@pulumi/scm
Version:
A Pulumi package for managing resources on Strata Cloud Manager.. Based on terraform-provider-scm: version v0.2.1
393 lines (392 loc) • 12.5 kB
TypeScript
import * as pulumi from "@pulumi/pulumi";
import * as inputs from "./types/input";
import * as outputs from "./types/output";
/**
* VulnerabilityProtectionProfile resource
*
* ## Example Usage
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as scm from "@pulumi/scm";
*
* const scmVpProfile1Test = new scm.VulnerabilityProtectionProfile("scm_vp_profile_1_test", {
* folder: "Shared",
* name: "vp-profile-1-test",
* description: "basic profile",
* });
* const scmVpProfile2Test = new scm.VulnerabilityProtectionProfile("scm_vp_profile_2_test", {
* folder: "Shared",
* name: "vp-profile-2-test",
* description: "rules: allow, alert, and drop",
* rules: [
* {
* name: "Rule-Informational-Allow",
* action: {
* allow: {},
* },
* packetCapture: "extended-capture",
* severity: ["informational"],
* category: "scan",
* cve: ["N/A"],
* host: "client",
* vendorId: ["Match Any Vendor"],
* threatName: "30000",
* },
* {
* name: "Rule-Medium-Alert",
* action: {
* alert: {},
* },
* packetCapture: "single-packet",
* severity: ["medium"],
* category: "info-leak",
* cve: ["Match Any CVE"],
* host: "server",
* vendorId: ["MS08-037"],
* threatName: "OpenSSL Threat",
* },
* {
* name: "Rule-Critical-High-Drop",
* action: {
* drop: {},
* },
* packetCapture: "disable",
* severity: [
* "critical",
* "high",
* ],
* category: "overflow",
* cve: ["CVE-2008-1147"],
* host: "any",
* vendorId: ["Match Any Vendor"],
* threatName: "any",
* },
* ],
* });
* const scmVpProfile3Test = new scm.VulnerabilityProtectionProfile("scm_vp_profile_3_test", {
* folder: "Shared",
* name: "vp-profile-3-test",
* description: "rules: reset client, reset server, reset both",
* rules: [
* {
* name: "Rule-Low-Reset_Client",
* action: {
* resetClient: {},
* },
* severity: ["low"],
* category: "protocol-anomaly",
* cve: [
* "CVE-2010-3332",
* "CVE-2019-14537",
* ],
* host: "client",
* vendorId: [
* "MSO5-032",
* "IZ18434",
* ],
* threatName: "30261",
* },
* {
* name: "Rule-Info-Low-Reset_Server",
* action: {
* resetServer: {},
* },
* packetCapture: "disable",
* severity: [
* "informational",
* "low",
* ],
* category: "insecure-credentials",
* cve: ["N/A"],
* host: "server",
* vendorId: ["Match Any Vendor"],
* threatName: "Zone Bypass",
* },
* {
* name: "Rule-Medium-Reset_Both",
* action: {
* resetBoth: {},
* },
* packetCapture: "single-packet",
* severity: ["medium"],
* category: "brute-force",
* cve: [
* "CVE-2012-0175",
* "CVE-2024-6387",
* "CVE-2017-14473",
* ],
* host: "any",
* vendorId: [
* "CORE-1009-0227",
* "SHIRO-550",
* "AST-2012-008",
* ],
* threatName: "any",
* },
* ],
* });
* const scmVpProfile4Test = new scm.VulnerabilityProtectionProfile("scm_vp_profile_4_test", {
* folder: "Shared",
* name: "vp-profile-4-test",
* description: "rules: block ip",
* rules: [
* {
* name: "Rule-High-Critical-Block_IP",
* action: {
* blockIp: {
* duration: 3600,
* trackBy: "source-and-destination",
* },
* },
* severity: [
* "high",
* "critical",
* ],
* category: "insecure-credentials",
* cve: ["N/A"],
* host: "server",
* vendorId: ["Match Any Vendor"],
* threatName: "Zone Credentials",
* },
* {
* name: "Rule-Low-Medium-Block_IP",
* action: {
* blockIp: {
* duration: 2400,
* trackBy: "source-and-destination",
* },
* },
* severity: [
* "low",
* "medium",
* ],
* category: "command-execution",
* cve: ["N/A"],
* host: "server",
* vendorId: ["Match Any Vendor"],
* threatName: "any",
* },
* ],
* });
* const scmVpProfile5Test = new scm.VulnerabilityProtectionProfile("scm_vp_profile_5_test", {
* folder: "Shared",
* name: "vp-profile-5-test",
* description: "override",
* threatExceptions: [{
* name: "12345",
* action: {
* allow: {},
* },
* severity: ["informational"],
* category: "command-execution",
* exemptIp: [{
* name: "192.14.3.100",
* }],
* timeAttribute: {
* interval: 3600,
* threshold: 24000,
* trackBy: "source",
* },
* }],
* });
* const scmVpProfile6Test = new scm.VulnerabilityProtectionProfile("scm_vp_profile_6_test", {
* folder: "Shared",
* name: "vp-profile-6-test",
* description: "mixed",
* rules: [
* {
* name: "Rule-Info-Rest_Both",
* action: {
* allow: {},
* },
* packetCapture: "disable",
* severity: ["informational"],
* category: "exploit-kit",
* cve: ["N/A"],
* host: "client",
* vendorId: ["Match Any Vendor"],
* threatName: "30000",
* },
* {
* name: "Rule-Low-Alert",
* action: {
* alert: {},
* },
* packetCapture: "single-packet",
* severity: ["low"],
* category: "dos",
* cve: ["CVE-2020-8790"],
* host: "server",
* vendorId: ["MS09-036"],
* threatName: "Memory Corruption",
* },
* {
* name: "Rule-Medium-Drop",
* action: {
* drop: {},
* },
* packetCapture: "disable",
* severity: [
* "medium",
* "high",
* ],
* category: "insecure-credentials",
* cve: ["N/A"],
* host: "any",
* vendorId: ["Match Any Vendor"],
* threatName: "any",
* },
* ],
* threatExceptions: [{
* name: "12345",
* action: {
* drop: {},
* },
* packetCapture: "single-packet",
* host: "any",
* category: "scan",
* cve: [
* "CVE-2011-2663",
* "CVE-2016-9949",
* ],
* exemptIp: [{
* name: "192.14.3.100",
* }],
* }],
* });
* ```
*/
export declare class VulnerabilityProtectionProfile extends pulumi.CustomResource {
/**
* Get an existing VulnerabilityProtectionProfile resource's state with the given name, ID, and optional extra
* properties used to qualify the lookup.
*
* @param name The _unique_ name of the resulting resource.
* @param id The _unique_ provider ID of the resource to lookup.
* @param state Any extra arguments used during the lookup.
* @param opts Optional settings to control the behavior of the CustomResource.
*/
static get(name: string, id: pulumi.Input<pulumi.ID>, state?: VulnerabilityProtectionProfileState, opts?: pulumi.CustomResourceOptions): VulnerabilityProtectionProfile;
/**
* Returns true if the given object is an instance of VulnerabilityProtectionProfile. This is designed to work even
* when multiple copies of the Pulumi SDK have been loaded into the same process.
*/
static isInstance(obj: any): obj is VulnerabilityProtectionProfile;
/**
* Description
*/
readonly description: pulumi.Output<string | undefined>;
/**
* The device in which the resource is defined
*/
readonly device: pulumi.Output<string | undefined>;
/**
* The folder in which the resource is defined
*
* > ℹ️ **Note:** You must specify exactly one of `device`, `folder`, and `snippet`.
*/
readonly folder: pulumi.Output<string | undefined>;
/**
* Name
*/
readonly name: pulumi.Output<string>;
/**
* Rules
*/
readonly rules: pulumi.Output<outputs.VulnerabilityProtectionProfileRule[] | undefined>;
/**
* The snippet in which the resource is defined
*
* > ℹ️ **Note:** You must specify exactly one of `device`, `folder`, and `snippet`.
*/
readonly snippet: pulumi.Output<string | undefined>;
readonly tfid: pulumi.Output<string>;
/**
* Threat exception
*/
readonly threatExceptions: pulumi.Output<outputs.VulnerabilityProtectionProfileThreatException[] | undefined>;
/**
* Create a VulnerabilityProtectionProfile resource with the given unique name, arguments, and options.
*
* @param name The _unique_ name of the resource.
* @param args The arguments to use to populate this resource's properties.
* @param opts A bag of options that control this resource's behavior.
*/
constructor(name: string, args?: VulnerabilityProtectionProfileArgs, opts?: pulumi.CustomResourceOptions);
}
/**
* Input properties used for looking up and filtering VulnerabilityProtectionProfile resources.
*/
export interface VulnerabilityProtectionProfileState {
/**
* Description
*/
description?: pulumi.Input<string>;
/**
* The device in which the resource is defined
*/
device?: pulumi.Input<string>;
/**
* The folder in which the resource is defined
*
* > ℹ️ **Note:** You must specify exactly one of `device`, `folder`, and `snippet`.
*/
folder?: pulumi.Input<string>;
/**
* Name
*/
name?: pulumi.Input<string>;
/**
* Rules
*/
rules?: pulumi.Input<pulumi.Input<inputs.VulnerabilityProtectionProfileRule>[]>;
/**
* The snippet in which the resource is defined
*
* > ℹ️ **Note:** You must specify exactly one of `device`, `folder`, and `snippet`.
*/
snippet?: pulumi.Input<string>;
tfid?: pulumi.Input<string>;
/**
* Threat exception
*/
threatExceptions?: pulumi.Input<pulumi.Input<inputs.VulnerabilityProtectionProfileThreatException>[]>;
}
/**
* The set of arguments for constructing a VulnerabilityProtectionProfile resource.
*/
export interface VulnerabilityProtectionProfileArgs {
/**
* Description
*/
description?: pulumi.Input<string>;
/**
* The device in which the resource is defined
*/
device?: pulumi.Input<string>;
/**
* The folder in which the resource is defined
*
* > ℹ️ **Note:** You must specify exactly one of `device`, `folder`, and `snippet`.
*/
folder?: pulumi.Input<string>;
/**
* Name
*/
name?: pulumi.Input<string>;
/**
* Rules
*/
rules?: pulumi.Input<pulumi.Input<inputs.VulnerabilityProtectionProfileRule>[]>;
/**
* The snippet in which the resource is defined
*
* > ℹ️ **Note:** You must specify exactly one of `device`, `folder`, and `snippet`.
*/
snippet?: pulumi.Input<string>;
/**
* Threat exception
*/
threatExceptions?: pulumi.Input<pulumi.Input<inputs.VulnerabilityProtectionProfileThreatException>[]>;
}