threat_intel_sets
Creates, updates, deletes or gets a threat_intel_set resource or lists threat_intel_sets in a region
Overview
| Name | threat_intel_sets |
| Type | Resource |
| Description | Resource Type definition for AWS::GuardDuty::ThreatIntelSet |
| Id | awscc.guardduty.threat_intel_sets |
Fields
- get (all properties)
- list (identifiers only)
| Name | Datatype | Description |
|---|---|---|
id | string | |
format | string | |
activate | boolean | |
detector_id | string | |
name | string | |
location | string | |
expected_bucket_owner | string | |
tags | array | |
region | string | AWS region. |
| Name | Datatype | Description |
|---|---|---|
id | string | |
detector_id | string | |
region | string | AWS region. |
For more information, see AWS::GuardDuty::ThreatIntelSet.
Methods
| Name | Resource | Accessible by | Required Params |
|---|---|---|---|
create_resource | threat_intel_sets | INSERT | Format, Location, region |
delete_resource | threat_intel_sets | DELETE | Identifier, region |
update_resource | threat_intel_sets | UPDATE | Identifier, PatchDocument, region |
list_resources | threat_intel_sets_list_only | SELECT | region |
get_resource | threat_intel_sets | SELECT | Identifier, region |
SELECT examples
- get (all properties)
- list (identifiers only)
Gets all properties from an individual threat_intel_set.
SELECT
region,
id,
format,
activate,
detector_id,
name,
location,
expected_bucket_owner,
tags
FROM awscc.guardduty.threat_intel_sets
WHERE
region = 'us-east-1' AND
Identifier = '{{ id }}|{{ detector_id }}';
Lists all threat_intel_sets in a region.
SELECT
region,
id,
detector_id
FROM awscc.guardduty.threat_intel_sets_list_only
WHERE
region = 'us-east-1';
INSERT example
Use the following StackQL query and manifest file to create a new threat_intel_set resource, using stack-deploy.
- Required Properties
- All Properties
- Manifest
/*+ create */
INSERT INTO awscc.guardduty.threat_intel_sets (
Format,
Location,
region
)
SELECT
'{{ format }}',
'{{ location }}',
'{{ region }}';
/*+ create */
INSERT INTO awscc.guardduty.threat_intel_sets (
Format,
Activate,
DetectorId,
Name,
Location,
ExpectedBucketOwner,
Tags,
region
)
SELECT
'{{ format }}',
'{{ activate }}',
'{{ detector_id }}',
'{{ name }}',
'{{ location }}',
'{{ expected_bucket_owner }}',
'{{ tags }}',
'{{ region }}';
version: 1
name: stack name
description: stack description
providers:
- aws
globals:
- name: region
value: '{{ vars.AWS_REGION }}'
resources:
- name: threat_intel_set
props:
- name: format
value: '{{ format }}'
- name: activate
value: '{{ activate }}'
- name: detector_id
value: '{{ detector_id }}'
- name: name
value: '{{ name }}'
- name: location
value: '{{ location }}'
- name: expected_bucket_owner
value: '{{ expected_bucket_owner }}'
- name: tags
value:
- key: '{{ key }}'
value: '{{ value }}'
UPDATE example
Use the following StackQL query and manifest file to update a threat_intel_set resource, using stack-deploy.
/*+ update */
UPDATE awscc.guardduty.threat_intel_sets
SET PatchDocument = string('{{ {
"Activate": activate,
"Name": name,
"Location": location,
"ExpectedBucketOwner": expected_bucket_owner,
"Tags": tags
} | generate_patch_document }}')
WHERE
region = '{{ region }}' AND
Identifier = '{{ id }}|{{ detector_id }}';
DELETE example
/*+ delete */
DELETE FROM awscc.guardduty.threat_intel_sets
WHERE
Identifier = '{{ id }}|{{ detector_id }}' AND
region = 'us-east-1';
Permissions
To operate on the threat_intel_sets resource, the following permissions are required:
- Create
- Read
- Delete
- Update
- List
guardduty:CreateThreatIntelSet,
guardduty:GetThreatIntelSet,
guardduty:TagResource,
iam:PutRolePolicy
guardduty:GetThreatIntelSet
guardduty:ListDetectors,
guardduty:ListThreatIntelSets,
guardduty:DeleteThreatIntelSet,
guardduty:GetThreatIntelSet,
iam:DeleteRolePolicy
guardduty:UpdateThreatIntelSet,
guardduty:GetThreatIntelSet,
guardduty:ListThreatIntelSets,
iam:PutRolePolicy,
guardduty:TagResource,
guardduty:UntagResource
guardduty:ListThreatIntelSets