Searching for Controls (Policy Tab)
Use the search tokens below to search for control evaluations (click any control name on the Policy > Controls tab). Looking for help with writing your query? click here
control.createdBy.usernamecontrol.createdBy.username
Use a text value ##### to find policies or controls created by a user of interest.
Example
Show policies or controls created by the specified user
control.createdBy.username: user_john
policy.updatedBy.usernamepolicy.updatedBy.username
Use a text value ##### to find policies or controls modified by a user of interest.
Example
Show policies or controls modified by the specified user
policy.updatedBy.username: user_john
policy.createdDatepolicy.createdDate
Use a date range or specific date to define when the policy was created.
Example
Show policies created within certain dates
policy.createdDate: [2018-01-01 ... 2018-03-01]
Show policies created from starting 2018-01-01, ending 1 month ago
policy.createdDate: [2018-01-01 ... now-1m]
Show policies created starting 2 weeks ago, ending 1 second ago
policy.createdDate: [now-2w ... now-1s]
Show policies created on specific date
policy.createdDate: [2018-01-08]
policy.updatedDatepolicy.updatedDate
Use a date range or specific date to define when the policy was modified.
Example
Show policies modified within certain dates
policy.updatedDate: [2018-01-01 ... 2018-03-01]
Show policies modified from starting 2018-01-01, ending 1 month ago
policy.updatedDate: [2018-01-01 ... now-1m]
Show policies modified starting 2 weeks ago, ending 1 second ago
policy.updatedDate: [now-2w ... now-1s]
Show policies modified on specific date
policy.updatedDate: [2018-01-08]
control.isCustomizablecontrol.isCustomizable
Use the values true | false to find controls that are customizable or not.
Example
Show controls that are customizable
control.isCustomizable: true
Search the policy by providing a unique id to identify any policy.
Example
Show the policy that belong to specified unique ID
policy.uuid: uuid:80313390-aa04-11e9-9596-45e2d51410b1
control.rootParentCidcontrol.rootParentCid
Search the system defined control using which all the user defined controls are created. The result always diplays system defined control.
Example
Show the control that belong to specified unique ID
control.rootParentCid: 12
control.parentCidcontrol.parentCid
Search the controls that are created from the specified parent control Id.
Show the policy that created from the specified control ID
control.parentCid: 12
Use a text value ##### to show controls based on the unique control ID associated with the control at the time of creation.
Example
Show controls with this ID
control.id: 205767712438
Search for list of policy based on the policy type. Select the policy type from the drop-down: User Defined or System Defined.
Example
Show policy that are User Defined
policy.type: User Defined
Use quotes within values to find a CIS or AWS policy by name.
Examples
Show findings with this name
policy.name: CIS Amazon Web Services Foundations Benchmark
Show any findings that contain parts of name
policy.name: "CIS Amazon Web Services Foundations Benchmark"
policy.executionTypepolicy.executionType
Select the policy by the execution type (Build Time, Run Time).
Examples
Show policies created with controls used for resource evaluation.
policy.executionType: Run Time
Show policies created with controls used for IaC file evaluation.
policy.executionType: Build Time
control.criticalitycontrol.criticality
Select the control criticality (HIGH, MEDIUM, LOW) you're interested in.
Example
Show controls with High criticality
control.criticality: HIGH
control.descriptioncontrol.description
Use quotes within values to help you find controls with a certain description.
Examples
Show controls with this description
control.description: my-description
Show controls that contain parts of description
control.description: "my-description"
Use quotes within values to help you find controls with a certain name.
Examples
Show findings with this name
control.name: Avoid the use of the root account
Show any findings that contain parts of name
control.name: "Avoid the use of the root account"
Select the control result you're interested in: PASS or FAIL.
Examples
Show controls that passed
control.result: PASS
Show controls that failed
control.result: FAIL
Search for list of controls based on the control type. Select the control type from the drop-down: User Defined or System Defined.
Example
Show control that are User Defined
control.type: User Defined
control.executionTypecontrol.executionType
Select the controls by the execution type (Build Time, Run Time).
Examples
Show controls used for resource evaluation.
control.executionType: Run Time
Show controls used for IaC file evaluation.
control.executionType: Build Time
policy.providerpolicy.provider
Search for list of policies based on the policy provider. Select the policy provider from the drop-down.
Example
Show policies provided by AWS
policy.provider: AWS
control.providercontrol.provider
Search for list of controls based on the control provider. Select the policy provider from the drop-down.
Example
Show policies provided by AWS
policy.provider: AWS
Select the name of the region you're interested in. Select from names in the drop-down menu.
Example
Find resources in the Singapore region
region: Singapore
cloud.resource.idcloud.resource.id
Use a text value ##### to show resources based on the unique ID.
Example
Show findings with resource ID
cloud.resource.id: 2012438
cloud.resource.typecloud.resource.type
Select the type of resource you're interested in. Select from names in the drop-down menu.
Example
Show resources of type Instance
cloud.resource.type: Instance
Select the type of service you're interested in. Select from names in the drop-down menu.
Example
Show service type VPC
service.type: VPC
control.isRemediablecontrol.isRemediable
Use true to view the controls for which remediation is enabled.
Example
Show controls that are remediable
control.isRemediable: TRUE
control.objective.sectioncontrol.objective.section
Use the name of controlObjective section to view all the controls that belong to the specified section name.
Examples
Show all the controls that belong to the SC-7 control objective section
control.objective.section: SC-7
Use the name of mandate policy to view controls that belong to the specified mandate policy.
Examples
Show all the controls that belong to the Cloud Controls Matrix (CCM) mandate policy
mandate.name: Cloud Controls Matrix (CCM)
mandate.publishermandate.publisher
Use the name of the mandate publisher to view controls that belong to the specified mandate policy.
Examples
Show all the controls that belong to the Cloud Security Alliance (CSA) mandate publisher
mandate.publisher: Cloud Security Alliance
requirement.sectionrequirement.section
Use the name of requirement section to view all the controls that belong to the specified requirement section.
Examples
Show all the controls that belong to the AIS requirement section
requirement.section: AIS
Use a text value ##### to show controls created from QFlow with specified QFlow id.
Examples
Show controls with specific qflow id
qflow.id: 80313390-aa04-11e9-9596-45e2d51410b1
control.benchmarkTypecontrol.benchmarkType
Search for list of controls based on the benchmark type. Select the benchmark type from the drop-down, such as CIS, NIST, or PCI.
Example
Show controls that belong to CIS benchmark
control.benchmarkType: CIS
Use values within quotes or back-ticks to find controls created from QFlow with the specified name.
Examples
Show controls that are created from QFlow with a name that partially matches the specified QFlow name.
qflow.name: "Publicly accessible S3 buckets"
Show controls that are created from QFlow with a name that exactly matches the specified QFlow name.
qflow.name: `S3 buckets`
control.updatedBy.usernamecontrol.updatedBy.username
Use a text value ##### to find policies or controls modified by a user of interest.
Example
Show policies or controls modified by the specified user
control.updatedBy.username: user_john
Use a boolean query to express your query using AND logic.
Example
Show findings with account ID 205767712438 and type Subnet
account.id: 205767712438 and resource.type: Subnet
Use a boolean query to express your query using NOT logic.
Example
Show findings that are not resource type Instance
not resource.type: Instance
Use a boolean query to express your query using OR logic.
Example
Show findings with one of these tag values
tag.value: Finance or tag.value: Accounting