pulumi-oci 1.19.0a1705693078__py3-none-any.whl → 1.20.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (111) hide show
  1. pulumi_oci/__init__.py +59 -0
  2. pulumi_oci/adm/_inputs.py +99 -18
  3. pulumi_oci/adm/get_remediation_run_application_dependency_recommendations.py +23 -3
  4. pulumi_oci/adm/get_vulnerability_audit.py +31 -5
  5. pulumi_oci/adm/get_vulnerability_audit_application_dependency_vulnerabilities.py +43 -6
  6. pulumi_oci/adm/get_vulnerability_audit_application_dependency_vulnerability.py +27 -1
  7. pulumi_oci/adm/get_vulnerability_audits.py +54 -3
  8. pulumi_oci/adm/outputs.py +296 -31
  9. pulumi_oci/adm/remediation_recipe.py +2 -0
  10. pulumi_oci/adm/vulnerability_audit.py +96 -37
  11. pulumi_oci/database/__init__.py +1 -0
  12. pulumi_oci/database/_inputs.py +40 -0
  13. pulumi_oci/database/cloud_vm_cluster.py +22 -1
  14. pulumi_oci/database/get_system_versions.py +173 -0
  15. pulumi_oci/database/outputs.py +88 -0
  16. pulumi_oci/database/vm_cluster.py +22 -1
  17. pulumi_oci/datasafe/__init__.py +22 -0
  18. pulumi_oci/datasafe/_inputs.py +1826 -161
  19. pulumi_oci/datasafe/audit_trail.py +140 -0
  20. pulumi_oci/datasafe/discovery_mod.py +7 -7
  21. pulumi_oci/datasafe/get_audit_trail.py +66 -1
  22. pulumi_oci/datasafe/get_discovery_job.py +1 -1
  23. pulumi_oci/datasafe/get_discovery_jobs_result.py +1 -1
  24. pulumi_oci/datasafe/get_discovery_jobs_results.py +1 -1
  25. pulumi_oci/datasafe/get_masking_policies_masking_column.py +1 -1
  26. pulumi_oci/datasafe/get_masking_policies_masking_columns.py +1 -1
  27. pulumi_oci/datasafe/get_masking_policy.py +1 -1
  28. pulumi_oci/datasafe/get_report.py +1 -1
  29. pulumi_oci/datasafe/get_security_assessment.py +3 -3
  30. pulumi_oci/datasafe/get_security_assessment_comparison.py +5 -5
  31. pulumi_oci/datasafe/get_security_assessment_finding.py +29 -3
  32. pulumi_oci/datasafe/get_security_assessment_finding_analytics.py +276 -0
  33. pulumi_oci/datasafe/get_security_assessment_findings.py +43 -7
  34. pulumi_oci/datasafe/get_security_assessment_findings_change_audit_logs.py +309 -0
  35. pulumi_oci/datasafe/get_security_assessment_security_feature_analytics.py +198 -0
  36. pulumi_oci/datasafe/get_security_assessment_security_features.py +377 -0
  37. pulumi_oci/datasafe/get_security_assessments.py +2 -2
  38. pulumi_oci/datasafe/get_security_policies.py +253 -0
  39. pulumi_oci/datasafe/get_security_policy.py +235 -0
  40. pulumi_oci/datasafe/get_security_policy_deployment.py +261 -0
  41. pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_state.py +165 -0
  42. pulumi_oci/datasafe/get_security_policy_deployment_security_policy_entry_states.py +180 -0
  43. pulumi_oci/datasafe/get_security_policy_deployments.py +293 -0
  44. pulumi_oci/datasafe/get_security_policy_report.py +248 -0
  45. pulumi_oci/datasafe/get_security_policy_report_database_table_access_entries.py +158 -0
  46. pulumi_oci/datasafe/get_security_policy_report_database_table_access_entry.py +408 -0
  47. pulumi_oci/datasafe/get_security_policy_report_database_view_access_entries.py +178 -0
  48. pulumi_oci/datasafe/get_security_policy_report_database_view_access_entry.py +382 -0
  49. pulumi_oci/datasafe/get_security_policy_report_role_grant_paths.py +177 -0
  50. pulumi_oci/datasafe/get_security_policy_reports.py +273 -0
  51. pulumi_oci/datasafe/get_sensitive_data_model.py +1 -1
  52. pulumi_oci/datasafe/get_target_database.py +27 -4
  53. pulumi_oci/datasafe/get_target_database_peer_target_database.py +263 -0
  54. pulumi_oci/datasafe/get_target_database_peer_target_databases.py +133 -0
  55. pulumi_oci/datasafe/get_target_databases.py +1 -1
  56. pulumi_oci/datasafe/get_user_assessment.py +5 -5
  57. pulumi_oci/datasafe/get_user_assessment_comparison.py +2 -2
  58. pulumi_oci/datasafe/get_user_assessment_user_access_analytics.py +133 -0
  59. pulumi_oci/datasafe/get_user_assessment_user_analytics.py +2 -2
  60. pulumi_oci/datasafe/get_user_assessment_users.py +42 -2
  61. pulumi_oci/datasafe/get_user_assessments.py +2 -2
  62. pulumi_oci/datasafe/masking_policies_masking_column.py +7 -7
  63. pulumi_oci/datasafe/masking_policy.py +9 -9
  64. pulumi_oci/datasafe/outputs.py +16686 -9777
  65. pulumi_oci/datasafe/report.py +559 -0
  66. pulumi_oci/datasafe/security_assessment.py +12 -12
  67. pulumi_oci/datasafe/sensitive_data_model.py +7 -7
  68. pulumi_oci/datasafe/set_security_assessment_baseline.py +7 -7
  69. pulumi_oci/datasafe/set_user_assessment_baseline.py +7 -7
  70. pulumi_oci/datasafe/target_database.py +146 -25
  71. pulumi_oci/datasafe/target_database_peer_target_database.py +634 -0
  72. pulumi_oci/datasafe/user_assessment.py +20 -20
  73. pulumi_oci/generativeai/__init__.py +18 -0
  74. pulumi_oci/generativeai/_inputs.py +534 -0
  75. pulumi_oci/generativeai/dedicated_ai_cluster.py +808 -0
  76. pulumi_oci/generativeai/endpoint.py +717 -0
  77. pulumi_oci/generativeai/get_dedicated_ai_cluster.py +288 -0
  78. pulumi_oci/generativeai/get_dedicated_ai_clusters.py +183 -0
  79. pulumi_oci/generativeai/get_endpoint.py +275 -0
  80. pulumi_oci/generativeai/get_endpoints.py +183 -0
  81. pulumi_oci/generativeai/get_model.py +353 -0
  82. pulumi_oci/generativeai/get_models.py +220 -0
  83. pulumi_oci/generativeai/model.py +858 -0
  84. pulumi_oci/generativeai/outputs.py +1721 -0
  85. pulumi_oci/marketplace/get_publication.py +14 -1
  86. pulumi_oci/marketplace/outputs.py +11 -0
  87. pulumi_oci/marketplace/publication.py +28 -0
  88. pulumi_oci/monitoring/__init__.py +3 -0
  89. pulumi_oci/monitoring/_inputs.py +82 -4
  90. pulumi_oci/monitoring/alarm.py +15 -15
  91. pulumi_oci/monitoring/alarm_suppression.py +745 -0
  92. pulumi_oci/monitoring/get_alarm.py +5 -5
  93. pulumi_oci/monitoring/get_alarm_history_collection.py +4 -4
  94. pulumi_oci/monitoring/get_alarm_statuses.py +3 -1
  95. pulumi_oci/monitoring/get_alarm_suppression.py +276 -0
  96. pulumi_oci/monitoring/get_alarm_suppressions.py +192 -0
  97. pulumi_oci/monitoring/get_metric_data.py +12 -8
  98. pulumi_oci/monitoring/get_metrics.py +2 -2
  99. pulumi_oci/monitoring/outputs.py +355 -50
  100. pulumi_oci/networkfirewall/_inputs.py +25 -20
  101. pulumi_oci/networkfirewall/outputs.py +40 -30
  102. pulumi_oci/stackmonitoring/__init__.py +3 -0
  103. pulumi_oci/stackmonitoring/_inputs.py +143 -0
  104. pulumi_oci/stackmonitoring/get_process_set.py +236 -0
  105. pulumi_oci/stackmonitoring/get_process_sets.py +156 -0
  106. pulumi_oci/stackmonitoring/outputs.py +422 -0
  107. pulumi_oci/stackmonitoring/process_set.py +548 -0
  108. {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/METADATA +1 -1
  109. {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/RECORD +111 -70
  110. {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/WHEEL +0 -0
  111. {pulumi_oci-1.19.0a1705693078.dist-info → pulumi_oci-1.20.0.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,377 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import pulumi
8
+ import pulumi.runtime
9
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
10
+ from .. import _utilities
11
+ from . import outputs
12
+ from ._inputs import *
13
+
14
+ __all__ = [
15
+ 'GetSecurityAssessmentSecurityFeaturesResult',
16
+ 'AwaitableGetSecurityAssessmentSecurityFeaturesResult',
17
+ 'get_security_assessment_security_features',
18
+ 'get_security_assessment_security_features_output',
19
+ ]
20
+
21
+ @pulumi.output_type
22
+ class GetSecurityAssessmentSecurityFeaturesResult:
23
+ """
24
+ A collection of values returned by getSecurityAssessmentSecurityFeatures.
25
+ """
26
+ def __init__(__self__, access_level=None, compartment_id=None, compartment_id_in_subtree=None, filters=None, id=None, security_feature_collections=None, target_id=None, targets_with_column_encryption=None, targets_with_database_vault=None, targets_with_external_authentication=None, targets_with_fine_grained_audit=None, targets_with_global_authentication=None, targets_with_network_encryption=None, targets_with_password_authentication=None, targets_with_privilege_analysis=None, targets_with_tablespace_encryption=None, targets_with_traditional_audit=None, targets_with_unified_audit=None):
27
+ if access_level and not isinstance(access_level, str):
28
+ raise TypeError("Expected argument 'access_level' to be a str")
29
+ pulumi.set(__self__, "access_level", access_level)
30
+ if compartment_id and not isinstance(compartment_id, str):
31
+ raise TypeError("Expected argument 'compartment_id' to be a str")
32
+ pulumi.set(__self__, "compartment_id", compartment_id)
33
+ if compartment_id_in_subtree and not isinstance(compartment_id_in_subtree, bool):
34
+ raise TypeError("Expected argument 'compartment_id_in_subtree' to be a bool")
35
+ pulumi.set(__self__, "compartment_id_in_subtree", compartment_id_in_subtree)
36
+ if filters and not isinstance(filters, list):
37
+ raise TypeError("Expected argument 'filters' to be a list")
38
+ pulumi.set(__self__, "filters", filters)
39
+ if id and not isinstance(id, str):
40
+ raise TypeError("Expected argument 'id' to be a str")
41
+ pulumi.set(__self__, "id", id)
42
+ if security_feature_collections and not isinstance(security_feature_collections, list):
43
+ raise TypeError("Expected argument 'security_feature_collections' to be a list")
44
+ pulumi.set(__self__, "security_feature_collections", security_feature_collections)
