managedServiceData property
Details about the service that are specific to the service type, in JSON
format. For service type SHIELD_ADVANCED
, this is an empty
string.
-
Example:
NETWORK_FIREWALL
"{"type":"NETWORK_FIREWALL","networkFirewallStatelessRuleGroupReferences":
{\"resourceARN\":\"arn:aws:network-firewall:us-west-1:1234567891011:stateless-rulegroup/rulegroup2\",\"priority\":10}
,"networkFirewallStatelessDefaultActions":\"aws:pass\",\"custom1\"
,"networkFirewallStatelessFragmentDefaultActions":\"custom2\",\"aws:pass\"
,"networkFirewallStatelessCustomActions":[{"actionName":"custom1","actionDefinition":{"publishMetricAction":{"dimensions":{\"value\":\"dimension1\"}
}}},{"actionName":"custom2","actionDefinition":{"publishMetricAction":{"dimensions":{\"value\":\"dimension2\"}
}}}],"networkFirewallStatefulRuleGroupReferences":{\"resourceARN\":\"arn:aws:network-firewall:us-west-1:1234567891011:stateful-rulegroup/rulegroup1\"}
,"networkFirewallOrchestrationConfig":{"singleFirewallEndpointPerVPC":true,"allowedIPV4CidrList":\"10.24.34.0/28\"
} }" -
Example:
WAFV2
"{"type":"WAFV2","preProcessRuleGroups":
{\"ruleGroupArn\":null,\"overrideAction\":{\"type\":\"NONE\"},\"managedRuleGroupIdentifier\":{\"version\":null,\"vendorName\":\"AWS\",\"managedRuleGroupName\":\"AWSManagedRulesAmazonIpReputationList\"},\"ruleGroupType\":\"ManagedRuleGroup\",\"excludeRules\":[]}
,"postProcessRuleGroups":[],"defaultAction":{"type":"ALLOW"},"overrideCustomerWebACLAssociation":false,"loggingConfiguration":{"logDestinationConfigs":\"arn:aws:firehose:us-west-2:12345678912:deliverystream/aws-waf-logs-fms-admin-destination\"
,"redactedFields":{\"redactedFieldType\":\"SingleHeader\",\"redactedFieldValue\":\"Cookies\"},{\"redactedFieldType\":\"Method\"}
}}"In the
loggingConfiguration
, you can specify onelogDestinationConfigs
, you can optionally provide up to 20redactedFields
, and theRedactedFieldType
must be one ofURI
,QUERY_STRING
,HEADER
, orMETHOD
. -
Example:
WAF Classic
"{"type": "WAF", "ruleGroups":
{\"id\":\"12345678-1bcd-9012-efga-0987654321ab\", \"overrideAction\" : {\"type\": \"COUNT\"}}
, "defaultAction": {"type": "BLOCK"}}" -
Example:
SECURITY_GROUPS_COMMON
"{"type":"SECURITY_GROUPS_COMMON","revertManualSecurityGroupChanges":false,"exclusiveResourceSecurityGroupManagement":false, "applyToAllEC2InstanceENIs":false,"securityGroups":
{\"id\":\" sg-000e55995d61a06bd\"}
}" -
Example:
SECURITY_GROUPS_CONTENT_AUDIT
"{"type":"SECURITY_GROUPS_CONTENT_AUDIT","securityGroups":
{\"id\":\"sg-000e55995d61a06bd\"}
,"securityGroupAction":{"type":"ALLOW"}}"The security group action for content audit can be
ALLOW
orDENY
. ForALLOW
, all in-scope security group rules must be within the allowed range of the policy's security group rules. ForDENY
, all in-scope security group rules must not contain a value or a range that matches a rule value or range in the policy security group. -
Example:
SECURITY_GROUPS_USAGE_AUDIT
"{"type":"SECURITY_GROUPS_USAGE_AUDIT","deleteUnusedSecurityGroups":true,"coalesceRedundantSecurityGroups":true}"
Implementation
final String? managedServiceData;