blockstorage_block_volume_cmk_encryption_enabledblockstorage_boot_volume_cmk_encryption_enabledcloudguard_enabledcore_default_security_list_allow_icmp_onlycore_instance_encryption_in_transit_enabledcore_instance_legacy_metadata_service_endpoint_disabledcore_network_security_group_restrict_ingress_rdp_allcore_network_security_group_restrict_ingress_ssh_allcore_security_list_restrict_ingress_rdp_allcore_security_list_restrict_ingress_ssh_allcore_subnet_flow_log_enabledevents_rule_notification_cloud_guard_problems_detectedevents_rule_notification_iam_group_changesevents_rule_notification_iam_policy_changesevents_rule_notification_iam_user_changesevents_rule_notification_identity_provider_changesevents_rule_notification_idp_group_mapping_changesevents_rule_notification_network_gateway_changesevents_rule_notification_network_security_list_changesevents_rule_notification_route_table_changesevents_rule_notification_security_list_changesevents_rule_notification_vcn_changesfilestorage_filesystem_cmk_encryption_enabledidentity_administrator_user_with_no_api_keyidentity_auth_token_age_90identity_authentication_password_policy_strong_min_length_14identity_default_tagidentity_iam_administrators_no_update_tenancy_administrators_group_permissionidentity_only_administrators_group_with_manage_all_resources_permission_in_tenancyidentity_tenancy_audit_log_retention_period_365_daysidentity_tenancy_with_one_active_compartmentidentity_user_api_key_age_90identity_user_console_access_mfa_enabledidentity_user_customer_secret_key_age_90identity_user_db_credential_age_90identity_user_valid_emailkms_cmk_rotation_365manual_controlnotification_topic_with_subscriptionobjectstorage_bucket_cmk_encryption_enabledobjectstorage_bucket_public_access_blockedobjectstorage_bucket_versioning_enabledoracle_autonomous_database_not_publicly_accessible
Query: events_rule_notification_iam_user_changes
Usage
powerpipe query oci_compliance.query.events_rule_notification_iam_user_changes
Steampipe Tables
SQL
select distinct t.id as resource, case when c.name is not null then 'skip' when condition -> 'eventType' ?& array ['com.oraclecloud.identitycontrolplane.createuser', 'com.oraclecloud.identitycontrolplane.deleteuser', 'com.oraclecloud.identitycontrolplane.updateuser', 'com.oraclecloud.identitycontrolplane.updateusercapabilities', 'com.oraclecloud.identitycontrolplane.updateuserstate'] and a ->> 'actionType' = 'ONS' and t.lifecycle_state = 'ACTIVE' and t.is_enabled then 'ok' else 'alarm' end as status, case when c.name is not null then c.name || ' not a root compartment.' when condition -> 'eventType' ?& array ['com.oraclecloud.identitycontrolplane.createuser', 'com.oraclecloud.identitycontrolplane.deleteuser', 'com.oraclecloud.identitycontrolplane.updateuser', 'com.oraclecloud.identitycontrolplane.updateusercapabilities' 'com.oraclecloud.identitycontrolplane.updateuserstate'] and a ->> 'actionType' = 'ONS' and t.lifecycle_state = 'ACTIVE' and t.is_enabled then t.title || ' configured for IAM user changes.' else t.title || ' not configured for IAM user changes.' end as reason , t.region as region, t.tenant_name as tenant , coalesce(c.name, 'root') as compartmentfrom oci_events_rule t left join oci_identity_compartment as c on c.id = t.compartment_id, jsonb_array_elements(actions) as a;
Controls
The query is being used by the following controls: