ServiceNow CMDB CI relationship sync: faster, more complete →
Policy Packs
GCP CIS v2.0.0 - Section 1 - Identity and Access Management

Policy Setting: GCP > KMS > Crypto Key > Approved > Custom

Policies

This policy setting is dependent on the following policy types:

Source

resource "turbot_policy_setting" "gcp_kms_crypto_key_approved_custom" {
resource = turbot_policy_pack.main.id
type = "tmod:@turbot/gcp-kms#/policy/types/cryptoKeyApprovedCustom"
note = "GCP CIS v2.0.0 - Control: 1.10"
template_input = <<-EOT
{
cryptoKey {
rotationPeriod: get(path: "rotationPeriod")
keyState: get(path: "primary.state")
}
}
EOT
template = <<-EOT
{%- if $.cryptoKey.keyState == "DISABLED" or $.cryptoKey.keyState == "DESTROY_SCHEDULED" or $.cryptoKey.keyState == "DESTROYED" -%}
{%- set data = {
"title": "Rotation",
"result": "Skip",
"message": "Crypto key is not ENABLED"
} -%}
{%- else -%}
{%- set rotationPeriodWithoutSeconds = $.cryptoKey.rotationPeriod.slice(0, -1) -%}
{%- set rotationPeriodInDays = rotationPeriodWithoutSeconds / 86400 -%}
{%- if rotationPeriodInDays <= 90 -%}
{%- set data = {
"title": "Rotation",
"result": "Approved",
"message": "Crypto key is rotated every 90 days"
} -%}
{%- elif rotationPeriodInDays > 90 -%}
{%- set data = {
"title": "Rotation",
"result": "Not approved",
"message": "Crypto key is not rotated every 90 days"
} -%}
{%- else -%}
{%- set data = {
"title": "Rotation",
"result": "Skip",
"message": "No data for crypto key yet"
} -%}
{%- endif %}
{%- endif -%}
{{ data | json }}
EOT
}