steampipe plugin install aws

Table: aws_vpc_security_group - Query AWS VPC Security Groups using SQL

An AWS VPC Security Group acts as a virtual firewall for your instance to control inbound and outbound traffic. When you launch an instance in a VPC, you can assign up to five security groups to the instance. Security groups act at the instance level, not the subnet level, therefore each instance in a subnet in your VPC can be assigned to a different set of security groups.

Table Usage Guide

The aws_vpc_security_group table in Steampipe provides you with information about Security Groups within AWS Virtual Private Cloud (VPC). This table enables you, as a DevOps engineer, to query security group-specific details, including configurations, associated policies, and related metadata. You can utilize this table to gather insights on security groups, such as understanding the security rules applied, verifying the security policies, and more. The schema outlines for you the various attributes of the security group, including the group ID, name, description, owner ID, and associated VPC ID.

Examples

Basic ingress rule info

Review the configuration of your network's security settings to understand which ports are open and the protocols being used. This can help in identifying potential security vulnerabilities and ensuring that the network is adequately protected.

select
group_name,
vpc_id,
perm ->> 'FromPort' as from_port,
perm ->> 'ToPort' as to_port,
perm ->> 'IpProtocol' as ip_protocol,
perm ->> 'IpRanges' as ip_ranges,
perm ->> 'Ipv6Ranges' as ipv6_ranges,
perm ->> 'UserIdGroupPairs' as user_id_group_pairs,
perm ->> 'PrefixListIds' as prefix_list_ids
from
aws_vpc_security_group as sg
cross join jsonb_array_elements(ip_permissions) as perm;
select
group_name,
vpc_id,
json_extract(perm.value, '$.FromPort') as from_port,
json_extract(perm.value, '$.ToPort') as to_port,
json_extract(perm.value, '$.IpProtocol') as ip_protocol,
json_extract(perm.value, '$.IpRanges') as ip_ranges,
json_extract(perm.value, '$.Ipv6Ranges') as ipv6_ranges,
json_extract(perm.value, '$.UserIdGroupPairs') as user_id_group_pairs,
json_extract(perm.value, '$.PrefixListIds') as prefix_list_ids
from
aws_vpc_security_group as sg,
json_each(ip_permissions) as perm;

List of security groups whose SSH and RDP access is not restricted from the internet

Explore which security groups have unrestricted SSH and RDP access from the internet, allowing you to identify potential security risks and tighten access controls. This is crucial for maintaining security standards and preventing unauthorized access.

select
sg.group_name,
sg.group_id,
sgr.type,
sgr.ip_protocol,
sgr.from_port,
sgr.to_port,
cidr_ip
from
aws_vpc_security_group as sg
join aws_vpc_security_group_rule as sgr on sg.group_name = sgr.group_name
where
sgr.type = 'ingress'
and sgr.cidr_ip = '0.0.0.0/0'
and (
(
sgr.ip_protocol = '-1' -- all traffic
and sgr.from_port is null
)
or (
sgr.from_port <= 22
and sgr.to_port >= 22
)
or (
sgr.from_port <= 3389
and sgr.to_port >= 3389
)
);
select
sg.group_name,
sg.group_id,
sgr.type,
sgr.ip_protocol,
sgr.from_port,
sgr.to_port,
cidr_ip
from
aws_vpc_security_group as sg
join aws_vpc_security_group_rule as sgr on sg.group_name = sgr.group_name
where
sgr.type = 'ingress'
and sgr.cidr_ip = '0.0.0.0/0'
and (
(
sgr.ip_protocol = '-1' -- all traffic
and sgr.from_port is null
)
or (
sgr.from_port <= 22
and sgr.to_port >= 22
)
or (
sgr.from_port <= 3389
and sgr.to_port >= 3389
)
);

Count of security groups by VPC ID

Gain insights into the distribution of security groups across your Virtual Private Clouds (VPCs) to manage resources and improve security measures effectively.

select
vpc_id,
count(vpc_id) as count
from
aws_vpc_security_group
group by
vpc_id;
select
vpc_id,
count(vpc_id) as count
from
aws_vpc_security_group
group by
vpc_id;

List of security groups whose name is prefixed with 'launch wizard'

Identify instances where security groups have names prefixed with 'launch wizard'. This can help in managing and organizing your security groups effectively, particularly in large-scale AWS environments.

select
group_name,
group_id
from
aws_vpc_security_group
where
group_name like '%launch-wizard%';
select
group_name,
group_id
from
aws_vpc_security_group
where
group_name like '%launch-wizard%';

Control examples

Schema for aws_vpc_security_group

NameTypeOperatorsDescription
_ctxjsonbSteampipe context in JSON form.
account_idtext=, !=, ~~, ~~*, !~~, !~~*The AWS Account ID in which the resource is located.
akasjsonbArray of globally unique identifier strings (also known as) for the resource.
arntextThe Amazon Resource Name (ARN) specifying the security group.
descriptiontext=A description of the security group.
group_idtext=Contains the unique ID to identify a security group.
group_nametext=The friendly name that identifies the security group.
ip_permissionsjsonbA list of inbound rules associated with the security group
ip_permissions_egressjsonbA list of outbound rules associated with the security group
owner_idtext=Contains the AWS account ID of the owner of the security group.
partitiontextThe AWS partition in which the resource is located (aws, aws-cn, or aws-us-gov).
regiontextThe AWS Region in which the resource is located.
sp_connection_nametext=, !=, ~~, ~~*, !~~, !~~*Steampipe connection name.
sp_ctxjsonbSteampipe context in JSON form.
tagsjsonbA map of tags for the resource.
tags_srcjsonbA list of tags that are attached to the security group
titletextTitle of the resource.
vpc_idtext=The ID of the VPC for the security group.

Export

This table is available as a standalone Exporter CLI. Steampipe exporters are stand-alone binaries that allow you to extract data using Steampipe plugins without a database.

You can download the tarball for your platform from the Releases page, but it is simplest to install them with the steampipe_export_installer.sh script:

/bin/sh -c "$(curl -fsSL https://steampipe.io/install/export.sh)" -- aws

You can pass the configuration to the command with the --config argument:

steampipe_export_aws --config '<your_config>' aws_vpc_security_group