oci.DataSafe.getSecurityAssessments
Explore with Pulumi AI
This data source provides the list of Security Assessments in Oracle Cloud Infrastructure Data Safe service.
Gets a list of security assessments.
The ListSecurityAssessments operation returns only the assessments in the specified compartmentId
.
The list does not include any subcompartments of the compartmentId passed.
The parameter accessLevel
specifies whether to return only those compartments for which the
requestor has INSPECT permissions on at least one resource directly
or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
Principal doesn’t have access to even one of the child compartments. This is valid only when
compartmentIdInSubtree
is set to true
.
The parameter compartmentIdInSubtree
applies when you perform ListSecurityAssessments on the
compartmentId
passed and when it is set to true, the entire hierarchy of compartments can be returned.
To get a full list of all compartments and subcompartments in the tenancy (root compartment),
set the parameter compartmentIdInSubtree
to true and accessLevel
to ACCESSIBLE.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as oci from "@pulumi/oci";
const testSecurityAssessments = oci.DataSafe.getSecurityAssessments({
compartmentId: compartmentId,
accessLevel: securityAssessmentAccessLevel,
compartmentIdInSubtree: securityAssessmentCompartmentIdInSubtree,
displayName: securityAssessmentDisplayName,
isBaseline: securityAssessmentIsBaseline,
isScheduleAssessment: securityAssessmentIsScheduleAssessment,
scheduleAssessmentId: testScheduleAssessment.id,
state: securityAssessmentState,
targetId: testTarget.id,
timeCreatedGreaterThanOrEqualTo: securityAssessmentTimeCreatedGreaterThanOrEqualTo,
timeCreatedLessThan: securityAssessmentTimeCreatedLessThan,
triggeredBy: securityAssessmentTriggeredBy,
type: securityAssessmentType,
});
import pulumi
import pulumi_oci as oci
test_security_assessments = oci.DataSafe.get_security_assessments(compartment_id=compartment_id,
access_level=security_assessment_access_level,
compartment_id_in_subtree=security_assessment_compartment_id_in_subtree,
display_name=security_assessment_display_name,
is_baseline=security_assessment_is_baseline,
is_schedule_assessment=security_assessment_is_schedule_assessment,
schedule_assessment_id=test_schedule_assessment["id"],
state=security_assessment_state,
target_id=test_target["id"],
time_created_greater_than_or_equal_to=security_assessment_time_created_greater_than_or_equal_to,
time_created_less_than=security_assessment_time_created_less_than,
triggered_by=security_assessment_triggered_by,
type=security_assessment_type)
package main
import (
"github.com/pulumi/pulumi-oci/sdk/v2/go/oci/DataSafe"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := DataSafe.GetSecurityAssessments(ctx, &datasafe.GetSecurityAssessmentsArgs{
CompartmentId: compartmentId,
AccessLevel: pulumi.StringRef(securityAssessmentAccessLevel),
CompartmentIdInSubtree: pulumi.BoolRef(securityAssessmentCompartmentIdInSubtree),
DisplayName: pulumi.StringRef(securityAssessmentDisplayName),
IsBaseline: pulumi.BoolRef(securityAssessmentIsBaseline),
IsScheduleAssessment: pulumi.BoolRef(securityAssessmentIsScheduleAssessment),
ScheduleAssessmentId: pulumi.StringRef(testScheduleAssessment.Id),
State: pulumi.StringRef(securityAssessmentState),
TargetId: pulumi.StringRef(testTarget.Id),
TimeCreatedGreaterThanOrEqualTo: pulumi.StringRef(securityAssessmentTimeCreatedGreaterThanOrEqualTo),
TimeCreatedLessThan: pulumi.StringRef(securityAssessmentTimeCreatedLessThan),
TriggeredBy: pulumi.StringRef(securityAssessmentTriggeredBy),
Type: pulumi.StringRef(securityAssessmentType),
}, nil)
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Oci = Pulumi.Oci;
return await Deployment.RunAsync(() =>
{
var testSecurityAssessments = Oci.DataSafe.GetSecurityAssessments.Invoke(new()
{
CompartmentId = compartmentId,
AccessLevel = securityAssessmentAccessLevel,
CompartmentIdInSubtree = securityAssessmentCompartmentIdInSubtree,
DisplayName = securityAssessmentDisplayName,
IsBaseline = securityAssessmentIsBaseline,
IsScheduleAssessment = securityAssessmentIsScheduleAssessment,
ScheduleAssessmentId = testScheduleAssessment.Id,
State = securityAssessmentState,
TargetId = testTarget.Id,
TimeCreatedGreaterThanOrEqualTo = securityAssessmentTimeCreatedGreaterThanOrEqualTo,
TimeCreatedLessThan = securityAssessmentTimeCreatedLessThan,
TriggeredBy = securityAssessmentTriggeredBy,
Type = securityAssessmentType,
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.oci.DataSafe.DataSafeFunctions;
import com.pulumi.oci.DataSafe.inputs.GetSecurityAssessmentsArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var testSecurityAssessments = DataSafeFunctions.getSecurityAssessments(GetSecurityAssessmentsArgs.builder()
.compartmentId(compartmentId)
.accessLevel(securityAssessmentAccessLevel)
.compartmentIdInSubtree(securityAssessmentCompartmentIdInSubtree)
.displayName(securityAssessmentDisplayName)
.isBaseline(securityAssessmentIsBaseline)
.isScheduleAssessment(securityAssessmentIsScheduleAssessment)
.scheduleAssessmentId(testScheduleAssessment.id())
.state(securityAssessmentState)
.targetId(testTarget.id())
.timeCreatedGreaterThanOrEqualTo(securityAssessmentTimeCreatedGreaterThanOrEqualTo)
.timeCreatedLessThan(securityAssessmentTimeCreatedLessThan)
.triggeredBy(securityAssessmentTriggeredBy)
.type(securityAssessmentType)
.build());
}
}
variables:
testSecurityAssessments:
fn::invoke:
Function: oci:DataSafe:getSecurityAssessments
Arguments:
compartmentId: ${compartmentId}
accessLevel: ${securityAssessmentAccessLevel}
compartmentIdInSubtree: ${securityAssessmentCompartmentIdInSubtree}
displayName: ${securityAssessmentDisplayName}
isBaseline: ${securityAssessmentIsBaseline}
isScheduleAssessment: ${securityAssessmentIsScheduleAssessment}
scheduleAssessmentId: ${testScheduleAssessment.id}
state: ${securityAssessmentState}
targetId: ${testTarget.id}
timeCreatedGreaterThanOrEqualTo: ${securityAssessmentTimeCreatedGreaterThanOrEqualTo}
timeCreatedLessThan: ${securityAssessmentTimeCreatedLessThan}
triggeredBy: ${securityAssessmentTriggeredBy}
type: ${securityAssessmentType}
Using getSecurityAssessments
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getSecurityAssessments(args: GetSecurityAssessmentsArgs, opts?: InvokeOptions): Promise<GetSecurityAssessmentsResult>
function getSecurityAssessmentsOutput(args: GetSecurityAssessmentsOutputArgs, opts?: InvokeOptions): Output<GetSecurityAssessmentsResult>
def get_security_assessments(access_level: Optional[str] = None,
compartment_id: Optional[str] = None,
compartment_id_in_subtree: Optional[bool] = None,
display_name: Optional[str] = None,
filters: Optional[Sequence[_datasafe.GetSecurityAssessmentsFilter]] = None,
is_baseline: Optional[bool] = None,
is_schedule_assessment: Optional[bool] = None,
schedule_assessment_id: Optional[str] = None,
state: Optional[str] = None,
target_id: Optional[str] = None,
time_created_greater_than_or_equal_to: Optional[str] = None,
time_created_less_than: Optional[str] = None,
triggered_by: Optional[str] = None,
type: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetSecurityAssessmentsResult
def get_security_assessments_output(access_level: Optional[pulumi.Input[str]] = None,
compartment_id: Optional[pulumi.Input[str]] = None,
compartment_id_in_subtree: Optional[pulumi.Input[bool]] = None,
display_name: Optional[pulumi.Input[str]] = None,
filters: Optional[pulumi.Input[Sequence[pulumi.Input[_datasafe.GetSecurityAssessmentsFilterArgs]]]] = None,
is_baseline: Optional[pulumi.Input[bool]] = None,
is_schedule_assessment: Optional[pulumi.Input[bool]] = None,
schedule_assessment_id: Optional[pulumi.Input[str]] = None,
state: Optional[pulumi.Input[str]] = None,
target_id: Optional[pulumi.Input[str]] = None,
time_created_greater_than_or_equal_to: Optional[pulumi.Input[str]] = None,
time_created_less_than: Optional[pulumi.Input[str]] = None,
triggered_by: Optional[pulumi.Input[str]] = None,
type: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetSecurityAssessmentsResult]
func GetSecurityAssessments(ctx *Context, args *GetSecurityAssessmentsArgs, opts ...InvokeOption) (*GetSecurityAssessmentsResult, error)
func GetSecurityAssessmentsOutput(ctx *Context, args *GetSecurityAssessmentsOutputArgs, opts ...InvokeOption) GetSecurityAssessmentsResultOutput
> Note: This function is named GetSecurityAssessments
in the Go SDK.
public static class GetSecurityAssessments
{
public static Task<GetSecurityAssessmentsResult> InvokeAsync(GetSecurityAssessmentsArgs args, InvokeOptions? opts = null)
public static Output<GetSecurityAssessmentsResult> Invoke(GetSecurityAssessmentsInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetSecurityAssessmentsResult> getSecurityAssessments(GetSecurityAssessmentsArgs args, InvokeOptions options)
// Output-based functions aren't available in Java yet
fn::invoke:
function: oci:DataSafe/getSecurityAssessments:getSecurityAssessments
arguments:
# arguments dictionary
The following arguments are supported:
- Compartment
Id string - A filter to return only resources that match the specified compartment OCID.
- Access
Level string - Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
- Compartment
Id boolIn Subtree - Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
- Display
Name string - A filter to return only resources that match the specified display name.
- Filters
List<Get
Security Assessments Filter> - Is
Baseline bool - A filter to return only the security assessments that are set as a baseline.
- Is
Schedule boolAssessment - A filter to return only security assessments of type save schedule.
- Schedule
Assessment stringId - The OCID of the security assessment of type SAVE_SCHEDULE.
- State string
- A filter to return only resources that match the specified lifecycle state.
- Target
Id string - A filter to return only items related to a specific target OCID.
- Time
Created stringGreater Than Or Equal To A filter to return only the resources that were created after the specified date and time, as defined by RFC3339. Using TimeCreatedGreaterThanOrEqualToQueryParam parameter retrieves all resources created after that date.
Example: 2016-12-19T16:39:57.600Z
- Time
Created stringLess Than Search for resources that were created before a specific date. Specifying this parameter corresponding
timeCreatedLessThan
parameter will retrieve all resources created before the specified created date, in "YYYY-MM-ddThh:mmZ" format with a Z offset, as defined by RFC 3339.Example: 2016-12-19T16:39:57.600Z
- Triggered
By string - A filter to return only security asessments that were created by either user or system.
- Type string
- A filter to return only items that match the specified security assessment type.
- Compartment
Id string - A filter to return only resources that match the specified compartment OCID.
- Access
Level string - Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
- Compartment
Id boolIn Subtree - Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
- Display
Name string - A filter to return only resources that match the specified display name.
- Filters
[]Get
Security Assessments Filter - Is
Baseline bool - A filter to return only the security assessments that are set as a baseline.
- Is
Schedule boolAssessment - A filter to return only security assessments of type save schedule.
- Schedule
Assessment stringId - The OCID of the security assessment of type SAVE_SCHEDULE.
- State string
- A filter to return only resources that match the specified lifecycle state.
- Target
Id string - A filter to return only items related to a specific target OCID.
- Time
Created stringGreater Than Or Equal To A filter to return only the resources that were created after the specified date and time, as defined by RFC3339. Using TimeCreatedGreaterThanOrEqualToQueryParam parameter retrieves all resources created after that date.
Example: 2016-12-19T16:39:57.600Z
- Time
Created stringLess Than Search for resources that were created before a specific date. Specifying this parameter corresponding
timeCreatedLessThan
parameter will retrieve all resources created before the specified created date, in "YYYY-MM-ddThh:mmZ" format with a Z offset, as defined by RFC 3339.Example: 2016-12-19T16:39:57.600Z
- Triggered
By string - A filter to return only security asessments that were created by either user or system.
- Type string
- A filter to return only items that match the specified security assessment type.
- compartment
Id String - A filter to return only resources that match the specified compartment OCID.
- access
Level String - Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
- compartment
Id BooleanIn Subtree - Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
- display
Name String - A filter to return only resources that match the specified display name.
- filters
List<Get
Security Assessments Filter> - is
Baseline Boolean - A filter to return only the security assessments that are set as a baseline.
- is
Schedule BooleanAssessment - A filter to return only security assessments of type save schedule.
- schedule
Assessment StringId - The OCID of the security assessment of type SAVE_SCHEDULE.
- state String
- A filter to return only resources that match the specified lifecycle state.
- target
Id String - A filter to return only items related to a specific target OCID.
- time
Created StringGreater Than Or Equal To A filter to return only the resources that were created after the specified date and time, as defined by RFC3339. Using TimeCreatedGreaterThanOrEqualToQueryParam parameter retrieves all resources created after that date.
Example: 2016-12-19T16:39:57.600Z
- time
Created StringLess Than Search for resources that were created before a specific date. Specifying this parameter corresponding
timeCreatedLessThan
parameter will retrieve all resources created before the specified created date, in "YYYY-MM-ddThh:mmZ" format with a Z offset, as defined by RFC 3339.Example: 2016-12-19T16:39:57.600Z
- triggered
By String - A filter to return only security asessments that were created by either user or system.
- type String
- A filter to return only items that match the specified security assessment type.
- compartment
Id string - A filter to return only resources that match the specified compartment OCID.
- access
Level string - Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
- compartment
Id booleanIn Subtree - Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
- display
Name string - A filter to return only resources that match the specified display name.
- filters
Get
Security Assessments Filter[] - is
Baseline boolean - A filter to return only the security assessments that are set as a baseline.
- is
Schedule booleanAssessment - A filter to return only security assessments of type save schedule.
- schedule
Assessment stringId - The OCID of the security assessment of type SAVE_SCHEDULE.
- state string
- A filter to return only resources that match the specified lifecycle state.
- target
Id string - A filter to return only items related to a specific target OCID.
- time
Created stringGreater Than Or Equal To A filter to return only the resources that were created after the specified date and time, as defined by RFC3339. Using TimeCreatedGreaterThanOrEqualToQueryParam parameter retrieves all resources created after that date.
Example: 2016-12-19T16:39:57.600Z
- time
Created stringLess Than Search for resources that were created before a specific date. Specifying this parameter corresponding
timeCreatedLessThan
parameter will retrieve all resources created before the specified created date, in "YYYY-MM-ddThh:mmZ" format with a Z offset, as defined by RFC 3339.Example: 2016-12-19T16:39:57.600Z
- triggered
By string - A filter to return only security asessments that were created by either user or system.
- type string
- A filter to return only items that match the specified security assessment type.
- compartment_
id str - A filter to return only resources that match the specified compartment OCID.
- access_
level str - Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
- compartment_
id_ boolin_ subtree - Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
- display_
name str - A filter to return only resources that match the specified display name.
- filters
Sequence[datasafe.
Get Security Assessments Filter] - is_
baseline bool - A filter to return only the security assessments that are set as a baseline.
- is_
schedule_ boolassessment - A filter to return only security assessments of type save schedule.
- schedule_
assessment_ strid - The OCID of the security assessment of type SAVE_SCHEDULE.
- state str
- A filter to return only resources that match the specified lifecycle state.
- target_
id str - A filter to return only items related to a specific target OCID.
- time_
created_ strgreater_ than_ or_ equal_ to A filter to return only the resources that were created after the specified date and time, as defined by RFC3339. Using TimeCreatedGreaterThanOrEqualToQueryParam parameter retrieves all resources created after that date.
Example: 2016-12-19T16:39:57.600Z
- time_
created_ strless_ than Search for resources that were created before a specific date. Specifying this parameter corresponding
timeCreatedLessThan
parameter will retrieve all resources created before the specified created date, in "YYYY-MM-ddThh:mmZ" format with a Z offset, as defined by RFC 3339.Example: 2016-12-19T16:39:57.600Z
- triggered_
by str - A filter to return only security asessments that were created by either user or system.
- type str
- A filter to return only items that match the specified security assessment type.
- compartment
Id String - A filter to return only resources that match the specified compartment OCID.
- access
Level String - Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
- compartment
Id BooleanIn Subtree - Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
- display
Name String - A filter to return only resources that match the specified display name.
- filters List<Property Map>
- is
Baseline Boolean - A filter to return only the security assessments that are set as a baseline.
- is
Schedule BooleanAssessment - A filter to return only security assessments of type save schedule.
- schedule
Assessment StringId - The OCID of the security assessment of type SAVE_SCHEDULE.
- state String
- A filter to return only resources that match the specified lifecycle state.
- target
Id String - A filter to return only items related to a specific target OCID.
- time
Created StringGreater Than Or Equal To A filter to return only the resources that were created after the specified date and time, as defined by RFC3339. Using TimeCreatedGreaterThanOrEqualToQueryParam parameter retrieves all resources created after that date.
Example: 2016-12-19T16:39:57.600Z
- time
Created StringLess Than Search for resources that were created before a specific date. Specifying this parameter corresponding
timeCreatedLessThan
parameter will retrieve all resources created before the specified created date, in "YYYY-MM-ddThh:mmZ" format with a Z offset, as defined by RFC 3339.Example: 2016-12-19T16:39:57.600Z
- triggered
By String - A filter to return only security asessments that were created by either user or system.
- type String
- A filter to return only items that match the specified security assessment type.
getSecurityAssessments Result
The following output properties are available:
- Compartment
Id string - The OCID of the compartment that contains the security assessment.
- Id string
- The provider-assigned unique ID for this managed resource.
- Security
Assessments List<GetSecurity Assessments Security Assessment> - The list of security_assessments.
- Access
Level string - Compartment
Id boolIn Subtree - Display
Name string - The display name of the security assessment.
- Filters
List<Get
Security Assessments Filter> - Is
Baseline bool - Indicates whether or not the security assessment is set as a baseline. This is applicable only for saved security assessments.
- Is
Schedule boolAssessment - Schedule
Assessment stringId - State string
- The current state of the security assessment.
- Target
Id string - Time
Created stringGreater Than Or Equal To - Time
Created stringLess Than - Triggered
By string - Indicates whether the security assessment was created by system or by a user.
- Type string
- The type of this security assessment. The possible types are:
- Compartment
Id string - The OCID of the compartment that contains the security assessment.
- Id string
- The provider-assigned unique ID for this managed resource.
- Security
Assessments []GetSecurity Assessments Security Assessment - The list of security_assessments.
- Access
Level string - Compartment
Id boolIn Subtree - Display
Name string - The display name of the security assessment.
- Filters
[]Get
Security Assessments Filter - Is
Baseline bool - Indicates whether or not the security assessment is set as a baseline. This is applicable only for saved security assessments.
- Is
Schedule boolAssessment - Schedule
Assessment stringId - State string
- The current state of the security assessment.
- Target
Id string - Time
Created stringGreater Than Or Equal To - Time
Created stringLess Than - Triggered
By string - Indicates whether the security assessment was created by system or by a user.
- Type string
- The type of this security assessment. The possible types are:
- compartment
Id String - The OCID of the compartment that contains the security assessment.
- id String
- The provider-assigned unique ID for this managed resource.
- security
Assessments List<GetSecurity Assessments Security Assessment> - The list of security_assessments.
- access
Level String - compartment
Id BooleanIn Subtree - display
Name String - The display name of the security assessment.
- filters
List<Get
Security Assessments Filter> - is
Baseline Boolean - Indicates whether or not the security assessment is set as a baseline. This is applicable only for saved security assessments.
- is
Schedule BooleanAssessment - schedule
Assessment StringId - state String
- The current state of the security assessment.
- target
Id String - time
Created StringGreater Than Or Equal To - time
Created StringLess Than - triggered
By String - Indicates whether the security assessment was created by system or by a user.
- type String
- The type of this security assessment. The possible types are:
- compartment
Id string - The OCID of the compartment that contains the security assessment.
- id string
- The provider-assigned unique ID for this managed resource.
- security
Assessments GetSecurity Assessments Security Assessment[] - The list of security_assessments.
- access
Level string - compartment
Id booleanIn Subtree - display
Name string - The display name of the security assessment.
- filters
Get
Security Assessments Filter[] - is
Baseline boolean - Indicates whether or not the security assessment is set as a baseline. This is applicable only for saved security assessments.
- is
Schedule booleanAssessment - schedule
Assessment stringId - state string
- The current state of the security assessment.
- target
Id string - time
Created stringGreater Than Or Equal To - time
Created stringLess Than - triggered
By string - Indicates whether the security assessment was created by system or by a user.
- type string
- The type of this security assessment. The possible types are:
- compartment_
id str - The OCID of the compartment that contains the security assessment.
- id str
- The provider-assigned unique ID for this managed resource.
- security_
assessments Sequence[datasafe.Get Security Assessments Security Assessment] - The list of security_assessments.
- access_
level str - compartment_
id_ boolin_ subtree - display_
name str - The display name of the security assessment.
- filters
Sequence[datasafe.
Get Security Assessments Filter] - is_
baseline bool - Indicates whether or not the security assessment is set as a baseline. This is applicable only for saved security assessments.
- is_
schedule_ boolassessment - schedule_
assessment_ strid - state str
- The current state of the security assessment.
- target_
id str - time_
created_ strgreater_ than_ or_ equal_ to - time_
created_ strless_ than - triggered_
by str - Indicates whether the security assessment was created by system or by a user.
- type str
- The type of this security assessment. The possible types are:
- compartment
Id String - The OCID of the compartment that contains the security assessment.
- id String
- The provider-assigned unique ID for this managed resource.
- security
Assessments List<Property Map> - The list of security_assessments.
- access
Level String - compartment
Id BooleanIn Subtree - display
Name String - The display name of the security assessment.
- filters List<Property Map>
- is
Baseline Boolean - Indicates whether or not the security assessment is set as a baseline. This is applicable only for saved security assessments.
- is
Schedule BooleanAssessment - schedule
Assessment StringId - state String
- The current state of the security assessment.
- target
Id String - time
Created StringGreater Than Or Equal To - time
Created StringLess Than - triggered
By String - Indicates whether the security assessment was created by system or by a user.
- type String
- The type of this security assessment. The possible types are:
Supporting Types
GetSecurityAssessmentsFilter
GetSecurityAssessmentsSecurityAssessment
- Compartment
Id string - A filter to return only resources that match the specified compartment OCID.
- Dictionary<string, string>
- Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags Example:
{"Operations.CostCenter": "42"}
- Description string
- The description of the security assessment.
- Display
Name string - A filter to return only resources that match the specified display name.
- Dictionary<string, string>
- Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags Example:
{"Department": "Finance"}
- Id string
- The OCID of the security assessment.
- Ignored
Assessment List<string>Ids - List containing maps as values. Example:
{"Operations": [ {"CostCenter": "42"} ] }
- Ignored
Targets List<string> - List containing maps as values. Example:
{"Operations": [ {"CostCenter": "42"} ] }
- Is
Assessment boolScheduled - Indicates whether the assessment is scheduled to run.
- Is
Baseline bool - A filter to return only the security assessments that are set as a baseline.
- Is
Deviated boolFrom Baseline - Indicates whether or not the security assessment deviates from the baseline.
- Last
Compared stringBaseline Id - The OCID of the baseline against which the latest security assessment was compared.
- Lifecycle
Details string - Details about the current state of the security assessment.
- Link string
- The summary of findings for the security assessment.
- Schedule string
- Schedule of the assessment that runs periodically in the specified format: - ;
- Schedule
Security stringAssessment Id - The OCID of the security assessment that is responsible for creating this scheduled save assessment.
- State string
- A filter to return only resources that match the specified lifecycle state.
- Statistics
List<Get
Security Assessments Security Assessment Statistic> - Statistics showing the number of findings for each category grouped by risk levels for all the targets in the specified security assessment.
