aquasec.HostRuntimePolicy
Explore with Pulumi AI
Example Usage
Coming soon!
Coming soon!
Coming soon!
Coming soon!
Coming soon!
resources:
  hostRuntimePolicy:
    type: aquasec:HostRuntimePolicy
    properties:
      applicationScopes:
        - Global
      auditAllOsUserActivity: true
      auditBruteForceLogin: true
      auditFullCommandArguments: true
      auditHostFailedLoginEvents: true
      auditHostSuccessfulLoginEvents: true
      auditUserAccountManagement: true
      blockCryptocurrencyMining: true
      blockedFiles:
        - blocked
      description: host_runtime_policy
      enabled: true
      enforce: false
      fileIntegrityMonitoring:
        excludedPaths:
          - expaths
        excludedProcesses:
          - exprocess
        excludedUsers:
          - expuser
        monitorAttributes: true
        monitorCreate: true
        monitorDelete: true
        monitorModify: true
        monitorRead: true
        monitoredPaths:
          - paths
        monitoredProcesses:
          - process
        monitoredUsers:
          - user
      monitorSystemLogIntegrity: true
      monitorSystemTimeChanges: true
      monitorWindowsServices: true
      osGroupsAlloweds:
        - group1
      osGroupsBlockeds:
        - group2
      osUsersAlloweds:
        - user1
      osUsersBlockeds:
        - user2
      packageBlocks:
        - package1
      scopeVariables:
        - attribute: kubernetes.cluster
          value: default
        - attribute: kubernetes.label
          name: app
          value: aqua
Create HostRuntimePolicy Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new HostRuntimePolicy(name: string, args?: HostRuntimePolicyArgs, opts?: CustomResourceOptions);@overload
def HostRuntimePolicy(resource_name: str,
                      args: Optional[HostRuntimePolicyArgs] = None,
                      opts: Optional[ResourceOptions] = None)
@overload
def HostRuntimePolicy(resource_name: str,
                      opts: Optional[ResourceOptions] = None,
                      allowed_executables: Optional[Sequence[HostRuntimePolicyAllowedExecutableArgs]] = None,
                      allowed_registries: Optional[Sequence[HostRuntimePolicyAllowedRegistryArgs]] = None,
                      application_scopes: Optional[Sequence[str]] = None,
                      audit_brute_force_login: Optional[bool] = None,
                      audit_full_command_arguments: Optional[bool] = None,
                      audit_host_failed_login_events: Optional[bool] = None,
                      audit_host_successful_login_events: Optional[bool] = None,
                      audit_user_account_management: Optional[bool] = None,
                      auditing: Optional[HostRuntimePolicyAuditingArgs] = None,
                      author: Optional[str] = None,
                      blacklisted_os_users: Optional[HostRuntimePolicyBlacklistedOsUsersArgs] = None,
                      block_container_exec: Optional[bool] = None,
                      block_cryptocurrency_mining: Optional[bool] = None,
                      block_disallowed_images: Optional[bool] = None,
                      block_fileless_exec: Optional[bool] = None,
                      block_non_compliant_workloads: Optional[bool] = None,
                      block_non_k8s_containers: Optional[bool] = None,
                      blocked_files: Optional[Sequence[str]] = None,
                      bypass_scopes: Optional[Sequence[HostRuntimePolicyBypassScopeArgs]] = None,
                      container_exec: Optional[HostRuntimePolicyContainerExecArgs] = None,
                      created: Optional[str] = None,
                      cve: Optional[str] = None,
                      default_security_profile: Optional[str] = None,
                      description: Optional[str] = None,
                      digest: Optional[str] = None,
                      drift_preventions: Optional[Sequence[HostRuntimePolicyDriftPreventionArgs]] = None,
                      enable_crypto_mining_dns: Optional[bool] = None,
                      enable_fork_guard: Optional[bool] = None,
                      enable_ip_reputation: Optional[bool] = None,
                      enable_port_scan_protection: Optional[bool] = None,
                      enabled: Optional[bool] = None,
                      enforce: Optional[bool] = None,
                      enforce_after_days: Optional[int] = None,
                      enforce_scheduler_added_on: Optional[int] = None,
                      exclude_application_scopes: Optional[Sequence[str]] = None,
                      executable_blacklists: Optional[Sequence[HostRuntimePolicyExecutableBlacklistArgs]] = None,
                      failed_kubernetes_checks: Optional[HostRuntimePolicyFailedKubernetesChecksArgs] = None,
                      file_block: Optional[HostRuntimePolicyFileBlockArgs] = None,
                      file_integrity_monitoring: Optional[HostRuntimePolicyFileIntegrityMonitoringArgs] = None,
                      fork_guard_process_limit: Optional[int] = None,
                      image_name: Optional[str] = None,
                      is_audit_checked: Optional[bool] = None,
                      is_auto_generated: Optional[bool] = None,
                      is_ootb_policy: Optional[bool] = None,
                      lastupdate: Optional[int] = None,
                      limit_container_privileges: Optional[Sequence[HostRuntimePolicyLimitContainerPrivilegeArgs]] = None,
                      linux_capabilities: Optional[HostRuntimePolicyLinuxCapabilitiesArgs] = None,
                      malware_scan_options: Optional[HostRuntimePolicyMalwareScanOptionsArgs] = None,
                      monitor_system_log_integrity: Optional[bool] = None,
                      monitor_system_time_changes: Optional[bool] = None,
                      monitor_windows_services: Optional[bool] = None,
                      name: Optional[str] = None,
                      no_new_privileges: Optional[bool] = None,
                      only_registered_images: Optional[bool] = None,
                      os_groups_alloweds: Optional[Sequence[str]] = None,
                      os_groups_blockeds: Optional[Sequence[str]] = None,
                      os_users_alloweds: Optional[Sequence[str]] = None,
                      os_users_blockeds: Optional[Sequence[str]] = None,
                      package_blocks: Optional[Sequence[HostRuntimePolicyPackageBlockArgs]] = None,
                      permission: Optional[str] = None,
                      port_block: Optional[HostRuntimePolicyPortBlockArgs] = None,
                      readonly_files: Optional[HostRuntimePolicyReadonlyFilesArgs] = None,
                      readonly_registry: Optional[HostRuntimePolicyReadonlyRegistryArgs] = None,
                      registry: Optional[str] = None,
                      registry_access_monitoring: Optional[HostRuntimePolicyRegistryAccessMonitoringArgs] = None,
                      repo_name: Optional[str] = None,
                      resource_name_: Optional[str] = None,
                      resource_type: Optional[str] = None,
                      restricted_volumes: Optional[Sequence[HostRuntimePolicyRestrictedVolumeArgs]] = None,
                      reverse_shell: Optional[HostRuntimePolicyReverseShellArgs] = None,
                      runtime_mode: Optional[int] = None,
                      runtime_type: Optional[str] = None,
                      scope_expression: Optional[str] = None,
                      scope_variables: Optional[Sequence[HostRuntimePolicyScopeVariableArgs]] = None,
                      scopes: Optional[Sequence[HostRuntimePolicyScopeArgs]] = None,
                      system_integrity_protection: Optional[HostRuntimePolicySystemIntegrityProtectionArgs] = None,
                      tripwire: Optional[HostRuntimePolicyTripwireArgs] = None,
                      type: Optional[str] = None,
                      updated: Optional[str] = None,
                      version: Optional[str] = None,
                      vpatch_version: Optional[str] = None,
                      whitelisted_os_users: Optional[HostRuntimePolicyWhitelistedOsUsersArgs] = None)func NewHostRuntimePolicy(ctx *Context, name string, args *HostRuntimePolicyArgs, opts ...ResourceOption) (*HostRuntimePolicy, error)public HostRuntimePolicy(string name, HostRuntimePolicyArgs? args = null, CustomResourceOptions? opts = null)
public HostRuntimePolicy(String name, HostRuntimePolicyArgs args)
public HostRuntimePolicy(String name, HostRuntimePolicyArgs args, CustomResourceOptions options)
type: aquasec:HostRuntimePolicy
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args HostRuntimePolicyArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args HostRuntimePolicyArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args HostRuntimePolicyArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args HostRuntimePolicyArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args HostRuntimePolicyArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var hostRuntimePolicyResource = new Aquasec.HostRuntimePolicy("hostRuntimePolicyResource", new()
{
    AllowedExecutables = new[]
    {
        new Aquasec.Inputs.HostRuntimePolicyAllowedExecutableArgs
        {
            AllowExecutables = new[]
            {
                "string",
            },
            AllowRootExecutables = new[]
            {
                "string",
            },
            Enabled = false,
            SeparateExecutables = false,
        },
    },
    AllowedRegistries = new[]
    {
        new Aquasec.Inputs.HostRuntimePolicyAllowedRegistryArgs
        {
            AllowedRegistries = new[]
            {
                "string",
            },
            Enabled = false,
        },
    },
    ApplicationScopes = new[]
    {
        "string",
    },
    AuditBruteForceLogin = false,
    AuditFullCommandArguments = false,
    AuditHostFailedLoginEvents = false,
    AuditHostSuccessfulLoginEvents = false,
    AuditUserAccountManagement = false,
    Auditing = new Aquasec.Inputs.HostRuntimePolicyAuditingArgs
    {
        AuditAllNetwork = false,
        AuditAllProcesses = false,
        AuditFailedLogin = false,
        AuditOsUserActivity = false,
        AuditProcessCmdline = false,
        AuditSuccessLogin = false,
        AuditUserAccountManagement = false,
        Enabled = false,
    },
    Author = "string",
    BlacklistedOsUsers = new Aquasec.Inputs.HostRuntimePolicyBlacklistedOsUsersArgs
    {
        Enabled = false,
        GroupBlackLists = new[]
        {
            "string",
        },
        UserBlackLists = new[]
        {
            "string",
        },
    },
    BlockContainerExec = false,
    BlockCryptocurrencyMining = false,
    BlockDisallowedImages = false,
    BlockFilelessExec = false,
    BlockNonCompliantWorkloads = false,
    BlockNonK8sContainers = false,
    BlockedFiles = new[]
    {
        "string",
    },
    BypassScopes = new[]
    {
        new Aquasec.Inputs.HostRuntimePolicyBypassScopeArgs
        {
            Enabled = false,
            Scopes = new[]
            {
                new Aquasec.Inputs.HostRuntimePolicyBypassScopeScopeArgs
                {
                    Expression = "string",
                    Variables = new[]
                    {
                        new Aquasec.Inputs.HostRuntimePolicyBypassScopeScopeVariableArgs
                        {
                            Attribute = "string",
                            Value = "string",
                        },
                    },
                },
            },
        },
    },
    ContainerExec = new Aquasec.Inputs.HostRuntimePolicyContainerExecArgs
    {
        BlockContainerExec = false,
        ContainerExecProcWhiteLists = new[]
        {
            "string",
        },
        Enabled = false,
        ReverseShellIpWhiteLists = new[]
        {
            "string",
        },
    },
    Created = "string",
    Cve = "string",
    DefaultSecurityProfile = "string",
    Description = "string",
    Digest = "string",
    DriftPreventions = new[]
    {
        new Aquasec.Inputs.HostRuntimePolicyDriftPreventionArgs
        {
            Enabled = false,
            ExecLockdown = false,
            ExecLockdownWhiteLists = new[]
            {
                "string",
            },
            ImageLockdown = false,
        },
    },
    EnableCryptoMiningDns = false,
    EnableForkGuard = false,
    EnableIpReputation = false,
    EnablePortScanProtection = false,
    Enabled = false,
    Enforce = false,
    EnforceAfterDays = 0,
    EnforceSchedulerAddedOn = 0,
    ExcludeApplicationScopes = new[]
    {
        "string",
    },
    ExecutableBlacklists = new[]
    {
        new Aquasec.Inputs.HostRuntimePolicyExecutableBlacklistArgs
        {
            Enabled = false,
            Executables = new[]
            {
                "string",
            },
        },
    },
    FailedKubernetesChecks = new Aquasec.Inputs.HostRuntimePolicyFailedKubernetesChecksArgs
    {
        Enabled = false,
        FailedChecks = new[]
        {
            "string",
        },
    },
    FileBlock = new Aquasec.Inputs.HostRuntimePolicyFileBlockArgs
    {
        BlockFilesProcesses = new[]
        {
            "string",
        },
        BlockFilesUsers = new[]
        {
            "string",
        },
        Enabled = false,
        ExceptionalBlockFiles = new[]
        {
            "string",
        },
        ExceptionalBlockFilesProcesses = new[]
        {
            "string",
        },
        ExceptionalBlockFilesUsers = new[]
        {
            "string",
        },
        FilenameBlockLists = new[]
        {
            "string",
        },
    },
    FileIntegrityMonitoring = new Aquasec.Inputs.HostRuntimePolicyFileIntegrityMonitoringArgs
    {
        Enabled = false,
        ExceptionalMonitoredFiles = new[]
        {
            "string",
        },
        ExceptionalMonitoredFilesProcesses = new[]
        {
            "string",
        },
        ExceptionalMonitoredFilesUsers = new[]
        {
            "string",
        },
        MonitoredFiles = new[]
        {
            "string",
        },
        MonitoredFilesAttributes = false,
        MonitoredFilesCreate = false,
        MonitoredFilesDelete = false,
        MonitoredFilesModify = false,
        MonitoredFilesProcesses = new[]
        {
            "string",
        },
        MonitoredFilesRead = false,
        MonitoredFilesUsers = new[]
        {
            "string",
        },
    },
    ForkGuardProcessLimit = 0,
    ImageName = "string",
    IsAuditChecked = false,
    IsAutoGenerated = false,
    IsOotbPolicy = false,
    Lastupdate = 0,
    LimitContainerPrivileges = new[]
    {
        new Aquasec.Inputs.HostRuntimePolicyLimitContainerPrivilegeArgs
        {
            BlockAddCapabilities = false,
            Enabled = false,
            Ipcmode = false,
            Netmode = false,
            Pidmode = false,
            PreventLowPortBinding = false,
            PreventRootUser = false,
            Privileged = false,
            UseHostUser = false,
            Usermode = false,
            Utsmode = false,
        },
    },
    LinuxCapabilities = new Aquasec.Inputs.HostRuntimePolicyLinuxCapabilitiesArgs
    {
        Enabled = false,
        RemoveLinuxCapabilities = new[]
        {
            "string",
        },
    },
    MalwareScanOptions = new Aquasec.Inputs.HostRuntimePolicyMalwareScanOptionsArgs
    {
        Action = "string",
        Enabled = false,
        ExcludeDirectories = new[]
        {
            "string",
        },
        ExcludeProcesses = new[]
        {
            "string",
        },
        IncludeDirectories = new[]
        {
            "string",
        },
    },
    MonitorSystemLogIntegrity = false,
    MonitorSystemTimeChanges = false,
    MonitorWindowsServices = false,
    Name = "string",
    NoNewPrivileges = false,
    OnlyRegisteredImages = false,
    OsGroupsAlloweds = new[]
    {
        "string",
    },
    OsGroupsBlockeds = new[]
    {
        "string",
    },
    OsUsersAlloweds = new[]
    {
        "string",
    },
    OsUsersBlockeds = new[]
    {
        "string",
    },
    PackageBlocks = new[]
    {
        new Aquasec.Inputs.HostRuntimePolicyPackageBlockArgs
        {
            BlockPackagesProcesses = new[]
            {
                "string",
            },
            BlockPackagesUsers = new[]
            {
                "string",
            },
            Enabled = false,
            ExceptionalBlockPackagesFiles = new[]
            {
                "string",
            },
            ExceptionalBlockPackagesProcesses = new[]
            {
                "string",
            },
            ExceptionalBlockPackagesUsers = new[]
            {
                "string",
            },
            PackagesBlackLists = new[]
            {
                "string",
            },
        },
    },
    Permission = "string",
    PortBlock = new Aquasec.Inputs.HostRuntimePolicyPortBlockArgs
    {
        BlockInboundPorts = new[]
        {
            "string",
        },
        BlockOutboundPorts = new[]
        {
            "string",
        },
        Enabled = false,
    },
    ReadonlyFiles = new Aquasec.Inputs.HostRuntimePolicyReadonlyFilesArgs
    {
        Enabled = false,
        ExceptionalReadonlyFiles = new[]
        {
            "string",
        },
        ExceptionalReadonlyFilesProcesses = new[]
        {
            "string",
        },
        ExceptionalReadonlyFilesUsers = new[]
        {
            "string",
        },
        ReadonlyFiles = new[]
        {
            "string",
        },
        ReadonlyFilesProcesses = new[]
        {
            "string",
        },
        ReadonlyFilesUsers = new[]
        {
            "string",
        },
    },
    ReadonlyRegistry = new Aquasec.Inputs.HostRuntimePolicyReadonlyRegistryArgs
    {
        Enabled = false,
        ExceptionalReadonlyRegistryPaths = new[]
        {
            "string",
        },
        ExceptionalReadonlyRegistryProcesses = new[]
        {
            "string",
        },
        ExceptionalReadonlyRegistryUsers = new[]
        {
            "string",
        },
        ReadonlyRegistryPaths = new[]
        {
            "string",
        },
        ReadonlyRegistryProcesses = new[]
        {
            "string",
        },
        ReadonlyRegistryUsers = new[]
        {
            "string",
        },
    },
    Registry = "string",
    RegistryAccessMonitoring = new Aquasec.Inputs.HostRuntimePolicyRegistryAccessMonitoringArgs
    {
        Enabled = false,
        ExceptionalMonitoredRegistryPaths = new[]
        {
            "string",
        },
        ExceptionalMonitoredRegistryProcesses = new[]
        {
            "string",
        },
        ExceptionalMonitoredRegistryUsers = new[]
        {
            "string",
        },
        MonitoredRegistryAttributes = false,
        MonitoredRegistryCreate = false,
        MonitoredRegistryDelete = false,
        MonitoredRegistryModify = false,
        MonitoredRegistryPaths = new[]
        {
            "string",
        },
        MonitoredRegistryProcesses = new[]
        {
            "string",
        },
        MonitoredRegistryRead = false,
        MonitoredRegistryUsers = new[]
        {
            "string",
        },
    },
    RepoName = "string",
    ResourceName = "string",
    ResourceType = "string",
    RestrictedVolumes = new[]
    {
        new Aquasec.Inputs.HostRuntimePolicyRestrictedVolumeArgs
        {
            Enabled = false,
            Volumes = new[]
            {
                "string",
            },
        },
    },
    ReverseShell = new Aquasec.Inputs.HostRuntimePolicyReverseShellArgs
    {
        BlockReverseShell = false,
        Enabled = false,
        ReverseShellIpWhiteLists = new[]
        {
            "string",
        },
        ReverseShellProcWhiteLists = new[]
        {
            "string",
        },
    },
    RuntimeMode = 0,
    RuntimeType = "string",
    ScopeExpression = "string",
    ScopeVariables = new[]
    {
        new Aquasec.Inputs.HostRuntimePolicyScopeVariableArgs
        {
            Attribute = "string",
            Value = "string",
            Name = "string",
        },
    },
    Scopes = new[]
    {
        new Aquasec.Inputs.HostRuntimePolicyScopeArgs
        {
            Expression = "string",
            Variables = new[]
            {
                new Aquasec.Inputs.HostRuntimePolicyScopeVariableArgs
                {
                    Attribute = "string",
                    Value = "string",
                    Name = "string",
                },
            },
        },
    },
    SystemIntegrityProtection = new Aquasec.Inputs.HostRuntimePolicySystemIntegrityProtectionArgs
    {
        AuditSystemtimeChange = false,
        Enabled = false,
        MonitorAuditLogIntegrity = false,
        WindowsServicesMonitoring = false,
    },
    Tripwire = new Aquasec.Inputs.HostRuntimePolicyTripwireArgs
    {
        ApplyOns = new[]
        {
            "string",
        },
        Enabled = false,
        ServerlessApp = "string",
        UserId = "string",
        UserPassword = "string",
    },
    Type = "string",
    Updated = "string",
    Version = "string",
    VpatchVersion = "string",
    WhitelistedOsUsers = new Aquasec.Inputs.HostRuntimePolicyWhitelistedOsUsersArgs
    {
        Enabled = false,
        GroupWhiteLists = new[]
        {
            "string",
        },
        UserWhiteLists = new[]
        {
            "string",
        },
    },
});
example, err := aquasec.NewHostRuntimePolicy(ctx, "hostRuntimePolicyResource", &aquasec.HostRuntimePolicyArgs{
	AllowedExecutables: aquasec.HostRuntimePolicyAllowedExecutableArray{
		&aquasec.HostRuntimePolicyAllowedExecutableArgs{
			AllowExecutables: pulumi.StringArray{
				pulumi.String("string"),
			},
			AllowRootExecutables: pulumi.StringArray{
				pulumi.String("string"),
			},
			Enabled:             pulumi.Bool(false),
			SeparateExecutables: pulumi.Bool(false),
		},
	},
	AllowedRegistries: aquasec.HostRuntimePolicyAllowedRegistryArray{
		&aquasec.HostRuntimePolicyAllowedRegistryArgs{
