azure-native.security.AssessmentsMetadataSubscription
Explore with Pulumi AI
Security assessment metadata Azure REST API version: 2019-01-01-preview.
Example Usage
Create security assessment metadata for subscription
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using AzureNative = Pulumi.AzureNative;
return await Deployment.RunAsync(() =>
{
var assessmentsMetadataSubscription = new AzureNative.Security.AssessmentsMetadataSubscription("assessmentsMetadataSubscription", new()
{
AssessmentMetadataName = "ca039e75-a276-4175-aebc-bcd41e4b14b7",
AssessmentType = AzureNative.Security.AssessmentType.CustomerManaged,
Categories = new[]
{
AzureNative.Security.Categories.Compute,
},
Description = "Install an endpoint protection solution on your virtual machines scale sets, to protect them from threats and vulnerabilities.",
DisplayName = "Install endpoint protection solution on virtual machine scale sets",
ImplementationEffort = AzureNative.Security.ImplementationEffort.Low,
RemediationDescription = "To install an endpoint protection solution: 1. <a href=\"https://docs.microsoft.com/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-faq#how-do-i-turn-on-antimalware-in-my-virtual-machine-scale-set\">Follow the instructions in How do I turn on antimalware in my virtual machine scale set</a>",
Severity = AzureNative.Security.Severity.Medium,
Threats = new[]
{
AzureNative.Security.Threats.DataExfiltration,
AzureNative.Security.Threats.DataSpillage,
AzureNative.Security.Threats.MaliciousInsider,
},
UserImpact = AzureNative.Security.UserImpact.Low,
});
});
package main
import (
security "github.com/pulumi/pulumi-azure-native-sdk/security/v2"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := security.NewAssessmentsMetadataSubscription(ctx, "assessmentsMetadataSubscription", &security.AssessmentsMetadataSubscriptionArgs{
AssessmentMetadataName: pulumi.String("ca039e75-a276-4175-aebc-bcd41e4b14b7"),
AssessmentType: pulumi.String(security.AssessmentTypeCustomerManaged),
Categories: pulumi.StringArray{
pulumi.String(security.CategoriesCompute),
},
Description: pulumi.String("Install an endpoint protection solution on your virtual machines scale sets, to protect them from threats and vulnerabilities."),
DisplayName: pulumi.String("Install endpoint protection solution on virtual machine scale sets"),
ImplementationEffort: pulumi.String(security.ImplementationEffortLow),
RemediationDescription: pulumi.String("To install an endpoint protection solution: 1. <a href=\"https://docs.microsoft.com/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-faq#how-do-i-turn-on-antimalware-in-my-virtual-machine-scale-set\">Follow the instructions in How do I turn on antimalware in my virtual machine scale set</a>"),
Severity: pulumi.String(security.SeverityMedium),
Threats: pulumi.StringArray{
pulumi.String(security.ThreatsDataExfiltration),
pulumi.String(security.ThreatsDataSpillage),
pulumi.String(security.ThreatsMaliciousInsider),
},
UserImpact: pulumi.String(security.UserImpactLow),
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azurenative.security.AssessmentsMetadataSubscription;
import com.pulumi.azurenative.security.AssessmentsMetadataSubscriptionArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var assessmentsMetadataSubscription = new AssessmentsMetadataSubscription("assessmentsMetadataSubscription", AssessmentsMetadataSubscriptionArgs.builder()
.assessmentMetadataName("ca039e75-a276-4175-aebc-bcd41e4b14b7")
.assessmentType("CustomerManaged")
.categories("Compute")
.description("Install an endpoint protection solution on your virtual machines scale sets, to protect them from threats and vulnerabilities.")
.displayName("Install endpoint protection solution on virtual machine scale sets")
.implementationEffort("Low")
.remediationDescription("To install an endpoint protection solution: 1. <a href=\"https://docs.microsoft.com/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-faq#how-do-i-turn-on-antimalware-in-my-virtual-machine-scale-set\">Follow the instructions in How do I turn on antimalware in my virtual machine scale set</a>")
.severity("Medium")
.threats(
"dataExfiltration",
"dataSpillage",
"maliciousInsider")
.userImpact("Low")
.build());
}
}
import pulumi
import pulumi_azure_native as azure_native
assessments_metadata_subscription = azure_native.security.AssessmentsMetadataSubscription("assessmentsMetadataSubscription",
assessment_metadata_name="ca039e75-a276-4175-aebc-bcd41e4b14b7",
assessment_type=azure_native.security.AssessmentType.CUSTOMER_MANAGED,
categories=[azure_native.security.Categories.COMPUTE],
description="Install an endpoint protection solution on your virtual machines scale sets, to protect them from threats and vulnerabilities.",
display_name="Install endpoint protection solution on virtual machine scale sets",
implementation_effort=azure_native.security.ImplementationEffort.LOW,
remediation_description="To install an endpoint protection solution: 1. <a href=\"https://docs.microsoft.com/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-faq#how-do-i-turn-on-antimalware-in-my-virtual-machine-scale-set\">Follow the instructions in How do I turn on antimalware in my virtual machine scale set</a>",
severity=azure_native.security.Severity.MEDIUM,
threats=[
azure_native.security.Threats.DATA_EXFILTRATION,
azure_native.security.Threats.DATA_SPILLAGE,
azure_native.security.Threats.MALICIOUS_INSIDER,
],
user_impact=azure_native.security.UserImpact.LOW)
import * as pulumi from "@pulumi/pulumi";
import * as azure_native from "@pulumi/azure-native";
const assessmentsMetadataSubscription = new azure_native.security.AssessmentsMetadataSubscription("assessmentsMetadataSubscription", {
assessmentMetadataName: "ca039e75-a276-4175-aebc-bcd41e4b14b7",
assessmentType: azure_native.security.AssessmentType.CustomerManaged,
categories: [azure_native.security.Categories.Compute],
description: "Install an endpoint protection solution on your virtual machines scale sets, to protect them from threats and vulnerabilities.",
displayName: "Install endpoint protection solution on virtual machine scale sets",
implementationEffort: azure_native.security.ImplementationEffort.Low,
remediationDescription: "To install an endpoint protection solution: 1. <a href=\"https://docs.microsoft.com/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-faq#how-do-i-turn-on-antimalware-in-my-virtual-machine-scale-set\">Follow the instructions in How do I turn on antimalware in my virtual machine scale set</a>",
severity: azure_native.security.Severity.Medium,
threats: [
azure_native.security.Threats.DataExfiltration,
azure_native.security.Threats.DataSpillage,
azure_native.security.Threats.MaliciousInsider,
],
userImpact: azure_native.security.UserImpact.Low,
});
resources:
assessmentsMetadataSubscription:
type: azure-native:security:AssessmentsMetadataSubscription
properties:
assessmentMetadataName: ca039e75-a276-4175-aebc-bcd41e4b14b7
assessmentType: CustomerManaged
categories:
- Compute
description: Install an endpoint protection solution on your virtual machines scale sets, to protect them from threats and vulnerabilities.
displayName: Install endpoint protection solution on virtual machine scale sets
implementationEffort: Low
remediationDescription: 'To install an endpoint protection solution: 1. <a href="https://docs.microsoft.com/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-faq#how-do-i-turn-on-antimalware-in-my-virtual-machine-scale-set">Follow the instructions in How do I turn on antimalware in my virtual machine scale set</a>'
severity: Medium
threats:
- dataExfiltration
- dataSpillage
- maliciousInsider
userImpact: Low
Create AssessmentsMetadataSubscription Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new AssessmentsMetadataSubscription(name: string, args: AssessmentsMetadataSubscriptionArgs, opts?: CustomResourceOptions);
@overload
def AssessmentsMetadataSubscription(resource_name: str,
args: AssessmentsMetadataSubscriptionArgs,
opts: Optional[ResourceOptions] = None)
@overload
def AssessmentsMetadataSubscription(resource_name: str,
opts: Optional[ResourceOptions] = None,
assessment_type: Optional[Union[str, AssessmentType]] = None,
display_name: Optional[str] = None,
severity: Optional[Union[str, Severity]] = None,
assessment_metadata_name: Optional[str] = None,
categories: Optional[Sequence[Union[str, Categories]]] = None,
description: Optional[str] = None,
