aquasec.ContainerRuntimePolicy
Example Usage
Example coming soon!
Example coming soon!
Example coming soon!
Example coming soon!
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.aquasec.ContainerRuntimePolicy;
import com.pulumi.aquasec.ContainerRuntimePolicyArgs;
import com.pulumi.aquasec.inputs.ContainerRuntimePolicyFileIntegrityMonitoringArgs;
import com.pulumi.aquasec.inputs.ContainerRuntimePolicyMalwareScanOptionsArgs;
import com.pulumi.aquasec.inputs.ContainerRuntimePolicyScopeVariableArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        var containerRuntimePolicy = new ContainerRuntimePolicy("containerRuntimePolicy", ContainerRuntimePolicyArgs.builder()
            .allowedExecutables(            
                "exe",
                "bin")
            .allowedRegistries(            
                "registry1",
                "registry2")
            .applicationScopes("Global")
            .auditAllNetworkActivity(true)
            .auditAllProcessesActivity(true)
            .auditFullCommandArguments(true)
            .blockAccessHostNetwork(true)
            .blockAddingCapabilities(true)
            .blockContainerExec(true)
            .blockCryptocurrencyMining(true)
            .blockFilelessExec(true)
            .blockLowPortBinding(true)
            .blockNonCompliantWorkloads(true)
            .blockNonK8sContainers(true)
            .blockPrivilegedContainers(true)
            .blockRootUser(true)
            .blockUseIpcNamespace(true)
            .blockUsePidNamespace(true)
            .blockUseUserNamespace(true)
            .blockUseUtsNamespace(true)
            .blockedCapabilities(            
                "AUDIT_CONTROL",
                "AUDIT_WRITE")
            .blockedExecutables(            
                "exe1",
                "exe2")
            .blockedFiles(            
                "test1",
                "test2")
            .blockedInboundPorts(            
                "80",
                "8080")
            .blockedOutboundPorts(            
                "90",
                "9090")
            .blockedPackages(            
                "pkg",
                "pkg2")
            .blockedVolumes(            
                "blocked",
                "vol")
            .containerExecAllowedProcesses(            
                "proc1",
                "proc2")
            .description("container_runtime_policy")
            .enableForkGuard(true)
            .enabled(true)
            .enforce(false)
            .fileIntegrityMonitoring(ContainerRuntimePolicyFileIntegrityMonitoringArgs.builder()
                .excludedPaths("expaths")
                .excludedProcesses("exprocess")
                .excludedUsers("expuser")
                .monitorAttributes(true)
                .monitorCreate(true)
                .monitorDelete(true)
                .monitorModify(true)
                .monitorRead(true)
                .monitoredPaths("paths")
                .monitoredProcesses("process")
                .monitoredUsers("user")
                .build())
            .forkGuardProcessLimit(13)
            .limitNewPrivileges(true)
            .malwareScanOptions(ContainerRuntimePolicyMalwareScanOptionsArgs.builder()
                .action("alert")
                .enabled(true)
                .build())
            .monitorSystemTimeChanges("true")
            .scopeExpression("v1 || v2")
            .scopeVariables(            
                ContainerRuntimePolicyScopeVariableArgs.builder()
                    .attribute("kubernetes.cluster")
                    .value("default")
                    .build(),
                ContainerRuntimePolicyScopeVariableArgs.builder()
                    .attribute("kubernetes.label")
                    .name("app")
                    .value("aqua")
                    .build())
            .build());
    }
}
resources:
  containerRuntimePolicy:
    type: aquasec:ContainerRuntimePolicy
    properties:
      allowedExecutables:
        - exe
        - bin
      allowedRegistries:
        - registry1
        - registry2
      applicationScopes:
        - Global
      auditAllNetworkActivity: true
      auditAllProcessesActivity: true
      auditFullCommandArguments: true
      blockAccessHostNetwork: true
      blockAddingCapabilities: true
      blockContainerExec: true
      blockCryptocurrencyMining: true
      blockFilelessExec: true
      blockLowPortBinding: true
      blockNonCompliantWorkloads: true
      blockNonK8sContainers: true
      blockPrivilegedContainers: true
      blockRootUser: true
      blockUseIpcNamespace: true
      blockUsePidNamespace: true
      blockUseUserNamespace: true
      blockUseUtsNamespace: true
      blockedCapabilities:
        - AUDIT_CONTROL
        - AUDIT_WRITE
      blockedExecutables:
        - exe1
        - exe2
      blockedFiles:
        - test1
        - test2
      blockedInboundPorts:
        - '80'
        - '8080'
      blockedOutboundPorts:
        - '90'
        - '9090'
      blockedPackages:
        - pkg
        - pkg2
      blockedVolumes:
        - blocked
        - vol
      containerExecAllowedProcesses:
        - proc1
        - proc2
      description: container_runtime_policy
      enableForkGuard: true
      enabled: true
      enforce: false
      fileIntegrityMonitoring:
        excludedPaths:
          - expaths
        excludedProcesses:
          - exprocess
        excludedUsers:
          - expuser
        monitorAttributes: true
        monitorCreate: true
        monitorDelete: true
        monitorModify: true
        monitorRead: true
        monitoredPaths:
          - paths
        monitoredProcesses:
          - process
        monitoredUsers:
          - user
      forkGuardProcessLimit: 13
      limitNewPrivileges: true
      malwareScanOptions:
        action: alert
        enabled: true
      monitorSystemTimeChanges: 'true'
      scopeExpression: v1 || v2
      scopeVariables:
        - attribute: kubernetes.cluster
          value: default
        - attribute: kubernetes.label
          name: app
          value: aqua
Create ContainerRuntimePolicy Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new ContainerRuntimePolicy(name: string, args?: ContainerRuntimePolicyArgs, opts?: CustomResourceOptions);@overload
def ContainerRuntimePolicy(resource_name: str,
                           args: Optional[ContainerRuntimePolicyArgs] = None,
                           opts: Optional[ResourceOptions] = None)
@overload
def ContainerRuntimePolicy(resource_name: str,
                           opts: Optional[ResourceOptions] = None,
                           allowed_executables: Optional[Sequence[ContainerRuntimePolicyAllowedExecutableArgs]] = None,
                           allowed_registries: Optional[Sequence[ContainerRuntimePolicyAllowedRegistryArgs]] = None,
                           application_scopes: Optional[Sequence[str]] = None,
                           audit_all_network_activity: Optional[bool] = None,
                           audit_all_processes_activity: Optional[bool] = None,
                           audit_brute_force_login: Optional[bool] = None,
                           audit_full_command_arguments: Optional[bool] = None,
                           auditing: Optional[ContainerRuntimePolicyAuditingArgs] = None,
                           author: Optional[str] = None,
                           blacklisted_os_users: Optional[ContainerRuntimePolicyBlacklistedOsUsersArgs] = None,
                           block_access_host_network: Optional[bool] = None,
                           block_adding_capabilities: Optional[bool] = None,
                           block_container_exec: Optional[bool] = None,
                           block_cryptocurrency_mining: Optional[bool] = None,
                           block_disallowed_images: Optional[bool] = None,
                           block_fileless_exec: Optional[bool] = None,
                           block_low_port_binding: Optional[bool] = None,
                           block_non_compliant_workloads: Optional[bool] = None,
                           block_non_k8s_containers: Optional[bool] = None,
                           block_privileged_containers: Optional[bool] = None,
                           block_root_user: Optional[bool] = None,
                           block_use_ipc_namespace: Optional[bool] = None,
                           block_use_pid_namespace: Optional[bool] = None,
                           block_use_user_namespace: Optional[bool] = None,
                           block_use_uts_namespace: Optional[bool] = None,
                           blocked_capabilities: Optional[Sequence[str]] = None,
                           blocked_executables: Optional[Sequence[str]] = None,
                           blocked_files: Optional[Sequence[str]] = None,
                           blocked_inbound_ports: Optional[Sequence[str]] = None,
                           blocked_outbound_ports: Optional[Sequence[str]] = None,
                           blocked_packages: Optional[Sequence[str]] = None,
                           blocked_volumes: Optional[Sequence[str]] = None,
                           bypass_scopes: Optional[Sequence[ContainerRuntimePolicyBypassScopeArgs]] = None,
                           container_exec: Optional[ContainerRuntimePolicyContainerExecArgs] = None,
                           container_exec_allowed_processes: Optional[Sequence[str]] = None,
                           created: Optional[str] = None,
                           cve: Optional[str] = None,
                           default_security_profile: Optional[str] = None,
                           description: Optional[str] = None,
                           digest: Optional[str] = None,
                           drift_preventions: Optional[Sequence[ContainerRuntimePolicyDriftPreventionArgs]] = None,
                           enable_crypto_mining_dns: Optional[bool] = None,
                           enable_fork_guard: Optional[bool] = None,
                           enable_ip_reputation: Optional[bool] = None,
                           enable_port_scan_protection: Optional[bool] = None,
                           enabled: Optional[bool] = None,
                           enforce: Optional[bool] = None,
                           enforce_after_days: Optional[int] = None,
                           enforce_scheduler_added_on: Optional[int] = None,
                           exclude_application_scopes: Optional[Sequence[str]] = None,
                           executable_blacklists: Optional[Sequence[ContainerRuntimePolicyExecutableBlacklistArgs]] = None,
                           failed_kubernetes_checks: Optional[ContainerRuntimePolicyFailedKubernetesChecksArgs] = None,
                           file_block: Optional[ContainerRuntimePolicyFileBlockArgs] = None,
                           file_integrity_monitoring: Optional[ContainerRuntimePolicyFileIntegrityMonitoringArgs] = None,
                           fork_guard_process_limit: Optional[int] = None,
                           image_name: Optional[str] = None,
                           is_audit_checked: Optional[bool] = None,
                           is_auto_generated: Optional[bool] = None,
                           is_ootb_policy: Optional[bool] = None,
                           lastupdate: Optional[int] = None,
                           limit_container_privileges: Optional[Sequence[ContainerRuntimePolicyLimitContainerPrivilegeArgs]] = None,
                           limit_new_privileges: Optional[bool] = None,
                           linux_capabilities: Optional[ContainerRuntimePolicyLinuxCapabilitiesArgs] = None,
                           malware_scan_options: Optional[ContainerRuntimePolicyMalwareScanOptionsArgs] = None,
                           monitor_system_time_changes: Optional[bool] = None,
                           name: Optional[str] = None,
                           no_new_privileges: Optional[bool] = None,
                           only_registered_images: Optional[bool] = None,
                           package_block: Optional[ContainerRuntimePolicyPackageBlockArgs] = None,
                           permission: Optional[str] = None,
                           port_block: Optional[ContainerRuntimePolicyPortBlockArgs] = None,
                           readonly_files: Optional[ContainerRuntimePolicyReadonlyFilesArgs] = None,
                           readonly_registry: Optional[ContainerRuntimePolicyReadonlyRegistryArgs] = None,
                           registry: Optional[str] = None,
                           registry_access_monitoring: Optional[ContainerRuntimePolicyRegistryAccessMonitoringArgs] = None,
                           repo_name: Optional[str] = None,
                           resource_name_: Optional[str] = None,
                           resource_type: Optional[str] = None,
                           restricted_volumes: Optional[Sequence[ContainerRuntimePolicyRestrictedVolumeArgs]] = None,
                           reverse_shell: Optional[ContainerRuntimePolicyReverseShellArgs] = None,
                           runtime_mode: Optional[int] = None,
                           runtime_type: Optional[str] = None,
                           scope_expression: Optional[str] = None,
                           scope_variables: Optional[Sequence[ContainerRuntimePolicyScopeVariableArgs]] = None,
                           scopes: Optional[Sequence[ContainerRuntimePolicyScopeArgs]] = None,
                           system_integrity_protection: Optional[ContainerRuntimePolicySystemIntegrityProtectionArgs] = None,
                           tripwire: Optional[ContainerRuntimePolicyTripwireArgs] = None,
                           type: Optional[str] = None,
                           updated: Optional[str] = None,
                           version: Optional[str] = None,
                           vpatch_version: Optional[str] = None,
                           whitelisted_os_users: Optional[ContainerRuntimePolicyWhitelistedOsUsersArgs] = None)func NewContainerRuntimePolicy(ctx *Context, name string, args *ContainerRuntimePolicyArgs, opts ...ResourceOption) (*ContainerRuntimePolicy, error)public ContainerRuntimePolicy(string name, ContainerRuntimePolicyArgs? args = null, CustomResourceOptions? opts = null)
public ContainerRuntimePolicy(String name, ContainerRuntimePolicyArgs args)
public ContainerRuntimePolicy(String name, ContainerRuntimePolicyArgs args, CustomResourceOptions options)
type: aquasec:ContainerRuntimePolicy
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args ContainerRuntimePolicyArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args ContainerRuntimePolicyArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args ContainerRuntimePolicyArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args ContainerRuntimePolicyArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args ContainerRuntimePolicyArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var containerRuntimePolicyResource = new Aquasec.ContainerRuntimePolicy("containerRuntimePolicyResource", new()
{
    AllowedExecutables = new[]
    {
        new Aquasec.Inputs.ContainerRuntimePolicyAllowedExecutableArgs
        {
            AllowExecutables = new[]
            {
                "string",
            },
            AllowRootExecutables = new[]
            {
                "string",
            },
            Enabled = false,
            SeparateExecutables = false,
        },
    },
    AllowedRegistries = new[]
    {
        new Aquasec.Inputs.ContainerRuntimePolicyAllowedRegistryArgs
        {
            AllowedRegistries = new[]
            {
                "string",
            },
            Enabled = false,
        },
    },
    ApplicationScopes = new[]
    {
        "string",
    },
    AuditAllNetworkActivity = false,
    AuditAllProcessesActivity = false,
    AuditBruteForceLogin = false,
    AuditFullCommandArguments = false,
    Auditing = new Aquasec.Inputs.ContainerRuntimePolicyAuditingArgs
    {
        AuditAllNetwork = false,
        AuditAllProcesses = false,
        AuditFailedLogin = false,
        AuditOsUserActivity = false,
        AuditProcessCmdline = false,
        AuditSuccessLogin = false,
        AuditUserAccountManagement = false,
        Enabled = false,
    },
    Author = "string",
    BlacklistedOsUsers = new Aquasec.Inputs.ContainerRuntimePolicyBlacklistedOsUsersArgs
    {
        Enabled = false,
        GroupBlackLists = new[]
        {
            "string",
        },
        UserBlackLists = new[]
        {
            "string",
        },
    },
    BlockAccessHostNetwork = false,
    BlockAddingCapabilities = false,
    BlockContainerExec = false,
    BlockCryptocurrencyMining = false,
    BlockDisallowedImages = false,
    BlockFilelessExec = false,
    BlockLowPortBinding = false,
    BlockNonCompliantWorkloads = false,
    BlockNonK8sContainers = false,
    BlockPrivilegedContainers = false,
    BlockRootUser = false,
    BlockUseIpcNamespace = false,
    BlockUsePidNamespace = false,
    BlockUseUserNamespace = false,
    BlockUseUtsNamespace = false,
    BlockedCapabilities = new[]
    {
        "string",
    },
    BlockedExecutables = new[]
    {
        "string",
    },
    BlockedFiles = new[]
    {
        "string",
    },
    BlockedInboundPorts = new[]
    {
        "string",
    },
    BlockedOutboundPorts = new[]
    {
        "string",
    },
    BlockedPackages = new[]
    {
        "string",
    },
    BlockedVolumes = new[]
    {
        "string",
    },
    BypassScopes = new[]
    {
        new Aquasec.Inputs.ContainerRuntimePolicyBypassScopeArgs
        {
            Enabled = false,
            Scopes = new[]
            {
                new Aquasec.Inputs.ContainerRuntimePolicyBypassScopeScopeArgs
                {
                    Expression = "string",
                    Variables = new[]
                    {
                        new Aquasec.Inputs.ContainerRuntimePolicyBypassScopeScopeVariableArgs
                        {
                            Attribute = "string",
                            Value = "string",
                        },
                    },
                },
            },
        },
    },
    ContainerExec = new Aquasec.Inputs.ContainerRuntimePolicyContainerExecArgs
    {
        BlockContainerExec = false,
        ContainerExecProcWhiteLists = new[]
        {
            "string",
        },
        Enabled = false,
        ReverseShellIpWhiteLists = new[]
        {
            "string",
        },
    },
    ContainerExecAllowedProcesses = new[]
    {
        "string",
    },
    Created = "string",
    Cve = "string",
    DefaultSecurityProfile = "string",
    Description = "string",
    Digest = "string",
    DriftPreventions = new[]
    {
        new Aquasec.Inputs.ContainerRuntimePolicyDriftPreventionArgs
        {
            Enabled = false,
            ExecLockdown = false,
            ExecLockdownWhiteLists = new[]
            {
                "string",
            },
            ImageLockdown = false,
        },
    },
    EnableCryptoMiningDns = false,
    EnableForkGuard = false,
    EnableIpReputation = false,
    EnablePortScanProtection = false,
    Enabled = false,
    Enforce = false,
    EnforceAfterDays = 0,
    EnforceSchedulerAddedOn = 0,
    ExcludeApplicationScopes = new[]
    {
        "string",
    },
    ExecutableBlacklists = new[]
    {
        new Aquasec.Inputs.ContainerRuntimePolicyExecutableBlacklistArgs
        {
            Enabled = false,
            Executables = new[]
            {
                "string",
            },
        },
    },
    FailedKubernetesChecks = new Aquasec.Inputs.ContainerRuntimePolicyFailedKubernetesChecksArgs
    {
        Enabled = false,
        FailedChecks = new[]
        {
            "string",
        },
    },
    FileBlock = new Aquasec.Inputs.ContainerRuntimePolicyFileBlockArgs
    {
        BlockFilesProcesses = new[]
        {
            "string",
        },
        BlockFilesUsers = new[]
        {
            "string",
        },
        Enabled = false,
        ExceptionalBlockFiles = new[]
        {
            "string",
        },
        ExceptionalBlockFilesProcesses = new[]
        {
            "string",
        },
        ExceptionalBlockFilesUsers = new[]
        {
            "string",
        },
        FilenameBlockLists = new[]
        {
            "string",
        },
    },
    FileIntegrityMonitoring = new Aquasec.Inputs.ContainerRuntimePolicyFileIntegrityMonitoringArgs
    {
        Enabled = false,
        ExceptionalMonitoredFiles = new[]
        {
            "string",
        },
        ExceptionalMonitoredFilesProcesses = new[]
        {
            "string",
        },
        ExceptionalMonitoredFilesUsers = new[]
        {
            "string",
        },
        MonitoredFiles = new[]
        {
            "string",
        },
        MonitoredFilesAttributes = false,
        MonitoredFilesCreate = false,
        MonitoredFilesDelete = false,
        MonitoredFilesModify = false,
        MonitoredFilesProcesses = new[]
        {
            "string",
        },
        MonitoredFilesRead = false,
        MonitoredFilesUsers = new[]
        {
            "string",
        },
    },
    ForkGuardProcessLimit = 0,
    ImageName = "string",
    IsAuditChecked = false,
    IsAutoGenerated = false,
    IsOotbPolicy = false,
    Lastupdate = 0,
    LimitContainerPrivileges = new[]
    {
        new Aquasec.Inputs.ContainerRuntimePolicyLimitContainerPrivilegeArgs
        {
            BlockAddCapabilities = false,
            Enabled = false,
            Ipcmode = false,
            Netmode = false,
            Pidmode = false,
            PreventLowPortBinding = false,
            PreventRootUser = false,
            Privileged = false,
            UseHostUser = false,
            Usermode = false,
            Utsmode = false,
        },
    },
    LimitNewPrivileges = false,
    LinuxCapabilities = new Aquasec.Inputs.ContainerRuntimePolicyLinuxCapabilitiesArgs
    {
        Enabled = false,
        RemoveLinuxCapabilities = new[]
        {
            "string",
        },
    },
    MalwareScanOptions = new Aquasec.Inputs.ContainerRuntimePolicyMalwareScanOptionsArgs
    {
        Action = "string",
        Enabled = false,
        ExcludeDirectories = new[]
        {
            "string",
        },
        ExcludeProcesses = new[]
        {
            "string",
        },
        IncludeDirectories = new[]
        {
            "string",
        },
    },
    MonitorSystemTimeChanges = false,
    Name = "string",
    NoNewPrivileges = false,
    OnlyRegisteredImages = false,
    PackageBlock = new Aquasec.Inputs.ContainerRuntimePolicyPackageBlockArgs
    {
        BlockPackagesProcesses = new[]
        {
            "string",
        },
        BlockPackagesUsers = new[]
        {
            "string",
        },
        Enabled = false,
        ExceptionalBlockPackagesFiles = new[]
        {
            "string",
        },
        ExceptionalBlockPackagesProcesses = new[]
        {
            "string",
        },
        ExceptionalBlockPackagesUsers = new[]
        {
            "string",
        },
        PackagesBlackLists = new[]
        {
            "string",
        },
    },
    Permission = "string",
    PortBlock = new Aquasec.Inputs.ContainerRuntimePolicyPortBlockArgs
    {
        BlockInboundPorts = new[]
        {
            "string",
        },
        BlockOutboundPorts = new[]
        {
            "string",
        },
        Enabled = false,
    },
    ReadonlyFiles = new Aquasec.Inputs.ContainerRuntimePolicyReadonlyFilesArgs
    {
        Enabled = false,
        ExceptionalReadonlyFiles = new[]
        {
            "string",
        },
        ExceptionalReadonlyFilesProcesses = new[]
        {
            "string",
        },
        ExceptionalReadonlyFilesUsers = new[]
        {
            "string",
        },
        ReadonlyFiles = new[]
        {
            "string",
        },
        ReadonlyFilesProcesses = new[]
        {
            "string",
        },
        ReadonlyFilesUsers = new[]
        {
            "string",
        },
    },
    ReadonlyRegistry = new Aquasec.Inputs.ContainerRuntimePolicyReadonlyRegistryArgs
    {
        Enabled = false,
        ExceptionalReadonlyRegistryPaths = new[]
        {
            "string",
        },
        ExceptionalReadonlyRegistryProcesses = new[]
        {
            "string",
        },
        ExceptionalReadonlyRegistryUsers = new[]
        {
            "string",
        },
        ReadonlyRegistryPaths = new[]
        {
            "string",
        },
        ReadonlyRegistryProcesses = new[]
        {
            "string",
        },
        ReadonlyRegistryUsers = new[]
        {
            "string",
        },
    },
    Registry = "string",
    RegistryAccessMonitoring = new Aquasec.Inputs.ContainerRuntimePolicyRegistryAccessMonitoringArgs
    {
        Enabled = false,
        ExceptionalMonitoredRegistryPaths = new[]
        {
            "string",
