Audit event when accessing Terraform states

Release notes

Problem to solve

As a Compliance Manager, I want to know when any sensitive data might be modified or accessed, so I can sleep calmly.

Proposal

Add audit events to Terraform state data access:

  • terraform_state_changed: used for create and update as well; should include the state version number for updates
  • terraform_state_accessed: used for state reads; should include the version number
  • terraform_state_deleted: used for state removals; as we don't support removing a specific state version, there is no need for highlighting the version

Intended users

Feature Usage Metrics

Not needed.

Does this feature require an audit event?

ehh