Strata Cloud Manager v0.4.3 published on Saturday, Nov 8, 2025 by Pulumi
Strata Cloud Manager v0.4.3 published on Saturday, Nov 8, 2025 by Pulumi
SecurityRule data source
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as scm from "@pulumi/scm";
const standardWebAccess = new scm.SecurityRule("standard_web_access", {
folder: "All",
name: "Allow Standard Web Access DS1",
description: "Allow outbound web traffic to any destination...",
position: "pre",
action: "allow",
categories: ["any"],
applications: [
"web-browsing",
"ssl",
],
services: [
"service-http",
"service-https",
],
froms: [
"untrust",
"trust",
],
tos: ["trust"],
sources: ["any"],
destinations: ["any"],
negateSource: false,
negateDestination: false,
sourceUsers: ["any"],
sourceHips: ["any"],
destinationHips: ["any"],
logStart: true,
logEnd: true,
disabled: false,
});
// --- Data Source Calls to Fetch Existing Rules ---
// 1. Fetch by ID (Best for direct lookup)
const standardWebAccessById = scm.getSecurityRuleOutput({
id: standardWebAccess.id,
});
export const fetchedStandardWebId = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.id);
export const fetchedStandardWebName = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.name);
export const fetchedStandardWebDescription = standardWebAccessById.apply(standardWebAccessById => standardWebAccessById.description);
import pulumi
import pulumi_scm as scm
standard_web_access = scm.SecurityRule("standard_web_access",
folder="All",
name="Allow Standard Web Access DS1",
description="Allow outbound web traffic to any destination...",
position="pre",
action="allow",
categories=["any"],
applications=[
"web-browsing",
"ssl",
],
services=[
"service-http",
"service-https",
],
froms=[
"untrust",
"trust",
],
tos=["trust"],
sources=["any"],
destinations=["any"],
negate_source=False,
negate_destination=False,
source_users=["any"],
source_hips=["any"],
destination_hips=["any"],
log_start=True,
log_end=True,
disabled=False)
# --- Data Source Calls to Fetch Existing Rules ---
# 1. Fetch by ID (Best for direct lookup)
standard_web_access_by_id = scm.get_security_rule_output(id=standard_web_access.id)
pulumi.export("fetchedStandardWebId", standard_web_access_by_id.id)
pulumi.export("fetchedStandardWebName", standard_web_access_by_id.name)
pulumi.export("fetchedStandardWebDescription", standard_web_access_by_id.description)
package main
import (
"github.com/pulumi/pulumi-scm/sdk/go/scm"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
standardWebAccess, err := scm.NewSecurityRule(ctx, "standard_web_access", &scm.SecurityRuleArgs{
Folder: pulumi.String("All"),
Name: pulumi.String("Allow Standard Web Access DS1"),
Description: pulumi.String("Allow outbound web traffic to any destination..."),
Position: pulumi.String("pre"),
Action: pulumi.String("allow"),
Categories: pulumi.StringArray{
pulumi.String("any"),
},
Applications: pulumi.StringArray{
pulumi.String("web-browsing"),
pulumi.String("ssl"),
},
Services: pulumi.StringArray{
pulumi.String("service-http"),
pulumi.String("service-https"),
},
Froms: pulumi.StringArray{
pulumi.String("untrust"),
pulumi.String("trust"),
},
Tos: pulumi.StringArray{
pulumi.String("trust"),
},
Sources: pulumi.StringArray{
pulumi.String("any"),
},
Destinations: pulumi.StringArray{
pulumi.String("any"),
},
NegateSource: pulumi.Bool(false),
NegateDestination: pulumi.Bool(false),
SourceUsers: pulumi.StringArray{
pulumi.String("any"),
},
SourceHips: pulumi.StringArray{
pulumi.String("any"),
},
DestinationHips: pulumi.StringArray{
pulumi.String("any"),
},
LogStart: pulumi.Bool(true),
LogEnd: pulumi.Bool(true),
Disabled: pulumi.Bool(false),
})
if err != nil {
return err
}
// 1. Fetch by ID (Best for direct lookup)
standardWebAccessById := scm.LookupSecurityRuleOutput(ctx, scm.GetSecurityRuleOutputArgs{
Id: standardWebAccess.ID(),
}, nil)
ctx.Export("fetchedStandardWebId", standardWebAccessById.ApplyT(func(standardWebAccessById scm.GetSecurityRuleResult) (*string, error) {
return &standardWebAccessById.Id, nil
}).(pulumi.StringPtrOutput))
ctx.Export("fetchedStandardWebName", standardWebAccessById.ApplyT(func(standardWebAccessById scm.GetSecurityRuleResult) (*string, error) {
return &standardWebAccessById.Name, nil
}).(pulumi.StringPtrOutput))
ctx.Export("fetchedStandardWebDescription", standardWebAccessById.ApplyT(func(standardWebAccessById scm.GetSecurityRuleResult) (*string, error) {
return &standardWebAccessById.Description, nil
}).(pulumi.StringPtrOutput))
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Scm = Pulumi.Scm;
return await Deployment.RunAsync(() =>
{
var standardWebAccess = new Scm.SecurityRule("standard_web_access", new()
{
Folder = "All",
Name = "Allow Standard Web Access DS1",
Description = "Allow outbound web traffic to any destination...",
Position = "pre",
Action = "allow",
Categories = new[]
{
"any",
},
Applications = new[]
{
"web-browsing",
"ssl",
},
Services = new[]
{
"service-http",
"service-https",
},
Froms = new[]
{
"untrust",
"trust",
},
Tos = new[]
{
"trust",
},
Sources = new[]
{
"any",
},
Destinations = new[]
{
"any",
},
NegateSource = false,
NegateDestination = false,
SourceUsers = new[]
{
"any",
},
SourceHips = new[]
{
"any",
},
DestinationHips = new[]
{
"any",
},
LogStart = true,
LogEnd = true,
Disabled = false,
});
// --- Data Source Calls to Fetch Existing Rules ---
// 1. Fetch by ID (Best for direct lookup)
var standardWebAccessById = Scm.GetSecurityRule.Invoke(new()
{
Id = standardWebAccess.Id,
});
return new Dictionary<string, object?>
{
["fetchedStandardWebId"] = standardWebAccessById.Apply(getSecurityRuleResult => getSecurityRuleResult.Id),
["fetchedStandardWebName"] = standardWebAccessById.Apply(getSecurityRuleResult => getSecurityRuleResult.Name),
["fetchedStandardWebDescription"] = standardWebAccessById.Apply(getSecurityRuleResult => getSecurityRuleResult.Description),
};
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.scm.SecurityRule;
import com.pulumi.scm.SecurityRuleArgs;
import com.pulumi.scm.ScmFunctions;
import com.pulumi.scm.inputs.GetSecurityRuleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var standardWebAccess = new SecurityRule("standardWebAccess", SecurityRuleArgs.builder()
.folder("All")
.name("Allow Standard Web Access DS1")
.description("Allow outbound web traffic to any destination...")
.position("pre")
.action("allow")
.categories("any")
.applications(
"web-browsing",
"ssl")
.services(
"service-http",
"service-https")
.froms(
"untrust",
"trust")
.tos("trust")
.sources("any")
.destinations("any")
.negateSource(false)
.negateDestination(false)
.sourceUsers("any")
.sourceHips("any")
.destinationHips("any")
.logStart(true)
.logEnd(true)
.disabled(false)
.build());
// --- Data Source Calls to Fetch Existing Rules ---
// 1. Fetch by ID (Best for direct lookup)
final var standardWebAccessById = ScmFunctions.getSecurityRule(GetSecurityRuleArgs.builder()
.id(standardWebAccess.id())
.build());
ctx.export("fetchedStandardWebId", standardWebAccessById.applyValue(_standardWebAccessById -> _standardWebAccessById.id()));
ctx.export("fetchedStandardWebName", standardWebAccessById.applyValue(_standardWebAccessById -> _standardWebAccessById.name()));
ctx.export("fetchedStandardWebDescription", standardWebAccessById.applyValue(_standardWebAccessById -> _standardWebAccessById.description()));
}
}
resources:
standardWebAccess: # --- Data Source Calls to Fetch Existing Rules ---
type: scm:SecurityRule
name: standard_web_access
properties:
folder: All
name: Allow Standard Web Access DS1
description: Allow outbound web traffic to any destination...
position: pre
action: allow
categories:
- any
applications:
- web-browsing
- ssl
services:
- service-http
- service-https
froms:
- untrust
- trust
tos:
- trust
sources:
- any
destinations:
- any
negateSource: false
negateDestination: false # Identity & Content
sourceUsers: #
- any
sourceHips: # Security-only
- any
destinationHips: # Security-only
- any
logStart: true # Security-only
logEnd: true # Optional fields
disabled: false
variables:
# 1. Fetch by ID (Best for direct lookup)
standardWebAccessById:
fn::invoke:
function: scm:getSecurityRule
arguments:
id: ${standardWebAccess.id}
outputs:
# --- Outputs to Verify Fetched Data ---
fetchedStandardWebId: ${standardWebAccessById.id}
fetchedStandardWebName: ${standardWebAccessById.name}
fetchedStandardWebDescription: ${standardWebAccessById.description}
Using getSecurityRule
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getSecurityRule(args: GetSecurityRuleArgs, opts?: InvokeOptions): Promise<GetSecurityRuleResult>
function getSecurityRuleOutput(args: GetSecurityRuleOutputArgs, opts?: InvokeOptions): Output<GetSecurityRuleResult>def get_security_rule(id: Optional[str] = None,
name: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetSecurityRuleResult
def get_security_rule_output(id: Optional[pulumi.Input[str]] = None,
name: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetSecurityRuleResult]func LookupSecurityRule(ctx *Context, args *LookupSecurityRuleArgs, opts ...InvokeOption) (*LookupSecurityRuleResult, error)
func LookupSecurityRuleOutput(ctx *Context, args *LookupSecurityRuleOutputArgs, opts ...InvokeOption) LookupSecurityRuleResultOutput> Note: This function is named LookupSecurityRule in the Go SDK.
public static class GetSecurityRule
{
public static Task<GetSecurityRuleResult> InvokeAsync(GetSecurityRuleArgs args, InvokeOptions? opts = null)
public static Output<GetSecurityRuleResult> Invoke(GetSecurityRuleInvokeArgs args, InvokeOptions? opts = null)
}public static CompletableFuture<GetSecurityRuleResult> getSecurityRule(GetSecurityRuleArgs args, InvokeOptions options)
public static Output<GetSecurityRuleResult> getSecurityRule(GetSecurityRuleArgs args, InvokeOptions options)
fn::invoke:
function: scm:index/getSecurityRule:getSecurityRule
arguments:
# arguments dictionaryThe following arguments are supported:
getSecurityRule Result
The following output properties are available:
- Action string
- The action to be taken when the rule is matched
- Allow
Url List<GetCategories Security Rule Allow Url Category> - Allow url category
- Allow
Web List<GetApplications Security Rule Allow Web Application> - Allow web application
- Applications List<string>
- The application(s) being accessed
- Block
Url List<string>Categories - Block url category
- Block
Web List<string>Applications - Block web application
- Categories List<string>
- The URL categories being accessed
- Default
Profile GetSettings Security Rule Default Profile Settings - Default profile settings
- Description string
- The description of the security rule
- Destination
Hips List<string> - The destination Host Integrity Profile(s)
- Destinations List<string>
- The destination address(es)
- Device string
- The device in which the resource is defined
- Devices List<string>
- Devices
- Disabled bool
- Is the security rule disabled?
- Folder string
- The folder in which the resource is defined
- Froms List<string>
- The source security zone(s)
- Id string
- The UUID of the security rule
- Log
End bool - Log at session end?
- Log
Setting string - The external log forwarding profile
- Log
Settings GetSecurity Rule Log Settings - Log settings
- Log
Start bool - Log at session start?
- Name string
- The name of the security rule
- Negate
Destination bool - Negate the destination addresses(es)?
- Negate
Source bool - Negate the source address(es)?
- Negate
User bool - Negate user
- Policy
Type string - Policy type
- Position string
- The position of a security rule
- Profile
Setting GetSecurity Rule Profile Setting - The security profile object
- Relative
Position string - Relative positioning rule. String must be one of these:
"before","after","top","bottom". If not specified, rule is created at the bottom of the ruleset. - Schedule string
- Schedule in which this rule will be applied
- Security
Settings GetSecurity Rule Security Settings - Security settings
- Services List<string>
- The service(s) being accessed
- Snippet string
- The snippet in which the resource is defined
- Source
Hips List<string> - The source Host Integrity Profile(s)
- Source
Users List<string> - List of source users and/or groups. Reserved words include
any,pre-login,known-user, andunknown. - Sources List<string>
- The source addresses(es)
- List<string>
- The tags associated with the security rule
- Target
Rule string - The name or UUID of the rule to position this rule relative to. Required when
relative_positionis"before"or"after". - Tenant
Restrictions List<string> - Tenant restrictions
- Tfid string
- Tos List<string>
- The destination security zone(s)
- Action string
- The action to be taken when the rule is matched
- Allow
Url []GetCategories Security Rule Allow Url Category - Allow url category
- Allow
Web []GetApplications Security Rule Allow Web Application - Allow web application
- Applications []string
- The application(s) being accessed
- Block
Url []stringCategories - Block url category
- Block
Web []stringApplications - Block web application
- Categories []string
- The URL categories being accessed
- Default
Profile GetSettings Security Rule Default Profile Settings - Default profile settings
- Description string
- The description of the security rule
- Destination
Hips []string - The destination Host Integrity Profile(s)
- Destinations []string
- The destination address(es)
- Device string
- The device in which the resource is defined
- Devices []string
- Devices
- Disabled bool
- Is the security rule disabled?
- Folder string
- The folder in which the resource is defined
- Froms []string
- The source security zone(s)
- Id string
- The UUID of the security rule
- Log
End bool - Log at session end?
- Log
Setting string - The external log forwarding profile
- Log
Settings GetSecurity Rule Log Settings - Log settings
- Log
Start bool - Log at session start?
- Name string
- The name of the security rule
- Negate
Destination bool - Negate the destination addresses(es)?
- Negate
Source bool - Negate the source address(es)?
- Negate
User bool - Negate user
- Policy
Type string - Policy type
- Position string
- The position of a security rule
- Profile
Setting GetSecurity Rule Profile Setting - The security profile object
- Relative
Position string - Relative positioning rule. String must be one of these:
"before","after","top","bottom". If not specified, rule is created at the bottom of the ruleset. - Schedule string
- Schedule in which this rule will be applied
- Security
Settings GetSecurity Rule Security Settings - Security settings
- Services []string
- The service(s) being accessed
- Snippet string
- The snippet in which the resource is defined
- Source
Hips []string - The source Host Integrity Profile(s)
- Source
Users []string - List of source users and/or groups. Reserved words include
any,pre-login,known-user, andunknown. - Sources []string
- The source addresses(es)
- []string
- The tags associated with the security rule
- Target
Rule string - The name or UUID of the rule to position this rule relative to. Required when
relative_positionis"before"or"after". - Tenant
Restrictions []string - Tenant restrictions
- Tfid string
- Tos []string
- The destination security zone(s)
- action String
- The action to be taken when the rule is matched
- allow
Url List<GetCategories Security Rule Allow Url Category> - Allow url category
- allow
Web List<GetApplications Security Rule Allow Web Application> - Allow web application
- applications List<String>
- The application(s) being accessed
- block
Url List<String>Categories - Block url category
- block
Web List<String>Applications - Block web application
- categories List<String>
- The URL categories being accessed
- default
Profile GetSettings Security Rule Default Profile Settings - Default profile settings
- description String
- The description of the security rule
- destination
Hips List<String> - The destination Host Integrity Profile(s)
- destinations List<String>
- The destination address(es)
- device String
- The device in which the resource is defined
- devices List<String>
- Devices
- disabled Boolean
- Is the security rule disabled?
- folder String
- The folder in which the resource is defined
- froms List<String>
- The source security zone(s)
- id String
- The UUID of the security rule
- log
End Boolean - Log at session end?
- log
Setting String - The external log forwarding profile
- log
Settings GetSecurity Rule Log Settings - Log settings
- log
Start Boolean - Log at session start?
- name String
- The name of the security rule
- negate
Destination Boolean - Negate the destination addresses(es)?
- negate
Source Boolean - Negate the source address(es)?
- negate
User Boolean - Negate user
- policy
Type String - Policy type
- position String
- The position of a security rule
- profile
Setting GetSecurity Rule Profile Setting - The security profile object
- relative
Position String - Relative positioning rule. String must be one of these:
"before","after","top","bottom". If not specified, rule is created at the bottom of the ruleset. - schedule String
- Schedule in which this rule will be applied
- security
Settings GetSecurity Rule Security Settings - Security settings
- services List<String>
- The service(s) being accessed
- snippet String
- The snippet in which the resource is defined
- source
Hips List<String> - The source Host Integrity Profile(s)
- source
Users List<String> - List of source users and/or groups. Reserved words include
any,pre-login,known-user, andunknown. - sources List<String>
- The source addresses(es)
- List<String>
- The tags associated with the security rule
- target
Rule String - The name or UUID of the rule to position this rule relative to. Required when
relative_positionis"before"or"after". - tenant
Restrictions List<String> - Tenant restrictions
- tfid String
- tos List<String>
- The destination security zone(s)
- action string
- The action to be taken when the rule is matched
- allow
Url GetCategories Security Rule Allow Url Category[] - Allow url category
- allow
Web GetApplications Security Rule Allow Web Application[] - Allow web application
- applications string[]
- The application(s) being accessed
- block
Url string[]Categories - Block url category
- block
Web string[]Applications - Block web application
- categories string[]
- The URL categories being accessed
- default
Profile GetSettings Security Rule Default Profile Settings - Default profile settings
- description string
- The description of the security rule
- destination
Hips string[] - The destination Host Integrity Profile(s)
- destinations string[]
- The destination address(es)
- device string
- The device in which the resource is defined
- devices string[]
- Devices
- disabled boolean
- Is the security rule disabled?
- folder string
- The folder in which the resource is defined
- froms string[]
- The source security zone(s)
- id string
- The UUID of the security rule
- log
End boolean - Log at session end?
- log
Setting string - The external log forwarding profile
- log
Settings GetSecurity Rule Log Settings - Log settings
- log
Start boolean - Log at session start?
- name string
- The name of the security rule
- negate
Destination boolean - Negate the destination addresses(es)?
- negate
Source boolean - Negate the source address(es)?
- negate
User boolean - Negate user
- policy
Type string - Policy type
- position string
- The position of a security rule
- profile
Setting GetSecurity Rule Profile Setting - The security profile object
- relative
Position string - Relative positioning rule. String must be one of these:
"before","after","top","bottom". If not specified, rule is created at the bottom of the ruleset. - schedule string
- Schedule in which this rule will be applied
- security
Settings GetSecurity Rule Security Settings - Security settings
- services string[]
- The service(s) being accessed
- snippet string
- The snippet in which the resource is defined
- source
Hips string[] - The source Host Integrity Profile(s)
- source
Users string[] - List of source users and/or groups. Reserved words include
any,pre-login,known-user, andunknown. - sources string[]
- The source addresses(es)
- string[]
- The tags associated with the security rule
- target
Rule string - The name or UUID of the rule to position this rule relative to. Required when
relative_positionis"before"or"after". - tenant
Restrictions string[] - Tenant restrictions
- tfid string
- tos string[]
- The destination security zone(s)
- action str
- The action to be taken when the rule is matched
- allow_
url_ Sequence[Getcategories Security Rule Allow Url Category] - Allow url category
- allow_
web_ Sequence[Getapplications Security Rule Allow Web Application] - Allow web application
- applications Sequence[str]
- The application(s) being accessed
- block_
url_ Sequence[str]categories - Block url category
- block_
web_ Sequence[str]applications - Block web application
- categories Sequence[str]
- The URL categories being accessed
- default_
profile_ Getsettings Security Rule Default Profile Settings - Default profile settings
- description str
- The description of the security rule
- destination_
hips Sequence[str] - The destination Host Integrity Profile(s)
- destinations Sequence[str]
- The destination address(es)
- device str
- The device in which the resource is defined
- devices Sequence[str]
- Devices
- disabled bool
- Is the security rule disabled?
- folder str
- The folder in which the resource is defined
- froms Sequence[str]
- The source security zone(s)
- id str
- The UUID of the security rule
- log_
end bool - Log at session end?
- log_
setting str - The external log forwarding profile
- log_
settings GetSecurity Rule Log Settings - Log settings
- log_
start bool - Log at session start?
- name str
- The name of the security rule
- negate_
destination bool - Negate the destination addresses(es)?
- negate_
source bool - Negate the source address(es)?
- negate_
user bool - Negate user
- policy_
type str - Policy type
- position str
- The position of a security rule
- profile_
setting GetSecurity Rule Profile Setting - The security profile object
- relative_
position str - Relative positioning rule. String must be one of these:
"before","after","top","bottom". If not specified, rule is created at the bottom of the ruleset. - schedule str
- Schedule in which this rule will be applied
- security_
settings GetSecurity Rule Security Settings - Security settings
- services Sequence[str]
- The service(s) being accessed
- snippet str
- The snippet in which the resource is defined
- source_
hips Sequence[str] - The source Host Integrity Profile(s)
- source_
users Sequence[str] - List of source users and/or groups. Reserved words include
any,pre-login,known-user, andunknown. - sources Sequence[str]
- The source addresses(es)
- Sequence[str]
- The tags associated with the security rule
- target_
rule str - The name or UUID of the rule to position this rule relative to. Required when
relative_positionis"before"or"after". - tenant_
restrictions Sequence[str] - Tenant restrictions
- tfid str
- tos Sequence[str]
- The destination security zone(s)
- action String
- The action to be taken when the rule is matched
- allow
Url List<Property Map>Categories - Allow url category
- allow
Web List<Property Map>Applications - Allow web application
- applications List<String>
- The application(s) being accessed
- block
Url List<String>Categories - Block url category
- block
Web List<String>Applications - Block web application
- categories List<String>
- The URL categories being accessed
- default
Profile Property MapSettings - Default profile settings
- description String
- The description of the security rule
- destination
Hips List<String> - The destination Host Integrity Profile(s)
- destinations List<String>
- The destination address(es)
- device String
- The device in which the resource is defined
- devices List<String>
- Devices
- disabled Boolean
- Is the security rule disabled?
- folder String
- The folder in which the resource is defined
- froms List<String>
- The source security zone(s)
- id String
- The UUID of the security rule
- log
End Boolean - Log at session end?
- log
Setting String - The external log forwarding profile
- log
Settings Property Map - Log settings
- log
Start Boolean - Log at session start?
- name String
- The name of the security rule
- negate
Destination Boolean - Negate the destination addresses(es)?
- negate
Source Boolean - Negate the source address(es)?
- negate
User Boolean - Negate user
- policy
Type String - Policy type
- position String
- The position of a security rule
- profile
Setting Property Map - The security profile object
- relative
Position String - Relative positioning rule. String must be one of these:
"before","after","top","bottom". If not specified, rule is created at the bottom of the ruleset. - schedule String
- Schedule in which this rule will be applied
- security
Settings Property Map - Security settings
- services List<String>
- The service(s) being accessed
- snippet String
- The snippet in which the resource is defined
- source
Hips List<String> - The source Host Integrity Profile(s)
- source
Users List<String> - List of source users and/or groups. Reserved words include
any,pre-login,known-user, andunknown. - sources List<String>
- The source addresses(es)
- List<String>
- The tags associated with the security rule
- target
Rule String - The name or UUID of the rule to position this rule relative to. Required when
relative_positionis"before"or"after". - tenant
Restrictions List<String> - Tenant restrictions
- tfid String
- tos List<String>
- The destination security zone(s)
Supporting Types
GetSecurityRuleAllowUrlCategory
- Additional
Action string - Additional action
- Credential
Enforcement string - Credential enforcement
- Decryption string
- Decryption
- Dlp string
- Dlp
- File
Control GetSecurity Rule Allow Url Category File Control - File control
- Isolation
Profiles string - Isolation profiles
- Name string
- Name
- Additional
Action string - Additional action
- Credential
Enforcement string - Credential enforcement
- Decryption string
- Decryption
