Put Policy
fms_put_policy | R Documentation |
Creates an Firewall Manager policy¶
Description¶
Creates an Firewall Manager policy.
A Firewall Manager policy is specific to the individual policy type. If you want to enforce multiple policy types across accounts, you can create multiple policies. You can create more than one policy for each type.
If you add a new account to an organization that you created with Organizations, Firewall Manager automatically applies the policy to the resources in that account that are within scope of the policy.
Firewall Manager provides the following types of policies:
-
WAF policy - This policy applies WAF web ACL protections to specified accounts and resources.
-
Shield Advanced policy - This policy applies Shield Advanced protection to specified accounts and resources.
-
Security Groups policy - This type of policy gives you control over security groups that are in use throughout your organization in Organizations and lets you enforce a baseline set of rules across your organization.
-
Network ACL policy - This type of policy gives you control over the network ACLs that are in use throughout your organization in Organizations and lets you enforce a baseline set of first and last network ACL rules across your organization.
-
Network Firewall policy - This policy applies Network Firewall protection to your organization's VPCs.
-
DNS Firewall policy - This policy applies Amazon Route 53 Resolver DNS Firewall protections to your organization's VPCs.
-
Third-party firewall policy - This policy applies third-party firewall protections. Third-party firewalls are available by subscription through the Amazon Web Services Marketplace console at Amazon Web Services Marketplace.
-
Palo Alto Networks Cloud NGFW policy - This policy applies Palo Alto Networks Cloud Next Generation Firewall (NGFW) protections and Palo Alto Networks Cloud NGFW rulestacks to your organization's VPCs.
-
Fortigate CNF policy - This policy applies Fortigate Cloud Native Firewall (CNF) protections. Fortigate CNF is a cloud-centered solution that blocks Zero-Day threats and secures cloud infrastructures with industry-leading advanced threat prevention, smart web application firewalls (WAF), and API protection.
-
Usage¶
Arguments¶
Policy
[required] The details of the Firewall Manager policy to be created.
TagList
The tags to add to the Amazon Web Services resource.
Value¶
A list with the following syntax:
list(
Policy = list(
PolicyId = "string",
PolicyName = "string",
PolicyUpdateToken = "string",
SecurityServicePolicyData = list(
Type = "WAF"|"WAFV2"|"SHIELD_ADVANCED"|"SECURITY_GROUPS_COMMON"|"SECURITY_GROUPS_CONTENT_AUDIT"|"SECURITY_GROUPS_USAGE_AUDIT"|"NETWORK_FIREWALL"|"DNS_FIREWALL"|"THIRD_PARTY_FIREWALL"|"IMPORT_NETWORK_FIREWALL"|"NETWORK_ACL_COMMON",
ManagedServiceData = "string",
PolicyOption = list(
NetworkFirewallPolicy = list(
FirewallDeploymentModel = "CENTRALIZED"|"DISTRIBUTED"
),
ThirdPartyFirewallPolicy = list(
FirewallDeploymentModel = "CENTRALIZED"|"DISTRIBUTED"
),
NetworkAclCommonPolicy = list(
NetworkAclEntrySet = list(
FirstEntries = list(
list(
IcmpTypeCode = list(
Code = 123,
Type = 123
),
Protocol = "string",
PortRange = list(
From = 123,
To = 123
),
CidrBlock = "string",
Ipv6CidrBlock = "string",
RuleAction = "allow"|"deny",
Egress = TRUE|FALSE
)
),
ForceRemediateForFirstEntries = TRUE|FALSE,
LastEntries = list(
list(
IcmpTypeCode = list(
Code = 123,
Type = 123
),
Protocol = "string",
PortRange = list(
From = 123,
To = 123
),
CidrBlock = "string",
Ipv6CidrBlock = "string",
RuleAction = "allow"|"deny",
Egress = TRUE|FALSE
)
),
ForceRemediateForLastEntries = TRUE|FALSE
)
)
)
),
ResourceType = "string",
ResourceTypeList = list(
"string"
),
ResourceTags = list(
list(
Key = "string",
Value = "string"
)
),
ExcludeResourceTags = TRUE|FALSE,
RemediationEnabled = TRUE|FALSE,
DeleteUnusedFMManagedResources = TRUE|FALSE,
IncludeMap = list(
list(
"string"
)
),
ExcludeMap = list(
list(
"string"
)
),
ResourceSetIds = list(
"string"
),
PolicyDescription = "string",
PolicyStatus = "ACTIVE"|"OUT_OF_ADMIN_SCOPE"
),
PolicyArn = "string"
)
Request syntax¶
svc$put_policy(
Policy = list(
PolicyId = "string",
PolicyName = "string",
PolicyUpdateToken = "string",
SecurityServicePolicyData = list(
Type = "WAF"|"WAFV2"|"SHIELD_ADVANCED"|"SECURITY_GROUPS_COMMON"|"SECURITY_GROUPS_CONTENT_AUDIT"|"SECURITY_GROUPS_USAGE_AUDIT"|"NETWORK_FIREWALL"|"DNS_FIREWALL"|"THIRD_PARTY_FIREWALL"|"IMPORT_NETWORK_FIREWALL"|"NETWORK_ACL_COMMON",
ManagedServiceData = "string",
PolicyOption = list(
NetworkFirewallPolicy = list(
FirewallDeploymentModel = "CENTRALIZED"|"DISTRIBUTED"
),
ThirdPartyFirewallPolicy = list(
FirewallDeploymentModel = "CENTRALIZED"|"DISTRIBUTED"
),
NetworkAclCommonPolicy = list(
NetworkAclEntrySet = list(
FirstEntries = list(
list(
IcmpTypeCode = list(
Code = 123,
Type = 123
),
Protocol = "string",
PortRange = list(
From = 123,
To = 123
),
CidrBlock = "string",
Ipv6CidrBlock = "string",
RuleAction = "allow"|"deny",
Egress = TRUE|FALSE
)
),
ForceRemediateForFirstEntries = TRUE|FALSE,
LastEntries = list(
list(
IcmpTypeCode = list(
Code = 123,
Type = 123
),
Protocol = "string",
PortRange = list(
From = 123,
To = 123
),
CidrBlock = "string",
Ipv6CidrBlock = "string",
RuleAction = "allow"|"deny",
Egress = TRUE|FALSE
)
),
ForceRemediateForLastEntries = TRUE|FALSE
)
)
)
),
ResourceType = "string",
ResourceTypeList = list(
"string"
),
ResourceTags = list(
list(
Key = "string",
Value = "string"
)
),
ExcludeResourceTags = TRUE|FALSE,
RemediationEnabled = TRUE|FALSE,
DeleteUnusedFMManagedResources = TRUE|FALSE,
IncludeMap = list(
list(
"string"
)
),
ExcludeMap = list(
list(
"string"
)
),
ResourceSetIds = list(
"string"
),
PolicyDescription = "string",
PolicyStatus = "ACTIVE"|"OUT_OF_ADMIN_SCOPE"
),
TagList = list(
list(
Key = "string",
Value = "string"
)
)
)