query policySettings(filter: "policyTypeId:'tmod:@turbot/aws-rds#/policy/types/dbClusterSnapshotManualApprovedCustom'") { … }
    • query policyValues(filter: "policyTypeId:'tmod:@turbot/aws-rds#/policy/types/dbClusterSnapshotManualApprovedCustom'") { … }
  • CLI
    • Get Policy Type
    • turbot graphql policy-type --id "tmod:@turbot/aws-rds#/policy/types/dbClusterSnapshotManualApprovedCustom"
    • Get Policy Settings
    • turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/aws-rds#/policy/types/dbClusterSnapshotManualApprovedCustom"
Guardrails
Guardrails Hub
  • Hub
  • Docs
  • Blog
  • Changelog
Products
  • GuardrailsGuardrails
  • PipesPipes
  • SteampipeSteampipe
  • PowerpipePowerpipe
  • FlowpipeFlowpipe
  • TailpipeTailpipe
Turbot
  • Home
  • About us
  • We're hiring!
  • Contact us
Community

Our community of practitioners love to discuss cloud governance & security.

Slack logoJoin us on Slack →

System StatusLegalSecurity
Terms of UseSecurityPrivacy
180
Mods
497
Resource Types
8,691
Policies
3,362
Controls
1,833
Quick Actions
540
IAM