Module config

Module config 

Source
Expand description

Security configuration types

Structsยง

AIGovernanceConfig
AISecurityConfig
AI/ML security configuration
AIThreatDetectionConfig
AccessControlConfig
Access control configuration
AdversarialProtectionConfig
AnomalyDetectionConfig
AttestationConfig
AuditConfig
AutomatedResponseConfig
BackupSecurityConfig
BehavioralAnalysisConfig
CommunicationAuthConfig
ComplianceConfig
Compliance configuration
ComplianceReportingConfig
ContinuousComplianceConfig
CryptographicAgilityConfig
DLPConfig
DataClassificationConfig
DataGovernanceConfig
DataIntegrityConfig
DataLifecycleConfig
DataMaskingConfig
DataProtectionConfig
Data protection configuration
E2EEncryptionConfig
EncryptionAtRestConfig
EndpointSecurityConfig
ExplainableAIConfig
HSMConfig
HardwareMonitoringConfig
HardwareSecurityConfig
Hardware security configuration
IncidentClassificationConfig
IncidentCommunicationConfig
IncidentResponseConfig
Incident response configuration
MFAConfig
MLThreatDetectionConfig
ModelSecurityConfig
NetworkSecurityConfig
PhysicalSecurityConfig
PlaybookManagementConfig
PolicyEnforcementConfig
PostIncidentAnalysisConfig
PredictiveSecurityConfig
PrivacyProtectionConfig
PrivilegedAccessConfig
QuantumDigitalSignatureConfig
QuantumEncryptionConfig
QuantumHardwareSecurityConfig
QuantumKeyExchangeConfig
QuantumKeyManagementConfig
QuantumRNGConfig
QuantumSafeCryptographyConfig
Quantum-safe cryptography configuration
QuantumSecurityConfig
Configuration for Comprehensive Quantum System Security Framework
QuantumThreatDetectionConfig
RealtimeMonitoringConfig
RecoveryProceduresConfig
ResponseProceduresConfig
ResponseTeamConfig
RiskAssessmentConfig
RiskToleranceConfig
Configuration types with Default implementations
SecureBootConfig
SecureChannelConfig
SecureCommunicationConfig
Secure communication configuration
SecurityAnalyticsConfig
Security analytics configuration
SecurityAutomationRule
SecurityDashboardConfig
SecurityGovernanceConfig
SecurityIntegration
SecurityMetricsConfig
SecurityOrchestrationConfig
Security orchestration configuration
SecurityPolicyConfig
Security policy configuration
SecurityReportingConfig
SecurityWorkflow
SessionManagementConfig
TEEConfig
ThreatDetectionConfig
Threat detection configuration
ThreatIntelligenceConfig
WorkflowOrchestrationConfig
ZeroTrustConfig