iam_schema_managed_access_enablediam_user_at_least_two_users_with_accountadmin_roleiam_user_default_role_is_setiam_user_default_role_must_not_be_accountadminiam_user_with_accountadmin_role_have_emailiam_user_with_built_in_duo_mfa_enablediam_user_without_accountadmin_role_password_not_setmanual_controlmonitoring_user_password_rotated_regularlynetwork_policy_allowed_list_setnetwork_policy_blocked_list_set
Query: iam_user_without_accountadmin_role_password_not_set
Usage
powerpipe query snowflake_compliance.query.iam_user_without_accountadmin_role_password_not_set
Steampipe Tables
SQL
with users_with_account_admin_role as ( select grantee_name from snowflake_role_grant where role = 'ACCOUNTADMIN' and granted_to = 'USER')select name as resource, case when name in (select * from users_with_account_admin_role) then 'skip' when has_password then 'alarm' else 'ok' end as status, case when name in (select * from users_with_account_admin_role) then name || ' has ACCOUNTADMIN role.' when has_password then name || ' has password set.' else name || ' does not have password set.' end as reason, accountfrom snowflake_user;
Controls
The query is being used by the following controls: