aws logo
AWS Classic v5.41.0, May 15 23

aws.guardduty.OrganizationConfiguration

Explore with Pulumi AI

Manages the GuardDuty Organization Configuration in the current AWS Region. The AWS account utilizing this resource must have been assigned as a delegated Organization administrator account, e.g., via the aws.guardduty.OrganizationAdminAccount resource. More information about Organizations support in GuardDuty can be found in the GuardDuty User Guide.

NOTE: This is an advanced resource. The provider will automatically assume management of the GuardDuty Organization Configuration without import and perform no actions on removal from the resource configuration.

Example Usage

using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Aws = Pulumi.Aws;

return await Deployment.RunAsync(() => 
{
    var exampleDetector = new Aws.GuardDuty.Detector("exampleDetector", new()
    {
        Enable = true,
    });

    var exampleOrganizationConfiguration = new Aws.GuardDuty.OrganizationConfiguration("exampleOrganizationConfiguration", new()
    {
        AutoEnable = true,
        DetectorId = exampleDetector.Id,
        Datasources = new Aws.GuardDuty.Inputs.OrganizationConfigurationDatasourcesArgs
        {
            S3Logs = new Aws.GuardDuty.Inputs.OrganizationConfigurationDatasourcesS3LogsArgs
            {
                AutoEnable = true,
            },
            Kubernetes = new Aws.GuardDuty.Inputs.OrganizationConfigurationDatasourcesKubernetesArgs
            {
                AuditLogs = new Aws.GuardDuty.Inputs.OrganizationConfigurationDatasourcesKubernetesAuditLogsArgs
                {
                    Enable = true,
                },
            },
            MalwareProtection = new Aws.GuardDuty.Inputs.OrganizationConfigurationDatasourcesMalwareProtectionArgs
            {
                ScanEc2InstanceWithFindings = new Aws.GuardDuty.Inputs.OrganizationConfigurationDatasourcesMalwareProtectionScanEc2InstanceWithFindingsArgs
                {
                    EbsVolumes = new Aws.GuardDuty.Inputs.OrganizationConfigurationDatasourcesMalwareProtectionScanEc2InstanceWithFindingsEbsVolumesArgs
                    {
                        AutoEnable = true,
                    },
                },
            },
        },
    });

});
package main

import (
	"github.com/pulumi/pulumi-aws/sdk/v5/go/aws/guardduty"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)

func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		exampleDetector, err := guardduty.NewDetector(ctx, "exampleDetector", &guardduty.DetectorArgs{
			Enable: pulumi.Bool(true),
		})
		if err != nil {
			return err
		}
		_, err = guardduty.NewOrganizationConfiguration(ctx, "exampleOrganizationConfiguration", &guardduty.OrganizationConfigurationArgs{
			AutoEnable: pulumi.Bool(true),
			DetectorId: exampleDetector.ID(),
			Datasources: &guardduty.OrganizationConfigurationDatasourcesArgs{
				S3Logs: &guardduty.OrganizationConfigurationDatasourcesS3LogsArgs{
					AutoEnable: pulumi.Bool(true),
				},
				Kubernetes: &guardduty.OrganizationConfigurationDatasourcesKubernetesArgs{
					AuditLogs: &guardduty.OrganizationConfigurationDatasourcesKubernetesAuditLogsArgs{
						Enable: pulumi.Bool(true),
					},
				},
				MalwareProtection: &guardduty.OrganizationConfigurationDatasourcesMalwareProtectionArgs{
					ScanEc2InstanceWithFindings: &guardduty.OrganizationConfigurationDatasourcesMalwareProtectionScanEc2InstanceWithFindingsArgs{
						EbsVolumes: &guardduty.OrganizationConfigurationDatasourcesMalwareProtectionScanEc2InstanceWithFindingsEbsVolumesArgs{
							AutoEnable: pulumi.Bool(true),
						},
					},
				},
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}
package generated_program;

