Set Account as "Not a person"
Your various environments will contain "service" accounts that are not owned by any employees. For these accounts, we can set them as "Not a person" so that Vanta will not run any employee related security tasks against them (for example, policy acceptance or security awareness training completion).
In this example, we will first query for a list of AWS IAM Users to find our service account uid. We used AWS IAM Users here, but this guide will work with any user account from the integrated environments you have connected in your Vanta domain.
query AwsAccountList {
organization {
AwsAccountList(first: 2) {
edges {
node {
accountName
uid
}
}
}
}
}{
"data": {
"organization": {
"AwsAccountList": {
"edges": [
{
"node": {
"accountName": "john-stamos",
"uid": "eyJkIjoiNWZjODI0MjBhMjI4ZjZiNmY3MiYXJuOmF3czppYW06OjNjA3OTIwODp1W0tY2xpIn0="
}
},
{
"node": {
"accountName": "kubernetes-service-account",
"uid": "eyJkIjoiiLCJ1IjoiYXJuOmF3czppYW06Ojc4Nzg3NjA3OTIwODp1c2VyL3Rlc3QtdXNlciJ9"
}
}
]
}
}
}
}Next, we will run a mutation to set the service account as "Not a person". (Note: Make sure to replace our example uid with one that you pulled from your previous query!)
mutation SetAccountAsNotAPerson {
setFetchedResourceOwnerAsNotAPerson(input: { resources: "eyJkIjoiiLCJ1IjoiYXJuOmF3czppYW06Ojc4Nzg3NjA3OTIwODp1c2VyL3Rlc3QtdXNlciJ9" } ) {
... on SetFetchedResourceOwnerAsNotAPersonSuccess {
countChanged
countFailed
}
}
}{
"data": {
"setFetchedResourceOwnerAsNotAPerson": {
"countChanged": 1,
"countFailed": 0
}
}
}Updated 11 months ago