        },
        ExceptionalMonitoredRegistryProcesses = new[]
        {
            "string",
        },
        ExceptionalMonitoredRegistryUsers = new[]
        {
            "string",
        },
        MonitoredRegistryAttributes = false,
        MonitoredRegistryCreate = false,
        MonitoredRegistryDelete = false,
        MonitoredRegistryModify = false,
        MonitoredRegistryPaths = new[]
        {
            "string",
        },
        MonitoredRegistryProcesses = new[]
        {
            "string",
        },
        MonitoredRegistryRead = false,
        MonitoredRegistryUsers = new[]
        {
            "string",
        },
    },
    RepoName = "string",
    ResourceName = "string",
    ResourceType = "string",
    RestrictedVolumes = new[]
    {
        new Aquasec.Inputs.ContainerRuntimePolicyRestrictedVolumeArgs
        {
            Enabled = false,
            Volumes = new[]
            {
                "string",
            },
        },
    },
    ReverseShell = new Aquasec.Inputs.ContainerRuntimePolicyReverseShellArgs
    {
        BlockReverseShell = false,
        Enabled = false,
        ReverseShellIpWhiteLists = new[]
        {
            "string",
        },
        ReverseShellProcWhiteLists = new[]
        {
            "string",
        },
    },
    RuntimeMode = 0,
    RuntimeType = "string",
    ScopeExpression = "string",
    ScopeVariables = new[]
    {
        new Aquasec.Inputs.ContainerRuntimePolicyScopeVariableArgs
        {
            Attribute = "string",
            Value = "string",
            Name = "string",
        },
    },
    Scopes = new[]
    {
        new Aquasec.Inputs.ContainerRuntimePolicyScopeArgs
        {
            Expression = "string",
            Variables = new[]
            {
                new Aquasec.Inputs.ContainerRuntimePolicyScopeVariableArgs
                {
                    Attribute = "string",
                    Value = "string",
                    Name = "string",
                },
            },
        },
    },
    SystemIntegrityProtection = new Aquasec.Inputs.ContainerRuntimePolicySystemIntegrityProtectionArgs
    {
        AuditSystemtimeChange = false,
        Enabled = false,
        MonitorAuditLogIntegrity = false,
        WindowsServicesMonitoring = false,
    },
    Tripwire = new Aquasec.Inputs.ContainerRuntimePolicyTripwireArgs
    {
        ApplyOns = new[]
        {
            "string",
        },
        Enabled = false,
        ServerlessApp = "string",
        UserId = "string",
        UserPassword = "string",
    },
    Type = "string",
    Updated = "string",
    Version = "string",
    VpatchVersion = "string",
    WhitelistedOsUsers = new Aquasec.Inputs.ContainerRuntimePolicyWhitelistedOsUsersArgs
    {
        Enabled = false,
        GroupWhiteLists = new[]
        {
            "string",
        },
        UserWhiteLists = new[]
        {
            "string",
        },
    },
});
example, err := aquasec.NewContainerRuntimePolicy(ctx, "containerRuntimePolicyResource", &aquasec.ContainerRuntimePolicyArgs{
	AllowedExecutables: aquasec.ContainerRuntimePolicyAllowedExecutableArray{
		&aquasec.ContainerRuntimePolicyAllowedExecutableArgs{
			AllowExecutables: pulumi.StringArray{
				pulumi.String("string"),
			},
			AllowRootExecutables: pulumi.StringArray{
				pulumi.String("string"),
			},
			Enabled:             pulumi.Bool(false),
			SeparateExecutables: pulumi.Bool(false),
		},
	},
	AllowedRegistries: aquasec.ContainerRuntimePolicyAllowedRegistryArray{
		&aquasec.ContainerRuntimePolicyAllowedRegistryArgs{
			AllowedRegistries: pulumi.StringArray{
				pulumi.String("string"),
			},
			Enabled: pulumi.Bool(false),
		},
	},
	ApplicationScopes: pulumi.StringArray{
		pulumi.String("string"),
	},
	AuditAllNetworkActivity:   pulumi.Bool(false),
	AuditAllProcessesActivity: pulumi.Bool(false),
	AuditBruteForceLogin:      pulumi.Bool(false),
	AuditFullCommandArguments: pulumi.Bool(false),
	Auditing: &aquasec.ContainerRuntimePolicyAuditingArgs{
		AuditAllNetwork:            pulumi.Bool(false),
		AuditAllProcesses:          pulumi.Bool(false),
		AuditFailedLogin:           pulumi.Bool(false),
		AuditOsUserActivity:        pulumi.Bool(false),
		AuditProcessCmdline:        pulumi.Bool(false),
		AuditSuccessLogin:          pulumi.Bool(false),
		AuditUserAccountManagement: pulumi.Bool(false),
		Enabled:                    pulumi.Bool(false),
	},
	Author: pulumi.String("string"),
	BlacklistedOsUsers: &aquasec.ContainerRuntimePolicyBlacklistedOsUsersArgs{
		Enabled: pulumi.Bool(false),
		GroupBlackLists: pulumi.StringArray{
			pulumi.String("string"),
		},
		UserBlackLists: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	BlockAccessHostNetwork:     pulumi.Bool(false),
	BlockAddingCapabilities:    pulumi.Bool(false),
	BlockContainerExec:         pulumi.Bool(false),
	BlockCryptocurrencyMining:  pulumi.Bool(false),
	BlockDisallowedImages:      pulumi.Bool(false),
	BlockFilelessExec:          pulumi.Bool(false),
	BlockLowPortBinding:        pulumi.Bool(false),
	BlockNonCompliantWorkloads: pulumi.Bool(false),
	BlockNonK8sContainers:      pulumi.Bool(false),
	BlockPrivilegedContainers:  pulumi.Bool(false),
	BlockRootUser:              pulumi.Bool(false),
	BlockUseIpcNamespace:       pulumi.Bool(false),
	BlockUsePidNamespace:       pulumi.Bool(false),
	BlockUseUserNamespace:      pulumi.Bool(false),
	BlockUseUtsNamespace:       pulumi.Bool(false),
	BlockedCapabilities: pulumi.StringArray{
		pulumi.String("string"),
	},
	BlockedExecutables: pulumi.StringArray{
		pulumi.String("string"),
	},
	BlockedFiles: pulumi.StringArray{
		pulumi.String("string"),
	},
	BlockedInboundPorts: pulumi.StringArray{
		pulumi.String("string"),
	},
	BlockedOutboundPorts: pulumi.StringArray{
		pulumi.String("string"),
	},
	BlockedPackages: pulumi.StringArray{
		pulumi.String("string"),
	},
	BlockedVolumes: pulumi.StringArray{
		pulumi.String("string"),
	},
	BypassScopes: aquasec.ContainerRuntimePolicyBypassScopeArray{
		&aquasec.ContainerRuntimePolicyBypassScopeArgs{
			Enabled: pulumi.Bool(false),
			Scopes: aquasec.ContainerRuntimePolicyBypassScopeScopeArray{
				&aquasec.ContainerRuntimePolicyBypassScopeScopeArgs{
					Expression: pulumi.String("string"),
					Variables: aquasec.ContainerRuntimePolicyBypassScopeScopeVariableArray{
						&aquasec.ContainerRuntimePolicyBypassScopeScopeVariableArgs{
							Attribute: pulumi.String("string"),
							Value:     pulumi.String("string"),
						},
					},
				},
			},
		},
	},
	ContainerExec: &aquasec.ContainerRuntimePolicyContainerExecArgs{
		BlockContainerExec: pulumi.Bool(false),
		ContainerExecProcWhiteLists: pulumi.StringArray{
			pulumi.String("string"),
		},
		Enabled: pulumi.Bool(false),
		ReverseShellIpWhiteLists: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	ContainerExecAllowedProcesses: pulumi.StringArray{
		pulumi.String("string"),
	},
	Created:                pulumi.String("string"),
	Cve:                    pulumi.String("string"),
	DefaultSecurityProfile: pulumi.String("string"),
	Description:            pulumi.String("string"),
	Digest:                 pulumi.String("string"),
	DriftPreventions: aquasec.ContainerRuntimePolicyDriftPreventionArray{
		&aquasec.ContainerRuntimePolicyDriftPreventionArgs{
			Enabled:      pulumi.Bool(false),
			ExecLockdown: pulumi.Bool(false),
			ExecLockdownWhiteLists: pulumi.StringArray{
				pulumi.String("string"),
			},
			ImageLockdown: pulumi.Bool(false),
		},
	},
	EnableCryptoMiningDns:    pulumi.Bool(false),
	EnableForkGuard:          pulumi.Bool(false),
	EnableIpReputation:       pulumi.Bool(false),
	EnablePortScanProtection: pulumi.Bool(false),
	Enabled:                  pulumi.Bool(false),
	Enforce:                  pulumi.Bool(false),
	EnforceAfterDays:         pulumi.Int(0),
	EnforceSchedulerAddedOn:  pulumi.Int(0),
	ExcludeApplicationScopes: pulumi.StringArray{
		pulumi.String("string"),
	},
	ExecutableBlacklists: aquasec.ContainerRuntimePolicyExecutableBlacklistArray{
		&aquasec.ContainerRuntimePolicyExecutableBlacklistArgs{
			Enabled: pulumi.Bool(false),
			Executables: pulumi.StringArray{
				pulumi.String("string"),
			},
		},
	},
	FailedKubernetesChecks: &aquasec.ContainerRuntimePolicyFailedKubernetesChecksArgs{
		Enabled: pulumi.Bool(false),
		FailedChecks: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	FileBlock: &aquasec.ContainerRuntimePolicyFileBlockArgs{
		BlockFilesProcesses: pulumi.StringArray{
			pulumi.String("string"),
		},
		BlockFilesUsers: pulumi.StringArray{
			pulumi.String("string"),
		},
		Enabled: pulumi.Bool(false),
		ExceptionalBlockFiles: pulumi.StringArray{
			pulumi.String("string"),
		},
		ExceptionalBlockFilesProcesses: pulumi.StringArray{
			pulumi.String("string"),
		},
		ExceptionalBlockFilesUsers: pulumi.StringArray{
			pulumi.String("string"),
		},
		FilenameBlockLists: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	FileIntegrityMonitoring: &aquasec.ContainerRuntimePolicyFileIntegrityMonitoringArgs{
		Enabled: pulumi.Bool(false),
		ExceptionalMonitoredFiles: pulumi.StringArray{
			pulumi.String("string"),
		},
		ExceptionalMonitoredFilesProcesses: pulumi.StringArray{
			pulumi.String("string"),
		},
		ExceptionalMonitoredFilesUsers: pulumi.StringArray{
			pulumi.String("string"),
		},
		MonitoredFiles: pulumi.StringArray{
			pulumi.String("string"),
		},
		MonitoredFilesAttributes: pulumi.Bool(false),
		MonitoredFilesCreate:     pulumi.Bool(false),
		MonitoredFilesDelete:     pulumi.Bool(false),
		MonitoredFilesModify:     pulumi.Bool(false),
		MonitoredFilesProcesses: pulumi.StringArray{
			pulumi.String("string"),
		},
		MonitoredFilesRead: pulumi.Bool(false),
		MonitoredFilesUsers: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	ForkGuardProcessLimit: pulumi.Int(0),
	ImageName:             pulumi.String("string"),
	IsAuditChecked:        pulumi.Bool(false),
	IsAutoGenerated:       pulumi.Bool(false),
	IsOotbPolicy:          pulumi.Bool(false),
	Lastupdate:            pulumi.Int(0),
	LimitContainerPrivileges: aquasec.ContainerRuntimePolicyLimitContainerPrivilegeArray{
		&aquasec.ContainerRuntimePolicyLimitContainerPrivilegeArgs{
			BlockAddCapabilities:  pulumi.Bool(false),
			Enabled:               pulumi.Bool(false),
			Ipcmode:               pulumi.Bool(false),
			Netmode:               pulumi.Bool(false),
			Pidmode:               pulumi.Bool(false),
			PreventLowPortBinding: pulumi.Bool(false),
			PreventRootUser:       pulumi.Bool(false),
			Privileged:            pulumi.Bool(false),
			UseHostUser:           pulumi.Bool(false),
			Usermode:              pulumi.Bool(false),
			Utsmode:               pulumi.Bool(false),
		},
	},
	LimitNewPrivileges: pulumi.Bool(false),
	LinuxCapabilities: &aquasec.ContainerRuntimePolicyLinuxCapabilitiesArgs{
		Enabled: pulumi.Bool(false),
		RemoveLinuxCapabilities: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	MalwareScanOptions: &aquasec.ContainerRuntimePolicyMalwareScanOptionsArgs{
		Action:  pulumi.String("string"),
		Enabled: pulumi.Bool(false),
		ExcludeDirectories: pulumi.StringArray{
			pulumi.String("string"),
		},
		ExcludeProcesses: pulumi.StringArray{
			pulumi.String("string"),
		},
		IncludeDirectories: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	MonitorSystemTimeChanges: pulumi.Bool(false),
	Name:                     pulumi.String("string"),
	NoNewPrivileges:          pulumi.Bool(false),
	OnlyRegisteredImages:     pulumi.Bool(false),
	PackageBlock: &aquasec.ContainerRuntimePolicyPackageBlockArgs{
		BlockPackagesProcesses: pulumi.StringArray{
			pulumi.String("string"),
		},
		BlockPackagesUsers: pulumi.StringArray{
			pulumi.String("string"),
		},
		Enabled: pulumi.Bool(false),
		ExceptionalBlockPackagesFiles: pulumi.StringArray{
			pulumi.String("string"),
		},
		ExceptionalBlockPackagesProcesses: pulumi.StringArray{
			pulumi.String("string"),
		},
		ExceptionalBlockPackagesUsers: pulumi.StringArray{
			pulumi.String("string"),
		},
		PackagesBlackLists: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	Permission: pulumi.String("string"),
	PortBlock: &aquasec.ContainerRuntimePolicyPortBlockArgs{
		BlockInboundPorts: pulumi.StringArray{
			pulumi.String("string"),
		},
		BlockOutboundPorts: pulumi.StringArray{
			pulumi.String("string"),
		},
		Enabled: pulumi.Bool(false),
	},
	ReadonlyFiles: &aquasec.ContainerRuntimePolicyReadonlyFilesArgs{
		Enabled: pulumi.Bool(false),
		ExceptionalReadonlyFiles: pulumi.StringArray{
			pulumi.String("string"),
		},
		ExceptionalReadonlyFilesProcesses: pulumi.StringArray{
			pulumi.String("string"),
		},
		ExceptionalReadonlyFilesUsers: pulumi.StringArray{
			pulumi.String("string"),
		},
		ReadonlyFiles: pulumi.StringArray{
			pulumi.String("string"),
		},
		ReadonlyFilesProcesses: pulumi.StringArray{
			pulumi.String("string"),
		},
		ReadonlyFilesUsers: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	ReadonlyRegistry: &aquasec.ContainerRuntimePolicyReadonlyRegistryArgs{
		Enabled: pulumi.Bool(false),
		ExceptionalReadonlyRegistryPaths: pulumi.StringArray{
			pulumi.String("string"),
		},
		ExceptionalReadonlyRegistryProcesses: pulumi.StringArray{
			pulumi.String("string"),
		},
		ExceptionalReadonlyRegistryUsers: pulumi.StringArray{
			pulumi.String("string"),
		},
		ReadonlyRegistryPaths: pulumi.StringArray{
			pulumi.String("string"),
		},
		ReadonlyRegistryProcesses: pulumi.StringArray{
			pulumi.String("string"),
		},
		ReadonlyRegistryUsers: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	Registry: pulumi.String("string"),
	RegistryAccessMonitoring: &aquasec.ContainerRuntimePolicyRegistryAccessMonitoringArgs{
		Enabled: pulumi.Bool(false),
		ExceptionalMonitoredRegistryPaths: pulumi.StringArray{
			pulumi.String("string"),
		},
		ExceptionalMonitoredRegistryProcesses: pulumi.StringArray{
			pulumi.String("string"),
		},
		ExceptionalMonitoredRegistryUsers: pulumi.StringArray{
			pulumi.String("string"),
		},
		MonitoredRegistryAttributes: pulumi.Bool(false),
		MonitoredRegistryCreate:     pulumi.Bool(false),
		MonitoredRegistryDelete:     pulumi.Bool(false),
		MonitoredRegistryModify:     pulumi.Bool(false),
		MonitoredRegistryPaths: pulumi.StringArray{
			pulumi.String("string"),
		},
		MonitoredRegistryProcesses: pulumi.StringArray{
			pulumi.String("string"),
		},
		MonitoredRegistryRead: pulumi.Bool(false),
		MonitoredRegistryUsers: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	RepoName:     pulumi.String("string"),
	ResourceName: pulumi.String("string"),
	ResourceType: pulumi.String("string"),
	RestrictedVolumes: aquasec.ContainerRuntimePolicyRestrictedVolumeArray{
		&aquasec.ContainerRuntimePolicyRestrictedVolumeArgs{
			Enabled: pulumi.Bool(false),
			Volumes: pulumi.StringArray{
				pulumi.String("string"),
			},
		},
	},
	ReverseShell: &aquasec.ContainerRuntimePolicyReverseShellArgs{
		BlockReverseShell: pulumi.Bool(false),
		Enabled:           pulumi.Bool(false),
		ReverseShellIpWhiteLists: pulumi.StringArray{
			pulumi.String("string"),
		},
		ReverseShellProcWhiteLists: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	RuntimeMode:     pulumi.Int(0),
	RuntimeType:     pulumi.String("string"),
	ScopeExpression: pulumi.String("string"),
	ScopeVariables: aquasec.ContainerRuntimePolicyScopeVariableArray{
		&aquasec.ContainerRuntimePolicyScopeVariableArgs{
			Attribute: pulumi.String("string"),
			Value:     pulumi.String("string"),
			Name:      pulumi.String("string"),
		},
	},
	Scopes: aquasec.ContainerRuntimePolicyScopeArray{
		&aquasec.ContainerRuntimePolicyScopeArgs{
			Expression: pulumi.String("string"),
			Variables: aquasec.ContainerRuntimePolicyScopeVariableArray{
				&aquasec.ContainerRuntimePolicyScopeVariableArgs{
					Attribute: pulumi.String("string"),
					Value:     pulumi.String("string"),
					Name:      pulumi.String("string"),
				},
			},
		},
	},
	SystemIntegrityProtection: &aquasec.ContainerRuntimePolicySystemIntegrityProtectionArgs{
		AuditSystemtimeChange:     pulumi.Bool(false),
		Enabled:                   pulumi.Bool(false),
		MonitorAuditLogIntegrity:  pulumi.Bool(false),
		WindowsServicesMonitoring: pulumi.Bool(false),
	},
	Tripwire: &aquasec.ContainerRuntimePolicyTripwireArgs{
		ApplyOns: pulumi.StringArray{
			pulumi.String("string"),
		},
		Enabled:       pulumi.Bool(false),
		ServerlessApp: pulumi.String("string"),
		UserId:        pulumi.String("string"),
		UserPassword:  pulumi.String("string"),
	},
	Type:          pulumi.String("string"),
	Updated:       pulumi.String("string"),
	Version:       pulumi.String("string"),
	VpatchVersion: pulumi.String("string"),
	WhitelistedOsUsers: &aquasec.ContainerRuntimePolicyWhitelistedOsUsersArgs{
		Enabled: pulumi.Bool(false),
		GroupWhiteLists: pulumi.StringArray{
			pulumi.String("string"),
		},
		UserWhiteLists: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
})
var containerRuntimePolicyResource = new ContainerRuntimePolicy("containerRuntimePolicyResource", ContainerRuntimePolicyArgs.builder()
    .allowedExecutables(ContainerRuntimePolicyAllowedExecutableArgs.builder()
        .allowExecutables("string")
        .allowRootExecutables("string")
        .enabled(false)
        .separateExecutables(false)
        .build())
    .allowedRegistries(ContainerRuntimePolicyAllowedRegistryArgs.builder()
        .allowedRegistries("string")
        .enabled(false)
        .build())
    .applicationScopes("string")
    .auditAllNetworkActivity(false)
    .auditAllProcessesActivity(false)
    .auditBruteForceLogin(false)
    .auditFullCommandArguments(false)
    .auditing(ContainerRuntimePolicyAuditingArgs.builder()
        .auditAllNetwork(false)
        .auditAllProcesses(false)
        .auditFailedLogin(false)
        .auditOsUserActivity(false)
        .auditProcessCmdline(false)
        .auditSuccessLogin(false)
        .auditUserAccountManagement(false)
        .enabled(false)
        .build())
    .author("string")
    .blacklistedOsUsers(ContainerRuntimePolicyBlacklistedOsUsersArgs.builder()
        .enabled(false)
        .groupBlackLists("string")
        .userBlackLists("string")
        .build())
    .blockAccessHostNetwork(false)
    .blockAddingCapabilities(false)
    .blockContainerExec(false)
    .blockCryptocurrencyMining(false)
    .blockDisallowedImages(false)
    .blockFilelessExec(false)
    .blockLowPortBinding(false)
    .blockNonCompliantWorkloads(false)
    .blockNonK8sContainers(false)
    .blockPrivilegedContainers(false)
    .blockRootUser(false)
    .blockUseIpcNamespace(false)
    .blockUsePidNamespace(false)
    .blockUseUserNamespace(false)
    .blockUseUtsNamespace(false)
    .blockedCapabilities("string")
    .blockedExecutables("string")
    .blockedFiles("string")
    .blockedInboundPorts("string")
    .blockedOutboundPorts("string")
    .blockedPackages("string")
    .blockedVolumes("string")
    .bypassScopes(ContainerRuntimePolicyBypassScopeArgs.builder()
        .enabled(false)
        .scopes(ContainerRuntimePolicyBypassScopeScopeArgs.builder()
            .expression("string")
            .variables(ContainerRuntimePolicyBypassScopeScopeVariableArgs.builder()
                .attribute("string")
                .value("string")
                .build())
            .build())
        .build())
    .containerExec(ContainerRuntimePolicyContainerExecArgs.builder()
        .blockContainerExec(false)
        .containerExecProcWhiteLists("string")
        .enabled(false)
        .reverseShellIpWhiteLists("string")
        .build())
    .containerExecAllowedProcesses("string")
    .created("string")
    .cve("string")
    .defaultSecurityProfile("string")
    .description("string")
    .digest("string")
    .driftPreventions(ContainerRuntimePolicyDriftPreventionArgs.builder()
        .enabled(false)
        .execLockdown(false)
        .execLockdownWhiteLists("string")
        .imageLockdown(false)
        .build())
    .enableCryptoMiningDns(false)
    .enableForkGuard(false)
    .enableIpReputation(false)
    .enablePortScanProtection(false)
    .enabled(false)
    .enforce(false)
    .enforceAfterDays(0)
    .enforceSchedulerAddedOn(0)
    .excludeApplicationScopes("string")
    .executableBlacklists(ContainerRuntimePolicyExecutableBlacklistArgs.builder()
        .enabled(false)
        .executables("string")
        .build())
    .failedKubernetesChecks(ContainerRuntimePolicyFailedKubernetesChecksArgs.builder()
        .enabled(false)
        .failedChecks("string")
        .build())
    .fileBlock(ContainerRuntimePolicyFileBlockArgs.builder()
        .blockFilesProcesses("string")
        .blockFilesUsers("string")
        .enabled(false)
        .exceptionalBlockFiles("string")
        .exceptionalBlockFilesProcesses("string")
        .exceptionalBlockFilesUsers("string")
        .filenameBlockLists("string")
        .build())
    .fileIntegrityMonitoring(ContainerRuntimePolicyFileIntegrityMonitoringArgs.builder()
        .enabled(false)
        .exceptionalMonitoredFiles("string")
        .exceptionalMonitoredFilesProcesses("string")
        .exceptionalMonitoredFilesUsers("string")
        .monitoredFiles("string")
        .monitoredFilesAttributes(false)
        .monitoredFilesCreate(false)
        .monitoredFilesDelete(false)
        .monitoredFilesModify(false)
        .monitoredFilesProcesses("string")
        .monitoredFilesRead(false)
        .monitoredFilesUsers("string")
        .build())
    .forkGuardProcessLimit(0)
    .imageName("string")
    .isAuditChecked(false)
    .isAutoGenerated(false)
    .isOotbPolicy(false)
    .lastupdate(0)
    .limitContainerPrivileges(ContainerRuntimePolicyLimitContainerPrivilegeArgs.builder()
        .blockAddCapabilities(false)
        .enabled(false)
        .ipcmode(false)
        .netmode(false)
        .pidmode(false)
        .preventLowPortBinding(false)
        .preventRootUser(false)
        .privileged(false)
        .useHostUser(false)
        .usermode(false)
        .utsmode(false)
        .build())
    .limitNewPrivileges(false)
    .linuxCapabilities(ContainerRuntimePolicyLinuxCapabilitiesArgs.builder()
        .enabled(false)
        .removeLinuxCapabilities("string")
        .build())
    .malwareScanOptions(ContainerRuntimePolicyMalwareScanOptionsArgs.builder()
        .action("string")
        .enabled(false)
        .excludeDirectories("string")
        .excludeProcesses("string")
        .includeDirectories("string")
        .build())
    .monitorSystemTimeChanges(false)
    .name("string")
    .noNewPrivileges(false)
    .onlyRegisteredImages(false)
    .packageBlock(ContainerRuntimePolicyPackageBlockArgs.builder()
        .blockPackagesProcesses("string")
        .blockPackagesUsers("string")
        .enabled(false)
        .exceptionalBlockPackagesFiles("string")
        .exceptionalBlockPackagesProcesses("string")
        .exceptionalBlockPackagesUsers("string")
        .packagesBlackLists("string")
        .build())
    .permission("string")
    .portBlock(ContainerRuntimePolicyPortBlockArgs.builder()
        .blockInboundPorts("string")
        .blockOutboundPorts("string")
        .enabled(false)
        .build())
    .readonlyFiles(ContainerRuntimePolicyReadonlyFilesArgs.builder()
        .enabled(false)
        .exceptionalReadonlyFiles("string")
        .exceptionalReadonlyFilesProcesses("string")
        .exceptionalReadonlyFilesUsers("string")
        .readonlyFiles("string")
        .readonlyFilesProcesses("string")
        .readonlyFilesUsers("string")
        .build())
    .readonlyRegistry(ContainerRuntimePolicyReadonlyRegistryArgs.builder()
        .enabled(false)
        .exceptionalReadonlyRegistryPaths("string")
        .exceptionalReadonlyRegistryProcesses("string")
        .exceptionalReadonlyRegistryUsers("string")
        .readonlyRegistryPaths("string")
        .readonlyRegistryProcesses("string")
        .readonlyRegistryUsers("string")
        .build())
    .registry("string")
    .registryAccessMonitoring(ContainerRuntimePolicyRegistryAccessMonitoringArgs.builder()
        .enabled(false)
        .exceptionalMonitoredRegistryPaths("string")
        .exceptionalMonitoredRegistryProcesses("string")
        .exceptionalMonitoredRegistryUsers("string")
        .monitoredRegistryAttributes(false)
        .monitoredRegistryCreate(false)
        .monitoredRegistryDelete(false)
        .monitoredRegistryModify(false)
        .monitoredRegistryPaths("string")
        .monitoredRegistryProcesses("string")
        .monitoredRegistryRead(false)
        .monitoredRegistryUsers("string")
        .build())
    .repoName("string")
    .resourceName("string")
    .resourceType("string")
    .restrictedVolumes(ContainerRuntimePolicyRestrictedVolumeArgs.builder()
        .enabled(false)
        .volumes("string")
        .build())
    .reverseShell(ContainerRuntimePolicyReverseShellArgs.builder()
        .blockReverseShell(false)
        .enabled(false)
        .reverseShellIpWhiteLists("string")
        .reverseShellProcWhiteLists("string")
        .build())
    .runtimeMode(0)
    .runtimeType("string")
    .scopeExpression("string")
    .scopeVariables(ContainerRuntimePolicyScopeVariableArgs.builder()
        .attribute("string")
        .value("string")
        .name("string")
        .build())
    .scopes(ContainerRuntimePolicyScopeArgs.builder()
