Access Analysis Result
access_analysis_result
The Access Analysis Result object describes access relationships and pathways between identities, resources, focusing on who can access what and through which mechanisms. This evaluates access levels (read/write/admin), access types (direct, cross-account, public, federated), and the conditions under which access is granted. Use this for resource-centric security assessments such as external access discovery, public exposure analysis, etc.
Attributes
| Caption | Name | Type | Description | 
|---|---|---|---|
| Access Level | access_level | 
        String | The generalized access level or permission scope granted to the identity through the analyzed policy configuration. Common examples include Read, Write, List, Delete, Admin, or custom permission levels. | 
| Access Type | access_type | 
        String | The type or category of access being granted to the identity. This describes the nature of the access relationship, such as cross-account access, public access, federated access, or third-party integration access. Examples include 'Cross-Account', 'Public', 'Federated', 'Service-to-Service', etc. | 
| Accessors | accessors | 
        User[] | 
            Entity:USERThe identities that are granted access through the analyzed policy configuration. This identifies the specific entity that can exercise the permissions and helps assess the access relationship and potential security implications. Examples include user accounts, service principals, roles, account identifiers, or system identities.  | 
    
| Additional Restrictions | additional_restrictions | 
        Additional Restriction[] | Details about supplementary restrictions and guardrails that may limit the granted access, applied through additional policy types such as Resource Control Policies (RCPs) and Service Control Policies (SCPs) in AWS, or other policy constraints. | 
| Condition Keys | condition_keys | 
        Key:Value object[] | The condition keys and their values that constrain when and how the granted access can be exercised. These conditions define the circumstances under which the access relationship is valid and the privileges can be used. Examples: IP address restrictions like 'aws:SourceIp:192.0.2.0/24', time-based constraints like 'aws:RequestedRegion:us-east-1', MFA requirements like 'aws:MultiFactorAuthPresent:true', or custom conditions based on resource tags and request context. | 
| Granted Privileges | granted_privileges | 
        String[] | The specific privileges, actions, or permissions that are granted through the analyzed access relationship. This includes the actual operations that the accessor can perform on the target resource. Examples: AWS actions like 'sts:AssumeRole', 's3:GetObject', 'ec2:DescribeInstances'; Azure actions like 'Microsoft.Storage/storageAccounts/read'; or GCP permissions like 'storage.objects.get'. | 
| Raw Data | raw_data | 
        JSON | 
            Group:contextThe event data as received from the event source.  | 
    
| Record ID | record_id | 
        String | 
            Group:primaryUnique identifier for the object  | 
    
| Unmapped | unmapped | 
        Unmapped[] | Data from the source that was not mapped into the schema. | 
Relationships
Inbound Relationships
These objects and events reference Access Analysis Result in their attributes:
Outbound Relationships
Access Analysis Result references the following objects and events in its attributes:
This page describes qdm-1.5.1+ocsf-1.6.0
Updated about 7 hours ago