-
How to check that Okta apps are integrated seamlessly in an AWS account?
Allowing Okta users to view their AWS account IDs and subsequent role permissions upon signing in.
-
How do I find all of the relationships that AWS IAM roles have and entities they connect to?
How do I find all the relationships that AWS IAM roles have and the entities that they share those relationships with?
-
How do I find unused access roles with actions and resources?
I know that I have unused access roles with actions and resources. How do I find them?
-
How do I find hosts that have been inactive?
I know that we have hosts that have been inactive for 60 days or more. How do I generate a list of all of those hosts?
-
How do I find the knowbe4 averages for each onelogin user?
How do I find the knowbe4 average 'phishPronePercentage' and average 'currentRiskScore' for each onelogin user?
-
How do I get a list of ANYTHING that has a public IP, or is marked as public?
If I wanted to create a comprehensive list of ANYTHING that has a public IP, or is marked as public, how would I do that?
-
I am trying to find a asset.uuid from Tenable scan and associate it with AWS service or team tag
Has anyone come across the challenge of finding the asset.uuid from Tenable scan and associate it with AWS service or team tag or group tag to locate the team who will patch the vulnerability?
-
crowdstrike_sensor - not picking up on every aws_instance
Hi, I am currently using J1 to find which server do not have crowdstrike installed. I noticed a discrepancy where I could see a server in crowdstrike console active however it was not coming up as a server with crowdstrike in J1. It looks like the relationship is not being made when I make the tree, was hoping to…
-
Is there a way to query for data that was manually modified and from where?
Is there a way to query for data that was manually modified? (Or otherwise, search for data that was not modified?) For example, can we confirm that some tags were added from AWS, and not just in JupiterOne?
-
Identify all human users that have the ability to become a root user in an AWS production account
Hi - I’m trying to identify all human users that have the ability to become a root user in an AWS production account. I found the query below in the documentation. This finds the identities that have root directly. How can I traverse the graph of trust to also find identities that have root-like privileges (e.g. admin or…
-
Creating a service users - Clarification
Hi Jupiterone Team, I am trying to create a service user who can only have API access. Is there a way as an admin to create such users and generate associated keys from within J1? Do service users should also be defined in okta and have a specific type from below 4 categories? bot generic service system
-
Locate a pair of IP's
Hello! I am being asked to locate a pair of IP addresses in GCP that appear to be associated with VMs; Can you provide me an example query that would help?
-
How can JupiterOne identify whether my API calls are secure?
Our developers create and maintain numerous API calls for internal use.
-
Can JupiterOne query GitHub users that don’t have emails yet have relationships to Azure users?
Azure is our preferred ldP that centrally manages across multiple platforms, applications, and networks.
-
Can JupiterOne determine if my API’s have been successfully ingested?
My team uses the Google Cloud CLI tool to leverage user managed service accounts to authorize API calls.
-
How can I analyze our Google Bigquery permission usage for a given service account?
There is a requirement to determine over provisioning across our production workloads.
-
How does JupiterOne monitor SQS dead-letter queues?
Our developers rely on dead letter queues to debug applications by letting us isolate messages that can’t be processed and to determine why processing failed.
-
How many of our endpoints with SNS subscriptions are currently in a subscription pending state?
Can JupiterOne track down subscriptions that are in a pending state?
-
How does JupiterOne secure PII data between ElastiCache client and server nodes?
As a MSP, protecting Inter-nodal communications is critical to our customer base which includes: telecom, financial, and health services organizations.
-
Azure vs. Microsoft 365
What is the difference between Azure Active Directory integration and Microsoft 365 integration —> is there guidance on one over the other vs. both? With the new feature of Azure to “Auto-configure additional integrations for each subscription” — is that recommended going forward?
-
Snyk vuln closures
Is there a known query, or easy way to confirm if a snyk vuln has been remediated? We want to have metrics reporting on remediated vulns
-
Problems / Alerts
I want to go through these in detail to verify they are in-fact an issue or if there is a data issue. goal is to clean this up so it is actionable.
-
How do I find the user/account that has this jupiterone aws role assigned?
Hey J1 team , can someone help me out with a query. I am trying to find the user/account that has this jupiterone aws role assigned. So far I have the following:FIND aws_iam_role AS r WHERE r.displayName ~= "jupiter"
-
How to find IAM roles attached to a principal in GCP
Can someone help me with a query. What would be the best way to find all the IAM roles attached to a principal in GCP?
-
How to include subnets from both sides.
In J1QL, I’m trying to build a list of peering connections, I’d like to include subnets from both sides.
-
How do I find all the IAM roles with permissions for a S3 buckets
Do we have query to find all the IAM roles with permissions for a S3 buckets?
-
Analyzing Transitive Risk
"Asset risk is transitive and must always be evaluated in the full context of related assets." - Erich Smith, Principal Security Engineer @ JupiterOne How do you use JupiterOne to analyze and mitigate transitive risk? Check out this blog post from…
-
Difference between deleting and hard-deleting an entity
What is the difference between deleting and hard-deleting an entity?
-
Which assets were attributable to an IP at a certain time
Hey J1, I am trying to search by IP Address and see which assets were attributable to an IP at a certain time. Thanks in advance!
-
If I'm using an ACM, is it possible to determine which load balancers are and are not secured?
Hi! I'm trying to determine which where my data might be exposed to the internet and whether the ones that are exposed are encrypted or not. If I'm using ACM, is there a way to determine this using JupiterOne? Thank you!