import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.aws.guardduty.Detector;
import com.pulumi.aws.guardduty.DetectorArgs;
import com.pulumi.aws.guardduty.OrganizationConfiguration;
import com.pulumi.aws.guardduty.OrganizationConfigurationArgs;
import com.pulumi.aws.guardduty.inputs.OrganizationConfigurationDatasourcesArgs;
import com.pulumi.aws.guardduty.inputs.OrganizationConfigurationDatasourcesS3LogsArgs;
import com.pulumi.aws.guardduty.inputs.OrganizationConfigurationDatasourcesKubernetesArgs;
import com.pulumi.aws.guardduty.inputs.OrganizationConfigurationDatasourcesKubernetesAuditLogsArgs;
import com.pulumi.aws.guardduty.inputs.OrganizationConfigurationDatasourcesMalwareProtectionArgs;
import com.pulumi.aws.guardduty.inputs.OrganizationConfigurationDatasourcesMalwareProtectionScanEc2InstanceWithFindingsArgs;
import com.pulumi.aws.guardduty.inputs.OrganizationConfigurationDatasourcesMalwareProtectionScanEc2InstanceWithFindingsEbsVolumesArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;

public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }

    public static void stack(Context ctx) {
        var exampleDetector = new Detector("exampleDetector", DetectorArgs.builder()        
            .enable(true)
            .build());

        var exampleOrganizationConfiguration = new OrganizationConfiguration("exampleOrganizationConfiguration", OrganizationConfigurationArgs.builder()        
            .autoEnable(true)
            .detectorId(exampleDetector.id())
            .datasources(OrganizationConfigurationDatasourcesArgs.builder()
                .s3Logs(OrganizationConfigurationDatasourcesS3LogsArgs.builder()
                    .autoEnable(true)
                    .build())
                .kubernetes(OrganizationConfigurationDatasourcesKubernetesArgs.builder()
                    .auditLogs(OrganizationConfigurationDatasourcesKubernetesAuditLogsArgs.builder()
                        .enable(true)
                        .build())
                    .build())
                .malwareProtection(OrganizationConfigurationDatasourcesMalwareProtectionArgs.builder()
                    .scanEc2InstanceWithFindings(OrganizationConfigurationDatasourcesMalwareProtectionScanEc2InstanceWithFindingsArgs.builder()
                        .ebsVolumes(OrganizationConfigurationDatasourcesMalwareProtectionScanEc2InstanceWithFindingsEbsVolumesArgs.builder()
                            .autoEnable(true)
                            .build())
                        .build())
                    .build())
                .build())
            .build());

    }
}
import pulumi
import pulumi_aws as aws

example_detector = aws.guardduty.Detector("exampleDetector", enable=True)
example_organization_configuration = aws.guardduty.OrganizationConfiguration("exampleOrganizationConfiguration",
    auto_enable=True,
    detector_id=example_detector.id,
    datasources=aws.guardduty.OrganizationConfigurationDatasourcesArgs(
        s3_logs=aws.guardduty.OrganizationConfigurationDatasourcesS3LogsArgs(
            auto_enable=True,
        ),
        kubernetes=aws.guardduty.OrganizationConfigurationDatasourcesKubernetesArgs(
            audit_logs=aws.guardduty.OrganizationConfigurationDatasourcesKubernetesAuditLogsArgs(
                enable=True,
            ),
        ),
        malware_protection=aws.guardduty.OrganizationConfigurationDatasourcesMalwareProtectionArgs(
            scan_ec2_instance_with_findings=aws.guardduty.OrganizationConfigurationDatasourcesMalwareProtectionScanEc2InstanceWithFindingsArgs(
                ebs_volumes=aws.guardduty.OrganizationConfigurationDatasourcesMalwareProtectionScanEc2InstanceWithFindingsEbsVolumesArgs(
                    auto_enable=True,
                ),
            ),
        ),
    ))
import * as pulumi from "@pulumi/pulumi";
import * as aws from "@pulumi/aws";

const exampleDetector = new aws.guardduty.Detector("exampleDetector", {enable: true});
const exampleOrganizationConfiguration = new aws.guardduty.OrganizationConfiguration("exampleOrganizationConfiguration", {
    autoEnable: true,
    detectorId: exampleDetector.id,
    datasources: {
        s3Logs: {
            autoEnable: true,
        },
        kubernetes: {
            auditLogs: {
                enable: true,
            },
        },
        malwareProtection: {
            scanEc2InstanceWithFindings: {
                ebsVolumes: {
                    autoEnable: true,
                },
            },
        },
    },
});
resources:
  exampleDetector:
    type: aws:guardduty:Detector
    properties:
      enable: true
  exampleOrganizationConfiguration:
    type: aws:guardduty:OrganizationConfiguration
    properties:
      autoEnable: true
      detectorId: ${exampleDetector.id}
      datasources:
        s3Logs:
          autoEnable: true
        kubernetes:
          auditLogs:
            enable: true
        malwareProtection:
          scanEc2InstanceWithFindings:
            ebsVolumes:
              autoEnable: true