        .expression("string")
        .variables(ContainerRuntimePolicyScopeVariableArgs.builder()
            .attribute("string")
            .value("string")
            .name("string")
            .build())
        .build())
    .systemIntegrityProtection(ContainerRuntimePolicySystemIntegrityProtectionArgs.builder()
        .auditSystemtimeChange(false)
        .enabled(false)
        .monitorAuditLogIntegrity(false)
        .windowsServicesMonitoring(false)
        .build())
    .tripwire(ContainerRuntimePolicyTripwireArgs.builder()
        .applyOns("string")
        .enabled(false)
        .serverlessApp("string")
        .userId("string")
        .userPassword("string")
        .build())
    .type("string")
    .updated("string")
    .version("string")
    .vpatchVersion("string")
    .whitelistedOsUsers(ContainerRuntimePolicyWhitelistedOsUsersArgs.builder()
        .enabled(false)
        .groupWhiteLists("string")
        .userWhiteLists("string")
        .build())
    .build());
container_runtime_policy_resource = aquasec.ContainerRuntimePolicy("containerRuntimePolicyResource",
    allowed_executables=[{
        "allow_executables": ["string"],
        "allow_root_executables": ["string"],
        "enabled": False,
        "separate_executables": False,
    }],
    allowed_registries=[{
        "allowed_registries": ["string"],
        "enabled": False,
    }],
    application_scopes=["string"],
    audit_all_network_activity=False,
    audit_all_processes_activity=False,
    audit_brute_force_login=False,
    audit_full_command_arguments=False,
    auditing={
        "audit_all_network": False,
        "audit_all_processes": False,
        "audit_failed_login": False,
        "audit_os_user_activity": False,
        "audit_process_cmdline": False,
        "audit_success_login": False,
        "audit_user_account_management": False,
        "enabled": False,
    },
    author="string",
    blacklisted_os_users={
        "enabled": False,
        "group_black_lists": ["string"],
        "user_black_lists": ["string"],
    },
    block_access_host_network=False,
    block_adding_capabilities=False,
    block_container_exec=False,
    block_cryptocurrency_mining=False,
    block_disallowed_images=False,
    block_fileless_exec=False,
    block_low_port_binding=False,
    block_non_compliant_workloads=False,
    block_non_k8s_containers=False,
    block_privileged_containers=False,
    block_root_user=False,
    block_use_ipc_namespace=False,
    block_use_pid_namespace=False,
    block_use_user_namespace=False,
    block_use_uts_namespace=False,
    blocked_capabilities=["string"],
    blocked_executables=["string"],
    blocked_files=["string"],
    blocked_inbound_ports=["string"],
    blocked_outbound_ports=["string"],
    blocked_packages=["string"],
    blocked_volumes=["string"],
    bypass_scopes=[{
        "enabled": False,
        "scopes": [{
            "expression": "string",
            "variables": [{
                "attribute": "string",
                "value": "string",
            }],
        }],
    }],
    container_exec={
        "block_container_exec": False,
        "container_exec_proc_white_lists": ["string"],
        "enabled": False,
        "reverse_shell_ip_white_lists": ["string"],
    },
    container_exec_allowed_processes=["string"],
    created="string",
    cve="string",
    default_security_profile="string",
    description="string",
    digest="string",
    drift_preventions=[{
        "enabled": False,
        "exec_lockdown": False,
        "exec_lockdown_white_lists": ["string"],
        "image_lockdown": False,
    }],
    enable_crypto_mining_dns=False,
    enable_fork_guard=False,
    enable_ip_reputation=False,
    enable_port_scan_protection=False,
    enabled=False,
    enforce=False,
    enforce_after_days=0,
    enforce_scheduler_added_on=0,
    exclude_application_scopes=["string"],
    executable_blacklists=[{
        "enabled": False,
        "executables": ["string"],
    }],
    failed_kubernetes_checks={
        "enabled": False,
        "failed_checks": ["string"],
    },
    file_block={
        "block_files_processes": ["string"],
        "block_files_users": ["string"],
        "enabled": False,
        "exceptional_block_files": ["string"],
        "exceptional_block_files_processes": ["string"],
        "exceptional_block_files_users": ["string"],
        "filename_block_lists": ["string"],
    },
    file_integrity_monitoring={
        "enabled": False,
        "exceptional_monitored_files": ["string"],
        "exceptional_monitored_files_processes": ["string"],
        "exceptional_monitored_files_users": ["string"],
        "monitored_files": ["string"],
        "monitored_files_attributes": False,
        "monitored_files_create": False,
        "monitored_files_delete": False,
        "monitored_files_modify": False,
        "monitored_files_processes": ["string"],
        "monitored_files_read": False,
        "monitored_files_users": ["string"],
    },
    fork_guard_process_limit=0,
    image_name="string",
    is_audit_checked=False,
    is_auto_generated=False,
    is_ootb_policy=False,
    lastupdate=0,
    limit_container_privileges=[{
        "block_add_capabilities": False,
        "enabled": False,
        "ipcmode": False,
        "netmode": False,
        "pidmode": False,
        "prevent_low_port_binding": False,
        "prevent_root_user": False,
        "privileged": False,
        "use_host_user": False,
        "usermode": False,
        "utsmode": False,
    }],
    limit_new_privileges=False,
    linux_capabilities={
        "enabled": False,
        "remove_linux_capabilities": ["string"],
    },
    malware_scan_options={
        "action": "string",
        "enabled": False,
        "exclude_directories": ["string"],
        "exclude_processes": ["string"],
        "include_directories": ["string"],
    },
    monitor_system_time_changes=False,
    name="string",
    no_new_privileges=False,
    only_registered_images=False,
    package_block={
        "block_packages_processes": ["string"],
        "block_packages_users": ["string"],
        "enabled": False,
        "exceptional_block_packages_files": ["string"],
        "exceptional_block_packages_processes": ["string"],
        "exceptional_block_packages_users": ["string"],
        "packages_black_lists": ["string"],
    },
    permission="string",
    port_block={
        "block_inbound_ports": ["string"],
        "block_outbound_ports": ["string"],
        "enabled": False,
    },
    readonly_files={
        "enabled": False,
        "exceptional_readonly_files": ["string"],
        "exceptional_readonly_files_processes": ["string"],
        "exceptional_readonly_files_users": ["string"],
        "readonly_files": ["string"],
        "readonly_files_processes": ["string"],
        "readonly_files_users": ["string"],
    },
    readonly_registry={
        "enabled": False,
        "exceptional_readonly_registry_paths": ["string"],
        "exceptional_readonly_registry_processes": ["string"],
        "exceptional_readonly_registry_users": ["string"],
        "readonly_registry_paths": ["string"],
        "readonly_registry_processes": ["string"],
        "readonly_registry_users": ["string"],
    },
    registry="string",
    registry_access_monitoring={
        "enabled": False,
        "exceptional_monitored_registry_paths": ["string"],
        "exceptional_monitored_registry_processes": ["string"],
        "exceptional_monitored_registry_users": ["string"],
        "monitored_registry_attributes": False,
        "monitored_registry_create": False,
        "monitored_registry_delete": False,
        "monitored_registry_modify": False,
        "monitored_registry_paths": ["string"],
        "monitored_registry_processes": ["string"],
        "monitored_registry_read": False,
        "monitored_registry_users": ["string"],
    },
    repo_name="string",
    resource_name_="string",
    resource_type="string",
    restricted_volumes=[{
        "enabled": False,
        "volumes": ["string"],
    }],
    reverse_shell={
        "block_reverse_shell": False,
        "enabled": False,
        "reverse_shell_ip_white_lists": ["string"],
        "reverse_shell_proc_white_lists": ["string"],
    },
    runtime_mode=0,
    runtime_type="string",
    scope_expression="string",
    scope_variables=[{
        "attribute": "string",
        "value": "string",
        "name": "string",
    }],
    scopes=[{
        "expression": "string",
        "variables": [{
            "attribute": "string",
            "value": "string",
            "name": "string",
        }],
    }],
    system_integrity_protection={
        "audit_systemtime_change": False,
        "enabled": False,
        "monitor_audit_log_integrity": False,
        "windows_services_monitoring": False,
    },
    tripwire={
        "apply_ons": ["string"],
        "enabled": False,
        "serverless_app": "string",
        "user_id": "string",
        "user_password": "string",
    },
    type="string",
    updated="string",
    version="string",
    vpatch_version="string",
    whitelisted_os_users={
        "enabled": False,
        "group_white_lists": ["string"],
        "user_white_lists": ["string"],
    })
const containerRuntimePolicyResource = new aquasec.ContainerRuntimePolicy("containerRuntimePolicyResource", {
    allowedExecutables: [{
        allowExecutables: ["string"],
        allowRootExecutables: ["string"],
        enabled: false,
        separateExecutables: false,
    }],
    allowedRegistries: [{
        allowedRegistries: ["string"],
        enabled: false,
    }],
    applicationScopes: ["string"],
    auditAllNetworkActivity: false,
    auditAllProcessesActivity: false,
    auditBruteForceLogin: false,
    auditFullCommandArguments: false,
    auditing: {
        auditAllNetwork: false,
        auditAllProcesses: false,
        auditFailedLogin: false,
        auditOsUserActivity: false,
        auditProcessCmdline: false,
        auditSuccessLogin: false,
        auditUserAccountManagement: false,
        enabled: false,
    },
    author: "string",
    blacklistedOsUsers: {
        enabled: false,
        groupBlackLists: ["string"],
        userBlackLists: ["string"],
    },
    blockAccessHostNetwork: false,
    blockAddingCapabilities: false,
    blockContainerExec: false,
    blockCryptocurrencyMining: false,
    blockDisallowedImages: false,
    blockFilelessExec: false,
    blockLowPortBinding: false,
    blockNonCompliantWorkloads: false,
    blockNonK8sContainers: false,
    blockPrivilegedContainers: false,
    blockRootUser: false,
    blockUseIpcNamespace: false,
    blockUsePidNamespace: false,
    blockUseUserNamespace: false,
    blockUseUtsNamespace: false,
    blockedCapabilities: ["string"],
    blockedExecutables: ["string"],
    blockedFiles: ["string"],
    blockedInboundPorts: ["string"],
    blockedOutboundPorts: ["string"],
    blockedPackages: ["string"],
    blockedVolumes: ["string"],
    bypassScopes: [{
        enabled: false,
        scopes: [{
            expression: "string",
            variables: [{
                attribute: "string",
                value: "string",
            }],
        }],
    }],
    containerExec: {
        blockContainerExec: false,
        containerExecProcWhiteLists: ["string"],
        enabled: false,
        reverseShellIpWhiteLists: ["string"],
    },
    containerExecAllowedProcesses: ["string"],
    created: "string",
    cve: "string",
    defaultSecurityProfile: "string",
    description: "string",
    digest: "string",
    driftPreventions: [{
        enabled: false,
        execLockdown: false,
        execLockdownWhiteLists: ["string"],
        imageLockdown: false,
    }],
    enableCryptoMiningDns: false,
    enableForkGuard: false,
    enableIpReputation: false,
    enablePortScanProtection: false,
    enabled: false,
    enforce: false,
    enforceAfterDays: 0,
    enforceSchedulerAddedOn: 0,
    excludeApplicationScopes: ["string"],
    executableBlacklists: [{
        enabled: false,
        executables: ["string"],
    }],
    failedKubernetesChecks: {
        enabled: false,
        failedChecks: ["string"],
    },
    fileBlock: {
        blockFilesProcesses: ["string"],
        blockFilesUsers: ["string"],
        enabled: false,
        exceptionalBlockFiles: ["string"],
        exceptionalBlockFilesProcesses: ["string"],
        exceptionalBlockFilesUsers: ["string"],
        filenameBlockLists: ["string"],
    },
    fileIntegrityMonitoring: {
        enabled: false,
        exceptionalMonitoredFiles: ["string"],
        exceptionalMonitoredFilesProcesses: ["string"],
        exceptionalMonitoredFilesUsers: ["string"],
        monitoredFiles: ["string"],
        monitoredFilesAttributes: false,
        monitoredFilesCreate: false,
        monitoredFilesDelete: false,
        monitoredFilesModify: false,
        monitoredFilesProcesses: ["string"],
        monitoredFilesRead: false,
        monitoredFilesUsers: ["string"],
    },
    forkGuardProcessLimit: 0,
    imageName: "string",
    isAuditChecked: false,
    isAutoGenerated: false,
    isOotbPolicy: false,
    lastupdate: 0,
    limitContainerPrivileges: [{
        blockAddCapabilities: false,
        enabled: false,
        ipcmode: false,
        netmode: false,
        pidmode: false,
        preventLowPortBinding: false,
        preventRootUser: false,
        privileged: false,
        useHostUser: false,
        usermode: false,
        utsmode: false,
    }],
    limitNewPrivileges: false,
    linuxCapabilities: {
        enabled: false,
        removeLinuxCapabilities: ["string"],
    },
    malwareScanOptions: {
        action: "string",
        enabled: false,
        excludeDirectories: ["string"],
        excludeProcesses: ["string"],
        includeDirectories: ["string"],
    },
    monitorSystemTimeChanges: false,
    name: "string",
    noNewPrivileges: false,
    onlyRegisteredImages: false,
    packageBlock: {
        blockPackagesProcesses: ["string"],
        blockPackagesUsers: ["string"],
        enabled: false,
        exceptionalBlockPackagesFiles: ["string"],
        exceptionalBlockPackagesProcesses: ["string"],
        exceptionalBlockPackagesUsers: ["string"],
        packagesBlackLists: ["string"],
    },
    permission: "string",
    portBlock: {
        blockInboundPorts: ["string"],
        blockOutboundPorts: ["string"],
        enabled: false,
    },
    readonlyFiles: {
        enabled: false,
        exceptionalReadonlyFiles: ["string"],
        exceptionalReadonlyFilesProcesses: ["string"],
        exceptionalReadonlyFilesUsers: ["string"],
        readonlyFiles: ["string"],
        readonlyFilesProcesses: ["string"],
        readonlyFilesUsers: ["string"],
    },
    readonlyRegistry: {
        enabled: false,
        exceptionalReadonlyRegistryPaths: ["string"],
        exceptionalReadonlyRegistryProcesses: ["string"],
        exceptionalReadonlyRegistryUsers: ["string"],
        readonlyRegistryPaths: ["string"],
        readonlyRegistryProcesses: ["string"],
        readonlyRegistryUsers: ["string"],
    },
    registry: "string",
    registryAccessMonitoring: {
        enabled: false,
        exceptionalMonitoredRegistryPaths: ["string"],
        exceptionalMonitoredRegistryProcesses: ["string"],
        exceptionalMonitoredRegistryUsers: ["string"],
        monitoredRegistryAttributes: false,
        monitoredRegistryCreate: false,
        monitoredRegistryDelete: false,
        monitoredRegistryModify: false,
        monitoredRegistryPaths: ["string"],
        monitoredRegistryProcesses: ["string"],
        monitoredRegistryRead: false,
        monitoredRegistryUsers: ["string"],
    },
    repoName: "string",
    resourceName: "string",
    resourceType: "string",
    restrictedVolumes: [{
        enabled: false,
        volumes: ["string"],
    }],
    reverseShell: {
        blockReverseShell: false,
        enabled: false,
        reverseShellIpWhiteLists: ["string"],
        reverseShellProcWhiteLists: ["string"],
    },
    runtimeMode: 0,
    runtimeType: "string",
    scopeExpression: "string",
    scopeVariables: [{
        attribute: "string",
        value: "string",
        name: "string",
    }],
    scopes: [{
        expression: "string",
        variables: [{
            attribute: "string",
            value: "string",
            name: "string",
        }],
    }],
    systemIntegrityProtection: {
        auditSystemtimeChange: false,
        enabled: false,
        monitorAuditLogIntegrity: false,
        windowsServicesMonitoring: false,
    },
    tripwire: {
        applyOns: ["string"],
        enabled: false,
        serverlessApp: "string",
        userId: "string",
        userPassword: "string",
    },
    type: "string",
    updated: "string",
    version: "string",
    vpatchVersion: "string",
    whitelistedOsUsers: {
        enabled: false,
        groupWhiteLists: ["string"],
        userWhiteLists: ["string"],
    },
});
type: aquasec:ContainerRuntimePolicy
properties:
    allowedExecutables:
        - allowExecutables:
            - string
          allowRootExecutables:
            - string
          enabled: false
          separateExecutables: false
    allowedRegistries:
        - allowedRegistries:
            - string
          enabled: false
    applicationScopes:
        - string
    auditAllNetworkActivity: false
    auditAllProcessesActivity: false
    auditBruteForceLogin: false
    auditFullCommandArguments: false
    auditing:
        auditAllNetwork: false
        auditAllProcesses: false
        auditFailedLogin: false
        auditOsUserActivity: false
        auditProcessCmdline: false
        auditSuccessLogin: false
        auditUserAccountManagement: false
        enabled: false
    author: string
    blacklistedOsUsers:
        enabled: false
        groupBlackLists:
            - string
        userBlackLists:
            - string
    blockAccessHostNetwork: false
    blockAddingCapabilities: false
    blockContainerExec: false
    blockCryptocurrencyMining: false
    blockDisallowedImages: false
    blockFilelessExec: false
    blockLowPortBinding: false
    blockNonCompliantWorkloads: false
    blockNonK8sContainers: false
    blockPrivilegedContainers: false
    blockRootUser: false
    blockUseIpcNamespace: false
    blockUsePidNamespace: false
    blockUseUserNamespace: false
    blockUseUtsNamespace: false
    blockedCapabilities:
        - string
    blockedExecutables:
        - string
    blockedFiles:
        - string
    blockedInboundPorts:
        - string
    blockedOutboundPorts:
        - string
    blockedPackages:
        - string
    blockedVolumes:
        - string
    bypassScopes:
        - enabled: false
          scopes:
            - expression: string
              variables:
                - attribute: string
                  value: string
    containerExec:
        blockContainerExec: false
        containerExecProcWhiteLists:
            - string
        enabled: false
        reverseShellIpWhiteLists:
            - string
    containerExecAllowedProcesses:
        - string
    created: string
    cve: string
    defaultSecurityProfile: string
    description: string
    digest: string
    driftPreventions:
        - enabled: false
          execLockdown: false
          execLockdownWhiteLists:
            - string
          imageLockdown: false
    enableCryptoMiningDns: false
    enableForkGuard: false
    enableIpReputation: false
    enablePortScanProtection: false
    enabled: false
    enforce: false
    enforceAfterDays: 0
    enforceSchedulerAddedOn: 0
    excludeApplicationScopes:
        - string
    executableBlacklists:
        - enabled: false
          executables:
            - string
    failedKubernetesChecks:
        enabled: false
        failedChecks:
            - string
    fileBlock:
        blockFilesProcesses:
            - string
        blockFilesUsers:
            - string
        enabled: false
        exceptionalBlockFiles:
            - string
        exceptionalBlockFilesProcesses:
            - string
        exceptionalBlockFilesUsers:
            - string
        filenameBlockLists:
            - string
    fileIntegrityMonitoring:
        enabled: false
        exceptionalMonitoredFiles:
            - string
        exceptionalMonitoredFilesProcesses:
            - string
        exceptionalMonitoredFilesUsers:
            - string
        monitoredFiles:
            - string
        monitoredFilesAttributes: false
        monitoredFilesCreate: false
        monitoredFilesDelete: false
        monitoredFilesModify: false
        monitoredFilesProcesses:
            - string
        monitoredFilesRead: false
        monitoredFilesUsers:
            - string
    forkGuardProcessLimit: 0
    imageName: string
    isAuditChecked: false
    isAutoGenerated: false
    isOotbPolicy: false
    lastupdate: 0
    limitContainerPrivileges:
        - blockAddCapabilities: false
          enabled: false
          ipcmode: false
          netmode: false
          pidmode: false
          preventLowPortBinding: false
          preventRootUser: false
          privileged: false
          useHostUser: false
          usermode: false
          utsmode: false
    limitNewPrivileges: false
    linuxCapabilities:
        enabled: false
        removeLinuxCapabilities:
            - string
    malwareScanOptions:
        action: string
        enabled: false
        excludeDirectories:
            - string
        excludeProcesses:
            - string
        includeDirectories:
            - string
    monitorSystemTimeChanges: false
    name: string
    noNewPrivileges: false
    onlyRegisteredImages: false
    packageBlock:
        blockPackagesProcesses:
            - string
        blockPackagesUsers:
            - string
        enabled: false
        exceptionalBlockPackagesFiles:
            - string
        exceptionalBlockPackagesProcesses:
            - string
        exceptionalBlockPackagesUsers:
            - string
        packagesBlackLists:
            - string
    permission: string
    portBlock:
        blockInboundPorts:
            - string
        blockOutboundPorts:
            - string
        enabled: false
    readonlyFiles:
        enabled: false
        exceptionalReadonlyFiles:
            - string
        exceptionalReadonlyFilesProcesses:
            - string
        exceptionalReadonlyFilesUsers:
            - string
        readonlyFiles:
            - string
        readonlyFilesProcesses:
            - string
        readonlyFilesUsers:
            - string
    readonlyRegistry:
        enabled: false
        exceptionalReadonlyRegistryPaths:
            - string
        exceptionalReadonlyRegistryProcesses:
            - string
        exceptionalReadonlyRegistryUsers:
            - string
        readonlyRegistryPaths:
            - string
        readonlyRegistryProcesses:
            - string
        readonlyRegistryUsers:
            - string
    registry: string
    registryAccessMonitoring:
        enabled: false
        exceptionalMonitoredRegistryPaths:
            - string
        exceptionalMonitoredRegistryProcesses:
            - string
        exceptionalMonitoredRegistryUsers:
            - string
        monitoredRegistryAttributes: false
        monitoredRegistryCreate: false
        monitoredRegistryDelete: false
        monitoredRegistryModify: false
        monitoredRegistryPaths:
            - string
        monitoredRegistryProcesses:
            - string
        monitoredRegistryRead: false
        monitoredRegistryUsers:
            - string
    repoName: string
    resourceName: string
    resourceType: string
    restrictedVolumes:
        - enabled: false
          volumes:
            - string
    reverseShell:
        blockReverseShell: false
        enabled: false
        reverseShellIpWhiteLists:
            - string
        reverseShellProcWhiteLists:
            - string
    runtimeMode: 0
    runtimeType: string
    scopeExpression: string
    scopeVariables:
        - attribute: string
          name: string
          value: string
    scopes:
        - expression: string
          variables:
            - attribute: string
              name: string
              value: string
    systemIntegrityProtection:
        auditSystemtimeChange: false
        enabled: false
        monitorAuditLogIntegrity: false
        windowsServicesMonitoring: false
    tripwire:
        applyOns:
            - string
        enabled: false
        serverlessApp: string
        userId: string
        userPassword: string
    type: string
    updated: string
    version: string
    vpatchVersion: string
    whitelistedOsUsers:
        enabled: false
        groupWhiteLists:
            - string
        userWhiteLists:
            - string
ContainerRuntimePolicy Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The ContainerRuntimePolicy resource accepts the following input properties:
- AllowedExecutables List<Pulumiverse.Aquasec. Inputs. Container Runtime Policy Allowed Executable> 
- Allowed executables configuration.
