Identity, people, and access
Most of these queries depend on proper mapping of custom properties or profile attributes from your HR system or identity provider to the Person/employee entities.
Who are the new hires within the last 12 months?
If you have been using JupiterOne for more than a year:
Find employee with _createdOn > date.now-12months
If your employee data source / user identity provider is Okta:
Find okta_user with created > date.now-12months
Who are the contractors?
Requires mapping from your HR system or IdP to capture the employment type.
Find employee with employment = 'contractor'
If you have a user group called 'Contractors':
Find User that (has|assigned) UserGroup
with displayName='Contractors' or name='Contractors'
Who are remote workers?
If the user or employee entity has a remote flag:
Find (User|employee) with remote=true
If you have a user group called 'Remote':
Find User that (has|assigned) UserGroup
with displayName='Remote' or name='Remote'
Who are the employees missing metadata about role?
Find employee with role=undefined
Who are the employees missing metadata about team or department?
Find employee with department=undefined
Find employee that !relates to Team
Who are the employees missing metadata about team or department with access to environment?
Find employee with department=undefined
that is User
that relates to (Account|AccessRole|UserGroup|Service)
with tag.AccountName = '{accountName}'
Who are the employees missing metadata about team or department with privileged access?
Find employee with department=undefined
that is User
that assigned (AccessPolicy|AccessRole) with admin=true
Find employee with department=undefined
that is User
that assigned AccessRole
that assigned AccessPolicy with admin=true
Who or what service has been assigned permissions with administrator/privileged access?
Find AccessPolicy with admin=true as policy
that ASSIGNED * as e
return policy.displayName, policy.webLink, e._type, e.displayName, e.webLink
Who is able to make changes in a production data connected environment, and what changes can they make?
We plan to do more in-depth analysis of AWS IAM policies to determine access. In the meantime, we determine admin access based on policy name and you can run the following query to find them.
Find AccessPolicy with admin=true as policy and tag.AccountName='{accountName}'
that ASSIGNED (AccessRole|User) as e
return policy.displayName, policy.webLink, e._type, e.displayName, e.webLink
What groups are an employee or contractor a member of?
'Joe Adams' as employee that relates to (Team|Group) as group
return
employee._type, employee.displayName, employee.email,
group._type, group.displayName
What uses static authentication credentials (people, services) vs grant type credentials (saml, oidc)?
Find (User|UserGroup) that assigned AccessPolicy
Find AccessRole that assigned AccessPolicy