Skip to content

Commit 24f7bf5

Browse files
authored
Merge pull request #15 from opengovern/fix-control-primarytables
Fix control primarytables
2 parents 728d38f + 3784371 commit 24f7bf5

38 files changed

+119
-39
lines changed

compliance/controls/aws/aws_cis_compute_service_v100_2_1_2.yaml

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,8 @@ Query:
1414
image_id AS resource,
1515
region,
1616
account_id,
17+
og_account_id,
18+
og_resource_id,
1719
tags,
1820
_ctx,
1921
BOOL_AND(COALESCE((mapping -> 'Ebs' ->> 'Encrypted')::text = 'true', FALSE)) AS all_encrypted
@@ -25,12 +27,14 @@ Query:
2527
region,
2628
account_id,
2729
tags,
28-
_ctx
30+
_ctx,
31+
og_account_id,
32+
og_resource_id
2933
)
3034
SELECT
3135
resource,
32-
image_id AS og_account_id,
33-
image_id AS og_resource_id,
36+
og_account_id,
37+
og_resource_id,
3438
CASE
3539
WHEN all_encrypted THEN 'ok'
3640
ELSE 'alarm'

compliance/controls/aws/aws_cis_v120_2_9.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,8 @@ Query:
1414
SELECT
1515
arn,
1616
account_id,
17+
og_resource_id,
18+
og_account_id,
1719
region,
1820
owner_id,
1921
vpc_id,

compliance/controls/aws/aws_cis_v130_4_13.yaml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -59,12 +59,12 @@ Query:
5959
aws_cloudwatch_log_metric_filter AS filter
6060
WHERE
6161
filter.filter_pattern ~ '\s*\$\.eventName\s*=\s*CreateRoute\s+'
62-
|| '\$\.eventName\s*=\s*CreateRouteTable\s+'
63-
|| '\$\.eventName\s*=\s*ReplaceRoute\s+'
64-
|| '\$\.eventName\s*=\s*ReplaceRouteTableAssociation\s+'
65-
|| '\$\.eventName\s*=\s*DeleteRouteTable\s+'
66-
|| '\$\.eventName\s*=\s*DeleteRoute\s+'
67-
|| '\$\.eventName\s*=\s*DisassociateRouteTable'
62+
|| filter.filter_pattern ~ '\$\.eventName\s*=\s*CreateRouteTable\s+'
63+
|| filter.filter_pattern ~ '\$\.eventName\s*=\s*ReplaceRoute\s+'
64+
|| filter.filter_pattern ~ '\$\.eventName\s*=\s*ReplaceRouteTableAssociation\s+'
65+
|| filter.filter_pattern ~ '\$\.eventName\s*=\s*DeleteRouteTable\s+'
66+
|| filter.filter_pattern ~ '\$\.eventName\s*=\s*DeleteRoute\s+'
67+
|| filter.filter_pattern ~ '\$\.eventName\s*=\s*DisassociateRouteTable'
6868
ORDER BY
6969
filter_name
7070
),

compliance/controls/aws/aws_ec2_instance_no_iam_passrole_and_lambda_invoke_function_access.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ Query:
4848
END AS reason
4949
FROM
5050
aws_ec2_instance AS i
51-
LEFT JOIN iam_roles AS r ON r.intance_arn = i.arn
51+
LEFT JOIN iam_roles AS r ON r.instance_arn = i.arn
5252
LEFT JOIN iam_role_with_permission AS p ON p.arn = r.role_arn;
5353
Severity: low
5454
Tags: {}

compliance/controls/aws/aws_foundational_security_ssm_2.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Query:
1111
PrimaryTable: aws_ssm_managed_instance
1212
QueryToExecute: |
1313
SELECT
14-
i.id AS resource,
14+
i.instance_id AS resource,
1515
i.og_account_id AS og_account_id,
1616
i.og_resource_id AS og_resource_id,
1717
CASE

compliance/controls/azure/azure_cis_v130_1_21.yaml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@ Query:
1515
role_name,
1616
role_type,
1717
title,
18+
og_account_id,
19+
og_resource_id,
1820
action,
1921
_ctx,
2022
subscription_id
@@ -46,6 +48,8 @@ Query:
4648
sub.subscription_id = cr.subscription_id
4749
GROUP BY
4850
cr.subscription_id,
51+
cr.og_account_id,
52+
cr.og_resource_id,
4953
cr._ctx,
5054
sub.display_name;
5155
Severity: low

compliance/controls/azure/azure_cis_v130_2_12.yaml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,10 @@ IntegrationType:
55
Query:
66
Engine: CloudQL-v0.0.1
77
ListOfTables:
8-
- azure_policy_assignment
98
- azure_subscription
9+
- azure_policy_assignment
1010
Parameters: []
11-
PrimaryTable: azure_policy_assignment
11+
PrimaryTable: azure_subscription
1212
QueryToExecute: |
1313
WITH policy_assignment_parameters AS (
1414
SELECT
@@ -45,6 +45,8 @@ Query:
4545
sub._ctx,
4646
sub.subscription_id,
4747
pol_assignment.subscription_id,
48+
sub.og_account_id,
49+
sub.og_resource_id,
4850
sub.display_name;
4951
Severity: low
5052
Tags: {}

compliance/controls/azure/azure_cis_v130_5_2_2.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,8 @@ Query:
4545
LEFT JOIN alert_rule a ON sub.subscription_id = a.subscription_id
4646
GROUP BY
4747
sub._ctx,
48+
sub.og_account_id,
49+
sub.og_resource_id,
4850
sub.subscription_id,
4951
sub.display_name;
5052
Severity: low

compliance/controls/azure/azure_cis_v130_5_2_3.yaml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,10 @@ IntegrationType:
55
Query:
66
Engine: CloudQL-v0.0.1
77
ListOfTables:
8-
- azure_log_alert
98
- azure_subscription
9+
- azure_log_alert
1010
Parameters: []
11-
PrimaryTable: azure_log_alert
11+
PrimaryTable: azure_subscription
1212
QueryToExecute: |
1313
WITH alert_rule AS (
1414
SELECT
@@ -55,6 +55,8 @@ Query:
5555
LEFT JOIN alert_rule a ON sub.subscription_id = a.subscription_id
5656
GROUP BY
5757
sub._ctx,
58+
sub.og_account_id,
59+
sub.og_resource_id,
5860
sub.subscription_id,
5961
sub.display_name;
6062
Severity: low

compliance/controls/azure/azure_cis_v130_5_2_4.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,8 @@ Query:
5757
GROUP BY
5858
sub._ctx,
5959
sub.subscription_id,
60+
sub.og_account_id,
61+
sub.og_resource_id,
6062
sub.display_name;
6163
Severity: low
6264
Tags: {}

0 commit comments

Comments
 (0)