Skip to content

Commit 7daadb4

Browse files
committed
fix: change azuread name to entraid
1 parent e11c799 commit 7daadb4

31 files changed

+110
-110
lines changed

compliance/controls/aws/aws_sso_users_with_permission_assignments_are_required_to_have_MFA_on_AzureAD.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ Query:
88
ListOfTables:
99
- aws_identitystore_user
1010
- aws_ssoadmin_account_assignment
11-
- azuread_user_registration_details
11+
- entraid_user_registration_details
1212
Parameters: []
1313
PrimaryTable: aws_identitystore_user
1414
QueryToExecute: |
@@ -27,7 +27,7 @@ Query:
2727
FROM
2828
(aws_identitystore_user
2929
CROSS JOIN jsonb_array_elements(external_ids) AS external_id) iden
30-
INNER JOIN azuread_user_registration_details az
30+
INNER JOIN entraid_user_registration_details az
3131
ON az.id = value ->> 'Id'
3232
WHERE
3333
EXISTS (

compliance/controls/azure/azure_ad_guest_user_reviewed_monthly.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@ Query:
66
Engine: CloudQL-v0.0.1
77
ListOfTables:
88
- azure_tenant
9-
- azuread_user
9+
- entraid_user
1010
Parameters: []
11-
PrimaryTable: azuread_user
11+
PrimaryTable: entraid_user
1212
QueryToExecute: |
1313
SELECT
1414
u.display_name AS resource,
@@ -25,7 +25,7 @@ Query:
2525
END AS reason,
2626
t.tenant_id
2727
FROM
28-
azuread_user AS u
28+
entraid_user AS u
2929
LEFT JOIN
3030
azure_tenant AS t ON t.tenant_id = u.tenant_id
3131
WHERE

compliance/controls/azure/azure_cis_v130_1_3.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@ Query:
66
Engine: CloudQL-v0.0.1
77
ListOfTables:
88
- azure_tenant
9-
- azuread_user
9+
- entraid_user
1010
Parameters: []
11-
PrimaryTable: azuread_user
11+
PrimaryTable: entraid_user
1212
QueryToExecute: |
1313
WITH distinct_tenant AS (
1414
SELECT
@@ -33,7 +33,7 @@ Query:
3333
END AS reason,
3434
t.tenant_id
3535
FROM
36-
azuread_user AS u
36+
entraid_user AS u
3737
LEFT JOIN distinct_tenant AS t ON t.tenant_id = u.tenant_id
3838
WHERE
3939
u.user_type = 'Guest';

compliance/controls/azure/azure_cis_v140_1_3.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@ Query:
66
Engine: CloudQL-v0.0.1
77
ListOfTables:
88
- azure_tenant
9-
- azuread_user
9+
- entraid_user
1010
Parameters: []
11-
PrimaryTable: azuread_user
11+
PrimaryTable: entraid_user
1212
QueryToExecute: |
1313
WITH distinct_tenant AS (
1414
SELECT DISTINCT
@@ -33,7 +33,7 @@ Query:
3333
END AS reason,
3434
t.tenant_id
3535
FROM
36-
azuread_user AS u
36+
entraid_user AS u
3737
LEFT JOIN distinct_tenant AS t ON t.tenant_id = u.tenant_id
3838
WHERE
3939
u.user_type = 'Guest';

compliance/controls/azure/azure_cis_v150_1_14.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@ Query:
66
Engine: CloudQL-v0.0.1
77
ListOfTables:
88
- azure_tenant
9-
- azuread_authorization_policy
9+
- entraid_authorization_policy
1010
Parameters: []
11-
PrimaryTable: azuread_authorization_policy
11+
PrimaryTable: entraid_authorization_policy
1212
QueryToExecute: |
1313
WITH distinct_tenant AS (
1414
SELECT
@@ -33,7 +33,7 @@ Query:
3333
t.tenant_id
3434
FROM
3535
distinct_tenant AS t,
36-
azuread_authorization_policy AS a;
36+
entraid_authorization_policy AS a;
3737
Severity: low
3838
Tags: {}
3939
Title: 1.14 Ensure That ‘Users Can Register Applications’ Is Set to ‘No’