Create OrganizationConfiguration Resource

new OrganizationConfiguration(name: string, args: OrganizationConfigurationArgs, opts?: CustomResourceOptions);
@overload
def OrganizationConfiguration(resource_name: str,
                              opts: Optional[ResourceOptions] = None,
                              auto_enable: Optional[bool] = None,
                              datasources: Optional[OrganizationConfigurationDatasourcesArgs] = None,
                              detector_id: Optional[str] = None)
@overload
def OrganizationConfiguration(resource_name: str,
                              args: OrganizationConfigurationArgs,
                              opts: Optional[ResourceOptions] = None)
func NewOrganizationConfiguration(ctx *Context, name string, args OrganizationConfigurationArgs, opts ...ResourceOption) (*OrganizationConfiguration, error)
public OrganizationConfiguration(string name, OrganizationConfigurationArgs args, CustomResourceOptions? opts = null)
public OrganizationConfiguration(String name, OrganizationConfigurationArgs args)
public OrganizationConfiguration(String name, OrganizationConfigurationArgs args, CustomResourceOptions options)
type: aws:guardduty:OrganizationConfiguration
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.

name string
The unique name of the resource.
args OrganizationConfigurationArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
resource_name str
The unique name of the resource.
args OrganizationConfigurationArgs
The arguments to resource properties.
opts ResourceOptions
Bag of options to control resource's behavior.
ctx Context
Context object for the current deployment.
name string
The unique name of the resource.
args OrganizationConfigurationArgs
The arguments to resource properties.
opts ResourceOption
Bag of options to control resource's behavior.
name string
The unique name of the resource.
args OrganizationConfigurationArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
name String
The unique name of the resource.
args OrganizationConfigurationArgs
The arguments to resource properties.
options CustomResourceOptions
Bag of options to control resource's behavior.

OrganizationConfiguration Resource Properties

To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

Inputs

The OrganizationConfiguration resource accepts the following input properties:

AutoEnable bool

When this setting is enabled, all new accounts that are created in, or added to, the organization are added as a member accounts of the organization’s GuardDuty delegated administrator and GuardDuty is enabled in that AWS Region.

DetectorId string

The detector ID of the GuardDuty account.

Datasources OrganizationConfigurationDatasourcesArgs

Configuration for the collected datasources.

AutoEnable bool

When this setting is enabled, all new accounts that are created in, or added to, the organization are added as a member accounts of the organization’s GuardDuty delegated administrator and GuardDuty is enabled in that AWS Region.

DetectorId string

The detector ID of the GuardDuty account.

Datasources OrganizationConfigurationDatasourcesArgs

Configuration for the collected datasources.

autoEnable Boolean

When this setting is enabled, all new accounts that are created in, or added to, the organization are added as a member accounts of the organization’s GuardDuty delegated administrator and GuardDuty is enabled in that AWS Region.

detectorId String

The detector ID of the GuardDuty account.

datasources OrganizationConfigurationDatasourcesArgs

Configuration for the collected datasources.

autoEnable boolean

When this setting is enabled, all new accounts that are created in, or added to, the organization are added as a member accounts of the organization’s GuardDuty delegated administrator and GuardDuty is enabled in that AWS Region.

detectorId string

The detector ID of the GuardDuty account.

datasources OrganizationConfigurationDatasourcesArgs

Configuration for the collected datasources.

auto_enable bool

When this setting is enabled, all new accounts that are created in, or added to, the organization are added as a member accounts of the organization’s GuardDuty delegated administrator and GuardDuty is enabled in that AWS Region.

detector_id str

The detector ID of the GuardDuty account.

datasources OrganizationConfigurationDatasourcesArgs

Configuration for the collected datasources.

autoEnable Boolean

When this setting is enabled, all new accounts that are created in, or added to, the organization are added as a member accounts of the organization’s GuardDuty delegated administrator and GuardDuty is enabled in that AWS Region.

detectorId String

The detector ID of the GuardDuty account.

datasources Property Map

Configuration for the collected datasources.

Outputs

All input properties are implicitly available as output properties. Additionally, the OrganizationConfiguration resource produces the following output properties:

Id string

The provider-assigned unique ID for this managed resource.

Id string

The provider-assigned unique ID for this managed resource.

id String

The provider-assigned unique ID for this managed resource.

id string

The provider-assigned unique ID for this managed resource.

id str

The provider-assigned unique ID for this managed resource.

id String

The provider-assigned unique ID for this managed resource.

Look up Existing OrganizationConfiguration Resource

Get an existing OrganizationConfiguration resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

public static get(name: string, id: Input<ID>, state?: OrganizationConfigurationState, opts?: CustomResourceOptions): OrganizationConfiguration
@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        auto_enable: Optional[bool] = None,
        datasources: Optional[OrganizationConfigurationDatasourcesArgs] = None,
        detector_id: Optional[str] = None) -> OrganizationConfiguration
func GetOrganizationConfiguration(ctx *Context, name string, id IDInput, state *OrganizationConfigurationState, opts ...ResourceOption) (*OrganizationConfiguration, error)
public static OrganizationConfiguration Get(string name, Input<string> id, OrganizationConfigurationState? state, CustomResourceOptions? opts = null)
public static OrganizationConfiguration get(String name, Output<String> id, OrganizationConfigurationState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
resource_name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
The following state arguments are supported:
AutoEnable bool

When this setting is enabled, all new accounts that are created in, or added to, the organization are added as a member accounts of the organization’s GuardDuty delegated administrator and GuardDuty is enabled in that AWS Region.

Datasources OrganizationConfigurationDatasourcesArgs

Configuration for the collected datasources.

DetectorId string

The detector ID of the GuardDuty account.

AutoEnable bool

When this setting is enabled, all new accounts that are created in, or added to, the organization are added as a member accounts of the organization’s GuardDuty delegated administrator and GuardDuty is enabled in that AWS Region.

Datasources OrganizationConfigurationDatasourcesArgs

Configuration for the collected datasources.

DetectorId string

The detector ID of the GuardDuty account.

autoEnable Boolean

When this setting is enabled, all new accounts that are created in, or added to, the organization are added as a member accounts of the organization’s GuardDuty delegated administrator and GuardDuty is enabled in that AWS Region.

datasources OrganizationConfigurationDatasourcesArgs

Configuration for the collected datasources.

detectorId String

The detector ID of the GuardDuty account.

autoEnable boolean

When this setting is enabled, all new accounts that are created in, or added to, the organization are added as a member accounts of the organization’s GuardDuty delegated administrator and GuardDuty is enabled in that AWS Region.

datasources OrganizationConfigurationDatasourcesArgs

Configuration for the collected datasources.

detectorId string

The detector ID of the GuardDuty account.

auto_enable bool

When this setting is enabled, all new accounts that are created in, or added to, the organization are added as a member accounts of the organization’s GuardDuty delegated administrator and GuardDuty is enabled in that AWS Region.

datasources OrganizationConfigurationDatasourcesArgs

Configuration for the collected datasources.

detector_id str

The detector ID of the GuardDuty account.

autoEnable Boolean

When this setting is enabled, all new accounts that are created in, or added to, the organization are added as a member accounts of the organization’s GuardDuty delegated administrator and GuardDuty is enabled in that AWS Region.

datasources Property Map

Configuration for the collected datasources.

detectorId String

The detector ID of the GuardDuty account.

Supporting Types

OrganizationConfigurationDatasources

Kubernetes OrganizationConfigurationDatasourcesKubernetes

Enable Kubernetes Audit Logs Monitoring automatically for new member accounts.

MalwareProtection OrganizationConfigurationDatasourcesMalwareProtection

Enable Malware Protection automatically for new member accounts.

S3Logs OrganizationConfigurationDatasourcesS3Logs

Enable S3 Protection automatically for new member accounts.

Kubernetes OrganizationConfigurationDatasourcesKubernetes

Enable Kubernetes Audit Logs Monitoring automatically for new member accounts.

MalwareProtection OrganizationConfigurationDatasourcesMalwareProtection

Enable Malware Protection automatically for new member accounts.