			AllowedRegistries: pulumi.StringArray{
				pulumi.String("string"),
			},
			Enabled: pulumi.Bool(false),
		},
	},
	ApplicationScopes: pulumi.StringArray{
		pulumi.String("string"),
	},
	AuditBruteForceLogin:           pulumi.Bool(false),
	AuditFullCommandArguments:      pulumi.Bool(false),
	AuditHostFailedLoginEvents:     pulumi.Bool(false),
	AuditHostSuccessfulLoginEvents: pulumi.Bool(false),
	AuditUserAccountManagement:     pulumi.Bool(false),
	Auditing: &aquasec.HostRuntimePolicyAuditingArgs{
		AuditAllNetwork:            pulumi.Bool(false),
		AuditAllProcesses:          pulumi.Bool(false),
		AuditFailedLogin:           pulumi.Bool(false),
		AuditOsUserActivity:        pulumi.Bool(false),
		AuditProcessCmdline:        pulumi.Bool(false),
		AuditSuccessLogin:          pulumi.Bool(false),
		AuditUserAccountManagement: pulumi.Bool(false),
		Enabled:                    pulumi.Bool(false),
	},
	Author: pulumi.String("string"),
	BlacklistedOsUsers: &aquasec.HostRuntimePolicyBlacklistedOsUsersArgs{
		Enabled: pulumi.Bool(false),
		GroupBlackLists: pulumi.StringArray{
			pulumi.String("string"),
		},
		UserBlackLists: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	BlockContainerExec:         pulumi.Bool(false),
	BlockCryptocurrencyMining:  pulumi.Bool(false),
	BlockDisallowedImages:      pulumi.Bool(false),
	BlockFilelessExec:          pulumi.Bool(false),
	BlockNonCompliantWorkloads: pulumi.Bool(false),
	BlockNonK8sContainers:      pulumi.Bool(false),
	BlockedFiles: pulumi.StringArray{
		pulumi.String("string"),
	},
	BypassScopes: aquasec.HostRuntimePolicyBypassScopeArray{
		&aquasec.HostRuntimePolicyBypassScopeArgs{
			Enabled: pulumi.Bool(false),
			Scopes: aquasec.HostRuntimePolicyBypassScopeScopeArray{
				&aquasec.HostRuntimePolicyBypassScopeScopeArgs{
					Expression: pulumi.String("string"),
					Variables: aquasec.HostRuntimePolicyBypassScopeScopeVariableArray{
						&aquasec.HostRuntimePolicyBypassScopeScopeVariableArgs{
							Attribute: pulumi.String("string"),
							Value:     pulumi.String("string"),
						},
					},
				},
			},
		},
	},
	ContainerExec: &aquasec.HostRuntimePolicyContainerExecArgs{
		BlockContainerExec: pulumi.Bool(false),
		ContainerExecProcWhiteLists: pulumi.StringArray{
			pulumi.String("string"),
		},
		Enabled: pulumi.Bool(false),
		ReverseShellIpWhiteLists: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	Created:                pulumi.String("string"),
	Cve:                    pulumi.String("string"),
	DefaultSecurityProfile: pulumi.String("string"),
	Description:            pulumi.String("string"),
	Digest:                 pulumi.String("string"),
	DriftPreventions: aquasec.HostRuntimePolicyDriftPreventionArray{
		&aquasec.HostRuntimePolicyDriftPreventionArgs{
			Enabled:      pulumi.Bool(false),
			ExecLockdown: pulumi.Bool(false),
			ExecLockdownWhiteLists: pulumi.StringArray{
				pulumi.String("string"),
			},
			ImageLockdown: pulumi.Bool(false),
		},
	},
	EnableCryptoMiningDns:    pulumi.Bool(false),
	EnableForkGuard:          pulumi.Bool(false),
	EnableIpReputation:       pulumi.Bool(false),
	EnablePortScanProtection: pulumi.Bool(false),
	Enabled:                  pulumi.Bool(false),
	Enforce:                  pulumi.Bool(false),
	EnforceAfterDays:         pulumi.Int(0),
	EnforceSchedulerAddedOn:  pulumi.Int(0),
	ExcludeApplicationScopes: pulumi.StringArray{
		pulumi.String("string"),
	},
	ExecutableBlacklists: aquasec.HostRuntimePolicyExecutableBlacklistArray{
		&aquasec.HostRuntimePolicyExecutableBlacklistArgs{
			Enabled: pulumi.Bool(false),
			Executables: pulumi.StringArray{
				pulumi.String("string"),
			},
		},
	},
	FailedKubernetesChecks: &aquasec.HostRuntimePolicyFailedKubernetesChecksArgs{
		Enabled: pulumi.Bool(false),
		FailedChecks: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	FileBlock: &aquasec.HostRuntimePolicyFileBlockArgs{
		BlockFilesProcesses: pulumi.StringArray{
			pulumi.String("string"),
		},
		BlockFilesUsers: pulumi.StringArray{
			pulumi.String("string"),
		},
		Enabled: pulumi.Bool(false),
		ExceptionalBlockFiles: pulumi.StringArray{
			pulumi.String("string"),
		},
		ExceptionalBlockFilesProcesses: pulumi.StringArray{
			pulumi.String("string"),
		},
		ExceptionalBlockFilesUsers: pulumi.StringArray{
			pulumi.String("string"),
		},
		FilenameBlockLists: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	FileIntegrityMonitoring: &aquasec.HostRuntimePolicyFileIntegrityMonitoringArgs{
		Enabled: pulumi.Bool(false),
		ExceptionalMonitoredFiles: pulumi.StringArray{
			pulumi.String("string"),
		},
		ExceptionalMonitoredFilesProcesses: pulumi.StringArray{
			pulumi.String("string"),
		},
		ExceptionalMonitoredFilesUsers: pulumi.StringArray{
			pulumi.String("string"),
		},
		MonitoredFiles: pulumi.StringArray{
			pulumi.String("string"),
		},
		MonitoredFilesAttributes: pulumi.Bool(false),
		MonitoredFilesCreate:     pulumi.Bool(false),
		MonitoredFilesDelete:     pulumi.Bool(false),
		MonitoredFilesModify:     pulumi.Bool(false),
		MonitoredFilesProcesses: pulumi.StringArray{
			pulumi.String("string"),
		},
		MonitoredFilesRead: pulumi.Bool(false),
		MonitoredFilesUsers: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	ForkGuardProcessLimit: pulumi.Int(0),
	ImageName:             pulumi.String("string"),
	IsAuditChecked:        pulumi.Bool(false),
	IsAutoGenerated:       pulumi.Bool(false),
	IsOotbPolicy:          pulumi.Bool(false),
	Lastupdate:            pulumi.Int(0),
	LimitContainerPrivileges: aquasec.HostRuntimePolicyLimitContainerPrivilegeArray{
		&aquasec.HostRuntimePolicyLimitContainerPrivilegeArgs{
			BlockAddCapabilities:  pulumi.Bool(false),
			Enabled:               pulumi.Bool(false),
			Ipcmode:               pulumi.Bool(false),
			Netmode:               pulumi.Bool(false),
			Pidmode:               pulumi.Bool(false),
			PreventLowPortBinding: pulumi.Bool(false),
			PreventRootUser:       pulumi.Bool(false),
			Privileged:            pulumi.Bool(false),
			UseHostUser:           pulumi.Bool(false),
			Usermode:              pulumi.Bool(false),
			Utsmode:               pulumi.Bool(false),
		},
	},
	LinuxCapabilities: &aquasec.HostRuntimePolicyLinuxCapabilitiesArgs{
		Enabled: pulumi.Bool(false),
		RemoveLinuxCapabilities: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	MalwareScanOptions: &aquasec.HostRuntimePolicyMalwareScanOptionsArgs{
		Action:  pulumi.String("string"),
		Enabled: pulumi.Bool(false),
		ExcludeDirectories: pulumi.StringArray{
			pulumi.String("string"),
		},
		ExcludeProcesses: pulumi.StringArray{
			pulumi.String("string"),
		},
		IncludeDirectories: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	MonitorSystemLogIntegrity: pulumi.Bool(false),
	MonitorSystemTimeChanges:  pulumi.Bool(false),
	MonitorWindowsServices:    pulumi.Bool(false),
	Name:                      pulumi.String("string"),
	NoNewPrivileges:           pulumi.Bool(false),
	OnlyRegisteredImages:      pulumi.Bool(false),
	OsGroupsAlloweds: pulumi.StringArray{
		pulumi.String("string"),
	},
	OsGroupsBlockeds: pulumi.StringArray{
		pulumi.String("string"),
	},
	OsUsersAlloweds: pulumi.StringArray{
		pulumi.String("string"),
	},
	OsUsersBlockeds: pulumi.StringArray{
		pulumi.String("string"),
	},
	PackageBlocks: aquasec.HostRuntimePolicyPackageBlockArray{
		&aquasec.HostRuntimePolicyPackageBlockArgs{
			BlockPackagesProcesses: pulumi.StringArray{
				pulumi.String("string"),
			},
			BlockPackagesUsers: pulumi.StringArray{
				pulumi.String("string"),
			},
			Enabled: pulumi.Bool(false),
			ExceptionalBlockPackagesFiles: pulumi.StringArray{
				pulumi.String("string"),
			},
			ExceptionalBlockPackagesProcesses: pulumi.StringArray{
				pulumi.String("string"),
			},
			ExceptionalBlockPackagesUsers: pulumi.StringArray{
				pulumi.String("string"),
			},
			PackagesBlackLists: pulumi.StringArray{
				pulumi.String("string"),
			},
		},
	},
	Permission: pulumi.String("string"),
	PortBlock: &aquasec.HostRuntimePolicyPortBlockArgs{
		BlockInboundPorts: pulumi.StringArray{
			pulumi.String("string"),
		},
		BlockOutboundPorts: pulumi.StringArray{
			pulumi.String("string"),
		},
		Enabled: pulumi.Bool(false),
	},
	ReadonlyFiles: &aquasec.HostRuntimePolicyReadonlyFilesArgs{
		Enabled: pulumi.Bool(false),
		ExceptionalReadonlyFiles: pulumi.StringArray{
			pulumi.String("string"),
		},
		ExceptionalReadonlyFilesProcesses: pulumi.StringArray{
			pulumi.String("string"),
		},
		ExceptionalReadonlyFilesUsers: pulumi.StringArray{
			pulumi.String("string"),
		},
		ReadonlyFiles: pulumi.StringArray{
			pulumi.String("string"),
		},
		ReadonlyFilesProcesses: pulumi.StringArray{
			pulumi.String("string"),
		},
		ReadonlyFilesUsers: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	ReadonlyRegistry: &aquasec.HostRuntimePolicyReadonlyRegistryArgs{
		Enabled: pulumi.Bool(false),
		ExceptionalReadonlyRegistryPaths: pulumi.StringArray{
			pulumi.String("string"),
		},
		ExceptionalReadonlyRegistryProcesses: pulumi.StringArray{
			pulumi.String("string"),
		},
		ExceptionalReadonlyRegistryUsers: pulumi.StringArray{
			pulumi.String("string"),
		},
		ReadonlyRegistryPaths: pulumi.StringArray{
			pulumi.String("string"),
		},
		ReadonlyRegistryProcesses: pulumi.StringArray{
			pulumi.String("string"),
		},
		ReadonlyRegistryUsers: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	Registry: pulumi.String("string"),
	RegistryAccessMonitoring: &aquasec.HostRuntimePolicyRegistryAccessMonitoringArgs{
		Enabled: pulumi.Bool(false),
		ExceptionalMonitoredRegistryPaths: pulumi.StringArray{
			pulumi.String("string"),
		},
		ExceptionalMonitoredRegistryProcesses: pulumi.StringArray{
			pulumi.String("string"),
		},
		ExceptionalMonitoredRegistryUsers: pulumi.StringArray{
			pulumi.String("string"),
		},
		MonitoredRegistryAttributes: pulumi.Bool(false),
		MonitoredRegistryCreate:     pulumi.Bool(false),
		MonitoredRegistryDelete:     pulumi.Bool(false),
		MonitoredRegistryModify:     pulumi.Bool(false),
		MonitoredRegistryPaths: pulumi.StringArray{
			pulumi.String("string"),
		},
		MonitoredRegistryProcesses: pulumi.StringArray{
			pulumi.String("string"),
		},
		MonitoredRegistryRead: pulumi.Bool(false),
		MonitoredRegistryUsers: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	RepoName:     pulumi.String("string"),
	ResourceName: pulumi.String("string"),
	ResourceType: pulumi.String("string"),
	RestrictedVolumes: aquasec.HostRuntimePolicyRestrictedVolumeArray{
		&aquasec.HostRuntimePolicyRestrictedVolumeArgs{
			Enabled: pulumi.Bool(false),
			Volumes: pulumi.StringArray{
				pulumi.String("string"),
			},
		},
	},
	ReverseShell: &aquasec.HostRuntimePolicyReverseShellArgs{
		BlockReverseShell: pulumi.Bool(false),
		Enabled:           pulumi.Bool(false),
		ReverseShellIpWhiteLists: pulumi.StringArray{
			pulumi.String("string"),
		},
		ReverseShellProcWhiteLists: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
	RuntimeMode:     pulumi.Int(0),
	RuntimeType:     pulumi.String("string"),
	ScopeExpression: pulumi.String("string"),
	ScopeVariables: aquasec.HostRuntimePolicyScopeVariableArray{
		&aquasec.HostRuntimePolicyScopeVariableArgs{
			Attribute: pulumi.String("string"),
			Value:     pulumi.String("string"),
			Name:      pulumi.String("string"),
		},
	},
	Scopes: aquasec.HostRuntimePolicyScopeArray{
		&aquasec.HostRuntimePolicyScopeArgs{
			Expression: pulumi.String("string"),
			Variables: aquasec.HostRuntimePolicyScopeVariableArray{
				&aquasec.HostRuntimePolicyScopeVariableArgs{
					Attribute: pulumi.String("string"),
					Value:     pulumi.String("string"),
					Name:      pulumi.String("string"),
				},
			},
		},
	},
	SystemIntegrityProtection: &aquasec.HostRuntimePolicySystemIntegrityProtectionArgs{
		AuditSystemtimeChange:     pulumi.Bool(false),
		Enabled:                   pulumi.Bool(false),
		MonitorAuditLogIntegrity:  pulumi.Bool(false),
		WindowsServicesMonitoring: pulumi.Bool(false),
	},
	Tripwire: &aquasec.HostRuntimePolicyTripwireArgs{
		ApplyOns: pulumi.StringArray{
			pulumi.String("string"),
		},
		Enabled:       pulumi.Bool(false),
		ServerlessApp: pulumi.String("string"),
		UserId:        pulumi.String("string"),
		UserPassword:  pulumi.String("string"),
	},
	Type:          pulumi.String("string"),
	Updated:       pulumi.String("string"),
	Version:       pulumi.String("string"),
	VpatchVersion: pulumi.String("string"),
	WhitelistedOsUsers: &aquasec.HostRuntimePolicyWhitelistedOsUsersArgs{
		Enabled: pulumi.Bool(false),
		GroupWhiteLists: pulumi.StringArray{
			pulumi.String("string"),
		},
		UserWhiteLists: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
})
var hostRuntimePolicyResource = new HostRuntimePolicy("hostRuntimePolicyResource", HostRuntimePolicyArgs.builder()
    .allowedExecutables(HostRuntimePolicyAllowedExecutableArgs.builder()
        .allowExecutables("string")
        .allowRootExecutables("string")
        .enabled(false)
        .separateExecutables(false)
        .build())
    .allowedRegistries(HostRuntimePolicyAllowedRegistryArgs.builder()
        .allowedRegistries("string")
        .enabled(false)
        .build())
    .applicationScopes("string")
    .auditBruteForceLogin(false)
    .auditFullCommandArguments(false)
    .auditHostFailedLoginEvents(false)
    .auditHostSuccessfulLoginEvents(false)
    .auditUserAccountManagement(false)
    .auditing(HostRuntimePolicyAuditingArgs.builder()
        .auditAllNetwork(false)
        .auditAllProcesses(false)
        .auditFailedLogin(false)
        .auditOsUserActivity(false)
        .auditProcessCmdline(false)
        .auditSuccessLogin(false)
        .auditUserAccountManagement(false)
        .enabled(false)
        .build())
    .author("string")
    .blacklistedOsUsers(HostRuntimePolicyBlacklistedOsUsersArgs.builder()
        .enabled(false)
        .groupBlackLists("string")
        .userBlackLists("string")
        .build())
    .blockContainerExec(false)
    .blockCryptocurrencyMining(false)
    .blockDisallowedImages(false)
    .blockFilelessExec(false)
    .blockNonCompliantWorkloads(false)
    .blockNonK8sContainers(false)
    .blockedFiles("string")
    .bypassScopes(HostRuntimePolicyBypassScopeArgs.builder()
        .enabled(false)
        .scopes(HostRuntimePolicyBypassScopeScopeArgs.builder()
            .expression("string")
            .variables(HostRuntimePolicyBypassScopeScopeVariableArgs.builder()
                .attribute("string")
                .value("string")
                .build())
            .build())
        .build())
    .containerExec(HostRuntimePolicyContainerExecArgs.builder()
        .blockContainerExec(false)
        .containerExecProcWhiteLists("string")
        .enabled(false)
        .reverseShellIpWhiteLists("string")
        .build())
    .created("string")
    .cve("string")
    .defaultSecurityProfile("string")
    .description("string")
    .digest("string")
    .driftPreventions(HostRuntimePolicyDriftPreventionArgs.builder()
        .enabled(false)
        .execLockdown(false)
        .execLockdownWhiteLists("string")
        .imageLockdown(false)
        .build())
    .enableCryptoMiningDns(false)
    .enableForkGuard(false)
    .enableIpReputation(false)
    .enablePortScanProtection(false)
    .enabled(false)
    .enforce(false)
    .enforceAfterDays(0)
    .enforceSchedulerAddedOn(0)
    .excludeApplicationScopes("string")
    .executableBlacklists(HostRuntimePolicyExecutableBlacklistArgs.builder()
        .enabled(false)
        .executables("string")
        .build())
    .failedKubernetesChecks(HostRuntimePolicyFailedKubernetesChecksArgs.builder()
        .enabled(false)
        .failedChecks("string")
        .build())
    .fileBlock(HostRuntimePolicyFileBlockArgs.builder()
        .blockFilesProcesses("string")
        .blockFilesUsers("string")
        .enabled(false)
        .exceptionalBlockFiles("string")
        .exceptionalBlockFilesProcesses("string")
        .exceptionalBlockFilesUsers("string")
        .filenameBlockLists("string")
        .build())
    .fileIntegrityMonitoring(HostRuntimePolicyFileIntegrityMonitoringArgs.builder()
        .enabled(false)
        .exceptionalMonitoredFiles("string")
        .exceptionalMonitoredFilesProcesses("string")
        .exceptionalMonitoredFilesUsers("string")
        .monitoredFiles("string")
        .monitoredFilesAttributes(false)
        .monitoredFilesCreate(false)
        .monitoredFilesDelete(false)
        .monitoredFilesModify(false)
        .monitoredFilesProcesses("string")
        .monitoredFilesRead(false)
        .monitoredFilesUsers("string")
        .build())
    .forkGuardProcessLimit(0)
    .imageName("string")
    .isAuditChecked(false)
    .isAutoGenerated(false)
    .isOotbPolicy(false)
    .lastupdate(0)
    .limitContainerPrivileges(HostRuntimePolicyLimitContainerPrivilegeArgs.builder()
        .blockAddCapabilities(false)
        .enabled(false)
        .ipcmode(false)
        .netmode(false)
        .pidmode(false)
        .preventLowPortBinding(false)
        .preventRootUser(false)
        .privileged(false)
        .useHostUser(false)
        .usermode(false)
        .utsmode(false)
        .build())
    .linuxCapabilities(HostRuntimePolicyLinuxCapabilitiesArgs.builder()
        .enabled(false)
        .removeLinuxCapabilities("string")
        .build())
    .malwareScanOptions(HostRuntimePolicyMalwareScanOptionsArgs.builder()
        .action("string")
        .enabled(false)
        .excludeDirectories("string")
        .excludeProcesses("string")
        .includeDirectories("string")
        .build())
    .monitorSystemLogIntegrity(false)
    .monitorSystemTimeChanges(false)
    .monitorWindowsServices(false)
    .name("string")
    .noNewPrivileges(false)
    .onlyRegisteredImages(false)
    .osGroupsAlloweds("string")
    .osGroupsBlockeds("string")
    .osUsersAlloweds("string")
    .osUsersBlockeds("string")
    .packageBlocks(HostRuntimePolicyPackageBlockArgs.builder()
        .blockPackagesProcesses("string")
        .blockPackagesUsers("string")
        .enabled(false)
        .exceptionalBlockPackagesFiles("string")
        .exceptionalBlockPackagesProcesses("string")
        .exceptionalBlockPackagesUsers("string")
        .packagesBlackLists("string")
        .build())
    .permission("string")
    .portBlock(HostRuntimePolicyPortBlockArgs.builder()
        .blockInboundPorts("string")
        .blockOutboundPorts("string")
        .enabled(false)
        .build())
    .readonlyFiles(HostRuntimePolicyReadonlyFilesArgs.builder()
        .enabled(false)
        .exceptionalReadonlyFiles("string")
        .exceptionalReadonlyFilesProcesses("string")
        .exceptionalReadonlyFilesUsers("string")
        .readonlyFiles("string")
        .readonlyFilesProcesses("string")
        .readonlyFilesUsers("string")
        .build())
    .readonlyRegistry(HostRuntimePolicyReadonlyRegistryArgs.builder()
        .enabled(false)
        .exceptionalReadonlyRegistryPaths("string")
        .exceptionalReadonlyRegistryProcesses("string")
        .exceptionalReadonlyRegistryUsers("string")
        .readonlyRegistryPaths("string")
        .readonlyRegistryProcesses("string")
        .readonlyRegistryUsers("string")
        .build())
    .registry("string")
    .registryAccessMonitoring(HostRuntimePolicyRegistryAccessMonitoringArgs.builder()
        .enabled(false)
        .exceptionalMonitoredRegistryPaths("string")
        .exceptionalMonitoredRegistryProcesses("string")
        .exceptionalMonitoredRegistryUsers("string")
        .monitoredRegistryAttributes(false)
        .monitoredRegistryCreate(false)
        .monitoredRegistryDelete(false)
        .monitoredRegistryModify(false)
        .monitoredRegistryPaths("string")
        .monitoredRegistryProcesses("string")
        .monitoredRegistryRead(false)
        .monitoredRegistryUsers("string")
        .build())
    .repoName("string")
    .resourceName("string")
    .resourceType("string")
    .restrictedVolumes(HostRuntimePolicyRestrictedVolumeArgs.builder()
        .enabled(false)
        .volumes("string")
        .build())
    .reverseShell(HostRuntimePolicyReverseShellArgs.builder()
        .blockReverseShell(false)
        .enabled(false)
        .reverseShellIpWhiteLists("string")
        .reverseShellProcWhiteLists("string")
        .build())
    .runtimeMode(0)
    .runtimeType("string")
    .scopeExpression("string")
    .scopeVariables(HostRuntimePolicyScopeVariableArgs.builder()
        .attribute("string")
        .value("string")
        .name("string")
        .build())
    .scopes(HostRuntimePolicyScopeArgs.builder()
        .expression("string")
        .variables(HostRuntimePolicyScopeVariableArgs.builder()
            .attribute("string")
            .value("string")
            .name("string")
            .build())
        .build())
    .systemIntegrityProtection(HostRuntimePolicySystemIntegrityProtectionArgs.builder()
        .auditSystemtimeChange(false)
        .enabled(false)
        .monitorAuditLogIntegrity(false)
        .windowsServicesMonitoring(false)
        .build())
    .tripwire(HostRuntimePolicyTripwireArgs.builder()
        .applyOns("string")
        .enabled(false)
        .serverlessApp("string")
        .userId("string")
        .userPassword("string")
        .build())
    .type("string")
    .updated("string")
    .version("string")
    .vpatchVersion("string")
    .whitelistedOsUsers(HostRuntimePolicyWhitelistedOsUsersArgs.builder()
        .enabled(false)
        .groupWhiteLists("string")
        .userWhiteLists("string")
        .build())
    .build());
host_runtime_policy_resource = aquasec.HostRuntimePolicy("hostRuntimePolicyResource",
    allowed_executables=[{
        "allow_executables": ["string"],
        "allow_root_executables": ["string"],
        "enabled": False,
        "separate_executables": False,
    }],
    allowed_registries=[{
        "allowed_registries": ["string"],
        "enabled": False,
    }],
    application_scopes=["string"],
    audit_brute_force_login=False,
    audit_full_command_arguments=False,
    audit_host_failed_login_events=False,
    audit_host_successful_login_events=False,
    audit_user_account_management=False,
    auditing={
        "audit_all_network": False,
        "audit_all_processes": False,
        "audit_failed_login": False,
        "audit_os_user_activity": False,
        "audit_process_cmdline": False,
