aquasec.KubernetesAssurancePolicy
Explore with Pulumi AI
Kubernetes Assurance is responsible for checking the security of workload configurations at the pod level, with respect to your organization’s security requirements.
Create KubernetesAssurancePolicy Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new KubernetesAssurancePolicy(name: string, args: KubernetesAssurancePolicyArgs, opts?: CustomResourceOptions);@overload
def KubernetesAssurancePolicy(resource_name: str,
                              args: KubernetesAssurancePolicyArgs,
                              opts: Optional[ResourceOptions] = None)
@overload
def KubernetesAssurancePolicy(resource_name: str,
                              opts: Optional[ResourceOptions] = None,
                              application_scopes: Optional[Sequence[str]] = None,
                              aggregated_vulnerability: Optional[Mapping[str, str]] = None,
                              allowed_images: Optional[Sequence[str]] = None,
                              assurance_type: Optional[str] = None,
                              audit_on_failure: Optional[bool] = None,
                              author: Optional[str] = None,
                              auto_scan_configured: Optional[bool] = None,
                              auto_scan_enabled: Optional[bool] = None,
                              auto_scan_times: Optional[Sequence[KubernetesAssurancePolicyAutoScanTimeArgs]] = None,
                              blacklist_permissions: Optional[Sequence[str]] = None,
                              blacklist_permissions_enabled: Optional[bool] = None,
                              blacklisted_licenses: Optional[Sequence[str]] = None,
                              blacklisted_licenses_enabled: Optional[bool] = None,
                              block_failed: Optional[bool] = None,
                              control_exclude_no_fix: Optional[bool] = None,
                              custom_checks: Optional[Sequence[KubernetesAssurancePolicyCustomCheckArgs]] = None,
                              custom_checks_enabled: Optional[bool] = None,
                              custom_severity: Optional[str] = None,
                              custom_severity_enabled: Optional[bool] = None,
                              cves_black_list_enabled: Optional[bool] = None,
                              cves_black_lists: Optional[Sequence[str]] = None,
                              cves_white_list_enabled: Optional[bool] = None,
                              cves_white_lists: Optional[Sequence[str]] = None,
                              cvss_severity: Optional[str] = None,
                              cvss_severity_enabled: Optional[bool] = None,
                              cvss_severity_exclude_no_fix: Optional[bool] = None,
                              description: Optional[str] = None,
                              disallow_exploit_types: Optional[Sequence[str]] = None,
                              disallow_malware: Optional[bool] = None,
                              docker_cis_enabled: Optional[bool] = None,
                              domain: Optional[str] = None,
                              domain_name: Optional[str] = None,
                              dta_enabled: Optional[bool] = None,
                              dta_severity: Optional[str] = None,
                              enabled: Optional[bool] = None,
                              enforce: Optional[bool] = None,
                              enforce_after_days: Optional[int] = None,
                              enforce_excessive_permissions: Optional[bool] = None,
                              exceptional_monitored_malware_paths: Optional[Sequence[str]] = None,
                              exclude_application_scopes: Optional[Sequence[str]] = None,
                              fail_cicd: Optional[bool] = None,
                              forbidden_labels: Optional[Sequence[KubernetesAssurancePolicyForbiddenLabelArgs]] = None,
                              forbidden_labels_enabled: Optional[bool] = None,
                              force_microenforcer: Optional[bool] = None,
                              function_integrity_enabled: Optional[bool] = None,
                              ignore_base_image_vln: Optional[bool] = None,
                              ignore_recently_published_vln: Optional[bool] = None,
                              ignore_recently_published_vln_period: Optional[int] = None,
                              ignore_risk_resources_enabled: Optional[bool] = None,
                              ignored_risk_resources: Optional[Sequence[str]] = None,
                              ignored_sensitive_resources: Optional[Sequence[str]] = None,
                              images: Optional[Sequence[str]] = None,
                              kube_cis_enabled: Optional[bool] = None,
                              kubernetes_controls: Optional[Sequence[KubernetesAssurancePolicyKubernetesControlArgs]] = None,
                              kubernetes_controls_avd_ids: Optional[Sequence[str]] = None,
                              kubernetes_controls_names: Optional[Sequence[str]] = None,
                              labels: Optional[Sequence[str]] = None,
                              lastupdate: Optional[str] = None,
                              linux_cis_enabled: Optional[bool] = None,
                              malware_action: Optional[str] = None,
                              maximum_score: Optional[float] = None,
                              maximum_score_enabled: Optional[bool] = None,
                              maximum_score_exclude_no_fix: Optional[bool] = None,
                              monitored_malware_paths: Optional[Sequence[str]] = None,
                              name: Optional[str] = None,
                              only_none_root_users: Optional[bool] = None,
                              openshift_hardening_enabled: Optional[bool] = None,
                              packages_black_list_enabled: Optional[bool] = None,
                              packages_black_lists: Optional[Sequence[KubernetesAssurancePolicyPackagesBlackListArgs]] = None,
                              packages_white_list_enabled: Optional[bool] = None,
                              packages_white_lists: Optional[Sequence[KubernetesAssurancePolicyPackagesWhiteListArgs]] = None,
                              partial_results_image_fail: Optional[bool] = None,
                              permission: Optional[str] = None,
                              policy_settings: Optional[KubernetesAssurancePolicyPolicySettingsArgs] = None,
                              read_only: Optional[bool] = None,
                              registries: Optional[Sequence[str]] = None,
                              registry: Optional[str] = None,
                              required_labels: Optional[Sequence[KubernetesAssurancePolicyRequiredLabelArgs]] = None,
                              required_labels_enabled: Optional[bool] = None,
                              scan_malware_in_archives: Optional[bool] = None,
                              scan_nfs_mounts: Optional[bool] = None,
                              scan_process_memory: Optional[bool] = None,
                              scan_sensitive_data: Optional[bool] = None,
                              scan_windows_registry: Optional[bool] = None,
                              scap_enabled: Optional[bool] = None,
                              scap_files: Optional[Sequence[str]] = None,
                              scopes: Optional[Sequence[KubernetesAssurancePolicyScopeArgs]] = None,
                              trusted_base_images: Optional[Sequence[KubernetesAssurancePolicyTrustedBaseImageArgs]] = None,
                              trusted_base_images_enabled: Optional[bool] = None,
                              vulnerability_exploitability: Optional[bool] = None,
                              vulnerability_score_ranges: Optional[Sequence[int]] = None,
                              whitelisted_licenses: Optional[Sequence[str]] = None,
                              whitelisted_licenses_enabled: Optional[bool] = None)func NewKubernetesAssurancePolicy(ctx *Context, name string, args KubernetesAssurancePolicyArgs, opts ...ResourceOption) (*KubernetesAssurancePolicy, error)public KubernetesAssurancePolicy(string name, KubernetesAssurancePolicyArgs args, CustomResourceOptions? opts = null)
public KubernetesAssurancePolicy(String name, KubernetesAssurancePolicyArgs args)
public KubernetesAssurancePolicy(String name, KubernetesAssurancePolicyArgs args, CustomResourceOptions options)
type: aquasec:KubernetesAssurancePolicy
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args KubernetesAssurancePolicyArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args KubernetesAssurancePolicyArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args KubernetesAssurancePolicyArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args KubernetesAssurancePolicyArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args KubernetesAssurancePolicyArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var kubernetesAssurancePolicyResource = new Aquasec.KubernetesAssurancePolicy("kubernetesAssurancePolicyResource", new()
{
    ApplicationScopes = new[]
    {
        "string",
    },
    AggregatedVulnerability = 
    {
        { "string", "string" },
    },
    AllowedImages = new[]
    {
        "string",
    },
    AssuranceType = "string",
    AuditOnFailure = false,
    Author = "string",
    AutoScanConfigured = false,
    AutoScanEnabled = false,
    AutoScanTimes = new[]
    {
        new Aquasec.Inputs.KubernetesAssurancePolicyAutoScanTimeArgs
        {
            Iteration = 0,
            IterationType = "string",
            Time = "string",
            WeekDays = new[]
            {
                "string",
            },
        },
    },
    BlacklistPermissions = new[]
    {
        "string",
    },
    BlacklistPermissionsEnabled = false,
    BlacklistedLicenses = new[]
    {
        "string",
    },
    BlacklistedLicensesEnabled = false,
    BlockFailed = false,
    ControlExcludeNoFix = false,
    CustomChecks = new[]
    {
        new Aquasec.Inputs.KubernetesAssurancePolicyCustomCheckArgs
        {
            Author = "string",
            Description = "string",
            Engine = "string",
            LastModified = 0,
            Name = "string",
            Path = "string",
            ReadOnly = false,
            ScriptId = "string",
            Severity = "string",
            Snippet = "string",
        },
    },
    CustomChecksEnabled = false,
    CustomSeverity = "string",
    CustomSeverityEnabled = false,
    CvesBlackListEnabled = false,
    CvesBlackLists = new[]
    {
        "string",
    },
    CvesWhiteListEnabled = false,
    CvesWhiteLists = new[]
    {
        "string",
    },
    CvssSeverity = "string",
    CvssSeverityEnabled = false,
    CvssSeverityExcludeNoFix = false,
    Description = "string",
    DisallowExploitTypes = new[]
    {
        "string",
    },
    DisallowMalware = false,
    DockerCisEnabled = false,
    Domain = "string",
    DomainName = "string",
    DtaEnabled = false,
    DtaSeverity = "string",
    Enabled = false,
    Enforce = false,
    EnforceAfterDays = 0,
    EnforceExcessivePermissions = false,
    ExceptionalMonitoredMalwarePaths = new[]
    {
        "string",
    },
    ExcludeApplicationScopes = new[]
    {
        "string",
    },
    FailCicd = false,
    ForbiddenLabels = new[]
    {
        new Aquasec.Inputs.KubernetesAssurancePolicyForbiddenLabelArgs
        {
            Key = "string",
            Value = "string",
        },
    },
    ForbiddenLabelsEnabled = false,
    ForceMicroenforcer = false,
    FunctionIntegrityEnabled = false,
    IgnoreBaseImageVln = false,
    IgnoreRecentlyPublishedVln = false,
    IgnoreRecentlyPublishedVlnPeriod = 0,
    IgnoreRiskResourcesEnabled = false,
    IgnoredRiskResources = new[]
    {
        "string",
    },
    IgnoredSensitiveResources = new[]
    {
        "string",
    },
    Images = new[]
    {
        "string",
    },
    KubeCisEnabled = false,
    KubernetesControls = new[]
    {
        new Aquasec.Inputs.KubernetesAssurancePolicyKubernetesControlArgs
        {
            AvdId = "string",
            Description = "string",
            Enabled = false,
            Kind = "string",
            Name = "string",
            Ootb = false,
            ScriptId = 0,
            Severity = "string",
        },
    },
    KubernetesControlsAvdIds = new[]
    {
        "string",
    },
    KubernetesControlsNames = new[]
    {
        "string",
    },
    Labels = new[]
    {
        "string",
    },
    Lastupdate = "string",
    LinuxCisEnabled = false,
    MalwareAction = "string",
    MaximumScore = 0,
    MaximumScoreEnabled = false,
    MaximumScoreExcludeNoFix = false,
    MonitoredMalwarePaths = new[]
    {
        "string",
    },
    Name = "string",
    OnlyNoneRootUsers = false,
    OpenshiftHardeningEnabled = false,
    PackagesBlackListEnabled = false,
    PackagesBlackLists = new[]
    {
        new Aquasec.Inputs.KubernetesAssurancePolicyPackagesBlackListArgs
        {
            Arch = "string",
            Display = "string",
            Epoch = "string",
            Format = "string",
            License = "string",
            Name = "string",
            Release = "string",
            Version = "string",
            VersionRange = "string",
        },
    },
    PackagesWhiteListEnabled = false,
    PackagesWhiteLists = new[]
    {
        new Aquasec.Inputs.KubernetesAssurancePolicyPackagesWhiteListArgs
        {
            Arch = "string",
            Display = "string",
            Epoch = "string",
            Format = "string",
            License = "string",
            Name = "string",
            Release = "string",
            Version = "string",
            VersionRange = "string",
        },
    },
    PartialResultsImageFail = false,
    Permission = "string",
    PolicySettings = new Aquasec.Inputs.KubernetesAssurancePolicyPolicySettingsArgs
    {
        Enforce = false,
        IsAuditChecked = false,
        Warn = false,
        WarningMessage = "string",
    },
    ReadOnly = false,
    Registries = new[]
    {
        "string",
    },
    Registry = "string",
    RequiredLabels = new[]
    {
        new Aquasec.Inputs.KubernetesAssurancePolicyRequiredLabelArgs
        {
            Key = "string",
            Value = "string",
        },
    },
    RequiredLabelsEnabled = false,
    ScanMalwareInArchives = false,
    ScanNfsMounts = false,
    ScanProcessMemory = false,
    ScanSensitiveData = false,
    ScanWindowsRegistry = false,
    ScapEnabled = false,
    ScapFiles = new[]
    {
        "string",
    },
    Scopes = new[]
    {
        new Aquasec.Inputs.KubernetesAssurancePolicyScopeArgs
        {
            Expression = "string",
            Variables = new[]
            {
                new Aquasec.Inputs.KubernetesAssurancePolicyScopeVariableArgs
                {
                    Attribute = "string",
                    Name = "string",
                    Value = "string",
                },
            },
        },
    },
    TrustedBaseImages = new[]
    {
        new Aquasec.Inputs.KubernetesAssurancePolicyTrustedBaseImageArgs
        {
            Imagename = "string",
            Registry = "string",
        },
    },
    TrustedBaseImagesEnabled = false,
    VulnerabilityExploitability = false,
    VulnerabilityScoreRanges = new[]
    {
        0,
    },
    WhitelistedLicenses = new[]
    {
        "string",
    },
    WhitelistedLicensesEnabled = false,
});
example, err := aquasec.NewKubernetesAssurancePolicy(ctx, "kubernetesAssurancePolicyResource", &aquasec.KubernetesAssurancePolicyArgs{
	ApplicationScopes: pulumi.StringArray{
		pulumi.String("string"),
	},
	AggregatedVulnerability: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
	AllowedImages: pulumi.StringArray{
		pulumi.String("string"),
	},
	AssuranceType:      pulumi.String("string"),
	AuditOnFailure:     pulumi.Bool(false),
	Author:             pulumi.String("string"),
	AutoScanConfigured: pulumi.Bool(false),
	AutoScanEnabled:    pulumi.Bool(false),
	AutoScanTimes: aquasec.KubernetesAssurancePolicyAutoScanTimeArray{
		&aquasec.KubernetesAssurancePolicyAutoScanTimeArgs{
			Iteration:     pulumi.Int(0),
			IterationType: pulumi.String("string"),
			Time:          pulumi.String("string"),
			WeekDays: pulumi.StringArray{
				pulumi.String("string"),
			},
		},
	},
	BlacklistPermissions: pulumi.StringArray{
		pulumi.String("string"),
	},
	BlacklistPermissionsEnabled: pulumi.Bool(false),
	BlacklistedLicenses: pulumi.StringArray{
		pulumi.String("string"),
	},
	BlacklistedLicensesEnabled: pulumi.Bool(false),
	BlockFailed:                pulumi.Bool(false),
	ControlExcludeNoFix:        pulumi.Bool(false),
	CustomChecks: aquasec.KubernetesAssurancePolicyCustomCheckArray{
		&aquasec.KubernetesAssurancePolicyCustomCheckArgs{
			Author:       pulumi.String("string"),
			Description:  pulumi.String("string"),
			Engine:       pulumi.String("string"),
			LastModified: pulumi.Int(0),
			Name:         pulumi.String("string"),
			Path:         pulumi.String("string"),
			ReadOnly:     pulumi.Bool(false),
			ScriptId:     pulumi.String("string"),
			Severity:     pulumi.String("string"),
			Snippet:      pulumi.String("string"),
		},
	},
	CustomChecksEnabled:   pulumi.Bool(false),
	CustomSeverity:        pulumi.String("string"),
	CustomSeverityEnabled: pulumi.Bool(false),
	CvesBlackListEnabled:  pulumi.Bool(false),
	CvesBlackLists: pulumi.StringArray{
		pulumi.String("string"),
	},
	CvesWhiteListEnabled: pulumi.Bool(false),
	CvesWhiteLists: pulumi.StringArray{
		pulumi.String("string"),
	},
	CvssSeverity:             pulumi.String("string"),
	CvssSeverityEnabled:      pulumi.Bool(false),
	CvssSeverityExcludeNoFix: pulumi.Bool(false),
	Description:              pulumi.String("string"),
	DisallowExploitTypes: pulumi.StringArray{
		pulumi.String("string"),
	},
	DisallowMalware:             pulumi.Bool(false),
	DockerCisEnabled:            pulumi.Bool(false),
	Domain:                      pulumi.String("string"),
	DomainName:                  pulumi.String("string"),
	DtaEnabled:                  pulumi.Bool(false),
	DtaSeverity:                 pulumi.String("string"),
	Enabled:                     pulumi.Bool(false),
	Enforce:                     pulumi.Bool(false),
	EnforceAfterDays:            pulumi.Int(0),
	EnforceExcessivePermissions: pulumi.Bool(false),
	ExceptionalMonitoredMalwarePaths: pulumi.StringArray{
		pulumi.String("string"),
	},
	ExcludeApplicationScopes: pulumi.StringArray{
		pulumi.String("string"),
	},
	FailCicd: pulumi.Bool(false),
	ForbiddenLabels: aquasec.KubernetesAssurancePolicyForbiddenLabelArray{
		&aquasec.KubernetesAssurancePolicyForbiddenLabelArgs{
			Key:   pulumi.String("string"),
			Value: pulumi.String("string"),
		},
	},
	ForbiddenLabelsEnabled:           pulumi.Bool(false),
	ForceMicroenforcer:               pulumi.Bool(false),
	FunctionIntegrityEnabled:         pulumi.Bool(false),
	IgnoreBaseImageVln:               pulumi.Bool(false),
	IgnoreRecentlyPublishedVln:       pulumi.Bool(false),
	IgnoreRecentlyPublishedVlnPeriod: pulumi.Int(0),
	IgnoreRiskResourcesEnabled:       pulumi.Bool(false),
	IgnoredRiskResources: pulumi.StringArray{
		pulumi.String("string"),
	},
	IgnoredSensitiveResources: pulumi.StringArray{
		pulumi.String("string"),
	},
	Images: pulumi.StringArray{
		pulumi.String("string"),
	},
	KubeCisEnabled: pulumi.Bool(false),
	KubernetesControls: aquasec.KubernetesAssurancePolicyKubernetesControlArray{
		&aquasec.KubernetesAssurancePolicyKubernetesControlArgs{
			AvdId:       pulumi.String("string"),
			Description: pulumi.String("string"),
			Enabled:     pulumi.Bool(false),
			Kind:        pulumi.String("string"),
			Name:        pulumi.String("string"),
			Ootb:        pulumi.Bool(false),
			ScriptId:    pulumi.Int(0),
			Severity:    pulumi.String("string"),
		},
	},
	KubernetesControlsAvdIds: pulumi.StringArray{
		pulumi.String("string"),
	},
	KubernetesControlsNames: pulumi.StringArray{
		pulumi.String("string"),
	},
	Labels: pulumi.StringArray{
		pulumi.String("string"),
	},
	Lastupdate:               pulumi.String("string"),
	LinuxCisEnabled:          pulumi.Bool(false),
	MalwareAction:            pulumi.String("string"),
	MaximumScore:             pulumi.Float64(0),
	MaximumScoreEnabled:      pulumi.Bool(false),
	MaximumScoreExcludeNoFix: pulumi.Bool(false),
	MonitoredMalwarePaths: pulumi.StringArray{
		pulumi.String("string"),
	},
	Name:                      pulumi.String("string"),
	OnlyNoneRootUsers:         pulumi.Bool(false),
	OpenshiftHardeningEnabled: pulumi.Bool(false),
	PackagesBlackListEnabled:  pulumi.Bool(false),
	PackagesBlackLists: aquasec.KubernetesAssurancePolicyPackagesBlackListArray{
		&aquasec.KubernetesAssurancePolicyPackagesBlackListArgs{
			Arch:         pulumi.String("string"),
			Display:      pulumi.String("string"),
			Epoch:        pulumi.String("string"),
			Format:       pulumi.String("string"),
			License:      pulumi.String("string"),
			Name:         pulumi.String("string"),
			Release:      pulumi.String("string"),
			Version:      pulumi.String("string"),
			VersionRange: pulumi.String("string"),
		},
	},
	PackagesWhiteListEnabled: pulumi.Bool(false),
	PackagesWhiteLists: aquasec.KubernetesAssurancePolicyPackagesWhiteListArray{
		&aquasec.KubernetesAssurancePolicyPackagesWhiteListArgs{
			Arch:         pulumi.String("string"),
			Display:      pulumi.String("string"),
			Epoch:        pulumi.String("string"),
			Format:       pulumi.String("string"),
			License:      pulumi.String("string"),
			Name:         pulumi.String("string"),
			Release:      pulumi.String("string"),
			Version:      pulumi.String("string"),
			VersionRange: pulumi.String("string"),
		},
	},
	PartialResultsImageFail: pulumi.Bool(false),
	Permission:              pulumi.String("string"),
	PolicySettings: &aquasec.KubernetesAssurancePolicyPolicySettingsArgs{
		Enforce:        pulumi.Bool(false),
		IsAuditChecked: pulumi.Bool(false),
		Warn:           pulumi.Bool(false),
		WarningMessage: pulumi.String("string"),
	},
	ReadOnly: pulumi.Bool(false),
	Registries: pulumi.StringArray{
		pulumi.String("string"),
	},
	Registry: pulumi.String("string"),
	RequiredLabels: aquasec.KubernetesAssurancePolicyRequiredLabelArray{
		&aquasec.KubernetesAssurancePolicyRequiredLabelArgs{
			Key:   pulumi.String("string"),
			Value: pulumi.String("string"),
		},
	},
	RequiredLabelsEnabled: pulumi.Bool(false),
	ScanMalwareInArchives: pulumi.Bool(false),
	ScanNfsMounts:         pulumi.Bool(false),
	ScanProcessMemory:     pulumi.Bool(false),
	ScanSensitiveData:     pulumi.Bool(false),
	ScanWindowsRegistry:   pulumi.Bool(false),
	ScapEnabled:           pulumi.Bool(false),
	ScapFiles: pulumi.StringArray{
		pulumi.String("string"),
	},
	Scopes: aquasec.KubernetesAssurancePolicyScopeArray{
		&aquasec.KubernetesAssurancePolicyScopeArgs{
			Expression: pulumi.String("string"),
			Variables: aquasec.KubernetesAssurancePolicyScopeVariableArray{
				&aquasec.KubernetesAssurancePolicyScopeVariableArgs{
					Attribute: pulumi.String("string"),
					Name:      pulumi.String("string"),
					Value:     pulumi.String("string"),
				},
			},
		},
	},
	TrustedBaseImages: aquasec.KubernetesAssurancePolicyTrustedBaseImageArray{
		&aquasec.KubernetesAssurancePolicyTrustedBaseImageArgs{
			Imagename: pulumi.String("string"),
			Registry:  pulumi.String("string"),
		},
	},
	TrustedBaseImagesEnabled:    pulumi.Bool(false),
	VulnerabilityExploitability: pulumi.Bool(false),
	VulnerabilityScoreRanges: pulumi.IntArray{
		pulumi.Int(0),
	},
	WhitelistedLicenses: pulumi.StringArray{
		pulumi.String("string"),
	},
	WhitelistedLicensesEnabled: pulumi.Bool(false),
})
var kubernetesAssurancePolicyResource = new KubernetesAssurancePolicy("kubernetesAssurancePolicyResource", KubernetesAssurancePolicyArgs.builder()
    .applicationScopes("string")
    .aggregatedVulnerability(Map.of("string", "string"))
    .allowedImages("string")
    .assuranceType("string")
    .auditOnFailure(false)
    .author("string")
    .autoScanConfigured(false)
    .autoScanEnabled(false)
    .autoScanTimes(KubernetesAssurancePolicyAutoScanTimeArgs.builder()
        .iteration(0)
        .iterationType("string")
        .time("string")
        .weekDays("string")
        .build())
    .blacklistPermissions("string")
    .blacklistPermissionsEnabled(false)
    .blacklistedLicenses("string")
    .blacklistedLicensesEnabled(false)
    .blockFailed(false)
    .controlExcludeNoFix(false)
    .customChecks(KubernetesAssurancePolicyCustomCheckArgs.builder()
        .author("string")
        .description("string")
        .engine("string")
        .lastModified(0)
        .name("string")
        .path("string")
        .readOnly(false)
        .scriptId("string")
        .severity("string")
        .snippet("string")
        .build())
    .customChecksEnabled(false)
    .customSeverity("string")
    .customSeverityEnabled(false)
    .cvesBlackListEnabled(false)
    .cvesBlackLists("string")
    .cvesWhiteListEnabled(false)
    .cvesWhiteLists("string")
    .cvssSeverity("string")
    .cvssSeverityEnabled(false)
    .cvssSeverityExcludeNoFix(false)
    .description("string")
    .disallowExploitTypes("string")
    .disallowMalware(false)
    .dockerCisEnabled(false)
    .domain("string")
    .domainName("string")
    .dtaEnabled(false)
    .dtaSeverity("string")
    .enabled(false)
    .enforce(false)
    .enforceAfterDays(0)
    .enforceExcessivePermissions(false)
    .exceptionalMonitoredMalwarePaths("string")
    .excludeApplicationScopes("string")
    .failCicd(false)
    .forbiddenLabels(KubernetesAssurancePolicyForbiddenLabelArgs.builder()
        .key("string")
        .value("string")
        .build())
    .forbiddenLabelsEnabled(false)
    .forceMicroenforcer(false)
    .functionIntegrityEnabled(false)
    .ignoreBaseImageVln(false)
    .ignoreRecentlyPublishedVln(false)
    .ignoreRecentlyPublishedVlnPeriod(0)
    .ignoreRiskResourcesEnabled(false)
    .ignoredRiskResources("string")
    .ignoredSensitiveResources("string")
    .images("string")
    .kubeCisEnabled(false)
    .kubernetesControls(KubernetesAssurancePolicyKubernetesControlArgs.builder()
        .avdId("string")
        .description("string")
        .enabled(false)
        .kind("string")
        .name("string")
        .ootb(false)
        .scriptId(0)
        .severity("string")
        .build())
    .kubernetesControlsAvdIds("string")
    .kubernetesControlsNames("string")
    .labels("string")
    .lastupdate("string")
    .linuxCisEnabled(false)
    .malwareAction("string")
    .maximumScore(0)
    .maximumScoreEnabled(false)
    .maximumScoreExcludeNoFix(false)
    .monitoredMalwarePaths("string")
    .name("string")
    .onlyNoneRootUsers(false)
    .openshiftHardeningEnabled(false)
    .packagesBlackListEnabled(false)
    .packagesBlackLists(KubernetesAssurancePolicyPackagesBlackListArgs.builder()
        .arch("string")
        .display("string")
        .epoch("string")
        .format("string")
        .license("string")
        .name("string")
        .release("string")
        .version("string")
        .versionRange("string")
        .build())
    .packagesWhiteListEnabled(false)
    .packagesWhiteLists(KubernetesAssurancePolicyPackagesWhiteListArgs.builder()
        .arch("string")
        .display("string")
        .epoch("string")
        .format("string")
        .license("string")
        .name("string")
        .release("string")
        .version("string")
        .versionRange("string")
        .build())
    .partialResultsImageFail(false)
    .permission("string")
    .policySettings(KubernetesAssurancePolicyPolicySettingsArgs.builder()
        .enforce(false)
        .isAuditChecked(false)
        .warn(false)
        .warningMessage("string")
        .build())
    .readOnly(false)
    .registries("string")
    .registry("string")
    .requiredLabels(KubernetesAssurancePolicyRequiredLabelArgs.builder()
        .key("string")
        .value("string")
        .build())
    .requiredLabelsEnabled(false)
    .scanMalwareInArchives(false)
    .scanNfsMounts(false)
    .scanProcessMemory(false)
    .scanSensitiveData(false)
    .scanWindowsRegistry(false)
    .scapEnabled(false)
    .scapFiles("string")
    .scopes(KubernetesAssurancePolicyScopeArgs.builder()
        .expression("string")
        .variables(KubernetesAssurancePolicyScopeVariableArgs.builder()
            .attribute("string")
            .name("string")
            .value("string")
            .build())
        .build())
    .trustedBaseImages(KubernetesAssurancePolicyTrustedBaseImageArgs.builder()
        .imagename("string")
        .registry("string")
        .build())
    .trustedBaseImagesEnabled(false)
    .vulnerabilityExploitability(false)
    .vulnerabilityScoreRanges(0)
    .whitelistedLicenses("string")
    .whitelistedLicensesEnabled(false)
    .build());
kubernetes_assurance_policy_resource = aquasec.KubernetesAssurancePolicy("kubernetesAssurancePolicyResource",
    application_scopes=["string"],
    aggregated_vulnerability={
        "string": "string",
    },
    allowed_images=["string"],
    assurance_type="string",
    audit_on_failure=False,
    author="string",
    auto_scan_configured=False,
    auto_scan_enabled=False,
    auto_scan_times=[aquasec.KubernetesAssurancePolicyAutoScanTimeArgs(
        iteration=0,
        iteration_type="string",
        time="string",
        week_days=["string"],
    )],
    blacklist_permissions=["string"],
    blacklist_permissions_enabled=False,
    blacklisted_licenses=["string"],
    blacklisted_licenses_enabled=False,
    block_failed=False,
    control_exclude_no_fix=False,
    custom_checks=[aquasec.KubernetesAssurancePolicyCustomCheckArgs(
        author="string",
        description="string",
        engine="string",
        last_modified=0,
        name="string",
        path="string",
        read_only=False,
        script_id="string",
        severity="string",
        snippet="string",
    )],
    custom_checks_enabled=False,
    custom_severity="string",
    custom_severity_enabled=False,
    cves_black_list_enabled=False,
    cves_black_lists=["string"],
    cves_white_list_enabled=False,
    cves_white_lists=["string"],
    cvss_severity="string",
    cvss_severity_enabled=False,
    cvss_severity_exclude_no_fix=False,
    description="string",
    disallow_exploit_types=["string"],
    disallow_malware=False,
    docker_cis_enabled=False,
    domain="string",
    domain_name="string",
    dta_enabled=False,
    dta_severity="string",
    enabled=False,
    enforce=False,
    enforce_after_days=0,
    enforce_excessive_permissions=False,
    exceptional_monitored_malware_paths=["string"],
    exclude_application_scopes=["string"],
    fail_cicd=False,
    forbidden_labels=[aquasec.KubernetesAssurancePolicyForbiddenLabelArgs(
        key="string",
        value="string",
    )],
    forbidden_labels_enabled=False,
    force_microenforcer=False,
    function_integrity_enabled=False,
    ignore_base_image_vln=False,
    ignore_recently_published_vln=False,
    ignore_recently_published_vln_period=0,
    ignore_risk_resources_enabled=False,
    ignored_risk_resources=["string"],
    ignored_sensitive_resources=["string"],
    images=["string"],
    kube_cis_enabled=False,
    kubernetes_controls=[aquasec.KubernetesAssurancePolicyKubernetesControlArgs(
        avd_id="string",
        description="string",
        enabled=False,
        kind="string",
        name="string",
        ootb=False,
        script_id=0,
        severity="string",
    )],
    kubernetes_controls_avd_ids=["string"],
    kubernetes_controls_names=["string"],
    labels=["string"],
    lastupdate="string",
    linux_cis_enabled=False,
    malware_action="string",
    maximum_score=0,
    maximum_score_enabled=False,
    maximum_score_exclude_no_fix=False,
    monitored_malware_paths=["string"],
    name="string",
    only_none_root_users=False,
    openshift_hardening_enabled=False,
    packages_black_list_enabled=False,
    packages_black_lists=[aquasec.KubernetesAssurancePolicyPackagesBlackListArgs(
        arch="string",
        display="string",
        epoch="string",
        format="string",
        license="string",
        name="string",
        release="string",
        version="string",
        version_range="string",
    )],
    packages_white_list_enabled=False,
    packages_white_lists=[aquasec.KubernetesAssurancePolicyPackagesWhiteListArgs(
        arch="string",
        display="string",
        epoch="string",
        format="string",
        license="string",
        name="string",
        release="string",
        version="string",
        version_range="string",
    )],
    partial_results_image_fail=False,
    permission="string",
    policy_settings=aquasec.KubernetesAssurancePolicyPolicySettingsArgs(
        enforce=False,
        is_audit_checked=False,
        warn=False,
        warning_message="string",
    ),
    read_only=False,
    registries=["string"],
    registry="string",
    required_labels=[aquasec.KubernetesAssurancePolicyRequiredLabelArgs(
        key="string",
        value="string",
    )],
    required_labels_enabled=False,
    scan_malware_in_archives=False,
    scan_nfs_mounts=False,
    scan_process_memory=False,
    scan_sensitive_data=False,
    scan_windows_registry=False,
    scap_enabled=False,
    scap_files=["string"],
    scopes=[aquasec.KubernetesAssurancePolicyScopeArgs(
        expression="string",
        variables=[aquasec.KubernetesAssurancePolicyScopeVariableArgs(
            attribute="string",
            name="string",
            value="string",
        )],
    )],
    trusted_base_images=[aquasec.KubernetesAssurancePolicyTrustedBaseImageArgs(
        imagename="string",
        registry="string",
    )],
    trusted_base_images_enabled=False,
    vulnerability_exploitability=False,
    vulnerability_score_ranges=[0],
    whitelisted_licenses=["string"],
    whitelisted_licenses_enabled=False)
const kubernetesAssurancePolicyResource = new aquasec.KubernetesAssurancePolicy("kubernetesAssurancePolicyResource", {
    applicationScopes: ["string"],
    aggregatedVulnerability: {
        string: "string",
    },
    allowedImages: ["string"],
    assuranceType: "string",
    auditOnFailure: false,
    author: "string",
    autoScanConfigured: false,
    autoScanEnabled: false,
    autoScanTimes: [{
        iteration: 0,
        iterationType: "string",
        time: "string",
        weekDays: ["string"],
    }],
    blacklistPermissions: ["string"],
    blacklistPermissionsEnabled: false,
    blacklistedLicenses: ["string"],
    blacklistedLicensesEnabled: false,
    blockFailed: false,
    controlExcludeNoFix: false,
    customChecks: [{
        author: "string",
        description: "string",
        engine: "string",
        lastModified: 0,
        name: "string",
        path: "string",
        readOnly: false,
        scriptId: "string",
        severity: "string",
        snippet: "string",
    }],
    customChecksEnabled: false,
    customSeverity: "string",
    customSeverityEnabled: false,
    cvesBlackListEnabled: false,
    cvesBlackLists: ["string"],
    cvesWhiteListEnabled: false,
    cvesWhiteLists: ["string"],
    cvssSeverity: "string",
    cvssSeverityEnabled: false,
    cvssSeverityExcludeNoFix: false,
    description: "string",
    disallowExploitTypes: ["string"],
    disallowMalware: false,
    dockerCisEnabled: false,
    domain: "string",
    domainName: "string",
    dtaEnabled: false,
    dtaSeverity: "string",
    enabled: false,
    enforce: false,
    enforceAfterDays: 0,
    enforceExcessivePermissions: false,
    exceptionalMonitoredMalwarePaths: ["string"],
    excludeApplicationScopes: ["string"],
    failCicd: false,
    forbiddenLabels: [{
        key: "string",
        value: "string",
    }],
    forbiddenLabelsEnabled: false,
    forceMicroenforcer: false,
    functionIntegrityEnabled: false,
    ignoreBaseImageVln: false,
    ignoreRecentlyPublishedVln: false,
    ignoreRecentlyPublishedVlnPeriod: 0,
    ignoreRiskResourcesEnabled: false,
    ignoredRiskResources: ["string"],
    ignoredSensitiveResources: ["string"],
    images: ["string"],
    kubeCisEnabled: false,
    kubernetesControls: [{
        avdId: "string",
        description: "string",
        enabled: false,
        kind: "string",
        name: "string",
        ootb: false,
        scriptId: 0,
        severity: "string",
    }],
    kubernetesControlsAvdIds: ["string"],
    kubernetesControlsNames: ["string"],
    labels: ["string"],
    lastupdate: "string",
    linuxCisEnabled: false,
    malwareAction: "string",
    maximumScore: 0,
    maximumScoreEnabled: false,
    maximumScoreExcludeNoFix: false,
    monitoredMalwarePaths: ["string"],
    name: "string",
    onlyNoneRootUsers: false,
    openshiftHardeningEnabled: false,
    packagesBlackListEnabled: false,
    packagesBlackLists: [{
        arch: "string",
        display: "string",
        epoch: "string",
        format: "string",
        license: "string",
        name: "string",
        release: "string",
        version: "string",
        versionRange: "string",
    }],
    packagesWhiteListEnabled: false,
    packagesWhiteLists: [{
        arch: "string",
        display: "string",
        epoch: "string",
        format: "string",
        license: "string",
        name: "string",
        release: "string",
        version: "string",
        versionRange: "string",
    }],
    partialResultsImageFail: false,
    permission: "string",
    policySettings: {
        enforce: false,
        isAuditChecked: false,
        warn: false,
        warningMessage: "string",
    },
    readOnly: false,
    registries: ["string"],
    registry: "string",
    requiredLabels: [{
        key: "string",
        value: "string",
    }],
    requiredLabelsEnabled: false,
    scanMalwareInArchives: false,
    scanNfsMounts: false,
    scanProcessMemory: false,
    scanSensitiveData: false,
    scanWindowsRegistry: false,
    scapEnabled: false,
    scapFiles: ["string"],
    scopes: [{
        expression: "string",
        variables: [{
            attribute: "string",
            name: "string",
            value: "string",
        }],
    }],
    trustedBaseImages: [{
        imagename: "string",
        registry: "string",
    }],
    trustedBaseImagesEnabled: false,
    vulnerabilityExploitability: false,
    vulnerabilityScoreRanges: [0],
    whitelistedLicenses: ["string"],
    whitelistedLicensesEnabled: false,
});
type: aquasec:KubernetesAssurancePolicy
properties:
    aggregatedVulnerability:
        string: string
    allowedImages:
        - string
    applicationScopes:
        - string
    assuranceType: string
    auditOnFailure: false
    author: string
    autoScanConfigured: false
    autoScanEnabled: false
    autoScanTimes:
        - iteration: 0
          iterationType: string
          time: string
          weekDays:
            - string
    blacklistPermissions:
        - string
    blacklistPermissionsEnabled: false
    blacklistedLicenses:
        - string
    blacklistedLicensesEnabled: false
    blockFailed: false
    controlExcludeNoFix: false
    customChecks:
        - author: string
          description: string
          engine: string
          lastModified: 0
          name: string
          path: string
          readOnly: false
          scriptId: string
          severity: string
          snippet: string
    customChecksEnabled: false
    customSeverity: string
    customSeverityEnabled: false
    cvesBlackListEnabled: false
    cvesBlackLists:
        - string
    cvesWhiteListEnabled: false
    cvesWhiteLists:
        - string
    cvssSeverity: string
    cvssSeverityEnabled: false
    cvssSeverityExcludeNoFix: false
    description: string
    disallowExploitTypes:
        - string
    disallowMalware: false
    dockerCisEnabled: false
    domain: string
    domainName: string
    dtaEnabled: false
    dtaSeverity: string
    enabled: false
    enforce: false
    enforceAfterDays: 0
    enforceExcessivePermissions: false
    exceptionalMonitoredMalwarePaths:
        - string
    excludeApplicationScopes:
        - string
    failCicd: false
    forbiddenLabels:
        - key: string
          value: string
    forbiddenLabelsEnabled: false
    forceMicroenforcer: false
    functionIntegrityEnabled: false
    ignoreBaseImageVln: false
    ignoreRecentlyPublishedVln: false
    ignoreRecentlyPublishedVlnPeriod: 0
    ignoreRiskResourcesEnabled: false
    ignoredRiskResources:
        - string
    ignoredSensitiveResources:
        - string
    images:
        - string
    kubeCisEnabled: false
    kubernetesControls:
        - avdId: string
          description: string
          enabled: false
          kind: string
          name: string
          ootb: false
          scriptId: 0
          severity: string
    kubernetesControlsAvdIds:
        - string
    kubernetesControlsNames:
        - string
    labels:
        - string
    lastupdate: string
    linuxCisEnabled: false
    malwareAction: string
    maximumScore: 0
    maximumScoreEnabled: false
    maximumScoreExcludeNoFix: false
    monitoredMalwarePaths:
        - string
    name: string
    onlyNoneRootUsers: false
    openshiftHardeningEnabled: false
    packagesBlackListEnabled: false
    packagesBlackLists:
        - arch: string
          display: string
          epoch: string
          format: string
          license: string
          name: string
          release: string
          version: string
          versionRange: string
    packagesWhiteListEnabled: false
    packagesWhiteLists:
        - arch: string
          display: string
          epoch: string
          format: string
          license: string
          name: string
          release: string
          version: string
          versionRange: string
    partialResultsImageFail: false
    permission: string
    policySettings:
        enforce: false
        isAuditChecked: false
        warn: false
        warningMessage: string
    readOnly: false
    registries:
        - string
    registry: string
    requiredLabels:
        - key: string
          value: string
    requiredLabelsEnabled: false
    scanMalwareInArchives: false
    scanNfsMounts: false
    scanProcessMemory: false
    scanSensitiveData: false
    scanWindowsRegistry: false
    scapEnabled: false
    scapFiles:
        - string
    scopes:
        - expression: string
          variables:
            - attribute: string
              name: string
              value: string
    trustedBaseImages:
        - imagename: string
          registry: string
    trustedBaseImagesEnabled: false
    vulnerabilityExploitability: false
    vulnerabilityScoreRanges:
        - 0
    whitelistedLicenses:
        - string
    whitelistedLicensesEnabled: false
KubernetesAssurancePolicy Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The KubernetesAssurancePolicy resource accepts the following input properties:
- ApplicationScopes List<string>
- AggregatedVulnerability Dictionary<string, string>
- Aggregated vulnerability information.
- AllowedImages List<string>
- List of explicitly allowed images.
- AssuranceType string
- What type of assurance policy is described.
- AuditOn boolFailure 
- Indicates if auditing for failures.
- string
- Name of user account that created the policy.
- AutoScan boolConfigured 
- AutoScan boolEnabled 
- AutoScan List<Pulumiverse.Times Aquasec. Inputs. Kubernetes Assurance Policy Auto Scan Time> 
- BlacklistPermissions List<string>
- List of function's forbidden permissions.
- BlacklistPermissions boolEnabled 
- Indicates if blacklist permissions is relevant.
- BlacklistedLicenses List<string>
- List of blacklisted licenses.
- BlacklistedLicenses boolEnabled 
- Indicates if license blacklist is relevant.
- BlockFailed bool
- Indicates if failed images are blocked.
- ControlExclude boolNo Fix 
- CustomChecks List<Pulumiverse.Aquasec. Inputs. Kubernetes Assurance Policy Custom Check> 
- List of Custom user scripts for checks.
- CustomChecks boolEnabled 
- Indicates if scanning should include custom checks.
- CustomSeverity string
- CustomSeverity boolEnabled 
- CvesBlack boolList Enabled 
- Indicates if CVEs blacklist is relevant.
- CvesBlack List<string>Lists 
- List of CVEs blacklisted items.
- CvesWhite boolList Enabled 
- Indicates if CVEs whitelist is relevant.
- CvesWhite List<string>Lists 
- List of cves whitelisted licenses
- CvssSeverity string
- Identifier of the cvss severity.
- CvssSeverity boolEnabled 
- Indicates if the cvss severity is scanned.
- CvssSeverity boolExclude No Fix 
- Indicates that policy should ignore cvss cases that do not have a known fix.
- Description string
- DisallowExploit List<string>Types 
- DisallowMalware bool
- Indicates if malware should block the image.
- DockerCis boolEnabled 
- Checks the host according to the Docker CIS benchmark, if Docker is found on the host.
- Domain string
- Name of the container image.
- DomainName string
- DtaEnabled bool
- DtaSeverity string
- Enabled bool
- Is the control enabled?
- Enforce bool
- EnforceAfter intDays 
- EnforceExcessive boolPermissions 
- ExceptionalMonitored List<string>Malware Paths 
- ExcludeApplication List<string>Scopes 
- FailCicd bool
- Indicates if cicd failures will fail the image.
- ForbiddenLabels List<Pulumiverse.Aquasec. Inputs. Kubernetes Assurance Policy Forbidden Label> 
- ForbiddenLabels boolEnabled 
- ForceMicroenforcer bool
- FunctionIntegrity boolEnabled 
- IgnoreBase boolImage Vln 
- IgnoreRecently boolPublished Vln 
- IgnoreRecently intPublished Vln Period 
- IgnoreRisk boolResources Enabled 
- Indicates if risk resources are ignored.
- IgnoredRisk List<string>Resources 
- List of ignored risk resources.
- IgnoredSensitive List<string>Resources 
- Images List<string>
- List of images.
- KubeCis boolEnabled 
- Performs a Kubernetes CIS benchmark check for the host.
- KubernetesControls List<Pulumiverse.Aquasec. Inputs. Kubernetes Assurance Policy Kubernetes Control> 
- List of Kubernetes controls.
- KubernetesControls List<string>Avd Ids 
- KubernetesControls List<string>Names 
- List of kubernetes control names and available kubernetes controls are: 'Access to host IPC namespace', 'Access to host PID', 'Access to host network', 'Access to host ports', 'All container images must start with a GCR domain', 'All container images must start with an ECR domain', 'All container images must start with the *.azurecr.io domain', 'CPU not limited', 'CPU requests not specified', 'Can elevate its own privileges', 'ConfigMap with secrets', 'ConfigMap with sensitive content', 'Container images from public registries used', 'Default capabilitiessome containers do not drop all', 'Default capabilitiessome containers do not drop any', 'Delete pod logs', 'Exec into Pods', 'Image tag :latest used', 'Manage EKS IAM Auth ConfigMap', 'Manage Kubernetes RBAC resources', 'Manage Kubernetes networking', 'Manage Kubernetes workloads and pods', 'Manage all resources', 'Manage all resources at the namespace', 'Manage configmaps', 'Manage namespace secrets', 'Manage secrets', 'Manage webhookconfigurations', 'Manages /etc/hosts', 'Memory not limited', 'Memory requests not specified', 'Non-core volume types used.', 'Non-default /proc masks set', 'Privileged', 'Root file system is not read-only', 'Runs as root user', 'Runs with GID <= 10000', 'Runs with UID <= 10000', 'Runs with a root primary or supplementary GID', 'Runtime/Default AppArmor profile not set', 'Runtime/Default Seccomp profile not set', 'SELinux custom options set', 'SYS_ADMIN capability added', 'Seccomp policies disabled', 'Service with External IP', 'Specific capabilities added', 'Unsafe sysctl options set', 'User with admin access', 'Workloads in the default namespace', 'hostPath volume mounted with docker.sock', 'hostPath volumes mounted'
- Labels List<string>
- List of labels.
- Lastupdate string
- LinuxCis boolEnabled 
- MalwareAction string
- MaximumScore double
- Value of allowed maximum score.
- MaximumScore boolEnabled 
- Indicates if exceeding the maximum score is scanned.
- MaximumScore boolExclude No Fix 
- Indicates that policy should ignore cases that do not have a known fix.
- MonitoredMalware List<string>Paths 
- Name string
- OnlyNone boolRoot Users 
- Indicates if raise a warning for images that should only be run as root.
- OpenshiftHardening boolEnabled 
- PackagesBlack boolList Enabled 
- Indicates if packages blacklist is relevant.
- PackagesBlack List<Pulumiverse.Lists Aquasec. Inputs. Kubernetes Assurance Policy Packages Black List> 
- List of blacklisted images.
- PackagesWhite boolList Enabled 
- Indicates if packages whitelist is relevant.
- PackagesWhite List<Pulumiverse.Lists Aquasec. Inputs. Kubernetes Assurance Policy Packages White List> 
- List of whitelisted images.
- PartialResults boolImage Fail 
- Permission string
- PolicySettings Pulumiverse.Aquasec. Inputs. Kubernetes Assurance Policy Policy Settings 
- ReadOnly bool
- Registries List<string>
- List of registries.
- Registry string
- RequiredLabels List<Pulumiverse.Aquasec. Inputs. Kubernetes Assurance Policy Required Label> 
- RequiredLabels boolEnabled 
- ScanMalware boolIn Archives 
- ScanNfs boolMounts 
- ScanProcess boolMemory 
- ScanSensitive boolData 
- Indicates if scan should include sensitive data in the image.
- ScanWindows boolRegistry 
- ScapEnabled bool
- Indicates if scanning should include scap.
- ScapFiles List<string>
- List of SCAP user scripts for checks.
- Scopes
List<Pulumiverse.Aquasec. Inputs. Kubernetes Assurance Policy Scope> 
- TrustedBase List<Pulumiverse.Images Aquasec. Inputs. Kubernetes Assurance Policy Trusted Base Image> 
- List of trusted images.
- TrustedBase boolImages Enabled 
- Indicates if list of trusted base images is relevant.
- VulnerabilityExploitability bool
- VulnerabilityScore List<int>Ranges 
- WhitelistedLicenses List<string>
- List of whitelisted licenses.
- WhitelistedLicenses boolEnabled 
- Indicates if license blacklist is relevant.
- ApplicationScopes []string
- AggregatedVulnerability map[string]string
- Aggregated vulnerability information.
- AllowedImages []string
- List of explicitly allowed images.
- AssuranceType string
- What type of assurance policy is described.
- AuditOn boolFailure 
- Indicates if auditing for failures.
- string
- Name of user account that created the policy.
- AutoScan boolConfigured 
- AutoScan boolEnabled 
- AutoScan []KubernetesTimes Assurance Policy Auto Scan Time Args 
- BlacklistPermissions []string
- List of function's forbidden permissions.
- BlacklistPermissions boolEnabled 
- Indicates if blacklist permissions is relevant.
- BlacklistedLicenses []string
- List of blacklisted licenses.
- BlacklistedLicenses boolEnabled 
- Indicates if license blacklist is relevant.
- BlockFailed bool
- Indicates if failed images are blocked.
- ControlExclude boolNo Fix 
- CustomChecks []KubernetesAssurance Policy Custom Check Args 
- List of Custom user scripts for checks.
- CustomChecks boolEnabled 
- Indicates if scanning should include custom checks.
- CustomSeverity string
- CustomSeverity boolEnabled 
- CvesBlack boolList Enabled 
- Indicates if CVEs blacklist is relevant.
- CvesBlack []stringLists 
- List of CVEs blacklisted items.
- CvesWhite boolList Enabled 
- Indicates if CVEs whitelist is relevant.