S3Logs OrganizationConfigurationDatasourcesS3Logs

Enable S3 Protection automatically for new member accounts.

kubernetes OrganizationConfigurationDatasourcesKubernetes

Enable Kubernetes Audit Logs Monitoring automatically for new member accounts.

malwareProtection OrganizationConfigurationDatasourcesMalwareProtection

Enable Malware Protection automatically for new member accounts.

s3Logs OrganizationConfigurationDatasourcesS3Logs

Enable S3 Protection automatically for new member accounts.

kubernetes OrganizationConfigurationDatasourcesKubernetes

Enable Kubernetes Audit Logs Monitoring automatically for new member accounts.

malwareProtection OrganizationConfigurationDatasourcesMalwareProtection

Enable Malware Protection automatically for new member accounts.

s3Logs OrganizationConfigurationDatasourcesS3Logs

Enable S3 Protection automatically for new member accounts.

kubernetes OrganizationConfigurationDatasourcesKubernetes

Enable Kubernetes Audit Logs Monitoring automatically for new member accounts.

malware_protection OrganizationConfigurationDatasourcesMalwareProtection

Enable Malware Protection automatically for new member accounts.

s3_logs OrganizationConfigurationDatasourcesS3Logs

Enable S3 Protection automatically for new member accounts.

kubernetes Property Map

Enable Kubernetes Audit Logs Monitoring automatically for new member accounts.

malwareProtection Property Map

Enable Malware Protection automatically for new member accounts.

s3Logs Property Map

Enable S3 Protection automatically for new member accounts.

OrganizationConfigurationDatasourcesKubernetes

AuditLogs OrganizationConfigurationDatasourcesKubernetesAuditLogs

Enable Kubernetes Audit Logs Monitoring automatically for new member accounts. Kubernetes protection. See Kubernetes Audit Logs below for more details.

AuditLogs OrganizationConfigurationDatasourcesKubernetesAuditLogs

Enable Kubernetes Audit Logs Monitoring automatically for new member accounts. Kubernetes protection. See Kubernetes Audit Logs below for more details.

auditLogs OrganizationConfigurationDatasourcesKubernetesAuditLogs

Enable Kubernetes Audit Logs Monitoring automatically for new member accounts. Kubernetes protection. See Kubernetes Audit Logs below for more details.

auditLogs OrganizationConfigurationDatasourcesKubernetesAuditLogs

Enable Kubernetes Audit Logs Monitoring automatically for new member accounts. Kubernetes protection. See Kubernetes Audit Logs below for more details.

audit_logs OrganizationConfigurationDatasourcesKubernetesAuditLogs

Enable Kubernetes Audit Logs Monitoring automatically for new member accounts. Kubernetes protection. See Kubernetes Audit Logs below for more details.

auditLogs Property Map

Enable Kubernetes Audit Logs Monitoring automatically for new member accounts. Kubernetes protection. See Kubernetes Audit Logs below for more details.

OrganizationConfigurationDatasourcesKubernetesAuditLogs

Enable bool

If true, enables Kubernetes audit logs as a data source for Kubernetes protection. Defaults to true.

Enable bool

If true, enables Kubernetes audit logs as a data source for Kubernetes protection. Defaults to true.

enable Boolean

If true, enables Kubernetes audit logs as a data source for Kubernetes protection. Defaults to true.

enable boolean

If true, enables Kubernetes audit logs as a data source for Kubernetes protection. Defaults to true.

enable bool

If true, enables Kubernetes audit logs as a data source for Kubernetes protection. Defaults to true.

enable Boolean

If true, enables Kubernetes audit logs as a data source for Kubernetes protection. Defaults to true.

OrganizationConfigurationDatasourcesMalwareProtection

ScanEc2InstanceWithFindings OrganizationConfigurationDatasourcesMalwareProtectionScanEc2InstanceWithFindings

Configure whether Malware Protection for EC2 instances with findings should be auto-enabled for new members joining the organization. See Scan EC2 instance with findings below for more details.

ScanEc2InstanceWithFindings OrganizationConfigurationDatasourcesMalwareProtectionScanEc2InstanceWithFindings

Configure whether Malware Protection for EC2 instances with findings should be auto-enabled for new members joining the organization. See Scan EC2 instance with findings below for more details.

scanEc2InstanceWithFindings OrganizationConfigurationDatasourcesMalwareProtectionScanEc2InstanceWithFindings

Configure whether Malware Protection for EC2 instances with findings should be auto-enabled for new members joining the organization. See Scan EC2 instance with findings below for more details.

scanEc2InstanceWithFindings OrganizationConfigurationDatasourcesMalwareProtectionScanEc2InstanceWithFindings

Configure whether Malware Protection for EC2 instances with findings should be auto-enabled for new members joining the organization. See Scan EC2 instance with findings below for more details.

scan_ec2_instance_with_findings OrganizationConfigurationDatasourcesMalwareProtectionScanEc2InstanceWithFindings

Configure whether Malware Protection for EC2 instances with findings should be auto-enabled for new members joining the organization. See Scan EC2 instance with findings below for more details.

scanEc2InstanceWithFindings Property Map

Configure whether Malware Protection for EC2 instances with findings should be auto-enabled for new members joining the organization. See Scan EC2 instance with findings below for more details.