45
+ if target_id and not isinstance(target_id, str):
46
+ raise TypeError("Expected argument 'target_id' to be a str")
47
+ pulumi.set(__self__, "target_id", target_id)
48
+ if targets_with_column_encryption and not isinstance(targets_with_column_encryption, str):
49
+ raise TypeError("Expected argument 'targets_with_column_encryption' to be a str")
50
+ pulumi.set(__self__, "targets_with_column_encryption", targets_with_column_encryption)
51
+ if targets_with_database_vault and not isinstance(targets_with_database_vault, str):
52
+ raise TypeError("Expected argument 'targets_with_database_vault' to be a str")
53
+ pulumi.set(__self__, "targets_with_database_vault", targets_with_database_vault)
54
+ if targets_with_external_authentication and not isinstance(targets_with_external_authentication, str):
55
+ raise TypeError("Expected argument 'targets_with_external_authentication' to be a str")
56
+ pulumi.set(__self__, "targets_with_external_authentication", targets_with_external_authentication)
57
+ if targets_with_fine_grained_audit and not isinstance(targets_with_fine_grained_audit, str):
58
+ raise TypeError("Expected argument 'targets_with_fine_grained_audit' to be a str")
59
+ pulumi.set(__self__, "targets_with_fine_grained_audit", targets_with_fine_grained_audit)
60
+ if targets_with_global_authentication and not isinstance(targets_with_global_authentication, str):
61
+ raise TypeError("Expected argument 'targets_with_global_authentication' to be a str")
62
+ pulumi.set(__self__, "targets_with_global_authentication", targets_with_global_authentication)
63
+ if targets_with_network_encryption and not isinstance(targets_with_network_encryption, str):
64
+ raise TypeError("Expected argument 'targets_with_network_encryption' to be a str")
65
+ pulumi.set(__self__, "targets_with_network_encryption", targets_with_network_encryption)
66
+ if targets_with_password_authentication and not isinstance(targets_with_password_authentication, str):
67
+ raise TypeError("Expected argument 'targets_with_password_authentication' to be a str")
68
+ pulumi.set(__self__, "targets_with_password_authentication", targets_with_password_authentication)
69
+ if targets_with_privilege_analysis and not isinstance(targets_with_privilege_analysis, str):
70
+ raise TypeError("Expected argument 'targets_with_privilege_analysis' to be a str")
71
+ pulumi.set(__self__, "targets_with_privilege_analysis", targets_with_privilege_analysis)
72
+ if targets_with_tablespace_encryption and not isinstance(targets_with_tablespace_encryption, str):
73
+ raise TypeError("Expected argument 'targets_with_tablespace_encryption' to be a str")
74
+ pulumi.set(__self__, "targets_with_tablespace_encryption", targets_with_tablespace_encryption)
75
+ if targets_with_traditional_audit and not isinstance(targets_with_traditional_audit, str):
76
+ raise TypeError("Expected argument 'targets_with_traditional_audit' to be a str")
77
+ pulumi.set(__self__, "targets_with_traditional_audit", targets_with_traditional_audit)
78
+ if targets_with_unified_audit and not isinstance(targets_with_unified_audit, str):
79
+ raise TypeError("Expected argument 'targets_with_unified_audit' to be a str")
80
+ pulumi.set(__self__, "targets_with_unified_audit", targets_with_unified_audit)
81
+
82
+ @property
83
+ @pulumi.getter(name="accessLevel")
84
+ def access_level(self) -> Optional[str]:
85
+ return pulumi.get(self, "access_level")
86
+
87
+ @property
88
+ @pulumi.getter(name="compartmentId")
89
+ def compartment_id(self) -> str:
90
+ """
91
+ The OCID of the compartment.
92
+ """
93
+ return pulumi.get(self, "compartment_id")
94
+
95
+ @property
96
+ @pulumi.getter(name="compartmentIdInSubtree")
97
+ def compartment_id_in_subtree(self) -> Optional[bool]:
98
+ return pulumi.get(self, "compartment_id_in_subtree")
99
+
100
+ @property
101
+ @pulumi.getter
102
+ def filters(self) -> Optional[Sequence['outputs.GetSecurityAssessmentSecurityFeaturesFilterResult']]:
103
+ return pulumi.get(self, "filters")
104
+
105
+ @property
106
+ @pulumi.getter
107
+ def id(self) -> str:
108
+ """
109
+ The provider-assigned unique ID for this managed resource.
110
+ """
111
+ return pulumi.get(self, "id")
112
+
113
+ @property
114
+ @pulumi.getter(name="securityFeatureCollections")
115
+ def security_feature_collections(self) -> Sequence['outputs.GetSecurityAssessmentSecurityFeaturesSecurityFeatureCollectionResult']:
116
+ """
117
+ The list of security_feature_collection.
118
+ """
119
+ return pulumi.get(self, "security_feature_collections")
120
+
121
+ @property
122
+ @pulumi.getter(name="targetId")
123
+ def target_id(self) -> Optional[str]:
124
+ """
125
+ The OCID of the target database.
126
+ """
127
+ return pulumi.get(self, "target_id")
128
+
129
+ @property
130
+ @pulumi.getter(name="targetsWithColumnEncryption")
131
+ def targets_with_column_encryption(self) -> Optional[str]:
132
+ return pulumi.get(self, "targets_with_column_encryption")
133
+
134
+ @property
135
+ @pulumi.getter(name="targetsWithDatabaseVault")
136
+ def targets_with_database_vault(self) -> Optional[str]:
137
+ return pulumi.get(self, "targets_with_database_vault")
138
+
139
+ @property
140
+ @pulumi.getter(name="targetsWithExternalAuthentication")
141
+ def targets_with_external_authentication(self) -> Optional[str]:
142
+ return pulumi.get(self, "targets_with_external_authentication")
143
+
144
+ @property
145
+ @pulumi.getter(name="targetsWithFineGrainedAudit")
146
+ def targets_with_fine_grained_audit(self) -> Optional[str]:
147
+ return pulumi.get(self, "targets_with_fine_grained_audit")
148
+
149
+ @property
150
+ @pulumi.getter(name="targetsWithGlobalAuthentication")
151
+ def targets_with_global_authentication(self) -> Optional[str]:
152
+ return pulumi.get(self, "targets_with_global_authentication")
153
+
154
+ @property
155
+ @pulumi.getter(name="targetsWithNetworkEncryption")
156
+ def targets_with_network_encryption(self) -> Optional[str]:
157
+ return pulumi.get(self, "targets_with_network_encryption")
158
+
159
+ @property
160
+ @pulumi.getter(name="targetsWithPasswordAuthentication")
161
+ def targets_with_password_authentication(self) -> Optional[str]:
162
+ return pulumi.get(self, "targets_with_password_authentication")
163
+
164
+ @property
165
+ @pulumi.getter(name="targetsWithPrivilegeAnalysis")
166
+ def targets_with_privilege_analysis(self) -> Optional[str]:
167
+ return pulumi.get(self, "targets_with_privilege_analysis")
168
+
169
+ @property
170
+ @pulumi.getter(name="targetsWithTablespaceEncryption")
171
+ def targets_with_tablespace_encryption(self) -> Optional[str]:
172
+ return pulumi.get(self, "targets_with_tablespace_encryption")
173
+
174
+ @property
175
+ @pulumi.getter(name="targetsWithTraditionalAudit")
176
+ def targets_with_traditional_audit(self) -> Optional[str]:
177
+ return pulumi.get(self, "targets_with_traditional_audit")
178
+
179
+ @property
180
+ @pulumi.getter(name="targetsWithUnifiedAudit")
181
+ def targets_with_unified_audit(self) -> Optional[str]:
182
+ return pulumi.get(self, "targets_with_unified_audit")
183
+
184
+
185
+ class AwaitableGetSecurityAssessmentSecurityFeaturesResult(GetSecurityAssessmentSecurityFeaturesResult):
186
+ # pylint: disable=using-constant-test
187
+ def __await__(self):
188
+ if False:
189
+ yield self
190
+ return GetSecurityAssessmentSecurityFeaturesResult(
191
+ access_level=self.access_level,
192
+ compartment_id=self.compartment_id,
193
+ compartment_id_in_subtree=self.compartment_id_in_subtree,
194
+ filters=self.filters,
195
+ id=self.id,
196
+ security_feature_collections=self.security_feature_collections,
197
+ target_id=self.target_id,
198
+ targets_with_column_encryption=self.targets_with_column_encryption,
199
+ targets_with_database_vault=self.targets_with_database_vault,
200
+ targets_with_external_authentication=self.targets_with_external_authentication,
201
+ targets_with_fine_grained_audit=self.targets_with_fine_grained_audit,
202
+ targets_with_global_authentication=self.targets_with_global_authentication,
203
+ targets_with_network_encryption=self.targets_with_network_encryption,
204
+ targets_with_password_authentication=self.targets_with_password_authentication,
205
+ targets_with_privilege_analysis=self.targets_with_privilege_analysis,
206
+ targets_with_tablespace_encryption=self.targets_with_tablespace_encryption,
207
+ targets_with_traditional_audit=self.targets_with_traditional_audit,
208
+ targets_with_unified_audit=self.targets_with_unified_audit)
209
+
210
+
211
+ def get_security_assessment_security_features(access_level: Optional[str] = None,
212
+ compartment_id: Optional[str] = None,
213
+ compartment_id_in_subtree: Optional[bool] = None,
214
+ filters: Optional[Sequence[pulumi.InputType['GetSecurityAssessmentSecurityFeaturesFilterArgs']]] = None,
215
+ target_id: Optional[str] = None,
216
+ targets_with_column_encryption: Optional[str] = None,
217
+ targets_with_database_vault: Optional[str] = None,
218
+ targets_with_external_authentication: Optional[str] = None,
219
+ targets_with_fine_grained_audit: Optional[str] = None,
220
+ targets_with_global_authentication: Optional[str] = None,
221
+ targets_with_network_encryption: Optional[str] = None,
222
+ targets_with_password_authentication: Optional[str] = None,
223
+ targets_with_privilege_analysis: Optional[str] = None,
224
+ targets_with_tablespace_encryption: Optional[str] = None,
225
+ targets_with_traditional_audit: Optional[str] = None,
226
+ targets_with_unified_audit: Optional[str] = None,
227
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecurityAssessmentSecurityFeaturesResult:
228
+ """
229
+ This data source provides the list of Security Assessment Security Features in Oracle Cloud Infrastructure Data Safe service.
230
+
231
+ Lists the usage of Database security features for a given compartment or a target level, based on the filters provided.
232
+
233
+ ## Example Usage
234
+
235
+ ```python
236
+ import pulumi
237
+ import pulumi_oci as oci
238
+
239
+ test_security_assessment_security_features = oci.DataSafe.get_security_assessment_security_features(compartment_id=var["compartment_id"],
240
+ access_level=var["security_assessment_security_feature_access_level"],
241
+ compartment_id_in_subtree=var["security_assessment_security_feature_compartment_id_in_subtree"],
242
+ target_id=oci_cloud_guard_target["test_target"]["id"],
243
+ targets_with_column_encryption=var["security_assessment_security_feature_targets_with_column_encryption"],
244
+ targets_with_database_vault=var["security_assessment_security_feature_targets_with_database_vault"],
245
+ targets_with_external_authentication=var["security_assessment_security_feature_targets_with_external_authentication"],
246
+ targets_with_fine_grained_audit=var["security_assessment_security_feature_targets_with_fine_grained_audit"],
247
+ targets_with_global_authentication=var["security_assessment_security_feature_targets_with_global_authentication"],
248
+ targets_with_network_encryption=var["security_assessment_security_feature_targets_with_network_encryption"],
249
+ targets_with_password_authentication=var["security_assessment_security_feature_targets_with_password_authentication"],
250
+ targets_with_privilege_analysis=var["security_assessment_security_feature_targets_with_privilege_analysis"],
251
+ targets_with_tablespace_encryption=var["security_assessment_security_feature_targets_with_tablespace_encryption"],
252
+ targets_with_traditional_audit=var["security_assessment_security_feature_targets_with_traditional_audit"],
253
+ targets_with_unified_audit=var["security_assessment_security_feature_targets_with_unified_audit"])
254
+ ```
255
+
256
+
257
+ :param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
258
+ :param str compartment_id: A filter to return only resources that match the specified compartment OCID.
259
+ :param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
260
+ :param str target_id: A filter to return only items related to a specific target OCID.
261
+ :param str targets_with_column_encryption: A filter to return only the targets that enable the DB security feature - Column Encryption enabled/disabled.
262
+ :param str targets_with_database_vault: A filter to return only the targets with the DB security feature - Database Vault enabled/disabled.
263
+ :param str targets_with_external_authentication: A filter to return only the targets with the DB security feature - External Authentication enabled/disabled.
264
+ :param str targets_with_fine_grained_audit: A filter to return only the targets with the DB security feature - Fine Grained Audit enabled/disabled.
265
+ :param str targets_with_global_authentication: A filter to return only the targets with the DB security feature - Global Authentication enabled/disabled.
266
+ :param str targets_with_network_encryption: A filter to return only the targets with the DB security feature - Network Encryption enabled/disabled.
267
+ :param str targets_with_password_authentication: A filter to return only the targets with the DB security feature - Password Authentication enabled/disabled.
268
+ :param str targets_with_privilege_analysis: A filter to return only the targets with the DB security feature - Privilege Analysis enabled/disabled.
269
+ :param str targets_with_tablespace_encryption: A filter to return only the targets with the DB security feature - Tablespace Encryption enabled/disabled.
270
+ :param str targets_with_traditional_audit: A filter to return only the targets with the DB security feature - Traditional Audit enabled/disabled.
271
+ :param str targets_with_unified_audit: A filter to return only the targets with the DB security feature - Unified Audit enabled/disabled.
272
+ """
273
+ __args__ = dict()
274
+ __args__['accessLevel'] = access_level
275
+ __args__['compartmentId'] = compartment_id
276
+ __args__['compartmentIdInSubtree'] = compartment_id_in_subtree
277
+ __args__['filters'] = filters
278
+ __args__['targetId'] = target_id
279
+ __args__['targetsWithColumnEncryption'] = targets_with_column_encryption
280
+ __args__['targetsWithDatabaseVault'] = targets_with_database_vault
281
+ __args__['targetsWithExternalAuthentication'] = targets_with_external_authentication
282
+ __args__['targetsWithFineGrainedAudit'] = targets_with_fine_grained_audit
283
+ __args__['targetsWithGlobalAuthentication'] = targets_with_global_authentication
284
+ __args__['targetsWithNetworkEncryption'] = targets_with_network_encryption
285
+ __args__['targetsWithPasswordAuthentication'] = targets_with_password_authentication
286
+ __args__['targetsWithPrivilegeAnalysis'] = targets_with_privilege_analysis
287
+ __args__['targetsWithTablespaceEncryption'] = targets_with_tablespace_encryption
288
+ __args__['targetsWithTraditionalAudit'] = targets_with_traditional_audit
289
+ __args__['targetsWithUnifiedAudit'] = targets_with_unified_audit
290
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
291
+ __ret__ = pulumi.runtime.invoke('oci:DataSafe/getSecurityAssessmentSecurityFeatures:getSecurityAssessmentSecurityFeatures', __args__, opts=opts, typ=GetSecurityAssessmentSecurityFeaturesResult).value
292
+
293
+ return AwaitableGetSecurityAssessmentSecurityFeaturesResult(
294
+ access_level=pulumi.get(__ret__, 'access_level'),
295
+ compartment_id=pulumi.get(__ret__, 'compartment_id'),
296
+ compartment_id_in_subtree=pulumi.get(__ret__, 'compartment_id_in_subtree'),
297
+ filters=pulumi.get(__ret__, 'filters'),
298
+ id=pulumi.get(__ret__, 'id'),
299
+ security_feature_collections=pulumi.get(__ret__, 'security_feature_collections'),
300
+ target_id=pulumi.get(__ret__, 'target_id'),
301
+ targets_with_column_encryption=pulumi.get(__ret__, 'targets_with_column_encryption'),
302
+ targets_with_database_vault=pulumi.get(__ret__, 'targets_with_database_vault'),
303
+ targets_with_external_authentication=pulumi.get(__ret__, 'targets_with_external_authentication'),
304
+ targets_with_fine_grained_audit=pulumi.get(__ret__, 'targets_with_fine_grained_audit'),
305
+ targets_with_global_authentication=pulumi.get(__ret__, 'targets_with_global_authentication'),
306
+ targets_with_network_encryption=pulumi.get(__ret__, 'targets_with_network_encryption'),
307
+ targets_with_password_authentication=pulumi.get(__ret__, 'targets_with_password_authentication'),
308
+ targets_with_privilege_analysis=pulumi.get(__ret__, 'targets_with_privilege_analysis'),
309
+ targets_with_tablespace_encryption=pulumi.get(__ret__, 'targets_with_tablespace_encryption'),
310
+ targets_with_traditional_audit=pulumi.get(__ret__, 'targets_with_traditional_audit'),
311
+ targets_with_unified_audit=pulumi.get(__ret__, 'targets_with_unified_audit'))
312
+
313
+
314
+ @_utilities.lift_output_func(get_security_assessment_security_features)
315
+ def get_security_assessment_security_features_output(access_level: Optional[pulumi.Input[Optional[str]]] = None,
316
+ compartment_id: Optional[pulumi.Input[str]] = None,
317
+ compartment_id_in_subtree: Optional[pulumi.Input[Optional[bool]]] = None,
318
+ filters: Optional[pulumi.Input[Optional[Sequence[pulumi.InputType['GetSecurityAssessmentSecurityFeaturesFilterArgs']]]]] = None,
319
+ target_id: Optional[pulumi.Input[Optional[str]]] = None,
320
+ targets_with_column_encryption: Optional[pulumi.Input[Optional[str]]] = None,
321
+ targets_with_database_vault: Optional[pulumi.Input[Optional[str]]] = None,
322
+ targets_with_external_authentication: Optional[pulumi.Input[Optional[str]]] = None,
323
+ targets_with_fine_grained_audit: Optional[pulumi.Input[Optional[str]]] = None,
324
+ targets_with_global_authentication: Optional[pulumi.Input[Optional[str]]] = None,
325
+ targets_with_network_encryption: Optional[pulumi.Input[Optional[str]]] = None,
326
+ targets_with_password_authentication: Optional[pulumi.Input[Optional[str]]] = None,
327
+ targets_with_privilege_analysis: Optional[pulumi.Input[Optional[str]]] = None,
328
+ targets_with_tablespace_encryption: Optional[pulumi.Input[Optional[str]]] = None,
329
+ targets_with_traditional_audit: Optional[pulumi.Input[Optional[str]]] = None,
330
+ targets_with_unified_audit: Optional[pulumi.Input[Optional[str]]] = None,
331
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecurityAssessmentSecurityFeaturesResult]:
332
+ """
333
+ This data source provides the list of Security Assessment Security Features in Oracle Cloud Infrastructure Data Safe service.
334
+
335
+ Lists the usage of Database security features for a given compartment or a target level, based on the filters provided.
336
+
337
+ ## Example Usage
338
+
339
+ ```python
340
+ import pulumi
341
+ import pulumi_oci as oci
342
+
343
+ test_security_assessment_security_features = oci.DataSafe.get_security_assessment_security_features(compartment_id=var["compartment_id"],
344
+ access_level=var["security_assessment_security_feature_access_level"],
345
+ compartment_id_in_subtree=var["security_assessment_security_feature_compartment_id_in_subtree"],
346
+ target_id=oci_cloud_guard_target["test_target"]["id"],
347
+ targets_with_column_encryption=var["security_assessment_security_feature_targets_with_column_encryption"],
348
+ targets_with_database_vault=var["security_assessment_security_feature_targets_with_database_vault"],
349
+ targets_with_external_authentication=var["security_assessment_security_feature_targets_with_external_authentication"],
350
+ targets_with_fine_grained_audit=var["security_assessment_security_feature_targets_with_fine_grained_audit"],
351
+ targets_with_global_authentication=var["security_assessment_security_feature_targets_with_global_authentication"],
352
+ targets_with_network_encryption=var["security_assessment_security_feature_targets_with_network_encryption"],
353
+ targets_with_password_authentication=var["security_assessment_security_feature_targets_with_password_authentication"],
354
+ targets_with_privilege_analysis=var["security_assessment_security_feature_targets_with_privilege_analysis"],
355
+ targets_with_tablespace_encryption=var["security_assessment_security_feature_targets_with_tablespace_encryption"],
356
+ targets_with_traditional_audit=var["security_assessment_security_feature_targets_with_traditional_audit"],
357
+ targets_with_unified_audit=var["security_assessment_security_feature_targets_with_unified_audit"])
358
+ ```
359
+
360
+
361
+ :param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
362
+ :param str compartment_id: A filter to return only resources that match the specified compartment OCID.
363
+ :param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
364
+ :param str target_id: A filter to return only items related to a specific target OCID.
365
+ :param str targets_with_column_encryption: A filter to return only the targets that enable the DB security feature - Column Encryption enabled/disabled.
366
+ :param str targets_with_database_vault: A filter to return only the targets with the DB security feature - Database Vault enabled/disabled.
367
+ :param str targets_with_external_authentication: A filter to return only the targets with the DB security feature - External Authentication enabled/disabled.
368
+ :param str targets_with_fine_grained_audit: A filter to return only the targets with the DB security feature - Fine Grained Audit enabled/disabled.
369
+ :param str targets_with_global_authentication: A filter to return only the targets with the DB security feature - Global Authentication enabled/disabled.
370
+ :param str targets_with_network_encryption: A filter to return only the targets with the DB security feature - Network Encryption enabled/disabled.
371
+ :param str targets_with_password_authentication: A filter to return only the targets with the DB security feature - Password Authentication enabled/disabled.
372
+ :param str targets_with_privilege_analysis: A filter to return only the targets with the DB security feature - Privilege Analysis enabled/disabled.
373
+ :param str targets_with_tablespace_encryption: A filter to return only the targets with the DB security feature - Tablespace Encryption enabled/disabled.
374
+ :param str targets_with_traditional_audit: A filter to return only the targets with the DB security feature - Traditional Audit enabled/disabled.
375
+ :param str targets_with_unified_audit: A filter to return only the targets with the DB security feature - Unified Audit enabled/disabled.
376
+ """
377
+ ...
@@ -262,7 +262,7 @@ def get_security_assessments(access_level: Optional[str] = None,
262
262
  :param str compartment_id: A filter to return only resources that match the specified compartment OCID.
263
263
  :param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
264
264
  :param str display_name: A filter to return only resources that match the specified display name.
265
- :param bool is_baseline: A filter to return only security assessments that are set as baseline.
265
+ :param bool is_baseline: A filter to return only the security assessments that are set as a baseline.
266
266
  :param bool is_schedule_assessment: A filter to return only security assessments of type save schedule.
267
267
  :param str schedule_assessment_id: The OCID of the security assessment of type SAVE_SCHEDULE.
268
268
  :param str state: A filter to return only resources that match the specified lifecycle state.
@@ -374,7 +374,7 @@ def get_security_assessments_output(access_level: Optional[pulumi.Input[Optional
374
374
  :param str compartment_id: A filter to return only resources that match the specified compartment OCID.
375
375
  :param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
376
376
  :param str display_name: A filter to return only resources that match the specified display name.
377
- :param bool is_baseline: A filter to return only security assessments that are set as baseline.
377
+ :param bool is_baseline: A filter to return only the security assessments that are set as a baseline.
378
378
  :param bool is_schedule_assessment: A filter to return only security assessments of type save schedule.
379
379
  :param str schedule_assessment_id: The OCID of the security assessment of type SAVE_SCHEDULE.
380
380
  :param str state: A filter to return only resources that match the specified lifecycle state.
@@ -0,0 +1,253 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import pulumi
8
+ import pulumi.runtime
9
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
10
+ from .. import _utilities
11
+ from . import outputs
12
+ from ._inputs import *
13
+
14
+ __all__ = [
15
+ 'GetSecurityPoliciesResult',
16
+ 'AwaitableGetSecurityPoliciesResult',
17
+ 'get_security_policies',
18
+ 'get_security_policies_output',
19
+ ]
20
+
21
+ @pulumi.output_type
22
+ class GetSecurityPoliciesResult:
23
+ """
24
+ A collection of values returned by getSecurityPolicies.
25
+ """
26
+ def __init__(__self__, access_level=None, compartment_id=None, compartment_id_in_subtree=None, display_name=None, filters=None, id=None, security_policy_collections=None, security_policy_id=None, state=None):
27
+ if access_level and not isinstance(access_level, str):
28
+ raise TypeError("Expected argument 'access_level' to be a str")
29
+ pulumi.set(__self__, "access_level", access_level)
30
+ if compartment_id and not isinstance(compartment_id, str):
31
+ raise TypeError("Expected argument 'compartment_id' to be a str")
32
+ pulumi.set(__self__, "compartment_id", compartment_id)
33
+ if compartment_id_in_subtree and not isinstance(compartment_id_in_subtree, bool):
34
+ raise TypeError("Expected argument 'compartment_id_in_subtree' to be a bool")
35
+ pulumi.set(__self__, "compartment_id_in_subtree", compartment_id_in_subtree)
36
+ if display_name and not isinstance(display_name, str):
37
+ raise TypeError("Expected argument 'display_name' to be a str")
38
+ pulumi.set(__self__, "display_name", display_name)
39
+ if filters and not isinstance(filters, list):
40
+ raise TypeError("Expected argument 'filters' to be a list")
41
+ pulumi.set(__self__, "filters", filters)
42
+ if id and not isinstance(id, str):
43
+ raise TypeError("Expected argument 'id' to be a str")
44
+ pulumi.set(__self__, "id", id)
45
+ if security_policy_collections and not isinstance(security_policy_collections, list):
46
+ raise TypeError("Expected argument 'security_policy_collections' to be a list")
47
+ pulumi.set(__self__, "security_policy_collections", security_policy_collections)
48
+ if security_policy_id and not isinstance(security_policy_id, str):
49
+ raise TypeError("Expected argument 'security_policy_id' to be a str")
50
+ pulumi.set(__self__, "security_policy_id", security_policy_id)
51
+ if state and not isinstance(state, str):
52
+ raise TypeError("Expected argument 'state' to be a str")
53
+ pulumi.set(__self__, "state", state)
54
+
55
+ @property
56
+ @pulumi.getter(name="accessLevel")
57
+ def access_level(self) -> Optional[str]:
58
+ return pulumi.get(self, "access_level")
59
+
60
+ @property
61
+ @pulumi.getter(name="compartmentId")
62
+ def compartment_id(self) -> str:
63
+ """
64
+ The OCID of the compartment containing the security policy.
65
+ """
66
+ return pulumi.get(self, "compartment_id")
67
+
68
+ @property
69
+ @pulumi.getter(name="compartmentIdInSubtree")
70
+ def compartment_id_in_subtree(self) -> Optional[bool]:
71
+ return pulumi.get(self, "compartment_id_in_subtree")
72
+
73
+ @property
74
+ @pulumi.getter(name="displayName")
75
+ def display_name(self) -> Optional[str]:
76
+ """
77
+ The display name of the security policy.
78
+ """
79
+ return pulumi.get(self, "display_name")
80
+
81
+ @property
82
+ @pulumi.getter
83
+ def filters(self) -> Optional[Sequence['outputs.GetSecurityPoliciesFilterResult']]:
84
+ return pulumi.get(self, "filters")
85
+
86
+ @property
87
+ @pulumi.getter
88
+ def id(self) -> str:
89
+ """
90
+ The provider-assigned unique ID for this managed resource.
91
+ """
92
+ return pulumi.get(self, "id")
93
+
94
+ @property
95
+ @pulumi.getter(name="securityPolicyCollections")
96
+ def security_policy_collections(self) -> Sequence['outputs.GetSecurityPoliciesSecurityPolicyCollectionResult']:
97
+ """
98
+ The list of security_policy_collection.
99
+ """
100
+ return pulumi.get(self, "security_policy_collections")
101
+
102
+ @property
103
+ @pulumi.getter(name="securityPolicyId")
104
+ def security_policy_id(self) -> Optional[str]:
105
+ return pulumi.get(self, "security_policy_id")
106
+
107
+ @property
108
+ @pulumi.getter
109
+ def state(self) -> Optional[str]:
110
+ """
111
+ The current state of the security policy.
112
+ """
113
+ return pulumi.get(self, "state")
114
+
115
+
116
+ class AwaitableGetSecurityPoliciesResult(GetSecurityPoliciesResult):
117
+ # pylint: disable=using-constant-test
118
+ def __await__(self):
119
+ if False:
120
+ yield self
121
+ return GetSecurityPoliciesResult(
122
+ access_level=self.access_level,
123
+ compartment_id=self.compartment_id,
124
+ compartment_id_in_subtree=self.compartment_id_in_subtree,
125
+ display_name=self.display_name,
126
+ filters=self.filters,
127
+ id=self.id,
128
+ security_policy_collections=self.security_policy_collections,
129
+ security_policy_id=self.security_policy_id,
130
+ state=self.state)
131
+
132
+
133
+ def get_security_policies(access_level: Optional[str] = None,
134
+ compartment_id: Optional[str] = None,
135
+ compartment_id_in_subtree: Optional[bool] = None,
136
+ display_name: Optional[str] = None,
137
+ filters: Optional[Sequence[pulumi.InputType['GetSecurityPoliciesFilterArgs']]] = None,
138
+ security_policy_id: Optional[str] = None,
139
+ state: Optional[str] = None,
140
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecurityPoliciesResult:
141
+ """
142
+ This data source provides the list of Security Policies in Oracle Cloud Infrastructure Data Safe service.
143
+
144
+ Retrieves a list of all security policies in Data Safe.
145
+
146
+ The ListSecurityPolicies operation returns only the security policies in the specified `compartmentId`.
147
+
148
+ The parameter `accessLevel` specifies whether to return only those compartments for which the
149
+ requestor has INSPECT permissions on at least one resource directly
150
+ or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
151
+ Principal doesn't have access to even one of the child compartments. This is valid only when
152
+ `compartmentIdInSubtree` is set to `true`.
153
+
154
+ The parameter `compartmentIdInSubtree` applies when you perform ListSecurityPolicies on the
155
+ `compartmentId` passed and when it is set to true, the entire hierarchy of compartments can be returned.
156
+ To get a full list of all compartments and subcompartments in the tenancy (root compartment),
157
+ set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
158
+
159
+ ## Example Usage
160
+
161
+ ```python
162
+ import pulumi
163
+ import pulumi_oci as oci
164
+
165
+ test_security_policies = oci.DataSafe.get_security_policies(compartment_id=var["compartment_id"],
166
+ access_level=var["security_policy_access_level"],
167
+ compartment_id_in_subtree=var["security_policy_compartment_id_in_subtree"],
168
+ display_name=var["security_policy_display_name"],
169
+ security_policy_id=oci_data_safe_security_policy["test_security_policy"]["id"],
170
+ state=var["security_policy_state"])
171
+ ```
172
+
173
+
174
+ :param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
175
+ :param str compartment_id: A filter to return only resources that match the specified compartment OCID.
176
+ :param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
177
+ :param str display_name: A filter to return only resources that match the specified display name.
178
+ :param str security_policy_id: An optional filter to return only resources that match the specified OCID of the security policy resource.
179
+ :param str state: The current state of the security policy.
180
+ """
181
+ __args__ = dict()
182
+ __args__['accessLevel'] = access_level
183
+ __args__['compartmentId'] = compartment_id
184
+ __args__['compartmentIdInSubtree'] = compartment_id_in_subtree
185
+ __args__['displayName'] = display_name
186
+ __args__['filters'] = filters
187
+ __args__['securityPolicyId'] = security_policy_id
188
+ __args__['state'] = state
189
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
190
+ __ret__ = pulumi.runtime.invoke('oci:DataSafe/getSecurityPolicies:getSecurityPolicies', __args__, opts=opts, typ=GetSecurityPoliciesResult).value
191
+
192
+ return AwaitableGetSecurityPoliciesResult(
193
+ access_level=pulumi.get(__ret__, 'access_level'),
194
+ compartment_id=pulumi.get(__ret__, 'compartment_id'),
195
+ compartment_id_in_subtree=pulumi.get(__ret__, 'compartment_id_in_subtree'),
196
+ display_name=pulumi.get(__ret__, 'display_name'),
197
+ filters=pulumi.get(__ret__, 'filters'),
198
+ id=pulumi.get(__ret__, 'id'),
199
+ security_policy_collections=pulumi.get(__ret__, 'security_policy_collections'),
200
+ security_policy_id=pulumi.get(__ret__, 'security_policy_id'),
201
+ state=pulumi.get(__ret__, 'state'))
202
+
203
+
204
+ @_utilities.lift_output_func(get_security_policies)
205
+ def get_security_policies_output(access_level: Optional[pulumi.Input[Optional[str]]] = None,
206
+ compartment_id: Optional[pulumi.Input[str]] = None,
207
+ compartment_id_in_subtree: Optional[pulumi.Input[Optional[bool]]] = None,
208
+ display_name: Optional[pulumi.Input[Optional[str]]] = None,
209
+ filters: Optional[pulumi.Input[Optional[Sequence[pulumi.InputType['GetSecurityPoliciesFilterArgs']]]]] = None,
210
+ security_policy_id: Optional[pulumi.Input[Optional[str]]] = None,
211
+ state: Optional[pulumi.Input[Optional[str]]] = None,
212
+ opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecurityPoliciesResult]:
213
+ """
214
+ This data source provides the list of Security Policies in Oracle Cloud Infrastructure Data Safe service.
215
+
216
+ Retrieves a list of all security policies in Data Safe.
217
+
218
+ The ListSecurityPolicies operation returns only the security policies in the specified `compartmentId`.
219
+
220
+ The parameter `accessLevel` specifies whether to return only those compartments for which the
221
+ requestor has INSPECT permissions on at least one resource directly
222
+ or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if
223
+ Principal doesn't have access to even one of the child compartments. This is valid only when
224
+ `compartmentIdInSubtree` is set to `true`.
225
+
226
+ The parameter `compartmentIdInSubtree` applies when you perform ListSecurityPolicies on the
227
+ `compartmentId` passed and when it is set to true, the entire hierarchy of compartments can be returned.
228
+ To get a full list of all compartments and subcompartments in the tenancy (root compartment),
229
+ set the parameter `compartmentIdInSubtree` to true and `accessLevel` to ACCESSIBLE.
230
+
231
+ ## Example Usage
232
+
233
+ ```python
234
+ import pulumi
235
+ import pulumi_oci as oci
236
+
237
+ test_security_policies = oci.DataSafe.get_security_policies(compartment_id=var["compartment_id"],
238
+ access_level=var["security_policy_access_level"],
239
+ compartment_id_in_subtree=var["security_policy_compartment_id_in_subtree"],
240
+ display_name=var["security_policy_display_name"],
241
+ security_policy_id=oci_data_safe_security_policy["test_security_policy"]["id"],
242
+ state=var["security_policy_state"])
243
+ ```
244
+
245
+
246
+ :param str access_level: Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
247
+ :param str compartment_id: A filter to return only resources that match the specified compartment OCID.
248
+ :param bool compartment_id_in_subtree: Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
249
+ :param str display_name: A filter to return only resources that match the specified display name.
250
+ :param str security_policy_id: An optional filter to return only resources that match the specified OCID of the security policy resource.
251
+ :param str state: The current state of the security policy.
252
+ """
253
+ ...