1. Packages
  2. Sysdig Provider
  3. API Docs
  4. SecurePolicy
sysdig 1.56.0 published on Wednesday, Apr 30, 2025 by sysdiglabs

sysdig.SecurePolicy

Explore with Pulumi AI

sysdig logo
sysdig 1.56.0 published on Wednesday, Apr 30, 2025 by sysdiglabs

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as sysdig from "@pulumi/sysdig";
    
    const emailNotificationChannel = sysdig.getSecureNotificationChannel({
        name: "Test Email Channel",
    });
    const writeAptDatabase = new sysdig.SecurePolicy("writeAptDatabase", {
        description: "an attempt to write to the dpkg database by any non-dpkg related program",
        severity: 4,
        enabled: true,
        runbook: "https://runbook.com",
        scope: "container.id != \"\"",
        ruleNames: ["Terminal shell in container"],
        actions: [{
            container: "stop",
            captures: [{
                secondsBeforeEvent: 5,
                secondsAfterEvent: 10,
            }],
        }],
        notificationChannels: [emailNotificationChannel.then(emailNotificationChannel => emailNotificationChannel.id)],
    });
    
    import pulumi
    import pulumi_sysdig as sysdig
    
    email_notification_channel = sysdig.get_secure_notification_channel(name="Test Email Channel")
    write_apt_database = sysdig.SecurePolicy("writeAptDatabase",
        description="an attempt to write to the dpkg database by any non-dpkg related program",
        severity=4,
        enabled=True,
        runbook="https://runbook.com",
        scope="container.id != \"\"",
        rule_names=["Terminal shell in container"],
        actions=[{
            "container": "stop",
            "captures": [{
                "seconds_before_event": 5,
                "seconds_after_event": 10,
            }],
        }],
        notification_channels=[email_notification_channel.id])
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/sysdig/sysdig"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		emailNotificationChannel, err := sysdig.GetSecureNotificationChannel(ctx, &sysdig.GetSecureNotificationChannelArgs{
    			Name: "Test Email Channel",
    		}, nil)
    		if err != nil {
    			return err
    		}
    		_, err = sysdig.NewSecurePolicy(ctx, "writeAptDatabase", &sysdig.SecurePolicyArgs{
    			Description: pulumi.String("an attempt to write to the dpkg database by any non-dpkg related program"),
    			Severity:    pulumi.Float64(4),
    			Enabled:     pulumi.Bool(true),
    			Runbook:     pulumi.String("https://runbook.com"),
    			Scope:       pulumi.String("container.id != \"\""),
    			RuleNames: pulumi.StringArray{
    				pulumi.String("Terminal shell in container"),
    			},
    			Actions: sysdig.SecurePolicyActionArray{
    				&sysdig.SecurePolicyActionArgs{
    					Container: pulumi.String("stop"),
    					Captures: sysdig.SecurePolicyActionCaptureArray{
    						&sysdig.SecurePolicyActionCaptureArgs{
    							SecondsBeforeEvent: pulumi.Float64(5),
    							SecondsAfterEvent:  pulumi.Float64(10),
    						},
    					},
    				},
    			},
    			NotificationChannels: pulumi.Float64Array{
    				pulumi.String(emailNotificationChannel.Id),
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Sysdig = Pulumi.Sysdig;
    
    return await Deployment.RunAsync(() => 
    {
        var emailNotificationChannel = Sysdig.GetSecureNotificationChannel.Invoke(new()
        {
            Name = "Test Email Channel",
        });
    
        var writeAptDatabase = new Sysdig.SecurePolicy("writeAptDatabase", new()
        {
            Description = "an attempt to write to the dpkg database by any non-dpkg related program",
            Severity = 4,
            Enabled = true,
            Runbook = "https://runbook.com",
            Scope = "container.id != \"\"",
            RuleNames = new[]
            {
                "Terminal shell in container",
            },
            Actions = new[]
            {
                new Sysdig.Inputs.SecurePolicyActionArgs
                {
                    Container = "stop",
                    Captures = new[]
                    {
                        new Sysdig.Inputs.SecurePolicyActionCaptureArgs
                        {
                            SecondsBeforeEvent = 5,
                            SecondsAfterEvent = 10,
                        },
                    },
                },
            },
            NotificationChannels = new[]
            {
                emailNotificationChannel.Apply(getSecureNotificationChannelResult => getSecureNotificationChannelResult.Id),
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.sysdig.SysdigFunctions;
    import com.pulumi.sysdig.inputs.GetSecureNotificationChannelArgs;
    import com.pulumi.sysdig.SecurePolicy;
    import com.pulumi.sysdig.SecurePolicyArgs;
    import com.pulumi.sysdig.inputs.SecurePolicyActionArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            final var emailNotificationChannel = SysdigFunctions.getSecureNotificationChannel(GetSecureNotificationChannelArgs.builder()
                .name("Test Email Channel")
                .build());
    
