1. Packages
  2. Strata Cloud Manager Provider
  3. API Docs
  4. getSecurityRule
Strata Cloud Manager v0.4.3 published on Saturday, Nov 8, 2025 by Pulumi
scm logo
Strata Cloud Manager v0.4.3 published on Saturday, Nov 8, 2025 by Pulumi

    SecurityRule data source

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as scm from "@pulumi/scm";
    
    const standardWebAccess = new scm.SecurityRule("standard_web_access", {
        folder: "All",
        name: "Allow Standard Web Access DS1",
        description: "Allow outbound web traffic to any destination...",
        position: "pre",
        action: "allow",
        categories: ["any"],
        applications: [
            "web-browsing",
            "ssl",
        ],
        services: [
            "service-http",
            "service-https",
        ],
        froms: [
            "untrust",
            "trust",
        ],
        tos: ["trust"],
        sources: ["any"],
        destinations: ["any"],
        negateSource: false,
        negateDestination: false,
        sourceUsers: ["any"],
        sourceHips: ["any"],
        destinationHips: ["any"],
        logStart: true,
        logEnd: true,
        disabled: false,
    });
    // --- Data Source Calls to Fetch Existing Rules ---
    // 1. Fetch by ID (Best for direct lookup)
    const standardWebAccessById = scm.getSecurityRuleOutput({
        id: standardWebAccess.id,
    });
    export const fetchedStandardWebId = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.id);
    export const fetchedStandardWebName = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.name);
    export const fetchedStandardWebDescription = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.description);
    
    import pulumi
    import pulumi_scm as scm
    
    standard_web_access = scm.SecurityRule("standard_web_access",
        folder="All",
        name="Allow Standard Web Access DS1",
        description="Allow outbound web traffic to any destination...",
        position="pre",
        action="allow",
        categories=["any"],
        applications=[
            "web-browsing",
            "ssl",
        ],
        services=[
            "service-http",
            "service-https",
        ],
        froms=[
            "untrust",
            "trust",
        ],
        tos=["trust"],
        sources=["any"],
        destinations=["any"],
        negate_source=False,
        negate_destination=False,
        source_users=["any"],
        source_hips=["any"],
        destination_hips=["any"],
        log_start=True,
        log_end=True,
        disabled=False)
    # --- Data Source Calls to Fetch Existing Rules ---
    # 1. Fetch by ID (Best for direct lookup)
    standard_web_access_by_id = scm.get_security_rule_output(id=standard_web_access.id)
    pulumi.export("fetchedStandardWebId", standard_web_access_by_id.id)
    pulumi.export("fetchedStandardWebName", standard_web_access_by_id.name)
    pulumi.export("fetchedStandardWebDescription", standard_web_access_by_id.description)
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-scm/sdk/go/scm"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		standardWebAccess, err := scm.NewSecurityRule(ctx, "standard_web_access", &scm.SecurityRuleArgs{
    			Folder:      pulumi.String("All"),
    			Name:        pulumi.String("Allow Standard Web Access DS1"),
    			Description: pulumi.String("Allow outbound web traffic to any destination..."),
    			Position:    pulumi.String("pre"),
    			Action:      pulumi.String("allow"),
    			Categories: pulumi.StringArray{
    				pulumi.String("any"),
    			},
    			Applications: pulumi.StringArray{
    				pulumi.String("web-browsing"),
    				pulumi.String("ssl"),
    			},
    			Services: pulumi.StringArray{
    				pulumi.String("service-http"),
    				pulumi.String("service-https"),
    			},
    			Froms: pulumi.StringArray{
    				pulumi.String("untrust"),
    				pulumi.String("trust"),
    			},
    			Tos: pulumi.StringArray{
    				pulumi.String("trust"),
    			},
    			Sources: pulumi.StringArray{
    				pulumi.String("any"),
    			},
    			Destinations: pulumi.StringArray{
    				pulumi.String("any"),
    			},
    			NegateSource:      pulumi.Bool(false),
    			NegateDestination: pulumi.Bool(false),
    			SourceUsers: pulumi.StringArray{
    				pulumi.String("any"),
    			},
    			SourceHips: pulumi.StringArray{
    				pulumi.String("any"),
    			},
    			DestinationHips: pulumi.StringArray{
    				pulumi.String("any"),
    			},
    			LogStart: pulumi.Bool(true),
    			LogEnd:   pulumi.Bool(true),
    			Disabled: pulumi.Bool(false),
    		})
    		if err != nil {
    			return err
    		}
    		// 1. Fetch by ID (Best for direct lookup)
    		standardWebAccessById := scm.LookupSecurityRuleOutput(ctx, scm.GetSecurityRuleOutputArgs{
    			Id: standardWebAccess.ID(),
    		}, nil)
    		ctx.Export("fetchedStandardWebId", standardWebAccessById.ApplyT(func(standardWebAccessById scm.GetSecurityRuleResult) (*string, error) {
    			return &standardWebAccessById.Id, nil
    		}).(pulumi.StringPtrOutput))
    		ctx.Export("fetchedStandardWebName", standardWebAccessById.ApplyT(func(standardWebAccessById scm.GetSecurityRuleResult) (*string, error) {
    			return &standardWebAccessById.Name, nil
    		}).(pulumi.StringPtrOutput))
    		ctx.Export("fetchedStandardWebDescription", standardWebAccessById.ApplyT(func(standardWebAccessById scm.GetSecurityRuleResult) (*string, error) {
    			return &standardWebAccessById.Description, nil
    		}).(pulumi.StringPtrOutput))
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Scm = Pulumi.Scm;
    
    return await Deployment.RunAsync(() => 
    {
        var standardWebAccess = new Scm.SecurityRule("standard_web_access", new()
        {
            Folder = "All",
            Name = "Allow Standard Web Access DS1",
            Description = "Allow outbound web traffic to any destination...",
            Position = "pre",
            Action = "allow",
            Categories = new[]
            {
                "any",
            },
            Applications = new[]
            {
                "web-browsing",
                "ssl",
            },
            Services = new[]
            {
                "service-http",
                "service-https",
            },
            Froms = new[]
            {
                "untrust",
                "trust",
            },
            Tos = new[]
            {
                "trust",
            },
            Sources = new[]
            {
                "any",
            },
            Destinations = new[]
            {
                "any",
            },
            NegateSource = false,
            NegateDestination = false,
            SourceUsers = new[]
            {
                "any",
            },
            SourceHips = new[]
            {
                "any",
            },
            DestinationHips = new[]
            {
                "any",
            },
            LogStart = true,
            LogEnd = true,
            Disabled = false,
        });
    
        // --- Data Source Calls to Fetch Existing Rules ---
        // 1. Fetch by ID (Best for direct lookup)
        var standardWebAccessById = Scm.GetSecurityRule.Invoke(new()
        {
            Id = standardWebAccess.Id,
        });
    
        return new Dictionary<string, object?>
        {
            ["fetchedStandardWebId"] = standardWebAccessById.Apply(getSecurityRuleResult => getSecurityRuleResult.Id),
            ["fetchedStandardWebName"] = standardWebAccessById.Apply(getSecurityRuleResult => getSecurityRuleResult.Name),
            ["fetchedStandardWebDescription"] = standardWebAccessById.Apply(getSecurityRuleResult => getSecurityRuleResult.Description),
        };
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.scm.SecurityRule;
    import com.pulumi.scm.SecurityRuleArgs;
    import com.pulumi.scm.ScmFunctions;
    import com.pulumi.scm.inputs.GetSecurityRuleArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var standardWebAccess = new SecurityRule("standardWebAccess", SecurityRuleArgs.builder()
                .folder("All")
                .name("Allow Standard Web Access DS1")
                .description("Allow outbound web traffic to any destination...")
                .position("pre")
                .action("allow")
                .categories("any")
                .applications(            
                    "web-browsing",
                    "ssl")
                .services(            
                    "service-http",
                    "service-https")
                .froms(            
                    "untrust",
                    "trust")
                .tos("trust")
                .sources("any")
                .destinations("any")
                .negateSource(false)
                .negateDestination(false)
                .sourceUsers("any")
                .sourceHips("any")
                .destinationHips("any")
                .logStart(true)
                .logEnd(true)
                .disabled(false)
                .build());
    
            // --- Data Source Calls to Fetch Existing Rules ---
            // 1. Fetch by ID (Best for direct lookup)
            final var standardWebAccessById = ScmFunctions.getSecurityRule(GetSecurityRuleArgs.builder()
                .id(standardWebAccess.id())
                .build());
    
            ctx.export("fetchedStandardWebId", standardWebAccessById.applyValue(_standardWebAccessById -> _standardWebAccessById.id()));
            ctx.export("fetchedStandardWebName", standardWebAccessById.applyValue(_standardWebAccessById -> _standardWebAccessById.name()));
            ctx.export("fetchedStandardWebDescription", standardWebAccessById.applyValue(_standardWebAccessById -> _standardWebAccessById.description()));
        }
    }
    
    resources:
      standardWebAccess: # --- Data Source Calls to Fetch Existing Rules ---
        type: scm:SecurityRule
        name: standard_web_access
        properties:
          folder: All
          name: Allow Standard Web Access DS1
          description: Allow outbound web traffic to any destination...
          position: pre
          action: allow
          categories:
            - any
          applications:
            - web-browsing
            - ssl
          services:
            - service-http
            - service-https
          froms:
            - untrust
            - trust
          tos:
            - trust
          sources:
            - any
          destinations:
            - any
          negateSource: false
          negateDestination: false # Identity & Content
          sourceUsers: #
            - any
          sourceHips: # Security-only
            - any
          destinationHips: # Security-only
            - any
          logStart: true # Security-only
          logEnd: true # Optional fields
          disabled: false
    variables:
      # 1. Fetch by ID (Best for direct lookup)
      standardWebAccessById:
        fn::invoke:
          function: scm:getSecurityRule
          arguments:
            id: ${standardWebAccess.id}
    outputs:
      # --- Outputs to Verify Fetched Data ---
      fetchedStandardWebId: ${standardWebAccessById.id}
      fetchedStandardWebName: ${standardWebAccessById.name}
      fetchedStandardWebDescription: ${standardWebAccessById.description}
    

    Using getSecurityRule

    Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.

    function getSecurityRule(args: GetSecurityRuleArgs, opts?: InvokeOptions): Promise<GetSecurityRuleResult>
    function getSecurityRuleOutput(args: GetSecurityRuleOutputArgs, opts?: InvokeOptions): Output<GetSecurityRuleResult>
    def get_security_rule(id: Optional[str] = None,
                          name: Optional[str] = None,
                          opts: Optional[InvokeOptions] = None) -> GetSecurityRuleResult
    def get_security_rule_output(id: Optional[pulumi.Input[str]] = None,
                          name: Optional[pulumi.Input[str]] = None,
                          opts: Optional[InvokeOptions] = None) -> Output[GetSecurityRuleResult]
    func LookupSecurityRule(ctx *Context, args *LookupSecurityRuleArgs, opts ...InvokeOption) (*LookupSecurityRuleResult, error)
    func LookupSecurityRuleOutput(ctx *Context, args *LookupSecurityRuleOutputArgs, opts ...InvokeOption) LookupSecurityRuleResultOutput

    > Note: This function is named LookupSecurityRule in the Go SDK.

    public static class GetSecurityRule 
    {
        public static Task<GetSecurityRuleResult> InvokeAsync(GetSecurityRuleArgs args, InvokeOptions? opts = null)
        public static Output<GetSecurityRuleResult> Invoke(GetSecurityRuleInvokeArgs args, InvokeOptions? opts = null)
    }
    public static CompletableFuture<GetSecurityRuleResult> getSecurityRule(GetSecurityRuleArgs args, InvokeOptions options)
    public static Output<GetSecurityRuleResult> getSecurityRule(GetSecurityRuleArgs args, InvokeOptions options)
    
    fn::invoke:
      function: scm:index/getSecurityRule:getSecurityRule
      arguments:
        # arguments dictionary

    The following arguments are supported:

    Id string
    The UUID of the security rule
    Name string
    The name of the security rule
    Id string
    The UUID of the security rule
    Name string
    The name of the security rule
    id String
    The UUID of the security rule
    name String
    The name of the security rule
    id string
    The UUID of the security rule
    name string
    The name of the security rule
    id str
    The UUID of the security rule
    name str
    The name of the security rule
    id String
    The UUID of the security rule
    name String
    The name of the security rule

    getSecurityRule Result

    The following output properties are available:

    Action string
    The action to be taken when the rule is matched
    AllowUrlCategories List<GetSecurityRuleAllowUrlCategory>
    Allow url category
    AllowWebApplications List<GetSecurityRuleAllowWebApplication>
    Allow web application
    Applications List<string>
    The application(s) being accessed
    BlockUrlCategories List<string>
    Block url category
    BlockWebApplications List<string>
    Block web application
    Categories List<string>
    The URL categories being accessed
    DefaultProfileSettings GetSecurityRuleDefaultProfileSettings
    Default profile settings
    Description string
    The description of the security rule
    DestinationHips List<string>
    The destination Host Integrity Profile(s)
    Destinations List<string>
    The destination address(es)
    Device string
    The device in which the resource is defined
    Devices List<string>
    Devices
    Disabled bool
    Is the security rule disabled?
    Folder string
    The folder in which the resource is defined
    Froms List<string>
    The source security zone(s)
    Id string
    The UUID of the security rule
    LogEnd bool
    Log at session end?
    LogSetting string
    The external log forwarding profile
    LogSettings GetSecurityRuleLogSettings
    Log settings
    LogStart bool
    Log at session start?
    Name string
    The name of the security rule
    NegateDestination bool
    Negate the destination addresses(es)?
    NegateSource bool
    Negate the source address(es)?
    NegateUser bool
    Negate user
    PolicyType string
    Policy type
    Position string
    The position of a security rule
    ProfileSetting GetSecurityRuleProfileSetting
    The security profile object
    RelativePosition string
    Relative positioning rule. String must be one of these: "before", "after", "top", "bottom". If not specified, rule is created at the bottom of the ruleset.
    Schedule string
    Schedule in which this rule will be applied
    SecuritySettings GetSecurityRuleSecuritySettings
    Security settings
    Services List<string>
    The service(s) being accessed
    Snippet string
    The snippet in which the resource is defined
    SourceHips List<string>
    The source Host Integrity Profile(s)
    SourceUsers List<string>
    List of source users and/or groups. Reserved words include any, pre-login, known-user, and unknown.
    Sources List<string>
    The source addresses(es)
    Tags List<string>
    The tags associated with the security rule
    TargetRule string
    The name or UUID of the rule to position this rule relative to. Required when relative_position is "before" or "after".
    TenantRestrictions List<string>
    Tenant restrictions
    Tfid string
    Tos List<string>
    The destination security zone(s)
    Action string
    The action to be taken when the rule is matched
    AllowUrlCategories []GetSecurityRuleAllowUrlCategory
    Allow url category
    AllowWebApplications []GetSecurityRuleAllowWebApplication
    Allow web application
    Applications []string
    The application(s) being accessed
    BlockUrlCategories []string
    Block url category
    BlockWebApplications []string
    Block web application
    Categories []string
    The URL categories being accessed
    DefaultProfileSettings GetSecurityRuleDefaultProfileSettings
    Default profile settings
    Description string
    The description of the security rule
    DestinationHips []string
    The destination Host Integrity Profile(s)
    Destinations []string
    The destination address(es)
    Device string
    The device in which the resource is defined
    Devices []string
    Devices
    Disabled bool
    Is the security rule disabled?
    Folder string
    The folder in which the resource is defined
    Froms []string
    The source security zone(s)
    Id string
    The UUID of the security rule
    LogEnd bool
    Log at session end?
    LogSetting string
    The external log forwarding profile
    LogSettings GetSecurityRuleLogSettings
    Log settings
    LogStart bool
    Log at session start?
    Name string
    The name of the security rule
    NegateDestination bool
    Negate the destination addresses(es)?
    NegateSource bool
    Negate the source address(es)?
    NegateUser bool
    Negate user
    PolicyType string
    Policy type
    Position string
    The position of a security rule
    ProfileSetting GetSecurityRuleProfileSetting
    The security profile object
    RelativePosition string
    Relative positioning rule. String must be one of these: "before", "after", "top", "bottom". If not specified, rule is created at the bottom of the ruleset.
    Schedule string
    Schedule in which this rule will be applied
    SecuritySettings GetSecurityRuleSecuritySettings
    Security settings
    Services []string
    The service(s) being accessed
    Snippet string
    The snippet in which the resource is defined
    SourceHips []string
    The source Host Integrity Profile(s)
    SourceUsers []string
    List of source users and/or groups. Reserved words include any, pre-login, known-user, and unknown.
    Sources []string
    The source addresses(es)
    Tags []string
    The tags associated with the security rule
    TargetRule string
    The name or UUID of the rule to position this rule relative to. Required when relative_position is "before" or "after".
    TenantRestrictions []string
    Tenant restrictions
    Tfid string
    Tos []string
    The destination security zone(s)
    action String
    The action to be taken when the rule is matched
    allowUrlCategories List<GetSecurityRuleAllowUrlCategory>
    Allow url category
    allowWebApplications List<GetSecurityRuleAllowWebApplication>
    Allow web application
    applications List<String>
    The application(s) being accessed
    blockUrlCategories List<String>
    Block url category
    blockWebApplications List<String>
    Block web application
    categories List<String>
    The URL categories being accessed
    defaultProfileSettings GetSecurityRuleDefaultProfileSettings
    Default profile settings
    description String
    The description of the security rule
    destinationHips List<String>
    The destination Host Integrity Profile(s)
    destinations List<String>
    The destination address(es)
    device String
    The device in which the resource is defined
    devices List<String>
    Devices
    disabled Boolean
    Is the security rule disabled?
    folder String
    The folder in which the resource is defined
    froms List<String>
    The source security zone(s)
    id String
    The UUID of the security rule
    logEnd Boolean
    Log at session end?
    logSetting String
    The external log forwarding profile
    logSettings GetSecurityRuleLogSettings
    Log settings
    logStart Boolean
    Log at session start?
    name String
    The name of the security rule
    negateDestination Boolean
    Negate the destination addresses(es)?
    negateSource Boolean
    Negate the source address(es)?
    negateUser Boolean
    Negate user
    policyType String
    Policy type
    position String
    The position of a security rule
    profileSetting GetSecurityRuleProfileSetting
    The security profile object
    relativePosition String
    Relative positioning rule. String must be one of these: "before", "after", "top", "bottom". If not specified, rule is created at the bottom of the ruleset.
    schedule String
    Schedule in which this rule will be applied
    securitySettings GetSecurityRuleSecuritySettings
    Security settings
    services List<String>
    The service(s) being accessed
    snippet String
    The snippet in which the resource is defined
    sourceHips List<String>
    The source Host Integrity Profile(s)
    sourceUsers List<String>
    List of source users and/or groups. Reserved words include any, pre-login, known-user, and unknown.
    sources List<String>
    The source addresses(es)
    tags List<String>
    The tags associated with the security rule
    targetRule String
    The name or UUID of the rule to position this rule relative to. Required when relative_position is "before" or "after".
    tenantRestrictions List<String>
    Tenant restrictions
    tfid String
    tos List<String>
    The destination security zone(s)
    action string
    The action to be taken when the rule is matched
    allowUrlCategories GetSecurityRuleAllowUrlCategory[]
    Allow url category
    allowWebApplications GetSecurityRuleAllowWebApplication[]
    Allow web application
    applications string[]
    The application(s) being accessed
    blockUrlCategories string[]
    Block url category
    blockWebApplications string[]
    Block web application
    categories string[]
    The URL categories being accessed
    defaultProfileSettings GetSecurityRuleDefaultProfileSettings
    Default profile settings
    description string
    The description of the security rule
    destinationHips string[]
    The destination Host Integrity Profile(s)
    destinations string[]
    The destination address(es)
    device string
    The device in which the resource is defined
    devices string[]
    Devices
    disabled boolean
    Is the security rule disabled?
    folder string
    The folder in which the resource is defined
    froms string[]
    The source security zone(s)
    id string
    The UUID of the security rule
    logEnd boolean
    Log at session end?
    logSetting string
    The external log forwarding profile
    logSettings GetSecurityRuleLogSettings
    Log settings
    logStart boolean
    Log at session start?
    name string
    The name of the security rule
    negateDestination boolean
    Negate the destination addresses(es)?
    negateSource boolean
    Negate the source address(es)?
    negateUser boolean
    Negate user
    policyType string
    Policy type
    position string
    The position of a security rule
    profileSetting GetSecurityRuleProfileSetting
    The security profile object
    relativePosition string
    Relative positioning rule. String must be one of these: "before", "after", "top", "bottom". If not specified, rule is created at the bottom of the ruleset.
    schedule string
    Schedule in which this rule will be applied
    securitySettings GetSecurityRuleSecuritySettings
    Security settings
    services string[]
    The service(s) being accessed
    snippet string
    The snippet in which the resource is defined
    sourceHips string[]
    The source Host Integrity Profile(s)
    sourceUsers string[]
    List of source users and/or groups. Reserved words include any, pre-login, known-user, and unknown.
    sources string[]
    The source addresses(es)
    tags string[]
    The tags associated with the security rule
    targetRule string
    The name or UUID of the rule to position this rule relative to. Required when relative_position is "before" or "after".
    tenantRestrictions string[]
    Tenant restrictions
    tfid string
    tos string[]
    The destination security zone(s)
    action str
    The action to be taken when the rule is matched
    allow_url_categories Sequence[GetSecurityRuleAllowUrlCategory]
    Allow url category
    allow_web_applications Sequence[GetSecurityRuleAllowWebApplication]
    Allow web application
    applications Sequence[str]
    The application(s) being accessed
    block_url_categories Sequence[str]
    Block url category
    block_web_applications Sequence[str]
    Block web application
    categories Sequence[str]
    The URL categories being accessed
    default_profile_settings GetSecurityRuleDefaultProfileSettings
    Default profile settings
    description str
    The description of the security rule
    destination_hips Sequence[str]
    The destination Host Integrity Profile(s)
    destinations Sequence[str]
    The destination address(es)
    device str
    The device in which the resource is defined
    devices Sequence[str]
    Devices
    disabled bool
    Is the security rule disabled?
    folder str
    The folder in which the resource is defined
    froms Sequence[str]
    The source security zone(s)
    id str
    The UUID of the security rule
    log_end bool
    Log at session end?
    log_setting str
    The external log forwarding profile
    log_settings GetSecurityRuleLogSettings
    Log settings
    log_start bool
    Log at session start?
    name str
    The name of the security rule
    negate_destination bool
    Negate the destination addresses(es)?
    negate_source bool
    Negate the source address(es)?
    negate_user bool
    Negate user
    policy_type str
    Policy type
    position str
    The position of a security rule
    profile_setting GetSecurityRuleProfileSetting
    The security profile object
    relative_position str
    Relative positioning rule. String must be one of these: "before", "after", "top", "bottom". If not specified, rule is created at the bottom of the ruleset.
    schedule str
    Schedule in which this rule will be applied
    security_settings GetSecurityRuleSecuritySettings
    Security settings
    services Sequence[str]
    The service(s) being accessed
    snippet str
    The snippet in which the resource is defined
    source_hips Sequence[str]
    The source Host Integrity Profile(s)
    source_users Sequence[str]
    List of source users and/or groups. Reserved words include any, pre-login, known-user, and unknown.
    sources Sequence[str]
    The source addresses(es)
    tags Sequence[str]
    The tags associated with the security rule
    target_rule str
    The name or UUID of the rule to position this rule relative to. Required when relative_position is "before" or "after".
    tenant_restrictions Sequence[str]
    Tenant restrictions
    tfid str
    tos Sequence[str]
    The destination security zone(s)
    action String
    The action to be taken when the rule is matched
    allowUrlCategories List<Property Map>
    Allow url category
    allowWebApplications List<Property Map>
    Allow web application
    applications List<String>
    The application(s) being accessed
    blockUrlCategories List<String>
    Block url category
    blockWebApplications List<String>
    Block web application
    categories List<String>
    The URL categories being accessed
    defaultProfileSettings Property Map
    Default profile settings
    description String
    The description of the security rule
    destinationHips List<String>
    The destination Host Integrity Profile(s)
    destinations List<String>
    The destination address(es)
    device String
    The device in which the resource is defined
    devices List<String>
    Devices
    disabled Boolean
    Is the security rule disabled?
    folder String
    The folder in which the resource is defined
    froms List<String>
    The source security zone(s)
    id String
    The UUID of the security rule
    logEnd Boolean
    Log at session end?
    logSetting String
    The external log forwarding profile
    logSettings Property Map
    Log settings
    logStart Boolean
    Log at session start?
    name String
    The name of the security rule
    negateDestination Boolean
    Negate the destination addresses(es)?
    negateSource Boolean
    Negate the source address(es)?
    negateUser Boolean
    Negate user
    policyType String
    Policy type
    position String
    The position of a security rule
    profileSetting Property Map
    The security profile object
    relativePosition String
    Relative positioning rule. String must be one of these: "before", "after", "top", "bottom". If not specified, rule is created at the bottom of the ruleset.
    schedule String
    Schedule in which this rule will be applied
    securitySettings Property Map
    Security settings
    services List<String>
    The service(s) being accessed
    snippet String
    The snippet in which the resource is defined
    sourceHips List<String>
    The source Host Integrity Profile(s)
    sourceUsers List<String>
    List of source users and/or groups. Reserved words include any, pre-login, known-user, and unknown.
    sources List<String>
    The source addresses(es)
    tags List<String>
    The tags associated with the security rule
    targetRule String
    The name or UUID of the rule to position this rule relative to. Required when relative_position is "before" or "after".
    tenantRestrictions List<String>
    Tenant restrictions
    tfid String
    tos List<String>
    The destination security zone(s)

    Supporting Types

    GetSecurityRuleAllowUrlCategory

    AdditionalAction string
    Additional action
    CredentialEnforcement string
    Credential enforcement
    Decryption string
    Decryption
    Dlp string
    Dlp
    FileControl GetSecurityRuleAllowUrlCategoryFileControl
    File control
    IsolationProfiles string
    Isolation profiles
    Name string
    Name
    AdditionalAction string
    Additional action
    CredentialEnforcement string
    Credential enforcement
    Decryption string
    Decryption
    Dlp string
    Dlp
    FileControl GetSecurityRuleAllowUrlCategoryFileControl
    File control
    IsolationProfiles string
    Isolation profiles
    Name string
    Name
    additionalAction String
    Additional action
    credentialEnforcement String
    Credential enforcement
    decryption String
    Decryption
    dlp String
    Dlp
    fileControl GetSecurityRuleAllowUrlCategoryFileControl
    File control
    isolationProfiles String
    Isolation profiles
    name String
    Name
    additionalAction string
    Additional action
    credentialEnforcement string
    Credential enforcement
    decryption string
    Decryption
    dlp string
    Dlp
    fileControl GetSecurityRuleAllowUrlCategoryFileControl
    File control
    isolationProfiles string
    Isolation profiles
    name string
    Name
    additional_action str
    Additional action
    credential_enforcement str
    Credential enforcement
    decryption str
    Decryption
    dlp str
    Dlp
    file_control GetSecurityRuleAllowUrlCategoryFileControl
    File control
    isolation_profiles str
    Isolation profiles
    name str
    Name
    additionalAction String
    Additional action
    credentialEnforcement String
    Credential enforcement
    decryption String
    Decryption
    dlp String
    Dlp
    fileControl Property Map
    File control
    isolationProfiles String
    Isolation profiles
    name String
    Name

    GetSecurityRuleAllowUrlCategoryFileControl

    Download string
    Download
    Upload string
    Upload
    Download string
    Download
    Upload string
    Upload
    download String
    Download
    upload String
    Upload
    download string
    Download
    upload string
    Upload
    download str
    Download
    upload str
    Upload
    download String
    Download
    upload String
    Upload

    GetSecurityRuleAllowWebApplication

    ApplicationFunctions List<string>
    Application function
    Dlp string
    Dlp
    FileControl GetSecurityRuleAllowWebApplicationFileControl
    File control
    Name string
    Name
    SaasEnterpriseControl GetSecurityRuleAllowWebApplicationSaasEnterpriseControl
    Saas enterprise control
    SaasTenantLists List<string>
    Saas tenant list
    SaasUserLists List<string>
    Saas user list
    TenantControl GetSecurityRuleAllowWebApplicationTenantControl
    Tenant control
    Type string
    Type
    applicationFunctions List<String>
    Application function
    dlp String
    Dlp
    fileControl GetSecurityRuleAllowWebApplicationFileControl
    File control
    name String
    Name
    saasEnterpriseControl GetSecurityRuleAllowWebApplicationSaasEnterpriseControl
    Saas enterprise control
    saasTenantLists List<String>
    Saas tenant list
    saasUserLists List<String>
    Saas user list
    tenantControl GetSecurityRuleAllowWebApplicationTenantControl
    Tenant control
    type String
    Type
    applicationFunctions List<String>
    Application function
    dlp String
    Dlp
    fileControl Property Map
    File control
    name String
    Name
    saasEnterpriseControl Property Map
    Saas enterprise control
    saasTenantLists List<String>
    Saas tenant list
    saasUserLists List<String>
    Saas user list
    tenantControl Property Map
    Tenant control
    type String
    Type

    GetSecurityRuleAllowWebApplicationFileControl

    Download string
    Download
    Upload string
    Upload
    Download string
    Download
    Upload string
    Upload
    download String
    Download
    upload String
    Upload
    download string
    Download
    upload string
    Upload
    download str
    Download
    upload str
    Upload
    download String
    Download
    upload String
    Upload

