blockstorage_block_volume_cmk_encryption_enabledblockstorage_boot_volume_cmk_encryption_enabledcloudguard_enabledcore_default_security_list_allow_icmp_onlycore_instance_encryption_in_transit_enabledcore_instance_legacy_metadata_service_endpoint_disabledcore_network_security_group_restrict_ingress_rdp_allcore_network_security_group_restrict_ingress_ssh_allcore_security_list_restrict_ingress_rdp_allcore_security_list_restrict_ingress_ssh_allcore_subnet_flow_log_enabledevents_rule_notification_cloud_guard_problems_detectedevents_rule_notification_iam_group_changesevents_rule_notification_iam_policy_changesevents_rule_notification_iam_user_changesevents_rule_notification_identity_provider_changesevents_rule_notification_idp_group_mapping_changesevents_rule_notification_network_gateway_changesevents_rule_notification_network_security_list_changesevents_rule_notification_route_table_changesevents_rule_notification_security_list_changesevents_rule_notification_vcn_changesfilestorage_filesystem_cmk_encryption_enabledidentity_administrator_user_with_no_api_keyidentity_auth_token_age_90identity_authentication_password_policy_strong_min_length_14identity_default_tagidentity_iam_administrators_no_update_tenancy_administrators_group_permissionidentity_only_administrators_group_with_manage_all_resources_permission_in_tenancyidentity_tenancy_audit_log_retention_period_365_daysidentity_tenancy_with_one_active_compartmentidentity_user_api_key_age_90identity_user_console_access_mfa_enabledidentity_user_customer_secret_key_age_90identity_user_db_credential_age_90identity_user_valid_emailkms_cmk_rotation_365manual_controlnotification_topic_with_subscriptionobjectstorage_bucket_cmk_encryption_enabledobjectstorage_bucket_public_access_blockedobjectstorage_bucket_versioning_enabledoracle_autonomous_database_not_publicly_accessible
Query: identity_administrator_user_with_no_api_key
Usage
powerpipe query oci_compliance.query.identity_administrator_user_with_no_api_key
Steampipe Tables
SQL
with administrators_users as ( select a.name as admin_user_name from oci_identity_user a, jsonb_array_elements(a.user_groups) as user_group inner join oci_identity_group b on (b.id = user_group ->> 'groupId' ) where b.name = 'Administrators' or a.identity_provider_id is not null)select a.id as resource, case when c.user_name is not null then 'alarm' else 'ok' end as status, case when c.user_name is not null then a.name || ' has API Key.' else a.name || ' has no API Key.' end as reason , a.tenant_name as tenantfrom oci_identity_user a left join administrators_users b on a.name = b.admin_user_name left join oci_identity_api_key c on a.name = c.user_name;
Controls
The query is being used by the following controls: