 |
|
| |
Paws::FMS::SecurityServicePolicyData(3) |
User Contributed Perl Documentation |
Paws::FMS::SecurityServicePolicyData(3) |
Paws::FMS::SecurityServicePolicyData
This class represents one of two things:
Arguments in a call to a service
Use the attributes of this class as arguments to methods. You
shouldn't make instances of this class. Each attribute should be used as a
named argument in the calls that expect this type of object.
As an example, if Att1 is expected to be a
Paws::FMS::SecurityServicePolicyData object:
$service_obj->Method(Att1 => { ManagedServiceData => $value, ..., Type => $value });
Results returned from an API call
Use accessors for each attribute. If Att1 is expected to be an
Paws::FMS::SecurityServicePolicyData object:
$result = $service_obj->Method(...);
$result->Att1->ManagedServiceData
Details about the security service that is being used to protect
the resources.
Details about the service that are specific to the service type,
in JSON format. For service type
"SHIELD_ADVANCED", this is an empty
string.
- Example: "NETWORK_FIREWALL"
"{\"type\":\"NETWORK_FIREWALL\",\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-west-1:1234567891011:stateless-rulegroup/rulegroup2\",\"priority\":10}],\"networkFirewallStatelessDefaultActions\":[\"aws:pass\",\"custom1\"],\"networkFirewallStatelessFragmentDefaultActions\":[\"custom2\",\"aws:pass\"],\"networkFirewallStatelessCustomActions\":[{\"actionName\":\"custom1\",\"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"dimension1\"}]}}},{\"actionName\":\"custom2\",\"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"dimension2\"}]}}}],\"networkFirewallStatefulRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-west-1:1234567891011:stateful-rulegroup/rulegroup1\"}],\"networkFirewallOrchestrationConfig\":{\"singleFirewallEndpointPerVPC\":true,\"allowedIPV4CidrList\":[\"10.24.34.0/28\"]}
}"
- Example: "WAFV2"
"{\"type\":\"WAFV2\",\"preProcessRuleGroups\":[{\"ruleGroupArn\":null,\"overrideAction\":{\"type\":\"NONE\"},\"managedRuleGroupIdentifier\":{\"version\":null,\"vendorName\":\"AWS\",\"managedRuleGroupName\":\"AWSManagedRulesAmazonIpReputationList\"},\"ruleGroupType\":\"ManagedRuleGroup\",\"excludeRules\":[]}],\"postProcessRuleGroups\":[],\"defaultAction\":{\"type\":\"ALLOW\"},\"overrideCustomerWebACLAssociation\":false,\"loggingConfiguration\":{\"logDestinationConfigs\":[\"arn:aws:firehose:us-west-2:12345678912:deliverystream/aws-waf-logs-fms-admin-destination\"],\"redactedFields\":[{\"redactedFieldType\":\"SingleHeader\",\"redactedFieldValue\":\"Cookies\"},{\"redactedFieldType\":\"Method\"}]}}"
In the
"loggingConfiguration", you can
specify one "logDestinationConfigs",
you can optionally provide up to 20
"redactedFields", and the
"RedactedFieldType" must be one of
"URI",
"QUERY_STRING",
"HEADER", or
"METHOD".
- Example: "WAF Classic"
"{\"type\": \"WAF\",
\"ruleGroups\":
[{\"id\":\"12345678-1bcd-9012-efga-0987654321ab\",
\"overrideAction\" :
{\"type\": \"COUNT\"}}],
\"defaultAction\": {\"type\":
\"BLOCK\"}}"
- Example: "SECURITY_GROUPS_COMMON"
"{\"type\":\"SECURITY_GROUPS_COMMON\",\"revertManualSecurityGroupChanges\":false,\"exclusiveResourceSecurityGroupManagement\":false,
\"applyToAllEC2InstanceENIs\":false,\"securityGroups\":[{\"id\":\"
sg-000e55995d61a06bd\"}]}"
- Example: "SECURITY_GROUPS_CONTENT_AUDIT"
"{\"type\":\"SECURITY_GROUPS_CONTENT_AUDIT\",\"securityGroups\":[{\"id\":\"sg-000e55995d61a06bd\"}],\"securityGroupAction\":{\"type\":\"ALLOW\"}}"
The security group action for content audit can be
"ALLOW" or
"DENY". For
"ALLOW", all in-scope security group
rules must be within the allowed range of the policy's security group
rules. For "DENY", all in-scope
security group rules must not contain a value or a range that matches a
rule value or range in the policy security group.
- Example: "SECURITY_GROUPS_USAGE_AUDIT"
"{\"type\":\"SECURITY_GROUPS_USAGE_AUDIT\",\"deleteUnusedSecurityGroups\":true,\"coalesceRedundantSecurityGroups\":true}"
REQUIRED Type => Str
The service that the policy is using to protect the resources.
This specifies the type of policy that is created, either an AWS WAF policy,
a Shield Advanced policy, or a security group policy. For security group
policies, Firewall Manager supports one security group for each common
policy and for each content audit policy. This is an adjustable limit that
you can increase by contacting AWS Support.
This class forms part of Paws, describing an object used in
Paws::FMS
The source code is located here:
<https://github.com/pplu/aws-sdk-perl>
Please report bugs to:
<https://github.com/pplu/aws-sdk-perl/issues>
Visit the GSP FreeBSD Man Page Interface. Output converted with ManDoc.
|