        "audit_success_login": False,
        "audit_user_account_management": False,
        "enabled": False,
    },
    author="string",
    blacklisted_os_users={
        "enabled": False,
        "group_black_lists": ["string"],
        "user_black_lists": ["string"],
    },
    block_container_exec=False,
    block_cryptocurrency_mining=False,
    block_disallowed_images=False,
    block_fileless_exec=False,
    block_non_compliant_workloads=False,
    block_non_k8s_containers=False,
    blocked_files=["string"],
    bypass_scopes=[{
        "enabled": False,
        "scopes": [{
            "expression": "string",
            "variables": [{
                "attribute": "string",
                "value": "string",
            }],
        }],
    }],
    container_exec={
        "block_container_exec": False,
        "container_exec_proc_white_lists": ["string"],
        "enabled": False,
        "reverse_shell_ip_white_lists": ["string"],
    },
    created="string",
    cve="string",
    default_security_profile="string",
    description="string",
    digest="string",
    drift_preventions=[{
        "enabled": False,
        "exec_lockdown": False,
        "exec_lockdown_white_lists": ["string"],
        "image_lockdown": False,
    }],
    enable_crypto_mining_dns=False,
    enable_fork_guard=False,
    enable_ip_reputation=False,
    enable_port_scan_protection=False,
    enabled=False,
    enforce=False,
    enforce_after_days=0,
    enforce_scheduler_added_on=0,
    exclude_application_scopes=["string"],
    executable_blacklists=[{
        "enabled": False,
        "executables": ["string"],
    }],
    failed_kubernetes_checks={
        "enabled": False,
        "failed_checks": ["string"],
    },
    file_block={
        "block_files_processes": ["string"],
        "block_files_users": ["string"],
        "enabled": False,
        "exceptional_block_files": ["string"],
        "exceptional_block_files_processes": ["string"],
        "exceptional_block_files_users": ["string"],
        "filename_block_lists": ["string"],
    },
    file_integrity_monitoring={
        "enabled": False,
        "exceptional_monitored_files": ["string"],
        "exceptional_monitored_files_processes": ["string"],
        "exceptional_monitored_files_users": ["string"],
        "monitored_files": ["string"],
        "monitored_files_attributes": False,
        "monitored_files_create": False,
        "monitored_files_delete": False,
        "monitored_files_modify": False,
        "monitored_files_processes": ["string"],
        "monitored_files_read": False,
        "monitored_files_users": ["string"],
    },
    fork_guard_process_limit=0,
    image_name="string",
    is_audit_checked=False,
    is_auto_generated=False,
    is_ootb_policy=False,
    lastupdate=0,
    limit_container_privileges=[{
        "block_add_capabilities": False,
        "enabled": False,
        "ipcmode": False,
        "netmode": False,
        "pidmode": False,
        "prevent_low_port_binding": False,
        "prevent_root_user": False,
        "privileged": False,
        "use_host_user": False,
        "usermode": False,
        "utsmode": False,
    }],
    linux_capabilities={
        "enabled": False,
        "remove_linux_capabilities": ["string"],
    },
    malware_scan_options={
        "action": "string",
        "enabled": False,
        "exclude_directories": ["string"],
        "exclude_processes": ["string"],
        "include_directories": ["string"],
    },
    monitor_system_log_integrity=False,
    monitor_system_time_changes=False,
    monitor_windows_services=False,
    name="string",
    no_new_privileges=False,
    only_registered_images=False,
    os_groups_alloweds=["string"],
    os_groups_blockeds=["string"],
    os_users_alloweds=["string"],
    os_users_blockeds=["string"],
    package_blocks=[{
        "block_packages_processes": ["string"],
        "block_packages_users": ["string"],
        "enabled": False,
        "exceptional_block_packages_files": ["string"],
        "exceptional_block_packages_processes": ["string"],
        "exceptional_block_packages_users": ["string"],
        "packages_black_lists": ["string"],
    }],
    permission="string",
    port_block={
        "block_inbound_ports": ["string"],
        "block_outbound_ports": ["string"],
        "enabled": False,
    },
    readonly_files={
        "enabled": False,
        "exceptional_readonly_files": ["string"],
        "exceptional_readonly_files_processes": ["string"],
        "exceptional_readonly_files_users": ["string"],
        "readonly_files": ["string"],
        "readonly_files_processes": ["string"],
        "readonly_files_users": ["string"],
    },
    readonly_registry={
        "enabled": False,
        "exceptional_readonly_registry_paths": ["string"],
        "exceptional_readonly_registry_processes": ["string"],
        "exceptional_readonly_registry_users": ["string"],
        "readonly_registry_paths": ["string"],
        "readonly_registry_processes": ["string"],
        "readonly_registry_users": ["string"],
    },
    registry="string",
    registry_access_monitoring={
        "enabled": False,
        "exceptional_monitored_registry_paths": ["string"],
        "exceptional_monitored_registry_processes": ["string"],
        "exceptional_monitored_registry_users": ["string"],
        "monitored_registry_attributes": False,
        "monitored_registry_create": False,
        "monitored_registry_delete": False,
        "monitored_registry_modify": False,
        "monitored_registry_paths": ["string"],
        "monitored_registry_processes": ["string"],
        "monitored_registry_read": False,
        "monitored_registry_users": ["string"],
    },
    repo_name="string",
    resource_name_="string",
    resource_type="string",
    restricted_volumes=[{
        "enabled": False,
        "volumes": ["string"],
    }],
    reverse_shell={
        "block_reverse_shell": False,
        "enabled": False,
        "reverse_shell_ip_white_lists": ["string"],
        "reverse_shell_proc_white_lists": ["string"],
    },
    runtime_mode=0,
    runtime_type="string",
    scope_expression="string",
    scope_variables=[{
        "attribute": "string",
        "value": "string",
        "name": "string",
    }],
    scopes=[{
        "expression": "string",
        "variables": [{
            "attribute": "string",
            "value": "string",
            "name": "string",
        }],
    }],
    system_integrity_protection={
        "audit_systemtime_change": False,
        "enabled": False,
        "monitor_audit_log_integrity": False,
        "windows_services_monitoring": False,
    },
    tripwire={
        "apply_ons": ["string"],
        "enabled": False,
        "serverless_app": "string",
        "user_id": "string",
        "user_password": "string",
    },
    type="string",
    updated="string",
    version="string",
    vpatch_version="string",
    whitelisted_os_users={
        "enabled": False,
        "group_white_lists": ["string"],
        "user_white_lists": ["string"],
    })
const hostRuntimePolicyResource = new aquasec.HostRuntimePolicy("hostRuntimePolicyResource", {
    allowedExecutables: [{
        allowExecutables: ["string"],
        allowRootExecutables: ["string"],
        enabled: false,
        separateExecutables: false,
    }],
    allowedRegistries: [{
        allowedRegistries: ["string"],
        enabled: false,
    }],
    applicationScopes: ["string"],
    auditBruteForceLogin: false,
    auditFullCommandArguments: false,
    auditHostFailedLoginEvents: false,
    auditHostSuccessfulLoginEvents: false,
    auditUserAccountManagement: false,
    auditing: {
        auditAllNetwork: false,
        auditAllProcesses: false,
        auditFailedLogin: false,
        auditOsUserActivity: false,
        auditProcessCmdline: false,
        auditSuccessLogin: false,
        auditUserAccountManagement: false,
        enabled: false,
    },
    author: "string",
    blacklistedOsUsers: {
        enabled: false,
        groupBlackLists: ["string"],
        userBlackLists: ["string"],
    },
    blockContainerExec: false,
    blockCryptocurrencyMining: false,
    blockDisallowedImages: false,
    blockFilelessExec: false,
    blockNonCompliantWorkloads: false,
    blockNonK8sContainers: false,
    blockedFiles: ["string"],
    bypassScopes: [{
        enabled: false,
        scopes: [{
            expression: "string",
            variables: [{
                attribute: "string",
                value: "string",
            }],
        }],
    }],
    containerExec: {
        blockContainerExec: false,
        containerExecProcWhiteLists: ["string"],
        enabled: false,
        reverseShellIpWhiteLists: ["string"],
    },
    created: "string",
    cve: "string",
    defaultSecurityProfile: "string",
    description: "string",
    digest: "string",
    driftPreventions: [{
        enabled: false,
        execLockdown: false,
        execLockdownWhiteLists: ["string"],
        imageLockdown: false,
    }],
    enableCryptoMiningDns: false,
    enableForkGuard: false,
    enableIpReputation: false,
    enablePortScanProtection: false,
    enabled: false,
    enforce: false,
    enforceAfterDays: 0,
    enforceSchedulerAddedOn: 0,
    excludeApplicationScopes: ["string"],
    executableBlacklists: [{
        enabled: false,
        executables: ["string"],
    }],
    failedKubernetesChecks: {
        enabled: false,
        failedChecks: ["string"],
    },
    fileBlock: {
        blockFilesProcesses: ["string"],
        blockFilesUsers: ["string"],
        enabled: false,
        exceptionalBlockFiles: ["string"],
        exceptionalBlockFilesProcesses: ["string"],
        exceptionalBlockFilesUsers: ["string"],
        filenameBlockLists: ["string"],
    },
    fileIntegrityMonitoring: {
        enabled: false,
        exceptionalMonitoredFiles: ["string"],
        exceptionalMonitoredFilesProcesses: ["string"],
        exceptionalMonitoredFilesUsers: ["string"],
        monitoredFiles: ["string"],
        monitoredFilesAttributes: false,
        monitoredFilesCreate: false,
        monitoredFilesDelete: false,
        monitoredFilesModify: false,
        monitoredFilesProcesses: ["string"],
        monitoredFilesRead: false,
        monitoredFilesUsers: ["string"],
    },
    forkGuardProcessLimit: 0,
    imageName: "string",
    isAuditChecked: false,
    isAutoGenerated: false,
    isOotbPolicy: false,
    lastupdate: 0,
    limitContainerPrivileges: [{
        blockAddCapabilities: false,
        enabled: false,
        ipcmode: false,
        netmode: false,
        pidmode: false,
        preventLowPortBinding: false,
        preventRootUser: false,
        privileged: false,
        useHostUser: false,
        usermode: false,
        utsmode: false,
    }],
    linuxCapabilities: {
        enabled: false,
        removeLinuxCapabilities: ["string"],
    },
    malwareScanOptions: {
        action: "string",
        enabled: false,
        excludeDirectories: ["string"],
        excludeProcesses: ["string"],
        includeDirectories: ["string"],
    },
    monitorSystemLogIntegrity: false,
    monitorSystemTimeChanges: false,
    monitorWindowsServices: false,
    name: "string",
    noNewPrivileges: false,
    onlyRegisteredImages: false,
    osGroupsAlloweds: ["string"],
    osGroupsBlockeds: ["string"],
    osUsersAlloweds: ["string"],
    osUsersBlockeds: ["string"],
    packageBlocks: [{
        blockPackagesProcesses: ["string"],
        blockPackagesUsers: ["string"],
        enabled: false,
        exceptionalBlockPackagesFiles: ["string"],
        exceptionalBlockPackagesProcesses: ["string"],
        exceptionalBlockPackagesUsers: ["string"],
        packagesBlackLists: ["string"],
    }],
    permission: "string",
    portBlock: {
        blockInboundPorts: ["string"],
        blockOutboundPorts: ["string"],
        enabled: false,
    },
    readonlyFiles: {
        enabled: false,
        exceptionalReadonlyFiles: ["string"],
        exceptionalReadonlyFilesProcesses: ["string"],
        exceptionalReadonlyFilesUsers: ["string"],
        readonlyFiles: ["string"],
        readonlyFilesProcesses: ["string"],
        readonlyFilesUsers: ["string"],
    },
    readonlyRegistry: {
        enabled: false,
        exceptionalReadonlyRegistryPaths: ["string"],
        exceptionalReadonlyRegistryProcesses: ["string"],
        exceptionalReadonlyRegistryUsers: ["string"],
        readonlyRegistryPaths: ["string"],
        readonlyRegistryProcesses: ["string"],
        readonlyRegistryUsers: ["string"],
    },
    registry: "string",
    registryAccessMonitoring: {
        enabled: false,
        exceptionalMonitoredRegistryPaths: ["string"],
        exceptionalMonitoredRegistryProcesses: ["string"],
        exceptionalMonitoredRegistryUsers: ["string"],
        monitoredRegistryAttributes: false,
        monitoredRegistryCreate: false,
        monitoredRegistryDelete: false,
        monitoredRegistryModify: false,
        monitoredRegistryPaths: ["string"],
        monitoredRegistryProcesses: ["string"],
        monitoredRegistryRead: false,
        monitoredRegistryUsers: ["string"],
    },
    repoName: "string",
    resourceName: "string",
    resourceType: "string",
    restrictedVolumes: [{
        enabled: false,
        volumes: ["string"],
    }],
    reverseShell: {
        blockReverseShell: false,
        enabled: false,
        reverseShellIpWhiteLists: ["string"],
        reverseShellProcWhiteLists: ["string"],
    },
    runtimeMode: 0,
    runtimeType: "string",
    scopeExpression: "string",
    scopeVariables: [{
        attribute: "string",
        value: "string",
        name: "string",
    }],
    scopes: [{
        expression: "string",
        variables: [{
            attribute: "string",
            value: "string",
            name: "string",
        }],
    }],
    systemIntegrityProtection: {
        auditSystemtimeChange: false,
        enabled: false,
        monitorAuditLogIntegrity: false,
        windowsServicesMonitoring: false,
    },
    tripwire: {
        applyOns: ["string"],
        enabled: false,
        serverlessApp: "string",
        userId: "string",
        userPassword: "string",
    },
    type: "string",
    updated: "string",
    version: "string",
    vpatchVersion: "string",
    whitelistedOsUsers: {
        enabled: false,
        groupWhiteLists: ["string"],
        userWhiteLists: ["string"],
    },
});
type: aquasec:HostRuntimePolicy
properties:
    allowedExecutables:
        - allowExecutables:
            - string
          allowRootExecutables:
            - string
          enabled: false
          separateExecutables: false
    allowedRegistries:
        - allowedRegistries:
            - string
          enabled: false
    applicationScopes:
        - string
    auditBruteForceLogin: false
    auditFullCommandArguments: false
    auditHostFailedLoginEvents: false
    auditHostSuccessfulLoginEvents: false
    auditUserAccountManagement: false
    auditing:
        auditAllNetwork: false
        auditAllProcesses: false
        auditFailedLogin: false
        auditOsUserActivity: false
        auditProcessCmdline: false
        auditSuccessLogin: false
        auditUserAccountManagement: false
        enabled: false
    author: string
    blacklistedOsUsers:
        enabled: false
        groupBlackLists:
            - string
        userBlackLists:
            - string
    blockContainerExec: false
    blockCryptocurrencyMining: false
    blockDisallowedImages: false
    blockFilelessExec: false
    blockNonCompliantWorkloads: false
    blockNonK8sContainers: false
    blockedFiles:
        - string
    bypassScopes:
        - enabled: false
          scopes:
            - expression: string
              variables:
                - attribute: string
                  value: string
    containerExec:
        blockContainerExec: false
        containerExecProcWhiteLists:
            - string
        enabled: false
        reverseShellIpWhiteLists:
            - string
    created: string
    cve: string
    defaultSecurityProfile: string
    description: string
    digest: string
    driftPreventions:
        - enabled: false
          execLockdown: false
          execLockdownWhiteLists:
            - string
          imageLockdown: false
    enableCryptoMiningDns: false
    enableForkGuard: false
    enableIpReputation: false
    enablePortScanProtection: false
    enabled: false
    enforce: false
    enforceAfterDays: 0
    enforceSchedulerAddedOn: 0
    excludeApplicationScopes:
        - string
    executableBlacklists:
        - enabled: false
          executables:
            - string
    failedKubernetesChecks:
        enabled: false
        failedChecks:
            - string
    fileBlock:
        blockFilesProcesses:
            - string
        blockFilesUsers:
            - string
        enabled: false
        exceptionalBlockFiles:
            - string
        exceptionalBlockFilesProcesses:
            - string
        exceptionalBlockFilesUsers:
            - string
        filenameBlockLists:
            - string
    fileIntegrityMonitoring:
        enabled: false
        exceptionalMonitoredFiles:
            - string
        exceptionalMonitoredFilesProcesses:
            - string
        exceptionalMonitoredFilesUsers:
            - string
        monitoredFiles:
            - string
        monitoredFilesAttributes: false
        monitoredFilesCreate: false
        monitoredFilesDelete: false
        monitoredFilesModify: false
        monitoredFilesProcesses:
            - string
        monitoredFilesRead: false
        monitoredFilesUsers:
            - string
    forkGuardProcessLimit: 0
    imageName: string
    isAuditChecked: false
    isAutoGenerated: false
    isOotbPolicy: false
    lastupdate: 0
    limitContainerPrivileges:
        - blockAddCapabilities: false
          enabled: false
          ipcmode: false
          netmode: false
          pidmode: false
          preventLowPortBinding: false
          preventRootUser: false
          privileged: false
          useHostUser: false
          usermode: false
          utsmode: false
    linuxCapabilities:
        enabled: false
        removeLinuxCapabilities:
            - string
    malwareScanOptions:
        action: string
        enabled: false
        excludeDirectories:
            - string
        excludeProcesses:
            - string
        includeDirectories:
            - string
    monitorSystemLogIntegrity: false
    monitorSystemTimeChanges: false
    monitorWindowsServices: false
    name: string
    noNewPrivileges: false
    onlyRegisteredImages: false
    osGroupsAlloweds:
        - string
    osGroupsBlockeds:
        - string
    osUsersAlloweds:
        - string
    osUsersBlockeds:
        - string
    packageBlocks:
        - blockPackagesProcesses:
            - string
          blockPackagesUsers:
            - string
          enabled: false
          exceptionalBlockPackagesFiles:
            - string
          exceptionalBlockPackagesProcesses:
            - string
          exceptionalBlockPackagesUsers:
            - string
          packagesBlackLists:
            - string
    permission: string
    portBlock:
        blockInboundPorts:
            - string
        blockOutboundPorts:
            - string
        enabled: false
    readonlyFiles:
        enabled: false
        exceptionalReadonlyFiles:
            - string
        exceptionalReadonlyFilesProcesses:
            - string
        exceptionalReadonlyFilesUsers:
            - string
        readonlyFiles:
            - string
        readonlyFilesProcesses:
            - string
        readonlyFilesUsers:
            - string
    readonlyRegistry:
        enabled: false
        exceptionalReadonlyRegistryPaths:
            - string
        exceptionalReadonlyRegistryProcesses:
            - string
        exceptionalReadonlyRegistryUsers:
            - string
        readonlyRegistryPaths:
            - string
        readonlyRegistryProcesses:
            - string
        readonlyRegistryUsers:
            - string
    registry: string
    registryAccessMonitoring:
        enabled: false
        exceptionalMonitoredRegistryPaths:
            - string
        exceptionalMonitoredRegistryProcesses:
            - string
        exceptionalMonitoredRegistryUsers:
            - string
        monitoredRegistryAttributes: false
        monitoredRegistryCreate: false
        monitoredRegistryDelete: false
        monitoredRegistryModify: false
        monitoredRegistryPaths:
            - string
        monitoredRegistryProcesses:
            - string
        monitoredRegistryRead: false
        monitoredRegistryUsers:
            - string
    repoName: string
    resourceName: string
    resourceType: string
    restrictedVolumes:
        - enabled: false
          volumes:
            - string
    reverseShell:
        blockReverseShell: false
        enabled: false
        reverseShellIpWhiteLists:
            - string
        reverseShellProcWhiteLists:
            - string
    runtimeMode: 0
    runtimeType: string
    scopeExpression: string
    scopeVariables:
        - attribute: string
          name: string
          value: string
    scopes:
        - expression: string
          variables:
            - attribute: string
              name: string
              value: string
    systemIntegrityProtection:
        auditSystemtimeChange: false
        enabled: false
        monitorAuditLogIntegrity: false
        windowsServicesMonitoring: false
    tripwire:
        applyOns:
            - string
        enabled: false
        serverlessApp: string
        userId: string
        userPassword: string
    type: string
    updated: string
    version: string
    vpatchVersion: string
    whitelistedOsUsers:
        enabled: false
        groupWhiteLists:
            - string
        userWhiteLists:
            - string
HostRuntimePolicy Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The HostRuntimePolicy resource accepts the following input properties:
- AllowedExecutables List<Pulumiverse.Aquasec. Inputs. Host Runtime Policy Allowed Executable> 
- Allowed executables configuration.