- AllowedRegistries List<Pulumiverse.Aquasec. Inputs. Container Runtime Policy Allowed Registry> 
- Allowed registries configuration.
- ApplicationScopes List<string>
- Indicates the application scope of the service.
- AuditAll boolNetwork Activity 
- If true, all network activity will be audited.
- AuditAll boolProcesses Activity 
- If true, all process activity will be audited.
- AuditBrute boolForce Login 
- Detects brute force login attempts
- AuditFull boolCommand Arguments 
- If true, full command arguments will be audited.
- Auditing
Pulumiverse.Aquasec. Inputs. Container Runtime Policy Auditing 
- string
- Username of the account that created the service.
- BlacklistedOs Pulumiverse.Users Aquasec. Inputs. Container Runtime Policy Blacklisted Os Users 
- BlockAccess boolHost Network 
- If true, prevent containers from running with access to host network.
- BlockAdding boolCapabilities 
- If true, prevent containers from running with adding capabilities with --cap-addprivilege.
- BlockContainer boolExec 
- If true, exec into a container is prevented.
- BlockCryptocurrency boolMining 
- Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- BlockDisallowed boolImages 
- BlockFileless boolExec 
- Detect and prevent running in-memory execution
- BlockLow boolPort Binding 
- If true, prevent containers from running with the capability to bind in port lower than 1024.
- BlockNon boolCompliant Workloads 
- If true, running containers in non-compliant pods is prevented.
- BlockNon boolK8s Containers 
- If true, running non-kubernetes containers is prevented.
- BlockPrivileged boolContainers 
- If true, prevent containers from running with privileged container capability.
- BlockRoot boolUser 
- If true, prevent containers from running with root user.
- BlockUse boolIpc Namespace 
- If true, prevent containers from running with the privilege to use the IPC namespace.
- BlockUse boolPid Namespace 
- If true, prevent containers from running with the privilege to use the PID namespace.
- BlockUse boolUser Namespace 
- If true, prevent containers from running with the privilege to use the user namespace.
- BlockUse boolUts Namespace 
- If true, prevent containers from running with the privilege to use the UTS namespace.
- BlockedCapabilities List<string>
- If true, prevents containers from using specific Unix capabilities.
- BlockedExecutables List<string>
- List of executables that are prevented from running in containers.
- BlockedFiles List<string>
- List of files that are prevented from being read, modified and executed in the containers.
- BlockedInbound List<string>Ports 
- List of blocked inbound ports.
- BlockedOutbound List<string>Ports 
- List of blocked outbound ports.
- BlockedPackages List<string>
- Prevent containers from reading, writing, or executing all files in the list of packages.
- BlockedVolumes List<string>
- List of volumes that are prevented from being mounted in the containers.
- BypassScopes List<Pulumiverse.Aquasec. Inputs. Container Runtime Policy Bypass Scope> 
- Bypass scope configuration.
- ContainerExec Pulumiverse.Aquasec. Inputs. Container Runtime Policy Container Exec 
- ContainerExec List<string>Allowed Processes 
- List of processes that will be allowed.
- Created string
- Cve string
- DefaultSecurity stringProfile 
- Description string
- The description of the container runtime policy
- Digest string
- DriftPreventions List<Pulumiverse.Aquasec. Inputs. Container Runtime Policy Drift Prevention> 
- Drift prevention configuration.
- EnableCrypto boolMining Dns 
- EnableFork boolGuard 
- If true, fork bombs are prevented in the containers.
- EnableIp boolReputation 
- EnablePort boolScan Protection 
- Enabled bool
- Indicates if the runtime policy is enabled or not.
- Enforce bool
- Indicates that policy should effect container execution (not just for audit).
- EnforceAfter intDays 
- Indicates the number of days after which the runtime policy will be changed to enforce mode.
- EnforceScheduler intAdded On 
- ExcludeApplication List<string>Scopes 
- List of excluded application scopes.
- ExecutableBlacklists List<Pulumiverse.Aquasec. Inputs. Container Runtime Policy Executable Blacklist> 
- Executable blacklist configuration.
- FailedKubernetes Pulumiverse.Checks Aquasec. Inputs. Container Runtime Policy Failed Kubernetes Checks 
- FileBlock Pulumiverse.Aquasec. Inputs. Container Runtime Policy File Block 
- FileIntegrity Pulumiverse.Monitoring Aquasec. Inputs. Container Runtime Policy File Integrity Monitoring 
- Configuration for file integrity monitoring.
- ForkGuard intProcess Limit 
- Process limit for the fork guard.
- ImageName string
- IsAudit boolChecked 
- IsAuto boolGenerated 
- IsOotb boolPolicy 
- Lastupdate int
- LimitContainer List<Pulumiverse.Privileges Aquasec. Inputs. Container Runtime Policy Limit Container Privilege> 
- Container privileges configuration.
- LimitNew boolPrivileges 
- If true, prevents the container from obtaining new privileges at runtime. (only enabled in enforce mode)
- LinuxCapabilities Pulumiverse.Aquasec. Inputs. Container Runtime Policy Linux Capabilities 
- MalwareScan Pulumiverse.Options Aquasec. Inputs. Container Runtime Policy Malware Scan Options 
- Configuration for Real-Time Malware Protection.
- MonitorSystem boolTime Changes 
- If true, system time changes will be monitored.
- Name string
- Name of the container runtime policy
- NoNew boolPrivileges 
- OnlyRegistered boolImages 
- PackageBlock Pulumiverse.Aquasec. Inputs. Container Runtime Policy Package Block 
- Permission string
- PortBlock Pulumiverse.Aquasec. Inputs. Container Runtime Policy Port Block 
- ReadonlyFiles Pulumiverse.Aquasec. Inputs. Container Runtime Policy Readonly Files 
- ReadonlyRegistry Pulumiverse.Aquasec. Inputs. Container Runtime Policy Readonly Registry 
- Registry string
- RegistryAccess Pulumiverse.Monitoring Aquasec. Inputs. Container Runtime Policy Registry Access Monitoring 
- RepoName string
- ResourceName string
- ResourceType string
- RestrictedVolumes List<Pulumiverse.Aquasec. Inputs. Container Runtime Policy Restricted Volume> 
- Restricted volumes configuration.
- ReverseShell Pulumiverse.Aquasec. Inputs. Container Runtime Policy Reverse Shell 
- RuntimeMode int
- RuntimeType string
- ScopeExpression string
- Logical expression of how to compute the dependency of the scope variables.
- ScopeVariables List<Pulumiverse.Aquasec. Inputs. Container Runtime Policy Scope Variable> 
- List of scope attributes.
- Scopes
List<Pulumiverse.Aquasec. Inputs. Container Runtime Policy Scope> 
- Scope configuration.
- SystemIntegrity Pulumiverse.Protection Aquasec. Inputs. Container Runtime Policy System Integrity Protection 
- Tripwire
Pulumiverse.Aquasec. Inputs. Container Runtime Policy Tripwire 
- Type string
- Updated string
- Version string
- VpatchVersion string
- WhitelistedOs Pulumiverse.Users Aquasec. Inputs. Container Runtime Policy Whitelisted Os Users 
- AllowedExecutables []ContainerRuntime Policy Allowed Executable Args 
- Allowed executables configuration.
- AllowedRegistries []ContainerRuntime Policy Allowed Registry Args 
- Allowed registries configuration.
- ApplicationScopes []string
- Indicates the application scope of the service.
- AuditAll boolNetwork Activity 
- If true, all network activity will be audited.
- AuditAll boolProcesses Activity 
- If true, all process activity will be audited.
- AuditBrute boolForce Login 
- Detects brute force login attempts
- AuditFull boolCommand Arguments 
- If true, full command arguments will be audited.
- Auditing
ContainerRuntime Policy Auditing Args 
- string
- Username of the account that created the service.
- BlacklistedOs ContainerUsers Runtime Policy Blacklisted Os Users Args 
- BlockAccess boolHost Network 
- If true, prevent containers from running with access to host network.
- BlockAdding boolCapabilities 
- If true, prevent containers from running with adding capabilities with --cap-addprivilege.
- BlockContainer boolExec 
- If true, exec into a container is prevented.
- BlockCryptocurrency boolMining 
- Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- BlockDisallowed boolImages 
- BlockFileless boolExec 
- Detect and prevent running in-memory execution
- BlockLow boolPort Binding 
- If true, prevent containers from running with the capability to bind in port lower than 1024.
- BlockNon boolCompliant Workloads 
- If true, running containers in non-compliant pods is prevented.
- BlockNon boolK8s Containers 
- If true, running non-kubernetes containers is prevented.
- BlockPrivileged boolContainers 
- If true, prevent containers from running with privileged container capability.
- BlockRoot boolUser 
- If true, prevent containers from running with root user.
- BlockUse boolIpc Namespace 
- If true, prevent containers from running with the privilege to use the IPC namespace.
- BlockUse boolPid Namespace 
- If true, prevent containers from running with the privilege to use the PID namespace.
- BlockUse boolUser Namespace 
- If true, prevent containers from running with the privilege to use the user namespace.
- BlockUse boolUts Namespace 
- If true, prevent containers from running with the privilege to use the UTS namespace.
- BlockedCapabilities []string
- If true, prevents containers from using specific Unix capabilities.
- BlockedExecutables []string
- List of executables that are prevented from running in containers.
- BlockedFiles []string
- List of files that are prevented from being read, modified and executed in the containers.
- BlockedInbound []stringPorts 
- List of blocked inbound ports.
- BlockedOutbound []stringPorts 
- List of blocked outbound ports.
- BlockedPackages []string
- Prevent containers from reading, writing, or executing all files in the list of packages.
- BlockedVolumes []string
- List of volumes that are prevented from being mounted in the containers.
- BypassScopes []ContainerRuntime Policy Bypass Scope Args 
- Bypass scope configuration.
- ContainerExec ContainerRuntime Policy Container Exec Args 
- ContainerExec []stringAllowed Processes 
- List of processes that will be allowed.
- Created string
- Cve string
- DefaultSecurity stringProfile 
- Description string
- The description of the container runtime policy
- Digest string
- DriftPreventions []ContainerRuntime Policy Drift Prevention Args 
- Drift prevention configuration.
- EnableCrypto boolMining Dns 
- EnableFork boolGuard 
- If true, fork bombs are prevented in the containers.
- EnableIp boolReputation 
- EnablePort boolScan Protection 
- Enabled bool
- Indicates if the runtime policy is enabled or not.
- Enforce bool
- Indicates that policy should effect container execution (not just for audit).
- EnforceAfter intDays 
- Indicates the number of days after which the runtime policy will be changed to enforce mode.
- EnforceScheduler intAdded On 
- ExcludeApplication []stringScopes 
- List of excluded application scopes.
- ExecutableBlacklists []ContainerRuntime Policy Executable Blacklist Args 
- Executable blacklist configuration.
- FailedKubernetes ContainerChecks Runtime Policy Failed Kubernetes Checks Args 
- FileBlock ContainerRuntime Policy File Block Args 
- FileIntegrity ContainerMonitoring Runtime Policy File Integrity Monitoring Args 
- Configuration for file integrity monitoring.
- ForkGuard intProcess Limit 
- Process limit for the fork guard.
- ImageName string
- IsAudit boolChecked 
- IsAuto boolGenerated 
- IsOotb boolPolicy 
- Lastupdate int
- LimitContainer []ContainerPrivileges Runtime Policy Limit Container Privilege Args 
- Container privileges configuration.
- LimitNew boolPrivileges 
- If true, prevents the container from obtaining new privileges at runtime. (only enabled in enforce mode)
- LinuxCapabilities ContainerRuntime Policy Linux Capabilities Args 
- MalwareScan ContainerOptions Runtime Policy Malware Scan Options Args 
- Configuration for Real-Time Malware Protection.
- MonitorSystem boolTime Changes 
- If true, system time changes will be monitored.
- Name string
- Name of the container runtime policy
- NoNew boolPrivileges 
- OnlyRegistered boolImages 
- PackageBlock ContainerRuntime Policy Package Block Args 
- Permission string
- PortBlock ContainerRuntime Policy Port Block Args 
- ReadonlyFiles ContainerRuntime Policy Readonly Files Args 
- ReadonlyRegistry ContainerRuntime Policy Readonly Registry Args 
- Registry string
- RegistryAccess ContainerMonitoring Runtime Policy Registry Access Monitoring Args 
- RepoName string
- ResourceName string
- ResourceType string
- RestrictedVolumes []ContainerRuntime Policy Restricted Volume Args 
- Restricted volumes configuration.
- ReverseShell ContainerRuntime Policy Reverse Shell Args 
- RuntimeMode int
- RuntimeType string
- ScopeExpression string
- Logical expression of how to compute the dependency of the scope variables.
- ScopeVariables []ContainerRuntime Policy Scope Variable Args 
- List of scope attributes.
- Scopes
[]ContainerRuntime Policy Scope Args 
- Scope configuration.
- SystemIntegrity ContainerProtection Runtime Policy System Integrity Protection Args 
- Tripwire
ContainerRuntime Policy Tripwire Args 
- Type string
- Updated string
- Version string
- VpatchVersion string
- WhitelistedOs ContainerUsers Runtime Policy Whitelisted Os Users Args 
- allowedExecutables List<ContainerRuntime Policy Allowed Executable> 
- Allowed executables configuration.
- allowedRegistries List<ContainerRuntime Policy Allowed Registry> 
- Allowed registries configuration.
- applicationScopes List<String>
- Indicates the application scope of the service.
- auditAll BooleanNetwork Activity 
- If true, all network activity will be audited.
- auditAll BooleanProcesses Activity 
- If true, all process activity will be audited.
- auditBrute BooleanForce Login 
- Detects brute force login attempts
- auditFull BooleanCommand Arguments 
- If true, full command arguments will be audited.
- auditing
ContainerRuntime Policy Auditing 
- String
- Username of the account that created the service.
- blacklistedOs ContainerUsers Runtime Policy Blacklisted Os Users 
- blockAccess BooleanHost Network 
- If true, prevent containers from running with access to host network.
- blockAdding BooleanCapabilities 
- If true, prevent containers from running with adding capabilities with --cap-addprivilege.
- blockContainer BooleanExec 
- If true, exec into a container is prevented.
- blockCryptocurrency BooleanMining 
- Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- blockDisallowed BooleanImages 
- blockFileless BooleanExec 
- Detect and prevent running in-memory execution
- blockLow BooleanPort Binding 
- If true, prevent containers from running with the capability to bind in port lower than 1024.
- blockNon BooleanCompliant Workloads 
- If true, running containers in non-compliant pods is prevented.
- blockNon BooleanK8s Containers 
- If true, running non-kubernetes containers is prevented.
- blockPrivileged BooleanContainers 
- If true, prevent containers from running with privileged container capability.
- blockRoot BooleanUser 
- If true, prevent containers from running with root user.
- blockUse BooleanIpc Namespace 
- If true, prevent containers from running with the privilege to use the IPC namespace.
- blockUse BooleanPid Namespace 
- If true, prevent containers from running with the privilege to use the PID namespace.
- blockUse BooleanUser Namespace 
- If true, prevent containers from running with the privilege to use the user namespace.
- blockUse BooleanUts Namespace 
- If true, prevent containers from running with the privilege to use the UTS namespace.
- blockedCapabilities List<String>
- If true, prevents containers from using specific Unix capabilities.
- blockedExecutables List<String>
- List of executables that are prevented from running in containers.
- blockedFiles List<String>
- List of files that are prevented from being read, modified and executed in the containers.
- blockedInbound List<String>Ports 
- List of blocked inbound ports.
- blockedOutbound List<String>Ports 
- List of blocked outbound ports.
- blockedPackages List<String>
- Prevent containers from reading, writing, or executing all files in the list of packages.
- blockedVolumes List<String>
- List of volumes that are prevented from being mounted in the containers.
- bypassScopes List<ContainerRuntime Policy Bypass Scope> 
- Bypass scope configuration.
- containerExec ContainerRuntime Policy Container Exec 
- containerExec List<String>Allowed Processes 
- List of processes that will be allowed.
- created String
- cve String
- defaultSecurity StringProfile 
- description String
- The description of the container runtime policy
- digest String
- driftPreventions List<ContainerRuntime Policy Drift Prevention> 
- Drift prevention configuration.
- enableCrypto BooleanMining Dns 
- enableFork BooleanGuard 
- If true, fork bombs are prevented in the containers.
- enableIp BooleanReputation 
- enablePort BooleanScan Protection 
- enabled Boolean
- Indicates if the runtime policy is enabled or not.
- enforce Boolean
- Indicates that policy should effect container execution (not just for audit).
- enforceAfter IntegerDays 
- Indicates the number of days after which the runtime policy will be changed to enforce mode.
- enforceScheduler IntegerAdded On 
- excludeApplication List<String>Scopes 
- List of excluded application scopes.
- executableBlacklists List<ContainerRuntime Policy Executable Blacklist> 
- Executable blacklist configuration.
- failedKubernetes ContainerChecks Runtime Policy Failed Kubernetes Checks 
- fileBlock ContainerRuntime Policy File Block 
- fileIntegrity ContainerMonitoring Runtime Policy File Integrity Monitoring 
- Configuration for file integrity monitoring.
- forkGuard IntegerProcess Limit 
- Process limit for the fork guard.
- imageName String
- isAudit BooleanChecked 
- isAuto BooleanGenerated 
- isOotb BooleanPolicy 
- lastupdate Integer
- limitContainer List<ContainerPrivileges Runtime Policy Limit Container Privilege> 
- Container privileges configuration.
- limitNew BooleanPrivileges 
- If true, prevents the container from obtaining new privileges at runtime. (only enabled in enforce mode)
- linuxCapabilities ContainerRuntime Policy Linux Capabilities 
- malwareScan ContainerOptions Runtime Policy Malware Scan Options 
- Configuration for Real-Time Malware Protection.
- monitorSystem BooleanTime Changes 
- If true, system time changes will be monitored.
- name String
- Name of the container runtime policy
- noNew BooleanPrivileges 
- onlyRegistered BooleanImages 
- packageBlock ContainerRuntime Policy Package Block 
- permission String
- portBlock ContainerRuntime Policy Port Block 
- readonlyFiles ContainerRuntime Policy Readonly Files 
- readonlyRegistry ContainerRuntime Policy Readonly Registry 
- registry String
- registryAccess ContainerMonitoring Runtime Policy Registry Access Monitoring 
- repoName String
- resourceName String
- resourceType String
- restrictedVolumes List<ContainerRuntime Policy Restricted Volume> 
- Restricted volumes configuration.
- reverseShell ContainerRuntime Policy Reverse Shell 
- runtimeMode Integer
- runtimeType String
- scopeExpression String
- Logical expression of how to compute the dependency of the scope variables.
- scopeVariables List<ContainerRuntime Policy Scope Variable> 
- List of scope attributes.
- scopes
List<ContainerRuntime Policy Scope> 
- Scope configuration.
- systemIntegrity ContainerProtection Runtime Policy System Integrity Protection 
- tripwire
ContainerRuntime Policy Tripwire 
- type String
- updated String
- version String
- vpatchVersion String
- whitelistedOs ContainerUsers Runtime Policy Whitelisted Os Users 
- allowedExecutables ContainerRuntime Policy Allowed Executable[] 
- Allowed executables configuration.
- allowedRegistries ContainerRuntime Policy Allowed Registry[] 
- Allowed registries configuration.
- applicationScopes string[]
- Indicates the application scope of the service.
- auditAll booleanNetwork Activity 
- If true, all network activity will be audited.
- auditAll booleanProcesses Activity 
- If true, all process activity will be audited.
- auditBrute booleanForce Login 
- Detects brute force login attempts
- auditFull booleanCommand Arguments 
- If true, full command arguments will be audited.
- auditing
ContainerRuntime Policy Auditing 
- string
- Username of the account that created the service.
- blacklistedOs ContainerUsers Runtime Policy Blacklisted Os Users 
- blockAccess booleanHost Network 
- If true, prevent containers from running with access to host network.
- blockAdding booleanCapabilities 
- If true, prevent containers from running with adding capabilities with --cap-addprivilege.
- blockContainer booleanExec 
- If true, exec into a container is prevented.
- blockCryptocurrency booleanMining 
- Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- blockDisallowed booleanImages 
- blockFileless booleanExec 
- Detect and prevent running in-memory execution
- blockLow booleanPort Binding 
- If true, prevent containers from running with the capability to bind in port lower than 1024.
- blockNon booleanCompliant Workloads 
- If true, running containers in non-compliant pods is prevented.
- blockNon booleanK8s Containers 
- If true, running non-kubernetes containers is prevented.
- blockPrivileged booleanContainers 
- If true, prevent containers from running with privileged container capability.
- blockRoot booleanUser 
- If true, prevent containers from running with root user.
- blockUse booleanIpc Namespace 
- If true, prevent containers from running with the privilege to use the IPC namespace.
- blockUse booleanPid Namespace 
- If true, prevent containers from running with the privilege to use the PID namespace.
- blockUse booleanUser Namespace 
- If true, prevent containers from running with the privilege to use the user namespace.
- blockUse booleanUts Namespace 
- If true, prevent containers from running with the privilege to use the UTS namespace.
- blockedCapabilities string[]
- If true, prevents containers from using specific Unix capabilities.
- blockedExecutables string[]
- List of executables that are prevented from running in containers.
- blockedFiles string[]
- List of files that are prevented from being read, modified and executed in the containers.
- blockedInbound string[]Ports 
- List of blocked inbound ports.
- blockedOutbound string[]Ports 
- List of blocked outbound ports.
- blockedPackages string[]
- Prevent containers from reading, writing, or executing all files in the list of packages.
- blockedVolumes string[]
- List of volumes that are prevented from being mounted in the containers.
- bypassScopes ContainerRuntime Policy Bypass Scope[] 
- Bypass scope configuration.
- containerExec ContainerRuntime Policy Container Exec 
- containerExec string[]Allowed Processes 
- List of processes that will be allowed.
- created string
- cve string
- defaultSecurity stringProfile 
- description string
- The description of the container runtime policy
- digest string
- driftPreventions ContainerRuntime Policy Drift Prevention[] 
- Drift prevention configuration.
- enableCrypto booleanMining Dns 
- enableFork booleanGuard 
- If true, fork bombs are prevented in the containers.
