Skip to main content

threat_intel_sets

Creates, updates, deletes or gets a threat_intel_set resource or lists threat_intel_sets in a region

Overview

Namethreat_intel_sets
TypeResource
DescriptionResource Type definition for AWS::GuardDuty::ThreatIntelSet
Idawscc.guardduty.threat_intel_sets

Fields

NameDatatypeDescription
idstring
formatstring
activateboolean
detector_idstring
namestring
locationstring
expected_bucket_ownerstring
tagsarray
regionstringAWS region.

For more information, see AWS::GuardDuty::ThreatIntelSet.

Methods

NameResourceAccessible byRequired Params
create_resourcethreat_intel_setsINSERTFormat, Location, region
delete_resourcethreat_intel_setsDELETEIdentifier, region
update_resourcethreat_intel_setsUPDATEIdentifier, PatchDocument, region
list_resourcesthreat_intel_sets_list_onlySELECTregion
get_resourcethreat_intel_setsSELECTIdentifier, region

SELECT examples

Gets all properties from an individual threat_intel_set.

SELECT
region,
id,
format,
activate,
detector_id,
name,
location,
expected_bucket_owner,
tags
FROM awscc.guardduty.threat_intel_sets
WHERE
region = 'us-east-1' AND
Identifier = '{{ id }}|{{ detector_id }}';

INSERT example

Use the following StackQL query and manifest file to create a new threat_intel_set resource, using stack-deploy.

/*+ create */
INSERT INTO awscc.guardduty.threat_intel_sets (
Format,
Location,
region
)
SELECT
'{{ format }}',
'{{ location }}',
'{{ region }}';

UPDATE example

Use the following StackQL query and manifest file to update a threat_intel_set resource, using stack-deploy.

/*+ update */
UPDATE awscc.guardduty.threat_intel_sets
SET PatchDocument = string('{{ {
"Activate": activate,
"Name": name,
"Location": location,
"ExpectedBucketOwner": expected_bucket_owner,
"Tags": tags
} | generate_patch_document }}')
WHERE
region = '{{ region }}' AND
Identifier = '{{ id }}|{{ detector_id }}';

DELETE example

/*+ delete */
DELETE FROM awscc.guardduty.threat_intel_sets
WHERE
Identifier = '{{ id }}|{{ detector_id }}' AND
region = 'us-east-1';

Permissions

To operate on the threat_intel_sets resource, the following permissions are required:

guardduty:CreateThreatIntelSet,
guardduty:GetThreatIntelSet,
guardduty:TagResource,
iam:PutRolePolicy