- AllowedRegistries List<Pulumiverse.Aquasec. Inputs. Host Runtime Policy Allowed Registry> 
- Allowed registries configuration.
- ApplicationScopes List<string>
- Indicates the application scope of the service.
- AuditBrute boolForce Login 
- Detects brute force login attempts
- AuditFull boolCommand Arguments 
- If true, full command arguments will be audited.
- AuditHost boolFailed Login Events 
- If true, host failed logins will be audited.
- AuditHost boolSuccessful Login Events 
- If true, host successful logins will be audited.
- AuditUser boolAccount Management 
- If true, account management will be audited.
- Auditing
Pulumiverse.Aquasec. Inputs. Host Runtime Policy Auditing 
- string
- Username of the account that created the service.
- BlacklistedOs Pulumiverse.Users Aquasec. Inputs. Host Runtime Policy Blacklisted Os Users 
- BlockContainer boolExec 
- BlockCryptocurrency boolMining 
- Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- BlockDisallowed boolImages 
- BlockFileless boolExec 
- BlockNon boolCompliant Workloads 
- BlockNon boolK8s Containers 
- BlockedFiles List<string>
- List of files that are prevented from being read, modified and executed in the containers.
- BypassScopes List<Pulumiverse.Aquasec. Inputs. Host Runtime Policy Bypass Scope> 
- Bypass scope configuration.
- ContainerExec Pulumiverse.Aquasec. Inputs. Host Runtime Policy Container Exec 
- Created string
- Cve string
- DefaultSecurity stringProfile 
- Description string
- The description of the host runtime policy
- Digest string
- DriftPreventions List<Pulumiverse.Aquasec. Inputs. Host Runtime Policy Drift Prevention> 
- Drift prevention configuration.
- EnableCrypto boolMining Dns 
- EnableFork boolGuard 
- EnableIp boolReputation 
- EnablePort boolScan Protection 
- Enabled bool
- Indicates if the runtime policy is enabled or not.
- Enforce bool
- Indicates that policy should effect container execution (not just for audit).
- EnforceAfter intDays 
- Indicates the number of days after which the runtime policy will be changed to enforce mode.
- EnforceScheduler intAdded On 
- ExcludeApplication List<string>Scopes 
- List of excluded application scopes.
- ExecutableBlacklists List<Pulumiverse.Aquasec. Inputs. Host Runtime Policy Executable Blacklist> 
- Executable blacklist configuration.
- FailedKubernetes Pulumiverse.Checks Aquasec. Inputs. Host Runtime Policy Failed Kubernetes Checks 
- FileBlock Pulumiverse.Aquasec. Inputs. Host Runtime Policy File Block 
- FileIntegrity Pulumiverse.Monitoring Aquasec. Inputs. Host Runtime Policy File Integrity Monitoring 
- Configuration for file integrity monitoring.
- ForkGuard intProcess Limit 
- ImageName string
- IsAudit boolChecked 
- IsAuto boolGenerated 
- IsOotb boolPolicy 
- Lastupdate int
- LimitContainer List<Pulumiverse.Privileges Aquasec. Inputs. Host Runtime Policy Limit Container Privilege> 
- Container privileges configuration.
- LinuxCapabilities Pulumiverse.Aquasec. Inputs. Host Runtime Policy Linux Capabilities 
- MalwareScan Pulumiverse.Options Aquasec. Inputs. Host Runtime Policy Malware Scan Options 
- Configuration for Real-Time Malware Protection.
- MonitorSystem boolLog Integrity 
- If true, system log will be monitored.
- MonitorSystem boolTime Changes 
- If true, system time changes will be monitored.
- MonitorWindows boolServices 
- If true, windows service operations will be monitored.
- Name string
- Name of the host runtime policy
- NoNew boolPrivileges 
- OnlyRegistered boolImages 
- OsGroups List<string>Alloweds 
- List of OS (Linux or Windows) groups that are allowed to authenticate to the host, and block authentication requests from all others. Groups can be either Linux groups or Windows AD groups.
- OsGroups List<string>Blockeds 
- List of OS (Linux or Windows) groups that are not allowed to authenticate to the host, and block authentication requests from all others. Groups can be either Linux groups or Windows AD groups.
- OsUsers List<string>Alloweds 
- List of OS (Linux or Windows) users that are allowed to authenticate to the host, and block authentication requests from all others.
- OsUsers List<string>Blockeds 
- List of OS (Linux or Windows) users that are not allowed to authenticate to the host, and block authentication requests from all others.
- PackageBlocks List<Pulumiverse.Aquasec. Inputs. Host Runtime Policy Package Block> 
- Permission string
- PortBlock Pulumiverse.Aquasec. Inputs. Host Runtime Policy Port Block 
- ReadonlyFiles Pulumiverse.Aquasec. Inputs. Host Runtime Policy Readonly Files 
- ReadonlyRegistry Pulumiverse.Aquasec. Inputs. Host Runtime Policy Readonly Registry 
- Registry string
- RegistryAccess Pulumiverse.Monitoring Aquasec. Inputs. Host Runtime Policy Registry Access Monitoring 
- RepoName string
- ResourceName string
- ResourceType string
- RestrictedVolumes List<Pulumiverse.Aquasec. Inputs. Host Runtime Policy Restricted Volume> 
- Restricted volumes configuration.
- ReverseShell Pulumiverse.Aquasec. Inputs. Host Runtime Policy Reverse Shell 
- RuntimeMode int
- RuntimeType string
- ScopeExpression string
- Logical expression of how to compute the dependency of the scope variables.
- ScopeVariables List<Pulumiverse.Aquasec. Inputs. Host Runtime Policy Scope Variable> 
- List of scope attributes.
- Scopes
List<Pulumiverse.Aquasec. Inputs. Host Runtime Policy Scope> 
- Scope configuration.
- SystemIntegrity Pulumiverse.Protection Aquasec. Inputs. Host Runtime Policy System Integrity Protection 
- Tripwire
Pulumiverse.Aquasec. Inputs. Host Runtime Policy Tripwire 
- Type string
- Updated string
- Version string
- VpatchVersion string
- WhitelistedOs Pulumiverse.Users Aquasec. Inputs. Host Runtime Policy Whitelisted Os Users 
- AllowedExecutables []HostRuntime Policy Allowed Executable Args 
- Allowed executables configuration.
- AllowedRegistries []HostRuntime Policy Allowed Registry Args 
- Allowed registries configuration.
- ApplicationScopes []string
- Indicates the application scope of the service.
- AuditBrute boolForce Login 
- Detects brute force login attempts
- AuditFull boolCommand Arguments 
- If true, full command arguments will be audited.
- AuditHost boolFailed Login Events 
- If true, host failed logins will be audited.
- AuditHost boolSuccessful Login Events 
- If true, host successful logins will be audited.
- AuditUser boolAccount Management 
- If true, account management will be audited.
- Auditing
HostRuntime Policy Auditing Args 
- string
- Username of the account that created the service.
- BlacklistedOs HostUsers Runtime Policy Blacklisted Os Users Args 
- BlockContainer boolExec 
- BlockCryptocurrency boolMining 
- Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- BlockDisallowed boolImages 
- BlockFileless boolExec 
- BlockNon boolCompliant Workloads 
- BlockNon boolK8s Containers 
- BlockedFiles []string
- List of files that are prevented from being read, modified and executed in the containers.
- BypassScopes []HostRuntime Policy Bypass Scope Args 
- Bypass scope configuration.
- ContainerExec HostRuntime Policy Container Exec Args 
- Created string
- Cve string
- DefaultSecurity stringProfile 
- Description string
- The description of the host runtime policy
- Digest string
- DriftPreventions []HostRuntime Policy Drift Prevention Args 
- Drift prevention configuration.
- EnableCrypto boolMining Dns 
- EnableFork boolGuard 
- EnableIp boolReputation 
- EnablePort boolScan Protection 
- Enabled bool
- Indicates if the runtime policy is enabled or not.
- Enforce bool
- Indicates that policy should effect container execution (not just for audit).
- EnforceAfter intDays 
- Indicates the number of days after which the runtime policy will be changed to enforce mode.
- EnforceScheduler intAdded On 
- ExcludeApplication []stringScopes 
- List of excluded application scopes.
- ExecutableBlacklists []HostRuntime Policy Executable Blacklist Args 
- Executable blacklist configuration.
- FailedKubernetes HostChecks Runtime Policy Failed Kubernetes Checks Args 
- FileBlock HostRuntime Policy File Block Args 
- FileIntegrity HostMonitoring Runtime Policy File Integrity Monitoring Args 
- Configuration for file integrity monitoring.
- ForkGuard intProcess Limit 
- ImageName string
- IsAudit boolChecked 
- IsAuto boolGenerated 
- IsOotb boolPolicy 
- Lastupdate int
- LimitContainer []HostPrivileges Runtime Policy Limit Container Privilege Args 
- Container privileges configuration.
- LinuxCapabilities HostRuntime Policy Linux Capabilities Args 
- MalwareScan HostOptions Runtime Policy Malware Scan Options Args 
- Configuration for Real-Time Malware Protection.
- MonitorSystem boolLog Integrity 
- If true, system log will be monitored.
- MonitorSystem boolTime Changes 
- If true, system time changes will be monitored.
- MonitorWindows boolServices 
- If true, windows service operations will be monitored.
- Name string
- Name of the host runtime policy
- NoNew boolPrivileges 
- OnlyRegistered boolImages 
- OsGroups []stringAlloweds 
- List of OS (Linux or Windows) groups that are allowed to authenticate to the host, and block authentication requests from all others. Groups can be either Linux groups or Windows AD groups.
- OsGroups []stringBlockeds 
- List of OS (Linux or Windows) groups that are not allowed to authenticate to the host, and block authentication requests from all others. Groups can be either Linux groups or Windows AD groups.
- OsUsers []stringAlloweds 
- List of OS (Linux or Windows) users that are allowed to authenticate to the host, and block authentication requests from all others.
- OsUsers []stringBlockeds 
- List of OS (Linux or Windows) users that are not allowed to authenticate to the host, and block authentication requests from all others.
- PackageBlocks []HostRuntime Policy Package Block Args 
- Permission string
- PortBlock HostRuntime Policy Port Block Args 
- ReadonlyFiles HostRuntime Policy Readonly Files Args 
- ReadonlyRegistry HostRuntime Policy Readonly Registry Args 
- Registry string
- RegistryAccess HostMonitoring Runtime Policy Registry Access Monitoring Args 
- RepoName string
- ResourceName string
- ResourceType string
- RestrictedVolumes []HostRuntime Policy Restricted Volume Args 
- Restricted volumes configuration.
- ReverseShell HostRuntime Policy Reverse Shell Args 
- RuntimeMode int
- RuntimeType string
- ScopeExpression string
- Logical expression of how to compute the dependency of the scope variables.
- ScopeVariables []HostRuntime Policy Scope Variable Args 
- List of scope attributes.
- Scopes
[]HostRuntime Policy Scope Args 
- Scope configuration.
- SystemIntegrity HostProtection Runtime Policy System Integrity Protection Args 
- Tripwire
HostRuntime Policy Tripwire Args 
- Type string
- Updated string
- Version string
- VpatchVersion string
- WhitelistedOs HostUsers Runtime Policy Whitelisted Os Users Args 
- allowedExecutables List<HostRuntime Policy Allowed Executable> 
- Allowed executables configuration.
- allowedRegistries List<HostRuntime Policy Allowed Registry> 
- Allowed registries configuration.
- applicationScopes List<String>
- Indicates the application scope of the service.
- auditBrute BooleanForce Login 
- Detects brute force login attempts
- auditFull BooleanCommand Arguments 
- If true, full command arguments will be audited.
- auditHost BooleanFailed Login Events 
- If true, host failed logins will be audited.
- auditHost BooleanSuccessful Login Events 
- If true, host successful logins will be audited.
- auditUser BooleanAccount Management 
- If true, account management will be audited.
- auditing
HostRuntime Policy Auditing 
- String
- Username of the account that created the service.
- blacklistedOs HostUsers Runtime Policy Blacklisted Os Users 
- blockContainer BooleanExec 
- blockCryptocurrency BooleanMining 
- Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- blockDisallowed BooleanImages 
- blockFileless BooleanExec 
- blockNon BooleanCompliant Workloads 
- blockNon BooleanK8s Containers 
- blockedFiles List<String>
- List of files that are prevented from being read, modified and executed in the containers.
- bypassScopes List<HostRuntime Policy Bypass Scope> 
- Bypass scope configuration.
- containerExec HostRuntime Policy Container Exec 
- created String
- cve String
- defaultSecurity StringProfile 
- description String
- The description of the host runtime policy
- digest String
- driftPreventions List<HostRuntime Policy Drift Prevention> 
- Drift prevention configuration.
- enableCrypto BooleanMining Dns 
- enableFork BooleanGuard 
- enableIp BooleanReputation 
- enablePort BooleanScan Protection 
- enabled Boolean
- Indicates if the runtime policy is enabled or not.
- enforce Boolean
- Indicates that policy should effect container execution (not just for audit).
- enforceAfter IntegerDays 
- Indicates the number of days after which the runtime policy will be changed to enforce mode.
- enforceScheduler IntegerAdded On 
- excludeApplication List<String>Scopes 
- List of excluded application scopes.
- executableBlacklists List<HostRuntime Policy Executable Blacklist> 
- Executable blacklist configuration.
- failedKubernetes HostChecks Runtime Policy Failed Kubernetes Checks 
- fileBlock HostRuntime Policy File Block 
- fileIntegrity HostMonitoring Runtime Policy File Integrity Monitoring 
- Configuration for file integrity monitoring.
- forkGuard IntegerProcess Limit 
- imageName String
- isAudit BooleanChecked 
- isAuto BooleanGenerated 
- isOotb BooleanPolicy 
- lastupdate Integer
- limitContainer List<HostPrivileges Runtime Policy Limit Container Privilege> 
- Container privileges configuration.
- linuxCapabilities HostRuntime Policy Linux Capabilities 
- malwareScan HostOptions Runtime Policy Malware Scan Options 
- Configuration for Real-Time Malware Protection.
- monitorSystem BooleanLog Integrity 
- If true, system log will be monitored.
- monitorSystem BooleanTime Changes 
- If true, system time changes will be monitored.
- monitorWindows BooleanServices 
- If true, windows service operations will be monitored.
- name String
- Name of the host runtime policy
- noNew BooleanPrivileges 
- onlyRegistered BooleanImages 
- osGroups List<String>Alloweds 
- List of OS (Linux or Windows) groups that are allowed to authenticate to the host, and block authentication requests from all others. Groups can be either Linux groups or Windows AD groups.
- osGroups List<String>Blockeds 
- List of OS (Linux or Windows) groups that are not allowed to authenticate to the host, and block authentication requests from all others. Groups can be either Linux groups or Windows AD groups.
- osUsers List<String>Alloweds 
- List of OS (Linux or Windows) users that are allowed to authenticate to the host, and block authentication requests from all others.
- osUsers List<String>Blockeds 
- List of OS (Linux or Windows) users that are not allowed to authenticate to the host, and block authentication requests from all others.
- packageBlocks List<HostRuntime Policy Package Block> 
- permission String
- portBlock HostRuntime Policy Port Block 
- readonlyFiles HostRuntime Policy Readonly Files 
- readonlyRegistry HostRuntime Policy Readonly Registry 
- registry String
- registryAccess HostMonitoring Runtime Policy Registry Access Monitoring 
- repoName String
- resourceName String
- resourceType String
- restrictedVolumes List<HostRuntime Policy Restricted Volume> 
- Restricted volumes configuration.
- reverseShell HostRuntime Policy Reverse Shell 
- runtimeMode Integer
- runtimeType String
- scopeExpression String
- Logical expression of how to compute the dependency of the scope variables.
- scopeVariables List<HostRuntime Policy Scope Variable> 
- List of scope attributes.
- scopes
List<HostRuntime Policy Scope> 
- Scope configuration.
- systemIntegrity HostProtection Runtime Policy System Integrity Protection 
- tripwire
HostRuntime Policy Tripwire 
- type String
- updated String
- version String
- vpatchVersion String
- whitelistedOs HostUsers Runtime Policy Whitelisted Os Users 
- allowedExecutables HostRuntime Policy Allowed Executable[] 
- Allowed executables configuration.
- allowedRegistries HostRuntime Policy Allowed Registry[] 
- Allowed registries configuration.
- applicationScopes string[]
- Indicates the application scope of the service.
- auditBrute booleanForce Login 
- Detects brute force login attempts
- auditFull booleanCommand Arguments 
- If true, full command arguments will be audited.
- auditHost booleanFailed Login Events 
- If true, host failed logins will be audited.
- auditHost booleanSuccessful Login Events 
- If true, host successful logins will be audited.
- auditUser booleanAccount Management 
- If true, account management will be audited.
- auditing
HostRuntime Policy Auditing 
- string
- Username of the account that created the service.
- blacklistedOs HostUsers Runtime Policy Blacklisted Os Users 
- blockContainer booleanExec 
- blockCryptocurrency booleanMining 
- Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- blockDisallowed booleanImages 
- blockFileless booleanExec 
- blockNon booleanCompliant Workloads 
- blockNon booleanK8s Containers 
- blockedFiles string[]
- List of files that are prevented from being read, modified and executed in the containers.
- bypassScopes HostRuntime Policy Bypass Scope[] 
- Bypass scope configuration.
- containerExec HostRuntime Policy Container Exec 
- created string
- cve string
- defaultSecurity stringProfile 
- description string
- The description of the host runtime policy
- digest string
- driftPreventions HostRuntime Policy Drift Prevention[] 
- Drift prevention configuration.
- enableCrypto booleanMining Dns 
- enableFork booleanGuard 
- enableIp booleanReputation 
- enablePort booleanScan Protection 
- enabled boolean
- Indicates if the runtime policy is enabled or not.
- enforce boolean
- Indicates that policy should effect container execution (not just for audit).
- enforceAfter numberDays 
- Indicates the number of days after which the runtime policy will be changed to enforce mode.
- enforceScheduler numberAdded On 
- excludeApplication string[]Scopes 
- List of excluded application scopes.
- executableBlacklists HostRuntime Policy Executable Blacklist[] 
- Executable blacklist configuration.
- failedKubernetes HostChecks Runtime Policy Failed Kubernetes Checks 
- fileBlock HostRuntime Policy File Block 
- fileIntegrity HostMonitoring Runtime Policy File Integrity Monitoring 
- Configuration for file integrity monitoring.
- forkGuard numberProcess Limit 
- imageName string
- isAudit booleanChecked 
- isAuto booleanGenerated 
- isOotb booleanPolicy 
- lastupdate number
- limitContainer HostPrivileges Runtime Policy Limit Container Privilege[] 
- Container privileges configuration.
- linuxCapabilities HostRuntime Policy Linux Capabilities 
- malwareScan HostOptions Runtime Policy Malware Scan Options 
- Configuration for Real-Time Malware Protection.
- monitorSystem booleanLog Integrity 
- If true, system log will be monitored.
- monitorSystem booleanTime Changes 
- If true, system time changes will be monitored.
- monitorWindows booleanServices 
- If true, windows service operations will be monitored.
- name string
- Name of the host runtime policy
- noNew booleanPrivileges 
- onlyRegistered booleanImages 
- osGroups string[]Alloweds 
- List of OS (Linux or Windows) groups that are allowed to authenticate to the host, and block authentication requests from all others. Groups can be either Linux groups or Windows AD groups.
- osGroups string[]Blockeds 
- List of OS (Linux or Windows) groups that are not allowed to authenticate to the host, and block authentication requests from all others. Groups can be either Linux groups or Windows AD groups.
