Audit event when accessing Terraform states
Release notes
Problem to solve
As a Compliance Manager, I want to know when any sensitive data might be modified or accessed, so I can sleep calmly.
Proposal
Add audit events to Terraform state data access:
-
terraform_state_changed: used for create and update as well; should include the state version number for updates -
terraform_state_accessed: used for state reads; should include the version number -
terraform_state_deleted: used for state removals; as we don't support removing a specific state version, there is no need for highlighting the version
Intended users
Feature Usage Metrics
Not needed.
Does this feature require an audit event?
ehh