- enableIp booleanReputation 
- enablePort booleanScan Protection 
- enabled boolean
- Indicates if the runtime policy is enabled or not.
- enforce boolean
- Indicates that policy should effect container execution (not just for audit).
- enforceAfter numberDays 
- Indicates the number of days after which the runtime policy will be changed to enforce mode.
- enforceScheduler numberAdded On 
- excludeApplication string[]Scopes 
- List of excluded application scopes.
- executableBlacklists ContainerRuntime Policy Executable Blacklist[] 
- Executable blacklist configuration.
- failedKubernetes ContainerChecks Runtime Policy Failed Kubernetes Checks 
- fileBlock ContainerRuntime Policy File Block 
- fileIntegrity ContainerMonitoring Runtime Policy File Integrity Monitoring 
- Configuration for file integrity monitoring.
- forkGuard numberProcess Limit 
- Process limit for the fork guard.
- imageName string
- isAudit booleanChecked 
- isAuto booleanGenerated 
- isOotb booleanPolicy 
- lastupdate number
- limitContainer ContainerPrivileges Runtime Policy Limit Container Privilege[] 
- Container privileges configuration.
- limitNew booleanPrivileges 
- If true, prevents the container from obtaining new privileges at runtime. (only enabled in enforce mode)
- linuxCapabilities ContainerRuntime Policy Linux Capabilities 
- malwareScan ContainerOptions Runtime Policy Malware Scan Options 
- Configuration for Real-Time Malware Protection.
- monitorSystem booleanTime Changes 
- If true, system time changes will be monitored.
- name string
- Name of the container runtime policy
- noNew booleanPrivileges 
- onlyRegistered booleanImages 
- packageBlock ContainerRuntime Policy Package Block 
- permission string
- portBlock ContainerRuntime Policy Port Block 
- readonlyFiles ContainerRuntime Policy Readonly Files 
- readonlyRegistry ContainerRuntime Policy Readonly Registry 
- registry string
- registryAccess ContainerMonitoring Runtime Policy Registry Access Monitoring 
- repoName string
- resourceName string
- resourceType string
- restrictedVolumes ContainerRuntime Policy Restricted Volume[] 
- Restricted volumes configuration.
- reverseShell ContainerRuntime Policy Reverse Shell 
- runtimeMode number
- runtimeType string
- scopeExpression string
- Logical expression of how to compute the dependency of the scope variables.
- scopeVariables ContainerRuntime Policy Scope Variable[] 
- List of scope attributes.
- scopes
ContainerRuntime Policy Scope[] 
- Scope configuration.
- systemIntegrity ContainerProtection Runtime Policy System Integrity Protection 
- tripwire
ContainerRuntime Policy Tripwire 
- type string
- updated string
- version string
- vpatchVersion string
- whitelistedOs ContainerUsers Runtime Policy Whitelisted Os Users 
- allowed_executables Sequence[ContainerRuntime Policy Allowed Executable Args] 
- Allowed executables configuration.
- allowed_registries Sequence[ContainerRuntime Policy Allowed Registry Args] 
- Allowed registries configuration.
- application_scopes Sequence[str]
- Indicates the application scope of the service.
- audit_all_ boolnetwork_ activity 
- If true, all network activity will be audited.
- audit_all_ boolprocesses_ activity 
- If true, all process activity will be audited.
- audit_brute_ boolforce_ login 
- Detects brute force login attempts
- audit_full_ boolcommand_ arguments 
- If true, full command arguments will be audited.
- auditing
ContainerRuntime Policy Auditing Args 
- str
- Username of the account that created the service.
- blacklisted_os_ Containerusers Runtime Policy Blacklisted Os Users Args 
- block_access_ boolhost_ network 
- If true, prevent containers from running with access to host network.
- block_adding_ boolcapabilities 
- If true, prevent containers from running with adding capabilities with --cap-addprivilege.
- block_container_ boolexec 
- If true, exec into a container is prevented.
- block_cryptocurrency_ boolmining 
- Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- block_disallowed_ boolimages 
- block_fileless_ boolexec 
- Detect and prevent running in-memory execution
- block_low_ boolport_ binding 
- If true, prevent containers from running with the capability to bind in port lower than 1024.
- block_non_ boolcompliant_ workloads 
- If true, running containers in non-compliant pods is prevented.
- block_non_ boolk8s_ containers 
- If true, running non-kubernetes containers is prevented.
- block_privileged_ boolcontainers 
- If true, prevent containers from running with privileged container capability.
- block_root_ booluser 
- If true, prevent containers from running with root user.
- block_use_ boolipc_ namespace 
- If true, prevent containers from running with the privilege to use the IPC namespace.
- block_use_ boolpid_ namespace 
- If true, prevent containers from running with the privilege to use the PID namespace.
- block_use_ booluser_ namespace 
- If true, prevent containers from running with the privilege to use the user namespace.
- block_use_ booluts_ namespace 
- If true, prevent containers from running with the privilege to use the UTS namespace.
- blocked_capabilities Sequence[str]
- If true, prevents containers from using specific Unix capabilities.
- blocked_executables Sequence[str]
- List of executables that are prevented from running in containers.
- blocked_files Sequence[str]
- List of files that are prevented from being read, modified and executed in the containers.
- blocked_inbound_ Sequence[str]ports 
- List of blocked inbound ports.
- blocked_outbound_ Sequence[str]ports 
- List of blocked outbound ports.
- blocked_packages Sequence[str]
- Prevent containers from reading, writing, or executing all files in the list of packages.
- blocked_volumes Sequence[str]
- List of volumes that are prevented from being mounted in the containers.
- bypass_scopes Sequence[ContainerRuntime Policy Bypass Scope Args] 
- Bypass scope configuration.
- container_exec ContainerRuntime Policy Container Exec Args 
- container_exec_ Sequence[str]allowed_ processes 
- List of processes that will be allowed.
- created str
- cve str
- default_security_ strprofile 
- description str
- The description of the container runtime policy
- digest str
- drift_preventions Sequence[ContainerRuntime Policy Drift Prevention Args] 
- Drift prevention configuration.
- enable_crypto_ boolmining_ dns 
- enable_fork_ boolguard 
- If true, fork bombs are prevented in the containers.
- enable_ip_ boolreputation 
- enable_port_ boolscan_ protection 
- enabled bool
- Indicates if the runtime policy is enabled or not.
- enforce bool
- Indicates that policy should effect container execution (not just for audit).
- enforce_after_ intdays 
- Indicates the number of days after which the runtime policy will be changed to enforce mode.
- enforce_scheduler_ intadded_ on 
- exclude_application_ Sequence[str]scopes 
- List of excluded application scopes.
- executable_blacklists Sequence[ContainerRuntime Policy Executable Blacklist Args] 
- Executable blacklist configuration.
- failed_kubernetes_ Containerchecks Runtime Policy Failed Kubernetes Checks Args 
- file_block ContainerRuntime Policy File Block Args 
- file_integrity_ Containermonitoring Runtime Policy File Integrity Monitoring Args 
- Configuration for file integrity monitoring.
- fork_guard_ intprocess_ limit 
- Process limit for the fork guard.
- image_name str
- is_audit_ boolchecked 
- is_auto_ boolgenerated 
- is_ootb_ boolpolicy 
- lastupdate int
- limit_container_ Sequence[Containerprivileges Runtime Policy Limit Container Privilege Args] 
- Container privileges configuration.
- limit_new_ boolprivileges 
- If true, prevents the container from obtaining new privileges at runtime. (only enabled in enforce mode)
- linux_capabilities ContainerRuntime Policy Linux Capabilities Args 
- malware_scan_ Containeroptions Runtime Policy Malware Scan Options Args 
- Configuration for Real-Time Malware Protection.
- monitor_system_ booltime_ changes 
- If true, system time changes will be monitored.
- name str
- Name of the container runtime policy
- no_new_ boolprivileges 
- only_registered_ boolimages 
- package_block ContainerRuntime Policy Package Block Args 
- permission str
- port_block ContainerRuntime Policy Port Block Args 
- readonly_files ContainerRuntime Policy Readonly Files Args 
- readonly_registry ContainerRuntime Policy Readonly Registry Args 
- registry str
- registry_access_ Containermonitoring Runtime Policy Registry Access Monitoring Args 
- repo_name str
- resource_name str
- resource_type str
- restricted_volumes Sequence[ContainerRuntime Policy Restricted Volume Args] 
- Restricted volumes configuration.
- reverse_shell ContainerRuntime Policy Reverse Shell Args 
- runtime_mode int
- runtime_type str
- scope_expression str
- Logical expression of how to compute the dependency of the scope variables.
- scope_variables Sequence[ContainerRuntime Policy Scope Variable Args] 
- List of scope attributes.
- scopes
Sequence[ContainerRuntime Policy Scope Args] 
- Scope configuration.
- system_integrity_ Containerprotection Runtime Policy System Integrity Protection Args 
- tripwire
ContainerRuntime Policy Tripwire Args 
- type str
- updated str
- version str
- vpatch_version str
- whitelisted_os_ Containerusers Runtime Policy Whitelisted Os Users Args 
- allowedExecutables List<Property Map>
- Allowed executables configuration.
- allowedRegistries List<Property Map>
- Allowed registries configuration.
- applicationScopes List<String>
- Indicates the application scope of the service.
- auditAll BooleanNetwork Activity 
- If true, all network activity will be audited.
- auditAll BooleanProcesses Activity 
- If true, all process activity will be audited.
- auditBrute BooleanForce Login 
- Detects brute force login attempts
- auditFull BooleanCommand Arguments 
- If true, full command arguments will be audited.
- auditing Property Map
- String
- Username of the account that created the service.
- blacklistedOs Property MapUsers 
- blockAccess BooleanHost Network 
- If true, prevent containers from running with access to host network.
- blockAdding BooleanCapabilities 
- If true, prevent containers from running with adding capabilities with --cap-addprivilege.
- blockContainer BooleanExec 
- If true, exec into a container is prevented.
- blockCryptocurrency BooleanMining 
- Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- blockDisallowed BooleanImages 
- blockFileless BooleanExec 
- Detect and prevent running in-memory execution
- blockLow BooleanPort Binding 
- If true, prevent containers from running with the capability to bind in port lower than 1024.
- blockNon BooleanCompliant Workloads 
- If true, running containers in non-compliant pods is prevented.
- blockNon BooleanK8s Containers 
- If true, running non-kubernetes containers is prevented.
- blockPrivileged BooleanContainers 
- If true, prevent containers from running with privileged container capability.
- blockRoot BooleanUser 
- If true, prevent containers from running with root user.
- blockUse BooleanIpc Namespace 
- If true, prevent containers from running with the privilege to use the IPC namespace.
- blockUse BooleanPid Namespace 
- If true, prevent containers from running with the privilege to use the PID namespace.
- blockUse BooleanUser Namespace 
- If true, prevent containers from running with the privilege to use the user namespace.
- blockUse BooleanUts Namespace 
- If true, prevent containers from running with the privilege to use the UTS namespace.
- blockedCapabilities List<String>
- If true, prevents containers from using specific Unix capabilities.
- blockedExecutables List<String>
- List of executables that are prevented from running in containers.
- blockedFiles List<String>
- List of files that are prevented from being read, modified and executed in the containers.
- blockedInbound List<String>Ports 
- List of blocked inbound ports.
- blockedOutbound List<String>Ports 
- List of blocked outbound ports.
- blockedPackages List<String>
- Prevent containers from reading, writing, or executing all files in the list of packages.
- blockedVolumes List<String>
- List of volumes that are prevented from being mounted in the containers.
- bypassScopes List<Property Map>
- Bypass scope configuration.
- containerExec Property Map
- containerExec List<String>Allowed Processes 
- List of processes that will be allowed.
- created String
- cve String
- defaultSecurity StringProfile 
- description String
- The description of the container runtime policy
- digest String
- driftPreventions List<Property Map>
- Drift prevention configuration.
- enableCrypto BooleanMining Dns 
- enableFork BooleanGuard 
- If true, fork bombs are prevented in the containers.
- enableIp BooleanReputation 
- enablePort BooleanScan Protection 
- enabled Boolean
- Indicates if the runtime policy is enabled or not.
- enforce Boolean
- Indicates that policy should effect container execution (not just for audit).
- enforceAfter NumberDays 
- Indicates the number of days after which the runtime policy will be changed to enforce mode.
- enforceScheduler NumberAdded On 
- excludeApplication List<String>Scopes 
- List of excluded application scopes.
- executableBlacklists List<Property Map>
- Executable blacklist configuration.
- failedKubernetes Property MapChecks 
- fileBlock Property Map
- fileIntegrity Property MapMonitoring 
- Configuration for file integrity monitoring.
- forkGuard NumberProcess Limit 
- Process limit for the fork guard.
- imageName String
- isAudit BooleanChecked 
- isAuto BooleanGenerated 
- isOotb BooleanPolicy 
- lastupdate Number
- limitContainer List<Property Map>Privileges 
- Container privileges configuration.
- limitNew BooleanPrivileges 
- If true, prevents the container from obtaining new privileges at runtime. (only enabled in enforce mode)
- linuxCapabilities Property Map
- malwareScan Property MapOptions 
- Configuration for Real-Time Malware Protection.
- monitorSystem BooleanTime Changes 
- If true, system time changes will be monitored.
- name String
- Name of the container runtime policy
- noNew BooleanPrivileges 
- onlyRegistered BooleanImages 
- packageBlock Property Map
- permission String
- portBlock Property Map
- readonlyFiles Property Map
- readonlyRegistry Property Map
- registry String
- registryAccess Property MapMonitoring 
- repoName String
- resourceName String
- resourceType String
- restrictedVolumes List<Property Map>
- Restricted volumes configuration.
- reverseShell Property Map
- runtimeMode Number
- runtimeType String
- scopeExpression String
- Logical expression of how to compute the dependency of the scope variables.
- scopeVariables List<Property Map>
- List of scope attributes.
- scopes List<Property Map>
- Scope configuration.
- systemIntegrity Property MapProtection 
- tripwire Property Map
- type String
- updated String
- version String
- vpatchVersion String
- whitelistedOs Property MapUsers 
Outputs
All input properties are implicitly available as output properties. Additionally, the ContainerRuntimePolicy resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing ContainerRuntimePolicy Resource
Get an existing ContainerRuntimePolicy resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: ContainerRuntimePolicyState, opts?: CustomResourceOptions): ContainerRuntimePolicy@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        allowed_executables: Optional[Sequence[ContainerRuntimePolicyAllowedExecutableArgs]] = None,
        allowed_registries: Optional[Sequence[ContainerRuntimePolicyAllowedRegistryArgs]] = None,
        application_scopes: Optional[Sequence[str]] = None,
        audit_all_network_activity: Optional[bool] = None,
        audit_all_processes_activity: Optional[bool] = None,
        audit_brute_force_login: Optional[bool] = None,
        audit_full_command_arguments: Optional[bool] = None,
        auditing: Optional[ContainerRuntimePolicyAuditingArgs] = None,
        author: Optional[str] = None,
        blacklisted_os_users: Optional[ContainerRuntimePolicyBlacklistedOsUsersArgs] = None,
        block_access_host_network: Optional[bool] = None,
        block_adding_capabilities: Optional[bool] = None,
        block_container_exec: Optional[bool] = None,
        block_cryptocurrency_mining: Optional[bool] = None,
        block_disallowed_images: Optional[bool] = None,
        block_fileless_exec: Optional[bool] = None,
        block_low_port_binding: Optional[bool] = None,
        block_non_compliant_workloads: Optional[bool] = None,
        block_non_k8s_containers: Optional[bool] = None,
        block_privileged_containers: Optional[bool] = None,
        block_root_user: Optional[bool] = None,
        block_use_ipc_namespace: Optional[bool] = None,
        block_use_pid_namespace: Optional[bool] = None,
        block_use_user_namespace: Optional[bool] = None,
        block_use_uts_namespace: Optional[bool] = None,
        blocked_capabilities: Optional[Sequence[str]] = None,
        blocked_executables: Optional[Sequence[str]] = None,
        blocked_files: Optional[Sequence[str]] = None,
        blocked_inbound_ports: Optional[Sequence[str]] = None,
        blocked_outbound_ports: Optional[Sequence[str]] = None,
        blocked_packages: Optional[Sequence[str]] = None,
        blocked_volumes: Optional[Sequence[str]] = None,
        bypass_scopes: Optional[Sequence[ContainerRuntimePolicyBypassScopeArgs]] = None,
        container_exec: Optional[ContainerRuntimePolicyContainerExecArgs] = None,
        container_exec_allowed_processes: Optional[Sequence[str]] = None,
        created: Optional[str] = None,
        cve: Optional[str] = None,
        default_security_profile: Optional[str] = None,
        description: Optional[str] = None,
        digest: Optional[str] = None,
        drift_preventions: Optional[Sequence[ContainerRuntimePolicyDriftPreventionArgs]] = None,
        enable_crypto_mining_dns: Optional[bool] = None,
        enable_fork_guard: Optional[bool] = None,
        enable_ip_reputation: Optional[bool] = None,
        enable_port_scan_protection: Optional[bool] = None,
        enabled: Optional[bool] = None,
        enforce: Optional[bool] = None,
        enforce_after_days: Optional[int] = None,
        enforce_scheduler_added_on: Optional[int] = None,
        exclude_application_scopes: Optional[Sequence[str]] = None,
        executable_blacklists: Optional[Sequence[ContainerRuntimePolicyExecutableBlacklistArgs]] = None,
        failed_kubernetes_checks: Optional[ContainerRuntimePolicyFailedKubernetesChecksArgs] = None,
        file_block: Optional[ContainerRuntimePolicyFileBlockArgs] = None,
        file_integrity_monitoring: Optional[ContainerRuntimePolicyFileIntegrityMonitoringArgs] = None,
        fork_guard_process_limit: Optional[int] = None,
        image_name: Optional[str] = None,
        is_audit_checked: Optional[bool] = None,
        is_auto_generated: Optional[bool] = None,
        is_ootb_policy: Optional[bool] = None,
        lastupdate: Optional[int] = None,
        limit_container_privileges: Optional[Sequence[ContainerRuntimePolicyLimitContainerPrivilegeArgs]] = None,
        limit_new_privileges: Optional[bool] = None,
        linux_capabilities: Optional[ContainerRuntimePolicyLinuxCapabilitiesArgs] = None,
        malware_scan_options: Optional[ContainerRuntimePolicyMalwareScanOptionsArgs] = None,
        monitor_system_time_changes: Optional[bool] = None,
        name: Optional[str] = None,
        no_new_privileges: Optional[bool] = None,
        only_registered_images: Optional[bool] = None,
        package_block: Optional[ContainerRuntimePolicyPackageBlockArgs] = None,
        permission: Optional[str] = None,
        port_block: Optional[ContainerRuntimePolicyPortBlockArgs] = None,
        readonly_files: Optional[ContainerRuntimePolicyReadonlyFilesArgs] = None,
        readonly_registry: Optional[ContainerRuntimePolicyReadonlyRegistryArgs] = None,
        registry: Optional[str] = None,
        registry_access_monitoring: Optional[ContainerRuntimePolicyRegistryAccessMonitoringArgs] = None,
        repo_name: Optional[str] = None,
        resource_name: Optional[str] = None,
        resource_type: Optional[str] = None,
        restricted_volumes: Optional[Sequence[ContainerRuntimePolicyRestrictedVolumeArgs]] = None,
        reverse_shell: Optional[ContainerRuntimePolicyReverseShellArgs] = None,
        runtime_mode: Optional[int] = None,
        runtime_type: Optional[str] = None,
        scope_expression: Optional[str] = None,
        scope_variables: Optional[Sequence[ContainerRuntimePolicyScopeVariableArgs]] = None,
        scopes: Optional[Sequence[ContainerRuntimePolicyScopeArgs]] = None,
        system_integrity_protection: Optional[ContainerRuntimePolicySystemIntegrityProtectionArgs] = None,
        tripwire: Optional[ContainerRuntimePolicyTripwireArgs] = None,
        type: Optional[str] = None,
        updated: Optional[str] = None,
        version: Optional[str] = None,
        vpatch_version: Optional[str] = None,
        whitelisted_os_users: Optional[ContainerRuntimePolicyWhitelistedOsUsersArgs] = None) -> ContainerRuntimePolicyfunc GetContainerRuntimePolicy(ctx *Context, name string, id IDInput, state *ContainerRuntimePolicyState, opts ...ResourceOption) (*ContainerRuntimePolicy, error)public static ContainerRuntimePolicy Get(string name, Input<string> id, ContainerRuntimePolicyState? state, CustomResourceOptions? opts = null)public static ContainerRuntimePolicy get(String name, Output<String> id, ContainerRuntimePolicyState state, CustomResourceOptions options)resources:  _:    type: aquasec:ContainerRuntimePolicy    get:      id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- AllowedExecutables List<Pulumiverse.Aquasec. Inputs. Container Runtime Policy Allowed Executable> 
- Allowed executables configuration.
- AllowedRegistries List<Pulumiverse.Aquasec. Inputs. Container Runtime Policy Allowed Registry> 
- Allowed registries configuration.
- ApplicationScopes List<string>
- Indicates the application scope of the service.
- AuditAll boolNetwork Activity 
- If true, all network activity will be audited.
- AuditAll boolProcesses Activity 
- If true, all process activity will be audited.
- AuditBrute boolForce Login 
- Detects brute force login attempts
- AuditFull boolCommand Arguments 
- If true, full command arguments will be audited.
- Auditing
Pulumiverse.Aquasec. Inputs. Container Runtime Policy Auditing 
- string
- Username of the account that created the service.
- BlacklistedOs Pulumiverse.Users Aquasec. Inputs. Container Runtime Policy Blacklisted Os Users 
- BlockAccess boolHost Network 
- If true, prevent containers from running with access to host network.
- BlockAdding boolCapabilities 
- If true, prevent containers from running with adding capabilities with --cap-addprivilege.
- BlockContainer boolExec 
- If true, exec into a container is prevented.
- BlockCryptocurrency boolMining 
- Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- BlockDisallowed boolImages 
- BlockFileless boolExec 
- Detect and prevent running in-memory execution
- BlockLow boolPort Binding 
- If true, prevent containers from running with the capability to bind in port lower than 1024.
- BlockNon boolCompliant Workloads 
- If true, running containers in non-compliant pods is prevented.
- BlockNon boolK8s Containers 
- If true, running non-kubernetes containers is prevented.
- BlockPrivileged boolContainers 
- If true, prevent containers from running with privileged container capability.
- BlockRoot boolUser 
- If true, prevent containers from running with root user.
- BlockUse boolIpc Namespace 
- If true, prevent containers from running with the privilege to use the IPC namespace.
- BlockUse boolPid Namespace 
- If true, prevent containers from running with the privilege to use the PID namespace.
- BlockUse boolUser Namespace 
- If true, prevent containers from running with the privilege to use the user namespace.
- BlockUse boolUts Namespace 
- If true, prevent containers from running with the privilege to use the UTS namespace.
- BlockedCapabilities List<string>
- If true, prevents containers from using specific Unix capabilities.
- BlockedExecutables List<string>
- List of executables that are prevented from running in containers.
- BlockedFiles List<string>
- List of files that are prevented from being read, modified and executed in the containers.
- BlockedInbound List<string>Ports 
- List of blocked inbound ports.
- BlockedOutbound List<string>Ports 
- List of blocked outbound ports.
- BlockedPackages List<string>
- Prevent containers from reading, writing, or executing all files in the list of packages.
- BlockedVolumes List<string>
- List of volumes that are prevented from being mounted in the containers.
- BypassScopes List<Pulumiverse.Aquasec. Inputs. Container Runtime Policy Bypass Scope> 
- Bypass scope configuration.
- ContainerExec Pulumiverse.Aquasec. Inputs. Container Runtime Policy Container Exec 
- ContainerExec List<string>Allowed Processes 
- List of processes that will be allowed.
- Created string
- Cve string
- DefaultSecurity stringProfile 
- Description string
- The description of the container runtime policy
- Digest string
- DriftPreventions List<Pulumiverse.Aquasec. Inputs. Container Runtime Policy Drift Prevention> 
- Drift prevention configuration.
