oracle.oci.oci_data_safe_security_assessment_facts – Fetches details about one or multiple SecurityAssessment resources in Oracle Cloud Infrastructure¶
Note
This plugin is part of the oracle.oci collection (version 5.2.0).
You might already have this collection installed if you are using the ansible
package.
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install oracle.oci
.
To use it in a playbook, specify: oracle.oci.oci_data_safe_security_assessment_facts
.
New in version 2.9.0: of oracle.oci
Synopsis¶
Fetches details about one or multiple SecurityAssessment resources in Oracle Cloud Infrastructure
Gets a list of security assessments.
The ListSecurityAssessments operation returns only the assessments in the specified compartmentId. The list does not include any subcompartments of the compartmentId passed.
The parameter accessLevel specifies whether to return only those compartments for which the requestor has INSPECT permissions on at least one resource directly or indirectly (ACCESSIBLE) (the resource can be in a subcompartment) or to return Not Authorized if Principal doesn’t have access to even one of the child compartments. This is valid only when compartmentIdInSubtree is set to true.
The parameter compartmentIdInSubtree applies when you perform ListSecurityAssessments on the compartmentId passed and when it is set to true, the entire hierarchy of compartments can be returned. To get a full list of all compartments and subcompartments in the tenancy (root compartment), set the parameter compartmentIdInSubtree to true and accessLevel to ACCESSIBLE.
If security_assessment_id is specified, the details of a single SecurityAssessment will be returned.
Requirements¶
The below requirements are needed on the host that executes this module.
python >= 3.6
Python SDK for Oracle Cloud Infrastructure https://oracle-cloud-infrastructure-python-sdk.readthedocs.io
Parameters¶
Parameter | Choices/Defaults | Comments |
---|---|---|
access_level
string
|
|
Valid values are RESTRICTED and ACCESSIBLE. Default is RESTRICTED. Setting this to ACCESSIBLE returns only those compartments for which the user has INSPECT permissions directly or indirectly (permissions can be on a resource in a subcompartment). When set to RESTRICTED permissions are checked and no partial results are displayed.
|
api_user
string
|
The OCID of the user, on whose behalf, OCI APIs are invoked. If not set, then the value of the OCI_USER_ID environment variable, if any, is used. This option is required if the user is not specified through a configuration file (See
config_file_location ). To get the user's OCID, please refer https://docs.us-phoenix-1.oraclecloud.com/Content/API/Concepts/apisigningkey.htm. |
|
api_user_fingerprint
string
|
Fingerprint for the key pair being used. If not set, then the value of the OCI_USER_FINGERPRINT environment variable, if any, is used. This option is required if the key fingerprint is not specified through a configuration file (See
config_file_location ). To get the key pair's fingerprint value please refer https://docs.us-phoenix-1.oraclecloud.com/Content/API/Concepts/apisigningkey.htm. |
|
api_user_key_file
string
|
Full path and filename of the private key (in PEM format). If not set, then the value of the OCI_USER_KEY_FILE variable, if any, is used. This option is required if the private key is not specified through a configuration file (See
config_file_location ). If the key is encrypted with a pass-phrase, the api_user_key_pass_phrase option must also be provided. |
|
api_user_key_pass_phrase
string
|
Passphrase used by the key referenced in
api_user_key_file , if it is encrypted. If not set, then the value of the OCI_USER_KEY_PASS_PHRASE variable, if any, is used. This option is required if the key passphrase is not specified through a configuration file (See config_file_location ). |
|
auth_purpose
string
|
|
The auth purpose which can be used in conjunction with 'auth_type=instance_principal'. The default auth_purpose for instance_principal is None.
|
auth_type
string
|
|
The type of authentication to use for making API requests. By default
auth_type="api_key" based authentication is performed and the API key (see api_user_key_file) in your config file will be used. If this 'auth_type' module option is not specified, the value of the OCI_ANSIBLE_AUTH_TYPE, if any, is used. Use auth_type="instance_principal" to use instance principal based authentication when running ansible playbooks within an OCI compute instance. |
cert_bundle
string
|
The full path to a CA certificate bundle to be used for SSL verification. This will override the default CA certificate bundle. If not set, then the value of the OCI_ANSIBLE_CERT_BUNDLE variable, if any, is used.
|
|
compartment_id
string
|
A filter to return only resources that match the specified compartment OCID.
Required to list multiple security_assessments.
|
|
compartment_id_in_subtree
boolean
|
|
Default is false. When set to true, the hierarchy of compartments is traversed and all compartments and subcompartments in the tenancy are returned. Depends on the 'accessLevel' setting.
|
config_file_location
string
|
Path to configuration file. If not set then the value of the OCI_CONFIG_FILE environment variable, if any, is used. Otherwise, defaults to ~/.oci/config.
|
|
config_profile_name
string
|
The profile to load from the config file referenced by
config_file_location . If not set, then the value of the OCI_CONFIG_PROFILE environment variable, if any, is used. Otherwise, defaults to the "DEFAULT" profile in config_file_location . |
|
display_name
string
|
A filter to return only resources that match the specified display name.
aliases: name |
|
is_baseline
boolean
|
|
A filter to return only the security assessments that are set as a baseline.
|
is_schedule_assessment
boolean
|
|
A filter to return only security assessments of type save schedule.
|
lifecycle_state
string
|
|
A filter to return only resources that match the specified lifecycle state.
|
realm_specific_endpoint_template_enabled
boolean
|
|
Enable/Disable realm specific endpoint template for service client. By Default, realm specific endpoint template is disabled. If not set, then the value of the OCI_REALM_SPECIFIC_SERVICE_ENDPOINT_TEMPLATE_ENABLED variable, if any, is used.
|
region
string
|
The Oracle Cloud Infrastructure region to use for all OCI API requests. If not set, then the value of the OCI_REGION variable, if any, is used. This option is required if the region is not specified through a configuration file (See
config_file_location ). Please refer to https://docs.us-phoenix-1.oraclecloud.com/Content/General/Concepts/regions.htm for more information on OCI regions. |
|
schedule_assessment_id
string
|
The OCID of the security assessment of type SAVE_SCHEDULE.
|
|
security_assessment_id
string
|
The OCID of the security assessment.
Required to get a specific security_assessment.
aliases: id |
|
sort_by
string
|
|
The field to sort by. You can specify only one sort order(sortOrder). The default order for timeCreated is descending.
|
sort_order
string
|
|
The sort order to use, either ascending (ASC) or descending (DESC).
|
target_id
string
|
A filter to return only items related to a specific target OCID.
|
|
tenancy
string
|
OCID of your tenancy. If not set, then the value of the OCI_TENANCY variable, if any, is used. This option is required if the tenancy OCID is not specified through a configuration file (See
config_file_location ). To get the tenancy OCID, please refer https://docs.us-phoenix-1.oraclecloud.com/Content/API/Concepts/apisigningkey.htm |
|
time_created_greater_than_or_equal_to
string
|
A filter to return only the resources that were created after the specified date and time, as defined by RFC3339. Using TimeCreatedGreaterThanOrEqualToQueryParam parameter retrieves all resources created after that date.
**Example:** 2016-12-19T16:39:57.600Z
|
|
time_created_less_than
string
|
Search for resources that were created before a specific date. Specifying this parameter corresponding `timeCreatedLessThan` parameter will retrieve all resources created before the specified created date, in "YYYY-MM-ddThh:mmZ" format with a Z offset, as defined by RFC 3339.