OrganizationConfigurationDatasourcesMalwareProtectionScanEc2InstanceWithFindings

EbsVolumes OrganizationConfigurationDatasourcesMalwareProtectionScanEc2InstanceWithFindingsEbsVolumes

Configure whether scanning EBS volumes should be auto-enabled for new members joining the organization See EBS volumes below for more details.

EbsVolumes OrganizationConfigurationDatasourcesMalwareProtectionScanEc2InstanceWithFindingsEbsVolumes

Configure whether scanning EBS volumes should be auto-enabled for new members joining the organization See EBS volumes below for more details.

ebsVolumes OrganizationConfigurationDatasourcesMalwareProtectionScanEc2InstanceWithFindingsEbsVolumes

Configure whether scanning EBS volumes should be auto-enabled for new members joining the organization See EBS volumes below for more details.

ebsVolumes OrganizationConfigurationDatasourcesMalwareProtectionScanEc2InstanceWithFindingsEbsVolumes

Configure whether scanning EBS volumes should be auto-enabled for new members joining the organization See EBS volumes below for more details.

ebs_volumes OrganizationConfigurationDatasourcesMalwareProtectionScanEc2InstanceWithFindingsEbsVolumes

Configure whether scanning EBS volumes should be auto-enabled for new members joining the organization See EBS volumes below for more details.

ebsVolumes Property Map

Configure whether scanning EBS volumes should be auto-enabled for new members joining the organization See EBS volumes below for more details.

OrganizationConfigurationDatasourcesMalwareProtectionScanEc2InstanceWithFindingsEbsVolumes

AutoEnable bool

If true, enables Malware Protection for all new accounts joining the organization. Defaults to true.

AutoEnable bool

If true, enables Malware Protection for all new accounts joining the organization. Defaults to true.

autoEnable Boolean

If true, enables Malware Protection for all new accounts joining the organization. Defaults to true.

autoEnable boolean

If true, enables Malware Protection for all new accounts joining the organization. Defaults to true.

auto_enable bool

If true, enables Malware Protection for all new accounts joining the organization. Defaults to true.

autoEnable Boolean

If true, enables Malware Protection for all new accounts joining the organization. Defaults to true.

OrganizationConfigurationDatasourcesS3Logs

AutoEnable bool

When this setting is enabled, all new accounts that are created in, or added to, the organization are added as a member accounts of the organization’s GuardDuty delegated administrator and GuardDuty is enabled in that AWS Region.

AutoEnable bool

When this setting is enabled, all new accounts that are created in, or added to, the organization are added as a member accounts of the organization’s GuardDuty delegated administrator and GuardDuty is enabled in that AWS Region.

autoEnable Boolean

When this setting is enabled, all new accounts that are created in, or added to, the organization are added as a member accounts of the organization’s GuardDuty delegated administrator and GuardDuty is enabled in that AWS Region.

autoEnable boolean

When this setting is enabled, all new accounts that are created in, or added to, the organization are added as a member accounts of the organization’s GuardDuty delegated administrator and GuardDuty is enabled in that AWS Region.

auto_enable bool

When this setting is enabled, all new accounts that are created in, or added to, the organization are added as a member accounts of the organization’s GuardDuty delegated administrator and GuardDuty is enabled in that AWS Region.

autoEnable Boolean

When this setting is enabled, all new accounts that are created in, or added to, the organization are added as a member accounts of the organization’s GuardDuty delegated administrator and GuardDuty is enabled in that AWS Region.

Import

GuardDuty Organization Configurations can be imported using the GuardDuty Detector ID, e.g.,

 $ pulumi import aws:guardduty/organizationConfiguration:OrganizationConfiguration example 00b00fd5aecc0ab60a708659477e9617

Package Details

Repository
AWS Classic pulumi/pulumi-aws
License
Apache-2.0
Notes

This Pulumi package is based on the aws Terraform Provider.