Table: wiz_security_framework - Query Wiz Security Frameworks using SQL
Wiz Security Framework is a tool within the Wiz platform that provides a comprehensive view of the security status and configurations of cloud environments. It allows users to monitor and manage security risks across their cloud infrastructure, including virtual machines, databases, web applications, and more. Wiz Security Framework helps you stay informed about the security health of your cloud resources and take appropriate actions when predefined conditions are met.
Table Usage Guide
The wiz_security_framework
table provides insights into the security status and configurations of cloud environments. As a security engineer, explore the details of your cloud infrastructure's security through this table, including risk levels, associated metadata, and more. Utilize it to uncover information about potential security risks, the status of security configurations, and to verify the effectiveness of current security measures.
Examples
Basic info
Explore which security frameworks are enabled and built-in, and gain insights into their descriptions. This can help in assessing the security setup and identifying areas for potential improvement.
select name, id, enabled, built_in, descriptionfrom wiz_security_framework;
select name, id, enabled, built_in, descriptionfrom wiz_security_framework;
List disabled security frameworks
Identify instances where certain security frameworks are disabled. This can be useful for assessing the areas in your system that may lack necessary protection.
select name, id, enabled, built_in, descriptionfrom wiz_security_frameworkwhere not enabled;
select name, id, enabled, built_in, descriptionfrom wiz_security_frameworkwhere not enabled;
List built-in frameworks
Explore which built-in security frameworks are currently enabled. This can help you understand what default security measures are in place and assist in identifying potential areas for improvement.
select name, id, enabled, built_in, descriptionfrom wiz_security_frameworkwhere built_in;
select name, id, enabled, built_in, descriptionfrom wiz_security_frameworkwhere built_in = 1;
Get the count of security categories per framework
Explore the number of security categories within each framework to better understand the security measures in place and to identify areas for potential improvement. This could be particularly useful for IT teams looking to enhance their organization's security posture.
select name, built_in, enabled, jsonb_array_length(categories) as categoriesfrom wiz_security_framework;
select name, built_in, enabled, json_array_length(categories) as categoriesfrom wiz_security_framework;
Get the count of controls per framework
Explore the distribution of controls across different security frameworks to understand which frameworks have the most controls. This can be useful for prioritizing which frameworks to implement based on their comprehensiveness.
select f.name, f.built_in, f.enabled, count(c.id) as control_countfrom wiz_control as c join wiz_security_framework as f on c.framework_category_id = f.idgroup by 1, 2, 3;
select f.name, f.built_in, f.enabled, count(c.id) as control_countfrom wiz_control as c join wiz_security_framework as f on c.framework_category_id = f.idgroup by f.name, f.built_in, f.enabled;
Schema for wiz_security_framework
Name | Type | Operators | Description |
---|---|---|---|
_ctx | jsonb | Steampipe context in JSON form. | |
built_in | boolean | If true, the security framework is managed by Wiz. | |
categories | jsonb | A list of security category. | |
description | text | The description of the security framework. | |
enabled | boolean | !=, = | If true, the security framework is enabled. |
id | text | = | A unique identifier of the security framework. |
name | text | The name of the security framework. | |
policy_types | jsonb | A list of security framework policy types. | |
sp_connection_name | text | =, !=, ~~, ~~*, !~~, !~~* | Steampipe connection name. |
sp_ctx | jsonb | Steampipe context in JSON form. |
Export
This table is available as a standalone Exporter CLI. Steampipe exporters are stand-alone binaries that allow you to extract data using Steampipe plugins without a database.
You can download the tarball for your platform from the Releases page, but it is simplest to install them with the steampipe_export_installer.sh
script:
/bin/sh -c "$(curl -fsSL https://steampipe.io/install/export.sh)" -- wiz
You can pass the configuration to the command with the --config
argument:
steampipe_export_wiz --config '<your_config>' wiz_security_framework