Turbot Guardrails Hub 
Hub
  • Mods
  • Policy Packs
  • Docs
  • Home
ModsPolicy PacksDocsHome
Mods
AWS
Loading resources...

Resource Type: AWS > KMS > Key

Resource Context

Key is a part of the KMS service.

Each Key lives under a Region.

Controls

The primary controls for AWS > KMS > Key are:

  • Active
  • Allowed
  • Approved
  • CMDB
  • Configured
  • Discovery
  • Intelligent Assessment
  • Policy Statements
  • Rotation
  • ServiceNow
  • Tags
  • Usage

It is also targeted by these controls:

  • AWS > CIS v1 > 2 Logging > 2.08 Ensure rotation for customer created CMKs is enabled (Scored)
  • AWS > CIS v1.4 > 3 - Logging > 3.08 - Ensure rotation for customer created CMKs is enabled (Automated)
  • AWS > CIS v2.0 > 3 - Logging > 3.08 - Ensure rotation for customer created symmetric CMKs is enabled
  • AWS > CIS v3.0 > 3 - Logging > 3.06 - Ensure rotation for customer created symmetric CMKs is enabled
  • AWS > CIS v4.0 > 3 - Logging > 3.06 - Ensure rotation for customer-created symmetric CMKs is enabled
  • AWS > CIS v5.0 > 3 - Logging > 3.06 - Ensure rotation for customer-created symmetric CMKs is enabled
  • AWS > CIS v6.0 > 4 - Logging > 4.06 - Ensure rotation for customer-created symmetric CMKs is enabled
  • AWS > HIPAA > KMS > KMS CMK rotation should be enabled
  • AWS > HIPAA > KMS > KMS keys should not be pending deletion
  • AWS > NIST 800-53 > KMS > KMS CMK rotation should be enabled
  • AWS > NIST 800-53 > KMS > KMS keys should not be pending deletion
  • AWS > PCI v3.2.1 > KMS > 1 Customer master key (CMK) rotation should be enabled

Quick Actions

  • Delete
  • Delete from AWS
  • Disable
  • Router
  • Set Rotation
  • Set Tags
  • Skip alarm for Active control
  • Skip alarm for Active control [90 days]
  • Skip alarm for Approved control
  • Skip alarm for Approved control [90 days]
  • Skip alarm for Tags control
  • Skip alarm for Tags control [90 days]
  • Update Key Policy Statements
  • Update Tags

Category

  • Security

In Your Workspace

  • Controls by Resource Type report
  • Policy Settings by Resource Type report
  • Resources by Resource Type report

Developers

    Resource Type URI
    • tmod:@turbot/aws-kms#/resource/types/key
  • Category URI
    • tmod:@turbot/turbot#/resource/categories/security
  • GraphQL
    • query resource(id: "tmod:@turbot/aws-kms#/resource/types/key") { … }
    • query resourceActivities(filter: "resourceId:'tmod:@turbot/aws-kms#/resource/types/key'") { … }
    • mutation createResource(input: { … })
    • mutation updateResource(input: { … })
  • CLI
    • Get Resource
    • turbot graphql resource --id "tmod:@turbot/aws-kms#/resource/types/key"
  • Steampipe Query
    • Get Resource
    • select * from guardrails_resource where resource_type_uri = 'tmod:@turbot/aws-kms#/resource/types/key';
    • Get Policy Settings (By Resource ID)
    • select * from guardrails_policy_setting where filter = 'resourceTypeId:"tmod:@turbot/aws-kms#/resource/types/key"';
    • Get Resource Notification
    • select * from guardrails_notification where resource_type_uri = 'tmod:@turbot/aws-kms#/resource/types/key' and notification_type in ('resource_updated', 'resource_created');
Guardrails
Guardrails Hub
  • Hub
  • Docs
  • Blog
  • Changelog
Products
  • GuardrailsGuardrails
  • PipesPipes
  • SteampipeSteampipe
  • PowerpipePowerpipe
  • FlowpipeFlowpipe
  • TailpipeTailpipe
Turbot
  • Home
  • About us
  • We're hiring!
  • Contact us
Community

Our community of practitioners love to discuss cloud governance & security.

Slack logoJoin us on Slack →

System StatusLegalSecurity
Terms of UseSecurityPrivacy
180
Mods
497
Resource Types
8,691
Policies
3,362
Controls
1,833
Quick Actions
540
IAM