- EnableCrypto boolMining Dns 
- EnableFork boolGuard 
- If true, fork bombs are prevented in the containers.
- EnableIp boolReputation 
- EnablePort boolScan Protection 
- Enabled bool
- Indicates if the runtime policy is enabled or not.
- Enforce bool
- Indicates that policy should effect container execution (not just for audit).
- EnforceAfter intDays 
- Indicates the number of days after which the runtime policy will be changed to enforce mode.
- EnforceScheduler intAdded On 
- ExcludeApplication List<string>Scopes 
- List of excluded application scopes.
- ExecutableBlacklists List<Pulumiverse.Aquasec. Inputs. Container Runtime Policy Executable Blacklist> 
- Executable blacklist configuration.
- FailedKubernetes Pulumiverse.Checks Aquasec. Inputs. Container Runtime Policy Failed Kubernetes Checks 
- FileBlock Pulumiverse.Aquasec. Inputs. Container Runtime Policy File Block 
- FileIntegrity Pulumiverse.Monitoring Aquasec. Inputs. Container Runtime Policy File Integrity Monitoring 
- Configuration for file integrity monitoring.
- ForkGuard intProcess Limit 
- Process limit for the fork guard.
- ImageName string
- IsAudit boolChecked 
- IsAuto boolGenerated 
- IsOotb boolPolicy 
- Lastupdate int
- LimitContainer List<Pulumiverse.Privileges Aquasec. Inputs. Container Runtime Policy Limit Container Privilege> 
- Container privileges configuration.
- LimitNew boolPrivileges 
- If true, prevents the container from obtaining new privileges at runtime. (only enabled in enforce mode)
- LinuxCapabilities Pulumiverse.Aquasec. Inputs. Container Runtime Policy Linux Capabilities 
- MalwareScan Pulumiverse.Options Aquasec. Inputs. Container Runtime Policy Malware Scan Options 
- Configuration for Real-Time Malware Protection.
- MonitorSystem boolTime Changes 
- If true, system time changes will be monitored.
- Name string
- Name of the container runtime policy
- NoNew boolPrivileges 
- OnlyRegistered boolImages 
- PackageBlock Pulumiverse.Aquasec. Inputs. Container Runtime Policy Package Block 
- Permission string
- PortBlock Pulumiverse.Aquasec. Inputs. Container Runtime Policy Port Block 
- ReadonlyFiles Pulumiverse.Aquasec. Inputs. Container Runtime Policy Readonly Files 
- ReadonlyRegistry Pulumiverse.Aquasec. Inputs. Container Runtime Policy Readonly Registry 
- Registry string
- RegistryAccess Pulumiverse.Monitoring Aquasec. Inputs. Container Runtime Policy Registry Access Monitoring 
- RepoName string
- ResourceName string
- ResourceType string
- RestrictedVolumes List<Pulumiverse.Aquasec. Inputs. Container Runtime Policy Restricted Volume> 
- Restricted volumes configuration.
- ReverseShell Pulumiverse.Aquasec. Inputs. Container Runtime Policy Reverse Shell 
- RuntimeMode int
- RuntimeType string
- ScopeExpression string
- Logical expression of how to compute the dependency of the scope variables.
- ScopeVariables List<Pulumiverse.Aquasec. Inputs. Container Runtime Policy Scope Variable> 
- List of scope attributes.
- Scopes
List<Pulumiverse.Aquasec. Inputs. Container Runtime Policy Scope> 
- Scope configuration.
- SystemIntegrity Pulumiverse.Protection Aquasec. Inputs. Container Runtime Policy System Integrity Protection 
- Tripwire
Pulumiverse.Aquasec. Inputs. Container Runtime Policy Tripwire 
- Type string
- Updated string
- Version string
- VpatchVersion string
- WhitelistedOs Pulumiverse.Users Aquasec. Inputs. Container Runtime Policy Whitelisted Os Users 
- AllowedExecutables []ContainerRuntime Policy Allowed Executable Args 
- Allowed executables configuration.
- AllowedRegistries []ContainerRuntime Policy Allowed Registry Args 
- Allowed registries configuration.
- ApplicationScopes []string
- Indicates the application scope of the service.
- AuditAll boolNetwork Activity 
- If true, all network activity will be audited.
- AuditAll boolProcesses Activity 
- If true, all process activity will be audited.
- AuditBrute boolForce Login 
- Detects brute force login attempts
- AuditFull boolCommand Arguments 
- If true, full command arguments will be audited.
- Auditing
ContainerRuntime Policy Auditing Args 
- string
- Username of the account that created the service.
- BlacklistedOs ContainerUsers Runtime Policy Blacklisted Os Users Args 
- BlockAccess boolHost Network 
- If true, prevent containers from running with access to host network.
- BlockAdding boolCapabilities 
- If true, prevent containers from running with adding capabilities with --cap-addprivilege.
- BlockContainer boolExec 
- If true, exec into a container is prevented.
- BlockCryptocurrency boolMining 
- Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- BlockDisallowed boolImages 
- BlockFileless boolExec 
- Detect and prevent running in-memory execution
- BlockLow boolPort Binding 
- If true, prevent containers from running with the capability to bind in port lower than 1024.
- BlockNon boolCompliant Workloads 
- If true, running containers in non-compliant pods is prevented.
- BlockNon boolK8s Containers 
- If true, running non-kubernetes containers is prevented.
- BlockPrivileged boolContainers 
- If true, prevent containers from running with privileged container capability.
- BlockRoot boolUser 
- If true, prevent containers from running with root user.
- BlockUse boolIpc Namespace 
- If true, prevent containers from running with the privilege to use the IPC namespace.
- BlockUse boolPid Namespace 
- If true, prevent containers from running with the privilege to use the PID namespace.
- BlockUse boolUser Namespace 
- If true, prevent containers from running with the privilege to use the user namespace.
- BlockUse boolUts Namespace 
- If true, prevent containers from running with the privilege to use the UTS namespace.
- BlockedCapabilities []string
- If true, prevents containers from using specific Unix capabilities.
- BlockedExecutables []string
- List of executables that are prevented from running in containers.
- BlockedFiles []string
- List of files that are prevented from being read, modified and executed in the containers.
- BlockedInbound []stringPorts 
- List of blocked inbound ports.
- BlockedOutbound []stringPorts 
- List of blocked outbound ports.
- BlockedPackages []string
- Prevent containers from reading, writing, or executing all files in the list of packages.
- BlockedVolumes []string
- List of volumes that are prevented from being mounted in the containers.
- BypassScopes []ContainerRuntime Policy Bypass Scope Args 
- Bypass scope configuration.
- ContainerExec ContainerRuntime Policy Container Exec Args 
- ContainerExec []stringAllowed Processes 
- List of processes that will be allowed.
- Created string
- Cve string
- DefaultSecurity stringProfile 
- Description string
- The description of the container runtime policy
- Digest string
- DriftPreventions []ContainerRuntime Policy Drift Prevention Args 
- Drift prevention configuration.
- EnableCrypto boolMining Dns 
- EnableFork boolGuard 
- If true, fork bombs are prevented in the containers.
- EnableIp boolReputation 
- EnablePort boolScan Protection 
- Enabled bool
- Indicates if the runtime policy is enabled or not.
- Enforce bool
- Indicates that policy should effect container execution (not just for audit).
- EnforceAfter intDays 
- Indicates the number of days after which the runtime policy will be changed to enforce mode.
- EnforceScheduler intAdded On 
- ExcludeApplication []stringScopes 
- List of excluded application scopes.
- ExecutableBlacklists []ContainerRuntime Policy Executable Blacklist Args 
- Executable blacklist configuration.
- FailedKubernetes ContainerChecks Runtime Policy Failed Kubernetes Checks Args 
- FileBlock ContainerRuntime Policy File Block Args 
- FileIntegrity ContainerMonitoring Runtime Policy File Integrity Monitoring Args 
- Configuration for file integrity monitoring.
- ForkGuard intProcess Limit 
- Process limit for the fork guard.
- ImageName string
- IsAudit boolChecked 
- IsAuto boolGenerated 
- IsOotb boolPolicy 
- Lastupdate int
- LimitContainer []ContainerPrivileges Runtime Policy Limit Container Privilege Args 
- Container privileges configuration.
- LimitNew boolPrivileges 
- If true, prevents the container from obtaining new privileges at runtime. (only enabled in enforce mode)
- LinuxCapabilities ContainerRuntime Policy Linux Capabilities Args 
- MalwareScan ContainerOptions Runtime Policy Malware Scan Options Args 
- Configuration for Real-Time Malware Protection.
- MonitorSystem boolTime Changes 
- If true, system time changes will be monitored.
- Name string
- Name of the container runtime policy
- NoNew boolPrivileges 
- OnlyRegistered boolImages 
- PackageBlock ContainerRuntime Policy Package Block Args 
- Permission string
- PortBlock ContainerRuntime Policy Port Block Args 
- ReadonlyFiles ContainerRuntime Policy Readonly Files Args 
- ReadonlyRegistry ContainerRuntime Policy Readonly Registry Args 
- Registry string
- RegistryAccess ContainerMonitoring Runtime Policy Registry Access Monitoring Args 
- RepoName string
- ResourceName string
- ResourceType string
- RestrictedVolumes []ContainerRuntime Policy Restricted Volume Args 
- Restricted volumes configuration.
- ReverseShell ContainerRuntime Policy Reverse Shell Args 
- RuntimeMode int
- RuntimeType string
- ScopeExpression string
- Logical expression of how to compute the dependency of the scope variables.
- ScopeVariables []ContainerRuntime Policy Scope Variable Args 
- List of scope attributes.
- Scopes
[]ContainerRuntime Policy Scope Args 
- Scope configuration.
- SystemIntegrity ContainerProtection Runtime Policy System Integrity Protection Args 
- Tripwire
ContainerRuntime Policy Tripwire Args 
- Type string
- Updated string
- Version string
- VpatchVersion string
- WhitelistedOs ContainerUsers Runtime Policy Whitelisted Os Users Args 
- allowedExecutables List<ContainerRuntime Policy Allowed Executable> 
- Allowed executables configuration.
- allowedRegistries List<ContainerRuntime Policy Allowed Registry> 
- Allowed registries configuration.
- applicationScopes List<String>
- Indicates the application scope of the service.
- auditAll BooleanNetwork Activity 
- If true, all network activity will be audited.
- auditAll BooleanProcesses Activity 
- If true, all process activity will be audited.
- auditBrute BooleanForce Login 
- Detects brute force login attempts
- auditFull BooleanCommand Arguments 
- If true, full command arguments will be audited.
- auditing
ContainerRuntime Policy Auditing 
- String
- Username of the account that created the service.
- blacklistedOs ContainerUsers Runtime Policy Blacklisted Os Users 
- blockAccess BooleanHost Network 
- If true, prevent containers from running with access to host network.
- blockAdding BooleanCapabilities 
- If true, prevent containers from running with adding capabilities with --cap-addprivilege.
- blockContainer BooleanExec 
- If true, exec into a container is prevented.
- blockCryptocurrency BooleanMining 
- Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- blockDisallowed BooleanImages 
- blockFileless BooleanExec 
- Detect and prevent running in-memory execution
- blockLow BooleanPort Binding 
- If true, prevent containers from running with the capability to bind in port lower than 1024.
- blockNon BooleanCompliant Workloads 
- If true, running containers in non-compliant pods is prevented.
- blockNon BooleanK8s Containers 
- If true, running non-kubernetes containers is prevented.
- blockPrivileged BooleanContainers 
- If true, prevent containers from running with privileged container capability.
- blockRoot BooleanUser 
- If true, prevent containers from running with root user.
- blockUse BooleanIpc Namespace 
- If true, prevent containers from running with the privilege to use the IPC namespace.
- blockUse BooleanPid Namespace 
- If true, prevent containers from running with the privilege to use the PID namespace.
- blockUse BooleanUser Namespace 
- If true, prevent containers from running with the privilege to use the user namespace.
- blockUse BooleanUts Namespace 
- If true, prevent containers from running with the privilege to use the UTS namespace.
- blockedCapabilities List<String>
- If true, prevents containers from using specific Unix capabilities.
- blockedExecutables List<String>
- List of executables that are prevented from running in containers.
- blockedFiles List<String>
- List of files that are prevented from being read, modified and executed in the containers.
- blockedInbound List<String>Ports 
- List of blocked inbound ports.
- blockedOutbound List<String>Ports 
- List of blocked outbound ports.
- blockedPackages List<String>
- Prevent containers from reading, writing, or executing all files in the list of packages.
- blockedVolumes List<String>
- List of volumes that are prevented from being mounted in the containers.
- bypassScopes List<ContainerRuntime Policy Bypass Scope> 
- Bypass scope configuration.
- containerExec ContainerRuntime Policy Container Exec 
- containerExec List<String>Allowed Processes 
- List of processes that will be allowed.
- created String
- cve String
- defaultSecurity StringProfile 
- description String
- The description of the container runtime policy
- digest String
- driftPreventions List<ContainerRuntime Policy Drift Prevention> 
- Drift prevention configuration.
- enableCrypto BooleanMining Dns 
- enableFork BooleanGuard 
- If true, fork bombs are prevented in the containers.
- enableIp BooleanReputation 
- enablePort BooleanScan Protection 
- enabled Boolean
- Indicates if the runtime policy is enabled or not.
- enforce Boolean
- Indicates that policy should effect container execution (not just for audit).
- enforceAfter IntegerDays 
- Indicates the number of days after which the runtime policy will be changed to enforce mode.
- enforceScheduler IntegerAdded On 
- excludeApplication List<String>Scopes 
- List of excluded application scopes.
- executableBlacklists List<ContainerRuntime Policy Executable Blacklist> 
- Executable blacklist configuration.
- failedKubernetes ContainerChecks Runtime Policy Failed Kubernetes Checks 
- fileBlock ContainerRuntime Policy File Block 
- fileIntegrity ContainerMonitoring Runtime Policy File Integrity Monitoring 
- Configuration for file integrity monitoring.
- forkGuard IntegerProcess Limit 
- Process limit for the fork guard.
- imageName String
- isAudit BooleanChecked 
- isAuto BooleanGenerated 
- isOotb BooleanPolicy 
- lastupdate Integer
- limitContainer List<ContainerPrivileges Runtime Policy Limit Container Privilege> 
- Container privileges configuration.
- limitNew BooleanPrivileges 
- If true, prevents the container from obtaining new privileges at runtime. (only enabled in enforce mode)
- linuxCapabilities ContainerRuntime Policy Linux Capabilities 
- malwareScan ContainerOptions Runtime Policy Malware Scan Options 
- Configuration for Real-Time Malware Protection.
- monitorSystem BooleanTime Changes 
- If true, system time changes will be monitored.
- name String
- Name of the container runtime policy
- noNew BooleanPrivileges 
- onlyRegistered BooleanImages 
- packageBlock ContainerRuntime Policy Package Block 
- permission String
- portBlock ContainerRuntime Policy Port Block 
- readonlyFiles ContainerRuntime Policy Readonly Files 
- readonlyRegistry ContainerRuntime Policy Readonly Registry 
- registry String
- registryAccess ContainerMonitoring Runtime Policy Registry Access Monitoring 
- repoName String
- resourceName String
- resourceType String
- restrictedVolumes List<ContainerRuntime Policy Restricted Volume> 
- Restricted volumes configuration.
- reverseShell ContainerRuntime Policy Reverse Shell 
- runtimeMode Integer
- runtimeType String
- scopeExpression String
- Logical expression of how to compute the dependency of the scope variables.
- scopeVariables List<ContainerRuntime Policy Scope Variable> 
- List of scope attributes.
- scopes
List<ContainerRuntime Policy Scope> 
- Scope configuration.
- systemIntegrity ContainerProtection Runtime Policy System Integrity Protection 
- tripwire
ContainerRuntime Policy Tripwire 
- type String
- updated String
- version String
- vpatchVersion String
- whitelistedOs ContainerUsers Runtime Policy Whitelisted Os Users 
- allowedExecutables ContainerRuntime Policy Allowed Executable[] 
- Allowed executables configuration.
- allowedRegistries ContainerRuntime Policy Allowed Registry[] 
- Allowed registries configuration.
- applicationScopes string[]
- Indicates the application scope of the service.
- auditAll booleanNetwork Activity 
- If true, all network activity will be audited.
- auditAll booleanProcesses Activity 
- If true, all process activity will be audited.
- auditBrute booleanForce Login 
- Detects brute force login attempts
- auditFull booleanCommand Arguments 
- If true, full command arguments will be audited.
- auditing
ContainerRuntime Policy Auditing 
- string
- Username of the account that created the service.
- blacklistedOs ContainerUsers Runtime Policy Blacklisted Os Users 
- blockAccess booleanHost Network 
- If true, prevent containers from running with access to host network.
- blockAdding booleanCapabilities 
- If true, prevent containers from running with adding capabilities with --cap-addprivilege.
- blockContainer booleanExec 
- If true, exec into a container is prevented.
- blockCryptocurrency booleanMining 
- Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- blockDisallowed booleanImages 
- blockFileless booleanExec 
- Detect and prevent running in-memory execution
- blockLow booleanPort Binding 
- If true, prevent containers from running with the capability to bind in port lower than 1024.
- blockNon booleanCompliant Workloads 
- If true, running containers in non-compliant pods is prevented.
- blockNon booleanK8s Containers 
- If true, running non-kubernetes containers is prevented.
- blockPrivileged booleanContainers 
- If true, prevent containers from running with privileged container capability.
- blockRoot booleanUser 
- If true, prevent containers from running with root user.
- blockUse booleanIpc Namespace 
- If true, prevent containers from running with the privilege to use the IPC namespace.
- blockUse booleanPid Namespace 
- If true, prevent containers from running with the privilege to use the PID namespace.
- blockUse booleanUser Namespace 
- If true, prevent containers from running with the privilege to use the user namespace.
- blockUse booleanUts Namespace 
- If true, prevent containers from running with the privilege to use the UTS namespace.
- blockedCapabilities string[]
- If true, prevents containers from using specific Unix capabilities.
- blockedExecutables string[]
- List of executables that are prevented from running in containers.
- blockedFiles string[]
- List of files that are prevented from being read, modified and executed in the containers.
- blockedInbound string[]Ports 
- List of blocked inbound ports.
- blockedOutbound string[]Ports 
- List of blocked outbound ports.
- blockedPackages string[]
- Prevent containers from reading, writing, or executing all files in the list of packages.
- blockedVolumes string[]
- List of volumes that are prevented from being mounted in the containers.
- bypassScopes ContainerRuntime Policy Bypass Scope[] 
- Bypass scope configuration.
- containerExec ContainerRuntime Policy Container Exec 
- containerExec string[]Allowed Processes 
- List of processes that will be allowed.
- created string
- cve string
- defaultSecurity stringProfile 
- description string
- The description of the container runtime policy
- digest string
- driftPreventions ContainerRuntime Policy Drift Prevention[] 
- Drift prevention configuration.
- enableCrypto booleanMining Dns 
- enableFork booleanGuard 
- If true, fork bombs are prevented in the containers.
- enableIp booleanReputation 
- enablePort booleanScan Protection 
- enabled boolean
- Indicates if the runtime policy is enabled or not.
- enforce boolean
- Indicates that policy should effect container execution (not just for audit).
- enforceAfter numberDays 
- Indicates the number of days after which the runtime policy will be changed to enforce mode.
- enforceScheduler numberAdded On 
- excludeApplication string[]Scopes 
- List of excluded application scopes.
- executableBlacklists ContainerRuntime Policy Executable Blacklist[] 
- Executable blacklist configuration.
- failedKubernetes ContainerChecks Runtime Policy Failed Kubernetes Checks 
- fileBlock ContainerRuntime Policy File Block 
- fileIntegrity ContainerMonitoring Runtime Policy File Integrity Monitoring 
- Configuration for file integrity monitoring.
- forkGuard numberProcess Limit 
- Process limit for the fork guard.
- imageName string
- isAudit booleanChecked 
- isAuto booleanGenerated 
- isOotb booleanPolicy 
- lastupdate number
- limitContainer ContainerPrivileges Runtime Policy Limit Container Privilege[] 
- Container privileges configuration.
- limitNew booleanPrivileges 
- If true, prevents the container from obtaining new privileges at runtime. (only enabled in enforce mode)
- linuxCapabilities ContainerRuntime Policy Linux Capabilities 
- malwareScan ContainerOptions Runtime Policy Malware Scan Options 
- Configuration for Real-Time Malware Protection.
- monitorSystem booleanTime Changes 
- If true, system time changes will be monitored.
- name string
- Name of the container runtime policy
- noNew booleanPrivileges 
- onlyRegistered booleanImages 
- packageBlock ContainerRuntime Policy Package Block 
- permission string
- portBlock ContainerRuntime Policy Port Block 
- readonlyFiles ContainerRuntime Policy Readonly Files 
- readonlyRegistry ContainerRuntime Policy Readonly Registry 
- registry string
- registryAccess ContainerMonitoring Runtime Policy Registry Access Monitoring 
- repoName string
- resourceName string
- resourceType string
- restrictedVolumes ContainerRuntime Policy Restricted Volume[] 
- Restricted volumes configuration.
- reverseShell ContainerRuntime Policy Reverse Shell 
- runtimeMode number
- runtimeType string
- scopeExpression string
- Logical expression of how to compute the dependency of the scope variables.
- scopeVariables ContainerRuntime Policy Scope Variable[] 
- List of scope attributes.
- scopes
ContainerRuntime Policy Scope[] 
- Scope configuration.
- systemIntegrity ContainerProtection Runtime Policy System Integrity Protection 
- tripwire
ContainerRuntime Policy Tripwire 
- type string
- updated string
- version string
- vpatchVersion string
- whitelistedOs ContainerUsers Runtime Policy Whitelisted Os Users 
- allowed_executables Sequence[ContainerRuntime Policy Allowed Executable Args] 
- Allowed executables configuration.
- allowed_registries Sequence[ContainerRuntime Policy Allowed Registry Args] 
- Allowed registries configuration.
- application_scopes Sequence[str]
- Indicates the application scope of the service.
- audit_all_ boolnetwork_ activity 
- If true, all network activity will be audited.
- audit_all_ boolprocesses_ activity 
- If true, all process activity will be audited.
- audit_brute_ boolforce_ login 
- Detects brute force login attempts
- audit_full_ boolcommand_ arguments 
- If true, full command arguments will be audited.
- auditing
ContainerRuntime Policy Auditing Args 
- str
- Username of the account that created the service.
- blacklisted_os_ Containerusers Runtime Policy Blacklisted Os Users Args 
- block_access_ boolhost_ network 
- If true, prevent containers from running with access to host network.
- block_adding_ boolcapabilities 
- If true, prevent containers from running with adding capabilities with --cap-addprivilege.
- block_container_ boolexec 
- If true, exec into a container is prevented.
- block_cryptocurrency_ boolmining 
- Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- block_disallowed_ boolimages 
- block_fileless_ boolexec 
- Detect and prevent running in-memory execution
- block_low_ boolport_ binding 
- If true, prevent containers from running with the capability to bind in port lower than 1024.
- block_non_ boolcompliant_ workloads 
- If true, running containers in non-compliant pods is prevented.
- block_non_ boolk8s_ containers 
- If true, running non-kubernetes containers is prevented.
- block_privileged_ boolcontainers 
- If true, prevent containers from running with privileged container capability.
- block_root_ booluser 
- If true, prevent containers from running with root user.
- block_use_ boolipc_ namespace 
- If true, prevent containers from running with the privilege to use the IPC namespace.
- block_use_ boolpid_ namespace 
- If true, prevent containers from running with the privilege to use the PID namespace.
- block_use_ booluser_ namespace 
- If true, prevent containers from running with the privilege to use the user namespace.
- block_use_ booluts_ namespace 
- If true, prevent containers from running with the privilege to use the UTS namespace.
- blocked_capabilities Sequence[str]
- If true, prevents containers from using specific Unix capabilities.
- blocked_executables Sequence[str]
- List of executables that are prevented from running in containers.