- osUsers string[]Alloweds 
- List of OS (Linux or Windows) users that are allowed to authenticate to the host, and block authentication requests from all others.
- osUsers string[]Blockeds 
- List of OS (Linux or Windows) users that are not allowed to authenticate to the host, and block authentication requests from all others.
- packageBlocks HostRuntime Policy Package Block[] 
- permission string
- portBlock HostRuntime Policy Port Block 
- readonlyFiles HostRuntime Policy Readonly Files 
- readonlyRegistry HostRuntime Policy Readonly Registry 
- registry string
- registryAccess HostMonitoring Runtime Policy Registry Access Monitoring 
- repoName string
- resourceName string
- resourceType string
- restrictedVolumes HostRuntime Policy Restricted Volume[] 
- Restricted volumes configuration.
- reverseShell HostRuntime Policy Reverse Shell 
- runtimeMode number
- runtimeType string
- scopeExpression string
- Logical expression of how to compute the dependency of the scope variables.
- scopeVariables HostRuntime Policy Scope Variable[] 
- List of scope attributes.
- scopes
HostRuntime Policy Scope[] 
- Scope configuration.
- systemIntegrity HostProtection Runtime Policy System Integrity Protection 
- tripwire
HostRuntime Policy Tripwire 
- type string
- updated string
- version string
- vpatchVersion string
- whitelistedOs HostUsers Runtime Policy Whitelisted Os Users 
- allowed_executables Sequence[HostRuntime Policy Allowed Executable Args] 
- Allowed executables configuration.
- allowed_registries Sequence[HostRuntime Policy Allowed Registry Args] 
- Allowed registries configuration.
- application_scopes Sequence[str]
- Indicates the application scope of the service.
- audit_brute_ boolforce_ login 
- Detects brute force login attempts
- audit_full_ boolcommand_ arguments 
- If true, full command arguments will be audited.
- audit_host_ boolfailed_ login_ events 
- If true, host failed logins will be audited.
- audit_host_ boolsuccessful_ login_ events 
- If true, host successful logins will be audited.
- audit_user_ boolaccount_ management 
- If true, account management will be audited.
- auditing
HostRuntime Policy Auditing Args 
- str
- Username of the account that created the service.
- blacklisted_os_ Hostusers Runtime Policy Blacklisted Os Users Args 
- block_container_ boolexec 
- block_cryptocurrency_ boolmining 
- Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- block_disallowed_ boolimages 
- block_fileless_ boolexec 
- block_non_ boolcompliant_ workloads 
- block_non_ boolk8s_ containers 
- blocked_files Sequence[str]
- List of files that are prevented from being read, modified and executed in the containers.
- bypass_scopes Sequence[HostRuntime Policy Bypass Scope Args] 
- Bypass scope configuration.
- container_exec HostRuntime Policy Container Exec Args 
- created str
- cve str
- default_security_ strprofile 
- description str
- The description of the host runtime policy
- digest str
- drift_preventions Sequence[HostRuntime Policy Drift Prevention Args] 
- Drift prevention configuration.
- enable_crypto_ boolmining_ dns 
- enable_fork_ boolguard 
- enable_ip_ boolreputation 
- enable_port_ boolscan_ protection 
- enabled bool
- Indicates if the runtime policy is enabled or not.
- enforce bool
- Indicates that policy should effect container execution (not just for audit).
- enforce_after_ intdays 
- Indicates the number of days after which the runtime policy will be changed to enforce mode.
- enforce_scheduler_ intadded_ on 
- exclude_application_ Sequence[str]scopes 
- List of excluded application scopes.
- executable_blacklists Sequence[HostRuntime Policy Executable Blacklist Args] 
- Executable blacklist configuration.
- failed_kubernetes_ Hostchecks Runtime Policy Failed Kubernetes Checks Args 
- file_block HostRuntime Policy File Block Args 
- file_integrity_ Hostmonitoring Runtime Policy File Integrity Monitoring Args 
- Configuration for file integrity monitoring.
- fork_guard_ intprocess_ limit 
- image_name str
- is_audit_ boolchecked 
- is_auto_ boolgenerated 
- is_ootb_ boolpolicy 
- lastupdate int
- limit_container_ Sequence[Hostprivileges Runtime Policy Limit Container Privilege Args] 
- Container privileges configuration.
- linux_capabilities HostRuntime Policy Linux Capabilities Args 
- malware_scan_ Hostoptions Runtime Policy Malware Scan Options Args 
- Configuration for Real-Time Malware Protection.
- monitor_system_ boollog_ integrity 
- If true, system log will be monitored.
- monitor_system_ booltime_ changes 
- If true, system time changes will be monitored.
- monitor_windows_ boolservices 
- If true, windows service operations will be monitored.
- name str
- Name of the host runtime policy
- no_new_ boolprivileges 
- only_registered_ boolimages 
- os_groups_ Sequence[str]alloweds 
- List of OS (Linux or Windows) groups that are allowed to authenticate to the host, and block authentication requests from all others. Groups can be either Linux groups or Windows AD groups.
- os_groups_ Sequence[str]blockeds 
- List of OS (Linux or Windows) groups that are not allowed to authenticate to the host, and block authentication requests from all others. Groups can be either Linux groups or Windows AD groups.
- os_users_ Sequence[str]alloweds 
- List of OS (Linux or Windows) users that are allowed to authenticate to the host, and block authentication requests from all others.
- os_users_ Sequence[str]blockeds 
- List of OS (Linux or Windows) users that are not allowed to authenticate to the host, and block authentication requests from all others.
- package_blocks Sequence[HostRuntime Policy Package Block Args] 
- permission str
- port_block HostRuntime Policy Port Block Args 
- readonly_files HostRuntime Policy Readonly Files Args 
- readonly_registry HostRuntime Policy Readonly Registry Args 
- registry str
- registry_access_ Hostmonitoring Runtime Policy Registry Access Monitoring Args 
- repo_name str
- resource_name str
- resource_type str
- restricted_volumes Sequence[HostRuntime Policy Restricted Volume Args] 
- Restricted volumes configuration.
- reverse_shell HostRuntime Policy Reverse Shell Args 
- runtime_mode int
- runtime_type str
- scope_expression str
- Logical expression of how to compute the dependency of the scope variables.
- scope_variables Sequence[HostRuntime Policy Scope Variable Args] 
- List of scope attributes.
- scopes
Sequence[HostRuntime Policy Scope Args] 
- Scope configuration.
- system_integrity_ Hostprotection Runtime Policy System Integrity Protection Args 
- tripwire
HostRuntime Policy Tripwire Args 
- type str
- updated str
- version str
- vpatch_version str
- whitelisted_os_ Hostusers Runtime Policy Whitelisted Os Users Args 
- allowedExecutables List<Property Map>
- Allowed executables configuration.
- allowedRegistries List<Property Map>
- Allowed registries configuration.
- applicationScopes List<String>
- Indicates the application scope of the service.
- auditBrute BooleanForce Login 
- Detects brute force login attempts
- auditFull BooleanCommand Arguments 
- If true, full command arguments will be audited.
- auditHost BooleanFailed Login Events 
- If true, host failed logins will be audited.
- auditHost BooleanSuccessful Login Events 
- If true, host successful logins will be audited.
- auditUser BooleanAccount Management 
- If true, account management will be audited.
- auditing Property Map
- String
- Username of the account that created the service.
- blacklistedOs Property MapUsers 
- blockContainer BooleanExec 
- blockCryptocurrency BooleanMining 
- Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- blockDisallowed BooleanImages 
- blockFileless BooleanExec 
- blockNon BooleanCompliant Workloads 
- blockNon BooleanK8s Containers 
- blockedFiles List<String>
- List of files that are prevented from being read, modified and executed in the containers.
- bypassScopes List<Property Map>
- Bypass scope configuration.
- containerExec Property Map
- created String
- cve String
- defaultSecurity StringProfile 
- description String
- The description of the host runtime policy
- digest String
- driftPreventions List<Property Map>
- Drift prevention configuration.
- enableCrypto BooleanMining Dns 
- enableFork BooleanGuard 
- enableIp BooleanReputation 
- enablePort BooleanScan Protection 
- enabled Boolean
- Indicates if the runtime policy is enabled or not.
- enforce Boolean
- Indicates that policy should effect container execution (not just for audit).
- enforceAfter NumberDays 
- Indicates the number of days after which the runtime policy will be changed to enforce mode.
- enforceScheduler NumberAdded On 
- excludeApplication List<String>Scopes 
- List of excluded application scopes.
- executableBlacklists List<Property Map>
- Executable blacklist configuration.
- failedKubernetes Property MapChecks 
- fileBlock Property Map
- fileIntegrity Property MapMonitoring 
- Configuration for file integrity monitoring.
- forkGuard NumberProcess Limit 
- imageName String
- isAudit BooleanChecked 
- isAuto BooleanGenerated 
- isOotb BooleanPolicy 
- lastupdate Number
- limitContainer List<Property Map>Privileges 
- Container privileges configuration.
- linuxCapabilities Property Map
- malwareScan Property MapOptions 
- Configuration for Real-Time Malware Protection.
- monitorSystem BooleanLog Integrity 
- If true, system log will be monitored.
- monitorSystem BooleanTime Changes 
- If true, system time changes will be monitored.
- monitorWindows BooleanServices 
- If true, windows service operations will be monitored.
- name String
- Name of the host runtime policy
- noNew BooleanPrivileges 
- onlyRegistered BooleanImages 
- osGroups List<String>Alloweds 
- List of OS (Linux or Windows) groups that are allowed to authenticate to the host, and block authentication requests from all others. Groups can be either Linux groups or Windows AD groups.
- osGroups List<String>Blockeds 
- List of OS (Linux or Windows) groups that are not allowed to authenticate to the host, and block authentication requests from all others. Groups can be either Linux groups or Windows AD groups.
- osUsers List<String>Alloweds 
- List of OS (Linux or Windows) users that are allowed to authenticate to the host, and block authentication requests from all others.
- osUsers List<String>Blockeds 
- List of OS (Linux or Windows) users that are not allowed to authenticate to the host, and block authentication requests from all others.
- packageBlocks List<Property Map>
- permission String
- portBlock Property Map
- readonlyFiles Property Map
- readonlyRegistry Property Map
- registry String
- registryAccess Property MapMonitoring 
- repoName String
- resourceName String
- resourceType String
- restrictedVolumes List<Property Map>
- Restricted volumes configuration.
- reverseShell Property Map
- runtimeMode Number
- runtimeType String
- scopeExpression String
- Logical expression of how to compute the dependency of the scope variables.
- scopeVariables List<Property Map>
- List of scope attributes.
- scopes List<Property Map>
- Scope configuration.
- systemIntegrity Property MapProtection 
- tripwire Property Map
- type String
- updated String
- version String
- vpatchVersion String
- whitelistedOs Property MapUsers 
Outputs
All input properties are implicitly available as output properties. Additionally, the HostRuntimePolicy resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing HostRuntimePolicy Resource
Get an existing HostRuntimePolicy resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: HostRuntimePolicyState, opts?: CustomResourceOptions): HostRuntimePolicy@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        allowed_executables: Optional[Sequence[HostRuntimePolicyAllowedExecutableArgs]] = None,
        allowed_registries: Optional[Sequence[HostRuntimePolicyAllowedRegistryArgs]] = None,
        application_scopes: Optional[Sequence[str]] = None,
        audit_brute_force_login: Optional[bool] = None,
        audit_full_command_arguments: Optional[bool] = None,
        audit_host_failed_login_events: Optional[bool] = None,
        audit_host_successful_login_events: Optional[bool] = None,
        audit_user_account_management: Optional[bool] = None,
        auditing: Optional[HostRuntimePolicyAuditingArgs] = None,
        author: Optional[str] = None,
        blacklisted_os_users: Optional[HostRuntimePolicyBlacklistedOsUsersArgs] = None,
        block_container_exec: Optional[bool] = None,
        block_cryptocurrency_mining: Optional[bool] = None,
        block_disallowed_images: Optional[bool] = None,
        block_fileless_exec: Optional[bool] = None,
        block_non_compliant_workloads: Optional[bool] = None,
        block_non_k8s_containers: Optional[bool] = None,
        blocked_files: Optional[Sequence[str]] = None,
        bypass_scopes: Optional[Sequence[HostRuntimePolicyBypassScopeArgs]] = None,
        container_exec: Optional[HostRuntimePolicyContainerExecArgs] = None,
        created: Optional[str] = None,
        cve: Optional[str] = None,
        default_security_profile: Optional[str] = None,
        description: Optional[str] = None,
        digest: Optional[str] = None,
        drift_preventions: Optional[Sequence[HostRuntimePolicyDriftPreventionArgs]] = None,
        enable_crypto_mining_dns: Optional[bool] = None,
        enable_fork_guard: Optional[bool] = None,
        enable_ip_reputation: Optional[bool] = None,
        enable_port_scan_protection: Optional[bool] = None,
        enabled: Optional[bool] = None,
        enforce: Optional[bool] = None,
        enforce_after_days: Optional[int] = None,
        enforce_scheduler_added_on: Optional[int] = None,
        exclude_application_scopes: Optional[Sequence[str]] = None,
        executable_blacklists: Optional[Sequence[HostRuntimePolicyExecutableBlacklistArgs]] = None,
        failed_kubernetes_checks: Optional[HostRuntimePolicyFailedKubernetesChecksArgs] = None,
        file_block: Optional[HostRuntimePolicyFileBlockArgs] = None,
        file_integrity_monitoring: Optional[HostRuntimePolicyFileIntegrityMonitoringArgs] = None,
        fork_guard_process_limit: Optional[int] = None,
        image_name: Optional[str] = None,
        is_audit_checked: Optional[bool] = None,
        is_auto_generated: Optional[bool] = None,
        is_ootb_policy: Optional[bool] = None,
        lastupdate: Optional[int] = None,
        limit_container_privileges: Optional[Sequence[HostRuntimePolicyLimitContainerPrivilegeArgs]] = None,
        linux_capabilities: Optional[HostRuntimePolicyLinuxCapabilitiesArgs] = None,
        malware_scan_options: Optional[HostRuntimePolicyMalwareScanOptionsArgs] = None,
        monitor_system_log_integrity: Optional[bool] = None,
        monitor_system_time_changes: Optional[bool] = None,
        monitor_windows_services: Optional[bool] = None,
        name: Optional[str] = None,
        no_new_privileges: Optional[bool] = None,
        only_registered_images: Optional[bool] = None,
        os_groups_alloweds: Optional[Sequence[str]] = None,
        os_groups_blockeds: Optional[Sequence[str]] = None,
        os_users_alloweds: Optional[Sequence[str]] = None,
        os_users_blockeds: Optional[Sequence[str]] = None,
        package_blocks: Optional[Sequence[HostRuntimePolicyPackageBlockArgs]] = None,
        permission: Optional[str] = None,
        port_block: Optional[HostRuntimePolicyPortBlockArgs] = None,
        readonly_files: Optional[HostRuntimePolicyReadonlyFilesArgs] = None,
        readonly_registry: Optional[HostRuntimePolicyReadonlyRegistryArgs] = None,
        registry: Optional[str] = None,
        registry_access_monitoring: Optional[HostRuntimePolicyRegistryAccessMonitoringArgs] = None,
        repo_name: Optional[str] = None,
        resource_name: Optional[str] = None,
        resource_type: Optional[str] = None,
        restricted_volumes: Optional[Sequence[HostRuntimePolicyRestrictedVolumeArgs]] = None,
        reverse_shell: Optional[HostRuntimePolicyReverseShellArgs] = None,
        runtime_mode: Optional[int] = None,
        runtime_type: Optional[str] = None,
        scope_expression: Optional[str] = None,
        scope_variables: Optional[Sequence[HostRuntimePolicyScopeVariableArgs]] = None,
        scopes: Optional[Sequence[HostRuntimePolicyScopeArgs]] = None,
        system_integrity_protection: Optional[HostRuntimePolicySystemIntegrityProtectionArgs] = None,
        tripwire: Optional[HostRuntimePolicyTripwireArgs] = None,
        type: Optional[str] = None,
        updated: Optional[str] = None,
        version: Optional[str] = None,
        vpatch_version: Optional[str] = None,
        whitelisted_os_users: Optional[HostRuntimePolicyWhitelistedOsUsersArgs] = None) -> HostRuntimePolicyfunc GetHostRuntimePolicy(ctx *Context, name string, id IDInput, state *HostRuntimePolicyState, opts ...ResourceOption) (*HostRuntimePolicy, error)public static HostRuntimePolicy Get(string name, Input<string> id, HostRuntimePolicyState? state, CustomResourceOptions? opts = null)public static HostRuntimePolicy get(String name, Output<String> id, HostRuntimePolicyState state, CustomResourceOptions options)resources:  _:    type: aquasec:HostRuntimePolicy    get:      id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- AllowedExecutables List<Pulumiverse.Aquasec. Inputs. Host Runtime Policy Allowed Executable> 
- Allowed executables configuration.
- AllowedRegistries List<Pulumiverse.Aquasec. Inputs. Host Runtime Policy Allowed Registry> 
- Allowed registries configuration.
- ApplicationScopes List<string>
- Indicates the application scope of the service.
- AuditBrute boolForce Login 
- Detects brute force login attempts
- AuditFull boolCommand Arguments 
- If true, full command arguments will be audited.
- AuditHost boolFailed Login Events 
- If true, host failed logins will be audited.
- AuditHost boolSuccessful Login Events 
- If true, host successful logins will be audited.
- AuditUser boolAccount Management 
- If true, account management will be audited.
- Auditing
Pulumiverse.Aquasec. Inputs. Host Runtime Policy Auditing 
- string
- Username of the account that created the service.
- BlacklistedOs Pulumiverse.Users Aquasec. Inputs. Host Runtime Policy Blacklisted Os Users 
- BlockContainer boolExec 
- BlockCryptocurrency boolMining 
- Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- BlockDisallowed boolImages 
- BlockFileless boolExec 
- BlockNon boolCompliant Workloads 
- BlockNon boolK8s Containers 
- BlockedFiles List<string>
- List of files that are prevented from being read, modified and executed in the containers.
- BypassScopes List<Pulumiverse.Aquasec. Inputs. Host Runtime Policy Bypass Scope> 
- Bypass scope configuration.
- ContainerExec Pulumiverse.Aquasec. Inputs. Host Runtime Policy Container Exec 
- Created string
- Cve string
- DefaultSecurity stringProfile 
- Description string
- The description of the host runtime policy
- Digest string
- DriftPreventions List<Pulumiverse.Aquasec. Inputs. Host Runtime Policy Drift Prevention> 
- Drift prevention configuration.
- EnableCrypto boolMining Dns 
- EnableFork boolGuard 
- EnableIp boolReputation 
- EnablePort boolScan Protection 
- Enabled bool
- Indicates if the runtime policy is enabled or not.
- Enforce bool
- Indicates that policy should effect container execution (not just for audit).
- EnforceAfter intDays 
- Indicates the number of days after which the runtime policy will be changed to enforce mode.
- EnforceScheduler intAdded On 
- ExcludeApplication List<string>Scopes 
- List of excluded application scopes.
- ExecutableBlacklists List<Pulumiverse.Aquasec. Inputs. Host Runtime Policy Executable Blacklist> 
- Executable blacklist configuration.
- FailedKubernetes Pulumiverse.Checks Aquasec. Inputs. Host Runtime Policy Failed Kubernetes Checks 
- FileBlock Pulumiverse.Aquasec. Inputs. Host Runtime Policy File Block 
- FileIntegrity Pulumiverse.Monitoring Aquasec. Inputs. Host Runtime Policy File Integrity Monitoring 
- Configuration for file integrity monitoring.
- ForkGuard intProcess Limit 
- ImageName string
- IsAudit boolChecked 
- IsAuto boolGenerated 
- IsOotb boolPolicy 
- Lastupdate int
- LimitContainer List<Pulumiverse.Privileges Aquasec. Inputs. Host Runtime Policy Limit Container Privilege> 
- Container privileges configuration.
- LinuxCapabilities Pulumiverse.Aquasec. Inputs. Host Runtime Policy Linux Capabilities 
- MalwareScan Pulumiverse.Options Aquasec. Inputs. Host Runtime Policy Malware Scan Options 
- Configuration for Real-Time Malware Protection.
- MonitorSystem boolLog Integrity 
- If true, system log will be monitored.
- MonitorSystem boolTime Changes 
- If true, system time changes will be monitored.
- MonitorWindows boolServices 
- If true, windows service operations will be monitored.
- Name string
- Name of the host runtime policy
- NoNew boolPrivileges 
- OnlyRegistered boolImages 
- OsGroups List<string>Alloweds 
- List of OS (Linux or Windows) groups that are allowed to authenticate to the host, and block authentication requests from all others. Groups can be either Linux groups or Windows AD groups.
- OsGroups List<string>Blockeds 
- List of OS (Linux or Windows) groups that are not allowed to authenticate to the host, and block authentication requests from all others. Groups can be either Linux groups or Windows AD groups.
- OsUsers List<string>Alloweds 
- List of OS (Linux or Windows) users that are allowed to authenticate to the host, and block authentication requests from all others.
- OsUsers List<string>Blockeds 
- List of OS (Linux or Windows) users that are not allowed to authenticate to the host, and block authentication requests from all others.
- PackageBlocks List<Pulumiverse.Aquasec. Inputs. Host Runtime Policy Package Block> 
- Permission string
- PortBlock Pulumiverse.Aquasec. Inputs. Host Runtime Policy Port Block 
- ReadonlyFiles Pulumiverse.Aquasec. Inputs. Host Runtime Policy Readonly Files 
- ReadonlyRegistry Pulumiverse.Aquasec. Inputs. Host Runtime Policy Readonly Registry 
- Registry string
- RegistryAccess Pulumiverse.Monitoring Aquasec. Inputs. Host Runtime Policy Registry Access Monitoring 
- RepoName string
- ResourceName string
- ResourceType string
- RestrictedVolumes List<Pulumiverse.Aquasec. Inputs. Host Runtime Policy Restricted Volume> 
- Restricted volumes configuration.
- ReverseShell Pulumiverse.Aquasec. Inputs. Host Runtime Policy Reverse Shell 
- RuntimeMode int
- RuntimeType string
- ScopeExpression string
- Logical expression of how to compute the dependency of the scope variables.
- ScopeVariables List<Pulumiverse.Aquasec. Inputs. Host Runtime Policy Scope Variable> 
- List of scope attributes.
- Scopes
List<Pulumiverse.Aquasec. Inputs. Host Runtime Policy Scope> 
- Scope configuration.
- SystemIntegrity Pulumiverse.Protection Aquasec. Inputs. Host Runtime Policy System Integrity Protection 
- Tripwire
Pulumiverse.Aquasec. Inputs. Host Runtime Policy Tripwire 
- Type string
- Updated string
- Version string
- VpatchVersion string
- WhitelistedOs Pulumiverse.Users Aquasec. Inputs. Host Runtime Policy Whitelisted Os Users 
- AllowedExecutables []HostRuntime Policy Allowed Executable Args 
- Allowed executables configuration.
- AllowedRegistries []HostRuntime Policy Allowed Registry Args 
- Allowed registries configuration.
- ApplicationScopes []string
- Indicates the application scope of the service.
- AuditBrute boolForce Login 
- Detects brute force login attempts
- AuditFull boolCommand Arguments 
- If true, full command arguments will be audited.
- AuditHost boolFailed Login Events 
- If true, host failed logins will be audited.
- AuditHost boolSuccessful Login Events 
- If true, host successful logins will be audited.
- AuditUser boolAccount Management 
- If true, account management will be audited.
- Auditing
HostRuntime Policy Auditing Args 
- string
- Username of the account that created the service.
- BlacklistedOs HostUsers Runtime Policy Blacklisted Os Users Args 
- BlockContainer boolExec 
- BlockCryptocurrency boolMining 
- Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- BlockDisallowed boolImages 
- BlockFileless boolExec 
- BlockNon boolCompliant Workloads 
- BlockNon boolK8s Containers 
- BlockedFiles []string
- List of files that are prevented from being read, modified and executed in the containers.
- BypassScopes []HostRuntime Policy Bypass Scope Args 
- Bypass scope configuration.
- ContainerExec HostRuntime Policy Container Exec Args 
- Created string
- Cve string
- DefaultSecurity stringProfile 
- Description string
- The description of the host runtime policy
- Digest string
- DriftPreventions []HostRuntime Policy Drift Prevention Args 
- Drift prevention configuration.
- EnableCrypto boolMining Dns 
- EnableFork boolGuard 
- EnableIp boolReputation 
- EnablePort boolScan Protection 
- Enabled bool
- Indicates if the runtime policy is enabled or not.
- Enforce bool
- Indicates that policy should effect container execution (not just for audit).
- EnforceAfter intDays 
- Indicates the number of days after which the runtime policy will be changed to enforce mode.
- EnforceScheduler intAdded On 
- ExcludeApplication []stringScopes 
- List of excluded application scopes.
- ExecutableBlacklists []HostRuntime Policy Executable Blacklist Args 
- Executable blacklist configuration.
- FailedKubernetes HostChecks Runtime Policy Failed Kubernetes Checks Args 
- FileBlock HostRuntime Policy File Block Args 
- FileIntegrity HostMonitoring Runtime Policy File Integrity Monitoring Args 
- Configuration for file integrity monitoring.
- ForkGuard intProcess Limit 
- ImageName string
- IsAudit boolChecked 
- IsAuto boolGenerated 
- IsOotb boolPolicy 
- Lastupdate int
- LimitContainer []HostPrivileges Runtime Policy Limit Container Privilege Args 
- Container privileges configuration.
- LinuxCapabilities HostRuntime Policy Linux Capabilities Args 
- MalwareScan HostOptions Runtime Policy Malware Scan Options Args 
- Configuration for Real-Time Malware Protection.
- MonitorSystem boolLog Integrity 
- If true, system log will be monitored.
- MonitorSystem boolTime Changes 
- If true, system time changes will be monitored.
- MonitorWindows boolServices 
- If true, windows service operations will be monitored.
- Name string
- Name of the host runtime policy
- NoNew boolPrivileges 
- OnlyRegistered boolImages 
- OsGroups []stringAlloweds 
- List of OS (Linux or Windows) groups that are allowed to authenticate to the host, and block authentication requests from all others. Groups can be either Linux groups or Windows AD groups.
- OsGroups []stringBlockeds 
- List of OS (Linux or Windows) groups that are not allowed to authenticate to the host, and block authentication requests from all others. Groups can be either Linux groups or Windows AD groups.
- OsUsers []stringAlloweds 
- List of OS (Linux or Windows) users that are allowed to authenticate to the host, and block authentication requests from all others.
- OsUsers []stringBlockeds 
- List of OS (Linux or Windows) users that are not allowed to authenticate to the host, and block authentication requests from all others.
- PackageBlocks []HostRuntime Policy Package Block Args 
- Permission string
- PortBlock HostRuntime Policy Port Block Args 
- ReadonlyFiles HostRuntime Policy Readonly Files Args 
- ReadonlyRegistry HostRuntime Policy Readonly Registry Args 
- Registry string
- RegistryAccess HostMonitoring Runtime Policy Registry Access Monitoring Args 
- RepoName string
- ResourceName string
- ResourceType string
- RestrictedVolumes []HostRuntime Policy Restricted Volume Args 
- Restricted volumes configuration.
- ReverseShell HostRuntime Policy Reverse Shell Args 
- RuntimeMode int
- RuntimeType string
- ScopeExpression string
- Logical expression of how to compute the dependency of the scope variables.
- ScopeVariables []HostRuntime Policy Scope Variable Args 
- List of scope attributes.
- Scopes
[]HostRuntime Policy Scope Args 
- Scope configuration.
- SystemIntegrity HostProtection Runtime Policy System Integrity Protection Args 
- Tripwire
HostRuntime Policy Tripwire Args 
- Type string
- Updated string
- Version string
- VpatchVersion string
- WhitelistedOs HostUsers Runtime Policy Whitelisted Os Users Args 
- allowedExecutables List<HostRuntime Policy Allowed Executable> 
- Allowed executables configuration.
- allowedRegistries List<HostRuntime Policy Allowed Registry> 
- Allowed registries configuration.
- applicationScopes List<String>
- Indicates the application scope of the service.
- auditBrute BooleanForce Login 
- Detects brute force login attempts
- auditFull BooleanCommand Arguments 
- If true, full command arguments will be audited.
- auditHost BooleanFailed Login Events 
- If true, host failed logins will be audited.
- auditHost BooleanSuccessful Login Events 
- If true, host successful logins will be audited.
- auditUser BooleanAccount Management 
- If true, account management will be audited.
- auditing
HostRuntime Policy Auditing 
- String
- Username of the account that created the service.
- blacklistedOs HostUsers Runtime Policy Blacklisted Os Users 
- blockContainer BooleanExec 
- blockCryptocurrency BooleanMining 
- Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- blockDisallowed BooleanImages 
- blockFileless BooleanExec 
- blockNon BooleanCompliant Workloads 
- blockNon BooleanK8s Containers 
- blockedFiles List<String>
- List of files that are prevented from being read, modified and executed in the containers.
- bypassScopes List<HostRuntime Policy Bypass Scope> 
- Bypass scope configuration.
- containerExec HostRuntime Policy Container Exec 
- created String
- cve String
- defaultSecurity StringProfile 
- description String
- The description of the host runtime policy
- digest String
- driftPreventions List<HostRuntime Policy Drift Prevention> 
- Drift prevention configuration.
- enableCrypto BooleanMining Dns 
- enableFork BooleanGuard 
- enableIp BooleanReputation 
- enablePort BooleanScan Protection 
- enabled Boolean
- Indicates if the runtime policy is enabled or not.
- enforce Boolean
- Indicates that policy should effect container execution (not just for audit).
- enforceAfter IntegerDays 
- Indicates the number of days after which the runtime policy will be changed to enforce mode.
- enforceScheduler IntegerAdded On 
- excludeApplication List<String>Scopes 
- List of excluded application scopes.
- executableBlacklists List<HostRuntime Policy Executable Blacklist> 
- Executable blacklist configuration.
- failedKubernetes HostChecks Runtime Policy Failed Kubernetes Checks 
- fileBlock HostRuntime Policy File Block 
- fileIntegrity HostMonitoring Runtime Policy File Integrity Monitoring 
- Configuration for file integrity monitoring.
- forkGuard IntegerProcess Limit 
- imageName String
- isAudit BooleanChecked 
- isAuto BooleanGenerated 
- isOotb BooleanPolicy 
- lastupdate Integer
- limitContainer List<HostPrivileges Runtime Policy Limit Container Privilege> 
- Container privileges configuration.
- linuxCapabilities HostRuntime Policy Linux Capabilities 
- malwareScan HostOptions Runtime Policy Malware Scan Options 
- Configuration for Real-Time Malware Protection.
- monitorSystem BooleanLog Integrity 
- If true, system log will be monitored.
- monitorSystem BooleanTime Changes 
- If true, system time changes will be monitored.
- monitorWindows BooleanServices 
- If true, windows service operations will be monitored.
- name String
- Name of the host runtime policy
- noNew BooleanPrivileges 
- onlyRegistered BooleanImages 
- osGroups List<String>Alloweds 
- List of OS (Linux or Windows) groups that are allowed to authenticate to the host, and block authentication requests from all others. Groups can be either Linux groups or Windows AD groups.
- osGroups List<String>Blockeds 
- List of OS (Linux or Windows) groups that are not allowed to authenticate to the host, and block authentication requests from all others. Groups can be either Linux groups or Windows AD groups.
- osUsers List<String>Alloweds 
- List of OS (Linux or Windows) users that are allowed to authenticate to the host, and block authentication requests from all others.
- osUsers List<String>Blockeds 
- List of OS (Linux or Windows) users that are not allowed to authenticate to the host, and block authentication requests from all others.
- packageBlocks List<HostRuntime Policy Package Block> 
- permission String
- portBlock HostRuntime Policy Port Block 
- readonlyFiles HostRuntime Policy Readonly Files 
- readonlyRegistry HostRuntime Policy Readonly Registry 
- registry String
- registryAccess HostMonitoring Runtime Policy Registry Access Monitoring 
- repoName String
- resourceName String
- resourceType String
- restrictedVolumes List<HostRuntime Policy Restricted Volume> 
- Restricted volumes configuration.
- reverseShell HostRuntime Policy Reverse Shell 
- runtimeMode Integer
- runtimeType String
- scopeExpression String
- Logical expression of how to compute the dependency of the scope variables.
- scopeVariables List<HostRuntime Policy Scope Variable> 
- List of scope attributes.
- scopes
List<HostRuntime Policy Scope> 
- Scope configuration.
- systemIntegrity HostProtection Runtime Policy System Integrity Protection 
- tripwire
HostRuntime Policy Tripwire 
- type String
- updated String
- version String
- vpatchVersion String
- whitelistedOs HostUsers Runtime Policy Whitelisted Os Users 
- allowedExecutables HostRuntime Policy Allowed Executable[] 
- Allowed executables configuration.
- allowedRegistries HostRuntime Policy Allowed Registry[] 
- Allowed registries configuration.
- applicationScopes string[]
- Indicates the application scope of the service.
- auditBrute booleanForce Login 
- Detects brute force login attempts
- auditFull booleanCommand Arguments 
- If true, full command arguments will be audited.
- auditHost booleanFailed Login Events 
- If true, host failed logins will be audited.
- auditHost booleanSuccessful Login Events 
- If true, host successful logins will be audited.
- auditUser booleanAccount Management 
- If true, account management will be audited.
- auditing
HostRuntime Policy Auditing 
- string
- Username of the account that created the service.
- blacklistedOs HostUsers Runtime Policy Blacklisted Os Users 
- blockContainer booleanExec 
- blockCryptocurrency booleanMining 
- Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- blockDisallowed booleanImages 
- blockFileless booleanExec 
- blockNon booleanCompliant Workloads 
- blockNon booleanK8s Containers 
- blockedFiles string[]
- List of files that are prevented from being read, modified and executed in the containers.
- bypassScopes HostRuntime Policy Bypass Scope[] 
- Bypass scope configuration.
- containerExec HostRuntime Policy Container Exec 
- created string
- cve string
- defaultSecurity stringProfile 
- description string
- The description of the host runtime policy
- digest string
- driftPreventions HostRuntime Policy Drift Prevention[] 
- Drift prevention configuration.
- enableCrypto booleanMining Dns 
- enableFork booleanGuard 
- enableIp booleanReputation 
- enablePort booleanScan Protection 
- enabled boolean
- Indicates if the runtime policy is enabled or not.
- enforce boolean
- Indicates that policy should effect container execution (not just for audit).
- enforceAfter numberDays 
- Indicates the number of days after which the runtime policy will be changed to enforce mode.
- enforceScheduler numberAdded On 
- excludeApplication string[]Scopes 
- List of excluded application scopes.
- executableBlacklists HostRuntime Policy Executable Blacklist[] 
- Executable blacklist configuration.
- failedKubernetes HostChecks Runtime Policy Failed Kubernetes Checks 
- fileBlock HostRuntime Policy File Block 
- fileIntegrity HostMonitoring Runtime Policy File Integrity Monitoring 
- Configuration for file integrity monitoring.
- forkGuard numberProcess Limit 
- imageName string
- isAudit booleanChecked 
- isAuto booleanGenerated 
- isOotb booleanPolicy 
- lastupdate number
- limitContainer HostPrivileges Runtime Policy Limit Container Privilege[] 
- Container privileges configuration.
- linuxCapabilities HostRuntime Policy Linux Capabilities 
- malwareScan HostOptions Runtime Policy Malware Scan Options 
- Configuration for Real-Time Malware Protection.
- monitorSystem booleanLog Integrity 
- If true, system log will be monitored.
- monitorSystem booleanTime Changes 
- If true, system time changes will be monitored.
- monitorWindows booleanServices 
- If true, windows service operations will be monitored.
- name string
- Name of the host runtime policy
- noNew booleanPrivileges 
- onlyRegistered booleanImages 
- osGroups string[]Alloweds 
- List of OS (Linux or Windows) groups that are allowed to authenticate to the host, and block authentication requests from all others. Groups can be either Linux groups or Windows AD groups.
- osGroups string[]Blockeds 
- List of OS (Linux or Windows) groups that are not allowed to authenticate to the host, and block authentication requests from all others. Groups can be either Linux groups or Windows AD groups.
- osUsers string[]Alloweds 
- List of OS (Linux or Windows) users that are allowed to authenticate to the host, and block authentication requests from all others.
- osUsers string[]Blockeds 
- List of OS (Linux or Windows) users that are not allowed to authenticate to the host, and block authentication requests from all others.
- packageBlocks HostRuntime Policy Package Block[] 
- permission string
- portBlock HostRuntime Policy Port Block 
- readonlyFiles HostRuntime Policy Readonly Files 
- readonlyRegistry HostRuntime Policy Readonly Registry 
- registry string
- registryAccess HostMonitoring Runtime Policy Registry Access Monitoring 
- repoName string
- resourceName string
- resourceType string
- restrictedVolumes HostRuntime Policy Restricted Volume[] 
- Restricted volumes configuration.
- reverseShell HostRuntime Policy Reverse Shell 
- runtimeMode number
- runtimeType string
- scopeExpression string
- Logical expression of how to compute the dependency of the scope variables.
- scopeVariables HostRuntime Policy Scope Variable[] 
- List of scope attributes.
- scopes
HostRuntime Policy Scope[] 
- Scope configuration.
- systemIntegrity HostProtection Runtime Policy System Integrity Protection 
- tripwire
HostRuntime Policy Tripwire 
- type string
- updated string
- version string
- vpatchVersion string
- whitelistedOs HostUsers Runtime Policy Whitelisted Os Users 
- allowed_executables Sequence[HostRuntime Policy Allowed Executable Args] 
- Allowed executables configuration.
- allowed_registries Sequence[HostRuntime Policy Allowed Registry Args] 
- Allowed registries configuration.
- application_scopes Sequence[str]
- Indicates the application scope of the service.
- audit_brute_ boolforce_ login 
- Detects brute force login attempts
- audit_full_ boolcommand_ arguments 
- If true, full command arguments will be audited.
- audit_host_ boolfailed_ login_ events 
- If true, host failed logins will be audited.
- audit_host_ boolsuccessful_ login_ events 
- If true, host successful logins will be audited.
- audit_user_ boolaccount_ management 
- If true, account management will be audited.
- auditing
HostRuntime Policy Auditing Args 
- str
- Username of the account that created the service.
- blacklisted_os_ Hostusers Runtime Policy Blacklisted Os Users Args 
- block_container_ boolexec 
- block_cryptocurrency_ boolmining 
- Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- block_disallowed_ boolimages 
- block_fileless_ boolexec 
- block_non_ boolcompliant_ workloads 
- block_non_ boolk8s_ containers 
- blocked_files Sequence[str]
- List of files that are prevented from being read, modified and executed in the containers.
- bypass_scopes Sequence[HostRuntime Policy Bypass Scope Args] 
- Bypass scope configuration.
- container_exec HostRuntime Policy Container Exec Args 
- created str
- cve str
- default_security_ strprofile 
- description str
- The description of the host runtime policy
- digest str
- drift_preventions Sequence[HostRuntime Policy Drift Prevention Args] 
- Drift prevention configuration.
- enable_crypto_ boolmining_ dns 
- enable_fork_ boolguard 
- enable_ip_ boolreputation 
- enable_port_ boolscan_ protection 
- enabled bool
- Indicates if the runtime policy is enabled or not.
- enforce bool
- Indicates that policy should effect container execution (not just for audit).
- enforce_after_ intdays 
- Indicates the number of days after which the runtime policy will be changed to enforce mode.
- enforce_scheduler_ intadded_ on 
- exclude_application_ Sequence[str]scopes 
- List of excluded application scopes.
- executable_blacklists Sequence[HostRuntime Policy Executable Blacklist Args] 
- Executable blacklist configuration.
- failed_kubernetes_ Hostchecks Runtime Policy Failed Kubernetes Checks Args 
- file_block HostRuntime Policy File Block Args 
- file_integrity_ Hostmonitoring Runtime Policy File Integrity Monitoring Args 
- Configuration for file integrity monitoring.
- fork_guard_ intprocess_ limit 
- image_name str
- is_audit_ boolchecked 
- is_auto_ boolgenerated 
- is_ootb_ boolpolicy 
- lastupdate int
- limit_container_ Sequence[Hostprivileges Runtime Policy Limit Container Privilege Args] 
- Container privileges configuration.
- linux_capabilities HostRuntime Policy Linux Capabilities Args 
- malware_scan_ Hostoptions Runtime Policy Malware Scan Options Args 
- Configuration for Real-Time Malware Protection.
- monitor_system_ boollog_ integrity 
- If true, system log will be monitored.
- monitor_system_ booltime_ changes 
- If true, system time changes will be monitored.
- monitor_windows_ boolservices 
- If true, windows service operations will be monitored.
- name str
- Name of the host runtime policy
- no_new_ boolprivileges 
- only_registered_ boolimages 
- os_groups_ Sequence[str]alloweds 
- List of OS (Linux or Windows) groups that are allowed to authenticate to the host, and block authentication requests from all others. Groups can be either Linux groups or Windows AD groups.
- os_groups_ Sequence[str]blockeds 
- List of OS (Linux or Windows) groups that are not allowed to authenticate to the host, and block authentication requests from all others. Groups can be either Linux groups or Windows AD groups.
- os_users_ Sequence[str]alloweds 
- List of OS (Linux or Windows) users that are allowed to authenticate to the host, and block authentication requests from all others.
- os_users_ Sequence[str]blockeds 
- List of OS (Linux or Windows) users that are not allowed to authenticate to the host, and block authentication requests from all others.
- package_blocks Sequence[HostRuntime Policy Package Block Args] 
- permission str
- port_block HostRuntime Policy Port Block Args 
- readonly_files HostRuntime Policy Readonly Files Args 
- readonly_registry HostRuntime Policy Readonly Registry Args 
- registry str
- registry_access_ Hostmonitoring Runtime Policy Registry Access Monitoring Args 
- repo_name str
- resource_name str
- resource_type str
- restricted_volumes Sequence[HostRuntime Policy Restricted Volume Args] 
- Restricted volumes configuration.
- reverse_shell HostRuntime Policy Reverse Shell Args 
- runtime_mode int
- runtime_type str
- scope_expression str
- Logical expression of how to compute the dependency of the scope variables.
- scope_variables Sequence[HostRuntime Policy Scope Variable Args] 
- List of scope attributes.
- scopes
Sequence[HostRuntime Policy Scope Args] 
- Scope configuration.
- system_integrity_ Hostprotection Runtime Policy System Integrity Protection Args 
- tripwire
HostRuntime Policy Tripwire Args 
- type str
- updated str
- version str
- vpatch_version str
- whitelisted_os_ Hostusers Runtime Policy Whitelisted Os Users Args 
- allowedExecutables List<Property Map>
- Allowed executables configuration.
- allowedRegistries List<Property Map>
- Allowed registries configuration.
- applicationScopes List<String>
- Indicates the application scope of the service.
- auditBrute BooleanForce Login 
- Detects brute force login attempts
- auditFull BooleanCommand Arguments 
- If true, full command arguments will be audited.
- auditHost BooleanFailed Login Events 
- If true, host failed logins will be audited.
- auditHost BooleanSuccessful Login Events 
- If true, host successful logins will be audited.
- auditUser BooleanAccount Management 
- If true, account management will be audited.
- auditing Property Map
- String
- Username of the account that created the service.
- blacklistedOs Property MapUsers 
- blockContainer BooleanExec 
- blockCryptocurrency BooleanMining 
- Detect and prevent communication to DNS/IP addresses known to be used for Cryptocurrency Mining
- blockDisallowed BooleanImages 
- blockFileless BooleanExec 
- blockNon BooleanCompliant Workloads 
- blockNon BooleanK8s Containers 
- blockedFiles List<String>
- List of files that are prevented from being read, modified and executed in the containers.
- bypassScopes List<Property Map>
- Bypass scope configuration.
- containerExec Property Map
- created String
- cve String
- defaultSecurity StringProfile 
- description String
- The description of the host runtime policy
- digest String
- driftPreventions List<Property Map>
- Drift prevention configuration.
- enableCrypto BooleanMining Dns 
- enableFork BooleanGuard 
- enableIp BooleanReputation 
- enablePort BooleanScan Protection 
- enabled Boolean
- Indicates if the runtime policy is enabled or not.
- enforce Boolean
- Indicates that policy should effect container execution (not just for audit).
- enforceAfter NumberDays 
- Indicates the number of days after which the runtime policy will be changed to enforce mode.
- enforceScheduler NumberAdded On 
- excludeApplication List<String>Scopes 
- List of excluded application scopes.
- executableBlacklists List<Property Map>
- Executable blacklist configuration.
- failedKubernetes Property MapChecks 
- fileBlock Property Map
- fileIntegrity Property MapMonitoring 
- Configuration for file integrity monitoring.
- forkGuard NumberProcess Limit 
- imageName String
- isAudit BooleanChecked 
- isAuto BooleanGenerated 
- isOotb BooleanPolicy 
- lastupdate Number
- limitContainer List<Property Map>Privileges 
- Container privileges configuration.
- linuxCapabilities Property Map
- malwareScan Property MapOptions 
- Configuration for Real-Time Malware Protection.
- monitorSystem BooleanLog Integrity 
- If true, system log will be monitored.
- monitorSystem BooleanTime Changes 
- If true, system time changes will be monitored.
- monitorWindows BooleanServices 
- If true, windows service operations will be monitored.
- name String
- Name of the host runtime policy
- noNew BooleanPrivileges 
- onlyRegistered BooleanImages 
- osGroups List<String>Alloweds 
- List of OS (Linux or Windows) groups that are allowed to authenticate to the host, and block authentication requests from all others. Groups can be either Linux groups or Windows AD groups.
- osGroups List<String>Blockeds 
- List of OS (Linux or Windows) groups that are not allowed to authenticate to the host, and block authentication requests from all others. Groups can be either Linux groups or Windows AD groups.
- osUsers List<String>Alloweds 
- List of OS (Linux or Windows) users that are allowed to authenticate to the host, and block authentication requests from all others.
- osUsers List<String>Blockeds 
- List of OS (Linux or Windows) users that are not allowed to authenticate to the host, and block authentication requests from all others.
- packageBlocks List<Property Map>
- permission String
- portBlock Property Map
- readonlyFiles Property Map
- readonlyRegistry Property Map
- registry String
- registryAccess Property MapMonitoring 
- repoName String
- resourceName String
- resourceType String
- restrictedVolumes List<Property Map>
- Restricted volumes configuration.
- reverseShell Property Map
- runtimeMode Number
- runtimeType String
- scopeExpression String
- Logical expression of how to compute the dependency of the scope variables.
- scopeVariables List<Property Map>
- List of scope attributes.
- scopes List<Property Map>
- Scope configuration.
- systemIntegrity Property MapProtection 
- tripwire Property Map
- type String
- updated String
- version String
- vpatchVersion String
- whitelistedOs Property MapUsers 
Supporting Types
HostRuntimePolicyAllowedExecutable, HostRuntimePolicyAllowedExecutableArgs          
- AllowExecutables List<string>
- List of allowed executables.
- AllowRoot List<string>Executables 
- List of allowed root executables.
- Enabled bool
- Whether allowed executables configuration is enabled.
- SeparateExecutables bool
- Whether to treat executables separately.
- AllowExecutables []string
- List of allowed executables.
- AllowRoot []stringExecutables 
- List of allowed root executables.
- Enabled bool
- Whether allowed executables configuration is enabled.
- SeparateExecutables bool
- Whether to treat executables separately.
- allowExecutables List<String>
- List of allowed executables.
- allowRoot List<String>Executables 
- List of allowed root executables.
- enabled Boolean
- Whether allowed executables configuration is enabled.
- separateExecutables Boolean
- Whether to treat executables separately.
- allowExecutables string[]
- List of allowed executables.
- allowRoot string[]Executables 
- List of allowed root executables.
- enabled boolean
- Whether allowed executables configuration is enabled.
- separateExecutables boolean
- Whether to treat executables separately.
- allow_executables Sequence[str]
- List of allowed executables.
- allow_root_ Sequence[str]executables 
- List of allowed root executables.
- enabled bool
- Whether allowed executables configuration is enabled.
- separate_executables bool
- Whether to treat executables separately.
- allowExecutables List<String>
- List of allowed executables.
- allowRoot List<String>Executables 
- List of allowed root executables.
- enabled Boolean
- Whether allowed executables configuration is enabled.
- separateExecutables Boolean
- Whether to treat executables separately.
HostRuntimePolicyAllowedRegistry, HostRuntimePolicyAllowedRegistryArgs          
- AllowedRegistries List<string>
- List of allowed registries.
- Enabled bool
- Whether allowed registries are enabled.
- AllowedRegistries []string
- List of allowed registries.
- Enabled bool
- Whether allowed registries are enabled.
- allowedRegistries List<String>
- List of allowed registries.
- enabled Boolean
- Whether allowed registries are enabled.
- allowedRegistries string[]
- List of allowed registries.
- enabled boolean
- Whether allowed registries are enabled.
- allowed_registries Sequence[str]
- List of allowed registries.
- enabled bool
- Whether allowed registries are enabled.
- allowedRegistries List<String>
- List of allowed registries.
- enabled Boolean
- Whether allowed registries are enabled.
HostRuntimePolicyAuditing, HostRuntimePolicyAuditingArgs        
- AuditAll boolNetwork 
- AuditAll boolProcesses 
- AuditFailed boolLogin 
- AuditOs boolUser Activity 
- AuditProcess boolCmdline 
- AuditSuccess boolLogin 
- AuditUser boolAccount Management 
- Enabled bool
- AuditAll boolNetwork 
- AuditAll boolProcesses 
- AuditFailed boolLogin 
- AuditOs boolUser Activity 
- AuditProcess boolCmdline 
- AuditSuccess boolLogin 
- AuditUser boolAccount Management 
- Enabled bool
- auditAll BooleanNetwork 
- auditAll BooleanProcesses 
- auditFailed BooleanLogin 
- auditOs BooleanUser Activity 
- auditProcess BooleanCmdline 
- auditSuccess BooleanLogin 
- auditUser BooleanAccount Management 
- enabled Boolean
- auditAll booleanNetwork 
- auditAll booleanProcesses 
- auditFailed booleanLogin 
- auditOs booleanUser Activity 
- auditProcess booleanCmdline 
- auditSuccess booleanLogin 
- auditUser booleanAccount Management 
- enabled boolean
- audit_all_ boolnetwork 
- audit_all_ boolprocesses 
- audit_failed_ boollogin 
- audit_os_ booluser_ activity 
- audit_process_ boolcmdline 
- audit_success_ boollogin 
- audit_user_ boolaccount_ management 
- enabled bool
- auditAll BooleanNetwork 
- auditAll BooleanProcesses 
- auditFailed BooleanLogin 
- auditOs BooleanUser Activity 
- auditProcess BooleanCmdline 
- auditSuccess BooleanLogin 
- auditUser BooleanAccount Management 
- enabled Boolean
HostRuntimePolicyBlacklistedOsUsers, HostRuntimePolicyBlacklistedOsUsersArgs            
- Enabled bool
- GroupBlack List<string>Lists 
- UserBlack List<string>Lists 
- Enabled bool
- GroupBlack []stringLists 
- UserBlack []stringLists 
- enabled Boolean
- groupBlack List<String>Lists 
- userBlack List<String>Lists 
- enabled boolean
- groupBlack string[]Lists 
- userBlack string[]Lists 
- enabled bool
- group_black_ Sequence[str]lists 
- user_black_ Sequence[str]lists 
- enabled Boolean
- groupBlack List<String>Lists 
- userBlack List<String>Lists 
HostRuntimePolicyBypassScope, HostRuntimePolicyBypassScopeArgs          
- Enabled bool
- Whether bypassing the scope is enabled.
- Scopes
List<Pulumiverse.Aquasec. Inputs. Host Runtime Policy Bypass Scope Scope> 
- Scope configuration.
- Enabled bool
- Whether bypassing the scope is enabled.
- Scopes
[]HostRuntime Policy Bypass Scope Scope 
- Scope configuration.
- enabled Boolean
- Whether bypassing the scope is enabled.
- scopes
List<HostRuntime Policy Bypass Scope Scope> 
- Scope configuration.
- enabled boolean
- Whether bypassing the scope is enabled.
- scopes
HostRuntime Policy Bypass Scope Scope[] 
- Scope configuration.
- enabled bool
- Whether bypassing the scope is enabled.
- scopes
Sequence[HostRuntime Policy Bypass Scope Scope] 
- Scope configuration.
- enabled Boolean
- Whether bypassing the scope is enabled.
- scopes List<Property Map>
- Scope configuration.
HostRuntimePolicyBypassScopeScope, HostRuntimePolicyBypassScopeScopeArgs            
- Expression string
- Scope expression.
- Variables
List<Pulumiverse.Aquasec. Inputs. Host Runtime Policy Bypass Scope Scope Variable> 
- List of variables in the scope.
- Expression string
- Scope expression.
- Variables
[]HostRuntime Policy Bypass Scope Scope Variable 
- List of variables in the scope.
- expression String
- Scope expression.
- variables
List<HostRuntime Policy Bypass Scope Scope Variable> 
- List of variables in the scope.
- expression string
- Scope expression.
- variables
HostRuntime Policy Bypass Scope Scope Variable[] 
- List of variables in the scope.
- expression str
- Scope expression.
- variables
Sequence[HostRuntime Policy Bypass Scope Scope Variable] 
- List of variables in the scope.
- expression String
- Scope expression.
- variables List<Property Map>
- List of variables in the scope.
HostRuntimePolicyBypassScopeScopeVariable, HostRuntimePolicyBypassScopeScopeVariableArgs              
HostRuntimePolicyContainerExec, HostRuntimePolicyContainerExecArgs          
- BlockContainer boolExec 
- ContainerExec List<string>Proc White Lists 
- Enabled bool
- ReverseShell List<string>Ip White Lists 
- BlockContainer boolExec 
- ContainerExec []stringProc White Lists 
- Enabled bool
- ReverseShell []stringIp White Lists 
- blockContainer BooleanExec 
- containerExec List<String>Proc White Lists 
- enabled Boolean
- reverseShell List<String>Ip White Lists 
- blockContainer booleanExec 
- containerExec string[]Proc White Lists 
- enabled boolean
- reverseShell string[]Ip White Lists 
- block_container_ boolexec 
- container_exec_ Sequence[str]proc_ white_ lists 
- enabled bool
- reverse_shell_ Sequence[str]ip_ white_ lists 
- blockContainer BooleanExec 
- containerExec List<String>Proc White Lists 
- enabled Boolean
- reverseShell List<String>Ip White Lists 
HostRuntimePolicyDriftPrevention, HostRuntimePolicyDriftPreventionArgs          
- Enabled bool
- Whether drift prevention is enabled.
- ExecLockdown bool
- Whether to lockdown execution drift.
- ExecLockdown List<string>White Lists 
- List of items in the execution lockdown white list.
- ImageLockdown bool
- Whether to lockdown image drift.
- Enabled bool
- Whether drift prevention is enabled.
- ExecLockdown bool
- Whether to lockdown execution drift.
- ExecLockdown []stringWhite Lists 
- List of items in the execution lockdown white list.
- ImageLockdown bool
- Whether to lockdown image drift.
- enabled Boolean
- Whether drift prevention is enabled.
- execLockdown Boolean
- Whether to lockdown execution drift.
- execLockdown List<String>White Lists 
- List of items in the execution lockdown white list.
- imageLockdown Boolean
- Whether to lockdown image drift.
- enabled boolean
- Whether drift prevention is enabled.
- execLockdown boolean
- Whether to lockdown execution drift.
- execLockdown string[]White Lists 
- List of items in the execution lockdown white list.
- imageLockdown boolean
- Whether to lockdown image drift.
- enabled bool
- Whether drift prevention is enabled.
- exec_lockdown bool
- Whether to lockdown execution drift.
- exec_lockdown_ Sequence[str]white_ lists 
- List of items in the execution lockdown white list.
- image_lockdown bool
- Whether to lockdown image drift.
- enabled Boolean
- Whether drift prevention is enabled.
- execLockdown Boolean
- Whether to lockdown execution drift.
- execLockdown List<String>White Lists 
- List of items in the execution lockdown white list.
- imageLockdown Boolean
- Whether to lockdown image drift.
HostRuntimePolicyExecutableBlacklist, HostRuntimePolicyExecutableBlacklistArgs          
- Enabled bool
- Whether the executable blacklist is enabled.
- Executables List<string>
- List of blacklisted executables.
- Enabled bool
- Whether the executable blacklist is enabled.
- Executables []string
- List of blacklisted executables.
- enabled Boolean
- Whether the executable blacklist is enabled.
- executables List<String>
- List of blacklisted executables.
- enabled boolean
- Whether the executable blacklist is enabled.
- executables string[]
- List of blacklisted executables.
- enabled bool
- Whether the executable blacklist is enabled.
- executables Sequence[str]
- List of blacklisted executables.
- enabled Boolean
- Whether the executable blacklist is enabled.
- executables List<String>
- List of blacklisted executables.
HostRuntimePolicyFailedKubernetesChecks, HostRuntimePolicyFailedKubernetesChecksArgs            
- Enabled bool
- FailedChecks List<string>
- Enabled bool
- FailedChecks []string
- enabled Boolean
- failedChecks List<String>
- enabled boolean
- failedChecks string[]
- enabled bool
- failed_checks Sequence[str]
- enabled Boolean
- failedChecks List<String>
HostRuntimePolicyFileBlock, HostRuntimePolicyFileBlockArgs          
- BlockFiles List<string>Processes 
- BlockFiles List<string>Users 
- Enabled bool
- ExceptionalBlock List<string>Files 
- ExceptionalBlock List<string>Files Processes 
- ExceptionalBlock List<string>Files Users 
- FilenameBlock List<string>Lists 
- BlockFiles []stringProcesses 
- BlockFiles []stringUsers 
- Enabled bool
- ExceptionalBlock []stringFiles 
- ExceptionalBlock []stringFiles Processes 
- ExceptionalBlock []stringFiles Users 
- FilenameBlock []stringLists 
- blockFiles List<String>Processes 
- blockFiles List<String>Users 
- enabled Boolean
- exceptionalBlock List<String>Files 
- exceptionalBlock List<String>Files Processes 
- exceptionalBlock List<String>Files Users 
- filenameBlock List<String>Lists 
- blockFiles string[]Processes 
- blockFiles string[]Users 
- enabled boolean
- exceptionalBlock string[]Files 
- exceptionalBlock string[]Files Processes 
- exceptionalBlock string[]Files Users 
- filenameBlock string[]Lists 
- block_files_ Sequence[str]processes 
- block_files_ Sequence[str]users 
- enabled bool
- exceptional_block_ Sequence[str]files 
- exceptional_block_ Sequence[str]files_ processes 
- exceptional_block_ Sequence[str]files_ users 
- filename_block_ Sequence[str]lists 
- blockFiles List<String>Processes 
- blockFiles List<String>Users 
- enabled Boolean
- exceptionalBlock List<String>Files 
- exceptionalBlock List<String>Files Processes 
- exceptionalBlock List<String>Files Users 
- filenameBlock List<String>Lists 
HostRuntimePolicyFileIntegrityMonitoring, HostRuntimePolicyFileIntegrityMonitoringArgs            
- Enabled bool
- If true, file integrity monitoring is enabled.
- ExceptionalMonitored List<string>Files 
- List of paths to be excluded from monitoring.
- ExceptionalMonitored List<string>Files Processes 
- List of processes to be excluded from monitoring.
- ExceptionalMonitored List<string>Files Users 
- List of users to be excluded from monitoring.
- MonitoredFiles List<string>
- List of paths to be monitored.
- MonitoredFiles boolAttributes 
- Whether to monitor file attribute operations.
- MonitoredFiles boolCreate 
- Whether to monitor file create operations.
- MonitoredFiles boolDelete 
- Whether to monitor file delete operations.
- MonitoredFiles boolModify 
- Whether to monitor file modify operations.
- MonitoredFiles List<string>Processes 
- List of processes associated with monitored files.
- MonitoredFiles boolRead 
- Whether to monitor file read operations.
- MonitoredFiles List<string>Users 
- List of users associated with monitored files.
- Enabled bool
- If true, file integrity monitoring is enabled.
- ExceptionalMonitored []stringFiles 
- List of paths to be excluded from monitoring.
- ExceptionalMonitored []stringFiles Processes 
- List of processes to be excluded from monitoring.
- ExceptionalMonitored []stringFiles Users 
- List of users to be excluded from monitoring.
- MonitoredFiles []string
- List of paths to be monitored.
- MonitoredFiles boolAttributes 
- Whether to monitor file attribute operations.
- MonitoredFiles boolCreate 
- Whether to monitor file create operations.
- MonitoredFiles boolDelete 
- Whether to monitor file delete operations.
- MonitoredFiles boolModify 
- Whether to monitor file modify operations.
- MonitoredFiles []stringProcesses 
- List of processes associated with monitored files.
- MonitoredFiles boolRead 
- Whether to monitor file read operations.
- MonitoredFiles []stringUsers 
- List of users associated with monitored files.
- enabled Boolean
- If true, file integrity monitoring is enabled.
- exceptionalMonitored List<String>Files 
- List of paths to be excluded from monitoring.
- exceptionalMonitored List<String>Files Processes 
- List of processes to be excluded from monitoring.
- exceptionalMonitored List<String>Files Users 
- List of users to be excluded from monitoring.
- monitoredFiles List<String>
- List of paths to be monitored.
- monitoredFiles BooleanAttributes 
- Whether to monitor file attribute operations.
- monitoredFiles BooleanCreate 
- Whether to monitor file create operations.
- monitoredFiles BooleanDelete 
- Whether to monitor file delete operations.
- monitoredFiles BooleanModify 
- Whether to monitor file modify operations.
- monitoredFiles List<String>Processes 
- List of processes associated with monitored files.
- monitoredFiles BooleanRead 
- Whether to monitor file read operations.
- monitoredFiles List<String>Users 
- List of users associated with monitored files.
- enabled boolean
- If true, file integrity monitoring is enabled.
- exceptionalMonitored string[]Files 
- List of paths to be excluded from monitoring.
- exceptionalMonitored string[]Files Processes 
- List of processes to be excluded from monitoring.
- exceptionalMonitored string[]Files Users 
- List of users to be excluded from monitoring.
- monitoredFiles string[]
- List of paths to be monitored.
- monitoredFiles booleanAttributes 
- Whether to monitor file attribute operations.
- monitoredFiles booleanCreate 
- Whether to monitor file create operations.
- monitoredFiles booleanDelete 
- Whether to monitor file delete operations.
- monitoredFiles booleanModify 
- Whether to monitor file modify operations.
- monitoredFiles string[]Processes 
- List of processes associated with monitored files.
- monitoredFiles booleanRead 
- Whether to monitor file read operations.
- monitoredFiles string[]Users 
- List of users associated with monitored files.
- enabled bool
- If true, file integrity monitoring is enabled.
- exceptional_monitored_ Sequence[str]files 
- List of paths to be excluded from monitoring.
- exceptional_monitored_ Sequence[str]files_ processes 
- List of processes to be excluded from monitoring.
- exceptional_monitored_ Sequence[str]files_ users 
- List of users to be excluded from monitoring.
- monitored_files Sequence[str]
- List of paths to be monitored.
- monitored_files_ boolattributes 
- Whether to monitor file attribute operations.
- monitored_files_ boolcreate 
- Whether to monitor file create operations.
- monitored_files_ booldelete 
- Whether to monitor file delete operations.
- monitored_files_ boolmodify 
- Whether to monitor file modify operations.
- monitored_files_ Sequence[str]processes 
- List of processes associated with monitored files.
- monitored_files_ boolread 
- Whether to monitor file read operations.
- monitored_files_ Sequence[str]users 
- List of users associated with monitored files.
- enabled Boolean
- If true, file integrity monitoring is enabled.
- exceptionalMonitored List<String>Files 
- List of paths to be excluded from monitoring.
- exceptionalMonitored List<String>Files Processes 
- List of processes to be excluded from monitoring.
- exceptionalMonitored List<String>Files Users 
- List of users to be excluded from monitoring.
- monitoredFiles List<String>
- List of paths to be monitored.
- monitoredFiles BooleanAttributes 
- Whether to monitor file attribute operations.
- monitoredFiles BooleanCreate 
- Whether to monitor file create operations.
- monitoredFiles BooleanDelete 
- Whether to monitor file delete operations.
- monitoredFiles BooleanModify 
- Whether to monitor file modify operations.
- monitoredFiles List<String>Processes 
- List of processes associated with monitored files.
- monitoredFiles BooleanRead 
- Whether to monitor file read operations.
- monitoredFiles List<String>Users 
- List of users associated with monitored files.
HostRuntimePolicyLimitContainerPrivilege, HostRuntimePolicyLimitContainerPrivilegeArgs            
- BlockAdd boolCapabilities 
- Whether to block adding capabilities.
- Enabled bool
- Whether container privilege limitations are enabled.
- Ipcmode bool
- Whether to limit IPC-related capabilities.
- Netmode bool
- Whether to limit network-related capabilities.
- Pidmode bool
- Whether to limit process-related capabilities.
- PreventLow boolPort Binding 
- Whether to prevent low port binding.
- PreventRoot boolUser 
- Whether to prevent the use of the root user.
- Privileged bool
- Whether the container is run in privileged mode.
- UseHost boolUser 
- Whether to use the host user.
- Usermode bool
- Whether to limit user-related capabilities.
- Utsmode bool
- Whether to limit UTS-related capabilities.
- BlockAdd boolCapabilities 
- Whether to block adding capabilities.
- Enabled bool
- Whether container privilege limitations are enabled.
- Ipcmode bool
- Whether to limit IPC-related capabilities.
- Netmode bool
- Whether to limit network-related capabilities.
- Pidmode bool
- Whether to limit process-related capabilities.
- PreventLow boolPort Binding 
- Whether to prevent low port binding.
- PreventRoot boolUser 
- Whether to prevent the use of the root user.
- Privileged bool
- Whether the container is run in privileged mode.
- UseHost boolUser 
- Whether to use the host user.
- Usermode bool
- Whether to limit user-related capabilities.
- Utsmode bool
- Whether to limit UTS-related capabilities.
- blockAdd BooleanCapabilities 
- Whether to block adding capabilities.
- enabled Boolean
- Whether container privilege limitations are enabled.
- ipcmode Boolean
- Whether to limit IPC-related capabilities.
- netmode Boolean
- Whether to limit network-related capabilities.
- pidmode Boolean
- Whether to limit process-related capabilities.
- preventLow BooleanPort Binding 
- Whether to prevent low port binding.
- preventRoot BooleanUser 
- Whether to prevent the use of the root user.
- privileged Boolean
- Whether the container is run in privileged mode.
- useHost BooleanUser 
- Whether to use the host user.
- usermode Boolean
- Whether to limit user-related capabilities.
- utsmode Boolean
- Whether to limit UTS-related capabilities.
- blockAdd booleanCapabilities 
- Whether to block adding capabilities.
- enabled boolean
- Whether container privilege limitations are enabled.
- ipcmode boolean
- Whether to limit IPC-related capabilities.
- netmode boolean
- Whether to limit network-related capabilities.
- pidmode boolean
- Whether to limit process-related capabilities.
- preventLow booleanPort Binding 
- Whether to prevent low port binding.
- preventRoot booleanUser 
- Whether to prevent the use of the root user.
- privileged boolean
- Whether the container is run in privileged mode.
- useHost booleanUser 
- Whether to use the host user.
- usermode boolean
- Whether to limit user-related capabilities.
- utsmode boolean
- Whether to limit UTS-related capabilities.
- block_add_ boolcapabilities 
- Whether to block adding capabilities.
- enabled bool
- Whether container privilege limitations are enabled.
- ipcmode bool
- Whether to limit IPC-related capabilities.
- netmode bool
- Whether to limit network-related capabilities.
- pidmode bool
- Whether to limit process-related capabilities.
- prevent_low_ boolport_ binding 
- Whether to prevent low port binding.
- prevent_root_ booluser 
- Whether to prevent the use of the root user.
- privileged bool
- Whether the container is run in privileged mode.
- use_host_ booluser 
- Whether to use the host user.
- usermode bool
- Whether to limit user-related capabilities.
- utsmode bool
- Whether to limit UTS-related capabilities.
- blockAdd BooleanCapabilities 
- Whether to block adding capabilities.
- enabled Boolean
- Whether container privilege limitations are enabled.
- ipcmode Boolean
- Whether to limit IPC-related capabilities.
- netmode Boolean
- Whether to limit network-related capabilities.
- pidmode Boolean
- Whether to limit process-related capabilities.
- preventLow BooleanPort Binding 
- Whether to prevent low port binding.
- preventRoot BooleanUser 
- Whether to prevent the use of the root user.
- privileged Boolean
- Whether the container is run in privileged mode.
- useHost BooleanUser 
- Whether to use the host user.
- usermode Boolean
- Whether to limit user-related capabilities.
- utsmode Boolean
- Whether to limit UTS-related capabilities.
HostRuntimePolicyLinuxCapabilities, HostRuntimePolicyLinuxCapabilitiesArgs          
- Enabled bool
- RemoveLinux List<string>Capabilities 
- Enabled bool
- RemoveLinux []stringCapabilities 
- enabled Boolean
- removeLinux List<String>Capabilities 
- enabled boolean
- removeLinux string[]Capabilities 
- enabled bool
- remove_linux_ Sequence[str]capabilities 
- enabled Boolean
- removeLinux List<String>Capabilities 
HostRuntimePolicyMalwareScanOptions, HostRuntimePolicyMalwareScanOptionsArgs            
- Action string
- Set Action, Defaults to 'Alert' when empty
- Enabled bool
- Defines if enabled or not
- ExcludeDirectories List<string>
- List of registry paths to be excluded from being protected.
- ExcludeProcesses List<string>
- List of registry processes to be excluded from being protected.
- IncludeDirectories List<string>
- List of registry paths to be excluded from being protected.
- Action string
- Set Action, Defaults to 'Alert' when empty
- Enabled bool
- Defines if enabled or not
- ExcludeDirectories []string
- List of registry paths to be excluded from being protected.
- ExcludeProcesses []string
- List of registry processes to be excluded from being protected.
- IncludeDirectories []string
- List of registry paths to be excluded from being protected.
- action String
- Set Action, Defaults to 'Alert' when empty
- enabled Boolean
- Defines if enabled or not
- excludeDirectories List<String>
- List of registry paths to be excluded from being protected.
- excludeProcesses List<String>
- List of registry processes to be excluded from being protected.
- includeDirectories List<String>
- List of registry paths to be excluded from being protected.
- action string
- Set Action, Defaults to 'Alert' when empty
- enabled boolean
- Defines if enabled or not
- excludeDirectories string[]
- List of registry paths to be excluded from being protected.
- excludeProcesses string[]
- List of registry processes to be excluded from being protected.
- includeDirectories string[]
- List of registry paths to be excluded from being protected.
- action str
- Set Action, Defaults to 'Alert' when empty
- enabled bool
- Defines if enabled or not
- exclude_directories Sequence[str]
- List of registry paths to be excluded from being protected.
- exclude_processes Sequence[str]
- List of registry processes to be excluded from being protected.
- include_directories Sequence[str]
- List of registry paths to be excluded from being protected.
- action String
- Set Action, Defaults to 'Alert' when empty
- enabled Boolean
- Defines if enabled or not
- excludeDirectories List<String>
- List of registry paths to be excluded from being protected.
- excludeProcesses List<String>
- List of registry processes to be excluded from being protected.
- includeDirectories List<String>
- List of registry paths to be excluded from being protected.
HostRuntimePolicyPackageBlock, HostRuntimePolicyPackageBlockArgs          
- BlockPackages List<string>Processes 
- BlockPackages List<string>Users 
- Enabled bool
- ExceptionalBlock List<string>Packages Files 
- ExceptionalBlock List<string>Packages Processes 
- ExceptionalBlock List<string>Packages Users 
- PackagesBlack List<string>Lists 
- BlockPackages []stringProcesses 
- BlockPackages []stringUsers 
- Enabled bool
- ExceptionalBlock []stringPackages Files 
- ExceptionalBlock []stringPackages Processes 
- ExceptionalBlock []stringPackages Users 
- PackagesBlack []stringLists 
- blockPackages List<String>Processes 
- blockPackages List<String>Users 
- enabled Boolean
- exceptionalBlock List<String>Packages Files 
- exceptionalBlock List<String>Packages Processes 
- exceptionalBlock List<String>Packages Users 
- packagesBlack List<String>Lists 
- blockPackages string[]Processes 
- blockPackages string[]Users 
- enabled boolean
- exceptionalBlock string[]Packages Files 
- exceptionalBlock string[]Packages Processes 
- exceptionalBlock string[]Packages Users 
- packagesBlack string[]Lists 
- block_packages_ Sequence[str]processes 
- block_packages_ Sequence[str]users 
- enabled bool
- exceptional_block_ Sequence[str]packages_ files 
- exceptional_block_ Sequence[str]packages_ processes 
- exceptional_block_ Sequence[str]packages_ users 
- packages_black_ Sequence[str]lists 
- blockPackages List<String>Processes 
- blockPackages List<String>Users 
- enabled Boolean
- exceptionalBlock List<String>Packages Files 
- exceptionalBlock List<String>Packages Processes 
- exceptionalBlock List<String>Packages Users 
- packagesBlack List<String>Lists 
HostRuntimePolicyPortBlock, HostRuntimePolicyPortBlockArgs          
- BlockInbound List<string>Ports 
- BlockOutbound List<string>Ports 
- Enabled bool
- BlockInbound []stringPorts 
- BlockOutbound []stringPorts 
- Enabled bool
- blockInbound List<String>Ports 
- blockOutbound List<String>Ports 
- enabled Boolean
- blockInbound string[]Ports 
- blockOutbound string[]Ports 
- enabled boolean
- block_inbound_ Sequence[str]ports 
- block_outbound_ Sequence[str]ports 
- enabled bool
- blockInbound List<String>Ports 
- blockOutbound List<String>Ports 
- enabled Boolean
HostRuntimePolicyReadonlyFiles, HostRuntimePolicyReadonlyFilesArgs          
- Enabled bool
- ExceptionalReadonly List<string>Files 
- ExceptionalReadonly List<string>Files Processes 
- ExceptionalReadonly List<string>Files Users 
- ReadonlyFiles List<string>
- ReadonlyFiles List<string>Processes 
- ReadonlyFiles List<string>Users 
- Enabled bool
- ExceptionalReadonly []stringFiles 
- ExceptionalReadonly []stringFiles Processes 
- ExceptionalReadonly []stringFiles Users 
- ReadonlyFiles []string
- ReadonlyFiles []stringProcesses 
- ReadonlyFiles []stringUsers 
- enabled Boolean
- exceptionalReadonly List<String>Files 
- exceptionalReadonly List<String>Files Processes 
- exceptionalReadonly List<String>Files Users 
- readonlyFiles List<String>
- readonlyFiles List<String>Processes 
- readonlyFiles List<String>Users 
- enabled boolean
- exceptionalReadonly string[]Files 
- exceptionalReadonly string[]Files Processes 
- exceptionalReadonly string[]Files Users 
- readonlyFiles string[]
- readonlyFiles string[]Processes 
- readonlyFiles string[]Users 
- enabled bool
- exceptional_readonly_ Sequence[str]files 
- exceptional_readonly_ Sequence[str]files_ processes 
- exceptional_readonly_ Sequence[str]files_ users 
- readonly_files Sequence[str]
- readonly_files_ Sequence[str]processes 
- readonly_files_ Sequence[str]users 
- enabled Boolean
- exceptionalReadonly List<String>Files 
- exceptionalReadonly List<String>Files Processes 
- exceptionalReadonly List<String>Files Users 
- readonlyFiles List<String>
- readonlyFiles List<String>Processes 
- readonlyFiles List<String>Users 
HostRuntimePolicyReadonlyRegistry, HostRuntimePolicyReadonlyRegistryArgs          
- Enabled bool
- ExceptionalReadonly List<string>Registry Paths 
- ExceptionalReadonly List<string>Registry Processes 
- ExceptionalReadonly List<string>Registry Users 
- ReadonlyRegistry List<string>Paths 
- ReadonlyRegistry List<string>Processes 
- ReadonlyRegistry List<string>Users 
- Enabled bool
- ExceptionalReadonly []stringRegistry Paths 
- ExceptionalReadonly []stringRegistry Processes 
- ExceptionalReadonly []stringRegistry Users 
- ReadonlyRegistry []stringPaths 
- ReadonlyRegistry []stringProcesses 
- ReadonlyRegistry []stringUsers 
- enabled Boolean
- exceptionalReadonly List<String>Registry Paths 
- exceptionalReadonly List<String>Registry Processes 
- exceptionalReadonly List<String>Registry Users 
- readonlyRegistry List<String>Paths 
- readonlyRegistry List<String>Processes 
- readonlyRegistry List<String>Users 
- enabled boolean
- exceptionalReadonly string[]Registry Paths 
- exceptionalReadonly string[]Registry Processes 
- exceptionalReadonly string[]Registry Users 
- readonlyRegistry string[]Paths 
- readonlyRegistry string[]Processes 
- readonlyRegistry string[]Users 
- enabled bool
- exceptional_readonly_ Sequence[str]registry_ paths 
- exceptional_readonly_ Sequence[str]registry_ processes 
- exceptional_readonly_ Sequence[str]registry_ users 
- readonly_registry_ Sequence[str]paths 
- readonly_registry_ Sequence[str]processes 
- readonly_registry_ Sequence[str]users 
- enabled Boolean
- exceptionalReadonly List<String>Registry Paths 
- exceptionalReadonly List<String>Registry Processes 
- exceptionalReadonly List<String>Registry Users 
- readonlyRegistry List<String>Paths 
- readonlyRegistry List<String>Processes 
- readonlyRegistry List<String>Users 
HostRuntimePolicyRegistryAccessMonitoring, HostRuntimePolicyRegistryAccessMonitoringArgs            
- Enabled bool
- ExceptionalMonitored List<string>Registry Paths 
- ExceptionalMonitored List<string>Registry Processes 
- ExceptionalMonitored List<string>Registry Users 
- MonitoredRegistry boolAttributes 
- MonitoredRegistry boolCreate 
- MonitoredRegistry boolDelete 
- MonitoredRegistry boolModify 
- MonitoredRegistry List<string>Paths 
- MonitoredRegistry List<string>Processes 
- MonitoredRegistry boolRead 
- MonitoredRegistry List<string>Users 
- Enabled bool
- ExceptionalMonitored []stringRegistry Paths 
- ExceptionalMonitored []stringRegistry Processes 
- ExceptionalMonitored []stringRegistry Users 
- MonitoredRegistry boolAttributes 
- MonitoredRegistry boolCreate 
- MonitoredRegistry boolDelete 
- MonitoredRegistry boolModify 
- MonitoredRegistry []stringPaths 
- MonitoredRegistry []stringProcesses 
- MonitoredRegistry boolRead 
- MonitoredRegistry []stringUsers 
- enabled Boolean
- exceptionalMonitored List<String>Registry Paths 
- exceptionalMonitored List<String>Registry Processes 
- exceptionalMonitored List<String>Registry Users 
- monitoredRegistry BooleanAttributes 
- monitoredRegistry BooleanCreate 
- monitoredRegistry BooleanDelete 
- monitoredRegistry BooleanModify 
- monitoredRegistry List<String>Paths 
- monitoredRegistry List<String>Processes 
- monitoredRegistry BooleanRead 
- monitoredRegistry List<String>Users 
- enabled boolean
- exceptionalMonitored string[]Registry Paths 
- exceptionalMonitored string[]Registry Processes 
- exceptionalMonitored string[]Registry Users 
- monitoredRegistry booleanAttributes 
- monitoredRegistry booleanCreate 
- monitoredRegistry booleanDelete 
- monitoredRegistry booleanModify 
- monitoredRegistry string[]Paths 
- monitoredRegistry string[]Processes 
- monitoredRegistry booleanRead 
- monitoredRegistry string[]Users 
- enabled bool
- exceptional_monitored_ Sequence[str]registry_ paths 
- exceptional_monitored_ Sequence[str]registry_ processes 
- exceptional_monitored_ Sequence[str]registry_ users 
- monitored_registry_ boolattributes 
- monitored_registry_ boolcreate 
- monitored_registry_ booldelete 
- monitored_registry_ boolmodify 
- monitored_registry_ Sequence[str]paths 
- monitored_registry_ Sequence[str]processes 
- monitored_registry_ boolread 
- monitored_registry_ Sequence[str]users 
- enabled Boolean
- exceptionalMonitored List<String>Registry Paths 
- exceptionalMonitored List<String>Registry Processes 
- exceptionalMonitored List<String>Registry Users 
- monitoredRegistry BooleanAttributes 
- monitoredRegistry BooleanCreate 
- monitoredRegistry BooleanDelete 
- monitoredRegistry BooleanModify 
- monitoredRegistry List<String>Paths 
- monitoredRegistry List<String>Processes 
- monitoredRegistry BooleanRead 
- monitoredRegistry List<String>Users 
HostRuntimePolicyRestrictedVolume, HostRuntimePolicyRestrictedVolumeArgs          
HostRuntimePolicyReverseShell, HostRuntimePolicyReverseShellArgs          
- BlockReverse boolShell 
- Enabled bool
- ReverseShell List<string>Ip White Lists 
- ReverseShell List<string>Proc White Lists 
- BlockReverse boolShell 
- Enabled bool
- ReverseShell []stringIp White Lists 
- ReverseShell []stringProc White Lists 
- blockReverse BooleanShell 
- enabled Boolean
- reverseShell List<String>Ip White Lists 
- reverseShell List<String>Proc White Lists 
- blockReverse booleanShell 
- enabled boolean
- reverseShell string[]Ip White Lists 
- reverseShell string[]Proc White Lists 
- block_reverse_ boolshell 
- enabled bool
- reverse_shell_ Sequence[str]ip_ white_ lists 
- reverse_shell_ Sequence[str]proc_ white_ lists 
- blockReverse BooleanShell 
- enabled Boolean
- reverseShell List<String>Ip White Lists 
- reverseShell List<String>Proc White Lists 
HostRuntimePolicyScope, HostRuntimePolicyScopeArgs        
- Expression string
- Scope expression.
- Variables
List<Pulumiverse.Aquasec. Inputs. Host Runtime Policy Scope Variable> 
- List of variables in the scope.
- Expression string
- Scope expression.
- Variables
[]HostRuntime Policy Scope Variable 
- List of variables in the scope.
- expression String
- Scope expression.
- variables
List<HostRuntime Policy Scope Variable> 
- List of variables in the scope.
- expression string
- Scope expression.
- variables
HostRuntime Policy Scope Variable[] 
- List of variables in the scope.
- expression str
- Scope expression.
- variables
Sequence[HostRuntime Policy Scope Variable] 
- List of variables in the scope.
- expression String
- Scope expression.
- variables List<Property Map>
- List of variables in the scope.
HostRuntimePolicyScopeVariable, HostRuntimePolicyScopeVariableArgs          
HostRuntimePolicySystemIntegrityProtection, HostRuntimePolicySystemIntegrityProtectionArgs            
- AuditSystemtime boolChange 
- Enabled bool
- MonitorAudit boolLog Integrity 
- WindowsServices boolMonitoring 
- AuditSystemtime boolChange 
- Enabled bool
- MonitorAudit boolLog Integrity 
- WindowsServices boolMonitoring 
- auditSystemtime BooleanChange 
- enabled Boolean
- monitorAudit BooleanLog Integrity 
- windowsServices BooleanMonitoring 
- auditSystemtime booleanChange 
- enabled boolean
- monitorAudit booleanLog Integrity 
- windowsServices booleanMonitoring 
- auditSystemtime BooleanChange 
- enabled Boolean
- monitorAudit BooleanLog Integrity 
- windowsServices BooleanMonitoring 
HostRuntimePolicyTripwire, HostRuntimePolicyTripwireArgs        
- ApplyOns List<string>
- Enabled bool
- ServerlessApp string
- UserId string
- UserPassword string
- ApplyOns []string
- Enabled bool
- ServerlessApp string
- UserId string
- UserPassword string
- applyOns List<String>
- enabled Boolean
- serverlessApp String
- userId String
- userPassword String
- applyOns string[]
- enabled boolean
- serverlessApp string
- userId string
- userPassword string
- apply_ons Sequence[str]
- enabled bool
- serverless_app str
- user_id str
- user_password str
- applyOns List<String>
- enabled Boolean
- serverlessApp String
- userId String
- userPassword String
HostRuntimePolicyWhitelistedOsUsers, HostRuntimePolicyWhitelistedOsUsersArgs            
- Enabled bool
- GroupWhite List<string>Lists 
- UserWhite List<string>Lists 
- Enabled bool
- GroupWhite []stringLists 
- UserWhite []stringLists 
- enabled Boolean
- groupWhite List<String>Lists 
- userWhite List<String>Lists 
- enabled boolean
- groupWhite string[]Lists 
- userWhite string[]Lists 
- enabled bool
- group_white_ Sequence[str]lists 
- user_white_ Sequence[str]lists 
- enabled Boolean
- groupWhite List<String>Lists 
- userWhite List<String>Lists 
Package Details
- Repository
- aquasec pulumiverse/pulumi-aquasec
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the aquasecTerraform Provider.