Table: aws_networkfirewall_firewall - Query AWS Network Firewall using SQL
The AWS Network Firewall is a managed service that makes it easy to deploy essential network protections for all of your Amazon Virtual Private Clouds (VPCs). The service can be set up, configured, and maintained through a simple console interface, APIs, or with the AWS CLI. It provides high availability, scalability, and you pay only for what you use.
Table Usage Guide
The aws_networkfirewall_firewall
table in Steampipe provides you with information about each firewall in AWS Network Firewall. This table enables you, as a network administrator, security analyst, or DevOps engineer, to query specific details about firewalls, including firewall policies, subnet mappings, and associated VPCs. You can utilize this table to gain insights into firewall configurations, such as firewall policy ARNs, VPC IDs, subnet IDs, and more. The schema outlines the various attributes of the firewall for you, including the firewall ARN, firewall name, firewall policy ARN, VPC ID, subnet mapping, delete protection status, and associated tags.
Examples
Basic info
Determine the areas in which your AWS Network Firewall is deployed to gain insights into the regions and associated VPCs. This can help you assess your firewall's coverage and ensure your resources are adequately protected.
select arn, name, description, vpc_id, policy_arn, region, tagsfrom aws_networkfirewall_firewall;
select arn, name, description, vpc_id, policy_arn, region, tagsfrom aws_networkfirewall_firewall;
List firewalls using default encryption
Determine the areas in which firewalls are utilizing the default encryption settings. This is useful for identifying potential security vulnerabilities and ensuring compliance with best practices.
select arn, name, description, encryption_configurationfrom aws_networkfirewall_firewallwhere encryption_configuration ->> 'Type' = ` AWS_OWNED_KMS_KEY ';
select arn, name, description, encryption_configurationfrom aws_networkfirewall_firewallwhere json_extract(encryption_configuration, '$.Type') = 'AWS_OWNED_KMS_KEY';
List firewalls having deletion protection disabled
Discover the segments of your network that are potentially vulnerable due to firewalls with deletion protection disabled. This is beneficial in enhancing your security measures by identifying and rectifying areas of weakness within your network infrastructure.
select arn, name, description, vpc_idfrom aws_networkfirewall_firewallwhere not delete_protection;
select arn, name, description, vpc_idfrom aws_networkfirewall_firewallwhere delete_protection = 0;
List firewalls having policy change protection disabled
Discover firewalls where policy change protection is disabled to identify potential security vulnerabilities in your network. This can help in prioritizing and addressing security loopholes to maintain a robust defense system.
select arn, name, description, vpc_idfrom aws_networkfirewall_firewallwhere not policy_change_protection;
select arn, name, description, vpc_idfrom aws_networkfirewall_firewallwhere policy_change_protection = 0;
List firewalls having subnet change protection disabled
Explore which firewalls lack protection against subnet changes. This is beneficial in identifying potential security vulnerabilities within your network infrastructure.
select arn, name, description, vpc_idfrom aws_networkfirewall_firewallwhere not subnet_change_protection;
select arn, name, description, vpc_idfrom aws_networkfirewall_firewallwhere subnet_change_protection = 0;
Get subnet details for each firewall
This query is useful to understand the relationship between your firewalls and subnets in your network. It helps you identify the specific locations where your firewalls are deployed, providing insights into your network's security infrastructure.
select f.arn, f.name, f.vpc_id, s ->> 'SubnetId' as subnet_id, cidr_block, availability_zone, default_for_azfrom aws_networkfirewall_firewall f, jsonb_array_elements(subnet_mappings) s, aws_vpc_subnet vswhere vs.subnet_id = s ->> 'SubnetId';
select f.arn, f.name, f.vpc_id, json_extract(s.value, '$.SubnetId') as subnet_id, cidr_block, availability_zone, default_for_azfrom aws_networkfirewall_firewall f, json_each(f.subnet_mappings) as s, aws_vpc_subnet vswhere vs.subnet_id = json_extract(s.value, '$.SubnetId');
Get KMS key details of firewalls encrypted with customer managed keys
Identify firewalls that are encrypted with customer-managed keys and gain insights into their key rotation status. This can be useful in ensuring that your organization's encryption practices are in line with its security policies.
select f.arn, f.name, f.vpc_id, k.arn as key_arn, key_rotation_enabledfrom aws_networkfirewall_firewall f, aws_kms_key kwhere k.id = encryption_configuration ->> 'KeyId' and not f.encryption_configuration ->> 'Type' = ` AWS_OWNED_KMS_KEY ';
select f.arn, f.name, f.vpc_id, k.arn as key_arn, key_rotation_enabledfrom aws_networkfirewall_firewall f, aws_kms_key kwhere k.id = json_extract(f.encryption_configuration, '$.KeyId') and not json_extract(f.encryption_configuration, '$.Type') = 'AWS_OWNED_KMS_KEY';
Get logging configuration details of firewall
The detailed insight into log types and destinations aids in ensuring that the network firewall configurations comply with organizational policies and regulatory standards. This is essential for audits, where evidence of proper log management practices needs to be presented.
select name, arn, l -> 'LogDestination' as log_destination, l ->> 'LogDestinationType' as log_destination_type, l ->> 'LogType' as log_typefrom aws_networkfirewall_firewall, jsonb_array_elements(logging_configuration) as l;
select name, arn, json_extract(l.value, '$.LogDestination') as log_destination, json_extract(l.value, '$.LogDestinationType') as log_destination_type, json_extract(l.value, '$.LogType') as log_typefrom aws_networkfirewall_firewall, json_each( aws_networkfirewall_firewall.logging_configuration ) as l;
Schema for aws_networkfirewall_firewall
Name | Type | Operators | Description |
---|---|---|---|
_ctx | jsonb | Steampipe context in JSON form. | |
account_id | text | =, !=, ~~, ~~*, !~~, !~~* | The AWS Account ID in which the resource is located. |
akas | jsonb | Array of globally unique identifier strings (also known as) for the resource. | |
arn | text | = | The Amazon Resource Name (ARN) of the firewall. |
delete_protection | boolean | A flag indicating whether it is possible to delete the firewall. | |
description | text | A description of the firewall. | |
encryption_configuration | jsonb | A complex type that contains the Amazon Web Services KMS encryption configuration settings for the firewall. | |
firewall_status | jsonb | Detailed information about the current status of a Firewall. | |
id | text | The unique identifier for the firewall. | |
logging_configuration | jsonb | Defines how Network Firewall performs logging for a Firewall. | |
name | text | = | The descriptive name of the firewall. |
partition | text | The AWS partition in which the resource is located (aws, aws-cn, or aws-us-gov). | |
policy_arn | text | The Amazon Resource Name (ARN) of the firewall policy. | |
policy_change_protection | boolean | A setting indicating whether the firewall is protected against a change to the firewall policy association. | |
region | text | The AWS Region in which the resource is located. | |
sp_connection_name | text | =, !=, ~~, ~~*, !~~, !~~* | Steampipe connection name. |
sp_ctx | jsonb | Steampipe context in JSON form. | |
subnet_change_protection | boolean | A setting indicating whether the firewall is protected against changes to the subnet associations. | |
subnet_mappings | jsonb | The public subnets that Network Firewall is using for the firewall. | |
tags | jsonb | A map of tags for the resource. | |
tags_src | jsonb | A list of tags associated with the firewall | |
title | text | Title of the resource. | |
vpc_id | text | = | The unique identifier of the VPC where the firewall is in use. |
Export
This table is available as a standalone Exporter CLI. Steampipe exporters are stand-alone binaries that allow you to extract data using Steampipe plugins without a database.
You can download the tarball for your platform from the Releases page, but it is simplest to install them with the steampipe_export_installer.sh
script:
/bin/sh -c "$(curl -fsSL https://steampipe.io/install/export.sh)" -- aws
You can pass the configuration to the command with the --config
argument:
steampipe_export_aws --config '<your_config>' aws_networkfirewall_firewall