- Dictionary<string, string>
- System tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example:
{"orcl-cloud.free-tier-retained": "true"}
- Target
Id string - A filter to return only items related to a specific target OCID.
- Target
Ids List<string> - Array of database target OCIDs.
- Target
Version string - The version of the target database.
- Time
Created string - The date and time the security assessment was created, in the format defined by RFC3339.
- Time
Last stringAssessed - The date and time the security assessment was last executed, in the format defined by RFC3339.
- Time
Updated string - The date and time the security assessment was last updated, in the format defined by RFC3339.
- Triggered
By string - A filter to return only security asessments that were created by either user or system.
- Type string
- A filter to return only items that match the specified security assessment type.
- Compartment
Id string - A filter to return only resources that match the specified compartment OCID.
- map[string]string
- Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags Example:
{"Operations.CostCenter": "42"}
- Description string
- The description of the security assessment.
- Display
Name string - A filter to return only resources that match the specified display name.
- map[string]string
- Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags Example:
{"Department": "Finance"}
- Id string
- The OCID of the security assessment.
- Ignored
Assessment []stringIds - List containing maps as values. Example:
{"Operations": [ {"CostCenter": "42"} ] }
- Ignored
Targets []string - List containing maps as values. Example:
{"Operations": [ {"CostCenter": "42"} ] }
- Is
Assessment boolScheduled - Indicates whether the assessment is scheduled to run.
- Is
Baseline bool - A filter to return only the security assessments that are set as a baseline.
- Is
Deviated boolFrom Baseline - Indicates whether or not the security assessment deviates from the baseline.
- Last
Compared stringBaseline Id - The OCID of the baseline against which the latest security assessment was compared.
- Lifecycle
Details string - Details about the current state of the security assessment.
- Link string
- The summary of findings for the security assessment.
- Schedule string
- Schedule of the assessment that runs periodically in the specified format: - ;
- Schedule
Security stringAssessment Id - The OCID of the security assessment that is responsible for creating this scheduled save assessment.
- State string
- A filter to return only resources that match the specified lifecycle state.
- Statistics
[]Get
Security Assessments Security Assessment Statistic - Statistics showing the number of findings for each category grouped by risk levels for all the targets in the specified security assessment.
- map[string]string
- System tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example:
{"orcl-cloud.free-tier-retained": "true"}
- Target
Id string - A filter to return only items related to a specific target OCID.
- Target
Ids []string - Array of database target OCIDs.
- Target
Version string - The version of the target database.
- Time
Created string - The date and time the security assessment was created, in the format defined by RFC3339.
- Time
Last stringAssessed - The date and time the security assessment was last executed, in the format defined by RFC3339.
- Time
Updated string - The date and time the security assessment was last updated, in the format defined by RFC3339.
- Triggered
By string - A filter to return only security asessments that were created by either user or system.
- Type string
- A filter to return only items that match the specified security assessment type.
- compartment
Id String - A filter to return only resources that match the specified compartment OCID.
- Map<String,String>
- Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags Example:
{"Operations.CostCenter": "42"}
- description String
- The description of the security assessment.
- display
Name String - A filter to return only resources that match the specified display name.
- Map<String,String>
- Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags Example:
{"Department": "Finance"}
- id String
- The OCID of the security assessment.
- ignored
Assessment List<String>Ids - List containing maps as values. Example:
{"Operations": [ {"CostCenter": "42"} ] }
- ignored
Targets List<String> - List containing maps as values. Example:
{"Operations": [ {"CostCenter": "42"} ] }
- is
Assessment BooleanScheduled - Indicates whether the assessment is scheduled to run.
- is
Baseline Boolean - A filter to return only the security assessments that are set as a baseline.
- is
Deviated BooleanFrom Baseline - Indicates whether or not the security assessment deviates from the baseline.
- last
Compared StringBaseline Id - The OCID of the baseline against which the latest security assessment was compared.
- lifecycle
Details String - Details about the current state of the security assessment.
- link String
- The summary of findings for the security assessment.
- schedule String
- Schedule of the assessment that runs periodically in the specified format: - ;
- schedule
Security StringAssessment Id - The OCID of the security assessment that is responsible for creating this scheduled save assessment.
- state String
- A filter to return only resources that match the specified lifecycle state.
- statistics
List<Get
Security Assessments Security Assessment Statistic> - Statistics showing the number of findings for each category grouped by risk levels for all the targets in the specified security assessment.
- Map<String,String>
- System tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example:
{"orcl-cloud.free-tier-retained": "true"}
- target
Id String - A filter to return only items related to a specific target OCID.
- target
Ids List<String> - Array of database target OCIDs.
- target
Version String - The version of the target database.
- time
Created String - The date and time the security assessment was created, in the format defined by RFC3339.
- time
Last StringAssessed - The date and time the security assessment was last executed, in the format defined by RFC3339.
- time
Updated String - The date and time the security assessment was last updated, in the format defined by RFC3339.
- triggered
By String - A filter to return only security asessments that were created by either user or system.
- type String
- A filter to return only items that match the specified security assessment type.
- compartment
Id string - A filter to return only resources that match the specified compartment OCID.
- {[key: string]: string}
- Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags Example:
{"Operations.CostCenter": "42"}
- description string
- The description of the security assessment.
- display
Name string - A filter to return only resources that match the specified display name.
- {[key: string]: string}
- Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags Example:
{"Department": "Finance"}
- id string
- The OCID of the security assessment.
- ignored
Assessment string[]Ids - List containing maps as values. Example:
{"Operations": [ {"CostCenter": "42"} ] }
- ignored
Targets string[] - List containing maps as values. Example:
{"Operations": [ {"CostCenter": "42"} ] }
- is
Assessment booleanScheduled - Indicates whether the assessment is scheduled to run.
- is
Baseline boolean - A filter to return only the security assessments that are set as a baseline.
- is
Deviated booleanFrom Baseline - Indicates whether or not the security assessment deviates from the baseline.
- last
Compared stringBaseline Id - The OCID of the baseline against which the latest security assessment was compared.
- lifecycle
Details string - Details about the current state of the security assessment.
- link string
- The summary of findings for the security assessment.
- schedule string
- Schedule of the assessment that runs periodically in the specified format: - ;
- schedule
Security stringAssessment Id - The OCID of the security assessment that is responsible for creating this scheduled save assessment.
- state string
- A filter to return only resources that match the specified lifecycle state.
- statistics
Get
Security Assessments Security Assessment Statistic[] - Statistics showing the number of findings for each category grouped by risk levels for all the targets in the specified security assessment.
- {[key: string]: string}
- System tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example:
{"orcl-cloud.free-tier-retained": "true"}
- target
Id string - A filter to return only items related to a specific target OCID.
- target
Ids string[] - Array of database target OCIDs.
- target
Version string - The version of the target database.
- time
Created string - The date and time the security assessment was created, in the format defined by RFC3339.
- time
Last stringAssessed - The date and time the security assessment was last executed, in the format defined by RFC3339.
- time
Updated string - The date and time the security assessment was last updated, in the format defined by RFC3339.
- triggered
By string - A filter to return only security asessments that were created by either user or system.
- type string
- A filter to return only items that match the specified security assessment type.
- compartment_
id str - A filter to return only resources that match the specified compartment OCID.
- Mapping[str, str]
- Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags Example:
{"Operations.CostCenter": "42"}
- description str
- The description of the security assessment.
- display_
name str - A filter to return only resources that match the specified display name.
- Mapping[str, str]
- Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags Example:
{"Department": "Finance"}
- id str
- The OCID of the security assessment.
- ignored_
assessment_ Sequence[str]ids - List containing maps as values. Example:
{"Operations": [ {"CostCenter": "42"} ] }
- ignored_
targets Sequence[str] - List containing maps as values. Example:
{"Operations": [ {"CostCenter": "42"} ] }
- is_
assessment_ boolscheduled - Indicates whether the assessment is scheduled to run.
- is_
baseline bool - A filter to return only the security assessments that are set as a baseline.
- is_
deviated_ boolfrom_ baseline - Indicates whether or not the security assessment deviates from the baseline.
- last_
compared_ strbaseline_ id - The OCID of the baseline against which the latest security assessment was compared.
- lifecycle_
details str - Details about the current state of the security assessment.
- link str
- The summary of findings for the security assessment.
- schedule str
- Schedule of the assessment that runs periodically in the specified format: - ;
- schedule_
security_ strassessment_ id - The OCID of the security assessment that is responsible for creating this scheduled save assessment.
- state str
- A filter to return only resources that match the specified lifecycle state.
- statistics
Sequence[datasafe.
Get Security Assessments Security Assessment Statistic] - Statistics showing the number of findings for each category grouped by risk levels for all the targets in the specified security assessment.
- Mapping[str, str]
- System tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example:
{"orcl-cloud.free-tier-retained": "true"}
- target_
id str - A filter to return only items related to a specific target OCID.
- target_
ids Sequence[str] - Array of database target OCIDs.
- target_
version str - The version of the target database.
- time_
created str - The date and time the security assessment was created, in the format defined by RFC3339.
- time_
last_ strassessed - The date and time the security assessment was last executed, in the format defined by RFC3339.
- time_
updated str - The date and time the security assessment was last updated, in the format defined by RFC3339.
- triggered_
by str - A filter to return only security asessments that were created by either user or system.
- type str
- A filter to return only items that match the specified security assessment type.
- compartment
Id String - A filter to return only resources that match the specified compartment OCID.
- Map<String>
- Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags Example:
{"Operations.CostCenter": "42"}
- description String
- The description of the security assessment.
- display
Name String - A filter to return only resources that match the specified display name.
- Map<String>
- Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags Example:
{"Department": "Finance"}
- id String
- The OCID of the security assessment.
- ignored
Assessment List<String>Ids - List containing maps as values. Example:
{"Operations": [ {"CostCenter": "42"} ] }
- ignored
Targets List<String> - List containing maps as values. Example:
{"Operations": [ {"CostCenter": "42"} ] }
- is
Assessment BooleanScheduled - Indicates whether the assessment is scheduled to run.
- is
Baseline Boolean - A filter to return only the security assessments that are set as a baseline.
- is
Deviated BooleanFrom Baseline - Indicates whether or not the security assessment deviates from the baseline.
- last
Compared StringBaseline Id - The OCID of the baseline against which the latest security assessment was compared.
- lifecycle
Details String - Details about the current state of the security assessment.
- link String
- The summary of findings for the security assessment.
- schedule String
- Schedule of the assessment that runs periodically in the specified format: - ;
- schedule
Security StringAssessment Id - The OCID of the security assessment that is responsible for creating this scheduled save assessment.
- state String
- A filter to return only resources that match the specified lifecycle state.
- statistics List<Property Map>
- Statistics showing the number of findings for each category grouped by risk levels for all the targets in the specified security assessment.
- Map<String>
- System tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example:
{"orcl-cloud.free-tier-retained": "true"}
- target
Id String - A filter to return only items related to a specific target OCID.
- target
Ids List<String> - Array of database target OCIDs.
- target
Version String - The version of the target database.
- time
Created String - The date and time the security assessment was created, in the format defined by RFC3339.
- time
Last StringAssessed - The date and time the security assessment was last executed, in the format defined by RFC3339.
- time
Updated String - The date and time the security assessment was last updated, in the format defined by RFC3339.
- triggered
By String - A filter to return only security asessments that were created by either user or system.
- type String
- A filter to return only items that match the specified security assessment type.
GetSecurityAssessmentsSecurityAssessmentStatistic
- Advisories
List<Get
Security Assessments Security Assessment Statistic Advisory> - Statistics showing the number of findings with a particular risk level for each category.
- Deferreds
List<Get
Security Assessments Security Assessment Statistic Deferred> - Statistics showing the number of findings with a particular risk level for each category.
- Evaluates
List<Get
Security Assessments Security Assessment Statistic Evaluate> - Statistics showing the number of findings with a particular risk level for each category.
- High
Risks List<GetSecurity Assessments Security Assessment Statistic High Risk> - Statistics showing the number of findings with a particular risk level for each category.
- Low
Risks List<GetSecurity Assessments Security Assessment Statistic Low Risk> - Statistics showing the number of findings with a particular risk level for each category.
- Medium
Risks List<GetSecurity Assessments Security Assessment Statistic Medium Risk> - Statistics showing the number of findings with a particular risk level for each category.
- Passes
List<Get
Security Assessments Security Assessment Statistic Pass> - Statistics showing the number of findings with a particular risk level for each category.
- Targets
Count int - The total number of targets in this security assessment.
- Advisories
[]Get
Security Assessments Security Assessment Statistic Advisory - Statistics showing the number of findings with a particular risk level for each category.
- Deferreds
[]Get
Security Assessments Security Assessment Statistic Deferred - Statistics showing the number of findings with a particular risk level for each category.
- Evaluates
[]Get
Security Assessments Security Assessment Statistic Evaluate - Statistics showing the number of findings with a particular risk level for each category.
- High
Risks []GetSecurity Assessments Security Assessment Statistic High Risk - Statistics showing the number of findings with a particular risk level for each category.
- Low
Risks []GetSecurity Assessments Security Assessment Statistic Low Risk - Statistics showing the number of findings with a particular risk level for each category.
- Medium
Risks []GetSecurity Assessments Security Assessment Statistic Medium Risk - Statistics showing the number of findings with a particular risk level for each category.
- Passes
[]Get
Security Assessments Security Assessment Statistic Pass - Statistics showing the number of findings with a particular risk level for each category.
- Targets
Count int - The total number of targets in this security assessment.
- advisories
List<Get
Security Assessments Security Assessment Statistic Advisory> - Statistics showing the number of findings with a particular risk level for each category.
- deferreds
List<Get
Security Assessments Security Assessment Statistic Deferred> - Statistics showing the number of findings with a particular risk level for each category.
- evaluates
List<Get
Security Assessments Security Assessment Statistic Evaluate> - Statistics showing the number of findings with a particular risk level for each category.
- high
Risks List<GetSecurity Assessments Security Assessment Statistic High Risk> - Statistics showing the number of findings with a particular risk level for each category.
- low
Risks List<GetSecurity Assessments Security Assessment Statistic Low Risk> - Statistics showing the number of findings with a particular risk level for each category.
- medium
Risks List<GetSecurity Assessments Security Assessment Statistic Medium Risk> - Statistics showing the number of findings with a particular risk level for each category.
- passes
List<Get
Security Assessments Security Assessment Statistic Pass> - Statistics showing the number of findings with a particular risk level for each category.
- targets
Count Integer - The total number of targets in this security assessment.
- advisories
Get
Security Assessments Security Assessment Statistic Advisory[] - Statistics showing the number of findings with a particular risk level for each category.
- deferreds
Get
Security Assessments Security Assessment Statistic Deferred[] - Statistics showing the number of findings with a particular risk level for each category.
- evaluates
Get
Security Assessments Security Assessment Statistic Evaluate[] - Statistics showing the number of findings with a particular risk level for each category.
- high
Risks GetSecurity Assessments Security Assessment Statistic High Risk[] - Statistics showing the number of findings with a particular risk level for each category.
- low
Risks GetSecurity Assessments Security Assessment Statistic Low Risk[] - Statistics showing the number of findings with a particular risk level for each category.
- medium
Risks GetSecurity Assessments Security Assessment Statistic Medium Risk[] - Statistics showing the number of findings with a particular risk level for each category.
- passes
Get
Security Assessments Security Assessment Statistic Pass[] - Statistics showing the number of findings with a particular risk level for each category.
- targets
Count number - The total number of targets in this security assessment.
- advisories
Sequence[datasafe.
Get Security Assessments Security Assessment Statistic Advisory] - Statistics showing the number of findings with a particular risk level for each category.
- deferreds
Sequence[datasafe.
Get Security Assessments Security Assessment Statistic Deferred] - Statistics showing the number of findings with a particular risk level for each category.
- evaluates
Sequence[datasafe.
Get Security Assessments Security Assessment Statistic Evaluate] - Statistics showing the number of findings with a particular risk level for each category.
- high_
risks Sequence[datasafe.Get Security Assessments Security Assessment Statistic High Risk] - Statistics showing the number of findings with a particular risk level for each category.
- low_
risks Sequence[datasafe.Get Security Assessments Security Assessment Statistic Low Risk] - Statistics showing the number of findings with a particular risk level for each category.
- medium_
risks Sequence[datasafe.Get Security Assessments Security Assessment Statistic Medium Risk] - Statistics showing the number of findings with a particular risk level for each category.
- passes
Sequence[datasafe.
Get Security Assessments Security Assessment Statistic Pass] - Statistics showing the number of findings with a particular risk level for each category.
- targets_
count int - The total number of targets in this security assessment.
- advisories List<Property Map>
- Statistics showing the number of findings with a particular risk level for each category.
- deferreds List<Property Map>
- Statistics showing the number of findings with a particular risk level for each category.
- evaluates List<Property Map>
- Statistics showing the number of findings with a particular risk level for each category.
- high
Risks List<Property Map> - Statistics showing the number of findings with a particular risk level for each category.
- low
Risks List<Property Map> - Statistics showing the number of findings with a particular risk level for each category.
- medium
Risks List<Property Map> - Statistics showing the number of findings with a particular risk level for each category.
- passes List<Property Map>
- Statistics showing the number of findings with a particular risk level for each category.
- targets
Count Number - The total number of targets in this security assessment.
GetSecurityAssessmentsSecurityAssessmentStatisticAdvisory
- Auditing
Findings intCount - The number of findings in the Auditing category.
- int
- The number of findings in the Authorization Control category.
- Data
Encryption intFindings Count - The number of findings in the Data Encryption category.
- Db
Configuration intFindings Count - The number of findings in the Database Configuration category.
- Fine
Grained intAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- Privileges
And intRoles Findings Count - The number of findings in the Privileges and Roles category.
- Targets
Count int - The total number of targets in this security assessment.
- User
Accounts intFindings Count - The number of findings in the User Accounts category.
- Auditing
Findings intCount - The number of findings in the Auditing category.
- int
- The number of findings in the Authorization Control category.
- Data
Encryption intFindings Count - The number of findings in the Data Encryption category.
- Db
Configuration intFindings Count - The number of findings in the Database Configuration category.
- Fine
Grained intAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- Privileges
And intRoles Findings Count - The number of findings in the Privileges and Roles category.
- Targets
Count int - The total number of targets in this security assessment.
- User
Accounts intFindings Count - The number of findings in the User Accounts category.
- auditing
Findings IntegerCount - The number of findings in the Auditing category.
- Integer
- The number of findings in the Authorization Control category.
- data
Encryption IntegerFindings Count - The number of findings in the Data Encryption category.
- db
Configuration IntegerFindings Count - The number of findings in the Database Configuration category.
- fine
Grained IntegerAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- privileges
And IntegerRoles Findings Count - The number of findings in the Privileges and Roles category.
- targets
Count Integer - The total number of targets in this security assessment.
- user
Accounts IntegerFindings Count - The number of findings in the User Accounts category.
- auditing
Findings numberCount - The number of findings in the Auditing category.
- number
- The number of findings in the Authorization Control category.
- data
Encryption numberFindings Count - The number of findings in the Data Encryption category.
- db
Configuration numberFindings Count - The number of findings in the Database Configuration category.
- fine
Grained numberAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- privileges
And numberRoles Findings Count - The number of findings in the Privileges and Roles category.
- targets
Count number - The total number of targets in this security assessment.
- user
Accounts numberFindings Count - The number of findings in the User Accounts category.
- auditing_
findings_ intcount - The number of findings in the Auditing category.
- int
- The number of findings in the Authorization Control category.
- data_
encryption_ intfindings_ count - The number of findings in the Data Encryption category.
- db_
configuration_ intfindings_ count - The number of findings in the Database Configuration category.
- fine_
grained_ intaccess_ control_ findings_ count - The number of findings in the Fine-Grained Access Control category.
- privileges_
and_ introles_ findings_ count - The number of findings in the Privileges and Roles category.
- targets_
count int - The total number of targets in this security assessment.
- user_
accounts_ intfindings_ count - The number of findings in the User Accounts category.
- auditing
Findings NumberCount - The number of findings in the Auditing category.
- Number
- The number of findings in the Authorization Control category.
- data
Encryption NumberFindings Count - The number of findings in the Data Encryption category.
- db
Configuration NumberFindings Count - The number of findings in the Database Configuration category.
- fine
Grained NumberAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- privileges
And NumberRoles Findings Count - The number of findings in the Privileges and Roles category.
- targets
Count Number - The total number of targets in this security assessment.
- user
Accounts NumberFindings Count - The number of findings in the User Accounts category.
GetSecurityAssessmentsSecurityAssessmentStatisticDeferred
- Auditing
Findings intCount - The number of findings in the Auditing category.
- int
- The number of findings in the Authorization Control category.
- Data
Encryption intFindings Count - The number of findings in the Data Encryption category.
- Db
Configuration intFindings Count - The number of findings in the Database Configuration category.
- Fine
Grained intAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- Privileges
And intRoles Findings Count - The number of findings in the Privileges and Roles category.
- Targets
Count int - The total number of targets in this security assessment.
- User
Accounts intFindings Count - The number of findings in the User Accounts category.
- Auditing
Findings intCount - The number of findings in the Auditing category.
- int
- The number of findings in the Authorization Control category.
- Data
Encryption intFindings Count - The number of findings in the Data Encryption category.
- Db
Configuration intFindings Count - The number of findings in the Database Configuration category.
- Fine
Grained intAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- Privileges
And intRoles Findings Count - The number of findings in the Privileges and Roles category.
- Targets
Count int - The total number of targets in this security assessment.
- User
Accounts intFindings Count - The number of findings in the User Accounts category.
- auditing
Findings IntegerCount - The number of findings in the Auditing category.
- Integer
- The number of findings in the Authorization Control category.
- data
Encryption IntegerFindings Count - The number of findings in the Data Encryption category.
- db
Configuration IntegerFindings Count - The number of findings in the Database Configuration category.
- fine
Grained IntegerAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- privileges
And IntegerRoles Findings Count - The number of findings in the Privileges and Roles category.
- targets
Count Integer - The total number of targets in this security assessment.
- user
Accounts IntegerFindings Count - The number of findings in the User Accounts category.
- auditing
Findings numberCount - The number of findings in the Auditing category.
- number
- The number of findings in the Authorization Control category.
- data
Encryption numberFindings Count - The number of findings in the Data Encryption category.
- db
Configuration numberFindings Count - The number of findings in the Database Configuration category.
- fine
Grained numberAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- privileges
And numberRoles Findings Count - The number of findings in the Privileges and Roles category.
- targets
Count number - The total number of targets in this security assessment.
- user
Accounts numberFindings Count - The number of findings in the User Accounts category.
- auditing_
findings_ intcount - The number of findings in the Auditing category.
- int
- The number of findings in the Authorization Control category.
- data_
encryption_ intfindings_ count - The number of findings in the Data Encryption category.
- db_
configuration_ intfindings_ count - The number of findings in the Database Configuration category.
- fine_
grained_ intaccess_ control_ findings_ count - The number of findings in the Fine-Grained Access Control category.
- privileges_
and_ introles_ findings_ count - The number of findings in the Privileges and Roles category.
- targets_
count int - The total number of targets in this security assessment.
- user_
accounts_ intfindings_ count - The number of findings in the User Accounts category.
- auditing
Findings NumberCount - The number of findings in the Auditing category.
- Number
- The number of findings in the Authorization Control category.
- data
Encryption NumberFindings Count - The number of findings in the Data Encryption category.
- db
Configuration NumberFindings Count - The number of findings in the Database Configuration category.
- fine
Grained NumberAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- privileges
And NumberRoles Findings Count - The number of findings in the Privileges and Roles category.
- targets
Count Number - The total number of targets in this security assessment.
- user
Accounts NumberFindings Count - The number of findings in the User Accounts category.
GetSecurityAssessmentsSecurityAssessmentStatisticEvaluate
- Auditing
Findings intCount - The number of findings in the Auditing category.
- int
- The number of findings in the Authorization Control category.
- Data
Encryption intFindings Count - The number of findings in the Data Encryption category.
- Db
Configuration intFindings Count - The number of findings in the Database Configuration category.
- Fine
Grained intAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- Privileges
And intRoles Findings Count - The number of findings in the Privileges and Roles category.
- Targets
Count int - The total number of targets in this security assessment.
- User
Accounts intFindings Count - The number of findings in the User Accounts category.
- Auditing
Findings intCount - The number of findings in the Auditing category.
- int
- The number of findings in the Authorization Control category.
- Data
Encryption intFindings Count - The number of findings in the Data Encryption category.
- Db
Configuration intFindings Count - The number of findings in the Database Configuration category.
- Fine
Grained intAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- Privileges
And intRoles Findings Count - The number of findings in the Privileges and Roles category.
- Targets
Count int - The total number of targets in this security assessment.
- User
Accounts intFindings Count - The number of findings in the User Accounts category.
- auditing
Findings IntegerCount - The number of findings in the Auditing category.
- Integer
- The number of findings in the Authorization Control category.
- data
Encryption IntegerFindings Count - The number of findings in the Data Encryption category.
- db
Configuration IntegerFindings Count - The number of findings in the Database Configuration category.
- fine
Grained IntegerAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- privileges
And IntegerRoles Findings Count - The number of findings in the Privileges and Roles category.
- targets
Count Integer - The total number of targets in this security assessment.
- user
Accounts IntegerFindings Count - The number of findings in the User Accounts category.
- auditing
Findings numberCount - The number of findings in the Auditing category.
- number
- The number of findings in the Authorization Control category.
- data
Encryption numberFindings Count - The number of findings in the Data Encryption category.
- db
Configuration numberFindings Count - The number of findings in the Database Configuration category.
- fine
Grained numberAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- privileges
And numberRoles Findings Count - The number of findings in the Privileges and Roles category.
- targets
Count number - The total number of targets in this security assessment.
- user
Accounts numberFindings Count - The number of findings in the User Accounts category.
- auditing_
findings_ intcount - The number of findings in the Auditing category.
- int
- The number of findings in the Authorization Control category.
- data_
encryption_ intfindings_ count - The number of findings in the Data Encryption category.
- db_
configuration_ intfindings_ count - The number of findings in the Database Configuration category.
- fine_
grained_ intaccess_ control_ findings_ count - The number of findings in the Fine-Grained Access Control category.
- privileges_
and_ introles_ findings_ count - The number of findings in the Privileges and Roles category.
- targets_
count int - The total number of targets in this security assessment.
- user_
accounts_ intfindings_ count - The number of findings in the User Accounts category.
- auditing
Findings NumberCount - The number of findings in the Auditing category.
- Number
- The number of findings in the Authorization Control category.
- data
Encryption NumberFindings Count - The number of findings in the Data Encryption category.
- db
Configuration NumberFindings Count - The number of findings in the Database Configuration category.
- fine
Grained NumberAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- privileges
And NumberRoles Findings Count - The number of findings in the Privileges and Roles category.
- targets
Count Number - The total number of targets in this security assessment.
- user
Accounts NumberFindings Count - The number of findings in the User Accounts category.
GetSecurityAssessmentsSecurityAssessmentStatisticHighRisk
- Auditing
Findings intCount - The number of findings in the Auditing category.
- int
- The number of findings in the Authorization Control category.
- Data
Encryption intFindings Count - The number of findings in the Data Encryption category.
- Db
Configuration intFindings Count - The number of findings in the Database Configuration category.
- Fine
Grained intAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- Privileges
And intRoles Findings Count - The number of findings in the Privileges and Roles category.
- Targets
Count int - The total number of targets in this security assessment.
- User
Accounts intFindings Count - The number of findings in the User Accounts category.
- Auditing
Findings intCount - The number of findings in the Auditing category.
- int
- The number of findings in the Authorization Control category.
- Data
Encryption intFindings Count - The number of findings in the Data Encryption category.
- Db
Configuration intFindings Count - The number of findings in the Database Configuration category.
- Fine
Grained intAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- Privileges
And intRoles Findings Count - The number of findings in the Privileges and Roles category.
- Targets
Count int - The total number of targets in this security assessment.
- User
Accounts intFindings Count - The number of findings in the User Accounts category.
- auditing
Findings IntegerCount - The number of findings in the Auditing category.
- Integer
- The number of findings in the Authorization Control category.
- data
Encryption IntegerFindings Count - The number of findings in the Data Encryption category.
- db
Configuration IntegerFindings Count - The number of findings in the Database Configuration category.
- fine
Grained IntegerAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- privileges
And IntegerRoles Findings Count - The number of findings in the Privileges and Roles category.
- targets
Count Integer - The total number of targets in this security assessment.
- user
Accounts IntegerFindings Count - The number of findings in the User Accounts category.
- auditing
Findings numberCount - The number of findings in the Auditing category.
- number
- The number of findings in the Authorization Control category.
- data
Encryption numberFindings Count - The number of findings in the Data Encryption category.
- db
Configuration numberFindings Count - The number of findings in the Database Configuration category.
- fine
Grained numberAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- privileges
And numberRoles Findings Count - The number of findings in the Privileges and Roles category.
- targets
Count number - The total number of targets in this security assessment.
- user
Accounts numberFindings Count - The number of findings in the User Accounts category.
- auditing_
findings_ intcount - The number of findings in the Auditing category.
- int
- The number of findings in the Authorization Control category.
- data_
encryption_ intfindings_ count - The number of findings in the Data Encryption category.
- db_
configuration_ intfindings_ count - The number of findings in the Database Configuration category.
- fine_
grained_ intaccess_ control_ findings_ count - The number of findings in the Fine-Grained Access Control category.
- privileges_
and_ introles_ findings_ count - The number of findings in the Privileges and Roles category.
- targets_
count int - The total number of targets in this security assessment.
- user_
accounts_ intfindings_ count - The number of findings in the User Accounts category.
- auditing
Findings NumberCount - The number of findings in the Auditing category.
- Number
- The number of findings in the Authorization Control category.
- data
Encryption NumberFindings Count - The number of findings in the Data Encryption category.
- db
Configuration NumberFindings Count - The number of findings in the Database Configuration category.
- fine
Grained NumberAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- privileges
And NumberRoles Findings Count - The number of findings in the Privileges and Roles category.
- targets
Count Number - The total number of targets in this security assessment.
- user
Accounts NumberFindings Count - The number of findings in the User Accounts category.
GetSecurityAssessmentsSecurityAssessmentStatisticLowRisk
- Auditing
Findings intCount - The number of findings in the Auditing category.
- int
- The number of findings in the Authorization Control category.
- Data
Encryption intFindings Count - The number of findings in the Data Encryption category.
- Db
Configuration intFindings Count - The number of findings in the Database Configuration category.
- Fine
Grained intAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- Privileges
And intRoles Findings Count - The number of findings in the Privileges and Roles category.
- Targets
Count int - The total number of targets in this security assessment.
- User
Accounts intFindings Count - The number of findings in the User Accounts category.
- Auditing
Findings intCount - The number of findings in the Auditing category.
- int
- The number of findings in the Authorization Control category.
- Data
Encryption intFindings Count - The number of findings in the Data Encryption category.
- Db
Configuration intFindings Count - The number of findings in the Database Configuration category.
- Fine
Grained intAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- Privileges
And intRoles Findings Count - The number of findings in the Privileges and Roles category.
- Targets
Count int - The total number of targets in this security assessment.
- User
Accounts intFindings Count - The number of findings in the User Accounts category.
- auditing
Findings IntegerCount - The number of findings in the Auditing category.
- Integer
- The number of findings in the Authorization Control category.
- data
Encryption IntegerFindings Count - The number of findings in the Data Encryption category.
- db
Configuration IntegerFindings Count - The number of findings in the Database Configuration category.
- fine
Grained IntegerAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- privileges
And IntegerRoles Findings Count - The number of findings in the Privileges and Roles category.
- targets
Count Integer - The total number of targets in this security assessment.
- user
Accounts IntegerFindings Count - The number of findings in the User Accounts category.
- auditing
Findings numberCount - The number of findings in the Auditing category.
- number
- The number of findings in the Authorization Control category.
- data
Encryption numberFindings Count - The number of findings in the Data Encryption category.
- db
Configuration numberFindings Count - The number of findings in the Database Configuration category.
- fine
Grained numberAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- privileges
And numberRoles Findings Count - The number of findings in the Privileges and Roles category.
- targets
Count number - The total number of targets in this security assessment.
- user
Accounts numberFindings Count - The number of findings in the User Accounts category.
- auditing_
findings_ intcount - The number of findings in the Auditing category.
- int
- The number of findings in the Authorization Control category.
- data_
encryption_ intfindings_ count - The number of findings in the Data Encryption category.
- db_
configuration_ intfindings_ count - The number of findings in the Database Configuration category.
- fine_
grained_ intaccess_ control_ findings_ count - The number of findings in the Fine-Grained Access Control category.
- privileges_
and_ introles_ findings_ count - The number of findings in the Privileges and Roles category.
- targets_
count int - The total number of targets in this security assessment.
- user_
accounts_ intfindings_ count - The number of findings in the User Accounts category.
- auditing
Findings NumberCount - The number of findings in the Auditing category.
- Number
- The number of findings in the Authorization Control category.
- data
Encryption NumberFindings Count - The number of findings in the Data Encryption category.
- db
Configuration NumberFindings Count - The number of findings in the Database Configuration category.
- fine
Grained NumberAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- privileges
And NumberRoles Findings Count - The number of findings in the Privileges and Roles category.
- targets
Count Number - The total number of targets in this security assessment.
- user
Accounts NumberFindings Count - The number of findings in the User Accounts category.
GetSecurityAssessmentsSecurityAssessmentStatisticMediumRisk
- Auditing
Findings intCount - The number of findings in the Auditing category.
- int
- The number of findings in the Authorization Control category.
- Data
Encryption intFindings Count - The number of findings in the Data Encryption category.
- Db
Configuration intFindings Count - The number of findings in the Database Configuration category.
- Fine
Grained intAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- Privileges
And intRoles Findings Count - The number of findings in the Privileges and Roles category.
- Targets
Count int - The total number of targets in this security assessment.
- User
Accounts intFindings Count - The number of findings in the User Accounts category.
- Auditing
Findings intCount - The number of findings in the Auditing category.
- int
- The number of findings in the Authorization Control category.
- Data
Encryption intFindings Count - The number of findings in the Data Encryption category.
- Db
Configuration intFindings Count - The number of findings in the Database Configuration category.
- Fine
Grained intAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- Privileges
And intRoles Findings Count - The number of findings in the Privileges and Roles category.
- Targets
Count int - The total number of targets in this security assessment.
- User
Accounts intFindings Count - The number of findings in the User Accounts category.
- auditing
Findings IntegerCount - The number of findings in the Auditing category.
- Integer
- The number of findings in the Authorization Control category.
- data
Encryption IntegerFindings Count - The number of findings in the Data Encryption category.
- db
Configuration IntegerFindings Count - The number of findings in the Database Configuration category.
- fine
Grained IntegerAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- privileges
And IntegerRoles Findings Count - The number of findings in the Privileges and Roles category.
- targets
Count Integer - The total number of targets in this security assessment.
- user
Accounts IntegerFindings Count - The number of findings in the User Accounts category.
- auditing
Findings numberCount - The number of findings in the Auditing category.
- number
- The number of findings in the Authorization Control category.
- data
Encryption numberFindings Count - The number of findings in the Data Encryption category.
- db
Configuration numberFindings Count - The number of findings in the Database Configuration category.
- fine
Grained numberAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- privileges
And numberRoles Findings Count - The number of findings in the Privileges and Roles category.
- targets
Count number - The total number of targets in this security assessment.
- user
Accounts numberFindings Count - The number of findings in the User Accounts category.
- auditing_
findings_ intcount - The number of findings in the Auditing category.
- int
- The number of findings in the Authorization Control category.
- data_
encryption_ intfindings_ count - The number of findings in the Data Encryption category.
- db_
configuration_ intfindings_ count - The number of findings in the Database Configuration category.
- fine_
grained_ intaccess_ control_ findings_ count - The number of findings in the Fine-Grained Access Control category.
- privileges_
and_ introles_ findings_ count - The number of findings in the Privileges and Roles category.
- targets_
count int - The total number of targets in this security assessment.
- user_
accounts_ intfindings_ count - The number of findings in the User Accounts category.
- auditing
Findings NumberCount - The number of findings in the Auditing category.
- Number
- The number of findings in the Authorization Control category.
- data
Encryption NumberFindings Count - The number of findings in the Data Encryption category.
- db
Configuration NumberFindings Count - The number of findings in the Database Configuration category.
- fine
Grained NumberAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- privileges
And NumberRoles Findings Count - The number of findings in the Privileges and Roles category.
- targets
Count Number - The total number of targets in this security assessment.
- user
Accounts NumberFindings Count - The number of findings in the User Accounts category.
GetSecurityAssessmentsSecurityAssessmentStatisticPass
- Auditing
Findings intCount - The number of findings in the Auditing category.
- int
- The number of findings in the Authorization Control category.
- Data
Encryption intFindings Count - The number of findings in the Data Encryption category.
- Db
Configuration intFindings Count - The number of findings in the Database Configuration category.
- Fine
Grained intAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- Privileges
And intRoles Findings Count - The number of findings in the Privileges and Roles category.
- Targets
Count int - The total number of targets in this security assessment.
- User
Accounts intFindings Count - The number of findings in the User Accounts category.
- Auditing
Findings intCount - The number of findings in the Auditing category.
- int
- The number of findings in the Authorization Control category.
- Data
Encryption intFindings Count - The number of findings in the Data Encryption category.
- Db
Configuration intFindings Count - The number of findings in the Database Configuration category.
- Fine
Grained intAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- Privileges
And intRoles Findings Count - The number of findings in the Privileges and Roles category.
- Targets
Count int - The total number of targets in this security assessment.
- User
Accounts intFindings Count - The number of findings in the User Accounts category.
- auditing
Findings IntegerCount - The number of findings in the Auditing category.
- Integer
- The number of findings in the Authorization Control category.
- data
Encryption IntegerFindings Count - The number of findings in the Data Encryption category.
- db
Configuration IntegerFindings Count - The number of findings in the Database Configuration category.
- fine
Grained IntegerAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- privileges
And IntegerRoles Findings Count - The number of findings in the Privileges and Roles category.
- targets
Count Integer - The total number of targets in this security assessment.
- user
Accounts IntegerFindings Count - The number of findings in the User Accounts category.
- auditing
Findings numberCount - The number of findings in the Auditing category.
- number
- The number of findings in the Authorization Control category.
- data
Encryption numberFindings Count - The number of findings in the Data Encryption category.
- db
Configuration numberFindings Count - The number of findings in the Database Configuration category.
- fine
Grained numberAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- privileges
And numberRoles Findings Count - The number of findings in the Privileges and Roles category.
- targets
Count number - The total number of targets in this security assessment.
- user
Accounts numberFindings Count - The number of findings in the User Accounts category.
- auditing_
findings_ intcount - The number of findings in the Auditing category.
- int
- The number of findings in the Authorization Control category.
- data_
encryption_ intfindings_ count - The number of findings in the Data Encryption category.
- db_
configuration_ intfindings_ count - The number of findings in the Database Configuration category.
- fine_
grained_ intaccess_ control_ findings_ count - The number of findings in the Fine-Grained Access Control category.
- privileges_
and_ introles_ findings_ count - The number of findings in the Privileges and Roles category.
- targets_
count int - The total number of targets in this security assessment.
- user_
accounts_ intfindings_ count - The number of findings in the User Accounts category.
- auditing
Findings NumberCount - The number of findings in the Auditing category.
- Number
- The number of findings in the Authorization Control category.
- data
Encryption NumberFindings Count - The number of findings in the Data Encryption category.
- db
Configuration NumberFindings Count - The number of findings in the Database Configuration category.
- fine
Grained NumberAccess Control Findings Count - The number of findings in the Fine-Grained Access Control category.
- privileges
And NumberRoles Findings Count - The number of findings in the Privileges and Roles category.
- targets
Count Number - The total number of targets in this security assessment.
- user
Accounts NumberFindings Count - The number of findings in the User Accounts category.
Package Details
- Repository
- oci pulumi/pulumi-oci
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
oci
Terraform Provider.