implementation_effort: Optional[Union[str, ImplementationEffort]] = None,
preview: Optional[bool] = None,
remediation_description: Optional[str] = None,
threats: Optional[Sequence[Union[str, Threats]]] = None,
user_impact: Optional[Union[str, UserImpact]] = None)
func NewAssessmentsMetadataSubscription(ctx *Context, name string, args AssessmentsMetadataSubscriptionArgs, opts ...ResourceOption) (*AssessmentsMetadataSubscription, error)
public AssessmentsMetadataSubscription(string name, AssessmentsMetadataSubscriptionArgs args, CustomResourceOptions? opts = null)
public AssessmentsMetadataSubscription(String name, AssessmentsMetadataSubscriptionArgs args)
public AssessmentsMetadataSubscription(String name, AssessmentsMetadataSubscriptionArgs args, CustomResourceOptions options)
type: azure-native:security:AssessmentsMetadataSubscription
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args AssessmentsMetadataSubscriptionArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args AssessmentsMetadataSubscriptionArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args AssessmentsMetadataSubscriptionArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args AssessmentsMetadataSubscriptionArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args AssessmentsMetadataSubscriptionArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var assessmentsMetadataSubscriptionResource = new AzureNative.Security.AssessmentsMetadataSubscription("assessmentsMetadataSubscriptionResource", new()
{
AssessmentType = "string",
DisplayName = "string",
Severity = "string",
AssessmentMetadataName = "string",
Categories = new[]
{
"string",
},
Description = "string",
ImplementationEffort = "string",
Preview = false,
RemediationDescription = "string",
Threats = new[]
{
"string",
},
UserImpact = "string",
});
example, err := security.NewAssessmentsMetadataSubscription(ctx, "assessmentsMetadataSubscriptionResource", &security.AssessmentsMetadataSubscriptionArgs{
AssessmentType: pulumi.String("string"),
DisplayName: pulumi.String("string"),
Severity: pulumi.String("string"),
AssessmentMetadataName: pulumi.String("string"),
Categories: pulumi.StringArray{
pulumi.String("string"),
},
Description: pulumi.String("string"),
ImplementationEffort: pulumi.String("string"),
Preview: pulumi.Bool(false),
RemediationDescription: pulumi.String("string"),
Threats: pulumi.StringArray{
pulumi.String("string"),
},
UserImpact: pulumi.String("string"),
})
var assessmentsMetadataSubscriptionResource = new AssessmentsMetadataSubscription("assessmentsMetadataSubscriptionResource", AssessmentsMetadataSubscriptionArgs.builder()
.assessmentType("string")
.displayName("string")
.severity("string")
.assessmentMetadataName("string")
.categories("string")
.description("string")
.implementationEffort("string")
.preview(false)
.remediationDescription("string")
.threats("string")
.userImpact("string")
.build());
assessments_metadata_subscription_resource = azure_native.security.AssessmentsMetadataSubscription("assessmentsMetadataSubscriptionResource",
assessment_type="string",
display_name="string",
severity="string",
assessment_metadata_name="string",
categories=["string"],
description="string",
implementation_effort="string",
preview=False,
remediation_description="string",
threats=["string"],
user_impact="string")
const assessmentsMetadataSubscriptionResource = new azure_native.security.AssessmentsMetadataSubscription("assessmentsMetadataSubscriptionResource", {
assessmentType: "string",
displayName: "string",
severity: "string",
assessmentMetadataName: "string",
categories: ["string"],
description: "string",
implementationEffort: "string",
preview: false,
remediationDescription: "string",
threats: ["string"],
userImpact: "string",
});
type: azure-native:security:AssessmentsMetadataSubscription
properties:
assessmentMetadataName: string
assessmentType: string
categories:
- string
description: string
displayName: string
implementationEffort: string
preview: false
remediationDescription: string
severity: string
threats:
- string
userImpact: string
AssessmentsMetadataSubscription Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The AssessmentsMetadataSubscription resource accepts the following input properties:
- Assessment
Type string | Pulumi.Azure Native. Security. Assessment Type - BuiltIn if the assessment based on built-in Azure Policy definition, Custom if the assessment based on custom Azure Policy definition
- Display
Name string - User friendly display name of the assessment
- Severity
string | Pulumi.
Azure Native. Security. Severity - The severity level of the assessment
- Assessment
Metadata stringName - The Assessment Key - Unique key for the assessment type
- Categories
List<Union<string, Pulumi.
Azure Native. Security. Categories>> - Description string
- Human readable description of the assessment
- Implementation
Effort string | Pulumi.Azure Native. Security. Implementation Effort - The implementation effort required to remediate this assessment
- Preview bool
- True if this assessment is in preview release status
- Remediation
Description string - Human readable description of what you should do to mitigate this security issue
- Threats
List<Union<string, Pulumi.
Azure Native. Security. Threats>> - User
Impact string | Pulumi.Azure Native. Security. User Impact - The user impact of the assessment
- Assessment
Type string | AssessmentType - BuiltIn if the assessment based on built-in Azure Policy definition, Custom if the assessment based on custom Azure Policy definition
- Display
Name string - User friendly display name of the assessment
- Severity string | Severity
- The severity level of the assessment
- Assessment
Metadata stringName - The Assessment Key - Unique key for the assessment type
- Categories []string
- Description string
- Human readable description of the assessment
- Implementation
Effort string | ImplementationEffort - The implementation effort required to remediate this assessment
- Preview bool
- True if this assessment is in preview release status
- Remediation
Description string - Human readable description of what you should do to mitigate this security issue
- Threats []string
- User
Impact string | UserImpact - The user impact of the assessment
- assessment
Type String | AssessmentType - BuiltIn if the assessment based on built-in Azure Policy definition, Custom if the assessment based on custom Azure Policy definition
- display
Name String - User friendly display name of the assessment
- severity String | Severity
- The severity level of the assessment
- assessment
Metadata StringName - The Assessment Key - Unique key for the assessment type
- categories List<Either<String,Categories>>
- description String
- Human readable description of the assessment
- implementation
Effort String | ImplementationEffort - The implementation effort required to remediate this assessment
- preview Boolean
- True if this assessment is in preview release status
- remediation
Description String - Human readable description of what you should do to mitigate this security issue
- threats List<Either<String,Threats>>
- user
Impact String | UserImpact - The user impact of the assessment
- assessment
Type string | AssessmentType - BuiltIn if the assessment based on built-in Azure Policy definition, Custom if the assessment based on custom Azure Policy definition
- display
Name string - User friendly display name of the assessment
- severity string | Severity
- The severity level of the assessment
- assessment
Metadata stringName - The Assessment Key - Unique key for the assessment type
- categories (string | Categories)[]
- description string
- Human readable description of the assessment
- implementation
Effort string | ImplementationEffort - The implementation effort required to remediate this assessment
- preview boolean
- True if this assessment is in preview release status
- remediation
Description string - Human readable description of what you should do to mitigate this security issue
- threats (string | Threats)[]
- user
Impact string | UserImpact - The user impact of the assessment
- assessment_
type str | AssessmentType - BuiltIn if the assessment based on built-in Azure Policy definition, Custom if the assessment based on custom Azure Policy definition
- display_
name str - User friendly display name of the assessment
- severity str | Severity
- The severity level of the assessment
- assessment_
metadata_ strname - The Assessment Key - Unique key for the assessment type
- categories Sequence[Union[str, Categories]]
- description str
- Human readable description of the assessment
- implementation_
effort str | ImplementationEffort - The implementation effort required to remediate this assessment
- preview bool
- True if this assessment is in preview release status
- remediation_
description str - Human readable description of what you should do to mitigate this security issue
- threats Sequence[Union[str, Threats]]
- user_
impact str | UserImpact - The user impact of the assessment
- assessment
Type String | "BuiltIn" | "Custom Policy" | "Customer Managed" - BuiltIn if the assessment based on built-in Azure Policy definition, Custom if the assessment based on custom Azure Policy definition
- display
Name String - User friendly display name of the assessment
- severity String | "Low" | "Medium" | "High"
- The severity level of the assessment
- assessment
Metadata StringName - The Assessment Key - Unique key for the assessment type
- categories
List<String | "Compute" | "Networking" | "Data" | "Identity
And Access" | "Io T"> - description String
- Human readable description of the assessment
- implementation
Effort String | "Low" | "Moderate" | "High" - The implementation effort required to remediate this assessment
- preview Boolean
- True if this assessment is in preview release status
- remediation
Description String - Human readable description of what you should do to mitigate this security issue
- threats
List<String | "account
Breach" | "data Exfiltration" | "data Spillage" | "malicious Insider" | "elevation Of Privilege" | "threat Resistance" | "missing Coverage" | "denial Of Service"> - user
Impact String | "Low" | "Moderate" | "High" - The user impact of the assessment
Outputs
All input properties are implicitly available as output properties. Additionally, the AssessmentsMetadataSubscription resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Name string
- Resource name
- Policy
Definition stringId - Azure resource ID of the policy definition that turns this assessment calculation on
- Type string
- Resource type
- Id string
- The provider-assigned unique ID for this managed resource.
- Name string
- Resource name
- Policy
Definition stringId - Azure resource ID of the policy definition that turns this assessment calculation on
- Type string
- Resource type
- id String
- The provider-assigned unique ID for this managed resource.
- name String
- Resource name
- policy
Definition StringId - Azure resource ID of the policy definition that turns this assessment calculation on
- type String
- Resource type
- id string
- The provider-assigned unique ID for this managed resource.
- name string
- Resource name
- policy
Definition stringId - Azure resource ID of the policy definition that turns this assessment calculation on
- type string
- Resource type
- id str
- The provider-assigned unique ID for this managed resource.
- name str
- Resource name
- policy_
definition_ strid - Azure resource ID of the policy definition that turns this assessment calculation on
- type str
- Resource type
- id String
- The provider-assigned unique ID for this managed resource.
- name String
- Resource name
- policy
Definition StringId - Azure resource ID of the policy definition that turns this assessment calculation on
- type String
- Resource type
Supporting Types
AssessmentType, AssessmentTypeArgs
- Built
In - BuiltInMicrosoft Defender for Cloud managed assessments
- Custom
Policy - CustomPolicyUser defined policies that are automatically ingested from Azure Policy to Microsoft Defender for Cloud
- Customer
Managed - CustomerManagedUser assessments pushed directly by the user or other third party to Microsoft Defender for Cloud
- Assessment
Type Built In - BuiltInMicrosoft Defender for Cloud managed assessments
- Assessment
Type Custom Policy - CustomPolicyUser defined policies that are automatically ingested from Azure Policy to Microsoft Defender for Cloud
- Assessment
Type Customer Managed - CustomerManagedUser assessments pushed directly by the user or other third party to Microsoft Defender for Cloud
- Built
In - BuiltInMicrosoft Defender for Cloud managed assessments
- Custom
Policy - CustomPolicyUser defined policies that are automatically ingested from Azure Policy to Microsoft Defender for Cloud
- Customer
Managed - CustomerManagedUser assessments pushed directly by the user or other third party to Microsoft Defender for Cloud
- Built
In - BuiltInMicrosoft Defender for Cloud managed assessments
- Custom
Policy - CustomPolicyUser defined policies that are automatically ingested from Azure Policy to Microsoft Defender for Cloud
- Customer
Managed - CustomerManagedUser assessments pushed directly by the user or other third party to Microsoft Defender for Cloud
- BUILT_IN
- BuiltInMicrosoft Defender for Cloud managed assessments
- CUSTOM_POLICY
- CustomPolicyUser defined policies that are automatically ingested from Azure Policy to Microsoft Defender for Cloud
- CUSTOMER_MANAGED
- CustomerManagedUser assessments pushed directly by the user or other third party to Microsoft Defender for Cloud
- "Built
In" - BuiltInMicrosoft Defender for Cloud managed assessments
- "Custom
Policy" - CustomPolicyUser defined policies that are automatically ingested from Azure Policy to Microsoft Defender for Cloud
- "Customer
Managed" - CustomerManagedUser assessments pushed directly by the user or other third party to Microsoft Defender for Cloud
Categories, CategoriesArgs
- Compute
- Compute
- Networking
- Networking
- Data
- Data
- Identity
And Access - IdentityAndAccess
- Io
T - IoT
- Categories
Compute - Compute
- Categories
Networking - Networking
- Categories
Data - Data
- Categories
Identity And Access - IdentityAndAccess
- Categories
Io T - IoT
- Compute
- Compute
- Networking
- Networking
- Data
- Data
- Identity
And Access - IdentityAndAccess
- Io
T - IoT
- Compute
- Compute
- Networking
- Networking
- Data
- Data
- Identity
And Access - IdentityAndAccess
- Io
T - IoT
- COMPUTE
- Compute
- NETWORKING
- Networking
- DATA
- Data
- IDENTITY_AND_ACCESS
- IdentityAndAccess
- IO_T
- IoT
- "Compute"
- Compute
- "Networking"
- Networking
- "Data"
- Data
- "Identity
And Access" - IdentityAndAccess
- "Io
T" - IoT
ImplementationEffort, ImplementationEffortArgs
- Low
- Low
- Moderate
- Moderate
- High
- High
- Implementation
Effort Low - Low
- Implementation
Effort Moderate - Moderate
- Implementation
Effort High - High
- Low
- Low
- Moderate
- Moderate
- High
- High
- Low
- Low
- Moderate
- Moderate
- High
- High
- LOW
- Low
- MODERATE
- Moderate
- HIGH
- High
- "Low"
- Low
- "Moderate"
- Moderate
- "High"
- High
Severity, SeverityArgs
- Low
- Low
- Medium
- Medium
- High
- High
- Severity
Low - Low
- Severity
Medium - Medium
- Severity
High - High
- Low
- Low
- Medium
- Medium
- High
- High
- Low
- Low
- Medium
- Medium
- High
- High
- LOW
- Low
- MEDIUM
- Medium
- HIGH
- High
- "Low"
- Low
- "Medium"
- Medium
- "High"
- High
Threats, ThreatsArgs
- Account
Breach - accountBreach
- Data
Exfiltration - dataExfiltration
- Data
Spillage - dataSpillage
- Malicious
Insider - maliciousInsider
- Elevation
Of Privilege - elevationOfPrivilege
- Threat
Resistance - threatResistance
- Missing
Coverage - missingCoverage
- Denial
Of Service - denialOfService
- Threats
Account Breach - accountBreach
- Threats
Data Exfiltration - dataExfiltration
- Threats
Data Spillage - dataSpillage
- Threats
Malicious Insider - maliciousInsider
- Threats
Elevation Of Privilege - elevationOfPrivilege
- Threats
Threat Resistance - threatResistance
- Threats
Missing Coverage - missingCoverage
- Threats
Denial Of Service - denialOfService
- Account
Breach - accountBreach
- Data
Exfiltration - dataExfiltration
- Data
Spillage - dataSpillage
- Malicious
Insider - maliciousInsider
- Elevation
Of Privilege - elevationOfPrivilege
- Threat
Resistance - threatResistance
- Missing
Coverage - missingCoverage
- Denial
Of Service - denialOfService
- Account
Breach - accountBreach
- Data
Exfiltration - dataExfiltration
- Data
Spillage - dataSpillage
- Malicious
Insider - maliciousInsider
- Elevation
Of Privilege - elevationOfPrivilege
- Threat
Resistance - threatResistance
- Missing
Coverage - missingCoverage
- Denial
Of Service - denialOfService
- ACCOUNT_BREACH
- accountBreach
- DATA_EXFILTRATION
- dataExfiltration
- DATA_SPILLAGE
- dataSpillage
- MALICIOUS_INSIDER
- maliciousInsider
- ELEVATION_OF_PRIVILEGE
- elevationOfPrivilege
- THREAT_RESISTANCE
- threatResistance
- MISSING_COVERAGE
- missingCoverage
- DENIAL_OF_SERVICE
- denialOfService
- "account
Breach" - accountBreach
- "data
Exfiltration" - dataExfiltration
- "data
Spillage" - dataSpillage
- "malicious
Insider" - maliciousInsider
- "elevation
Of Privilege" - elevationOfPrivilege
- "threat
Resistance" - threatResistance
- "missing
Coverage" - missingCoverage
- "denial
Of Service" - denialOfService
UserImpact, UserImpactArgs
- Low
- Low
- Moderate
- Moderate
- High
- High
- User
Impact Low - Low
- User
Impact Moderate - Moderate
- User
Impact High - High
- Low
- Low
- Moderate
- Moderate
- High
- High
- Low
- Low
- Moderate
- Moderate
- High
- High
- LOW
- Low
- MODERATE
- Moderate
- HIGH
- High
- "Low"
- Low
- "Moderate"
- Moderate
- "High"
- High
Import
An existing resource can be imported using its type token, name, and identifier, e.g.
$ pulumi import azure-native:security:AssessmentsMetadataSubscription ca039e75-a276-4175-aebc-bcd41e4b14b7 /subscriptions/{subscriptionId}/providers/Microsoft.Security/assessmentMetadata/{assessmentMetadataName}
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- Azure Native pulumi/pulumi-azure-native
- License
- Apache-2.0