[−][src]Struct rusoto_fms::SecurityServicePolicyData
Details about the security service that is being used to protect the resources.
Fields
managed_service_data: Option<String>
Details about the service that are specific to the service type, in JSON format. For service type SHIELDADVANCED
, this is an empty string.
-
Example:
WAFV2
"ManagedServiceData": "{"type":"WAFV2","defaultAction":{"type":"ALLOW"},"preProcessRuleGroups":[{"managedRuleGroupIdentifier":null,"ruleGroupArn":"rulegrouparn","overrideAction":{"type":"COUNT"},"excludedRules":[{"name":"EntityName"}],"ruleGroupType":"RuleGroup"}],"postProcessRuleGroups":[{"managedRuleGroupIdentifier":{"managedRuleGroupName":"AWSManagedRulesAdminProtectionRuleSet","vendor":"AWS"},"ruleGroupArn":"rulegrouparn","overrideAction":{"type":"NONE"},"excludedRules":[],"ruleGroupType":"ManagedRuleGroup"}],"overrideCustomerWebACLAssociation":false}"
-
Example:
WAF Classic
"ManagedServiceData": "{"type": "WAF", "ruleGroups": [{"id": "12345678-1bcd-9012-efga-0987654321ab", "overrideAction" : {"type": "COUNT"}}], "defaultAction": {"type": "BLOCK"}}
-
Example:
SECURITYGROUPSCOMMON
"SecurityServicePolicyData":{"Type":"SECURITYGROUPSCOMMON","ManagedServiceData":"{"type":"SECURITYGROUPSCOMMON","revertManualSecurityGroupChanges":false,"exclusiveResourceSecurityGroupManagement":false, "applyToAllEC2InstanceENIs":false,"securityGroups":[{"id":" sg-000e55995d61a06bd"}]}"},"RemediationEnabled":false,"ResourceType":"AWS::EC2::NetworkInterface"}
-
Example:
SECURITYGROUPSCONTENTAUDIT
"SecurityServicePolicyData":{"Type":"SECURITYGROUPSCONTENTAUDIT","ManagedServiceData":"{"type":"SECURITYGROUPSCONTENTAUDIT","securityGroups":[{"id":" sg-000e55995d61a06bd "}],"securityGroupAction":{"type":"ALLOW"}}"},"RemediationEnabled":false,"ResourceType":"AWS::EC2::NetworkInterface"}
The security group action for content audit can be
ALLOW
orDENY
. ForALLOW
, all in-scope security group rules must be within the allowed range of the policy's security group rules. ForDENY
, all in-scope security group rules must not contain a value or a range that matches a rule value or range in the policy security group. -
Example:
SECURITYGROUPSUSAGEAUDIT
"SecurityServicePolicyData":{"Type":"SECURITYGROUPSUSAGEAUDIT","ManagedServiceData":"{"type":"SECURITYGROUPSUSAGE_AUDIT","deleteUnusedSecurityGroups":true,"coalesceRedundantSecurityGroups":true}"},"RemediationEnabled":false,"Resou rceType":"AWS::EC2::SecurityGroup"}
type_: String
The service that the policy is using to protect the resources. This specifies the type of policy that is created, either an AWS WAF policy, a Shield Advanced policy, or a security group policy. For security group policies, Firewall Manager supports one security group for each common policy and for each content audit policy. This is an adjustable limit that you can increase by contacting AWS Support.
Trait Implementations
impl Clone for SecurityServicePolicyData
[src]
pub fn clone(&self) -> SecurityServicePolicyData
[src]
pub fn clone_from(&mut self, source: &Self)
1.0.0[src]
impl Debug for SecurityServicePolicyData
[src]
impl Default for SecurityServicePolicyData
[src]
pub fn default() -> SecurityServicePolicyData
[src]
impl<'de> Deserialize<'de> for SecurityServicePolicyData
[src]
pub fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error> where
__D: Deserializer<'de>,
[src]
__D: Deserializer<'de>,
impl PartialEq<SecurityServicePolicyData> for SecurityServicePolicyData
[src]
pub fn eq(&self, other: &SecurityServicePolicyData) -> bool
[src]
pub fn ne(&self, other: &SecurityServicePolicyData) -> bool
[src]
impl Serialize for SecurityServicePolicyData
[src]
pub fn serialize<__S>(&self, __serializer: __S) -> Result<__S::Ok, __S::Error> where
__S: Serializer,
[src]
__S: Serializer,
impl StructuralPartialEq for SecurityServicePolicyData
[src]
Auto Trait Implementations
impl RefUnwindSafe for SecurityServicePolicyData
[src]
impl Send for SecurityServicePolicyData
[src]
impl Sync for SecurityServicePolicyData
[src]
impl Unpin for SecurityServicePolicyData
[src]
impl UnwindSafe for SecurityServicePolicyData
[src]
Blanket Implementations
impl<T> Any for T where
T: 'static + ?Sized,
[src]
T: 'static + ?Sized,
impl<T> Borrow<T> for T where
T: ?Sized,
[src]
T: ?Sized,
impl<T> BorrowMut<T> for T where
T: ?Sized,
[src]
T: ?Sized,
pub fn borrow_mut(&mut self) -> &mut T
[src]
impl<T> DeserializeOwned for T where
T: for<'de> Deserialize<'de>,
[src]
T: for<'de> Deserialize<'de>,
impl<T> From<T> for T
[src]
impl<T> Instrument for T
[src]
pub fn instrument(self, span: Span) -> Instrumented<Self>
[src]
pub fn in_current_span(self) -> Instrumented<Self>
[src]
impl<T> Instrument for T
[src]
pub fn instrument(self, span: Span) -> Instrumented<Self>
[src]
pub fn in_current_span(self) -> Instrumented<Self>
[src]
impl<T, U> Into<U> for T where
U: From<T>,
[src]
U: From<T>,
impl<T> Same<T> for T
type Output = T
Should always be Self
impl<T> ToOwned for T where
T: Clone,
[src]
T: Clone,
type Owned = T
The resulting type after obtaining ownership.
pub fn to_owned(&self) -> T
[src]
pub fn clone_into(&self, target: &mut T)
[src]
impl<T, U> TryFrom<U> for T where
U: Into<T>,
[src]
U: Into<T>,
type Error = Infallible
The type returned in the event of a conversion error.
pub fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>
[src]
impl<T, U> TryInto<U> for T where
U: TryFrom<T>,
[src]
U: TryFrom<T>,