**Example:** 2016-12-19T16:39:57.600Z
|
|
triggered_by
string
|
|
A filter to return only security asessments that were created by either user or system.
|
type
string
|
|
A filter to return only items that match the specified security assessment type.
|
Notes¶
Note
For OCI python sdk configuration, please refer to https://oracle-cloud-infrastructure-python-sdk.readthedocs.io/en/latest/configuration.html
Examples¶
- name: Get a specific security_assessment
oci_data_safe_security_assessment_facts:
# required
security_assessment_id: "ocid1.securityassessment.oc1..xxxxxxEXAMPLExxxxxx"
- name: List security_assessments
oci_data_safe_security_assessment_facts:
# required
compartment_id: "ocid1.compartment.oc1..xxxxxxEXAMPLExxxxxx"
# optional
compartment_id_in_subtree: true
access_level: RESTRICTED
display_name: display_name_example
type: LATEST
schedule_assessment_id: "ocid1.scheduleassessment.oc1..xxxxxxEXAMPLExxxxxx"
is_schedule_assessment: true
triggered_by: USER
target_id: "ocid1.target.oc1..xxxxxxEXAMPLExxxxxx"
sort_order: ASC
is_baseline: true
sort_by: timeCreated
time_created_greater_than_or_equal_to: 2013-10-20T19:20:30+01:00
time_created_less_than: 2013-10-20T19:20:30+01:00
lifecycle_state: CREATING
Return Values¶
Common return values are documented here, the following are the fields unique to this module:
Key | Returned | Description | |||
---|---|---|---|---|---|
security_assessments
complex
|
on success |
List of SecurityAssessment resources
Sample:
[{'compartment_id': 'ocid1.compartment.oc1..xxxxxxEXAMPLExxxxxx', 'defined_tags': {'Operations': {'CostCenter': 'US'}}, 'description': 'description_example', 'display_name': 'display_name_example', 'freeform_tags': {'Department': 'Finance'}, 'id': 'ocid1.resource.oc1..xxxxxxEXAMPLExxxxxx', 'ignored_assessment_ids': [], 'ignored_target_ids': [], 'ignored_targets': [], 'is_baseline': True, 'is_deviated_from_baseline': True, 'last_compared_baseline_id': 'ocid1.lastcomparedbaseline.oc1..xxxxxxEXAMPLExxxxxx', 'lifecycle_details': 'lifecycle_details_example', 'lifecycle_state': 'CREATING', 'link': 'link_example', 'schedule': 'schedule_example', 'schedule_security_assessment_id': 'ocid1.schedulesecurityassessment.oc1..xxxxxxEXAMPLExxxxxx', 'statistics': {'_pass': {'auditing_findings_count': 56, 'authorization_control_findings_count': 56, 'data_encryption_findings_count': 56, 'db_configuration_findings_count': 56, 'fine_grained_access_control_findings_count': 56, 'privileges_and_roles_findings_count': 56, 'targets_count': 56, 'user_accounts_findings_count': 56}, 'advisory': {'auditing_findings_count': 56, 'authorization_control_findings_count': 56, 'data_encryption_findings_count': 56, 'db_configuration_findings_count': 56, 'fine_grained_access_control_findings_count': 56, 'privileges_and_roles_findings_count': 56, 'targets_count': 56, 'user_accounts_findings_count': 56}, 'evaluate': {'auditing_findings_count': 56, 'authorization_control_findings_count': 56, 'data_encryption_findings_count': 56, 'db_configuration_findings_count': 56, 'fine_grained_access_control_findings_count': 56, 'privileges_and_roles_findings_count': 56, 'targets_count': 56, 'user_accounts_findings_count': 56}, 'high_risk': {'auditing_findings_count': 56, 'authorization_control_findings_count': 56, 'data_encryption_findings_count': 56, 'db_configuration_findings_count': 56, 'fine_grained_access_control_findings_count': 56, 'privileges_and_roles_findings_count': 56, 'targets_count': 56, 'user_accounts_findings_count': 56}, 'low_risk': {'auditing_findings_count': 56, 'authorization_control_findings_count': 56, 'data_encryption_findings_count': 56, 'db_configuration_findings_count': 56, 'fine_grained_access_control_findings_count': 56, 'privileges_and_roles_findings_count': 56, 'targets_count': 56, 'user_accounts_findings_count': 56}, 'medium_risk': {'auditing_findings_count': 56, 'authorization_control_findings_count': 56, 'data_encryption_findings_count': 56, 'db_configuration_findings_count': 56, 'fine_grained_access_control_findings_count': 56, 'privileges_and_roles_findings_count': 56, 'targets_count': 56, 'user_accounts_findings_count': 56}, 'targets_count': 56}, 'system_tags': {}, 'target_ids': [], 'target_version': 'target_version_example', 'time_created': '2013-10-20T19:20:30+01:00', 'time_last_assessed': '2013-10-20T19:20:30+01:00', 'time_updated': '2013-10-20T19:20:30+01:00', 'triggered_by': 'USER', 'type': 'LATEST'}]
|
|||
compartment_id
string
|
on success |
The OCID of the compartment that contains the security assessment.
Sample:
ocid1.compartment.oc1..xxxxxxEXAMPLExxxxxx
|
|||
defined_tags
dictionary
|
on success |
Defined tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags
Example: `{"Operations": {"CostCenter": "42"}}`
Sample:
{'Operations': {'CostCenter': 'US'}}
|
|||
description
string
|
on success |
The description of the security assessment.
Sample:
description_example
|
|||
display_name
string
|
on success |
The display name of the security assessment.
Sample:
display_name_example
|
|||
freeform_tags
dictionary
|
on success |
Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace. For more information, see Resource Tags
Example: `{"Department": "Finance"}`
Sample:
{'Department': 'Finance'}
|
|||
id
string
|
on success |
The OCID of the security assessment.
Sample:
ocid1.resource.oc1..xxxxxxEXAMPLExxxxxx
|
|||
ignored_assessment_ids
list
/ elements=string
|
on success |
List containing maps as values. Example: `{"Operations": [ {"CostCenter": "42"} ] }`
|
|||
ignored_target_ids
list
/ elements=string
|
on success |
List containing maps as values. Example: `{"Operations": [ {"CostCenter": "42"} ] }`
Returned for list operation
|
|||
ignored_targets
list
/ elements=string
|
on success |
List containing maps as values. Example: `{"Operations": [ {"CostCenter": "42"} ] }`
Returned for get operation
|
|||
is_baseline
boolean
|
on success |
Indicates whether or not the security assessment is set as a baseline. This is applicable only for saved security assessments.
Sample:
True
|
|||
is_deviated_from_baseline
boolean
|
on success |
Indicates if the assessment has deviated from the baseline.
Sample:
True
|
|||
last_compared_baseline_id
string
|
on success |
The OCID of the baseline against which the latest security assessment was compared.
Sample:
ocid1.lastcomparedbaseline.oc1..xxxxxxEXAMPLExxxxxx
|
|||
lifecycle_details
string
|
on success |
Details about the current state of the security assessment.
Sample:
lifecycle_details_example
|
|||
lifecycle_state
string
|
on success |
The current state of the security assessment.
Sample:
CREATING
|
|||
link
string
|
on success |
The summary of findings for the security assessment
Sample:
link_example
|
|||
schedule
string
|
on success |
Schedule to save the assessment periodically in the specified format: <version-string>;<version-specific-schedule>
Allowed version strings - "v1" v1's version specific schedule -<ss> <mm> <hh> <day-of-week> <day-of-month> Each of the above fields potentially introduce constraints. A workrequest is created only when clock time satisfies all the constraints. Constraints introduced: 1. seconds = <ss> (So, the allowed range for <ss> is [0, 59]) 2. minutes = <mm> (So, the allowed range for <mm> is [0, 59]) 3. hours = <hh> (So, the allowed range for <hh> is [0, 23]) <day-of-week> can be either '*' (without quotes or a number between 1(Monday) and 7(Sunday)) 4. No constraint introduced when it is '*'. When not, day of week must equal the given value <day-of-month> can be either '*' (without quotes or a number between 1 and 28) 5. No constraint introduced when it is '*'. When not, day of month must equal the given value
Sample:
schedule_example
|
|||
schedule_security_assessment_id
string
|
on success |
The OCID of the security assessment that is responsible for creating this scheduled save assessment.
Sample:
ocid1.schedulesecurityassessment.oc1..xxxxxxEXAMPLExxxxxx
|
|||
statistics
complex
|
on success |
|
|||
_pass
complex
|
on success |
|
|||
auditing_findings_count
integer
|
on success |
The number of findings in the Auditing category.
Sample:
56
|
|||
authorization_control_findings_count
integer
|
on success |
The number of findings in the Authorization Control category.
Sample:
56
|
|||
data_encryption_findings_count
integer
|
on success |
The number of findings in the Data Encryption category.
Sample:
56
|
|||
db_configuration_findings_count
integer
|
on success |
The number of findings in the Database Configuration category.
Sample:
56
|
|||
fine_grained_access_control_findings_count
integer
|
on success |
The number of findings in the Fine-Grained Access Control category.
Sample:
56
|
|||
privileges_and_roles_findings_count
integer
|
on success |
The number of findings in the Privileges and Roles category.
Sample:
56
|
|||
targets_count
integer
|
on success |
The number of targets that contributed to the counts at this risk level.
Sample:
56
|
|||
user_accounts_findings_count
integer
|
on success |
The number of findings in the User Accounts category.
Sample:
56
|
|||
advisory
complex
|
on success |
|
|||
auditing_findings_count
integer
|
on success |
The number of findings in the Auditing category.
Sample:
56
|
|||
authorization_control_findings_count
integer
|
on success |
The number of findings in the Authorization Control category.
Sample:
56
|
|||
data_encryption_findings_count
integer
|
on success |
The number of findings in the Data Encryption category.
Sample:
56
|
|||
db_configuration_findings_count
integer
|
on success |
The number of findings in the Database Configuration category.
Sample:
56
|
|||
fine_grained_access_control_findings_count
integer
|
on success |
The number of findings in the Fine-Grained Access Control category.
Sample:
56
|
|||
privileges_and_roles_findings_count
integer
|
on success |
The number of findings in the Privileges and Roles category.
Sample:
56
|
|||
targets_count
integer
|
on success |
The number of targets that contributed to the counts at this risk level.
Sample:
56
|
|||
user_accounts_findings_count
integer
|
on success |
The number of findings in the User Accounts category.
Sample:
56
|
|||
evaluate
complex
|
on success |
|
|||
auditing_findings_count
integer
|
on success |
The number of findings in the Auditing category.
Sample:
56
|
|||
authorization_control_findings_count
integer
|
on success |
The number of findings in the Authorization Control category.
Sample:
56
|
|||
data_encryption_findings_count
integer
|
on success |
The number of findings in the Data Encryption category.
Sample:
56
|
|||
db_configuration_findings_count
integer
|
on success |
The number of findings in the Database Configuration category.
Sample:
56
|
|||
fine_grained_access_control_findings_count
integer
|
on success |
The number of findings in the Fine-Grained Access Control category.
Sample:
56
|
|||
privileges_and_roles_findings_count
integer
|
on success |
The number of findings in the Privileges and Roles category.
Sample:
56
|
|||
targets_count
integer
|
on success |
The number of targets that contributed to the counts at this risk level.
Sample:
56
|
|||
user_accounts_findings_count
integer
|
on success |
The number of findings in the User Accounts category.
Sample:
56
|
|||
high_risk
complex
|
on success |
|
|||
auditing_findings_count
integer
|
on success |
The number of findings in the Auditing category.
Sample:
56
|
|||
authorization_control_findings_count
integer
|
on success |
The number of findings in the Authorization Control category.
Sample:
56
|
|||
data_encryption_findings_count
integer
|
on success |
The number of findings in the Data Encryption category.
Sample:
56
|
|||
db_configuration_findings_count
integer
|
on success |
The number of findings in the Database Configuration category.
Sample:
56
|
|||
fine_grained_access_control_findings_count
integer
|
on success |
The number of findings in the Fine-Grained Access Control category.
Sample:
56
|
|||
privileges_and_roles_findings_count
integer
|
on success |
The number of findings in the Privileges and Roles category.
Sample:
56
|
|||
targets_count
integer
|
on success |
The number of targets that contributed to the counts at this risk level.
Sample:
56
|
|||
user_accounts_findings_count
integer
|
on success |
The number of findings in the User Accounts category.
Sample:
56
|
|||
low_risk
complex
|
on success |
|
|||
auditing_findings_count
integer
|
on success |
The number of findings in the Auditing category.
Sample:
56
|
|||
authorization_control_findings_count
integer
|
on success |
The number of findings in the Authorization Control category.
Sample:
56
|
|||
data_encryption_findings_count
integer
|
on success |
The number of findings in the Data Encryption category.
Sample:
56
|
|||
db_configuration_findings_count
integer
|
on success |
The number of findings in the Database Configuration category.
Sample:
56
|
|||
fine_grained_access_control_findings_count
integer
|
on success |
The number of findings in the Fine-Grained Access Control category.
Sample:
56
|
|||
privileges_and_roles_findings_count
integer
|
on success |
The number of findings in the Privileges and Roles category.
Sample:
56
|
|||
targets_count
integer
|
on success |
The number of targets that contributed to the counts at this risk level.
Sample:
56
|
|||
user_accounts_findings_count
integer
|
on success |
The number of findings in the User Accounts category.
Sample:
56
|
|||
medium_risk
complex
|
on success |
|
|||
auditing_findings_count
integer
|
on success |
The number of findings in the Auditing category.
Sample:
56
|
|||
authorization_control_findings_count
integer
|
on success |
The number of findings in the Authorization Control category.
Sample:
56
|
|||
data_encryption_findings_count
integer
|
on success |
The number of findings in the Data Encryption category.
Sample:
56
|
|||
db_configuration_findings_count
integer
|
on success |
The number of findings in the Database Configuration category.
Sample:
56
|
|||
fine_grained_access_control_findings_count
integer
|
on success |
The number of findings in the Fine-Grained Access Control category.
Sample:
56
|
|||
privileges_and_roles_findings_count
integer
|
on success |
The number of findings in the Privileges and Roles category.
Sample:
56
|
|||
targets_count
integer
|
on success |
The number of targets that contributed to the counts at this risk level.
Sample:
56
|
|||
user_accounts_findings_count
integer
|
on success |
The number of findings in the User Accounts category.
Sample:
56
|
|||
targets_count
integer
|
on success |
The total number of targets in this security assessment.
Sample:
56
|
|||
system_tags
dictionary
|
on success |
System tags for this resource. Each key is predefined and scoped to a namespace. For more information, see Resource Tags. Example: `{"orcl-cloud": {"free-tier-retained": "true"}}`
Returned for get operation
|
|||
target_ids
list
/ elements=string
|
on success |
Array of database target OCIDs.
|
|||
target_version
string
|
on success |
The version of the target database.
Returned for get operation
Sample:
target_version_example
|
|||
time_created
string
|
on success |
The date and time the security assessment was created, in the format defined by RFC3339.
Sample:
2013-10-20T19:20:30+01:00
|
|||
time_last_assessed
string
|
on success |
The date and time the security assessment was last executed, in the format defined by RFC3339.
Sample:
2013-10-20T19:20:30+01:00
|
|||
time_updated
string
|
on success |
The date and time the security assessment was last updated, in the format defined by RFC3339.
Sample:
2013-10-20T19:20:30+01:00
|
|||
triggered_by
string
|
on success |
Indicates whether the security assessment was created by system or by a user.
Sample:
USER
|
|||
type
string
|
on success |
The type of this security assessment. The possible types are:
LATEST: The most up-to-date assessment that is running automatically for a target. It is system generated. SAVED: A saved security assessment. LATEST assessments are always saved in order to maintain the history of runs. A SAVED assessment is also generated by a 'refresh' action (triggered by the user). SAVE_SCHEDULE: The schedule for periodic saves of LATEST assessments. COMPARTMENT: An automatically managed assessment type that stores all details of targets in one compartment. This type keeps an up-to-date assessment of all database risks in one compartment. It is automatically updated when the latest assessment or refresh action is executed. It is also automatically updated when a target is deleted or move to a different compartment.
Sample:
LATEST
|
Authors¶
Oracle (@oracle)