- blocked_files Sequence[str]
- List of files that are prevented from being read, modified and executed in the containers.
- blocked_inbound_ Sequence[str]ports 
- List of blocked inbound ports.
- blocked_outbound_ Sequence[str]ports 
- List of blocked outbound ports.
- blocked_packages Sequence[str]
- Prevent containers from reading, writing, or executing all files in the list of packages.
- blocked_volumes Sequence[str]
- List of volumes that are prevented from being mounted in the containers.
- bypass_scopes Sequence[ContainerRuntime Policy Bypass Scope Args] 
- Bypass scope configuration.
- container_exec ContainerRuntime Policy Container Exec Args 
- container_exec_ Sequence[str]allowed_ processes 
- List of processes that will be allowed.
- created str
- cve str
- default_security_ strprofile 
- description str
- The description of the container runtime policy
- digest str
- drift_preventions Sequence[ContainerRuntime Policy Drift Prevention Args] 
- Drift prevention configuration.
- enable_crypto_ boolmining_ dns 
- enable_fork_ boolguard 
- If true, fork bombs are prevented in the containers.
- enable_ip_ boolreputation 
- enable_port_ boolscan_ protection 
- enabled bool
- Indicates if the runtime policy is enabled or not.
- enforce bool
- Indicates that policy should effect container execution (not just for audit).
- enforce_after_ intdays 
- Indicates the number of days after which the runtime policy will be changed to enforce mode.
- enforce_scheduler_ intadded_ on 
- exclude_application_ Sequence[str]scopes 
- List of excluded application scopes.
- executable_blacklists Sequence[ContainerRuntime Policy Executable Blacklist Args] 
- Executable blacklist configuration.
- failed_kubernetes_ Containerchecks Runtime Policy Failed Kubernetes Checks Args 
- file_block ContainerRuntime Policy File Block Args 
- file_integrity_ Containermonitoring Runtime Policy File Integrity Monitoring Args 
- Configuration for file integrity monitoring.
- fork_guard_ intprocess_ limit 
- Process limit for the fork guard.
- image_name str
- is_audit_ boolchecked 
- is_auto_ boolgenerated 
- is_ootb_ boolpolicy 
- lastupdate int
- limit_container_ Sequence[Containerprivileges Runtime Policy Limit Container Privilege Args] 
- Container privileges configuration.
- limit_new_ boolprivileges 
- If true, prevents the container from obtaining new privileges at runtime. (only enabled in enforce mode)
- linux_capabilities ContainerRuntime Policy Linux Capabilities Args 
- malware_scan_ Containeroptions Runtime Policy Malware Scan Options Args 
- Configuration for Real-Time Malware Protection.
- monitor_system_ booltime_ changes 
- If true, system time changes will be monitored.
- name str
- Name of the container runtime policy
- no_new_ boolprivileges 
- only_registered_ boolimages 
- package_block ContainerRuntime Policy Package Block Args 
- permission str
- port_block ContainerRuntime Policy Port Block Args 
- readonly_files ContainerRuntime Policy Readonly Files Args 
- readonly_registry ContainerRuntime Policy Readonly Registry Args 
- registry str
- registry_access_ Containermonitoring Runtime Policy Registry Access Monitoring Args 
- repo_name str
- resource_name str
- resource_type str
- restricted_volumes Sequence[ContainerRuntime Policy Restricted Volume Args] 
- Restricted volumes configuration.
- reverse_shell ContainerRuntime Policy Reverse Shell Args 
- runtime_mode int
- runtime_type str
- scope_expression str
- Logical expression of how to compute the dependency of the scope variables.
- scope_variables Sequence[ContainerRuntime Policy Scope Variable Args] 
- List of scope attributes.
- scopes
Sequence[ContainerRuntime Policy Scope Args] 
- Scope configuration.
- system_integrity_ Containerprotection Runtime Policy System Integrity Protection Args 
- tripwire
ContainerRuntime Policy Tripwire Args 
- type str
- updated str
- version str
- vpatch_version str
- whitelisted_os_ Containerusers Runtime Policy Whitelisted Os Users Args 
- allowedExecutables List<Property Map>
- Allowed executables configuration.
- allowedRegistries List<Property Map>
- Allowed registries configuration.
- applicationScopes List<String>
- Indicates the application scope of the service.
- auditAll BooleanNetwork Activity 
- If true, all network activity will be audited.
- auditAll BooleanProcesses Activity 
- If true, all process activity will be audited.
- auditBrute BooleanForce Login 
- Detects brute force login attempts
- auditFull BooleanCommand Arguments 
- If true, full command arguments will be audited.
- auditing Property Map
- String
- Username of the account that created the service.
- blacklistedOs Property MapUsers 
- blockAccess BooleanHost Network 
- If true, prevent containers from running with access to host network.
- blockAdding BooleanCapabilities 
- If true, prevent containers from running with adding capabilities with --cap-addprivilege.
- blockContainer BooleanExec 
- If true, exec into a container is prevented.
- blockCryptocurrency BooleanMining 
- Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- blockDisallowed BooleanImages 
- blockFileless BooleanExec 
- Detect and prevent running in-memory execution
- blockLow BooleanPort Binding 
- If true, prevent containers from running with the capability to bind in port lower than 1024.
- blockNon BooleanCompliant Workloads 
- If true, running containers in non-compliant pods is prevented.
- blockNon BooleanK8s Containers 
- If true, running non-kubernetes containers is prevented.
- blockPrivileged BooleanContainers 
- If true, prevent containers from running with privileged container capability.
- blockRoot BooleanUser 
- If true, prevent containers from running with root user.
- blockUse BooleanIpc Namespace 
- If true, prevent containers from running with the privilege to use the IPC namespace.
- blockUse BooleanPid Namespace 
- If true, prevent containers from running with the privilege to use the PID namespace.
- blockUse BooleanUser Namespace 
- If true, prevent containers from running with the privilege to use the user namespace.
- blockUse BooleanUts Namespace 
- If true, prevent containers from running with the privilege to use the UTS namespace.
- blockedCapabilities List<String>
- If true, prevents containers from using specific Unix capabilities.
- blockedExecutables List<String>
- List of executables that are prevented from running in containers.
- blockedFiles List<String>
- List of files that are prevented from being read, modified and executed in the containers.
- blockedInbound List<String>Ports 
- List of blocked inbound ports.
- blockedOutbound List<String>Ports 
- List of blocked outbound ports.
- blockedPackages List<String>
- Prevent containers from reading, writing, or executing all files in the list of packages.
- blockedVolumes List<String>
- List of volumes that are prevented from being mounted in the containers.
- bypassScopes List<Property Map>
- Bypass scope configuration.
- containerExec Property Map
- containerExec List<String>Allowed Processes 
- List of processes that will be allowed.
- created String
- cve String
- defaultSecurity StringProfile 
- description String
- The description of the container runtime policy
- digest String
- driftPreventions List<Property Map>
- Drift prevention configuration.
- enableCrypto BooleanMining Dns 
- enableFork BooleanGuard 
- If true, fork bombs are prevented in the containers.
- enableIp BooleanReputation 
- enablePort BooleanScan Protection 
- enabled Boolean
- Indicates if the runtime policy is enabled or not.
- enforce Boolean
- Indicates that policy should effect container execution (not just for audit).
- enforceAfter NumberDays 
- Indicates the number of days after which the runtime policy will be changed to enforce mode.
- enforceScheduler NumberAdded On 
- excludeApplication List<String>Scopes 
- List of excluded application scopes.
- executableBlacklists List<Property Map>
- Executable blacklist configuration.
- failedKubernetes Property MapChecks 
- fileBlock Property Map
- fileIntegrity Property MapMonitoring 
- Configuration for file integrity monitoring.
- forkGuard NumberProcess Limit 
- Process limit for the fork guard.
- imageName String
- isAudit BooleanChecked 
- isAuto BooleanGenerated 
- isOotb BooleanPolicy 
- lastupdate Number
- limitContainer List<Property Map>Privileges 
- Container privileges configuration.
- limitNew BooleanPrivileges 
- If true, prevents the container from obtaining new privileges at runtime. (only enabled in enforce mode)
- linuxCapabilities Property Map
- malwareScan Property MapOptions 
- Configuration for Real-Time Malware Protection.
- monitorSystem BooleanTime Changes 
- If true, system time changes will be monitored.
- name String
- Name of the container runtime policy
- noNew BooleanPrivileges 
- onlyRegistered BooleanImages 
- packageBlock Property Map
- permission String
- portBlock Property Map
- readonlyFiles Property Map
- readonlyRegistry Property Map
- registry String
- registryAccess Property MapMonitoring 
- repoName String
- resourceName String
- resourceType String
- restrictedVolumes List<Property Map>
- Restricted volumes configuration.
- reverseShell Property Map
- runtimeMode Number
- runtimeType String
- scopeExpression String
- Logical expression of how to compute the dependency of the scope variables.
- scopeVariables List<Property Map>
- List of scope attributes.
- scopes List<Property Map>
- Scope configuration.
- systemIntegrity Property MapProtection 
- tripwire Property Map
- type String
- updated String
- version String
- vpatchVersion String
- whitelistedOs Property MapUsers 
Supporting Types
ContainerRuntimePolicyAllowedExecutable, ContainerRuntimePolicyAllowedExecutableArgs          
- AllowExecutables List<string>
- List of allowed executables.
- AllowRoot List<string>Executables 
- List of allowed root executables.
- Enabled bool
- Whether allowed executables configuration is enabled.
- SeparateExecutables bool
- Whether to treat executables separately.
- AllowExecutables []string
- List of allowed executables.
- AllowRoot []stringExecutables 
- List of allowed root executables.
- Enabled bool
- Whether allowed executables configuration is enabled.
- SeparateExecutables bool
- Whether to treat executables separately.
- allowExecutables List<String>
- List of allowed executables.
- allowRoot List<String>Executables 
- List of allowed root executables.
- enabled Boolean
- Whether allowed executables configuration is enabled.
- separateExecutables Boolean
- Whether to treat executables separately.
- allowExecutables string[]
- List of allowed executables.
- allowRoot string[]Executables 
- List of allowed root executables.
- enabled boolean
- Whether allowed executables configuration is enabled.
- separateExecutables boolean
- Whether to treat executables separately.
- allow_executables Sequence[str]
- List of allowed executables.
- allow_root_ Sequence[str]executables 
- List of allowed root executables.
- enabled bool
- Whether allowed executables configuration is enabled.
- separate_executables bool
- Whether to treat executables separately.
- allowExecutables List<String>
- List of allowed executables.
- allowRoot List<String>Executables 
- List of allowed root executables.
- enabled Boolean
- Whether allowed executables configuration is enabled.
- separateExecutables Boolean
- Whether to treat executables separately.
ContainerRuntimePolicyAllowedRegistry, ContainerRuntimePolicyAllowedRegistryArgs          
- AllowedRegistries List<string>
- List of allowed registries.
- Enabled bool
- Whether allowed registries are enabled.
- AllowedRegistries []string
- List of allowed registries.
- Enabled bool
- Whether allowed registries are enabled.
- allowedRegistries List<String>
- List of allowed registries.
- enabled Boolean
- Whether allowed registries are enabled.
- allowedRegistries string[]
- List of allowed registries.
- enabled boolean
- Whether allowed registries are enabled.
- allowed_registries Sequence[str]
- List of allowed registries.
- enabled bool
- Whether allowed registries are enabled.
- allowedRegistries List<String>
- List of allowed registries.
- enabled Boolean
- Whether allowed registries are enabled.
ContainerRuntimePolicyAuditing, ContainerRuntimePolicyAuditingArgs        
- AuditAll boolNetwork 
- AuditAll boolProcesses 
- AuditFailed boolLogin 
- AuditOs boolUser Activity 
- AuditProcess boolCmdline 
- AuditSuccess boolLogin 
- AuditUser boolAccount Management 
- Enabled bool
- AuditAll boolNetwork 
- AuditAll boolProcesses 
- AuditFailed boolLogin 
- AuditOs boolUser Activity 
- AuditProcess boolCmdline 
- AuditSuccess boolLogin 
- AuditUser boolAccount Management 
- Enabled bool
- auditAll BooleanNetwork 
- auditAll BooleanProcesses 
- auditFailed BooleanLogin 
- auditOs BooleanUser Activity 
- auditProcess BooleanCmdline 
- auditSuccess BooleanLogin 
- auditUser BooleanAccount Management 
- enabled Boolean
- auditAll booleanNetwork 
- auditAll booleanProcesses 
- auditFailed booleanLogin 
- auditOs booleanUser Activity 
- auditProcess booleanCmdline 
- auditSuccess booleanLogin 
- auditUser booleanAccount Management 
- enabled boolean
- audit_all_ boolnetwork 
- audit_all_ boolprocesses 
- audit_failed_ boollogin 
- audit_os_ booluser_ activity 
- audit_process_ boolcmdline 
- audit_success_ boollogin 
- audit_user_ boolaccount_ management 
- enabled bool
- auditAll BooleanNetwork 
- auditAll BooleanProcesses 
- auditFailed BooleanLogin 
- auditOs BooleanUser Activity 
- auditProcess BooleanCmdline 
- auditSuccess BooleanLogin 
- auditUser BooleanAccount Management 
- enabled Boolean
ContainerRuntimePolicyBlacklistedOsUsers, ContainerRuntimePolicyBlacklistedOsUsersArgs            
- Enabled bool
- GroupBlack List<string>Lists 
- UserBlack List<string>Lists 
- Enabled bool
- GroupBlack []stringLists 
- UserBlack []stringLists 
- enabled Boolean
- groupBlack List<String>Lists 
- userBlack List<String>Lists 
- enabled boolean
- groupBlack string[]Lists 
- userBlack string[]Lists 
- enabled bool
- group_black_ Sequence[str]lists 
- user_black_ Sequence[str]lists 
- enabled Boolean
- groupBlack List<String>Lists 
- userBlack List<String>Lists 
ContainerRuntimePolicyBypassScope, ContainerRuntimePolicyBypassScopeArgs          
- Enabled bool
- Whether bypassing the scope is enabled.
- Scopes
List<Pulumiverse.Aquasec. Inputs. Container Runtime Policy Bypass Scope Scope> 
- Scope configuration.
- Enabled bool
- Whether bypassing the scope is enabled.
- Scopes
[]ContainerRuntime Policy Bypass Scope Scope 
- Scope configuration.
- enabled Boolean
- Whether bypassing the scope is enabled.
- scopes
List<ContainerRuntime Policy Bypass Scope Scope> 
- Scope configuration.
- enabled boolean
- Whether bypassing the scope is enabled.
- scopes
ContainerRuntime Policy Bypass Scope Scope[] 
- Scope configuration.
- enabled bool
- Whether bypassing the scope is enabled.
- scopes
Sequence[ContainerRuntime Policy Bypass Scope Scope] 
- Scope configuration.
- enabled Boolean
- Whether bypassing the scope is enabled.
- scopes List<Property Map>
- Scope configuration.
ContainerRuntimePolicyBypassScopeScope, ContainerRuntimePolicyBypassScopeScopeArgs            
- Expression string
- Scope expression.
- Variables
List<Pulumiverse.Aquasec. Inputs. Container Runtime Policy Bypass Scope Scope Variable> 
- List of variables in the scope.
- Expression string
- Scope expression.
- Variables
[]ContainerRuntime Policy Bypass Scope Scope Variable 
- List of variables in the scope.
- expression String
- Scope expression.
- variables
List<ContainerRuntime Policy Bypass Scope Scope Variable> 
- List of variables in the scope.
- expression string
- Scope expression.
- variables
ContainerRuntime Policy Bypass Scope Scope Variable[] 
- List of variables in the scope.
- expression str
- Scope expression.
- variables
Sequence[ContainerRuntime Policy Bypass Scope Scope Variable] 
- List of variables in the scope.
- expression String
- Scope expression.
- variables List<Property Map>
- List of variables in the scope.
ContainerRuntimePolicyBypassScopeScopeVariable, ContainerRuntimePolicyBypassScopeScopeVariableArgs              
ContainerRuntimePolicyContainerExec, ContainerRuntimePolicyContainerExecArgs          
- BlockContainer boolExec 
- ContainerExec List<string>Proc White Lists 
- Enabled bool
- ReverseShell List<string>Ip White Lists 
- BlockContainer boolExec 
- ContainerExec []stringProc White Lists 
- Enabled bool
- ReverseShell []stringIp White Lists 
- blockContainer BooleanExec 
- containerExec List<String>Proc White Lists 
- enabled Boolean
- reverseShell List<String>Ip White Lists 
- blockContainer booleanExec 
- containerExec string[]Proc White Lists 
- enabled boolean
- reverseShell string[]Ip White Lists 
- block_container_ boolexec 
- container_exec_ Sequence[str]proc_ white_ lists 
- enabled bool
- reverse_shell_ Sequence[str]ip_ white_ lists 
- blockContainer BooleanExec 
- containerExec List<String>Proc White Lists 
- enabled Boolean
- reverseShell List<String>Ip White Lists 
ContainerRuntimePolicyDriftPrevention, ContainerRuntimePolicyDriftPreventionArgs          
- Enabled bool
- Whether drift prevention is enabled.
- ExecLockdown bool
- Whether to lockdown execution drift.
- ExecLockdown List<string>White Lists 
- List of items in the execution lockdown white list.
- ImageLockdown bool
- Whether to lockdown image drift.
- Enabled bool
- Whether drift prevention is enabled.
- ExecLockdown bool
- Whether to lockdown execution drift.
- ExecLockdown []stringWhite Lists 
- List of items in the execution lockdown white list.
- ImageLockdown bool
- Whether to lockdown image drift.
- enabled Boolean
- Whether drift prevention is enabled.
- execLockdown Boolean
- Whether to lockdown execution drift.
- execLockdown List<String>White Lists 
- List of items in the execution lockdown white list.
- imageLockdown Boolean
- Whether to lockdown image drift.
- enabled boolean
- Whether drift prevention is enabled.
- execLockdown boolean
- Whether to lockdown execution drift.
- execLockdown string[]White Lists 
- List of items in the execution lockdown white list.
- imageLockdown boolean
- Whether to lockdown image drift.
- enabled bool
- Whether drift prevention is enabled.
- exec_lockdown bool
- Whether to lockdown execution drift.
- exec_lockdown_ Sequence[str]white_ lists 
- List of items in the execution lockdown white list.
- image_lockdown bool
- Whether to lockdown image drift.
- enabled Boolean
- Whether drift prevention is enabled.
- execLockdown Boolean
- Whether to lockdown execution drift.
- execLockdown List<String>White Lists 
- List of items in the execution lockdown white list.
- imageLockdown Boolean
- Whether to lockdown image drift.
ContainerRuntimePolicyExecutableBlacklist, ContainerRuntimePolicyExecutableBlacklistArgs          
- Enabled bool
- Whether the executable blacklist is enabled.
- Executables List<string>
- List of blacklisted executables.
- Enabled bool
- Whether the executable blacklist is enabled.
- Executables []string
- List of blacklisted executables.
- enabled Boolean
- Whether the executable blacklist is enabled.
- executables List<String>
- List of blacklisted executables.
- enabled boolean
- Whether the executable blacklist is enabled.
- executables string[]
- List of blacklisted executables.
- enabled bool
- Whether the executable blacklist is enabled.
- executables Sequence[str]
- List of blacklisted executables.
- enabled Boolean
- Whether the executable blacklist is enabled.
- executables List<String>
- List of blacklisted executables.
ContainerRuntimePolicyFailedKubernetesChecks, ContainerRuntimePolicyFailedKubernetesChecksArgs            
- Enabled bool
- FailedChecks List<string>
- Enabled bool
- FailedChecks []string
- enabled Boolean
- failedChecks List<String>
- enabled boolean
- failedChecks string[]
- enabled bool
- failed_checks Sequence[str]
- enabled Boolean
- failedChecks List<String>
ContainerRuntimePolicyFileBlock, ContainerRuntimePolicyFileBlockArgs          
- BlockFiles List<string>Processes 
- BlockFiles List<string>Users 
- Enabled bool
- ExceptionalBlock List<string>Files 
- ExceptionalBlock List<string>Files Processes 
- ExceptionalBlock List<string>Files Users 
- FilenameBlock List<string>Lists 
- BlockFiles []stringProcesses 
- BlockFiles []stringUsers 
- Enabled bool
- ExceptionalBlock []stringFiles 
- ExceptionalBlock []stringFiles Processes 
- ExceptionalBlock []stringFiles Users 
- FilenameBlock []stringLists 
- blockFiles List<String>Processes 
- blockFiles List<String>Users 
- enabled Boolean
- exceptionalBlock List<String>Files 
- exceptionalBlock List<String>Files Processes 
- exceptionalBlock List<String>Files Users 
- filenameBlock List<String>Lists 
- blockFiles string[]Processes 
- blockFiles string[]Users 
- enabled boolean
- exceptionalBlock string[]Files 
- exceptionalBlock string[]Files Processes 
- exceptionalBlock string[]Files Users 
- filenameBlock string[]Lists 
- block_files_ Sequence[str]processes 
- block_files_ Sequence[str]users 
- enabled bool
- exceptional_block_ Sequence[str]files 
- exceptional_block_ Sequence[str]files_ processes 
- exceptional_block_ Sequence[str]files_ users 
- filename_block_ Sequence[str]lists 
- blockFiles List<String>Processes 
- blockFiles List<String>Users 
- enabled Boolean
- exceptionalBlock List<String>Files 
- exceptionalBlock List<String>Files Processes 
- exceptionalBlock List<String>Files Users 
- filenameBlock List<String>Lists 
ContainerRuntimePolicyFileIntegrityMonitoring, ContainerRuntimePolicyFileIntegrityMonitoringArgs            
- Enabled bool
- If true, file integrity monitoring is enabled.
- ExceptionalMonitored List<string>Files 
- List of paths to be excluded from monitoring.
- ExceptionalMonitored List<string>Files Processes 
- List of processes to be excluded from monitoring.
- ExceptionalMonitored List<string>Files Users 
- List of users to be excluded from monitoring.
- MonitoredFiles List<string>
- List of paths to be monitored.
- MonitoredFiles boolAttributes 
- Whether to monitor file attribute operations.
- MonitoredFiles boolCreate 
- Whether to monitor file create operations.
- MonitoredFiles boolDelete 
- Whether to monitor file delete operations.
- MonitoredFiles boolModify 
- Whether to monitor file modify operations.
- MonitoredFiles List<string>Processes 
- List of processes associated with monitored files.
- MonitoredFiles boolRead 
- Whether to monitor file read operations.
- MonitoredFiles List<string>Users 
- List of users associated with monitored files.
- Enabled bool
- If true, file integrity monitoring is enabled.
- ExceptionalMonitored []stringFiles 
- List of paths to be excluded from monitoring.
- ExceptionalMonitored []stringFiles Processes 
- List of processes to be excluded from monitoring.
- ExceptionalMonitored []stringFiles Users 
- List of users to be excluded from monitoring.
- MonitoredFiles []string
- List of paths to be monitored.
- MonitoredFiles boolAttributes 
- Whether to monitor file attribute operations.
- MonitoredFiles boolCreate 
- Whether to monitor file create operations.
- MonitoredFiles boolDelete 
- Whether to monitor file delete operations.
- MonitoredFiles boolModify 
- Whether to monitor file modify operations.
- MonitoredFiles []stringProcesses 
- List of processes associated with monitored files.
- MonitoredFiles boolRead 
- Whether to monitor file read operations.
- MonitoredFiles []stringUsers 
- List of users associated with monitored files.
- enabled Boolean
- If true, file integrity monitoring is enabled.
- exceptionalMonitored List<String>Files 
- List of paths to be excluded from monitoring.
- exceptionalMonitored List<String>Files Processes 
- List of processes to be excluded from monitoring.
- exceptionalMonitored List<String>Files Users 
- List of users to be excluded from monitoring.
- monitoredFiles List<String>
- List of paths to be monitored.
- monitoredFiles BooleanAttributes 
- Whether to monitor file attribute operations.
- monitoredFiles BooleanCreate 
- Whether to monitor file create operations.
- monitoredFiles BooleanDelete 
- Whether to monitor file delete operations.
- monitoredFiles BooleanModify 
- Whether to monitor file modify operations.
- monitoredFiles List<String>Processes 
- List of processes associated with monitored files.
- monitoredFiles BooleanRead 
- Whether to monitor file read operations.
- monitoredFiles List<String>Users 
- List of users associated with monitored files.
- enabled boolean
- If true, file integrity monitoring is enabled.
- exceptionalMonitored string[]Files 
- List of paths to be excluded from monitoring.
- exceptionalMonitored string[]Files Processes 
- List of processes to be excluded from monitoring.
- exceptionalMonitored string[]Files Users 
- List of users to be excluded from monitoring.
- monitoredFiles string[]
- List of paths to be monitored.
- monitoredFiles booleanAttributes 
- Whether to monitor file attribute operations.
- monitoredFiles booleanCreate 
- Whether to monitor file create operations.
- monitoredFiles booleanDelete 
- Whether to monitor file delete operations.
- monitoredFiles booleanModify 
- Whether to monitor file modify operations.
- monitoredFiles string[]Processes 
- List of processes associated with monitored files.
- monitoredFiles booleanRead 
- Whether to monitor file read operations.
- monitoredFiles string[]Users 
- List of users associated with monitored files.
- enabled bool
- If true, file integrity monitoring is enabled.
- exceptional_monitored_ Sequence[str]files 
- List of paths to be excluded from monitoring.
- exceptional_monitored_ Sequence[str]files_ processes 
- List of processes to be excluded from monitoring.
- exceptional_monitored_ Sequence[str]files_ users 
- List of users to be excluded from monitoring.
- monitored_files Sequence[str]
- List of paths to be monitored.
- monitored_files_ boolattributes 
- Whether to monitor file attribute operations.
- monitored_files_ boolcreate 
- Whether to monitor file create operations.
- monitored_files_ booldelete 
- Whether to monitor file delete operations.
- monitored_files_ boolmodify 
- Whether to monitor file modify operations.
- monitored_files_ Sequence[str]processes 
- List of processes associated with monitored files.
- monitored_files_ boolread 
- Whether to monitor file read operations.
- monitored_files_ Sequence[str]users 
- List of users associated with monitored files.
- enabled Boolean
- If true, file integrity monitoring is enabled.
- exceptionalMonitored List<String>Files 
- List of paths to be excluded from monitoring.
- exceptionalMonitored List<String>Files Processes 
- List of processes to be excluded from monitoring.
- exceptionalMonitored List<String>Files Users 
- List of users to be excluded from monitoring.
- monitoredFiles List<String>
- List of paths to be monitored.
- monitoredFiles BooleanAttributes 
- Whether to monitor file attribute operations.
- monitoredFiles BooleanCreate 
- Whether to monitor file create operations.
- monitoredFiles BooleanDelete 
- Whether to monitor file delete operations.
- monitoredFiles BooleanModify 
- Whether to monitor file modify operations.
- monitoredFiles List<String>Processes 
- List of processes associated with monitored files.
- monitoredFiles BooleanRead 
- Whether to monitor file read operations.
- monitoredFiles List<String>Users 
- List of users associated with monitored files.
ContainerRuntimePolicyLimitContainerPrivilege, ContainerRuntimePolicyLimitContainerPrivilegeArgs            
- BlockAdd boolCapabilities 
- Whether to block adding capabilities.
- Enabled bool
- Whether container privilege limitations are enabled.
- Ipcmode bool
- Whether to limit IPC-related capabilities.
- Netmode bool
- Whether to limit network-related capabilities.
- Pidmode bool
- Whether to limit process-related capabilities.
- PreventLow boolPort Binding 
- Whether to prevent low port binding.
- PreventRoot boolUser 
- Whether to prevent the use of the root user.
- Privileged bool
- Whether the container is run in privileged mode.
- UseHost boolUser 
- Whether to use the host user.
- Usermode bool
- Whether to limit user-related capabilities.
- Utsmode bool
- Whether to limit UTS-related capabilities.
- BlockAdd boolCapabilities 
- Whether to block adding capabilities.
- Enabled bool
- Whether container privilege limitations are enabled.
- Ipcmode bool
- Whether to limit IPC-related capabilities.
- Netmode bool
- Whether to limit network-related capabilities.
- Pidmode bool
- Whether to limit process-related capabilities.
- PreventLow boolPort Binding 
- Whether to prevent low port binding.
- PreventRoot boolUser 
- Whether to prevent the use of the root user.
- Privileged bool
- Whether the container is run in privileged mode.
- UseHost boolUser 
- Whether to use the host user.
- Usermode bool
- Whether to limit user-related capabilities.
- Utsmode bool
- Whether to limit UTS-related capabilities.
- blockAdd BooleanCapabilities 
- Whether to block adding capabilities.
- enabled Boolean
- Whether container privilege limitations are enabled.
- ipcmode Boolean
- Whether to limit IPC-related capabilities.
- netmode Boolean
- Whether to limit network-related capabilities.
- pidmode Boolean
- Whether to limit process-related capabilities.
- preventLow BooleanPort Binding 
- Whether to prevent low port binding.
- preventRoot BooleanUser 
- Whether to prevent the use of the root user.
- privileged Boolean
- Whether the container is run in privileged mode.
- useHost BooleanUser 
- Whether to use the host user.
- usermode Boolean
- Whether to limit user-related capabilities.
- utsmode Boolean
- Whether to limit UTS-related capabilities.
- blockAdd booleanCapabilities 
- Whether to block adding capabilities.
- enabled boolean
- Whether container privilege limitations are enabled.
- ipcmode boolean
- Whether to limit IPC-related capabilities.
- netmode boolean
- Whether to limit network-related capabilities.
- pidmode boolean
- Whether to limit process-related capabilities.
- preventLow booleanPort Binding 
- Whether to prevent low port binding.
- preventRoot booleanUser 
- Whether to prevent the use of the root user.
- privileged boolean
- Whether the container is run in privileged mode.
- useHost booleanUser 
- Whether to use the host user.
- usermode boolean
- Whether to limit user-related capabilities.
- utsmode boolean
- Whether to limit UTS-related capabilities.
- block_add_ boolcapabilities 
- Whether to block adding capabilities.
- enabled bool
- Whether container privilege limitations are enabled.
- ipcmode bool
- Whether to limit IPC-related capabilities.
- netmode bool
- Whether to limit network-related capabilities.
- pidmode bool
- Whether to limit process-related capabilities.
- prevent_low_ boolport_ binding 
- Whether to prevent low port binding.
- prevent_root_ booluser 
- Whether to prevent the use of the root user.
- privileged bool
- Whether the container is run in privileged mode.
- use_host_ booluser 
- Whether to use the host user.
- usermode bool
- Whether to limit user-related capabilities.
- utsmode bool
- Whether to limit UTS-related capabilities.
- blockAdd BooleanCapabilities 
- Whether to block adding capabilities.
- enabled Boolean
- Whether container privilege limitations are enabled.
- ipcmode Boolean
- Whether to limit IPC-related capabilities.
- netmode Boolean
- Whether to limit network-related capabilities.
- pidmode Boolean
- Whether to limit process-related capabilities.
- preventLow BooleanPort Binding 
- Whether to prevent low port binding.
- preventRoot BooleanUser 
- Whether to prevent the use of the root user.
- privileged Boolean
- Whether the container is run in privileged mode.
- useHost BooleanUser 
- Whether to use the host user.
- usermode Boolean
- Whether to limit user-related capabilities.
- utsmode Boolean
- Whether to limit UTS-related capabilities.
ContainerRuntimePolicyLinuxCapabilities, ContainerRuntimePolicyLinuxCapabilitiesArgs          
- Enabled bool
- RemoveLinux List<string>Capabilities 
- Enabled bool
- RemoveLinux []stringCapabilities 
- enabled Boolean
- removeLinux List<String>Capabilities 
- enabled boolean
- removeLinux string[]Capabilities 
- enabled bool
- remove_linux_ Sequence[str]capabilities 
- enabled Boolean
- removeLinux List<String>Capabilities 
ContainerRuntimePolicyMalwareScanOptions, ContainerRuntimePolicyMalwareScanOptionsArgs            
- Action string
- Set Action, Defaults to 'Alert' when empty
- Enabled bool
- Defines if enabled or not
- ExcludeDirectories List<string>
- List of registry paths to be excluded from being protected.
- ExcludeProcesses List<string>
- List of registry processes to be excluded from being protected.
- IncludeDirectories List<string>
- List of registry paths to be excluded from being protected.
- Action string
- Set Action, Defaults to 'Alert' when empty
- Enabled bool
- Defines if enabled or not
- ExcludeDirectories []string
- List of registry paths to be excluded from being protected.
- ExcludeProcesses []string
- List of registry processes to be excluded from being protected.
- IncludeDirectories []string
- List of registry paths to be excluded from being protected.
- action String
- Set Action, Defaults to 'Alert' when empty
- enabled Boolean
- Defines if enabled or not
- excludeDirectories List<String>
- List of registry paths to be excluded from being protected.
- excludeProcesses List<String>
- List of registry processes to be excluded from being protected.
- includeDirectories List<String>
- List of registry paths to be excluded from being protected.
- action string
- Set Action, Defaults to 'Alert' when empty
- enabled boolean
- Defines if enabled or not
- excludeDirectories string[]
- List of registry paths to be excluded from being protected.
- excludeProcesses string[]
- List of registry processes to be excluded from being protected.
- includeDirectories string[]
- List of registry paths to be excluded from being protected.
- action str
- Set Action, Defaults to 'Alert' when empty
- enabled bool
- Defines if enabled or not
- exclude_directories Sequence[str]
- List of registry paths to be excluded from being protected.
- exclude_processes Sequence[str]
- List of registry processes to be excluded from being protected.
- include_directories Sequence[str]
- List of registry paths to be excluded from being protected.
- action String
- Set Action, Defaults to 'Alert' when empty
- enabled Boolean
- Defines if enabled or not
- excludeDirectories List<String>
- List of registry paths to be excluded from being protected.
- excludeProcesses List<String>
- List of registry processes to be excluded from being protected.
- includeDirectories List<String>
- List of registry paths to be excluded from being protected.
ContainerRuntimePolicyPackageBlock, ContainerRuntimePolicyPackageBlockArgs          
- BlockPackages List<string>Processes 
- BlockPackages List<string>Users 
- Enabled bool
- ExceptionalBlock List<string>Packages Files 
- ExceptionalBlock List<string>Packages Processes 
- ExceptionalBlock List<string>Packages Users 
- PackagesBlack List<string>Lists 
- BlockPackages []stringProcesses 
- BlockPackages []stringUsers 
- Enabled bool
- ExceptionalBlock []stringPackages Files 
- ExceptionalBlock []stringPackages Processes 
- ExceptionalBlock []stringPackages Users 
- PackagesBlack []stringLists 
- blockPackages List<String>Processes 
- blockPackages List<String>Users 
- enabled Boolean
- exceptionalBlock List<String>Packages Files 
- exceptionalBlock List<String>Packages Processes 
- exceptionalBlock List<String>Packages Users 
- packagesBlack List<String>Lists 
- blockPackages string[]Processes 
- blockPackages string[]Users 
- enabled boolean
- exceptionalBlock string[]Packages Files 
- exceptionalBlock string[]Packages Processes 
- exceptionalBlock string[]Packages Users 
- packagesBlack string[]Lists 
- block_packages_ Sequence[str]processes 
- block_packages_ Sequence[str]users 
- enabled bool
- exceptional_block_ Sequence[str]packages_ files 
- exceptional_block_ Sequence[str]packages_ processes 
- exceptional_block_ Sequence[str]packages_ users 
- packages_black_ Sequence[str]lists 
- blockPackages List<String>Processes 
- blockPackages List<String>Users 
- enabled Boolean
- exceptionalBlock List<String>Packages Files 
- exceptionalBlock List<String>Packages Processes 
- exceptionalBlock List<String>Packages Users 
- packagesBlack List<String>Lists 
ContainerRuntimePolicyPortBlock, ContainerRuntimePolicyPortBlockArgs          
- BlockInbound List<string>Ports 
- BlockOutbound List<string>Ports 
- Enabled bool
- BlockInbound []stringPorts 
- BlockOutbound []stringPorts 
- Enabled bool
- blockInbound List<String>Ports 
- blockOutbound List<String>Ports 
- enabled Boolean
- blockInbound string[]Ports 
- blockOutbound string[]Ports 
- enabled boolean
- block_inbound_ Sequence[str]ports 
- block_outbound_ Sequence[str]ports 
- enabled bool
- blockInbound List<String>Ports 
- blockOutbound List<String>Ports 
- enabled Boolean
ContainerRuntimePolicyReadonlyFiles, ContainerRuntimePolicyReadonlyFilesArgs          
- Enabled bool
- ExceptionalReadonly List<string>Files 
- ExceptionalReadonly List<string>Files Processes 
- ExceptionalReadonly List<string>Files Users 
- ReadonlyFiles List<string>
- ReadonlyFiles List<string>Processes 
- ReadonlyFiles List<string>Users 
- Enabled bool
- ExceptionalReadonly []stringFiles 
- ExceptionalReadonly []stringFiles Processes 
- ExceptionalReadonly []stringFiles Users 
- ReadonlyFiles []string
- ReadonlyFiles []stringProcesses 
- ReadonlyFiles []stringUsers 
- enabled Boolean
- exceptionalReadonly List<String>Files 
- exceptionalReadonly List<String>Files Processes 
- exceptionalReadonly List<String>Files Users 
- readonlyFiles List<String>
- readonlyFiles List<String>Processes 
- readonlyFiles List<String>Users 
- enabled boolean
- exceptionalReadonly string[]Files 
- exceptionalReadonly string[]Files Processes 
- exceptionalReadonly string[]Files Users 
- readonlyFiles string[]
- readonlyFiles string[]Processes 
- readonlyFiles string[]Users 
- enabled bool
- exceptional_readonly_ Sequence[str]files 
- exceptional_readonly_ Sequence[str]files_ processes 
- exceptional_readonly_ Sequence[str]files_ users 
- readonly_files Sequence[str]
- readonly_files_ Sequence[str]processes 
- readonly_files_ Sequence[str]users 
- enabled Boolean
- exceptionalReadonly List<String>Files 
- exceptionalReadonly List<String>Files Processes 
- exceptionalReadonly List<String>Files Users 
- readonlyFiles List<String>
- readonlyFiles List<String>Processes 
- readonlyFiles List<String>Users 
ContainerRuntimePolicyReadonlyRegistry, ContainerRuntimePolicyReadonlyRegistryArgs          
- Enabled bool
- ExceptionalReadonly List<string>Registry Paths 
- ExceptionalReadonly List<string>Registry Processes 
- ExceptionalReadonly List<string>Registry Users 
- ReadonlyRegistry List<string>Paths 
- ReadonlyRegistry List<string>Processes 
- ReadonlyRegistry List<string>Users 
- Enabled bool
- ExceptionalReadonly []stringRegistry Paths 
- ExceptionalReadonly []stringRegistry Processes 
- ExceptionalReadonly []stringRegistry Users 
- ReadonlyRegistry []stringPaths 
- ReadonlyRegistry []stringProcesses 
- ReadonlyRegistry []stringUsers 
- enabled Boolean
- exceptionalReadonly List<String>Registry Paths 
- exceptionalReadonly List<String>Registry Processes 
- exceptionalReadonly List<String>Registry Users 
- readonlyRegistry List<String>Paths 
- readonlyRegistry List<String>Processes 
- readonlyRegistry List<String>Users 
- enabled boolean
- exceptionalReadonly string[]Registry Paths 
- exceptionalReadonly string[]Registry Processes 
- exceptionalReadonly string[]Registry Users 
- readonlyRegistry string[]Paths 
- readonlyRegistry string[]Processes 
- readonlyRegistry string[]Users 
- enabled bool
- exceptional_readonly_ Sequence[str]registry_ paths 
- exceptional_readonly_ Sequence[str]registry_ processes 
- exceptional_readonly_ Sequence[str]registry_ users 
- readonly_registry_ Sequence[str]paths 
- readonly_registry_ Sequence[str]processes 
- readonly_registry_ Sequence[str]users 
- enabled Boolean
- exceptionalReadonly List<String>Registry Paths 
- exceptionalReadonly List<String>Registry Processes 
- exceptionalReadonly List<String>Registry Users 
- readonlyRegistry List<String>Paths 
- readonlyRegistry List<String>Processes 
- readonlyRegistry List<String>Users 
ContainerRuntimePolicyRegistryAccessMonitoring, ContainerRuntimePolicyRegistryAccessMonitoringArgs            
- Enabled bool
- ExceptionalMonitored List<string>Registry Paths 
- ExceptionalMonitored List<string>Registry Processes 
- ExceptionalMonitored List<string>Registry Users 
- MonitoredRegistry boolAttributes 
- MonitoredRegistry boolCreate 
- MonitoredRegistry boolDelete 
- MonitoredRegistry boolModify 
- MonitoredRegistry List<string>Paths 
- MonitoredRegistry List<string>Processes 
- MonitoredRegistry boolRead 
- MonitoredRegistry List<string>Users 
- Enabled bool
- ExceptionalMonitored []stringRegistry Paths 
- ExceptionalMonitored []stringRegistry Processes 
- ExceptionalMonitored []stringRegistry Users 
- MonitoredRegistry boolAttributes 
- MonitoredRegistry boolCreate 
- MonitoredRegistry boolDelete 
- MonitoredRegistry boolModify 
- MonitoredRegistry []stringPaths 
- MonitoredRegistry []stringProcesses 
- MonitoredRegistry boolRead 
- MonitoredRegistry []stringUsers 
- enabled Boolean
- exceptionalMonitored List<String>Registry Paths 
- exceptionalMonitored List<String>Registry Processes 
- exceptionalMonitored List<String>Registry Users 
- monitoredRegistry BooleanAttributes 
- monitoredRegistry BooleanCreate 
- monitoredRegistry BooleanDelete 
- monitoredRegistry BooleanModify 
- monitoredRegistry List<String>Paths 
- monitoredRegistry List<String>Processes 
- monitoredRegistry BooleanRead 
- monitoredRegistry List<String>Users 
- enabled boolean
- exceptionalMonitored string[]Registry Paths 
- exceptionalMonitored string[]Registry Processes 
- exceptionalMonitored string[]Registry Users 
- monitoredRegistry booleanAttributes 
- monitoredRegistry booleanCreate 
- monitoredRegistry booleanDelete 
- monitoredRegistry booleanModify 
- monitoredRegistry string[]Paths 
- monitoredRegistry string[]Processes 
- monitoredRegistry booleanRead 
- monitoredRegistry string[]Users 
- enabled bool
- exceptional_monitored_ Sequence[str]registry_ paths 
- exceptional_monitored_ Sequence[str]registry_ processes 
- exceptional_monitored_ Sequence[str]registry_ users 
- monitored_registry_ boolattributes 
- monitored_registry_ boolcreate 
- monitored_registry_ booldelete 
- monitored_registry_ boolmodify 
- monitored_registry_ Sequence[str]paths 
- monitored_registry_ Sequence[str]processes 
- monitored_registry_ boolread 
- monitored_registry_ Sequence[str]users 
- enabled Boolean
- exceptionalMonitored List<String>Registry Paths 
- exceptionalMonitored List<String>Registry Processes 
- exceptionalMonitored List<String>Registry Users 
- monitoredRegistry BooleanAttributes 
- monitoredRegistry BooleanCreate 
- monitoredRegistry BooleanDelete 
- monitoredRegistry BooleanModify 
- monitoredRegistry List<String>Paths 
- monitoredRegistry List<String>Processes 
- monitoredRegistry BooleanRead 
- monitoredRegistry List<String>Users 
ContainerRuntimePolicyRestrictedVolume, ContainerRuntimePolicyRestrictedVolumeArgs          
ContainerRuntimePolicyReverseShell, ContainerRuntimePolicyReverseShellArgs          
- BlockReverse boolShell 
- Enabled bool
- ReverseShell List<string>Ip White Lists 
- ReverseShell List<string>Proc White Lists 
- BlockReverse boolShell 
- Enabled bool
- ReverseShell []stringIp White Lists 
- ReverseShell []stringProc White Lists 
- blockReverse BooleanShell 
- enabled Boolean
- reverseShell List<String>Ip White Lists 
- reverseShell List<String>Proc White Lists 
- blockReverse booleanShell 
- enabled boolean
- reverseShell string[]Ip White Lists 
- reverseShell string[]Proc White Lists 
- block_reverse_ boolshell 
- enabled bool
- reverse_shell_ Sequence[str]ip_ white_ lists 
- reverse_shell_ Sequence[str]proc_ white_ lists 
- blockReverse BooleanShell 
- enabled Boolean
- reverseShell List<String>Ip White Lists 
- reverseShell List<String>Proc White Lists 
ContainerRuntimePolicyScope, ContainerRuntimePolicyScopeArgs        
- Expression string
- Scope expression.
- Variables
List<Pulumiverse.Aquasec. Inputs. Container Runtime Policy Scope Variable> 
- List of variables in the scope.
- Expression string
- Scope expression.
- Variables
[]ContainerRuntime Policy Scope Variable 
- List of variables in the scope.
- expression String
- Scope expression.
- variables
List<ContainerRuntime Policy Scope Variable> 
- List of variables in the scope.
- expression string
- Scope expression.
- variables
ContainerRuntime Policy Scope Variable[] 
- List of variables in the scope.
- expression str
- Scope expression.
- variables
Sequence[ContainerRuntime Policy Scope Variable] 
- List of variables in the scope.
- expression String
- Scope expression.
- variables List<Property Map>
- List of variables in the scope.
ContainerRuntimePolicyScopeVariable, ContainerRuntimePolicyScopeVariableArgs          
ContainerRuntimePolicySystemIntegrityProtection, ContainerRuntimePolicySystemIntegrityProtectionArgs            
- AuditSystemtime boolChange 
- Enabled bool
- MonitorAudit boolLog Integrity 
- WindowsServices boolMonitoring 
- AuditSystemtime boolChange 
- Enabled bool
- MonitorAudit boolLog Integrity 
- WindowsServices boolMonitoring 
- auditSystemtime BooleanChange 
- enabled Boolean
- monitorAudit BooleanLog Integrity 
- windowsServices BooleanMonitoring 
- auditSystemtime booleanChange 
- enabled boolean
- monitorAudit booleanLog Integrity 
- windowsServices booleanMonitoring 
- auditSystemtime BooleanChange 
- enabled Boolean
- monitorAudit BooleanLog Integrity 
- windowsServices BooleanMonitoring 
ContainerRuntimePolicyTripwire, ContainerRuntimePolicyTripwireArgs        
- ApplyOns List<string>
- Enabled bool
- ServerlessApp string
- UserId string
- UserPassword string
- ApplyOns []string
- Enabled bool
- ServerlessApp string
- UserId string
- UserPassword string
- applyOns List<String>
- enabled Boolean
- serverlessApp String
- userId String
- userPassword String
- applyOns string[]
- enabled boolean
- serverlessApp string
- userId string
- userPassword string
- apply_ons Sequence[str]
- enabled bool
- serverless_app str
- user_id str
- user_password str
- applyOns List<String>
- enabled Boolean
- serverlessApp String
- userId String
- userPassword String
ContainerRuntimePolicyWhitelistedOsUsers, ContainerRuntimePolicyWhitelistedOsUsersArgs            
- Enabled bool
- GroupWhite List<string>Lists 
- UserWhite List<string>Lists 
- Enabled bool
- GroupWhite []stringLists 
- UserWhite []stringLists 
- enabled Boolean
- groupWhite List<String>Lists 
- userWhite List<String>Lists 
- enabled boolean
- groupWhite string[]Lists 
- userWhite string[]Lists 
- enabled bool
- group_white_ Sequence[str]lists 
- user_white_ Sequence[str]lists 
- enabled Boolean
- groupWhite List<String>Lists 
- userWhite List<String>Lists 
Package Details
- Repository
- aquasec pulumiverse/pulumi-aquasec
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the aquasecTerraform Provider.