compliance/controls/azure/azure_cis_v150_1_19.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@ Query:
66
Engine: CloudQL-v0.0.1
77
ListOfTables:
88
- azure_tenant
9-
- azuread_authorization_policy
9+
- entraid_authorization_policy
1010
Parameters: []
11-
PrimaryTable: azuread_authorization_policy
11+
PrimaryTable: entraid_authorization_policy
1212
QueryToExecute: |
1313
WITH distinct_tenant AS (
1414
SELECT
@@ -33,7 +33,7 @@ Query:
3333
t.tenant_id
3434
FROM
3535
distinct_tenant AS t,
36-
azuread_authorization_policy AS a;
36+
entraid_authorization_policy AS a;
3737
Severity: low
3838
Tags: {}
3939
Title: 1.19 Ensure that 'Users can create security groups in Azure portals, API or PowerShell' is set to 'No'

compliance/controls/azure/azure_cis_v150_1_2_6.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@ Query:
66
Engine: CloudQL-v0.0.1
77
ListOfTables:
88
- azure_tenant
9-
- azuread_conditional_access_policy
9+
- entraid_conditional_access_policy
1010
Parameters: []
11-
PrimaryTable: azuread_conditional_access_policy
11+
PrimaryTable: entraid_conditional_access_policy
1212
QueryToExecute: |
1313
WITH distinct_tenant AS (
1414
SELECT
@@ -33,7 +33,7 @@ Query:
3333
t.tenant_id
3434
FROM
3535
distinct_tenant AS t,
36-
azuread_conditional_access_policy AS p;
36+
entraid_conditional_access_policy AS p;
3737
Severity: low
3838
Tags: {}
3939
Title: 1.2.6 Ensure Multi-factor Authentication is Required for Azure Management

compliance/controls/azure/azure_cis_v150_1_4.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,10 @@ IntegrationType:
55
Query:
66
Engine: CloudQL-v0.0.1
77
ListOfTables:
8-
- azuread_user
8+
- entraid_user
99
- azure_tenant
1010
Parameters: []
11-
PrimaryTable: azuread_user
11+
PrimaryTable: entraid_user
1212
QueryToExecute: |
1313
WITH distinct_tenant AS (
1414
SELECT
@@ -33,7 +33,7 @@ Query:
3333
END AS reason,
3434
t.tenant_id
3535
FROM
36-
azuread_user AS u
36+
entraid_user AS u
3737
LEFT JOIN
3838
distinct_tenant AS t ON t.tenant_id = u.tenant_id
3939
WHERE

compliance/controls/azure/azure_cis_v200_1_14.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@ Query:
66
Engine: CloudQL-v0.0.1
77
ListOfTables:
88
- azure_tenant
9-
- azuread_authorization_policy
9+
- entraid_authorization_policy
1010
Parameters: []
11-
PrimaryTable: azuread_authorization_policy
11+
PrimaryTable: entraid_authorization_policy
1212
QueryToExecute: |
1313
WITH distinct_tenant AS (
1414
SELECT
@@ -33,7 +33,7 @@ Query:
3333
t.tenant_id
3434
FROM
3535
distinct_tenant AS t,
36-
azuread_authorization_policy AS a;
36+
entraid_authorization_policy AS a;
3737
Severity: low
3838
Tags: {}
3939
Title: 1.14 Ensure That 'Users Can Register Applications' Is Set to 'No'

compliance/controls/azure/azure_cis_v200_1_19.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@ Query:
66
Engine: CloudQL-v0.0.1
77
ListOfTables:
88
- azure_tenant
9-
- azuread_authorization_policy
9+
- entraid_authorization_policy
1010
Parameters: []
11-
PrimaryTable: azuread_authorization_policy
11+
PrimaryTable: entraid_authorization_policy
1212
QueryToExecute: |
1313
WITH distinct_tenant AS (
1414
SELECT DISTINCT
@@ -33,7 +33,7 @@ Query:
3333
t.tenant_id
3434
FROM
3535
distinct_tenant AS t,
36-
azuread_authorization_policy AS a;
36+
entraid_authorization_policy AS a;
3737
Severity: low
3838
Tags: {}
3939
Title: 1.19 Ensure that 'Users can create security groups in Azure portals, API or PowerShell' is set to 'No'

0 commit comments

Comments
 (0)