- Dlp string
- Dlp
- File
Control GetSecurity Rule Allow Url Category File Control - File control
- Isolation
Profiles string - Isolation profiles
- Name string
- Name
- additional
Action String - Additional action
- credential
Enforcement String - Credential enforcement
- decryption String
- Decryption
- dlp String
- Dlp
- file
Control GetSecurity Rule Allow Url Category File Control - File control
- isolation
Profiles String - Isolation profiles
- name String
- Name
- additional
Action string - Additional action
- credential
Enforcement string - Credential enforcement
- decryption string
- Decryption
- dlp string
- Dlp
- file
Control GetSecurity Rule Allow Url Category File Control - File control
- isolation
Profiles string - Isolation profiles
- name string
- Name
- additional_
action str - Additional action
- credential_
enforcement str - Credential enforcement
- decryption str
- Decryption
- dlp str
- Dlp
- file_
control GetSecurity Rule Allow Url Category File Control - File control
- isolation_
profiles str - Isolation profiles
- name str
- Name
- additional
Action String - Additional action
- credential
Enforcement String - Credential enforcement
- decryption String
- Decryption
- dlp String
- Dlp
- file
Control Property Map - File control
- isolation
Profiles String - Isolation profiles
- name String
- Name
GetSecurityRuleAllowUrlCategoryFileControl
GetSecurityRuleAllowWebApplication
- Application
Functions List<string> - Application function
- Dlp string
- Dlp
- File
Control GetSecurity Rule Allow Web Application File Control - File control
- Name string
- Name
- Saas
Enterprise GetControl Security Rule Allow Web Application Saas Enterprise Control - Saas enterprise control
- Saas
Tenant List<string>Lists - Saas tenant list
- Saas
User List<string>Lists - Saas user list
- Tenant
Control GetSecurity Rule Allow Web Application Tenant Control - Tenant control
- Type string
- Type
- Application
Functions []string - Application function
- Dlp string
- Dlp
- File
Control GetSecurity Rule Allow Web Application File Control - File control
- Name string
- Name
- Saas
Enterprise GetControl Security Rule Allow Web Application Saas Enterprise Control - Saas enterprise control
- Saas
Tenant []stringLists - Saas tenant list
- Saas
User []stringLists - Saas user list
- Tenant
Control GetSecurity Rule Allow Web Application Tenant Control - Tenant control
- Type string
- Type
- application
Functions List<String> - Application function
- dlp String
- Dlp
- file
Control GetSecurity Rule Allow Web Application File Control - File control
- name String
- Name
- saas
Enterprise GetControl Security Rule Allow Web Application Saas Enterprise Control - Saas enterprise control
- saas
Tenant List<String>Lists - Saas tenant list
- saas
User List<String>Lists - Saas user list
- tenant
Control GetSecurity Rule Allow Web Application Tenant Control - Tenant control
- type String
- Type
- application
Functions string[] - Application function
- dlp string
- Dlp
- file
Control GetSecurity Rule Allow Web Application File Control - File control
- name string
- Name
- saas
Enterprise GetControl Security Rule Allow Web Application Saas Enterprise Control - Saas enterprise control
- saas
Tenant string[]Lists - Saas tenant list
- saas
User string[]Lists - Saas user list
- tenant
Control GetSecurity Rule Allow Web Application Tenant Control - Tenant control
- type string
- Type
- application_
functions Sequence[str] - Application function
- dlp str
- Dlp
- file_
control GetSecurity Rule Allow Web Application File Control - File control
- name str
- Name
- saas_
enterprise_ Getcontrol Security Rule Allow Web Application Saas Enterprise Control - Saas enterprise control
- saas_
tenant_ Sequence[str]lists - Saas tenant list
- saas_
user_ Sequence[str]lists - Saas user list
- tenant_
control GetSecurity Rule Allow Web Application Tenant Control - Tenant control
- type str
- Type
- application
Functions List<String> - Application function
- dlp String
- Dlp
- file
Control Property Map - File control
- name String
- Name
- saas
Enterprise Property MapControl - Saas enterprise control
- saas
Tenant List<String>Lists - Saas tenant list
- saas
User List<String>Lists - Saas user list
- tenant
Control Property Map - Tenant control
- type String
- Type
GetSecurityRuleAllowWebApplicationFileControl
GetSecurityRuleAllowWebApplicationSaasEnterpriseControl