    GetSecurityRuleAllowWebApplicationSaasEnterpriseControl

    GetSecurityRuleAllowWebApplicationSaasEnterpriseControlConsumerAccess

    Enable string
    Enable
    Enable string
    Enable
    enable String
    Enable
    enable string
    Enable
    enable str
    Enable
    enable String
    Enable

    GetSecurityRuleAllowWebApplicationSaasEnterpriseControlEnterpriseAccess

    Enable string
    Enable
    TenantRestrictions List<string>
    Tenant restrictions
    Enable string
    Enable
    TenantRestrictions []string
    Tenant restrictions
    enable String
    Enable
    tenantRestrictions List<String>
    Tenant restrictions
    enable string
    Enable
    tenantRestrictions string[]
    Tenant restrictions
    enable str
    Enable
    tenant_restrictions Sequence[str]
    Tenant restrictions
    enable String
    Enable
    tenantRestrictions List<String>
    Tenant restrictions

    GetSecurityRuleAllowWebApplicationTenantControl

    AllowedActivities List<string>
    Allowed activities
    BlockedActivities List<string>
    Blocked activities
    ParentApplication string
    Parent application
    Tenants List<string>
    Tenants
    AllowedActivities []string
    Allowed activities
    BlockedActivities []string
    Blocked activities
    ParentApplication string
    Parent application
    Tenants []string
    Tenants
    allowedActivities List<String>
    Allowed activities
    blockedActivities List<String>
    Blocked activities
    parentApplication String
    Parent application
    tenants List<String>
    Tenants
    allowedActivities string[]
    Allowed activities
    blockedActivities string[]
    Blocked activities
    parentApplication string
    Parent application
    tenants string[]
    Tenants
    allowed_activities Sequence[str]
    Allowed activities
    blocked_activities Sequence[str]
    Blocked activities
    parent_application str
    Parent application
    tenants Sequence[str]
    Tenants
    allowedActivities List<String>
    Allowed activities
    blockedActivities List<String>
    Blocked activities
    parentApplication String
    Parent application
    tenants List<String>
    Tenants

    GetSecurityRuleDefaultProfileSettings

    dlp String
    Dlp
    fileControl Property Map
    File control

    GetSecurityRuleDefaultProfileSettingsFileControl

    Download string
    Download
    Upload string
    Upload
    Download string
    Download
    Upload string
    Upload
    download String
    Download
    upload String
    Upload
    download string
    Download
    upload string
    Upload
    download str
    Download
    upload str
    Upload
    download String
    Download
    upload String
    Upload

    GetSecurityRuleLogSettings

    LogSessions bool
    Log sessions
    LogSessions bool
    Log sessions
    logSessions Boolean
    Log sessions
    logSessions boolean
    Log sessions
    log_sessions bool
    Log sessions
    logSessions Boolean
    Log sessions

    GetSecurityRuleProfileSetting

    Groups List<string>
    The security profile group
    Groups []string
    The security profile group
    groups List<String>
    The security profile group
    groups string[]
    The security profile group
    groups Sequence[str]
    The security profile group
    groups List<String>
    The security profile group

    GetSecurityRuleSecuritySettings

    AntiSpyware string
    Anti spyware
    VirusAndWildfireAnalysis string
    Virus and wildfire analysis
    Vulnerability string
    Vulnerability
    AntiSpyware string
    Anti spyware
    VirusAndWildfireAnalysis string
    Virus and wildfire analysis
    Vulnerability string
    Vulnerability
    antiSpyware String
    Anti spyware
    virusAndWildfireAnalysis String
    Virus and wildfire analysis
    vulnerability String
    Vulnerability
    antiSpyware string
    Anti spyware
    virusAndWildfireAnalysis string
    Virus and wildfire analysis
    vulnerability string
    Vulnerability
    anti_spyware str
    Anti spyware
    virus_and_wildfire_analysis str
    Virus and wildfire analysis
    vulnerability str
    Vulnerability
    antiSpyware String
    Anti spyware
    virusAndWildfireAnalysis String
    Virus and wildfire analysis
    vulnerability String
    Vulnerability

    Package Details

    Repository
    scm pulumi/pulumi-scm
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the scm Terraform Provider.
    scm logo
    Strata Cloud Manager v0.4.3 published on Saturday, Nov 8, 2025 by Pulumi
      Meet Neo: Your AI Platform Teammate