|
| 1 | +--- |
| 2 | +# generated by https://github.com/hashicorp/terraform-plugin-docs |
| 3 | +page_title: "aquasec_vmware_assurance_policy Data Source - terraform-provider-aquasec" |
| 4 | +subcategory: "" |
| 5 | +description: |- |
| 6 | + |
| 7 | +--- |
| 8 | + |
| 9 | +# aquasec_vmware_assurance_policy (Data Source) |
| 10 | + |
| 11 | + |
| 12 | + |
| 13 | + |
| 14 | + |
| 15 | +<!-- schema generated by tfplugindocs --> |
| 16 | +## Schema |
| 17 | + |
| 18 | +### Required |
| 19 | + |
| 20 | +- `name` (String) |
| 21 | + |
| 22 | +### Read-Only |
| 23 | + |
| 24 | +- `aggregated_vulnerability` (List of Object) Aggregated vulnerability information. (see [below for nested schema](#nestedatt--aggregated_vulnerability)) |
| 25 | +- `allowed_images` (List of String) List of explicitly allowed images. |
| 26 | +- `application_scopes` (List of String) |
| 27 | +- `assurance_type` (String) What type of assurance policy is described. |
| 28 | +- `audit_on_failure` (Boolean) Indicates if auditing for failures. |
| 29 | +- `author` (String) Name of user account that created the policy. |
| 30 | +- `auto_scan_configured` (Boolean) |
| 31 | +- `auto_scan_enabled` (Boolean) |
| 32 | +- `auto_scan_time` (Set of Object) (see [below for nested schema](#nestedatt--auto_scan_time)) |
| 33 | +- `blacklist_permissions` (List of String) List of function's forbidden permissions. |
| 34 | +- `blacklist_permissions_enabled` (Boolean) Indicates if blacklist permissions is relevant. |
| 35 | +- `blacklisted_licenses` (List of String) List of blacklisted licenses. |
| 36 | +- `blacklisted_licenses_enabled` (Boolean) Indicates if license blacklist is relevant. |
| 37 | +- `block_failed` (Boolean) Indicates if failed images are blocked. |
| 38 | +- `category` (String) |
| 39 | +- `control_exclude_no_fix` (Boolean) |
| 40 | +- `custom_checks` (List of Object) List of Custom user scripts for checks. (see [below for nested schema](#nestedatt--custom_checks)) |
| 41 | +- `custom_checks_enabled` (Boolean) Indicates if scanning should include custom checks. |
| 42 | +- `custom_severity` (String) |
| 43 | +- `custom_severity_enabled` (Boolean) |
| 44 | +- `cves_black_list` (List of String) List of CVEs blacklisted items. |
| 45 | +- `cves_black_list_enabled` (Boolean) Indicates if CVEs blacklist is relevant. |
| 46 | +- `cves_white_list` (List of String) List of cves whitelisted licenses |
| 47 | +- `cves_white_list_enabled` (Boolean) Indicates if CVEs whitelist is relevant. |
| 48 | +- `cvss_severity` (String) Identifier of the cvss severity. |
| 49 | +- `cvss_severity_enabled` (Boolean) Indicates if the cvss severity is scanned. |
| 50 | +- `cvss_severity_exclude_no_fix` (Boolean) Indicates that policy should ignore cvss cases that do not have a known fix. |
| 51 | +- `description` (String) |
| 52 | +- `disallow_exploit_types` (List of String) |
| 53 | +- `disallow_malware` (Boolean) Indicates if malware should block the image. |
| 54 | +- `docker_cis_enabled` (Boolean) Checks the host according to the Docker CIS benchmark, if Docker is found on the host. |
| 55 | +- `domain` (String) Name of the container image. |
| 56 | +- `domain_name` (String) |
| 57 | +- `dta_enabled` (Boolean) |
| 58 | +- `dta_severity` (String) |
| 59 | +- `enabled` (Boolean) |
| 60 | +- `enforce` (Boolean) |
| 61 | +- `enforce_after_days` (Number) |
| 62 | +- `enforce_excessive_permissions` (Boolean) |
| 63 | +- `exceptional_monitored_malware_paths` (List of String) |
| 64 | +- `exclude_application_scopes` (List of String) |
| 65 | +- `fail_cicd` (Boolean) Indicates if cicd failures will fail the image. |
| 66 | +- `forbidden_labels` (Set of Object) (see [below for nested schema](#nestedatt--forbidden_labels)) |
| 67 | +- `forbidden_labels_enabled` (Boolean) |
| 68 | +- `force_microenforcer` (Boolean) |
| 69 | +- `function_integrity_enabled` (Boolean) |
| 70 | +- `id` (String) The ID of this resource. |
| 71 | +- `ignore_base_image_vln` (Boolean) |
| 72 | +- `ignore_recently_published_fix_vln` (Boolean) |
| 73 | +- `ignore_recently_published_fix_vln_period` (Number) |
| 74 | +- `ignore_recently_published_vln` (Boolean) |
| 75 | +- `ignore_recently_published_vln_period` (Number) |
| 76 | +- `ignore_risk_resources_enabled` (Boolean) Indicates if risk resources are ignored. |
| 77 | +- `ignored_risk_resources` (List of String) List of ignored risk resources. |
| 78 | +- `ignored_sensitive_resources` (List of String) |
| 79 | +- `images` (List of String) List of images. |
| 80 | +- `kube_cis_enabled` (Boolean) Performs a Kubernetes CIS benchmark check for the host. |
| 81 | +- `kubernetes_controls` (List of String) |
| 82 | +- `kubernetes_controls_avd_ids` (List of String) |
| 83 | +- `kubernetes_controls_names` (List of String) |
| 84 | +- `labels` (List of String) List of labels. |
| 85 | +- `linux_cis_enabled` (Boolean) |
| 86 | +- `malware_action` (String) |
| 87 | +- `maximum_score` (Number) Value of allowed maximum score. |
| 88 | +- `maximum_score_enabled` (Boolean) Indicates if exceeding the maximum score is scanned. |
| 89 | +- `maximum_score_exclude_no_fix` (Boolean) Indicates that policy should ignore cases that do not have a known fix. |
| 90 | +- `monitored_malware_paths` (List of String) |
| 91 | +- `only_none_root_users` (Boolean) Indicates if raise a warning for images that should only be run as root. |
| 92 | +- `openshift_hardening_enabled` (Boolean) |
| 93 | +- `packages_black_list` (Set of Object) List of blacklisted images. (see [below for nested schema](#nestedatt--packages_black_list)) |
| 94 | +- `packages_black_list_enabled` (Boolean) Indicates if packages blacklist is relevant. |
| 95 | +- `packages_white_list` (Set of Object) List of whitelisted images. (see [below for nested schema](#nestedatt--packages_white_list)) |
| 96 | +- `packages_white_list_enabled` (Boolean) Indicates if packages whitelist is relevant. |
| 97 | +- `partial_results_image_fail` (Boolean) |
| 98 | +- `permission` (String) |
| 99 | +- `policy_settings` (List of Object) (see [below for nested schema](#nestedatt--policy_settings)) |
| 100 | +- `read_only` (Boolean) |
| 101 | +- `registries` (List of String) List of registries. |
| 102 | +- `registry` (String) |
| 103 | +- `required_labels` (Set of Object) (see [below for nested schema](#nestedatt--required_labels)) |
| 104 | +- `required_labels_enabled` (Boolean) |
| 105 | +- `scan_malware_in_archives` (Boolean) |
| 106 | +- `scan_nfs_mounts` (Boolean) |
| 107 | +- `scan_process_memory` (Boolean) |
| 108 | +- `scan_sensitive_data` (Boolean) Indicates if scan should include sensitive data in the image. |
| 109 | +- `scan_windows_registry` (Boolean) |
| 110 | +- `scap_enabled` (Boolean) Indicates if scanning should include scap. |
| 111 | +- `scap_files` (List of String) List of SCAP user scripts for checks. |
| 112 | +- `scope` (Set of Object) (see [below for nested schema](#nestedatt--scope)) |
| 113 | +- `trusted_base_images` (Set of Object) List of trusted images. (see [below for nested schema](#nestedatt--trusted_base_images)) |
| 114 | +- `trusted_base_images_enabled` (Boolean) Indicates if list of trusted base images is relevant. |
| 115 | +- `vulnerability_exploitability` (Boolean) |
| 116 | +- `vulnerability_score_range` (List of Number) |
| 117 | +- `whitelisted_licenses` (List of String) List of whitelisted licenses. |
| 118 | +- `whitelisted_licenses_enabled` (Boolean) Indicates if license blacklist is relevant. |
| 119 | +- `windows_cis_enabled` (Boolean) Checks the host according to the Windows CIS benchmark (relevant for hosts running Windows). |