- consumer
Access Property Map - Consumer access
- enterprise
Access Property Map - Enterprise access
GetSecurityRuleAllowWebApplicationSaasEnterpriseControlConsumerAccess
- Enable string
- Enable
- Enable string
- Enable
- enable String
- Enable
- enable string
- Enable
- enable str
- Enable
- enable String
- Enable
GetSecurityRuleAllowWebApplicationSaasEnterpriseControlEnterpriseAccess
- Enable string
- Enable
- Tenant
Restrictions List<string> - Tenant restrictions
- Enable string
- Enable
- Tenant
Restrictions []string - Tenant restrictions
- enable String
- Enable
- tenant
Restrictions List<String> - Tenant restrictions
- enable string
- Enable
- tenant
Restrictions string[] - Tenant restrictions
- enable str
- Enable
- tenant_
restrictions Sequence[str] - Tenant restrictions
- enable String
- Enable
- tenant
Restrictions List<String> - Tenant restrictions
GetSecurityRuleAllowWebApplicationTenantControl
- Allowed
Activities List<string> - Allowed activities
- Blocked
Activities List<string> - Blocked activities
- Parent
Application string - Parent application
- Tenants List<string>
- Tenants
- Allowed
Activities []string - Allowed activities
- Blocked
Activities []string - Blocked activities
- Parent
Application string - Parent application
- Tenants []string
- Tenants
- allowed
Activities List<String> - Allowed activities
- blocked
Activities List<String> - Blocked activities
- parent
Application String - Parent application
- tenants List<String>
- Tenants
- allowed
Activities string[] - Allowed activities
- blocked
Activities string[] - Blocked activities
- parent
Application string - Parent application
- tenants string[]
- Tenants
- allowed_
activities Sequence[str] - Allowed activities
- blocked_
activities Sequence[str] - Blocked activities
- parent_
application str - Parent application
- tenants Sequence[str]
- Tenants
- allowed
Activities List<String> - Allowed activities
- blocked
Activities List<String> - Blocked activities
- parent
Application String - Parent application
- tenants List<String>
- Tenants
GetSecurityRuleDefaultProfileSettings
- Dlp string
- Dlp
- File
Control GetSecurity Rule Default Profile Settings File Control - File control
- Dlp string
- Dlp
- File
Control GetSecurity Rule Default Profile Settings File Control - File control
- dlp String
- Dlp
- file
Control GetSecurity Rule Default Profile Settings File Control - File control
- dlp string
- Dlp
- file
Control GetSecurity Rule Default Profile Settings File Control - File control
- dlp str
- Dlp
- file_
control GetSecurity Rule Default Profile Settings File Control - File control
- dlp String
- Dlp
- file
Control Property Map - File control
GetSecurityRuleDefaultProfileSettingsFileControl
GetSecurityRuleLogSettings
- Log
Sessions bool - Log sessions
- Log
Sessions bool - Log sessions
- log
Sessions Boolean - Log sessions
- log
Sessions boolean - Log sessions
- log_
sessions bool - Log sessions
- log
Sessions Boolean - Log sessions
GetSecurityRuleProfileSetting
- Groups List<string>
- The security profile group
- Groups []string
- The security profile group
- groups List<String>
- The security profile group
- groups string[]
- The security profile group
- groups Sequence[str]
- The security profile group
- groups List<String>
- The security profile group
GetSecurityRuleSecuritySettings
- Anti
Spyware string - Anti spyware
- Virus
And stringWildfire Analysis - Virus and wildfire analysis
- Vulnerability string
- Vulnerability
- Anti
Spyware string - Anti spyware
- Virus
And stringWildfire Analysis - Virus and wildfire analysis
- Vulnerability string
- Vulnerability
- anti
Spyware String - Anti spyware
- virus
And StringWildfire Analysis - Virus and wildfire analysis
- vulnerability String
- Vulnerability
- anti
Spyware string - Anti spyware
- virus
And stringWildfire Analysis - Virus and wildfire analysis
- vulnerability string
- Vulnerability
- anti_
spyware str - Anti spyware
- virus_
and_ strwildfire_ analysis - Virus and wildfire analysis
- vulnerability str
- Vulnerability
- anti
Spyware String - Anti spyware
- virus
And StringWildfire Analysis - Virus and wildfire analysis
- vulnerability String
- Vulnerability
Package Details
- Repository
- scm pulumi/pulumi-scm
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
scmTerraform Provider.
Strata Cloud Manager v0.4.3 published on Saturday, Nov 8, 2025 by Pulumi