            var writeAptDatabase = new SecurePolicy("writeAptDatabase", SecurePolicyArgs.builder()
                .description("an attempt to write to the dpkg database by any non-dpkg related program")
                .severity(4)
                .enabled(true)
                .runbook("https://runbook.com")
                .scope("container.id != \"\"")
                .ruleNames("Terminal shell in container")
                .actions(SecurePolicyActionArgs.builder()
                    .container("stop")
                    .captures(SecurePolicyActionCaptureArgs.builder()
                        .secondsBeforeEvent(5)
                        .secondsAfterEvent(10)
                        .build())
                    .build())
                .notificationChannels(emailNotificationChannel.applyValue(getSecureNotificationChannelResult -> getSecureNotificationChannelResult.id()))
                .build());
    
        }
    }
    
    resources:
      writeAptDatabase:
        type: sysdig:SecurePolicy
        properties:
          description: an attempt to write to the dpkg database by any non-dpkg related program
          severity: 4
          enabled: true
          runbook: https://runbook.com
          # Scope selection
          scope: container.id != ""
          # Rule selection
          ruleNames:
            - Terminal shell in container
          actions:
            - container: stop
              captures:
                - secondsBeforeEvent: 5
                  secondsAfterEvent: 10
          notificationChannels:
            - ${emailNotificationChannel.id}
    variables:
      emailNotificationChannel:
        fn::invoke:
          function: sysdig:getSecureNotificationChannel
          arguments:
            name: Test Email Channel
    

    Create SecurePolicy Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new SecurePolicy(name: string, args: SecurePolicyArgs, opts?: CustomResourceOptions);
    @overload
    def SecurePolicy(resource_name: str,
                     args: SecurePolicyArgs,
                     opts: Optional[ResourceOptions] = None)
    
    @overload
    def SecurePolicy(resource_name: str,
                     opts: Optional[ResourceOptions] = None,
                     description: Optional[str] = None,
                     actions: Optional[Sequence[SecurePolicyActionArgs]] = None,
                     enabled: Optional[bool] = None,
                     name: Optional[str] = None,
                     notification_channels: Optional[Sequence[float]] = None,
                     rule_names: Optional[Sequence[str]] = None,
                     runbook: Optional[str] = None,
                     scope: Optional[str] = None,
                     secure_policy_id: Optional[str] = None,
                     severity: Optional[float] = None,
                     timeouts: Optional[SecurePolicyTimeoutsArgs] = None,
                     type: Optional[str] = None)
    func NewSecurePolicy(ctx *Context, name string, args SecurePolicyArgs, opts ...ResourceOption) (*SecurePolicy, error)
    public SecurePolicy(string name, SecurePolicyArgs args, CustomResourceOptions? opts = null)
    public SecurePolicy(String name, SecurePolicyArgs args)
    public SecurePolicy(String name, SecurePolicyArgs args, CustomResourceOptions options)
    
    type: sysdig:SecurePolicy
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args SecurePolicyArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args SecurePolicyArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args SecurePolicyArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args SecurePolicyArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args SecurePolicyArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var securePolicyResource = new Sysdig.SecurePolicy("securePolicyResource", new()
    {
        Description = "string",
        Actions = new[]
        {
            new Sysdig.Inputs.SecurePolicyActionArgs
            {
                Captures = new[]
                {
                    new Sysdig.Inputs.SecurePolicyActionCaptureArgs
                    {
                        Name = "string",
                        SecondsAfterEvent = 0,
                        SecondsBeforeEvent = 0,
                        BucketName = "string",
                        Filter = "string",
                        Folder = "string",
                    },
                },
                Container = "string",
                KillProcess = false,
            },
        },
        Enabled = false,
        Name = "string",
        NotificationChannels = new[]
        {
            0,
        },
        RuleNames = new[]
        {
            "string",
        },
        Runbook = "string",
        Scope = "string",
        SecurePolicyId = "string",
        Severity = 0,
        Timeouts = new Sysdig.Inputs.SecurePolicyTimeoutsArgs
        {
            Create = "string",
            Delete = "string",
            Read = "string",
            Update = "string",
        },
        Type = "string",
    });
    
    example, err := sysdig.NewSecurePolicy(ctx, "securePolicyResource", &sysdig.SecurePolicyArgs{
    	Description: pulumi.String("string"),
    	Actions: sysdig.SecurePolicyActionArray{
    		&sysdig.SecurePolicyActionArgs{
    			Captures: sysdig.SecurePolicyActionCaptureArray{
    				&sysdig.SecurePolicyActionCaptureArgs{
    					Name:               pulumi.String("string"),
    					SecondsAfterEvent:  pulumi.Float64(0),
    					SecondsBeforeEvent: pulumi.Float64(0),
    					BucketName:         pulumi.String("string"),
    					Filter:             pulumi.String("string"),
    					Folder:             pulumi.String("string"),
    				},
    			},
    			Container:   pulumi.String("string"),
    			KillProcess: pulumi.Bool(false),
    		},
    	},
    	Enabled: pulumi.Bool(false),
    	Name:    pulumi.String("string"),
    	NotificationChannels: pulumi.Float64Array{
    		pulumi.Float64(0),
    	},
    	RuleNames: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	Runbook:        pulumi.String("string"),
    	Scope:          pulumi.String("string"),
    	SecurePolicyId: pulumi.String("string"),
    	Severity:       pulumi.Float64(0),
    	Timeouts: &sysdig.SecurePolicyTimeoutsArgs{
    		Create: pulumi.String("string"),
    		Delete: pulumi.String("string"),
    		Read:   pulumi.String("string"),
    		Update: pulumi.String("string"),
    	},
    	Type: pulumi.String("string"),
    })
    
    var securePolicyResource = new SecurePolicy("securePolicyResource", SecurePolicyArgs.builder()
        .description("string")
        .actions(SecurePolicyActionArgs.builder()
            .captures(SecurePolicyActionCaptureArgs.builder()
                .name("string")
                .secondsAfterEvent(0)
                .secondsBeforeEvent(0)
                .bucketName("string")
                .filter("string")
                .folder("string")
                .build())
            .container("string")
            .killProcess(false)
            .build())
        .enabled(false)
        .name("string")
        .notificationChannels(0)
        .ruleNames("string")
        .runbook("string")
        .scope("string")
        .securePolicyId("string")
        .severity(0)
        .timeouts(SecurePolicyTimeoutsArgs.builder()
            .create("string")
            .delete("string")
            .read("string")
            .update("string")
            .build())
        .type("string")
        .build());
    
    secure_policy_resource = sysdig.SecurePolicy("securePolicyResource",
        description="string",
        actions=[{
            "captures": [{
                "name": "string",
                "seconds_after_event": 0,
                "seconds_before_event": 0,
                "bucket_name": "string",
                "filter": "string",
                "folder": "string",
            }],
            "container": "string",
            "kill_process": False,
        }],
        enabled=False,
        name="string",
        notification_channels=[0],
        rule_names=["string"],
        runbook="string",
        scope="string",
        secure_policy_id="string",
        severity=0,
        timeouts={
            "create": "string",
            "delete": "string",
            "read": "string",
            "update": "string",
        },
        type="string")
    
    const securePolicyResource = new sysdig.SecurePolicy("securePolicyResource", {
        description: "string",
        actions: [{
            captures: [{
                name: "string",
                secondsAfterEvent: 0,
                secondsBeforeEvent: 0,
                bucketName: "string",
                filter: "string",
                folder: "string",
            }],
            container: "string",
            killProcess: false,
        }],
        enabled: false,
        name: "string",
        notificationChannels: [0],
        ruleNames: ["string"],
        runbook: "string",
        scope: "string",
        securePolicyId: "string",
        severity: 0,
        timeouts: {
            create: "string",
            "delete": "string",
            read: "string",
            update: "string",
        },
        type: "string",
    });
    
    type: sysdig:SecurePolicy
    properties:
        actions:
            - captures:
                - bucketName: string
                  filter: string
                  folder: string
                  name: string
                  secondsAfterEvent: 0
                  secondsBeforeEvent: 0
              container: string
              killProcess: false
        description: string
        enabled: false
        name: string
        notificationChannels:
            - 0
        ruleNames:
            - string
        runbook: string
        scope: string
        securePolicyId: string
        severity: 0
        timeouts:
            create: string
            delete: string
            read: string
            update: string
        type: string
    

    SecurePolicy Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The SecurePolicy resource accepts the following input properties:

    Description string
    The description of Secure policy.
    Actions List<SecurePolicyAction>
    Enabled bool
    Will secure process with this rule?. By default this is true.
    Name string
    The name of the Secure policy. It must be unique.
    NotificationChannels List<double>
    RuleNames List<string>
    Runbook string
    Customer provided url that provides a runbook for a given policy.


    Scope string
    SecurePolicyId string
    Severity double
    The severity of Secure policy. The accepted values are: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).
    Timeouts SecurePolicyTimeouts
    Type string
    Specifies the type of the runtime policy. Must be one of: falco, list_matching, k8s_audit, aws_cloudtrail, gcp_auditlog, azure_platformlogs, awscloudtrail, okta, github, guardduty. By default it is falco.
    Description string
    The description of Secure policy.
    Actions []SecurePolicyActionArgs
    Enabled bool
    Will secure process with this rule?. By default this is true.
    Name string
    The name of the Secure policy. It must be unique.
    NotificationChannels []float64
    RuleNames []string
    Runbook string
    Customer provided url that provides a runbook for a given policy.


    Scope string
    SecurePolicyId string
    Severity float64
    The severity of Secure policy. The accepted values are: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).
    Timeouts SecurePolicyTimeoutsArgs
    Type string
    Specifies the type of the runtime policy. Must be one of: falco, list_matching, k8s_audit, aws_cloudtrail, gcp_auditlog, azure_platformlogs, awscloudtrail, okta, github, guardduty. By default it is falco.
    description String
    The description of Secure policy.
    actions List<SecurePolicyAction>
    enabled Boolean
    Will secure process with this rule?. By default this is true.
    name String
    The name of the Secure policy. It must be unique.
    notificationChannels List<Double>
    ruleNames List<String>
    runbook String
    Customer provided url that provides a runbook for a given policy.


    scope String
    securePolicyId String
    severity Double
    The severity of Secure policy. The accepted values are: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).
    timeouts SecurePolicyTimeouts
    type String
    Specifies the type of the runtime policy. Must be one of: falco, list_matching, k8s_audit, aws_cloudtrail, gcp_auditlog, azure_platformlogs, awscloudtrail, okta, github, guardduty. By default it is falco.
    description string
    The description of Secure policy.
    actions SecurePolicyAction[]
    enabled boolean
    Will secure process with this rule?. By default this is true.
    name string
    The name of the Secure policy. It must be unique.
    notificationChannels number[]
    ruleNames string[]
    runbook string
    Customer provided url that provides a runbook for a given policy.


    scope string
    securePolicyId string
    severity number
    The severity of Secure policy. The accepted values are: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).
    timeouts SecurePolicyTimeouts
    type string
    Specifies the type of the runtime policy. Must be one of: falco, list_matching, k8s_audit, aws_cloudtrail, gcp_auditlog, azure_platformlogs, awscloudtrail, okta, github, guardduty. By default it is falco.
    description str
    The description of Secure policy.
    actions Sequence[SecurePolicyActionArgs]
    enabled bool
    Will secure process with this rule?. By default this is true.
    name str
    The name of the Secure policy. It must be unique.
    notification_channels Sequence[float]
    rule_names Sequence[str]
    runbook str
    Customer provided url that provides a runbook for a given policy.


    scope str
    secure_policy_id str
    severity float
    The severity of Secure policy. The accepted values are: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).
    timeouts SecurePolicyTimeoutsArgs
    type str
    Specifies the type of the runtime policy. Must be one of: falco, list_matching, k8s_audit, aws_cloudtrail, gcp_auditlog, azure_platformlogs, awscloudtrail, okta, github, guardduty. By default it is falco.
    description String
    The description of Secure policy.
    actions List<Property Map>
    enabled Boolean
    Will secure process with this rule?. By default this is true.
    name String
    The name of the Secure policy. It must be unique.
    notificationChannels List<Number>
    ruleNames List<String>
    runbook String
    Customer provided url that provides a runbook for a given policy.


    scope String
    securePolicyId String
    severity Number
    The severity of Secure policy. The accepted values are: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).
    timeouts Property Map
    type String
    Specifies the type of the runtime policy. Must be one of: falco, list_matching, k8s_audit, aws_cloudtrail, gcp_auditlog, azure_platformlogs, awscloudtrail, okta, github, guardduty. By default it is falco.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the SecurePolicy resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Version double
    Id string
    The provider-assigned unique ID for this managed resource.
    Version float64
    id String
    The provider-assigned unique ID for this managed resource.
    version Double
    id string
    The provider-assigned unique ID for this managed resource.
    version number
    id str
    The provider-assigned unique ID for this managed resource.
    version float
    id String
    The provider-assigned unique ID for this managed resource.
    version Number

    Look up Existing SecurePolicy Resource

    Get an existing SecurePolicy resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: SecurePolicyState, opts?: CustomResourceOptions): SecurePolicy
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            actions: Optional[Sequence[SecurePolicyActionArgs]] = None,
            description: Optional[str] = None,
            enabled: Optional[bool] = None,
            name: Optional[str] = None,
            notification_channels: Optional[Sequence[float]] = None,
            rule_names: Optional[Sequence[str]] = None,
            runbook: Optional[str] = None,
            scope: Optional[str] = None,
            secure_policy_id: Optional[str] = None,
            severity: Optional[float] = None,
            timeouts: Optional[SecurePolicyTimeoutsArgs] = None,
            type: Optional[str] = None,
            version: Optional[float] = None) -> SecurePolicy
    func GetSecurePolicy(ctx *Context, name string, id IDInput, state *SecurePolicyState, opts ...ResourceOption) (*SecurePolicy, error)
    public static SecurePolicy Get(string name, Input<string> id, SecurePolicyState? state, CustomResourceOptions? opts = null)
    public static SecurePolicy get(String name, Output<String> id, SecurePolicyState state, CustomResourceOptions options)
    resources:  _:    type: sysdig:SecurePolicy    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    Actions List<SecurePolicyAction>
    Description string
    The description of Secure policy.
    Enabled bool
    Will secure process with this rule?. By default this is true.
    Name string
    The name of the Secure policy. It must be unique.
    NotificationChannels List<double>
    RuleNames List<string>
    Runbook string
    Customer provided url that provides a runbook for a given policy.


    Scope string
    SecurePolicyId string
    Severity double
    The severity of Secure policy. The accepted values are: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).
    Timeouts SecurePolicyTimeouts
    Type string
    Specifies the type of the runtime policy. Must be one of: falco, list_matching, k8s_audit, aws_cloudtrail, gcp_auditlog, azure_platformlogs, awscloudtrail, okta, github, guardduty. By default it is falco.
    Version double
    Actions []SecurePolicyActionArgs
    Description string
    The description of Secure policy.
    Enabled bool
    Will secure process with this rule?. By default this is true.
    Name string
    The name of the Secure policy. It must be unique.
    NotificationChannels []float64
    RuleNames []string
    Runbook string
    Customer provided url that provides a runbook for a given policy.


    Scope string
    SecurePolicyId string
    Severity float64
    The severity of Secure policy. The accepted values are: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).
    Timeouts SecurePolicyTimeoutsArgs
    Type string
    Specifies the type of the runtime policy. Must be one of: falco, list_matching, k8s_audit, aws_cloudtrail, gcp_auditlog, azure_platformlogs, awscloudtrail, okta, github, guardduty. By default it is falco.
    Version float64
    actions List<SecurePolicyAction>
    description String
    The description of Secure policy.
    enabled Boolean
    Will secure process with this rule?. By default this is true.
    name String
    The name of the Secure policy. It must be unique.
    notificationChannels List<Double>
    ruleNames List<String>
    runbook String
    Customer provided url that provides a runbook for a given policy.


    scope String
    securePolicyId String
    severity Double
    The severity of Secure policy. The accepted values are: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).
    timeouts SecurePolicyTimeouts
    type String
    Specifies the type of the runtime policy. Must be one of: falco, list_matching, k8s_audit, aws_cloudtrail, gcp_auditlog, azure_platformlogs, awscloudtrail, okta, github, guardduty. By default it is falco.
    version Double
    actions SecurePolicyAction[]
    description string
    The description of Secure policy.
    enabled boolean
    Will secure process with this rule?. By default this is true.
    name string
    The name of the Secure policy. It must be unique.
    notificationChannels number[]
    ruleNames string[]
    runbook string
    Customer provided url that provides a runbook for a given policy.


    scope string
    securePolicyId string
    severity number
    The severity of Secure policy. The accepted values are: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).
    timeouts SecurePolicyTimeouts
    type string
    Specifies the type of the runtime policy. Must be one of: falco, list_matching, k8s_audit, aws_cloudtrail, gcp_auditlog, azure_platformlogs, awscloudtrail, okta, github, guardduty. By default it is falco.
    version number
    actions Sequence[SecurePolicyActionArgs]
    description str
    The description of Secure policy.
    enabled bool
    Will secure process with this rule?. By default this is true.
    name str
    The name of the Secure policy. It must be unique.
    notification_channels Sequence[float]
    rule_names Sequence[str]
    runbook str
    Customer provided url that provides a runbook for a given policy.


    scope str
    secure_policy_id str
    severity float
    The severity of Secure policy. The accepted values are: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).
    timeouts SecurePolicyTimeoutsArgs
    type str
    Specifies the type of the runtime policy. Must be one of: falco, list_matching, k8s_audit, aws_cloudtrail, gcp_auditlog, azure_platformlogs, awscloudtrail, okta, github, guardduty. By default it is falco.
    version float
    actions List<Property Map>
    description String
    The description of Secure policy.
    enabled Boolean
    Will secure process with this rule?. By default this is true.
    name String
    The name of the Secure policy. It must be unique.
    notificationChannels List<Number>
    ruleNames List<String>
    runbook String
    Customer provided url that provides a runbook for a given policy.


    scope String
    securePolicyId String
    severity Number
    The severity of Secure policy. The accepted values are: 0, 1, 2, 3 (High), 4, 5 (Medium), 6 (Low) and 7 (Info). The default value is 4 (Medium).
    timeouts Property Map
    type String
    Specifies the type of the runtime policy. Must be one of: falco, list_matching, k8s_audit, aws_cloudtrail, gcp_auditlog, azure_platformlogs, awscloudtrail, okta, github, guardduty. By default it is falco.
    version Number

    Supporting Types

    SecurePolicyAction, SecurePolicyActionArgs

    Captures List<SecurePolicyActionCapture>
    Captures with Sysdig the stream of system calls:
    Container string
    The action applied to container when this Policy is triggered. Can be stop, pause or kill. If this is not specified, no action will be applied at the container level.
    KillProcess bool
    Captures []SecurePolicyActionCapture
    Captures with Sysdig the stream of system calls:
    Container string
    The action applied to container when this Policy is triggered. Can be stop, pause or kill. If this is not specified, no action will be applied at the container level.
    KillProcess bool
    captures List<SecurePolicyActionCapture>
    Captures with Sysdig the stream of system calls:
    container String
    The action applied to container when this Policy is triggered. Can be stop, pause or kill. If this is not specified, no action will be applied at the container level.
    killProcess Boolean
    captures SecurePolicyActionCapture[]
    Captures with Sysdig the stream of system calls:
    container string
    The action applied to container when this Policy is triggered. Can be stop, pause or kill. If this is not specified, no action will be applied at the container level.
    killProcess boolean
    captures Sequence[SecurePolicyActionCapture]
    Captures with Sysdig the stream of system calls:
    container str
    The action applied to container when this Policy is triggered. Can be stop, pause or kill. If this is not specified, no action will be applied at the container level.
    kill_process bool
    captures List<Property Map>
    Captures with Sysdig the stream of system calls:
    container String
    The action applied to container when this Policy is triggered. Can be stop, pause or kill. If this is not specified, no action will be applied at the container level.
    killProcess Boolean

    SecurePolicyActionCapture, SecurePolicyActionCaptureArgs

    Name string
    The name of the Secure policy. It must be unique.
    SecondsAfterEvent double
    Captures the system calls for the amount of seconds after the policy was triggered.
    SecondsBeforeEvent double
    Captures the system calls during the amount of seconds before the policy was triggered.
    BucketName string
    Custom bucket to store capture in, bucket should be onboarded in Integrations > S3 Capture Storage. Default is to use Sysdig Secure Storage
    Filter string
    Additional filter to apply to the capture. For example: proc.name=cat
    Folder string
    Name of folder to store capture inside the bucket. By default we will store the capture file at the root of the bucket


    Name string
    The name of the Secure policy. It must be unique.
    SecondsAfterEvent float64
    Captures the system calls for the amount of seconds after the policy was triggered.
    SecondsBeforeEvent float64
    Captures the system calls during the amount of seconds before the policy was triggered.
    BucketName string
    Custom bucket to store capture in, bucket should be onboarded in Integrations > S3 Capture Storage. Default is to use Sysdig Secure Storage
    Filter string
    Additional filter to apply to the capture. For example: proc.name=cat
    Folder string
    Name of folder to store capture inside the bucket. By default we will store the capture file at the root of the bucket


    name String
    The name of the Secure policy. It must be unique.
    secondsAfterEvent Double
    Captures the system calls for the amount of seconds after the policy was triggered.
    secondsBeforeEvent Double
    Captures the system calls during the amount of seconds before the policy was triggered.
    bucketName String
    Custom bucket to store capture in, bucket should be onboarded in Integrations > S3 Capture Storage. Default is to use Sysdig Secure Storage
    filter String
    Additional filter to apply to the capture. For example: proc.name=cat
    folder String
    Name of folder to store capture inside the bucket. By default we will store the capture file at the root of the bucket


    name string
    The name of the Secure policy. It must be unique.
    secondsAfterEvent number
    Captures the system calls for the amount of seconds after the policy was triggered.
    secondsBeforeEvent number
    Captures the system calls during the amount of seconds before the policy was triggered.
    bucketName string
    Custom bucket to store capture in, bucket should be onboarded in Integrations > S3 Capture Storage. Default is to use Sysdig Secure Storage
    filter string
    Additional filter to apply to the capture. For example: proc.name=cat
    folder string
    Name of folder to store capture inside the bucket. By default we will store the capture file at the root of the bucket


    name str
    The name of the Secure policy. It must be unique.
    seconds_after_event float
    Captures the system calls for the amount of seconds after the policy was triggered.
    seconds_before_event float
    Captures the system calls during the amount of seconds before the policy was triggered.
    bucket_name str
    Custom bucket to store capture in, bucket should be onboarded in Integrations > S3 Capture Storage. Default is to use Sysdig Secure Storage
    filter str
    Additional filter to apply to the capture. For example: proc.name=cat
    folder str
    Name of folder to store capture inside the bucket. By default we will store the capture file at the root of the bucket


    name String
    The name of the Secure policy. It must be unique.
    secondsAfterEvent Number
    Captures the system calls for the amount of seconds after the policy was triggered.
    secondsBeforeEvent Number
    Captures the system calls during the amount of seconds before the policy was triggered.
    bucketName String
    Custom bucket to store capture in, bucket should be onboarded in Integrations > S3 Capture Storage. Default is to use Sysdig Secure Storage
    filter String
    Additional filter to apply to the capture. For example: proc.name=cat
    folder String
    Name of folder to store capture inside the bucket. By default we will store the capture file at the root of the bucket


    SecurePolicyTimeouts, SecurePolicyTimeoutsArgs

    Create string
    Delete string
    Read string
    Update string
    Create string
    Delete string
    Read string
    Update string
    create String
    delete String
    read String
    update String
    create string
    delete string
    read string
    update string
    create str
    delete str
    read str
    update str
    create String
    delete String
    read String
    update String

    Import

    Secure runtime policies can be imported using the ID, e.g.

    $ pulumi import sysdig:index/securePolicy:SecurePolicy example 12345
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    sysdig sysdiglabs/terraform-provider-sysdig
    License
    Notes
    This Pulumi package is based on the sysdig Terraform Provider.
    sysdig logo
    sysdig 1.56.0 published on Wednesday, Apr 30, 2025 by sysdiglabs