| 120 | + |
| 121 | +<a id="nestedatt--aggregated_vulnerability"></a> |
| 122 | +### Nested Schema for `aggregated_vulnerability` |
| 123 | + |
| 124 | +Read-Only: |
| 125 | + |
| 126 | +- `custom_severity_enabled` (Boolean) |
| 127 | +- `enabled` (Boolean) |
| 128 | +- `score_range` (List of Number) |
| 129 | +- `severity` (String) |
| 130 | + |
| 131 | + |
| 132 | +<a id="nestedatt--auto_scan_time"></a> |
| 133 | +### Nested Schema for `auto_scan_time` |
| 134 | + |
| 135 | +Read-Only: |
| 136 | + |
| 137 | +- `iteration` (Number) |
| 138 | +- `iteration_type` (String) |
| 139 | +- `time` (String) |
| 140 | +- `week_days` (List of String) |
| 141 | + |
| 142 | + |
| 143 | +<a id="nestedatt--custom_checks"></a> |
| 144 | +### Nested Schema for `custom_checks` |
| 145 | + |
| 146 | +Read-Only: |
| 147 | + |
| 148 | +- `author` (String) |
| 149 | +- `description` (String) |
| 150 | +- `engine` (String) |
| 151 | +- `last_modified` (Number) |
| 152 | +- `name` (String) |
| 153 | +- `path` (String) |
| 154 | +- `read_only` (Boolean) |
| 155 | +- `script_id` (String) |
| 156 | +- `severity` (String) |
| 157 | +- `snippet` (String) |
| 158 | + |
| 159 | + |
| 160 | +<a id="nestedatt--forbidden_labels"></a> |
| 161 | +### Nested Schema for `forbidden_labels` |
| 162 | + |
| 163 | +Read-Only: |
| 164 | + |
| 165 | +- `key` (String) |
| 166 | +- `value` (String) |
| 167 | + |
| 168 | + |
| 169 | +<a id="nestedatt--packages_black_list"></a> |
| 170 | +### Nested Schema for `packages_black_list` |
| 171 | + |
| 172 | +Read-Only: |
| 173 | + |
| 174 | +- `arch` (String) |
| 175 | +- `display` (String) |
| 176 | +- `epoch` (String) |
| 177 | +- `format` (String) |
| 178 | +- `license` (String) |
| 179 | +- `name` (String) |
| 180 | +- `release` (String) |
| 181 | +- `version` (String) |
| 182 | +- `version_range` (String) |
| 183 | + |
| 184 | + |
| 185 | +<a id="nestedatt--packages_white_list"></a> |
| 186 | +### Nested Schema for `packages_white_list` |
| 187 | + |
| 188 | +Read-Only: |
| 189 | + |
| 190 | +- `arch` (String) |
| 191 | +- `display` (String) |
| 192 | +- `epoch` (String) |
| 193 | +- `format` (String) |
| 194 | +- `license` (String) |
| 195 | +- `name` (String) |
| 196 | +- `release` (String) |
| 197 | +- `version` (String) |
| 198 | +- `version_range` (String) |
| 199 | + |
| 200 | + |
| 201 | +<a id="nestedatt--policy_settings"></a> |
| 202 | +### Nested Schema for `policy_settings` |
| 203 | + |
| 204 | +Read-Only: |
| 205 | + |
| 206 | +- `enforce` (Boolean) |
| 207 | +- `is_audit_checked` (Boolean) |
| 208 | +- `warn` (Boolean) |
| 209 | +- `warning_message` (String) |
| 210 | + |
| 211 | + |
| 212 | +<a id="nestedatt--required_labels"></a> |
| 213 | +### Nested Schema for `required_labels` |
| 214 | + |
| 215 | +Read-Only: |
| 216 | + |
| 217 | +- `key` (String) |
| 218 | +- `value` (String) |
| 219 | + |
| 220 | + |
| 221 | +<a id="nestedatt--scope"></a> |
| 222 | +### Nested Schema for `scope` |
| 223 | + |
| 224 | +Read-Only: |
| 225 | + |
| 226 | +- `expression` (String) |
| 227 | +- `variables` (Set of Object) (see [below for nested schema](#nestedobjatt--scope--variables)) |
| 228 | + |
| 229 | +<a id="nestedobjatt--scope--variables"></a> |
| 230 | +### Nested Schema for `scope.variables` |
| 231 | + |
| 232 | +Read-Only: |
| 233 | + |
| 234 | +- `attribute` (String) |
| 235 | +- `name` (String) |
| 236 | +- `value` (String) |
| 237 | + |
| 238 | + |
| 239 | + |
| 240 | +<a id="nestedatt--trusted_base_images"></a> |
| 241 | +### Nested Schema for `trusted_base_images` |
| 242 | + |
| 243 | +Read-Only: |
| 244 | + |
| 245 | +- `imagename` (String) |
| 246 | +- `registry` (String) |
| 247 | + |
| 248 | + |
0 commit comments