- CvesWhite []stringLists 
- List of cves whitelisted licenses
- CvssSeverity string
- Identifier of the cvss severity.
- CvssSeverity boolEnabled 
- Indicates if the cvss severity is scanned.
- CvssSeverity boolExclude No Fix 
- Indicates that policy should ignore cvss cases that do not have a known fix.
- Description string
- DisallowExploit []stringTypes 
- DisallowMalware bool
- Indicates if malware should block the image.
- DockerCis boolEnabled 
- Checks the host according to the Docker CIS benchmark, if Docker is found on the host.
- Domain string
- Name of the container image.
- DomainName string
- DtaEnabled bool
- DtaSeverity string
- Enabled bool
- Is the control enabled?
- Enforce bool
- EnforceAfter intDays 
- EnforceExcessive boolPermissions 
- ExceptionalMonitored []stringMalware Paths 
- ExcludeApplication []stringScopes 
- FailCicd bool
- Indicates if cicd failures will fail the image.
- ForbiddenLabels []KubernetesAssurance Policy Forbidden Label Args 
- ForbiddenLabels boolEnabled 
- ForceMicroenforcer bool
- FunctionIntegrity boolEnabled 
- IgnoreBase boolImage Vln 
- IgnoreRecently boolPublished Vln 
- IgnoreRecently intPublished Vln Period 
- IgnoreRisk boolResources Enabled 
- Indicates if risk resources are ignored.
- IgnoredRisk []stringResources 
- List of ignored risk resources.
- IgnoredSensitive []stringResources 
- Images []string
- List of images.
- KubeCis boolEnabled 
- Performs a Kubernetes CIS benchmark check for the host.
- KubernetesControls []KubernetesAssurance Policy Kubernetes Control Args 
- List of Kubernetes controls.
- KubernetesControls []stringAvd Ids 
- KubernetesControls []stringNames 
- List of kubernetes control names and available kubernetes controls are: 'Access to host IPC namespace', 'Access to host PID', 'Access to host network', 'Access to host ports', 'All container images must start with a GCR domain', 'All container images must start with an ECR domain', 'All container images must start with the *.azurecr.io domain', 'CPU not limited', 'CPU requests not specified', 'Can elevate its own privileges', 'ConfigMap with secrets', 'ConfigMap with sensitive content', 'Container images from public registries used', 'Default capabilitiessome containers do not drop all', 'Default capabilitiessome containers do not drop any', 'Delete pod logs', 'Exec into Pods', 'Image tag :latest used', 'Manage EKS IAM Auth ConfigMap', 'Manage Kubernetes RBAC resources', 'Manage Kubernetes networking', 'Manage Kubernetes workloads and pods', 'Manage all resources', 'Manage all resources at the namespace', 'Manage configmaps', 'Manage namespace secrets', 'Manage secrets', 'Manage webhookconfigurations', 'Manages /etc/hosts', 'Memory not limited', 'Memory requests not specified', 'Non-core volume types used.', 'Non-default /proc masks set', 'Privileged', 'Root file system is not read-only', 'Runs as root user', 'Runs with GID <= 10000', 'Runs with UID <= 10000', 'Runs with a root primary or supplementary GID', 'Runtime/Default AppArmor profile not set', 'Runtime/Default Seccomp profile not set', 'SELinux custom options set', 'SYS_ADMIN capability added', 'Seccomp policies disabled', 'Service with External IP', 'Specific capabilities added', 'Unsafe sysctl options set', 'User with admin access', 'Workloads in the default namespace', 'hostPath volume mounted with docker.sock', 'hostPath volumes mounted'
- Labels []string
- List of labels.
- Lastupdate string
- LinuxCis boolEnabled 
- MalwareAction string
- MaximumScore float64
- Value of allowed maximum score.
- MaximumScore boolEnabled 
- Indicates if exceeding the maximum score is scanned.
- MaximumScore boolExclude No Fix 
- Indicates that policy should ignore cases that do not have a known fix.
- MonitoredMalware []stringPaths 
- Name string
- OnlyNone boolRoot Users 
- Indicates if raise a warning for images that should only be run as root.
- OpenshiftHardening boolEnabled 
- PackagesBlack boolList Enabled 
- Indicates if packages blacklist is relevant.
- PackagesBlack []KubernetesLists Assurance Policy Packages Black List Args 
- List of blacklisted images.
- PackagesWhite boolList Enabled 
- Indicates if packages whitelist is relevant.
- PackagesWhite []KubernetesLists Assurance Policy Packages White List Args 
- List of whitelisted images.
- PartialResults boolImage Fail 
- Permission string
- PolicySettings KubernetesAssurance Policy Policy Settings Args 
- ReadOnly bool
- Registries []string
- List of registries.
- Registry string
- RequiredLabels []KubernetesAssurance Policy Required Label Args 
- RequiredLabels boolEnabled 
- ScanMalware boolIn Archives 
- ScanNfs boolMounts 
- ScanProcess boolMemory 
- ScanSensitive boolData 
- Indicates if scan should include sensitive data in the image.
- ScanWindows boolRegistry 
- ScapEnabled bool
- Indicates if scanning should include scap.
- ScapFiles []string
- List of SCAP user scripts for checks.
- Scopes
[]KubernetesAssurance Policy Scope Args 
- TrustedBase []KubernetesImages Assurance Policy Trusted Base Image Args 
- List of trusted images.
- TrustedBase boolImages Enabled 
- Indicates if list of trusted base images is relevant.
- VulnerabilityExploitability bool
- VulnerabilityScore []intRanges 
- WhitelistedLicenses []string
- List of whitelisted licenses.
- WhitelistedLicenses boolEnabled 
- Indicates if license blacklist is relevant.
- applicationScopes List<String>
- aggregatedVulnerability Map<String,String>
- Aggregated vulnerability information.
- allowedImages List<String>
- List of explicitly allowed images.
- assuranceType String
- What type of assurance policy is described.
- auditOn BooleanFailure 
- Indicates if auditing for failures.
- String
- Name of user account that created the policy.
- autoScan BooleanConfigured 
- autoScan BooleanEnabled 
- autoScan List<KubernetesTimes Assurance Policy Auto Scan Time> 
- blacklistPermissions List<String>
- List of function's forbidden permissions.
- blacklistPermissions BooleanEnabled 
- Indicates if blacklist permissions is relevant.
- blacklistedLicenses List<String>
- List of blacklisted licenses.
- blacklistedLicenses BooleanEnabled 
- Indicates if license blacklist is relevant.
- blockFailed Boolean
- Indicates if failed images are blocked.
- controlExclude BooleanNo Fix 
- customChecks List<KubernetesAssurance Policy Custom Check> 
- List of Custom user scripts for checks.
- customChecks BooleanEnabled 
- Indicates if scanning should include custom checks.
- customSeverity String
- customSeverity BooleanEnabled 
- cvesBlack BooleanList Enabled 
- Indicates if CVEs blacklist is relevant.
- cvesBlack List<String>Lists 
- List of CVEs blacklisted items.
- cvesWhite BooleanList Enabled 
- Indicates if CVEs whitelist is relevant.
- cvesWhite List<String>Lists 
- List of cves whitelisted licenses
- cvssSeverity String
- Identifier of the cvss severity.
- cvssSeverity BooleanEnabled 
- Indicates if the cvss severity is scanned.
- cvssSeverity BooleanExclude No Fix 
- Indicates that policy should ignore cvss cases that do not have a known fix.
- description String
- disallowExploit List<String>Types 
- disallowMalware Boolean
- Indicates if malware should block the image.
- dockerCis BooleanEnabled 
- Checks the host according to the Docker CIS benchmark, if Docker is found on the host.
- domain String
- Name of the container image.
- domainName String
- dtaEnabled Boolean
- dtaSeverity String
- enabled Boolean
- Is the control enabled?
- enforce Boolean
- enforceAfter IntegerDays 
- enforceExcessive BooleanPermissions 
- exceptionalMonitored List<String>Malware Paths 
- excludeApplication List<String>Scopes 
- failCicd Boolean
- Indicates if cicd failures will fail the image.
- forbiddenLabels List<KubernetesAssurance Policy Forbidden Label> 
- forbiddenLabels BooleanEnabled 
- forceMicroenforcer Boolean
- functionIntegrity BooleanEnabled 
- ignoreBase BooleanImage Vln 
- ignoreRecently BooleanPublished Vln 
- ignoreRecently IntegerPublished Vln Period 
- ignoreRisk BooleanResources Enabled 
- Indicates if risk resources are ignored.
- ignoredRisk List<String>Resources 
- List of ignored risk resources.
- ignoredSensitive List<String>Resources 
- images List<String>
- List of images.
- kubeCis BooleanEnabled 
- Performs a Kubernetes CIS benchmark check for the host.
- kubernetesControls List<KubernetesAssurance Policy Kubernetes Control> 
- List of Kubernetes controls.
- kubernetesControls List<String>Avd Ids 
- kubernetesControls List<String>Names 
- List of kubernetes control names and available kubernetes controls are: 'Access to host IPC namespace', 'Access to host PID', 'Access to host network', 'Access to host ports', 'All container images must start with a GCR domain', 'All container images must start with an ECR domain', 'All container images must start with the *.azurecr.io domain', 'CPU not limited', 'CPU requests not specified', 'Can elevate its own privileges', 'ConfigMap with secrets', 'ConfigMap with sensitive content', 'Container images from public registries used', 'Default capabilitiessome containers do not drop all', 'Default capabilitiessome containers do not drop any', 'Delete pod logs', 'Exec into Pods', 'Image tag :latest used', 'Manage EKS IAM Auth ConfigMap', 'Manage Kubernetes RBAC resources', 'Manage Kubernetes networking', 'Manage Kubernetes workloads and pods', 'Manage all resources', 'Manage all resources at the namespace', 'Manage configmaps', 'Manage namespace secrets', 'Manage secrets', 'Manage webhookconfigurations', 'Manages /etc/hosts', 'Memory not limited', 'Memory requests not specified', 'Non-core volume types used.', 'Non-default /proc masks set', 'Privileged', 'Root file system is not read-only', 'Runs as root user', 'Runs with GID <= 10000', 'Runs with UID <= 10000', 'Runs with a root primary or supplementary GID', 'Runtime/Default AppArmor profile not set', 'Runtime/Default Seccomp profile not set', 'SELinux custom options set', 'SYS_ADMIN capability added', 'Seccomp policies disabled', 'Service with External IP', 'Specific capabilities added', 'Unsafe sysctl options set', 'User with admin access', 'Workloads in the default namespace', 'hostPath volume mounted with docker.sock', 'hostPath volumes mounted'
- labels List<String>
- List of labels.
- lastupdate String
- linuxCis BooleanEnabled 
- malwareAction String
- maximumScore Double
- Value of allowed maximum score.
- maximumScore BooleanEnabled 
- Indicates if exceeding the maximum score is scanned.
- maximumScore BooleanExclude No Fix 
- Indicates that policy should ignore cases that do not have a known fix.
- monitoredMalware List<String>Paths 
- name String
- onlyNone BooleanRoot Users 
- Indicates if raise a warning for images that should only be run as root.
- openshiftHardening BooleanEnabled 
- packagesBlack BooleanList Enabled 
- Indicates if packages blacklist is relevant.
- packagesBlack List<KubernetesLists Assurance Policy Packages Black List> 
- List of blacklisted images.
- packagesWhite BooleanList Enabled 
- Indicates if packages whitelist is relevant.
- packagesWhite List<KubernetesLists Assurance Policy Packages White List> 
- List of whitelisted images.
- partialResults BooleanImage Fail 
- permission String
- policySettings KubernetesAssurance Policy Policy Settings 
- readOnly Boolean
- registries List<String>
- List of registries.
- registry String
- requiredLabels List<KubernetesAssurance Policy Required Label> 
- requiredLabels BooleanEnabled 
- scanMalware BooleanIn Archives 
- scanNfs BooleanMounts 
- scanProcess BooleanMemory 
- scanSensitive BooleanData 
- Indicates if scan should include sensitive data in the image.
- scanWindows BooleanRegistry 
- scapEnabled Boolean
- Indicates if scanning should include scap.
- scapFiles List<String>
- List of SCAP user scripts for checks.
- scopes
List<KubernetesAssurance Policy Scope> 
- trustedBase List<KubernetesImages Assurance Policy Trusted Base Image> 
- List of trusted images.
- trustedBase BooleanImages Enabled 
- Indicates if list of trusted base images is relevant.
- vulnerabilityExploitability Boolean
- vulnerabilityScore List<Integer>Ranges 
- whitelistedLicenses List<String>
- List of whitelisted licenses.
- whitelistedLicenses BooleanEnabled 
- Indicates if license blacklist is relevant.
- applicationScopes string[]
- aggregatedVulnerability {[key: string]: string}
- Aggregated vulnerability information.
- allowedImages string[]
- List of explicitly allowed images.
- assuranceType string
- What type of assurance policy is described.
- auditOn booleanFailure 
- Indicates if auditing for failures.
- string
- Name of user account that created the policy.
- autoScan booleanConfigured 
- autoScan booleanEnabled 
- autoScan KubernetesTimes Assurance Policy Auto Scan Time[] 
- blacklistPermissions string[]
- List of function's forbidden permissions.
- blacklistPermissions booleanEnabled 
- Indicates if blacklist permissions is relevant.
- blacklistedLicenses string[]
- List of blacklisted licenses.
- blacklistedLicenses booleanEnabled 
- Indicates if license blacklist is relevant.
- blockFailed boolean
- Indicates if failed images are blocked.
- controlExclude booleanNo Fix 
- customChecks KubernetesAssurance Policy Custom Check[] 
- List of Custom user scripts for checks.
- customChecks booleanEnabled 
- Indicates if scanning should include custom checks.
- customSeverity string
- customSeverity booleanEnabled 
- cvesBlack booleanList Enabled 
- Indicates if CVEs blacklist is relevant.
- cvesBlack string[]Lists 
- List of CVEs blacklisted items.
- cvesWhite booleanList Enabled 
- Indicates if CVEs whitelist is relevant.
- cvesWhite string[]Lists 
- List of cves whitelisted licenses
- cvssSeverity string
- Identifier of the cvss severity.
- cvssSeverity booleanEnabled 
- Indicates if the cvss severity is scanned.
- cvssSeverity booleanExclude No Fix 
- Indicates that policy should ignore cvss cases that do not have a known fix.
- description string
- disallowExploit string[]Types 
- disallowMalware boolean
- Indicates if malware should block the image.
- dockerCis booleanEnabled 
- Checks the host according to the Docker CIS benchmark, if Docker is found on the host.
- domain string
- Name of the container image.
- domainName string
- dtaEnabled boolean
- dtaSeverity string
- enabled boolean
- Is the control enabled?
- enforce boolean
- enforceAfter numberDays 
- enforceExcessive booleanPermissions 
- exceptionalMonitored string[]Malware Paths 
- excludeApplication string[]Scopes 
- failCicd boolean
- Indicates if cicd failures will fail the image.
- forbiddenLabels KubernetesAssurance Policy Forbidden Label[] 
- forbiddenLabels booleanEnabled 
- forceMicroenforcer boolean
- functionIntegrity booleanEnabled 
- ignoreBase booleanImage Vln 
- ignoreRecently booleanPublished Vln 
- ignoreRecently numberPublished Vln Period 
- ignoreRisk booleanResources Enabled 
- Indicates if risk resources are ignored.
- ignoredRisk string[]Resources 
- List of ignored risk resources.
- ignoredSensitive string[]Resources 
- images string[]
- List of images.
- kubeCis booleanEnabled 
- Performs a Kubernetes CIS benchmark check for the host.
- kubernetesControls KubernetesAssurance Policy Kubernetes Control[] 
- List of Kubernetes controls.
- kubernetesControls string[]Avd Ids 
- kubernetesControls string[]Names 
- List of kubernetes control names and available kubernetes controls are: 'Access to host IPC namespace', 'Access to host PID', 'Access to host network', 'Access to host ports', 'All container images must start with a GCR domain', 'All container images must start with an ECR domain', 'All container images must start with the *.azurecr.io domain', 'CPU not limited', 'CPU requests not specified', 'Can elevate its own privileges', 'ConfigMap with secrets', 'ConfigMap with sensitive content', 'Container images from public registries used', 'Default capabilitiessome containers do not drop all', 'Default capabilitiessome containers do not drop any', 'Delete pod logs', 'Exec into Pods', 'Image tag :latest used', 'Manage EKS IAM Auth ConfigMap', 'Manage Kubernetes RBAC resources', 'Manage Kubernetes networking', 'Manage Kubernetes workloads and pods', 'Manage all resources', 'Manage all resources at the namespace', 'Manage configmaps', 'Manage namespace secrets', 'Manage secrets', 'Manage webhookconfigurations', 'Manages /etc/hosts', 'Memory not limited', 'Memory requests not specified', 'Non-core volume types used.', 'Non-default /proc masks set', 'Privileged', 'Root file system is not read-only', 'Runs as root user', 'Runs with GID <= 10000', 'Runs with UID <= 10000', 'Runs with a root primary or supplementary GID', 'Runtime/Default AppArmor profile not set', 'Runtime/Default Seccomp profile not set', 'SELinux custom options set', 'SYS_ADMIN capability added', 'Seccomp policies disabled', 'Service with External IP', 'Specific capabilities added', 'Unsafe sysctl options set', 'User with admin access', 'Workloads in the default namespace', 'hostPath volume mounted with docker.sock', 'hostPath volumes mounted'
- labels string[]
- List of labels.
- lastupdate string
- linuxCis booleanEnabled 
- malwareAction string
- maximumScore number
- Value of allowed maximum score.
- maximumScore booleanEnabled 
- Indicates if exceeding the maximum score is scanned.
- maximumScore booleanExclude No Fix 
- Indicates that policy should ignore cases that do not have a known fix.
- monitoredMalware string[]Paths 
- name string
- onlyNone booleanRoot Users 
- Indicates if raise a warning for images that should only be run as root.
- openshiftHardening booleanEnabled 
- packagesBlack booleanList Enabled 
- Indicates if packages blacklist is relevant.
- packagesBlack KubernetesLists Assurance Policy Packages Black List[] 
- List of blacklisted images.
- packagesWhite booleanList Enabled 
- Indicates if packages whitelist is relevant.
- packagesWhite KubernetesLists Assurance Policy Packages White List[] 
- List of whitelisted images.
- partialResults booleanImage Fail 
- permission string
- policySettings KubernetesAssurance Policy Policy Settings 
- readOnly boolean
- registries string[]
- List of registries.
- registry string
- requiredLabels KubernetesAssurance Policy Required Label[] 
- requiredLabels booleanEnabled 
- scanMalware booleanIn Archives 
- scanNfs booleanMounts 
- scanProcess booleanMemory 
- scanSensitive booleanData 
- Indicates if scan should include sensitive data in the image.
- scanWindows booleanRegistry 
- scapEnabled boolean
- Indicates if scanning should include scap.
- scapFiles string[]
- List of SCAP user scripts for checks.
- scopes
KubernetesAssurance Policy Scope[] 
- trustedBase KubernetesImages Assurance Policy Trusted Base Image[] 
- List of trusted images.
- trustedBase booleanImages Enabled 
- Indicates if list of trusted base images is relevant.
- vulnerabilityExploitability boolean
- vulnerabilityScore number[]Ranges 
- whitelistedLicenses string[]
- List of whitelisted licenses.
- whitelistedLicenses booleanEnabled 
- Indicates if license blacklist is relevant.
- application_scopes Sequence[str]
- aggregated_vulnerability Mapping[str, str]
- Aggregated vulnerability information.
- allowed_images Sequence[str]
- List of explicitly allowed images.
- assurance_type str
- What type of assurance policy is described.
- audit_on_ boolfailure 
- Indicates if auditing for failures.
- str
- Name of user account that created the policy.
- auto_scan_ boolconfigured 
- auto_scan_ boolenabled 
- auto_scan_ Sequence[Kubernetestimes Assurance Policy Auto Scan Time Args] 
- blacklist_permissions Sequence[str]
- List of function's forbidden permissions.
- blacklist_permissions_ boolenabled 
- Indicates if blacklist permissions is relevant.
- blacklisted_licenses Sequence[str]
- List of blacklisted licenses.
- blacklisted_licenses_ boolenabled 
- Indicates if license blacklist is relevant.
- block_failed bool
- Indicates if failed images are blocked.
- control_exclude_ boolno_ fix 
- custom_checks Sequence[KubernetesAssurance Policy Custom Check Args] 
- List of Custom user scripts for checks.
- custom_checks_ boolenabled 
- Indicates if scanning should include custom checks.
- custom_severity str
- custom_severity_ boolenabled 
- cves_black_ boollist_ enabled 
- Indicates if CVEs blacklist is relevant.
- cves_black_ Sequence[str]lists 
- List of CVEs blacklisted items.
- cves_white_ boollist_ enabled 
- Indicates if CVEs whitelist is relevant.
- cves_white_ Sequence[str]lists 
- List of cves whitelisted licenses
- cvss_severity str
- Identifier of the cvss severity.
- cvss_severity_ boolenabled 
- Indicates if the cvss severity is scanned.
- cvss_severity_ boolexclude_ no_ fix 
- Indicates that policy should ignore cvss cases that do not have a known fix.
- description str
- disallow_exploit_ Sequence[str]types 
- disallow_malware bool
- Indicates if malware should block the image.
- docker_cis_ boolenabled 
- Checks the host according to the Docker CIS benchmark, if Docker is found on the host.
- domain str
- Name of the container image.
- domain_name str
- dta_enabled bool
- dta_severity str
- enabled bool
- Is the control enabled?
- enforce bool
- enforce_after_ intdays 
- enforce_excessive_ boolpermissions 
- exceptional_monitored_ Sequence[str]malware_ paths 
- exclude_application_ Sequence[str]scopes 
- fail_cicd bool
- Indicates if cicd failures will fail the image.
- forbidden_labels Sequence[KubernetesAssurance Policy Forbidden Label Args] 
- forbidden_labels_ boolenabled 
- force_microenforcer bool
- function_integrity_ boolenabled 
- ignore_base_ boolimage_ vln 
- ignore_recently_ boolpublished_ vln 
- ignore_recently_ intpublished_ vln_ period 
- ignore_risk_ boolresources_ enabled 
- Indicates if risk resources are ignored.
- ignored_risk_ Sequence[str]resources 
- List of ignored risk resources.
- ignored_sensitive_ Sequence[str]resources 
- images Sequence[str]
- List of images.
- kube_cis_ boolenabled 
- Performs a Kubernetes CIS benchmark check for the host.
- kubernetes_controls Sequence[KubernetesAssurance Policy Kubernetes Control Args] 
- List of Kubernetes controls.
- kubernetes_controls_ Sequence[str]avd_ ids 
- kubernetes_controls_ Sequence[str]names 
- List of kubernetes control names and available kubernetes controls are: 'Access to host IPC namespace', 'Access to host PID', 'Access to host network', 'Access to host ports', 'All container images must start with a GCR domain', 'All container images must start with an ECR domain', 'All container images must start with the *.azurecr.io domain', 'CPU not limited', 'CPU requests not specified', 'Can elevate its own privileges', 'ConfigMap with secrets', 'ConfigMap with sensitive content', 'Container images from public registries used', 'Default capabilitiessome containers do not drop all', 'Default capabilitiessome containers do not drop any', 'Delete pod logs', 'Exec into Pods', 'Image tag :latest used', 'Manage EKS IAM Auth ConfigMap', 'Manage Kubernetes RBAC resources', 'Manage Kubernetes networking', 'Manage Kubernetes workloads and pods', 'Manage all resources', 'Manage all resources at the namespace', 'Manage configmaps', 'Manage namespace secrets', 'Manage secrets', 'Manage webhookconfigurations', 'Manages /etc/hosts', 'Memory not limited', 'Memory requests not specified', 'Non-core volume types used.', 'Non-default /proc masks set', 'Privileged', 'Root file system is not read-only', 'Runs as root user', 'Runs with GID <= 10000', 'Runs with UID <= 10000', 'Runs with a root primary or supplementary GID', 'Runtime/Default AppArmor profile not set', 'Runtime/Default Seccomp profile not set', 'SELinux custom options set', 'SYS_ADMIN capability added', 'Seccomp policies disabled', 'Service with External IP', 'Specific capabilities added', 'Unsafe sysctl options set', 'User with admin access', 'Workloads in the default namespace', 'hostPath volume mounted with docker.sock', 'hostPath volumes mounted'
- labels Sequence[str]
- List of labels.
- lastupdate str
- linux_cis_ boolenabled 
- malware_action str
- maximum_score float
- Value of allowed maximum score.
- maximum_score_ boolenabled 
- Indicates if exceeding the maximum score is scanned.
- maximum_score_ boolexclude_ no_ fix 
- Indicates that policy should ignore cases that do not have a known fix.
- monitored_malware_ Sequence[str]paths 
- name str
- only_none_ boolroot_ users 
- Indicates if raise a warning for images that should only be run as root.
- openshift_hardening_ boolenabled 
- packages_black_ boollist_ enabled 
- Indicates if packages blacklist is relevant.
- packages_black_ Sequence[Kuberneteslists Assurance Policy Packages Black List Args] 
- List of blacklisted images.
- packages_white_ boollist_ enabled 
- Indicates if packages whitelist is relevant.
- packages_white_ Sequence[Kuberneteslists Assurance Policy Packages White List Args] 
- List of whitelisted images.
- partial_results_ boolimage_ fail 
- permission str
- policy_settings KubernetesAssurance Policy Policy Settings Args 
- read_only bool
- registries Sequence[str]
- List of registries.
- registry str
- required_labels Sequence[KubernetesAssurance Policy Required Label Args] 
- required_labels_ boolenabled 
- scan_malware_ boolin_ archives 
- scan_nfs_ boolmounts 
- scan_process_ boolmemory 
- scan_sensitive_ booldata 
- Indicates if scan should include sensitive data in the image.
- scan_windows_ boolregistry 
- scap_enabled bool
- Indicates if scanning should include scap.
- scap_files Sequence[str]
- List of SCAP user scripts for checks.
- scopes
Sequence[KubernetesAssurance Policy Scope Args] 
- trusted_base_ Sequence[Kubernetesimages Assurance Policy Trusted Base Image Args] 
- List of trusted images.
- trusted_base_ boolimages_ enabled 
- Indicates if list of trusted base images is relevant.
- vulnerability_exploitability bool
- vulnerability_score_ Sequence[int]ranges 
- whitelisted_licenses Sequence[str]
- List of whitelisted licenses.
- whitelisted_licenses_ boolenabled 
- Indicates if license blacklist is relevant.
- applicationScopes List<String>
- aggregatedVulnerability Map<String>
- Aggregated vulnerability information.
- allowedImages List<String>
- List of explicitly allowed images.
- assuranceType String
- What type of assurance policy is described.
- auditOn BooleanFailure 
- Indicates if auditing for failures.
- String
- Name of user account that created the policy.
- autoScan BooleanConfigured 
- autoScan BooleanEnabled 
- autoScan List<Property Map>Times 
- blacklistPermissions List<String>
- List of function's forbidden permissions.
- blacklistPermissions BooleanEnabled 
- Indicates if blacklist permissions is relevant.
- blacklistedLicenses List<String>
- List of blacklisted licenses.
- blacklistedLicenses BooleanEnabled 
- Indicates if license blacklist is relevant.
- blockFailed Boolean
- Indicates if failed images are blocked.
- controlExclude BooleanNo Fix 
- customChecks List<Property Map>
- List of Custom user scripts for checks.
- customChecks BooleanEnabled 
- Indicates if scanning should include custom checks.
- customSeverity String
- customSeverity BooleanEnabled 
- cvesBlack BooleanList Enabled 
- Indicates if CVEs blacklist is relevant.
- cvesBlack List<String>Lists 
- List of CVEs blacklisted items.
- cvesWhite BooleanList Enabled 
- Indicates if CVEs whitelist is relevant.
- cvesWhite List<String>Lists 
- List of cves whitelisted licenses
- cvssSeverity String
- Identifier of the cvss severity.
- cvssSeverity BooleanEnabled 
- Indicates if the cvss severity is scanned.
- cvssSeverity BooleanExclude No Fix 
- Indicates that policy should ignore cvss cases that do not have a known fix.
- description String
- disallowExploit List<String>Types 
- disallowMalware Boolean
- Indicates if malware should block the image.
- dockerCis BooleanEnabled 
- Checks the host according to the Docker CIS benchmark, if Docker is found on the host.
- domain String
- Name of the container image.
- domainName String
- dtaEnabled Boolean
- dtaSeverity String
- enabled Boolean
- Is the control enabled?
- enforce Boolean
- enforceAfter NumberDays 
- enforceExcessive BooleanPermissions 
- exceptionalMonitored List<String>Malware Paths 
- excludeApplication List<String>Scopes 
- failCicd Boolean
- Indicates if cicd failures will fail the image.
- forbiddenLabels List<Property Map>
- forbiddenLabels BooleanEnabled 
- forceMicroenforcer Boolean
- functionIntegrity BooleanEnabled 
- ignoreBase BooleanImage Vln 
- ignoreRecently BooleanPublished Vln 
- ignoreRecently NumberPublished Vln Period 
- ignoreRisk BooleanResources Enabled 
- Indicates if risk resources are ignored.
- ignoredRisk List<String>Resources 
- List of ignored risk resources.
- ignoredSensitive List<String>Resources 
- images List<String>
- List of images.
- kubeCis BooleanEnabled 
- Performs a Kubernetes CIS benchmark check for the host.
- kubernetesControls List<Property Map>
- List of Kubernetes controls.
- kubernetesControls List<String>Avd Ids 
- kubernetesControls List<String>Names 
- List of kubernetes control names and available kubernetes controls are: 'Access to host IPC namespace', 'Access to host PID', 'Access to host network', 'Access to host ports', 'All container images must start with a GCR domain', 'All container images must start with an ECR domain', 'All container images must start with the *.azurecr.io domain', 'CPU not limited', 'CPU requests not specified', 'Can elevate its own privileges', 'ConfigMap with secrets', 'ConfigMap with sensitive content', 'Container images from public registries used', 'Default capabilitiessome containers do not drop all', 'Default capabilitiessome containers do not drop any', 'Delete pod logs', 'Exec into Pods', 'Image tag :latest used', 'Manage EKS IAM Auth ConfigMap', 'Manage Kubernetes RBAC resources', 'Manage Kubernetes networking', 'Manage Kubernetes workloads and pods', 'Manage all resources', 'Manage all resources at the namespace', 'Manage configmaps', 'Manage namespace secrets', 'Manage secrets', 'Manage webhookconfigurations', 'Manages /etc/hosts', 'Memory not limited', 'Memory requests not specified', 'Non-core volume types used.', 'Non-default /proc masks set', 'Privileged', 'Root file system is not read-only', 'Runs as root user', 'Runs with GID <= 10000', 'Runs with UID <= 10000', 'Runs with a root primary or supplementary GID', 'Runtime/Default AppArmor profile not set', 'Runtime/Default Seccomp profile not set', 'SELinux custom options set', 'SYS_ADMIN capability added', 'Seccomp policies disabled', 'Service with External IP', 'Specific capabilities added', 'Unsafe sysctl options set', 'User with admin access', 'Workloads in the default namespace', 'hostPath volume mounted with docker.sock', 'hostPath volumes mounted'
- labels List<String>
- List of labels.
- lastupdate String
- linuxCis BooleanEnabled 
- malwareAction String
- maximumScore Number
- Value of allowed maximum score.
- maximumScore BooleanEnabled 
- Indicates if exceeding the maximum score is scanned.
- maximumScore BooleanExclude No Fix 
- Indicates that policy should ignore cases that do not have a known fix.
- monitoredMalware List<String>Paths 
- name String
- onlyNone BooleanRoot Users 
- Indicates if raise a warning for images that should only be run as root.
- openshiftHardening BooleanEnabled 
- packagesBlack BooleanList Enabled 
- Indicates if packages blacklist is relevant.
- packagesBlack List<Property Map>Lists 
- List of blacklisted images.
- packagesWhite BooleanList Enabled 
- Indicates if packages whitelist is relevant.
- packagesWhite List<Property Map>Lists 
- List of whitelisted images.
- partialResults BooleanImage Fail 
- permission String
- policySettings Property Map
- readOnly Boolean
- registries List<String>
- List of registries.
- registry String
- requiredLabels List<Property Map>
- requiredLabels BooleanEnabled 
- scanMalware BooleanIn Archives 
- scanNfs BooleanMounts 
- scanProcess BooleanMemory 
- scanSensitive BooleanData 
- Indicates if scan should include sensitive data in the image.
- scanWindows BooleanRegistry 
- scapEnabled Boolean
- Indicates if scanning should include scap.
- scapFiles List<String>
- List of SCAP user scripts for checks.
- scopes List<Property Map>
- trustedBase List<Property Map>Images 
- List of trusted images.
- trustedBase BooleanImages Enabled 
- Indicates if list of trusted base images is relevant.
- vulnerabilityExploitability Boolean
- vulnerabilityScore List<Number>Ranges 
- whitelistedLicenses List<String>
- List of whitelisted licenses.
- whitelistedLicenses BooleanEnabled 
- Indicates if license blacklist is relevant.
Outputs
All input properties are implicitly available as output properties. Additionally, the KubernetesAssurancePolicy resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing KubernetesAssurancePolicy Resource
Get an existing KubernetesAssurancePolicy resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: KubernetesAssurancePolicyState, opts?: CustomResourceOptions): KubernetesAssurancePolicy@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        aggregated_vulnerability: Optional[Mapping[str, str]] = None,
        allowed_images: Optional[Sequence[str]] = None,
        application_scopes: Optional[Sequence[str]] = None,
        assurance_type: Optional[str] = None,
        audit_on_failure: Optional[bool] = None,
        author: Optional[str] = None,
        auto_scan_configured: Optional[bool] = None,
        auto_scan_enabled: Optional[bool] = None,
        auto_scan_times: Optional[Sequence[KubernetesAssurancePolicyAutoScanTimeArgs]] = None,
        blacklist_permissions: Optional[Sequence[str]] = None,
        blacklist_permissions_enabled: Optional[bool] = None,
        blacklisted_licenses: Optional[Sequence[str]] = None,
        blacklisted_licenses_enabled: Optional[bool] = None,
        block_failed: Optional[bool] = None,
        control_exclude_no_fix: Optional[bool] = None,
        custom_checks: Optional[Sequence[KubernetesAssurancePolicyCustomCheckArgs]] = None,
        custom_checks_enabled: Optional[bool] = None,
        custom_severity: Optional[str] = None,
        custom_severity_enabled: Optional[bool] = None,
        cves_black_list_enabled: Optional[bool] = None,
        cves_black_lists: Optional[Sequence[str]] = None,
        cves_white_list_enabled: Optional[bool] = None,
        cves_white_lists: Optional[Sequence[str]] = None,
        cvss_severity: Optional[str] = None,
        cvss_severity_enabled: Optional[bool] = None,
        cvss_severity_exclude_no_fix: Optional[bool] = None,
        description: Optional[str] = None,
        disallow_exploit_types: Optional[Sequence[str]] = None,
        disallow_malware: Optional[bool] = None,
        docker_cis_enabled: Optional[bool] = None,
        domain: Optional[str] = None,
        domain_name: Optional[str] = None,
        dta_enabled: Optional[bool] = None,
        dta_severity: Optional[str] = None,
        enabled: Optional[bool] = None,
        enforce: Optional[bool] = None,
        enforce_after_days: Optional[int] = None,
        enforce_excessive_permissions: Optional[bool] = None,
        exceptional_monitored_malware_paths: Optional[Sequence[str]] = None,
        exclude_application_scopes: Optional[Sequence[str]] = None,
        fail_cicd: Optional[bool] = None,
        forbidden_labels: Optional[Sequence[KubernetesAssurancePolicyForbiddenLabelArgs]] = None,
        forbidden_labels_enabled: Optional[bool] = None,
        force_microenforcer: Optional[bool] = None,
        function_integrity_enabled: Optional[bool] = None,
        ignore_base_image_vln: Optional[bool] = None,
        ignore_recently_published_vln: Optional[bool] = None,
        ignore_recently_published_vln_period: Optional[int] = None,
        ignore_risk_resources_enabled: Optional[bool] = None,
        ignored_risk_resources: Optional[Sequence[str]] = None,
        ignored_sensitive_resources: Optional[Sequence[str]] = None,
        images: Optional[Sequence[str]] = None,
        kube_cis_enabled: Optional[bool] = None,
        kubernetes_controls: Optional[Sequence[KubernetesAssurancePolicyKubernetesControlArgs]] = None,
        kubernetes_controls_avd_ids: Optional[Sequence[str]] = None,
        kubernetes_controls_names: Optional[Sequence[str]] = None,
        labels: Optional[Sequence[str]] = None,
        lastupdate: Optional[str] = None,
        linux_cis_enabled: Optional[bool] = None,
        malware_action: Optional[str] = None,
        maximum_score: Optional[float] = None,
        maximum_score_enabled: Optional[bool] = None,
        maximum_score_exclude_no_fix: Optional[bool] = None,
        monitored_malware_paths: Optional[Sequence[str]] = None,
        name: Optional[str] = None,
        only_none_root_users: Optional[bool] = None,
        openshift_hardening_enabled: Optional[bool] = None,
        packages_black_list_enabled: Optional[bool] = None,
        packages_black_lists: Optional[Sequence[KubernetesAssurancePolicyPackagesBlackListArgs]] = None,
        packages_white_list_enabled: Optional[bool] = None,
        packages_white_lists: Optional[Sequence[KubernetesAssurancePolicyPackagesWhiteListArgs]] = None,
        partial_results_image_fail: Optional[bool] = None,
        permission: Optional[str] = None,
        policy_settings: Optional[KubernetesAssurancePolicyPolicySettingsArgs] = None,
        read_only: Optional[bool] = None,
        registries: Optional[Sequence[str]] = None,
        registry: Optional[str] = None,
        required_labels: Optional[Sequence[KubernetesAssurancePolicyRequiredLabelArgs]] = None,
        required_labels_enabled: Optional[bool] = None,
        scan_malware_in_archives: Optional[bool] = None,
        scan_nfs_mounts: Optional[bool] = None,
        scan_process_memory: Optional[bool] = None,
        scan_sensitive_data: Optional[bool] = None,
        scan_windows_registry: Optional[bool] = None,
        scap_enabled: Optional[bool] = None,
        scap_files: Optional[Sequence[str]] = None,
        scopes: Optional[Sequence[KubernetesAssurancePolicyScopeArgs]] = None,
        trusted_base_images: Optional[Sequence[KubernetesAssurancePolicyTrustedBaseImageArgs]] = None,
        trusted_base_images_enabled: Optional[bool] = None,
        vulnerability_exploitability: Optional[bool] = None,
        vulnerability_score_ranges: Optional[Sequence[int]] = None,
        whitelisted_licenses: Optional[Sequence[str]] = None,
        whitelisted_licenses_enabled: Optional[bool] = None) -> KubernetesAssurancePolicyfunc GetKubernetesAssurancePolicy(ctx *Context, name string, id IDInput, state *KubernetesAssurancePolicyState, opts ...ResourceOption) (*KubernetesAssurancePolicy, error)public static KubernetesAssurancePolicy Get(string name, Input<string> id, KubernetesAssurancePolicyState? state, CustomResourceOptions? opts = null)public static KubernetesAssurancePolicy get(String name, Output<String> id, KubernetesAssurancePolicyState state, CustomResourceOptions options)Resource lookup is not supported in YAML- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- AggregatedVulnerability Dictionary<string, string>
- Aggregated vulnerability information.
- AllowedImages List<string>
- List of explicitly allowed images.
- ApplicationScopes List<string>
- AssuranceType string
- What type of assurance policy is described.
- AuditOn boolFailure 
- Indicates if auditing for failures.
- string
- Name of user account that created the policy.
- AutoScan boolConfigured 
- AutoScan boolEnabled 
- AutoScan List<Pulumiverse.Times Aquasec. Inputs. Kubernetes Assurance Policy Auto Scan Time> 
- BlacklistPermissions List<string>
- List of function's forbidden permissions.
- BlacklistPermissions boolEnabled 
- Indicates if blacklist permissions is relevant.
- BlacklistedLicenses List<string>
- List of blacklisted licenses.
- BlacklistedLicenses boolEnabled 
- Indicates if license blacklist is relevant.
- BlockFailed bool
- Indicates if failed images are blocked.
- ControlExclude boolNo Fix 
- CustomChecks List<Pulumiverse.Aquasec. Inputs. Kubernetes Assurance Policy Custom Check> 
- List of Custom user scripts for checks.
- CustomChecks boolEnabled 
- Indicates if scanning should include custom checks.
- CustomSeverity string
- CustomSeverity boolEnabled 
- CvesBlack boolList Enabled 
- Indicates if CVEs blacklist is relevant.
- CvesBlack List<string>Lists 
- List of CVEs blacklisted items.
- CvesWhite boolList Enabled 
- Indicates if CVEs whitelist is relevant.
- CvesWhite List<string>Lists 
- List of cves whitelisted licenses
- CvssSeverity string
- Identifier of the cvss severity.
- CvssSeverity boolEnabled 
- Indicates if the cvss severity is scanned.
- CvssSeverity boolExclude No Fix 
- Indicates that policy should ignore cvss cases that do not have a known fix.
- Description string
- DisallowExploit List<string>Types 
- DisallowMalware bool
- Indicates if malware should block the image.
- DockerCis boolEnabled 
- Checks the host according to the Docker CIS benchmark, if Docker is found on the host.
- Domain string
- Name of the container image.
- DomainName string
- DtaEnabled bool
- DtaSeverity string
- Enabled bool
- Is the control enabled?
- Enforce bool
- EnforceAfter intDays 
- EnforceExcessive boolPermissions 
- ExceptionalMonitored List<string>Malware Paths 
- ExcludeApplication List<string>Scopes 
- FailCicd bool
- Indicates if cicd failures will fail the image.
- ForbiddenLabels List<Pulumiverse.Aquasec. Inputs. Kubernetes Assurance Policy Forbidden Label> 
- ForbiddenLabels boolEnabled 
- ForceMicroenforcer bool
- FunctionIntegrity boolEnabled 
- IgnoreBase boolImage Vln 
- IgnoreRecently boolPublished Vln 
- IgnoreRecently intPublished Vln Period 
- IgnoreRisk boolResources Enabled 
- Indicates if risk resources are ignored.
- IgnoredRisk List<string>Resources 
- List of ignored risk resources.
- IgnoredSensitive List<string>Resources 
- Images List<string>
- List of images.
- KubeCis boolEnabled 
- Performs a Kubernetes CIS benchmark check for the host.
- KubernetesControls List<Pulumiverse.Aquasec. Inputs. Kubernetes Assurance Policy Kubernetes Control> 
- List of Kubernetes controls.
- KubernetesControls List<string>Avd Ids 
- KubernetesControls List<string>Names 
- List of kubernetes control names and available kubernetes controls are: 'Access to host IPC namespace', 'Access to host PID', 'Access to host network', 'Access to host ports', 'All container images must start with a GCR domain', 'All container images must start with an ECR domain', 'All container images must start with the *.azurecr.io domain', 'CPU not limited', 'CPU requests not specified', 'Can elevate its own privileges', 'ConfigMap with secrets', 'ConfigMap with sensitive content', 'Container images from public registries used', 'Default capabilitiessome containers do not drop all', 'Default capabilitiessome containers do not drop any', 'Delete pod logs', 'Exec into Pods', 'Image tag :latest used', 'Manage EKS IAM Auth ConfigMap', 'Manage Kubernetes RBAC resources', 'Manage Kubernetes networking', 'Manage Kubernetes workloads and pods', 'Manage all resources', 'Manage all resources at the namespace', 'Manage configmaps', 'Manage namespace secrets', 'Manage secrets', 'Manage webhookconfigurations', 'Manages /etc/hosts', 'Memory not limited', 'Memory requests not specified', 'Non-core volume types used.', 'Non-default /proc masks set', 'Privileged', 'Root file system is not read-only', 'Runs as root user', 'Runs with GID <= 10000', 'Runs with UID <= 10000', 'Runs with a root primary or supplementary GID', 'Runtime/Default AppArmor profile not set', 'Runtime/Default Seccomp profile not set', 'SELinux custom options set', 'SYS_ADMIN capability added', 'Seccomp policies disabled', 'Service with External IP', 'Specific capabilities added', 'Unsafe sysctl options set', 'User with admin access', 'Workloads in the default namespace', 'hostPath volume mounted with docker.sock', 'hostPath volumes mounted'
- Labels List<string>
- List of labels.
- Lastupdate string
- LinuxCis boolEnabled 
- MalwareAction string
- MaximumScore double
- Value of allowed maximum score.
- MaximumScore boolEnabled 
- Indicates if exceeding the maximum score is scanned.
- MaximumScore boolExclude No Fix 
- Indicates that policy should ignore cases that do not have a known fix.
- MonitoredMalware List<string>Paths 
- Name string
- OnlyNone boolRoot Users 
- Indicates if raise a warning for images that should only be run as root.
- OpenshiftHardening boolEnabled 
- PackagesBlack boolList Enabled 
- Indicates if packages blacklist is relevant.
- PackagesBlack List<Pulumiverse.Lists Aquasec. Inputs. Kubernetes Assurance Policy Packages Black List> 
- List of blacklisted images.
- PackagesWhite boolList Enabled 
- Indicates if packages whitelist is relevant.
- PackagesWhite List<Pulumiverse.Lists Aquasec. Inputs. Kubernetes Assurance Policy Packages White List> 
- List of whitelisted images.
- PartialResults boolImage Fail 
- Permission string
- PolicySettings Pulumiverse.Aquasec. Inputs. Kubernetes Assurance Policy Policy Settings 
- ReadOnly bool
- Registries List<string>
- List of registries.
- Registry string
- RequiredLabels List<Pulumiverse.Aquasec. Inputs. Kubernetes Assurance Policy Required Label> 
- RequiredLabels boolEnabled 
- ScanMalware boolIn Archives 
- ScanNfs boolMounts 
- ScanProcess boolMemory 
- ScanSensitive boolData 
- Indicates if scan should include sensitive data in the image.
- ScanWindows boolRegistry 
- ScapEnabled bool
- Indicates if scanning should include scap.
- ScapFiles List<string>
- List of SCAP user scripts for checks.
- Scopes
List<Pulumiverse.Aquasec. Inputs. Kubernetes Assurance Policy Scope> 
- TrustedBase List<Pulumiverse.Images Aquasec. Inputs. Kubernetes Assurance Policy Trusted Base Image> 
- List of trusted images.
- TrustedBase boolImages Enabled 
- Indicates if list of trusted base images is relevant.
- VulnerabilityExploitability bool
- VulnerabilityScore List<int>Ranges 
- WhitelistedLicenses List<string>
- List of whitelisted licenses.
- WhitelistedLicenses boolEnabled 
- Indicates if license blacklist is relevant.
- AggregatedVulnerability map[string]string
- Aggregated vulnerability information.
- AllowedImages []string
- List of explicitly allowed images.
- ApplicationScopes []string
- AssuranceType string
- What type of assurance policy is described.
- AuditOn boolFailure 
- Indicates if auditing for failures.
- string
- Name of user account that created the policy.
- AutoScan boolConfigured 
- AutoScan boolEnabled 
- AutoScan []KubernetesTimes Assurance Policy Auto Scan Time Args 
- BlacklistPermissions []string
- List of function's forbidden permissions.
- BlacklistPermissions boolEnabled 
- Indicates if blacklist permissions is relevant.
- BlacklistedLicenses []string
- List of blacklisted licenses.
- BlacklistedLicenses boolEnabled 
- Indicates if license blacklist is relevant.
- BlockFailed bool
- Indicates if failed images are blocked.
- ControlExclude boolNo Fix 
- CustomChecks []KubernetesAssurance Policy Custom Check Args 
- List of Custom user scripts for checks.
- CustomChecks boolEnabled 
- Indicates if scanning should include custom checks.
- CustomSeverity string
- CustomSeverity boolEnabled 
- CvesBlack boolList Enabled 
- Indicates if CVEs blacklist is relevant.
- CvesBlack []stringLists 
- List of CVEs blacklisted items.
- CvesWhite boolList Enabled 
- Indicates if CVEs whitelist is relevant.
- CvesWhite []stringLists 
- List of cves whitelisted licenses
- CvssSeverity string
- Identifier of the cvss severity.
- CvssSeverity boolEnabled 
- Indicates if the cvss severity is scanned.
- CvssSeverity boolExclude No Fix 
- Indicates that policy should ignore cvss cases that do not have a known fix.
- Description string
- DisallowExploit []stringTypes 
- DisallowMalware bool
- Indicates if malware should block the image.
- DockerCis boolEnabled 
- Checks the host according to the Docker CIS benchmark, if Docker is found on the host.
- Domain string
- Name of the container image.
- DomainName string
- DtaEnabled bool
- DtaSeverity string
- Enabled bool
- Is the control enabled?
- Enforce bool
- EnforceAfter intDays 
- EnforceExcessive boolPermissions 
- ExceptionalMonitored []stringMalware Paths 
- ExcludeApplication []stringScopes 
- FailCicd bool
- Indicates if cicd failures will fail the image.
- ForbiddenLabels []KubernetesAssurance Policy Forbidden Label Args 
- ForbiddenLabels boolEnabled 
- ForceMicroenforcer bool
- FunctionIntegrity boolEnabled 
- IgnoreBase boolImage Vln 
- IgnoreRecently boolPublished Vln 
- IgnoreRecently intPublished Vln Period 
- IgnoreRisk boolResources Enabled 
- Indicates if risk resources are ignored.
- IgnoredRisk []stringResources 
- List of ignored risk resources.
- IgnoredSensitive []stringResources 
- Images []string
- List of images.
- KubeCis boolEnabled 
- Performs a Kubernetes CIS benchmark check for the host.
- KubernetesControls []KubernetesAssurance Policy Kubernetes Control Args 
- List of Kubernetes controls.
- KubernetesControls []stringAvd Ids 
- KubernetesControls []stringNames 
- List of kubernetes control names and available kubernetes controls are: 'Access to host IPC namespace', 'Access to host PID', 'Access to host network', 'Access to host ports', 'All container images must start with a GCR domain', 'All container images must start with an ECR domain', 'All container images must start with the *.azurecr.io domain', 'CPU not limited', 'CPU requests not specified', 'Can elevate its own privileges', 'ConfigMap with secrets', 'ConfigMap with sensitive content', 'Container images from public registries used', 'Default capabilitiessome containers do not drop all', 'Default capabilitiessome containers do not drop any', 'Delete pod logs', 'Exec into Pods', 'Image tag :latest used', 'Manage EKS IAM Auth ConfigMap', 'Manage Kubernetes RBAC resources', 'Manage Kubernetes networking', 'Manage Kubernetes workloads and pods', 'Manage all resources', 'Manage all resources at the namespace', 'Manage configmaps', 'Manage namespace secrets', 'Manage secrets', 'Manage webhookconfigurations', 'Manages /etc/hosts', 'Memory not limited', 'Memory requests not specified', 'Non-core volume types used.', 'Non-default /proc masks set', 'Privileged', 'Root file system is not read-only', 'Runs as root user', 'Runs with GID <= 10000', 'Runs with UID <= 10000', 'Runs with a root primary or supplementary GID', 'Runtime/Default AppArmor profile not set', 'Runtime/Default Seccomp profile not set', 'SELinux custom options set', 'SYS_ADMIN capability added', 'Seccomp policies disabled', 'Service with External IP', 'Specific capabilities added', 'Unsafe sysctl options set', 'User with admin access', 'Workloads in the default namespace', 'hostPath volume mounted with docker.sock', 'hostPath volumes mounted'
- Labels []string
- List of labels.
- Lastupdate string
- LinuxCis boolEnabled 
- MalwareAction string
- MaximumScore float64
- Value of allowed maximum score.
- MaximumScore boolEnabled 
- Indicates if exceeding the maximum score is scanned.
- MaximumScore boolExclude No Fix 
- Indicates that policy should ignore cases that do not have a known fix.
- MonitoredMalware []stringPaths 
- Name string
- OnlyNone boolRoot Users 
- Indicates if raise a warning for images that should only be run as root.
- OpenshiftHardening boolEnabled 
- PackagesBlack boolList Enabled 
- Indicates if packages blacklist is relevant.
- PackagesBlack []KubernetesLists Assurance Policy Packages Black List Args 
- List of blacklisted images.
- PackagesWhite boolList Enabled 
- Indicates if packages whitelist is relevant.
- PackagesWhite []KubernetesLists Assurance Policy Packages White List Args 
- List of whitelisted images.
- PartialResults boolImage Fail 
- Permission string
- PolicySettings KubernetesAssurance Policy Policy Settings Args 
- ReadOnly bool
- Registries []string
- List of registries.
- Registry string
- RequiredLabels []KubernetesAssurance Policy Required Label Args 
- RequiredLabels boolEnabled 
- ScanMalware boolIn Archives 
- ScanNfs boolMounts 
- ScanProcess boolMemory 
- ScanSensitive boolData 
- Indicates if scan should include sensitive data in the image.
- ScanWindows boolRegistry 
- ScapEnabled bool
- Indicates if scanning should include scap.
- ScapFiles []string
- List of SCAP user scripts for checks.
- Scopes
[]KubernetesAssurance Policy Scope Args 
- TrustedBase []KubernetesImages Assurance Policy Trusted Base Image Args 
- List of trusted images.
- TrustedBase boolImages Enabled 
- Indicates if list of trusted base images is relevant.
- VulnerabilityExploitability bool
- VulnerabilityScore []intRanges 
- WhitelistedLicenses []string
- List of whitelisted licenses.
- WhitelistedLicenses boolEnabled 
- Indicates if license blacklist is relevant.
- aggregatedVulnerability Map<String,String>
- Aggregated vulnerability information.
- allowedImages List<String>
- List of explicitly allowed images.
- applicationScopes List<String>
- assuranceType String
- What type of assurance policy is described.
- auditOn BooleanFailure 
- Indicates if auditing for failures.
- String
- Name of user account that created the policy.
- autoScan BooleanConfigured 
- autoScan BooleanEnabled 
- autoScan List<KubernetesTimes Assurance Policy Auto Scan Time> 
- blacklistPermissions List<String>
- List of function's forbidden permissions.
- blacklistPermissions BooleanEnabled 
- Indicates if blacklist permissions is relevant.
- blacklistedLicenses List<String>
- List of blacklisted licenses.
- blacklistedLicenses BooleanEnabled 
- Indicates if license blacklist is relevant.
- blockFailed Boolean
- Indicates if failed images are blocked.
- controlExclude BooleanNo Fix 
- customChecks List<KubernetesAssurance Policy Custom Check> 
- List of Custom user scripts for checks.
- customChecks BooleanEnabled 
- Indicates if scanning should include custom checks.
- customSeverity String
- customSeverity BooleanEnabled 
- cvesBlack BooleanList Enabled 
- Indicates if CVEs blacklist is relevant.
- cvesBlack List<String>Lists 
- List of CVEs blacklisted items.
- cvesWhite BooleanList Enabled 
- Indicates if CVEs whitelist is relevant.
- cvesWhite List<String>Lists 
- List of cves whitelisted licenses
- cvssSeverity String
- Identifier of the cvss severity.
- cvssSeverity BooleanEnabled 
- Indicates if the cvss severity is scanned.
- cvssSeverity BooleanExclude No Fix 
- Indicates that policy should ignore cvss cases that do not have a known fix.
- description String
- disallowExploit List<String>Types 
- disallowMalware Boolean
- Indicates if malware should block the image.
- dockerCis BooleanEnabled 
- Checks the host according to the Docker CIS benchmark, if Docker is found on the host.
- domain String
- Name of the container image.
- domainName String
- dtaEnabled Boolean
- dtaSeverity String
- enabled Boolean
- Is the control enabled?
- enforce Boolean
- enforceAfter IntegerDays 
- enforceExcessive BooleanPermissions 
- exceptionalMonitored List<String>Malware Paths 
- excludeApplication List<String>Scopes 
- failCicd Boolean
- Indicates if cicd failures will fail the image.
- forbiddenLabels List<KubernetesAssurance Policy Forbidden Label> 
- forbiddenLabels BooleanEnabled 
- forceMicroenforcer Boolean
- functionIntegrity BooleanEnabled 
- ignoreBase BooleanImage Vln 
- ignoreRecently BooleanPublished Vln 
- ignoreRecently IntegerPublished Vln Period 
- ignoreRisk BooleanResources Enabled 
- Indicates if risk resources are ignored.
- ignoredRisk List<String>Resources 
- List of ignored risk resources.
- ignoredSensitive List<String>Resources 
- images List<String>
- List of images.
- kubeCis BooleanEnabled 
- Performs a Kubernetes CIS benchmark check for the host.
- kubernetesControls List<KubernetesAssurance Policy Kubernetes Control> 
- List of Kubernetes controls.
- kubernetesControls List<String>Avd Ids 
- kubernetesControls List<String>Names 
- List of kubernetes control names and available kubernetes controls are: 'Access to host IPC namespace', 'Access to host PID', 'Access to host network', 'Access to host ports', 'All container images must start with a GCR domain', 'All container images must start with an ECR domain', 'All container images must start with the *.azurecr.io domain', 'CPU not limited', 'CPU requests not specified', 'Can elevate its own privileges', 'ConfigMap with secrets', 'ConfigMap with sensitive content', 'Container images from public registries used', 'Default capabilitiessome containers do not drop all', 'Default capabilitiessome containers do not drop any', 'Delete pod logs', 'Exec into Pods', 'Image tag :latest used', 'Manage EKS IAM Auth ConfigMap', 'Manage Kubernetes RBAC resources', 'Manage Kubernetes networking', 'Manage Kubernetes workloads and pods', 'Manage all resources', 'Manage all resources at the namespace', 'Manage configmaps', 'Manage namespace secrets', 'Manage secrets', 'Manage webhookconfigurations', 'Manages /etc/hosts', 'Memory not limited', 'Memory requests not specified', 'Non-core volume types used.', 'Non-default /proc masks set', 'Privileged', 'Root file system is not read-only', 'Runs as root user', 'Runs with GID <= 10000', 'Runs with UID <= 10000', 'Runs with a root primary or supplementary GID', 'Runtime/Default AppArmor profile not set', 'Runtime/Default Seccomp profile not set', 'SELinux custom options set', 'SYS_ADMIN capability added', 'Seccomp policies disabled', 'Service with External IP', 'Specific capabilities added', 'Unsafe sysctl options set', 'User with admin access', 'Workloads in the default namespace', 'hostPath volume mounted with docker.sock', 'hostPath volumes mounted'
- labels List<String>
- List of labels.
- lastupdate String
- linuxCis BooleanEnabled 
- malwareAction String
- maximumScore Double
- Value of allowed maximum score.
- maximumScore BooleanEnabled 
- Indicates if exceeding the maximum score is scanned.
- maximumScore BooleanExclude No Fix 
- Indicates that policy should ignore cases that do not have a known fix.
- monitoredMalware List<String>Paths 
- name String
- onlyNone BooleanRoot Users 
- Indicates if raise a warning for images that should only be run as root.
- openshiftHardening BooleanEnabled 
- packagesBlack BooleanList Enabled 
- Indicates if packages blacklist is relevant.
- packagesBlack List<KubernetesLists Assurance Policy Packages Black List> 
- List of blacklisted images.
- packagesWhite BooleanList Enabled 
- Indicates if packages whitelist is relevant.
- packagesWhite List<KubernetesLists Assurance Policy Packages White List> 
- List of whitelisted images.
- partialResults BooleanImage Fail 
- permission String
- policySettings KubernetesAssurance Policy Policy Settings 
- readOnly Boolean
- registries List<String>
- List of registries.
- registry String
- requiredLabels List<KubernetesAssurance Policy Required Label> 
- requiredLabels BooleanEnabled 
- scanMalware BooleanIn Archives 
- scanNfs BooleanMounts 
- scanProcess BooleanMemory 
- scanSensitive BooleanData 
- Indicates if scan should include sensitive data in the image.
- scanWindows BooleanRegistry 
- scapEnabled Boolean
- Indicates if scanning should include scap.
- scapFiles List<String>
- List of SCAP user scripts for checks.
- scopes
List<KubernetesAssurance Policy Scope> 
- trustedBase List<KubernetesImages Assurance Policy Trusted Base Image> 
- List of trusted images.
- trustedBase BooleanImages Enabled 
- Indicates if list of trusted base images is relevant.
- vulnerabilityExploitability Boolean
- vulnerabilityScore List<Integer>Ranges 
- whitelistedLicenses List<String>
- List of whitelisted licenses.
- whitelistedLicenses BooleanEnabled 
- Indicates if license blacklist is relevant.
- aggregatedVulnerability {[key: string]: string}
- Aggregated vulnerability information.
- allowedImages string[]
- List of explicitly allowed images.
- applicationScopes string[]
- assuranceType string
- What type of assurance policy is described.
- auditOn booleanFailure 
- Indicates if auditing for failures.
- string
- Name of user account that created the policy.
- autoScan booleanConfigured 
- autoScan booleanEnabled 
- autoScan KubernetesTimes Assurance Policy Auto Scan Time[] 
- blacklistPermissions string[]
- List of function's forbidden permissions.
- blacklistPermissions booleanEnabled 
- Indicates if blacklist permissions is relevant.
- blacklistedLicenses string[]
- List of blacklisted licenses.
- blacklistedLicenses booleanEnabled 
- Indicates if license blacklist is relevant.
- blockFailed boolean
- Indicates if failed images are blocked.
- controlExclude booleanNo Fix 
- customChecks KubernetesAssurance Policy Custom Check[] 
- List of Custom user scripts for checks.
- customChecks booleanEnabled 
- Indicates if scanning should include custom checks.
- customSeverity string
- customSeverity booleanEnabled 
- cvesBlack booleanList Enabled 
- Indicates if CVEs blacklist is relevant.
- cvesBlack string[]Lists 
- List of CVEs blacklisted items.
- cvesWhite booleanList Enabled 
- Indicates if CVEs whitelist is relevant.
- cvesWhite string[]Lists 
- List of cves whitelisted licenses
- cvssSeverity string
- Identifier of the cvss severity.
- cvssSeverity booleanEnabled 
- Indicates if the cvss severity is scanned.
- cvssSeverity booleanExclude No Fix 
- Indicates that policy should ignore cvss cases that do not have a known fix.
- description string
- disallowExploit string[]Types 
- disallowMalware boolean
- Indicates if malware should block the image.
- dockerCis booleanEnabled 
- Checks the host according to the Docker CIS benchmark, if Docker is found on the host.
- domain string
- Name of the container image.
- domainName string
- dtaEnabled boolean
- dtaSeverity string
- enabled boolean
- Is the control enabled?
- enforce boolean
- enforceAfter numberDays 
- enforceExcessive booleanPermissions 
- exceptionalMonitored string[]Malware Paths 
- excludeApplication string[]Scopes 
- failCicd boolean
- Indicates if cicd failures will fail the image.
- forbiddenLabels KubernetesAssurance Policy Forbidden Label[] 
- forbiddenLabels booleanEnabled 
- forceMicroenforcer boolean
- functionIntegrity booleanEnabled 
- ignoreBase booleanImage Vln 
- ignoreRecently booleanPublished Vln 
- ignoreRecently numberPublished Vln Period 
- ignoreRisk booleanResources Enabled 
- Indicates if risk resources are ignored.
- ignoredRisk string[]Resources 
- List of ignored risk resources.
- ignoredSensitive string[]Resources 
- images string[]
- List of images.
- kubeCis booleanEnabled 
- Performs a Kubernetes CIS benchmark check for the host.
- kubernetesControls KubernetesAssurance Policy Kubernetes Control[] 
- List of Kubernetes controls.
- kubernetesControls string[]Avd Ids 
- kubernetesControls string[]Names 
- List of kubernetes control names and available kubernetes controls are: 'Access to host IPC namespace', 'Access to host PID', 'Access to host network', 'Access to host ports', 'All container images must start with a GCR domain', 'All container images must start with an ECR domain', 'All container images must start with the *.azurecr.io domain', 'CPU not limited', 'CPU requests not specified', 'Can elevate its own privileges', 'ConfigMap with secrets', 'ConfigMap with sensitive content', 'Container images from public registries used', 'Default capabilitiessome containers do not drop all', 'Default capabilitiessome containers do not drop any', 'Delete pod logs', 'Exec into Pods', 'Image tag :latest used', 'Manage EKS IAM Auth ConfigMap', 'Manage Kubernetes RBAC resources', 'Manage Kubernetes networking', 'Manage Kubernetes workloads and pods', 'Manage all resources', 'Manage all resources at the namespace', 'Manage configmaps', 'Manage namespace secrets', 'Manage secrets', 'Manage webhookconfigurations', 'Manages /etc/hosts', 'Memory not limited', 'Memory requests not specified', 'Non-core volume types used.', 'Non-default /proc masks set', 'Privileged', 'Root file system is not read-only', 'Runs as root user', 'Runs with GID <= 10000', 'Runs with UID <= 10000', 'Runs with a root primary or supplementary GID', 'Runtime/Default AppArmor profile not set', 'Runtime/Default Seccomp profile not set', 'SELinux custom options set', 'SYS_ADMIN capability added', 'Seccomp policies disabled', 'Service with External IP', 'Specific capabilities added', 'Unsafe sysctl options set', 'User with admin access', 'Workloads in the default namespace', 'hostPath volume mounted with docker.sock', 'hostPath volumes mounted'
- labels string[]
- List of labels.
- lastupdate string
- linuxCis booleanEnabled 
- malwareAction string
- maximumScore number
- Value of allowed maximum score.
- maximumScore booleanEnabled 
- Indicates if exceeding the maximum score is scanned.
- maximumScore booleanExclude No Fix 
- Indicates that policy should ignore cases that do not have a known fix.
- monitoredMalware string[]Paths 
- name string
- onlyNone booleanRoot Users 
- Indicates if raise a warning for images that should only be run as root.
- openshiftHardening booleanEnabled 
- packagesBlack booleanList Enabled 
- Indicates if packages blacklist is relevant.
- packagesBlack KubernetesLists Assurance Policy Packages Black List[] 
- List of blacklisted images.
- packagesWhite booleanList Enabled 
- Indicates if packages whitelist is relevant.
- packagesWhite KubernetesLists Assurance Policy Packages White List[] 
- List of whitelisted images.
- partialResults booleanImage Fail 
- permission string
- policySettings KubernetesAssurance Policy Policy Settings 
- readOnly boolean
- registries string[]
- List of registries.
- registry string
- requiredLabels KubernetesAssurance Policy Required Label[] 
- requiredLabels booleanEnabled 
- scanMalware booleanIn Archives 
- scanNfs booleanMounts 
- scanProcess booleanMemory 
- scanSensitive booleanData 
- Indicates if scan should include sensitive data in the image.
- scanWindows booleanRegistry 
- scapEnabled boolean
- Indicates if scanning should include scap.
- scapFiles string[]
- List of SCAP user scripts for checks.
- scopes
KubernetesAssurance Policy Scope[] 
- trustedBase KubernetesImages Assurance Policy Trusted Base Image[] 
- List of trusted images.
- trustedBase booleanImages Enabled 
- Indicates if list of trusted base images is relevant.
- vulnerabilityExploitability boolean
- vulnerabilityScore number[]Ranges 
- whitelistedLicenses string[]
- List of whitelisted licenses.
- whitelistedLicenses booleanEnabled 
- Indicates if license blacklist is relevant.
- aggregated_vulnerability Mapping[str, str]
- Aggregated vulnerability information.
- allowed_images Sequence[str]
- List of explicitly allowed images.
- application_scopes Sequence[str]
- assurance_type str
- What type of assurance policy is described.
- audit_on_ boolfailure 
- Indicates if auditing for failures.
- str
- Name of user account that created the policy.
- auto_scan_ boolconfigured 
- auto_scan_ boolenabled 
- auto_scan_ Sequence[Kubernetestimes Assurance Policy Auto Scan Time Args] 
- blacklist_permissions Sequence[str]
- List of function's forbidden permissions.
- blacklist_permissions_ boolenabled 
- Indicates if blacklist permissions is relevant.
- blacklisted_licenses Sequence[str]
- List of blacklisted licenses.
- blacklisted_licenses_ boolenabled 
- Indicates if license blacklist is relevant.
- block_failed bool
- Indicates if failed images are blocked.
- control_exclude_ boolno_ fix 
- custom_checks Sequence[KubernetesAssurance Policy Custom Check Args] 
- List of Custom user scripts for checks.
- custom_checks_ boolenabled 
- Indicates if scanning should include custom checks.
- custom_severity str
- custom_severity_ boolenabled 
- cves_black_ boollist_ enabled 
- Indicates if CVEs blacklist is relevant.
- cves_black_ Sequence[str]lists 
- List of CVEs blacklisted items.
- cves_white_ boollist_ enabled 
- Indicates if CVEs whitelist is relevant.
- cves_white_ Sequence[str]lists 
- List of cves whitelisted licenses
- cvss_severity str
- Identifier of the cvss severity.
- cvss_severity_ boolenabled 
- Indicates if the cvss severity is scanned.
- cvss_severity_ boolexclude_ no_ fix 
- Indicates that policy should ignore cvss cases that do not have a known fix.
- description str
- disallow_exploit_ Sequence[str]types 
- disallow_malware bool
- Indicates if malware should block the image.
- docker_cis_ boolenabled 
- Checks the host according to the Docker CIS benchmark, if Docker is found on the host.
- domain str
- Name of the container image.
- domain_name str
- dta_enabled bool
- dta_severity str
- enabled bool
- Is the control enabled?
- enforce bool
- enforce_after_ intdays 
- enforce_excessive_ boolpermissions 
- exceptional_monitored_ Sequence[str]malware_ paths 
- exclude_application_ Sequence[str]scopes 
- fail_cicd bool
- Indicates if cicd failures will fail the image.
- forbidden_labels Sequence[KubernetesAssurance Policy Forbidden Label Args] 
- forbidden_labels_ boolenabled 
- force_microenforcer bool
- function_integrity_ boolenabled 
- ignore_base_ boolimage_ vln 
- ignore_recently_ boolpublished_ vln 
- ignore_recently_ intpublished_ vln_ period 
- ignore_risk_ boolresources_ enabled 
- Indicates if risk resources are ignored.
- ignored_risk_ Sequence[str]resources 
- List of ignored risk resources.
- ignored_sensitive_ Sequence[str]resources 
- images Sequence[str]
- List of images.
- kube_cis_ boolenabled 
- Performs a Kubernetes CIS benchmark check for the host.
- kubernetes_controls Sequence[KubernetesAssurance Policy Kubernetes Control Args] 
- List of Kubernetes controls.
- kubernetes_controls_ Sequence[str]avd_ ids 
- kubernetes_controls_ Sequence[str]names 
- List of kubernetes control names and available kubernetes controls are: 'Access to host IPC namespace', 'Access to host PID', 'Access to host network', 'Access to host ports', 'All container images must start with a GCR domain', 'All container images must start with an ECR domain', 'All container images must start with the *.azurecr.io domain', 'CPU not limited', 'CPU requests not specified', 'Can elevate its own privileges', 'ConfigMap with secrets', 'ConfigMap with sensitive content', 'Container images from public registries used', 'Default capabilitiessome containers do not drop all', 'Default capabilitiessome containers do not drop any', 'Delete pod logs', 'Exec into Pods', 'Image tag :latest used', 'Manage EKS IAM Auth ConfigMap', 'Manage Kubernetes RBAC resources', 'Manage Kubernetes networking', 'Manage Kubernetes workloads and pods', 'Manage all resources', 'Manage all resources at the namespace', 'Manage configmaps', 'Manage namespace secrets', 'Manage secrets', 'Manage webhookconfigurations', 'Manages /etc/hosts', 'Memory not limited', 'Memory requests not specified', 'Non-core volume types used.', 'Non-default /proc masks set', 'Privileged', 'Root file system is not read-only', 'Runs as root user', 'Runs with GID <= 10000', 'Runs with UID <= 10000', 'Runs with a root primary or supplementary GID', 'Runtime/Default AppArmor profile not set', 'Runtime/Default Seccomp profile not set', 'SELinux custom options set', 'SYS_ADMIN capability added', 'Seccomp policies disabled', 'Service with External IP', 'Specific capabilities added', 'Unsafe sysctl options set', 'User with admin access', 'Workloads in the default namespace', 'hostPath volume mounted with docker.sock', 'hostPath volumes mounted'
- labels Sequence[str]
- List of labels.
- lastupdate str
- linux_cis_ boolenabled 
- malware_action str
- maximum_score float
- Value of allowed maximum score.
- maximum_score_ boolenabled 
- Indicates if exceeding the maximum score is scanned.
- maximum_score_ boolexclude_ no_ fix 
- Indicates that policy should ignore cases that do not have a known fix.
- monitored_malware_ Sequence[str]paths 
- name str
- only_none_ boolroot_ users 
- Indicates if raise a warning for images that should only be run as root.
- openshift_hardening_ boolenabled 
- packages_black_ boollist_ enabled 
- Indicates if packages blacklist is relevant.
- packages_black_ Sequence[Kuberneteslists Assurance Policy Packages Black List Args] 
- List of blacklisted images.
- packages_white_ boollist_ enabled 
- Indicates if packages whitelist is relevant.
- packages_white_ Sequence[Kuberneteslists Assurance Policy Packages White List Args] 
- List of whitelisted images.
- partial_results_ boolimage_ fail 
- permission str
- policy_settings KubernetesAssurance Policy Policy Settings Args 
- read_only bool
- registries Sequence[str]
- List of registries.
- registry str
- required_labels Sequence[KubernetesAssurance Policy Required Label Args] 
- required_labels_ boolenabled 
- scan_malware_ boolin_ archives 
- scan_nfs_ boolmounts 
- scan_process_ boolmemory 
- scan_sensitive_ booldata 
- Indicates if scan should include sensitive data in the image.
- scan_windows_ boolregistry 
- scap_enabled bool
- Indicates if scanning should include scap.
- scap_files Sequence[str]
- List of SCAP user scripts for checks.
- scopes
Sequence[KubernetesAssurance Policy Scope Args] 
- trusted_base_ Sequence[Kubernetesimages Assurance Policy Trusted Base Image Args] 
- List of trusted images.
- trusted_base_ boolimages_ enabled 
- Indicates if list of trusted base images is relevant.
- vulnerability_exploitability bool
- vulnerability_score_ Sequence[int]ranges 
- whitelisted_licenses Sequence[str]
- List of whitelisted licenses.
- whitelisted_licenses_ boolenabled 
- Indicates if license blacklist is relevant.
- aggregatedVulnerability Map<String>
- Aggregated vulnerability information.
- allowedImages List<String>
- List of explicitly allowed images.
- applicationScopes List<String>
- assuranceType String
- What type of assurance policy is described.
- auditOn BooleanFailure 
- Indicates if auditing for failures.
- String
- Name of user account that created the policy.
- autoScan BooleanConfigured 
- autoScan BooleanEnabled 
- autoScan List<Property Map>Times 
- blacklistPermissions List<String>
- List of function's forbidden permissions.
- blacklistPermissions BooleanEnabled 
- Indicates if blacklist permissions is relevant.
- blacklistedLicenses List<String>
- List of blacklisted licenses.
- blacklistedLicenses BooleanEnabled 
- Indicates if license blacklist is relevant.
- blockFailed Boolean
- Indicates if failed images are blocked.
- controlExclude BooleanNo Fix 
- customChecks List<Property Map>
- List of Custom user scripts for checks.
- customChecks BooleanEnabled 
- Indicates if scanning should include custom checks.
- customSeverity String
- customSeverity BooleanEnabled 
- cvesBlack BooleanList Enabled 
- Indicates if CVEs blacklist is relevant.
- cvesBlack List<String>Lists 
- List of CVEs blacklisted items.
- cvesWhite BooleanList Enabled 
- Indicates if CVEs whitelist is relevant.
- cvesWhite List<String>Lists 
- List of cves whitelisted licenses
- cvssSeverity String
- Identifier of the cvss severity.
- cvssSeverity BooleanEnabled 
- Indicates if the cvss severity is scanned.
- cvssSeverity BooleanExclude No Fix 
- Indicates that policy should ignore cvss cases that do not have a known fix.
- description String
- disallowExploit List<String>Types 
- disallowMalware Boolean
- Indicates if malware should block the image.
- dockerCis BooleanEnabled 
- Checks the host according to the Docker CIS benchmark, if Docker is found on the host.
- domain String
- Name of the container image.
- domainName String
- dtaEnabled Boolean
- dtaSeverity String
- enabled Boolean
- Is the control enabled?
- enforce Boolean
- enforceAfter NumberDays 
- enforceExcessive BooleanPermissions 
- exceptionalMonitored List<String>Malware Paths 
- excludeApplication List<String>Scopes 
- failCicd Boolean
- Indicates if cicd failures will fail the image.
- forbiddenLabels List<Property Map>
- forbiddenLabels BooleanEnabled 
- forceMicroenforcer Boolean
- functionIntegrity BooleanEnabled 
- ignoreBase BooleanImage Vln 
- ignoreRecently BooleanPublished Vln 
- ignoreRecently NumberPublished Vln Period 
- ignoreRisk BooleanResources Enabled 
- Indicates if risk resources are ignored.
- ignoredRisk List<String>Resources 
- List of ignored risk resources.
- ignoredSensitive List<String>Resources 
- images List<String>
- List of images.
- kubeCis BooleanEnabled 
- Performs a Kubernetes CIS benchmark check for the host.
- kubernetesControls List<Property Map>
- List of Kubernetes controls.
- kubernetesControls List<String>Avd Ids 
- kubernetesControls List<String>Names 
- List of kubernetes control names and available kubernetes controls are: 'Access to host IPC namespace', 'Access to host PID', 'Access to host network', 'Access to host ports', 'All container images must start with a GCR domain', 'All container images must start with an ECR domain', 'All container images must start with the *.azurecr.io domain', 'CPU not limited', 'CPU requests not specified', 'Can elevate its own privileges', 'ConfigMap with secrets', 'ConfigMap with sensitive content', 'Container images from public registries used', 'Default capabilitiessome containers do not drop all', 'Default capabilitiessome containers do not drop any', 'Delete pod logs', 'Exec into Pods', 'Image tag :latest used', 'Manage EKS IAM Auth ConfigMap', 'Manage Kubernetes RBAC resources', 'Manage Kubernetes networking', 'Manage Kubernetes workloads and pods', 'Manage all resources', 'Manage all resources at the namespace', 'Manage configmaps', 'Manage namespace secrets', 'Manage secrets', 'Manage webhookconfigurations', 'Manages /etc/hosts', 'Memory not limited', 'Memory requests not specified', 'Non-core volume types used.', 'Non-default /proc masks set', 'Privileged', 'Root file system is not read-only', 'Runs as root user', 'Runs with GID <= 10000', 'Runs with UID <= 10000', 'Runs with a root primary or supplementary GID', 'Runtime/Default AppArmor profile not set', 'Runtime/Default Seccomp profile not set', 'SELinux custom options set', 'SYS_ADMIN capability added', 'Seccomp policies disabled', 'Service with External IP', 'Specific capabilities added', 'Unsafe sysctl options set', 'User with admin access', 'Workloads in the default namespace', 'hostPath volume mounted with docker.sock', 'hostPath volumes mounted'
- labels List<String>
- List of labels.
- lastupdate String
- linuxCis BooleanEnabled 
- malwareAction String
- maximumScore Number
- Value of allowed maximum score.
- maximumScore BooleanEnabled 
- Indicates if exceeding the maximum score is scanned.
- maximumScore BooleanExclude No Fix 
- Indicates that policy should ignore cases that do not have a known fix.
- monitoredMalware List<String>Paths 
- name String
- onlyNone BooleanRoot Users 
- Indicates if raise a warning for images that should only be run as root.
- openshiftHardening BooleanEnabled 
- packagesBlack BooleanList Enabled 
- Indicates if packages blacklist is relevant.
- packagesBlack List<Property Map>Lists 
- List of blacklisted images.
- packagesWhite BooleanList Enabled 
- Indicates if packages whitelist is relevant.
- packagesWhite List<Property Map>Lists 
- List of whitelisted images.
- partialResults BooleanImage Fail 
- permission String
- policySettings Property Map
- readOnly Boolean
- registries List<String>
- List of registries.
- registry String
- requiredLabels List<Property Map>
- requiredLabels BooleanEnabled 
- scanMalware BooleanIn Archives 
- scanNfs BooleanMounts 
- scanProcess BooleanMemory 
- scanSensitive BooleanData 
- Indicates if scan should include sensitive data in the image.
- scanWindows BooleanRegistry 
- scapEnabled Boolean
- Indicates if scanning should include scap.
- scapFiles List<String>
- List of SCAP user scripts for checks.
- scopes List<Property Map>
- trustedBase List<Property Map>Images 
- List of trusted images.
- trustedBase BooleanImages Enabled 
- Indicates if list of trusted base images is relevant.
- vulnerabilityExploitability Boolean
- vulnerabilityScore List<Number>Ranges 
- whitelistedLicenses List<String>
- List of whitelisted licenses.
- whitelistedLicenses BooleanEnabled 
- Indicates if license blacklist is relevant.
Supporting Types
KubernetesAssurancePolicyAutoScanTime, KubernetesAssurancePolicyAutoScanTimeArgs            
- Iteration int
- IterationType string
- Time string
- WeekDays List<string>
- Iteration int
- IterationType string
- Time string
- WeekDays []string
- iteration Integer
- iterationType String
- time String
- weekDays List<String>
- iteration number
- iterationType string
- time string
- weekDays string[]
- iteration int
- iteration_type str
- time str
- week_days Sequence[str]
- iteration Number
- iterationType String
- time String
- weekDays List<String>
KubernetesAssurancePolicyCustomCheck, KubernetesAssurancePolicyCustomCheckArgs          
- string
- Name of user account that created the policy.
- Description string
- Engine string
- LastModified int
- Name string
- Path string
- ReadOnly bool
- ScriptId string
- Severity string
- Snippet string
- string
- Name of user account that created the policy.
- Description string
- Engine string
- LastModified int
- Name string
- Path string
- ReadOnly bool
- ScriptId string
- Severity string
- Snippet string
- String
- Name of user account that created the policy.
- description String
- engine String
- lastModified Integer
- name String
- path String
- readOnly Boolean
- scriptId String
- severity String
- snippet String
- string
- Name of user account that created the policy.
- description string
- engine string
- lastModified number
- name string
- path string
- readOnly boolean
- scriptId string
- severity string
- snippet string
- str
- Name of user account that created the policy.
- description str
- engine str
- last_modified int
- name str
- path str
- read_only bool
- script_id str
- severity str
- snippet str
- String
- Name of user account that created the policy.
- description String
- engine String
- lastModified Number
- name String
- path String
- readOnly Boolean
- scriptId String
- severity String
- snippet String
KubernetesAssurancePolicyForbiddenLabel, KubernetesAssurancePolicyForbiddenLabelArgs          
KubernetesAssurancePolicyKubernetesControl, KubernetesAssurancePolicyKubernetesControlArgs          
KubernetesAssurancePolicyPackagesBlackList, KubernetesAssurancePolicyPackagesBlackListArgs            
KubernetesAssurancePolicyPackagesWhiteList, KubernetesAssurancePolicyPackagesWhiteListArgs            
KubernetesAssurancePolicyPolicySettings, KubernetesAssurancePolicyPolicySettingsArgs          
- Enforce bool
- IsAudit boolChecked 
- Warn bool
- WarningMessage string
- Enforce bool
- IsAudit boolChecked 
- Warn bool
- WarningMessage string
- enforce Boolean
- isAudit BooleanChecked 
- warn Boolean
- warningMessage String
- enforce boolean
- isAudit booleanChecked 
- warn boolean
- warningMessage string
- enforce bool
- is_audit_ boolchecked 
- warn bool
- warning_message str
- enforce Boolean
- isAudit BooleanChecked 
- warn Boolean
- warningMessage String
KubernetesAssurancePolicyRequiredLabel, KubernetesAssurancePolicyRequiredLabelArgs          
KubernetesAssurancePolicyScope, KubernetesAssurancePolicyScopeArgs        
KubernetesAssurancePolicyScopeVariable, KubernetesAssurancePolicyScopeVariableArgs          
KubernetesAssurancePolicyTrustedBaseImage, KubernetesAssurancePolicyTrustedBaseImageArgs            
Package Details
- Repository
- aquasec pulumiverse/pulumi-aquasec
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the aquasecTerraform Provider.