Table: aws_vpc_verified_access_instance - Query AWS VPC Verified Access Instances using SQL
The AWS VPC Verified Access Instances are a part of Amazon's Virtual Private Cloud (VPC) service, allowing users to launch AWS resources into a virtual network that they define. This service provides advanced security features, such as security groups and network access control lists, to enable inbound and outbound filtering at the instance level and subnet level. In addition, you can create a Hardware VPN connection between your corporate datacenter and your VPC and leverage the AWS cloud as an extension of your corporate datacenter.
Table Usage Guide
The aws_vpc_verified_access_instance
table in Steampipe provides you with information about the Amazon VPC verified access instances. This table allows you, as a network administrator or security analyst, to query instance-specific details, including instance ID, instance state, instance type, and associated tags. You can utilize this table to gather insights on instances, such as instance state, type, and associated tags. The schema outlines the various attributes of the VPC verified access instance for you, including the instance ID, instance state, instance type, and associated tags.
Examples
Basic info
Explore which AWS VPC instances have been verified and gain insights into their creation and last updated times. This is useful for understanding your verified environments and maintaining security compliance.
select verified_access_instance_id, creation_time, description, last_updated_time, verified_access_trust_providersfrom aws_vpc_verified_access_instance;
select verified_access_instance_id, creation_time, description, last_updated_time, verified_access_trust_providersfrom aws_vpc_verified_access_instance;
List VPC access verified instances older than 30 days
Determine the instances in your virtual private cloud that have had verified access for over 30 days. This can be beneficial for auditing purposes, allowing you to identify potential security risks or unused resources.
select verified_access_instance_id, creation_time, description, last_updated_timefrom aws_vpc_verified_access_instancewhere creation_time <= now() - interval '30' day;
select verified_access_instance_id, creation_time, description, last_updated_timefrom aws_vpc_verified_access_instancewhere creation_time <= datetime('now', '-30 day');
Get trusted provider details for each instance
Determine the areas in which each instance has a trusted provider by analyzing the provider's description, type, and associated policy. This query is useful for understanding the security measures in place for each instance and helps in managing access control.
select i.verified_access_instance_id, i.creation_time, p ->> 'Description' as trust_provider_description, p ->> 'TrustProviderType' as trust_provider_type, p ->> 'UserTrustProviderType' as user_trust_provider_type, p ->> 'DeviceTrustProviderType' as device_trust_provider_type, p ->> 'VerifiedAccessTrustProviderId' as verified_access_trust_provider_id, t.policy_reference_name as trust_access_policy_reference_namefrom aws_vpc_verified_access_instance as i, aws_vpc_verified_access_trust_provider as t, jsonb_array_elements(verified_access_trust_providers) as pwhere p ->> 'VerifiedAccessTrustProviderId' = t.verified_access_trust_provider_id;
select i.verified_access_instance_id, i.creation_time, json_extract(p.value, '$.Description') as trust_provider_description, json_extract(p.value, '$.TrustProviderType') as trust_provider_type, json_extract(p.value, '$.UserTrustProviderType') as user_trust_provider_type, json_extract(p.value, '$.DeviceTrustProviderType') as device_trust_provider_type, json_extract(p.value, '$.VerifiedAccessTrustProviderId') as verified_access_trust_provider_id, t.policy_reference_name as trust_access_policy_reference_namefrom aws_vpc_verified_access_instance as i, aws_vpc_verified_access_trust_provider as t, json_each(verified_access_trust_providers) as pwhere json_extract(p.value, '$.VerifiedAccessTrustProviderId') = t.verified_access_trust_provider_id;
Schema for aws_vpc_verified_access_instance
Name | Type | Operators | Description |
---|---|---|---|
_ctx | jsonb | Steampipe context in JSON form. | |
account_id | text | =, !=, ~~, ~~*, !~~, !~~* | The AWS Account ID in which the resource is located. |
creation_time | timestamp with time zone | The creation time. | |
description | text | A description for the AWS Verified Access instance. | |
last_updated_time | timestamp with time zone | The last updated time. | |
partition | text | The AWS partition in which the resource is located (aws, aws-cn, or aws-us-gov). | |
region | text | The AWS Region in which the resource is located. | |
sp_connection_name | text | =, !=, ~~, ~~*, !~~, !~~* | Steampipe connection name. |
sp_ctx | jsonb | Steampipe context in JSON form. | |
tags | jsonb | A map of tags for the resource. | |
tags_src | jsonb | A map of tags for the resource. | |
title | text | Title of the resource. | |
verified_access_instance_id | text | = | The ID of the AWS Verified Access instance. |
verified_access_trust_providers | jsonb | The IDs of the AWS Verified Access trusted providers. |
Export
This table is available as a standalone Exporter CLI. Steampipe exporters are stand-alone binaries that allow you to extract data using Steampipe plugins without a database.
You can download the tarball for your platform from the Releases page, but it is simplest to install them with the steampipe_export_installer.sh
script:
/bin/sh -c "$(curl -fsSL https://steampipe.io/install/export.sh)" -- aws
You can pass the configuration to the command with the --config
argument:
steampipe_export_aws --config '<your_config>' aws_vpc_verified_access_instance