iam_schema_managed_access_enablediam_user_at_least_two_users_with_accountadmin_roleiam_user_default_role_is_setiam_user_default_role_must_not_be_accountadminiam_user_with_accountadmin_role_have_emailiam_user_with_built_in_duo_mfa_enablediam_user_without_accountadmin_role_password_not_setmanual_controlmonitoring_user_password_rotated_regularlynetwork_policy_allowed_list_setnetwork_policy_blocked_list_set
Query: monitoring_user_password_rotated_regularly
Usage
powerpipe query snowflake_compliance.query.monitoring_user_password_rotated_regularly
Steampipe Tables
SQL
select name as resource, case when name = 'SNOWFLAKE' then 'skip' when not has_password then 'skip' when now()::date - password_last_set_time::date > $1::int then 'alarm' else 'ok' end as status, case when name = 'SNOWFLAKE' then name || ' is a Snowflake Support user.' when not has_password then name || ' password not set.' else name || ' password rotated ' || (now()::date - password_last_set_time::date) || ' days ago.' end as reason, accountfrom snowflake_user;
Controls
The query is being used by the following controls: