Viewing docs for Aquasec v0.8.29
published on Monday, Jul 22, 2024 by Pulumiverse
published on Monday, Jul 22, 2024 by Pulumiverse
Viewing docs for Aquasec v0.8.29
published on Monday, Jul 22, 2024 by Pulumiverse
published on Monday, Jul 22, 2024 by Pulumiverse
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as aquasec from "@pulumi/aquasec";
const containerRuntimePolicy = aquasec.getContainerRuntimePolicy({
name: "FunctionRuntimePolicyName",
});
export const containerRuntimePolicyDetails = containerRuntimePolicy;
import pulumi
import pulumi_aquasec as aquasec
container_runtime_policy = aquasec.get_container_runtime_policy(name="FunctionRuntimePolicyName")
pulumi.export("containerRuntimePolicyDetails", container_runtime_policy)
package main
import (
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
"github.com/pulumiverse/pulumi-aquasec/sdk/go/aquasec"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
containerRuntimePolicy, err := aquasec.LookupContainerRuntimePolicy(ctx, &aquasec.LookupContainerRuntimePolicyArgs{
Name: "FunctionRuntimePolicyName",
}, nil)
if err != nil {
return err
}
ctx.Export("containerRuntimePolicyDetails", containerRuntimePolicy)
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Aquasec = Pulumi.Aquasec;
return await Deployment.RunAsync(() =>
{
var containerRuntimePolicy = Aquasec.GetContainerRuntimePolicy.Invoke(new()
{
Name = "FunctionRuntimePolicyName",
});
return new Dictionary<string, object?>
{
["containerRuntimePolicyDetails"] = containerRuntimePolicy,
};
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.aquasec.AquasecFunctions;
import com.pulumi.aquasec.inputs.GetContainerRuntimePolicyArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var containerRuntimePolicy = AquasecFunctions.getContainerRuntimePolicy(GetContainerRuntimePolicyArgs.builder()
.name("FunctionRuntimePolicyName")
.build());
ctx.export("containerRuntimePolicyDetails", containerRuntimePolicy.applyValue(getContainerRuntimePolicyResult -> getContainerRuntimePolicyResult));
}
}
variables:
containerRuntimePolicy:
fn::invoke:
Function: aquasec:getContainerRuntimePolicy
Arguments:
name: FunctionRuntimePolicyName
outputs:
containerRuntimePolicyDetails: ${containerRuntimePolicy}
Using getContainerRuntimePolicy
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getContainerRuntimePolicy(args: GetContainerRuntimePolicyArgs, opts?: InvokeOptions): Promise<GetContainerRuntimePolicyResult>
function getContainerRuntimePolicyOutput(args: GetContainerRuntimePolicyOutputArgs, opts?: InvokeOptions): Output<GetContainerRuntimePolicyResult>def get_container_runtime_policy(allowed_executables: Optional[Sequence[GetContainerRuntimePolicyAllowedExecutable]] = None,
allowed_registries: Optional[Sequence[GetContainerRuntimePolicyAllowedRegistry]] = None,
auditing: Optional[GetContainerRuntimePolicyAuditing] = None,
container_exec: Optional[GetContainerRuntimePolicyContainerExec] = None,
file_block: Optional[GetContainerRuntimePolicyFileBlock] = None,
file_integrity_monitorings: Optional[Sequence[GetContainerRuntimePolicyFileIntegrityMonitoring]] = None,
limit_container_privileges: Optional[Sequence[GetContainerRuntimePolicyLimitContainerPrivilege]] = None,
malware_scan_options: Optional[Sequence[GetContainerRuntimePolicyMalwareScanOption]] = None,
name: Optional[str] = None,
port_block: Optional[GetContainerRuntimePolicyPortBlock] = None,
readonly_files: Optional[GetContainerRuntimePolicyReadonlyFiles] = None,
restricted_volumes: Optional[Sequence[GetContainerRuntimePolicyRestrictedVolume]] = None,
opts: Optional[InvokeOptions] = None) -> GetContainerRuntimePolicyResult
def get_container_runtime_policy_output(allowed_executables: Optional[pulumi.Input[Sequence[pulumi.Input[GetContainerRuntimePolicyAllowedExecutableArgs]]]] = None,
allowed_registries: Optional[pulumi.Input[Sequence[pulumi.Input[GetContainerRuntimePolicyAllowedRegistryArgs]]]] = None,
auditing: Optional[pulumi.Input[GetContainerRuntimePolicyAuditingArgs]] = None,
container_exec: Optional[pulumi.Input[GetContainerRuntimePolicyContainerExecArgs]] = None,
file_block: Optional[pulumi.Input[GetContainerRuntimePolicyFileBlockArgs]] = None,
file_integrity_monitorings: Optional[pulumi.Input[Sequence[pulumi.Input[GetContainerRuntimePolicyFileIntegrityMonitoringArgs]]]] = None,
limit_container_privileges: Optional[pulumi.Input[Sequence[pulumi.Input[GetContainerRuntimePolicyLimitContainerPrivilegeArgs]]]] = None,
malware_scan_options: Optional[pulumi.Input[Sequence[pulumi.Input[GetContainerRuntimePolicyMalwareScanOptionArgs]]]] = None,
name: Optional[pulumi.Input[str]] = None,
port_block: Optional[pulumi.Input[GetContainerRuntimePolicyPortBlockArgs]] = None,
readonly_files: Optional[pulumi.Input[GetContainerRuntimePolicyReadonlyFilesArgs]] = None,
restricted_volumes: Optional[pulumi.Input[Sequence[pulumi.Input[GetContainerRuntimePolicyRestrictedVolumeArgs]]]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetContainerRuntimePolicyResult]func LookupContainerRuntimePolicy(ctx *Context, args *LookupContainerRuntimePolicyArgs, opts ...InvokeOption) (*LookupContainerRuntimePolicyResult, error)
func LookupContainerRuntimePolicyOutput(ctx *Context, args *LookupContainerRuntimePolicyOutputArgs, opts ...InvokeOption) LookupContainerRuntimePolicyResultOutput> Note: This function is named LookupContainerRuntimePolicy in the Go SDK.
public static class GetContainerRuntimePolicy
{
public static Task<GetContainerRuntimePolicyResult> InvokeAsync(GetContainerRuntimePolicyArgs args, InvokeOptions? opts = null)
public static Output<GetContainerRuntimePolicyResult> Invoke(GetContainerRuntimePolicyInvokeArgs args, InvokeOptions? opts = null)
}public static CompletableFuture<GetContainerRuntimePolicyResult> getContainerRuntimePolicy(GetContainerRuntimePolicyArgs args, InvokeOptions options)
public static Output<GetContainerRuntimePolicyResult> getContainerRuntimePolicy(GetContainerRuntimePolicyArgs args, InvokeOptions options)
fn::invoke:
function: aquasec:index/getContainerRuntimePolicy:getContainerRuntimePolicy
arguments:
# arguments dictionaryThe following arguments are supported:
- Name string
- Name of the container runtime policy
- Allowed
Executables List<Pulumiverse.Aquasec. Inputs. Get Container Runtime Policy Allowed Executable> - Allowed executables configuration.
- Allowed
Registries List<Pulumiverse.Aquasec. Inputs. Get Container Runtime Policy Allowed Registry> - Allowed registries configuration.
- Auditing
Pulumiverse.
Aquasec. Inputs. Get Container Runtime Policy Auditing - Container
Exec Pulumiverse.Aquasec. Inputs. Get Container Runtime Policy Container Exec - File
Block Pulumiverse.Aquasec. Inputs. Get Container Runtime Policy File Block - File
Integrity List<Pulumiverse.Monitorings Aquasec. Inputs. Get Container Runtime Policy File Integrity Monitoring> - Configuration for file integrity monitoring.
- Limit
Container List<Pulumiverse.Privileges Aquasec. Inputs. Get Container Runtime Policy Limit Container Privilege> - Container privileges configuration.
- Malware
Scan List<Pulumiverse.Options Aquasec. Inputs. Get Container Runtime Policy Malware Scan Option> - Configuration for Real-Time Malware Protection.
- Port
Block Pulumiverse.Aquasec. Inputs. Get Container Runtime Policy Port Block - Readonly
Files Pulumiverse.Aquasec. Inputs. Get Container Runtime Policy Readonly Files - Restricted
Volumes List<Pulumiverse.Aquasec. Inputs. Get Container Runtime Policy Restricted Volume> - Restricted volumes configuration.
- Name string
- Name of the container runtime policy
- Allowed
Executables []GetContainer Runtime Policy Allowed Executable - Allowed executables configuration.
- Allowed
Registries []GetContainer Runtime Policy Allowed Registry - Allowed registries configuration.
- Auditing
Get
Container Runtime Policy Auditing - Container
Exec GetContainer Runtime Policy Container Exec - File
Block GetContainer Runtime Policy File Block - File
Integrity []GetMonitorings Container Runtime Policy File Integrity Monitoring - Configuration for file integrity monitoring.
- Limit
Container []GetPrivileges Container Runtime Policy Limit Container Privilege - Container privileges configuration.
- Malware
Scan []GetOptions Container Runtime Policy Malware Scan Option - Configuration for Real-Time Malware Protection.
- Port
Block GetContainer Runtime Policy Port Block - Readonly
Files GetContainer Runtime Policy Readonly Files - Restricted
Volumes []GetContainer Runtime Policy Restricted Volume - Restricted volumes configuration.
- name String
- Name of the container runtime policy
- allowed
Executables List<GetContainer Runtime Policy Allowed Executable> - Allowed executables configuration.
- allowed
Registries List<GetContainer Runtime Policy Allowed Registry> - Allowed registries configuration.
- auditing
Get
Container Runtime Policy Auditing - container
Exec GetContainer Runtime Policy Container Exec - file
Block GetContainer Runtime Policy File Block - file
Integrity List<GetMonitorings Container Runtime Policy File Integrity Monitoring> - Configuration for file integrity monitoring.
- limit
Container List<GetPrivileges Container Runtime Policy Limit Container Privilege> - Container privileges configuration.
- malware
Scan List<GetOptions Container Runtime Policy Malware Scan Option> - Configuration for Real-Time Malware Protection.
- port
Block GetContainer Runtime Policy Port Block - readonly
Files GetContainer Runtime Policy Readonly Files - restricted
Volumes List<GetContainer Runtime Policy Restricted Volume> - Restricted volumes configuration.
- name string
- Name of the container runtime policy
- allowed
Executables GetContainer Runtime Policy Allowed Executable[] - Allowed executables configuration.
- allowed
Registries GetContainer Runtime Policy Allowed Registry[] - Allowed registries configuration.
- auditing
Get
Container Runtime Policy Auditing - container
Exec GetContainer Runtime Policy Container Exec - file
Block GetContainer Runtime Policy File Block - file
Integrity GetMonitorings Container Runtime Policy File Integrity Monitoring[] - Configuration for file integrity monitoring.
- limit
Container GetPrivileges Container Runtime Policy Limit Container Privilege[] - Container privileges configuration.
- malware
Scan GetOptions Container Runtime Policy Malware Scan Option[] - Configuration for Real-Time Malware Protection.
- port
Block GetContainer Runtime Policy Port Block - readonly
Files GetContainer Runtime Policy Readonly Files - restricted
Volumes GetContainer Runtime Policy Restricted Volume[] - Restricted volumes configuration.
- name str
- Name of the container runtime policy
- allowed_
executables Sequence[GetContainer Runtime Policy Allowed Executable] - Allowed executables configuration.
- allowed_
registries Sequence[GetContainer Runtime Policy Allowed Registry] - Allowed registries configuration.
- auditing
Get
Container Runtime Policy Auditing - container_
exec GetContainer Runtime Policy Container Exec - file_
block GetContainer Runtime Policy File Block - file_
integrity_ Sequence[Getmonitorings Container Runtime Policy File Integrity Monitoring] - Configuration for file integrity monitoring.
- limit_
container_ Sequence[Getprivileges Container Runtime Policy Limit Container Privilege] - Container privileges configuration.
- malware_
scan_ Sequence[Getoptions Container Runtime Policy Malware Scan Option] - Configuration for Real-Time Malware Protection.
- port_
block GetContainer Runtime Policy Port Block - readonly_
files GetContainer Runtime Policy Readonly Files - restricted_
volumes Sequence[GetContainer Runtime Policy Restricted Volume] - Restricted volumes configuration.
- name String
- Name of the container runtime policy
- allowed
Executables List<Property Map> - Allowed executables configuration.
- allowed
Registries List<Property Map> - Allowed registries configuration.
- auditing Property Map
- container
Exec Property Map - file
Block Property Map - file
Integrity List<Property Map>Monitorings - Configuration for file integrity monitoring.
- limit
Container List<Property Map>Privileges - Container privileges configuration.
- malware
Scan List<Property Map>Options - Configuration for Real-Time Malware Protection.
- port
Block Property Map - readonly
Files Property Map - restricted
Volumes List<Property Map> - Restricted volumes configuration.
getContainerRuntimePolicy Result
The following output properties are available:
- Application
Scopes List<string> - Indicates the application scope of the service.
- Audit
All boolNetwork Activity - If true, all network activity will be audited.
- Audit
All boolProcesses Activity - If true, all process activity will be audited.
- Audit
Full boolCommand Arguments - If true, full command arguments will be audited.
- string
- Username of the account that created the service.
- Block
Access boolHost Network - If true, prevent containers from running with access to host network.
- Block
Adding boolCapabilities - If true, prevent containers from running with adding capabilities with
--cap-addprivilege. - Block
Container boolExec - If true, exec into a container is prevented.
- Block
Cryptocurrency boolMining - Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- Block
Fileless boolExec - Detect and prevent running in-memory execution
- Block
Low boolPort Binding - If true, prevent containers from running with the capability to bind in port lower than 1024.
- Block
Non boolCompliant Images - If true, running non-compliant image in the container is prevented.
- Block
Non boolCompliant Workloads - If true, running containers in non-compliant pods is prevented.
- Block
Non boolK8s Containers - If true, running non-kubernetes containers is prevented.
- Block
Privileged boolContainers - If true, prevent containers from running with privileged container capability.
- Block
Reverse boolShell - If true, reverse shell is prevented.
- Block
Root boolUser - If true, prevent containers from running with root user.
- Block
Unregistered boolImages - If true, running images in the container that are not registered in Aqua is prevented.
- Block
Use boolIpc Namespace - If true, prevent containers from running with the privilege to use the IPC namespace.
- Block
Use boolPid Namespace - If true, prevent containers from running with the privilege to use the PID namespace.
- Block
Use boolUser Namespace - If true, prevent containers from running with the privilege to use the user namespace.
- Block
Use boolUts Namespace - If true, prevent containers from running with the privilege to use the UTS namespace.
- Blocked
Capabilities List<string> - If true, prevents containers from using specific Unix capabilities.
- Blocked
Executables List<string> - List of executables that are prevented from running in containers.
- Blocked
Files List<string> - List of files that are prevented from being read, modified and executed in the containers.
- Blocked
Inbound List<string>Ports - List of blocked inbound ports.
- Blocked
Outbound List<string>Ports - List of blocked outbound ports.
- Blocked
Packages List<string> - Prevent containers from reading, writing, or executing all files in the list of packages.
- Blocked
Volumes List<string> - List of volumes that are prevented from being mounted in the containers.
- Container
Exec List<string>Allowed Processes - List of processes that will be allowed.
- Description string
- The description of the container runtime policy
- Enable
Drift boolPrevention - If true, executables that are not in the original image is prevented from running.
- Enable
Fork boolGuard - If true, fork bombs are prevented in the containers.
- Enable
Ip boolReputation Security - If true, detect and prevent communication from containers to IP addresses known to have a bad reputation.
- Enable
Port boolScan Detection - If true, detects port scanning behavior in the container.
- Enabled bool
- Indicates if the runtime policy is enabled or not.
- Enforce bool
- Indicates that policy should effect container execution (not just for audit).
- Enforce
After intDays - Indicates the number of days after which the runtime policy will be changed to enforce mode.
- Exceptional
Readonly List<string>Files And Directories - List of files and directories to be excluded from the read-only list.
- Exec
Lockdown List<string>White Lists - Specify processes that will be allowed
- Fork
Guard intProcess Limit - Process limit for the fork guard.
- Id string
- The provider-assigned unique ID for this managed resource.
- Limit
New boolPrivileges - If true, prevents the container from obtaining new privileges at runtime. (only enabled in enforce mode)
- Monitor
System boolTime Changes - If true, system time changes will be monitored.
- Name string
- Name of the container runtime policy
- Readonly
Files List<string>And Directories - List of files and directories to be restricted as read-only
- Reverse
Shell List<string>Allowed Ips - List of IPs/ CIDRs that will be allowed
- Reverse
Shell List<string>Allowed Processes - List of processes that will be allowed
- Scope
Expression string - Logical expression of how to compute the dependency of the scope variables.
- Scope
Variables List<Pulumiverse.Aquasec. Outputs. Get Container Runtime Policy Scope Variable> - List of scope attributes.
- Allowed
Executables List<Pulumiverse.Aquasec. Outputs. Get Container Runtime Policy Allowed Executable> - Allowed executables configuration.
- Allowed
Registries List<Pulumiverse.Aquasec. Outputs. Get Container Runtime Policy Allowed Registry> - Allowed registries configuration.
- Auditing
Pulumiverse.
Aquasec. Outputs. Get Container Runtime Policy Auditing - Container
Exec Pulumiverse.Aquasec. Outputs. Get Container Runtime Policy Container Exec - File
Block Pulumiverse.Aquasec. Outputs. Get Container Runtime Policy File Block - File
Integrity List<Pulumiverse.Monitorings Aquasec. Outputs. Get Container Runtime Policy File Integrity Monitoring> - Configuration for file integrity monitoring.
- Limit
Container List<Pulumiverse.Privileges Aquasec. Outputs. Get Container Runtime Policy Limit Container Privilege> - Container privileges configuration.
- Malware
Scan List<Pulumiverse.Options Aquasec. Outputs. Get Container Runtime Policy Malware Scan Option> - Configuration for Real-Time Malware Protection.
- Port
Block Pulumiverse.Aquasec. Outputs. Get Container Runtime Policy Port Block - Readonly
Files Pulumiverse.Aquasec. Outputs. Get Container Runtime Policy Readonly Files - Restricted
Volumes List<Pulumiverse.Aquasec. Outputs. Get Container Runtime Policy Restricted Volume> - Restricted volumes configuration.
- Application
Scopes []string - Indicates the application scope of the service.
- Audit
All boolNetwork Activity - If true, all network activity will be audited.
- Audit
All boolProcesses Activity - If true, all process activity will be audited.
- Audit
Full boolCommand Arguments - If true, full command arguments will be audited.
- string
- Username of the account that created the service.
- Block
Access boolHost Network - If true, prevent containers from running with access to host network.
- Block
Adding boolCapabilities - If true, prevent containers from running with adding capabilities with
--cap-addprivilege. - Block
Container boolExec - If true, exec into a container is prevented.
- Block
Cryptocurrency boolMining - Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- Block
Fileless boolExec - Detect and prevent running in-memory execution
- Block
Low boolPort Binding - If true, prevent containers from running with the capability to bind in port lower than 1024.
- Block
Non boolCompliant Images - If true, running non-compliant image in the container is prevented.
- Block
Non boolCompliant Workloads - If true, running containers in non-compliant pods is prevented.
- Block
Non boolK8s Containers - If true, running non-kubernetes containers is prevented.
- Block
Privileged boolContainers - If true, prevent containers from running with privileged container capability.
- Block
Reverse boolShell - If true, reverse shell is prevented.
- Block
Root boolUser - If true, prevent containers from running with root user.
- Block
Unregistered boolImages - If true, running images in the container that are not registered in Aqua is prevented.
- Block
Use boolIpc Namespace - If true, prevent containers from running with the privilege to use the IPC namespace.
- Block
Use boolPid Namespace - If true, prevent containers from running with the privilege to use the PID namespace.
- Block
Use boolUser Namespace - If true, prevent containers from running with the privilege to use the user namespace.
- Block
Use boolUts Namespace - If true, prevent containers from running with the privilege to use the UTS namespace.
- Blocked
Capabilities []string - If true, prevents containers from using specific Unix capabilities.
- Blocked
Executables []string - List of executables that are prevented from running in containers.
- Blocked
Files []string - List of files that are prevented from being read, modified and executed in the containers.
- Blocked
Inbound []stringPorts - List of blocked inbound ports.
- Blocked
Outbound []stringPorts - List of blocked outbound ports.
- Blocked
Packages []string - Prevent containers from reading, writing, or executing all files in the list of packages.
- Blocked
Volumes []string - List of volumes that are prevented from being mounted in the containers.
- Container
Exec []stringAllowed Processes - List of processes that will be allowed.
- Description string
- The description of the container runtime policy
- Enable
Drift boolPrevention - If true, executables that are not in the original image is prevented from running.
- Enable
Fork boolGuard - If true, fork bombs are prevented in the containers.
- Enable
Ip boolReputation Security - If true, detect and prevent communication from containers to IP addresses known to have a bad reputation.
- Enable
Port boolScan Detection - If true, detects port scanning behavior in the container.
- Enabled bool
- Indicates if the runtime policy is enabled or not.
- Enforce bool
- Indicates that policy should effect container execution (not just for audit).
- Enforce
After intDays - Indicates the number of days after which the runtime policy will be changed to enforce mode.
- Exceptional
Readonly []stringFiles And Directories - List of files and directories to be excluded from the read-only list.
- Exec
Lockdown []stringWhite Lists - Specify processes that will be allowed
- Fork
Guard intProcess Limit - Process limit for the fork guard.
- Id string
- The provider-assigned unique ID for this managed resource.
- Limit
New boolPrivileges - If true, prevents the container from obtaining new privileges at runtime. (only enabled in enforce mode)
- Monitor
System boolTime Changes - If true, system time changes will be monitored.
- Name string
- Name of the container runtime policy
- Readonly
Files []stringAnd Directories - List of files and directories to be restricted as read-only
- Reverse
Shell []stringAllowed Ips - List of IPs/ CIDRs that will be allowed
- Reverse
Shell []stringAllowed Processes - List of processes that will be allowed
- Scope
Expression string - Logical expression of how to compute the dependency of the scope variables.
- Scope
Variables []GetContainer Runtime Policy Scope Variable - List of scope attributes.
- Allowed
Executables []GetContainer Runtime Policy Allowed Executable - Allowed executables configuration.
- Allowed
Registries []GetContainer Runtime Policy Allowed Registry - Allowed registries configuration.
- Auditing
Get
Container Runtime Policy Auditing - Container
Exec GetContainer Runtime Policy Container Exec - File
Block GetContainer Runtime Policy File Block - File
Integrity []GetMonitorings Container Runtime Policy File Integrity Monitoring - Configuration for file integrity monitoring.
- Limit
Container []GetPrivileges Container Runtime Policy Limit Container Privilege - Container privileges configuration.
- Malware
Scan []GetOptions Container Runtime Policy Malware Scan Option - Configuration for Real-Time Malware Protection.
- Port
Block GetContainer Runtime Policy Port Block - Readonly
Files GetContainer Runtime Policy Readonly Files - Restricted
Volumes []GetContainer Runtime Policy Restricted Volume - Restricted volumes configuration.
- application
Scopes List<String> - Indicates the application scope of the service.
- audit
All BooleanNetwork Activity - If true, all network activity will be audited.
- audit
All BooleanProcesses Activity - If true, all process activity will be audited.
- audit
Full BooleanCommand Arguments - If true, full command arguments will be audited.
- String
- Username of the account that created the service.
- block
Access BooleanHost Network - If true, prevent containers from running with access to host network.
- block
Adding BooleanCapabilities - If true, prevent containers from running with adding capabilities with
--cap-addprivilege. - block
Container BooleanExec - If true, exec into a container is prevented.
- block
Cryptocurrency BooleanMining - Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- block
Fileless BooleanExec - Detect and prevent running in-memory execution
- block
Low BooleanPort Binding - If true, prevent containers from running with the capability to bind in port lower than 1024.
- block
Non BooleanCompliant Images - If true, running non-compliant image in the container is prevented.
- block
Non BooleanCompliant Workloads - If true, running containers in non-compliant pods is prevented.
- block
Non BooleanK8s Containers - If true, running non-kubernetes containers is prevented.
- block
Privileged BooleanContainers - If true, prevent containers from running with privileged container capability.
- block
Reverse BooleanShell - If true, reverse shell is prevented.
- block
Root BooleanUser - If true, prevent containers from running with root user.
- block
Unregistered BooleanImages - If true, running images in the container that are not registered in Aqua is prevented.
- block
Use BooleanIpc Namespace - If true, prevent containers from running with the privilege to use the IPC namespace.
- block
Use BooleanPid Namespace - If true, prevent containers from running with the privilege to use the PID namespace.
- block
Use BooleanUser Namespace - If true, prevent containers from running with the privilege to use the user namespace.
- block
Use BooleanUts Namespace - If true, prevent containers from running with the privilege to use the UTS namespace.
- blocked
Capabilities List<String> - If true, prevents containers from using specific Unix capabilities.
- blocked
Executables List<String> - List of executables that are prevented from running in containers.
- blocked
Files List<String> - List of files that are prevented from being read, modified and executed in the containers.
- blocked
Inbound List<String>Ports - List of blocked inbound ports.
- blocked
Outbound List<String>Ports - List of blocked outbound ports.
- blocked
Packages List<String> - Prevent containers from reading, writing, or executing all files in the list of packages.
- blocked
Volumes List<String> - List of volumes that are prevented from being mounted in the containers.
- container
Exec List<String>Allowed Processes - List of processes that will be allowed.
- description String
- The description of the container runtime policy
- enable
Drift BooleanPrevention - If true, executables that are not in the original image is prevented from running.
- enable
Fork BooleanGuard - If true, fork bombs are prevented in the containers.
- enable
Ip BooleanReputation Security - If true, detect and prevent communication from containers to IP addresses known to have a bad reputation.
- enable
Port BooleanScan Detection - If true, detects port scanning behavior in the container.
- enabled Boolean
- Indicates if the runtime policy is enabled or not.
- enforce Boolean
- Indicates that policy should effect container execution (not just for audit).
- enforce
After IntegerDays - Indicates the number of days after which the runtime policy will be changed to enforce mode.
- exceptional
Readonly List<String>Files And Directories - List of files and directories to be excluded from the read-only list.
- exec
Lockdown List<String>White Lists - Specify processes that will be allowed
- fork
Guard IntegerProcess Limit - Process limit for the fork guard.
- id String
- The provider-assigned unique ID for this managed resource.
- limit
New BooleanPrivileges - If true, prevents the container from obtaining new privileges at runtime. (only enabled in enforce mode)
- monitor
System BooleanTime Changes - If true, system time changes will be monitored.
- name String
- Name of the container runtime policy
- readonly
Files List<String>And Directories - List of files and directories to be restricted as read-only
- reverse
Shell List<String>Allowed Ips - List of IPs/ CIDRs that will be allowed
- reverse
Shell List<String>Allowed Processes - List of processes that will be allowed
- scope
Expression String - Logical expression of how to compute the dependency of the scope variables.
- scope
Variables List<GetContainer Runtime Policy Scope Variable> - List of scope attributes.
- allowed
Executables List<GetContainer Runtime Policy Allowed Executable> - Allowed executables configuration.
- allowed
Registries List<GetContainer Runtime Policy Allowed Registry> - Allowed registries configuration.
- auditing
Get
Container Runtime Policy Auditing - container
Exec GetContainer Runtime Policy Container Exec - file
Block GetContainer Runtime Policy File Block - file
Integrity List<GetMonitorings Container Runtime Policy File Integrity Monitoring> - Configuration for file integrity monitoring.
- limit
Container List<GetPrivileges Container Runtime Policy Limit Container Privilege> - Container privileges configuration.
- malware
Scan List<GetOptions Container Runtime Policy Malware Scan Option> - Configuration for Real-Time Malware Protection.
- port
Block GetContainer Runtime Policy Port Block - readonly
Files GetContainer Runtime Policy Readonly Files - restricted
Volumes List<GetContainer Runtime Policy Restricted Volume> - Restricted volumes configuration.
- application
Scopes string[] - Indicates the application scope of the service.
- audit
All booleanNetwork Activity - If true, all network activity will be audited.
- audit
All booleanProcesses Activity - If true, all process activity will be audited.
- audit
Full booleanCommand Arguments - If true, full command arguments will be audited.
- string
- Username of the account that created the service.
- block
Access booleanHost Network - If true, prevent containers from running with access to host network.
- block
Adding booleanCapabilities - If true, prevent containers from running with adding capabilities with
--cap-addprivilege. - block
Container booleanExec - If true, exec into a container is prevented.
- block
Cryptocurrency booleanMining - Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- block
Fileless booleanExec - Detect and prevent running in-memory execution
- block
Low booleanPort Binding - If true, prevent containers from running with the capability to bind in port lower than 1024.
- block
Non booleanCompliant Images - If true, running non-compliant image in the container is prevented.
- block
Non booleanCompliant Workloads - If true, running containers in non-compliant pods is prevented.
- block
Non booleanK8s Containers - If true, running non-kubernetes containers is prevented.
- block
Privileged booleanContainers - If true, prevent containers from running with privileged container capability.
- block
Reverse booleanShell - If true, reverse shell is prevented.
- block
Root booleanUser - If true, prevent containers from running with root user.
- block
Unregistered booleanImages - If true, running images in the container that are not registered in Aqua is prevented.
- block
Use booleanIpc Namespace - If true, prevent containers from running with the privilege to use the IPC namespace.
- block
Use booleanPid Namespace - If true, prevent containers from running with the privilege to use the PID namespace.
- block
Use booleanUser Namespace - If true, prevent containers from running with the privilege to use the user namespace.
- block
Use booleanUts Namespace - If true, prevent containers from running with the privilege to use the UTS namespace.
- blocked
Capabilities string[] - If true, prevents containers from using specific Unix capabilities.
- blocked
Executables string[] - List of executables that are prevented from running in containers.
- blocked
Files string[] - List of files that are prevented from being read, modified and executed in the containers.
- blocked
Inbound string[]Ports - List of blocked inbound ports.
- blocked
Outbound string[]Ports - List of blocked outbound ports.
- blocked
Packages string[] - Prevent containers from reading, writing, or executing all files in the list of packages.
- blocked
Volumes string[] - List of volumes that are prevented from being mounted in the containers.
- container
Exec string[]Allowed Processes - List of processes that will be allowed.
- description string
- The description of the container runtime policy
- enable
Drift booleanPrevention - If true, executables that are not in the original image is prevented from running.
- enable
Fork booleanGuard - If true, fork bombs are prevented in the containers.
- enable
Ip booleanReputation Security - If true, detect and prevent communication from containers to IP addresses known to have a bad reputation.
- enable
Port booleanScan Detection - If true, detects port scanning behavior in the container.
- enabled boolean
- Indicates if the runtime policy is enabled or not.
- enforce boolean
- Indicates that policy should effect container execution (not just for audit).
- enforce
After numberDays - Indicates the number of days after which the runtime policy will be changed to enforce mode.
- exceptional
Readonly string[]Files And Directories - List of files and directories to be excluded from the read-only list.
- exec
Lockdown string[]White Lists - Specify processes that will be allowed
- fork
Guard numberProcess Limit - Process limit for the fork guard.
- id string
- The provider-assigned unique ID for this managed resource.
- limit
New booleanPrivileges - If true, prevents the container from obtaining new privileges at runtime. (only enabled in enforce mode)
- monitor
System booleanTime Changes - If true, system time changes will be monitored.
- name string
- Name of the container runtime policy
- readonly
Files string[]And Directories - List of files and directories to be restricted as read-only
- reverse
Shell string[]Allowed Ips - List of IPs/ CIDRs that will be allowed
- reverse
Shell string[]Allowed Processes - List of processes that will be allowed
- scope
Expression string - Logical expression of how to compute the dependency of the scope variables.
- scope
Variables GetContainer Runtime Policy Scope Variable[] - List of scope attributes.
- allowed
Executables GetContainer Runtime Policy Allowed Executable[] - Allowed executables configuration.
- allowed
Registries GetContainer Runtime Policy Allowed Registry[] - Allowed registries configuration.
- auditing
Get
Container Runtime Policy Auditing - container
Exec GetContainer Runtime Policy Container Exec - file
Block GetContainer Runtime Policy File Block - file
Integrity GetMonitorings Container Runtime Policy File Integrity Monitoring[] - Configuration for file integrity monitoring.
- limit
Container GetPrivileges Container Runtime Policy Limit Container Privilege[] - Container privileges configuration.
- malware
Scan GetOptions Container Runtime Policy Malware Scan Option[] - Configuration for Real-Time Malware Protection.
- port
Block GetContainer Runtime Policy Port Block - readonly
Files GetContainer Runtime Policy Readonly Files - restricted
Volumes GetContainer Runtime Policy Restricted Volume[] - Restricted volumes configuration.
- application_
scopes Sequence[str] - Indicates the application scope of the service.
- audit_
all_ boolnetwork_ activity - If true, all network activity will be audited.
- audit_
all_ boolprocesses_ activity - If true, all process activity will be audited.
- audit_
full_ boolcommand_ arguments - If true, full command arguments will be audited.
- str
- Username of the account that created the service.
- block_
access_ boolhost_ network - If true, prevent containers from running with access to host network.
- block_
adding_ boolcapabilities - If true, prevent containers from running with adding capabilities with
--cap-addprivilege. - block_
container_ boolexec - If true, exec into a container is prevented.
- block_
cryptocurrency_ boolmining - Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- block_
fileless_ boolexec - Detect and prevent running in-memory execution
- block_
low_ boolport_ binding - If true, prevent containers from running with the capability to bind in port lower than 1024.
- block_
non_ boolcompliant_ images - If true, running non-compliant image in the container is prevented.
- block_
non_ boolcompliant_ workloads - If true, running containers in non-compliant pods is prevented.
- block_
non_ boolk8s_ containers - If true, running non-kubernetes containers is prevented.
- block_
privileged_ boolcontainers - If true, prevent containers from running with privileged container capability.
- block_
reverse_ boolshell - If true, reverse shell is prevented.
- block_
root_ booluser - If true, prevent containers from running with root user.
- block_
unregistered_ boolimages - If true, running images in the container that are not registered in Aqua is prevented.
- block_
use_ boolipc_ namespace - If true, prevent containers from running with the privilege to use the IPC namespace.
- block_
use_ boolpid_ namespace - If true, prevent containers from running with the privilege to use the PID namespace.
- block_
use_ booluser_ namespace - If true, prevent containers from running with the privilege to use the user namespace.
- block_
use_ booluts_ namespace - If true, prevent containers from running with the privilege to use the UTS namespace.
- blocked_
capabilities Sequence[str] - If true, prevents containers from using specific Unix capabilities.
- blocked_
executables Sequence[str] - List of executables that are prevented from running in containers.
- blocked_
files Sequence[str] - List of files that are prevented from being read, modified and executed in the containers.
- blocked_
inbound_ Sequence[str]ports - List of blocked inbound ports.
- blocked_
outbound_ Sequence[str]ports - List of blocked outbound ports.
- blocked_
packages Sequence[str] - Prevent containers from reading, writing, or executing all files in the list of packages.
- blocked_
volumes Sequence[str] - List of volumes that are prevented from being mounted in the containers.
- container_
exec_ Sequence[str]allowed_ processes - List of processes that will be allowed.
- description str
- The description of the container runtime policy
- enable_
drift_ boolprevention - If true, executables that are not in the original image is prevented from running.
- enable_
fork_ boolguard - If true, fork bombs are prevented in the containers.
- enable_
ip_ boolreputation_ security - If true, detect and prevent communication from containers to IP addresses known to have a bad reputation.
- enable_
port_ boolscan_ detection - If true, detects port scanning behavior in the container.
- enabled bool
- Indicates if the runtime policy is enabled or not.
- enforce bool
- Indicates that policy should effect container execution (not just for audit).
- enforce_
after_ intdays - Indicates the number of days after which the runtime policy will be changed to enforce mode.
- exceptional_
readonly_ Sequence[str]files_ and_ directories - List of files and directories to be excluded from the read-only list.
- exec_
lockdown_ Sequence[str]white_ lists - Specify processes that will be allowed
- fork_
guard_ intprocess_ limit - Process limit for the fork guard.
- id str
- The provider-assigned unique ID for this managed resource.
- limit_
new_ boolprivileges - If true, prevents the container from obtaining new privileges at runtime. (only enabled in enforce mode)
- monitor_
system_ booltime_ changes - If true, system time changes will be monitored.
- name str
- Name of the container runtime policy
- readonly_
files_ Sequence[str]and_ directories - List of files and directories to be restricted as read-only
- reverse_
shell_ Sequence[str]allowed_ ips - List of IPs/ CIDRs that will be allowed
- reverse_
shell_ Sequence[str]allowed_ processes - List of processes that will be allowed
- scope_
expression str - Logical expression of how to compute the dependency of the scope variables.
- scope_
variables Sequence[GetContainer Runtime Policy Scope Variable] - List of scope attributes.
- allowed_
executables Sequence[GetContainer Runtime Policy Allowed Executable] - Allowed executables configuration.
- allowed_
registries Sequence[GetContainer Runtime Policy Allowed Registry] - Allowed registries configuration.
- auditing
Get
Container Runtime Policy Auditing - container_
exec GetContainer Runtime Policy Container Exec - file_
block GetContainer Runtime Policy File Block - file_
integrity_ Sequence[Getmonitorings Container Runtime Policy File Integrity Monitoring] - Configuration for file integrity monitoring.
- limit_
container_ Sequence[Getprivileges Container Runtime Policy Limit Container Privilege] - Container privileges configuration.
- malware_
scan_ Sequence[Getoptions Container Runtime Policy Malware Scan Option] - Configuration for Real-Time Malware Protection.
- port_
block GetContainer Runtime Policy Port Block - readonly_
files GetContainer Runtime Policy Readonly Files - restricted_
volumes Sequence[GetContainer Runtime Policy Restricted Volume] - Restricted volumes configuration.
- application
Scopes List<String> - Indicates the application scope of the service.
- audit
All BooleanNetwork Activity - If true, all network activity will be audited.
- audit
All BooleanProcesses Activity - If true, all process activity will be audited.
- audit
Full BooleanCommand Arguments - If true, full command arguments will be audited.
- String
- Username of the account that created the service.
- block
Access BooleanHost Network - If true, prevent containers from running with access to host network.
- block
Adding BooleanCapabilities - If true, prevent containers from running with adding capabilities with
--cap-addprivilege. - block
Container BooleanExec - If true, exec into a container is prevented.
- block
Cryptocurrency BooleanMining - Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- block
Fileless BooleanExec - Detect and prevent running in-memory execution
- block
Low BooleanPort Binding - If true, prevent containers from running with the capability to bind in port lower than 1024.
- block
Non BooleanCompliant Images - If true, running non-compliant image in the container is prevented.
- block
Non BooleanCompliant Workloads - If true, running containers in non-compliant pods is prevented.
- block
Non BooleanK8s Containers - If true, running non-kubernetes containers is prevented.
- block
Privileged BooleanContainers - If true, prevent containers from running with privileged container capability.
- block
Reverse BooleanShell - If true, reverse shell is prevented.
- block
Root BooleanUser - If true, prevent containers from running with root user.
- block
Unregistered BooleanImages - If true, running images in the container that are not registered in Aqua is prevented.
- block
Use BooleanIpc Namespace - If true, prevent containers from running with the privilege to use the IPC namespace.
- block
Use BooleanPid Namespace - If true, prevent containers from running with the privilege to use the PID namespace.
- block
Use BooleanUser Namespace - If true, prevent containers from running with the privilege to use the user namespace.
- block
Use BooleanUts Namespace - If true, prevent containers from running with the privilege to use the UTS namespace.
- blocked
Capabilities List<String> - If true, prevents containers from using specific Unix capabilities.
- blocked
Executables List<String> - List of executables that are prevented from running in containers.
- blocked
Files List<String> - List of files that are prevented from being read, modified and executed in the containers.
- blocked
Inbound List<String>Ports - List of blocked inbound ports.
- blocked
Outbound List<String>Ports - List of blocked outbound ports.
- blocked
Packages List<String> - Prevent containers from reading, writing, or executing all files in the list of packages.
- blocked
Volumes List<String> - List of volumes that are prevented from being mounted in the containers.
- container
Exec List<String>Allowed Processes - List of processes that will be allowed.
- description String
- The description of the container runtime policy
- enable
Drift BooleanPrevention - If true, executables that are not in the original image is prevented from running.
- enable
Fork BooleanGuard - If true, fork bombs are prevented in the containers.
- enable
Ip BooleanReputation Security - If true, detect and prevent communication from containers to IP addresses known to have a bad reputation.
- enable
Port BooleanScan Detection - If true, detects port scanning behavior in the container.
- enabled Boolean
- Indicates if the runtime policy is enabled or not.
- enforce Boolean
- Indicates that policy should effect container execution (not just for audit).
- enforce
After NumberDays - Indicates the number of days after which the runtime policy will be changed to enforce mode.
- exceptional
Readonly List<String>Files And Directories - List of files and directories to be excluded from the read-only list.
- exec
Lockdown List<String>White Lists - Specify processes that will be allowed
- fork
Guard NumberProcess Limit - Process limit for the fork guard.
- id String
- The provider-assigned unique ID for this managed resource.
- limit
New BooleanPrivileges - If true, prevents the container from obtaining new privileges at runtime. (only enabled in enforce mode)
- monitor
System BooleanTime Changes - If true, system time changes will be monitored.
- name String
- Name of the container runtime policy
- readonly
Files List<String>And Directories - List of files and directories to be restricted as read-only
- reverse
Shell List<String>Allowed Ips - List of IPs/ CIDRs that will be allowed
- reverse
Shell List<String>Allowed Processes - List of processes that will be allowed
- scope
Expression String - Logical expression of how to compute the dependency of the scope variables.
- scope
Variables List<Property Map> - List of scope attributes.
- allowed
Executables List<Property Map> - Allowed executables configuration.
- allowed
Registries List<Property Map> - Allowed registries configuration.
- auditing Property Map
- container
Exec Property Map - file
Block Property Map - file
Integrity List<Property Map>Monitorings - Configuration for file integrity monitoring.
- limit
Container List<Property Map>Privileges - Container privileges configuration.
- malware
Scan List<Property Map>Options - Configuration for Real-Time Malware Protection.
- port
Block Property Map - readonly
Files Property Map - restricted
Volumes List<Property Map> - Restricted volumes configuration.
Supporting Types
GetContainerRuntimePolicyAllowedExecutable
- Allow
Executables List<string> - List of allowed executables.
- Allow
Root List<string>Executables - List of allowed root executables.
- Enabled bool
- Whether allowed executables configuration is enabled.
- Separate
Executables bool - Whether to treat executables separately.
- Allow
Executables []string - List of allowed executables.
- Allow
Root []stringExecutables - List of allowed root executables.
- Enabled bool
- Whether allowed executables configuration is enabled.
- Separate
Executables bool - Whether to treat executables separately.
- allow
Executables List<String> - List of allowed executables.
- allow
Root List<String>Executables - List of allowed root executables.
- enabled Boolean
- Whether allowed executables configuration is enabled.
- separate
Executables Boolean - Whether to treat executables separately.
- allow
Executables string[] - List of allowed executables.
- allow
Root string[]Executables - List of allowed root executables.
- enabled boolean
- Whether allowed executables configuration is enabled.
- separate
Executables boolean - Whether to treat executables separately.
- allow_
executables Sequence[str] - List of allowed executables.
- allow_
root_ Sequence[str]executables - List of allowed root executables.
- enabled bool
- Whether allowed executables configuration is enabled.
- separate_
executables bool - Whether to treat executables separately.
- allow
Executables List<String> - List of allowed executables.
- allow
Root List<String>Executables - List of allowed root executables.
- enabled Boolean
- Whether allowed executables configuration is enabled.
- separate
Executables Boolean - Whether to treat executables separately.
GetContainerRuntimePolicyAllowedRegistry
- Allowed
Registries List<string> - List of allowed registries.
- Enabled bool
- Whether allowed registries are enabled.
- Allowed
Registries []string - List of allowed registries.
- Enabled bool
- Whether allowed registries are enabled.
- allowed
Registries List<String> - List of allowed registries.
- enabled Boolean
- Whether allowed registries are enabled.
- allowed
Registries string[] - List of allowed registries.
- enabled boolean
- Whether allowed registries are enabled.
- allowed_
registries Sequence[str] - List of allowed registries.
- enabled bool
- Whether allowed registries are enabled.
- allowed
Registries List<String> - List of allowed registries.
- enabled Boolean
- Whether allowed registries are enabled.
GetContainerRuntimePolicyAuditing
- Audit
All boolNetwork - Audit
All boolProcesses - Audit
Failed boolLogin - Audit
Os boolUser Activity - Audit
Process boolCmdline - Audit
Success boolLogin - Audit
User boolAccount Management - Enabled bool
- Audit
All boolNetwork - Audit
All boolProcesses - Audit
Failed boolLogin - Audit
Os boolUser Activity - Audit
Process boolCmdline - Audit
Success boolLogin - Audit
User boolAccount Management - Enabled bool
- audit
All BooleanNetwork - audit
All BooleanProcesses - audit
Failed BooleanLogin - audit
Os BooleanUser Activity - audit
Process BooleanCmdline - audit
Success BooleanLogin - audit
User BooleanAccount Management - enabled Boolean
- audit
All booleanNetwork - audit
All booleanProcesses - audit
Failed booleanLogin - audit
Os booleanUser Activity - audit
Process booleanCmdline - audit
Success booleanLogin - audit
User booleanAccount Management - enabled boolean
- audit_
all_ boolnetwork - audit_
all_ boolprocesses - audit_
failed_ boollogin - audit_
os_ booluser_ activity - audit_
process_ boolcmdline - audit_
success_ boollogin - audit_
user_ boolaccount_ management - enabled bool
- audit
All BooleanNetwork - audit
All BooleanProcesses - audit
Failed BooleanLogin - audit
Os BooleanUser Activity - audit
Process BooleanCmdline - audit
Success BooleanLogin - audit
User BooleanAccount Management - enabled Boolean
GetContainerRuntimePolicyContainerExec
- Block
Container boolExec - Container
Exec List<string>Proc White Lists - Enabled bool
- Reverse
Shell List<string>Ip White Lists
- Block
Container boolExec - Container
Exec []stringProc White Lists - Enabled bool
- Reverse
Shell []stringIp White Lists
- block
Container BooleanExec - container
Exec List<String>Proc White Lists - enabled Boolean
- reverse
Shell List<String>Ip White Lists
- block
Container booleanExec - container
Exec string[]Proc White Lists - enabled boolean
- reverse
Shell string[]Ip White Lists
- block_
container_ boolexec - container_
exec_ Sequence[str]proc_ white_ lists - enabled bool
- reverse_
shell_ Sequence[str]ip_ white_ lists
- block
Container BooleanExec - container
Exec List<String>Proc White Lists - enabled Boolean
- reverse
Shell List<String>Ip White Lists
GetContainerRuntimePolicyFileBlock
- Block
Files List<string>Processes - Block
Files List<string>Users - Enabled bool
- Exceptional
Block List<string>Files - Exceptional
Block List<string>Files Processes - Exceptional
Block List<string>Files Users - Filename
Block List<string>Lists
- Block
Files []stringProcesses - Block
Files []stringUsers - Enabled bool
- Exceptional
Block []stringFiles - Exceptional
Block []stringFiles Processes - Exceptional
Block []stringFiles Users - Filename
Block []stringLists
- block
Files List<String>Processes - block
Files List<String>Users - enabled Boolean
- exceptional
Block List<String>Files - exceptional
Block List<String>Files Processes - exceptional
Block List<String>Files Users - filename
Block List<String>Lists
- block
Files string[]Processes - block
Files string[]Users - enabled boolean
- exceptional
Block string[]Files - exceptional
Block string[]Files Processes - exceptional
Block string[]Files Users - filename
Block string[]Lists
- block_
files_ Sequence[str]processes - block_
files_ Sequence[str]users - enabled bool
- exceptional_
block_ Sequence[str]files - exceptional_
block_ Sequence[str]files_ processes - exceptional_
block_ Sequence[str]files_ users - filename_
block_ Sequence[str]lists
- block
Files List<String>Processes - block
Files List<String>Users - enabled Boolean
- exceptional
Block List<String>Files - exceptional
Block List<String>Files Processes - exceptional
Block List<String>Files Users - filename
Block List<String>Lists
GetContainerRuntimePolicyFileIntegrityMonitoring
- Enabled bool
- If true, file integrity monitoring is enabled.
- Exceptional
Monitored List<string>Files - List of paths to be excluded from monitoring.
- Exceptional
Monitored List<string>Files Processes - List of processes to be excluded from monitoring.
- Exceptional
Monitored List<string>Files Users - List of users to be excluded from monitoring.
- Monitored
Files List<string> - List of paths to be monitored.
- Monitored
Files boolAttributes - Whether to monitor file attribute operations.
- Monitored
Files boolCreate - Whether to monitor file create operations.
- Monitored
Files boolDelete - Whether to monitor file delete operations.
- Monitored
Files boolModify - Whether to monitor file modify operations.
- Monitored
Files List<string>Processes - List of processes associated with monitored files.
- Monitored
Files boolRead - Whether to monitor file read operations.
- Monitored
Files List<string>Users - List of users associated with monitored files.
- Enabled bool
- If true, file integrity monitoring is enabled.
- Exceptional
Monitored []stringFiles - List of paths to be excluded from monitoring.
- Exceptional
Monitored []stringFiles Processes - List of processes to be excluded from monitoring.
- Exceptional
Monitored []stringFiles Users - List of users to be excluded from monitoring.
- Monitored
Files []string - List of paths to be monitored.
- Monitored
Files boolAttributes - Whether to monitor file attribute operations.
- Monitored
Files boolCreate - Whether to monitor file create operations.
- Monitored
Files boolDelete - Whether to monitor file delete operations.
- Monitored
Files boolModify - Whether to monitor file modify operations.
- Monitored
Files []stringProcesses - List of processes associated with monitored files.
- Monitored
Files boolRead - Whether to monitor file read operations.
- Monitored
Files []stringUsers - List of users associated with monitored files.
- enabled Boolean
- If true, file integrity monitoring is enabled.
- exceptional
Monitored List<String>Files - List of paths to be excluded from monitoring.
- exceptional
Monitored List<String>Files Processes - List of processes to be excluded from monitoring.
- exceptional
Monitored List<String>Files Users - List of users to be excluded from monitoring.
- monitored
Files List<String> - List of paths to be monitored.
- monitored
Files BooleanAttributes - Whether to monitor file attribute operations.
- monitored
Files BooleanCreate - Whether to monitor file create operations.
- monitored
Files BooleanDelete - Whether to monitor file delete operations.
- monitored
Files BooleanModify - Whether to monitor file modify operations.
- monitored
Files List<String>Processes - List of processes associated with monitored files.
- monitored
Files BooleanRead - Whether to monitor file read operations.
- monitored
Files List<String>Users - List of users associated with monitored files.
- enabled boolean
- If true, file integrity monitoring is enabled.
- exceptional
Monitored string[]Files - List of paths to be excluded from monitoring.
- exceptional
Monitored string[]Files Processes - List of processes to be excluded from monitoring.
- exceptional
Monitored string[]Files Users - List of users to be excluded from monitoring.
- monitored
Files string[] - List of paths to be monitored.
- monitored
Files booleanAttributes - Whether to monitor file attribute operations.
- monitored
Files booleanCreate - Whether to monitor file create operations.
- monitored
Files booleanDelete - Whether to monitor file delete operations.
- monitored
Files booleanModify - Whether to monitor file modify operations.
- monitored
Files string[]Processes - List of processes associated with monitored files.
- monitored
Files booleanRead - Whether to monitor file read operations.
- monitored
Files string[]Users - List of users associated with monitored files.
- enabled bool
- If true, file integrity monitoring is enabled.
- exceptional_
monitored_ Sequence[str]files - List of paths to be excluded from monitoring.
- exceptional_
monitored_ Sequence[str]files_ processes - List of processes to be excluded from monitoring.
- exceptional_
monitored_ Sequence[str]files_ users - List of users to be excluded from monitoring.
- monitored_
files Sequence[str] - List of paths to be monitored.
- monitored_
files_ boolattributes - Whether to monitor file attribute operations.
- monitored_
files_ boolcreate - Whether to monitor file create operations.
- monitored_
files_ booldelete - Whether to monitor file delete operations.
- monitored_
files_ boolmodify - Whether to monitor file modify operations.
- monitored_
files_ Sequence[str]processes - List of processes associated with monitored files.
- monitored_
files_ boolread - Whether to monitor file read operations.
- monitored_
files_ Sequence[str]users - List of users associated with monitored files.
- enabled Boolean
- If true, file integrity monitoring is enabled.
- exceptional
Monitored List<String>Files - List of paths to be excluded from monitoring.
- exceptional
Monitored List<String>Files Processes - List of processes to be excluded from monitoring.
- exceptional
Monitored List<String>Files Users - List of users to be excluded from monitoring.
- monitored
Files List<String> - List of paths to be monitored.
- monitored
Files BooleanAttributes - Whether to monitor file attribute operations.
- monitored
Files BooleanCreate - Whether to monitor file create operations.
- monitored
Files BooleanDelete - Whether to monitor file delete operations.
- monitored
Files BooleanModify - Whether to monitor file modify operations.
- monitored
Files List<String>Processes - List of processes associated with monitored files.
- monitored
Files BooleanRead - Whether to monitor file read operations.
- monitored
Files List<String>Users - List of users associated with monitored files.
GetContainerRuntimePolicyLimitContainerPrivilege
- Block
Add boolCapabilities - Whether to block adding capabilities.
- Enabled bool
- Whether container privilege limitations are enabled.
- Ipcmode bool
- Whether to limit IPC-related capabilities.
- Netmode bool
- Whether to limit network-related capabilities.
- Pidmode bool
- Whether to limit process-related capabilities.
- Prevent
Low boolPort Binding - Whether to prevent low port binding.
- Prevent
Root boolUser - Whether to prevent the use of the root user.
- Privileged bool
- Whether the container is run in privileged mode.
- Use
Host boolUser - Whether to use the host user.
- Usermode bool
- Whether to limit user-related capabilities.
- Utsmode bool
- Whether to limit UTS-related capabilities.
- Block
Add boolCapabilities - Whether to block adding capabilities.
- Enabled bool
- Whether container privilege limitations are enabled.
- Ipcmode bool
- Whether to limit IPC-related capabilities.
- Netmode bool
- Whether to limit network-related capabilities.
- Pidmode bool
- Whether to limit process-related capabilities.
- Prevent
Low boolPort Binding - Whether to prevent low port binding.
- Prevent
Root boolUser - Whether to prevent the use of the root user.
- Privileged bool
- Whether the container is run in privileged mode.
- Use
Host boolUser - Whether to use the host user.
- Usermode bool
- Whether to limit user-related capabilities.
- Utsmode bool
- Whether to limit UTS-related capabilities.
- block
Add BooleanCapabilities - Whether to block adding capabilities.
- enabled Boolean
- Whether container privilege limitations are enabled.
- ipcmode Boolean
- Whether to limit IPC-related capabilities.
- netmode Boolean
- Whether to limit network-related capabilities.
- pidmode Boolean
- Whether to limit process-related capabilities.
- prevent
Low BooleanPort Binding - Whether to prevent low port binding.
- prevent
Root BooleanUser - Whether to prevent the use of the root user.
- privileged Boolean
- Whether the container is run in privileged mode.
- use
Host BooleanUser - Whether to use the host user.
- usermode Boolean
- Whether to limit user-related capabilities.
- utsmode Boolean
- Whether to limit UTS-related capabilities.
- block
Add booleanCapabilities - Whether to block adding capabilities.
- enabled boolean
- Whether container privilege limitations are enabled.
- ipcmode boolean
- Whether to limit IPC-related capabilities.
- netmode boolean
- Whether to limit network-related capabilities.
- pidmode boolean
- Whether to limit process-related capabilities.
- prevent
Low booleanPort Binding - Whether to prevent low port binding.
- prevent
Root booleanUser - Whether to prevent the use of the root user.
- privileged boolean
- Whether the container is run in privileged mode.
- use
Host booleanUser - Whether to use the host user.
- usermode boolean
- Whether to limit user-related capabilities.
- utsmode boolean
- Whether to limit UTS-related capabilities.
- block_
add_ boolcapabilities - Whether to block adding capabilities.
- enabled bool
- Whether container privilege limitations are enabled.
- ipcmode bool
- Whether to limit IPC-related capabilities.
- netmode bool
- Whether to limit network-related capabilities.
- pidmode bool
- Whether to limit process-related capabilities.
- prevent_
low_ boolport_ binding - Whether to prevent low port binding.
- prevent_
root_ booluser - Whether to prevent the use of the root user.
- privileged bool
- Whether the container is run in privileged mode.
- use_
host_ booluser - Whether to use the host user.
- usermode bool
- Whether to limit user-related capabilities.
- utsmode bool
- Whether to limit UTS-related capabilities.
- block
Add BooleanCapabilities - Whether to block adding capabilities.
- enabled Boolean
- Whether container privilege limitations are enabled.
- ipcmode Boolean
- Whether to limit IPC-related capabilities.
- netmode Boolean
- Whether to limit network-related capabilities.
- pidmode Boolean
- Whether to limit process-related capabilities.
- prevent
Low BooleanPort Binding - Whether to prevent low port binding.
- prevent
Root BooleanUser - Whether to prevent the use of the root user.
- privileged Boolean
- Whether the container is run in privileged mode.
- use
Host BooleanUser - Whether to use the host user.
- usermode Boolean
- Whether to limit user-related capabilities.
- utsmode Boolean
- Whether to limit UTS-related capabilities.
GetContainerRuntimePolicyMalwareScanOption
- Action string
- Set Action, Defaults to 'Alert' when empty
- Enabled bool
- Defines if enabled or not
- Exclude
Directories List<string> - List of registry paths to be excluded from being protected.
- Exclude
Processes List<string> - List of registry processes to be excluded from being protected.
- Include
Directories List<string> - List of registry paths to be excluded from being protected.
- Action string
- Set Action, Defaults to 'Alert' when empty
- Enabled bool
- Defines if enabled or not
- Exclude
Directories []string - List of registry paths to be excluded from being protected.
- Exclude
Processes []string - List of registry processes to be excluded from being protected.
- Include
Directories []string - List of registry paths to be excluded from being protected.
- action String
- Set Action, Defaults to 'Alert' when empty
- enabled Boolean
- Defines if enabled or not
- exclude
Directories List<String> - List of registry paths to be excluded from being protected.
- exclude
Processes List<String> - List of registry processes to be excluded from being protected.
- include
Directories List<String> - List of registry paths to be excluded from being protected.
- action string
- Set Action, Defaults to 'Alert' when empty
- enabled boolean
- Defines if enabled or not
- exclude
Directories string[] - List of registry paths to be excluded from being protected.
- exclude
Processes string[] - List of registry processes to be excluded from being protected.
- include
Directories string[] - List of registry paths to be excluded from being protected.
- action str
- Set Action, Defaults to 'Alert' when empty
- enabled bool
- Defines if enabled or not
- exclude_
directories Sequence[str] - List of registry paths to be excluded from being protected.
- exclude_
processes Sequence[str] - List of registry processes to be excluded from being protected.
- include_
directories Sequence[str] - List of registry paths to be excluded from being protected.
- action String
- Set Action, Defaults to 'Alert' when empty
- enabled Boolean
- Defines if enabled or not
- exclude
Directories List<String> - List of registry paths to be excluded from being protected.
- exclude
Processes List<String> - List of registry processes to be excluded from being protected.
- include
Directories List<String> - List of registry paths to be excluded from being protected.
GetContainerRuntimePolicyPortBlock
- Block
Inbound List<string>Ports - Block
Outbound List<string>Ports - Enabled bool
- Block
Inbound []stringPorts - Block
Outbound []stringPorts - Enabled bool
- block
Inbound List<String>Ports - block
Outbound List<String>Ports - enabled Boolean
- block
Inbound string[]Ports - block
Outbound string[]Ports - enabled boolean
- block_
inbound_ Sequence[str]ports - block_
outbound_ Sequence[str]ports - enabled bool
- block
Inbound List<String>Ports - block
Outbound List<String>Ports - enabled Boolean
GetContainerRuntimePolicyReadonlyFiles
- Enabled bool
- Exceptional
Readonly List<string>Files - Exceptional
Readonly List<string>Files Processes - Exceptional
Readonly List<string>Files Users - Readonly
Files List<string> - Readonly
Files List<string>Processes - Readonly
Files List<string>Users
- Enabled bool
- Exceptional
Readonly []stringFiles - Exceptional
Readonly []stringFiles Processes - Exceptional
Readonly []stringFiles Users - Readonly
Files []string - Readonly
Files []stringProcesses - Readonly
Files []stringUsers
- enabled Boolean
- exceptional
Readonly List<String>Files - exceptional
Readonly List<String>Files Processes - exceptional
Readonly List<String>Files Users - readonly
Files List<String> - readonly
Files List<String>Processes - readonly
Files List<String>Users
- enabled boolean
- exceptional
Readonly string[]Files - exceptional
Readonly string[]Files Processes - exceptional
Readonly string[]Files Users - readonly
Files string[] - readonly
Files string[]Processes - readonly
Files string[]Users
- enabled bool
- exceptional_
readonly_ Sequence[str]files - exceptional_
readonly_ Sequence[str]files_ processes - exceptional_
readonly_ Sequence[str]files_ users - readonly_
files Sequence[str] - readonly_
files_ Sequence[str]processes - readonly_
files_ Sequence[str]users
- enabled Boolean
- exceptional
Readonly List<String>Files - exceptional
Readonly List<String>Files Processes - exceptional
Readonly List<String>Files Users - readonly
Files List<String> - readonly
Files List<String>Processes - readonly
Files List<String>Users
GetContainerRuntimePolicyRestrictedVolume
GetContainerRuntimePolicyScopeVariable
Package Details
- Repository
- aquasec pulumiverse/pulumi-aquasec
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
aquasecTerraform Provider.
Viewing docs for Aquasec v0.8.29
published on Monday, Jul 22, 2024 by Pulumiverse
published on Monday, Jul 22, 2024 by Pulumiverse
