Assessment Metadata In Subscription Args
Security assessment metadata response Uses Azure REST API version 2021-06-01. In version 2.x of the Azure Native provider, it used API version 2021-06-01. Other available API versions: 2020-01-01. These can be accessed by generating a local SDK package using the CLI command pulumi package add azure-native security [ApiVersion]
. See the ../../../version-guide/#accessing-any-api-version-via-local-packages for details.
Example Usage
Create security assessment metadata for subscription
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using AzureNative = Pulumi.AzureNative;
return await Deployment.RunAsync(() =>
{
var assessmentMetadataInSubscription = new AzureNative.Security.AssessmentMetadataInSubscription("assessmentMetadataInSubscription", new()
{
AssessmentMetadataName = "ca039e75-a276-4175-aebc-bcd41e4b14b7",
AssessmentType = AzureNative.Security.AssessmentType.CustomerManaged,
Categories = new[]
{
AzureNative.Security.Categories.Compute,
},
Description = "Install an endpoint protection solution on your virtual machines scale sets, to protect them from threats and vulnerabilities.",
DisplayName = "Install endpoint protection solution on virtual machine scale sets",
ImplementationEffort = AzureNative.Security.ImplementationEffort.Low,
RemediationDescription = "To install an endpoint protection solution: 1. <a href=\"https://docs.microsoft.com/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-faq#how-do-i-turn-on-antimalware-in-my-virtual-machine-scale-set\">Follow the instructions in How do I turn on antimalware in my virtual machine scale set</a>",
Severity = AzureNative.Security.Severity.Medium,
Threats = new[]
{
AzureNative.Security.Threats.DataExfiltration,
AzureNative.Security.Threats.DataSpillage,
AzureNative.Security.Threats.MaliciousInsider,
},
UserImpact = AzureNative.Security.UserImpact.Low,
});
});
package main
import (
security "github.com/pulumi/pulumi-azure-native-sdk/security/v3"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := security.NewAssessmentMetadataInSubscription(ctx, "assessmentMetadataInSubscription", &security.AssessmentMetadataInSubscriptionArgs{
AssessmentMetadataName: pulumi.String("ca039e75-a276-4175-aebc-bcd41e4b14b7"),
AssessmentType: pulumi.String(security.AssessmentTypeCustomerManaged),
Categories: pulumi.StringArray{
pulumi.String(security.CategoriesCompute),
},
Description: pulumi.String("Install an endpoint protection solution on your virtual machines scale sets, to protect them from threats and vulnerabilities."),
DisplayName: pulumi.String("Install endpoint protection solution on virtual machine scale sets"),
ImplementationEffort: pulumi.String(security.ImplementationEffortLow),
RemediationDescription: pulumi.String("To install an endpoint protection solution: 1. <a href=\"https://docs.microsoft.com/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-faq#how-do-i-turn-on-antimalware-in-my-virtual-machine-scale-set\">Follow the instructions in How do I turn on antimalware in my virtual machine scale set</a>"),
Severity: pulumi.String(security.SeverityMedium),
Threats: pulumi.StringArray{
pulumi.String(security.ThreatsDataExfiltration),
pulumi.String(security.ThreatsDataSpillage),
pulumi.String(security.ThreatsMaliciousInsider),
},
UserImpact: pulumi.String(security.UserImpactLow),
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azurenative.security.AssessmentMetadataInSubscription;
import com.pulumi.azurenative.security.AssessmentMetadataInSubscriptionArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var assessmentMetadataInSubscription = new AssessmentMetadataInSubscription("assessmentMetadataInSubscription", AssessmentMetadataInSubscriptionArgs.builder()
.assessmentMetadataName("ca039e75-a276-4175-aebc-bcd41e4b14b7")
.assessmentType("CustomerManaged")
.categories("Compute")
.description("Install an endpoint protection solution on your virtual machines scale sets, to protect them from threats and vulnerabilities.")
.displayName("Install endpoint protection solution on virtual machine scale sets")
.implementationEffort("Low")
.remediationDescription("To install an endpoint protection solution: 1. <a href=\"https://docs.microsoft.com/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-faq#how-do-i-turn-on-antimalware-in-my-virtual-machine-scale-set\">Follow the instructions in How do I turn on antimalware in my virtual machine scale set</a>")
.severity("Medium")
.threats(
"dataExfiltration",
"dataSpillage",
"maliciousInsider")
.userImpact("Low")
.build());
}
}
Import
An existing resource can be imported using its type token, name, and identifier, e.g.
$ pulumi import azure-native:security:AssessmentMetadataInSubscription ca039e75-a276-4175-aebc-bcd41e4b14b7 /subscriptions/{subscriptionId}/providers/Microsoft.Security/assessmentMetadata/{assessmentMetadataName}
Constructors
Properties
The Assessment Key - Unique key for the assessment type
BuiltIn if the assessment based on built-in Azure Policy definition, Custom if the assessment based on custom Azure Policy definition
Human readable description of the assessment
User friendly display name of the assessment
The implementation effort required to remediate this assessment
Describes the partner that created the assessment
Human readable description of what you should do to mitigate this security issue
The user impact of the assessment