<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic What is the reason for the RQL filter of get-account-password-policy API? in Prisma Cloud Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/what-is-the-reason-for-the-rql-filter-of-get-account-password/m-p/342407#M285</link>
    <description>&lt;P&gt;In most RQLs of policies that use the "get-account-password-policy" API, "isDefaultPolicy is true" is checked, but there is no "isDefaultPolicy" in AWSCLI Docs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why is isDefaultPolicy checked?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Sample Default Policy List&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;U&gt;1) AWS IAM password policy allows password reuse&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;config where cloud.type = 'aws' and api.name='aws-iam-get-account-password-policy' AND json.rule='&lt;U&gt;&lt;STRONG&gt;isDefaultPolicy is true&lt;/STRONG&gt;&lt;/U&gt; or passwordReusePrevention equals null or passwordReusePrevention !isType Integer or passwordReusePrevention &amp;lt; 1'&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;2)&amp;nbsp;AWS IAM password policy does not expire in 90 days&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;config where api.name='aws-iam-get-account-password-policy' AND json.rule='&lt;U&gt;&lt;STRONG&gt;isDefaultPolicy is true&lt;/STRONG&gt; &lt;/U&gt;or maxPasswordAge !isType Integer or $.maxPasswordAge &amp;gt; 90 or maxPasswordAge equals 0'&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AWSCLI Docs&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.aws.amazon.com/cli/latest/reference/iam/get-account-password-policy.html" target="_blank" rel="noopener"&gt;https://docs.aws.amazon.com/cli/latest/reference/iam/get-account-password-policy.html&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 02 Sep 2020 17:46:42 GMT</pubDate>
    <dc:creator>KRyu</dc:creator>
    <dc:date>2020-09-02T17:46:42Z</dc:date>
    <item>
      <title>What is the reason for the RQL filter of get-account-password-policy API?</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/what-is-the-reason-for-the-rql-filter-of-get-account-password/m-p/342407#M285</link>
      <description>&lt;P&gt;In most RQLs of policies that use the "get-account-password-policy" API, "isDefaultPolicy is true" is checked, but there is no "isDefaultPolicy" in AWSCLI Docs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why is isDefaultPolicy checked?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Sample Default Policy List&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;U&gt;1) AWS IAM password policy allows password reuse&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;config where cloud.type = 'aws' and api.name='aws-iam-get-account-password-policy' AND json.rule='&lt;U&gt;&lt;STRONG&gt;isDefaultPolicy is true&lt;/STRONG&gt;&lt;/U&gt; or passwordReusePrevention equals null or passwordReusePrevention !isType Integer or passwordReusePrevention &amp;lt; 1'&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;2)&amp;nbsp;AWS IAM password policy does not expire in 90 days&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;config where api.name='aws-iam-get-account-password-policy' AND json.rule='&lt;U&gt;&lt;STRONG&gt;isDefaultPolicy is true&lt;/STRONG&gt; &lt;/U&gt;or maxPasswordAge !isType Integer or $.maxPasswordAge &amp;gt; 90 or maxPasswordAge equals 0'&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AWSCLI Docs&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.aws.amazon.com/cli/latest/reference/iam/get-account-password-policy.html" target="_blank" rel="noopener"&gt;https://docs.aws.amazon.com/cli/latest/reference/iam/get-account-password-policy.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Sep 2020 17:46:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/what-is-the-reason-for-the-rql-filter-of-get-account-password/m-p/342407#M285</guid>
      <dc:creator>KRyu</dc:creator>
      <dc:date>2020-09-02T17:46:42Z</dc:date>
    </item>
    <item>
      <title>Re: What is the reason for the RQL filter of get-account-password-policy AP</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/what-is-the-reason-for-the-rql-filter-of-get-account-password/m-p/342585#M286</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/127039"&gt;@KRyu&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When querying the API in AWS, if no policy has been defined, no resource is returned, thus we must account for when no policy is defined. The Prisma Cloud platform is a resource centric utility, so we can't check for proper configuration when the resource doesn't even exist. So we create a default value for any account that doesn't have a defined password policy, isDefaultValue is our placeholder/identifier for that circumstance.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Aug 2020 22:00:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/what-is-the-reason-for-the-rql-filter-of-get-account-password/m-p/342585#M286</guid>
      <dc:creator>FranciscoBreijo</dc:creator>
      <dc:date>2020-08-06T22:00:35Z</dc:date>
    </item>
    <item>
      <title>Re: What is the reason for the RQL filter of get-account-password-policy AP</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/what-is-the-reason-for-the-rql-filter-of-get-account-password/m-p/342618#M288</link>
      <description>&lt;P&gt;Thanks for your detailed answer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If so, is there a separate API that can use "isDefaultPolicy" as a JSON condition?&lt;/P&gt;&lt;P&gt;I searched Prisma Cloud Docs, but couldn't find an explanation.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Aug 2020 00:38:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/what-is-the-reason-for-the-rql-filter-of-get-account-password/m-p/342618#M288</guid>
      <dc:creator>KRyu</dc:creator>
      <dc:date>2020-08-07T00:38:13Z</dc:date>
    </item>
    <item>
      <title>Re: What is the reason for the RQL filter of get-account-password-policy API?</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/what-is-the-reason-for-the-rql-filter-of-get-account-password/m-p/511755#M619</link>
      <description>&lt;P&gt;Greetings KRyu,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope that this note finds you well! I know that it has been a while since you had posted this question but I wanted to see if you still potentially needed any help. Thank you for your time and I hope that you have a good remainder of your day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards,&lt;/P&gt;
&lt;P&gt;J. Avery King&lt;/P&gt;</description>
      <pubDate>Fri, 12 Aug 2022 17:39:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/what-is-the-reason-for-the-rql-filter-of-get-account-password/m-p/511755#M619</guid>
      <dc:creator>AKing9</dc:creator>
      <dc:date>2022-08-12T17:39:58Z</dc:date>
    </item>
  </channel>
</rss>

