Optional ReadonlyexcludeSpecifies the AWS account IDs and AWS Organizations organizational units (OUs) to exclude from the policy.
Specifying an OU is the equivalent of specifying all accounts in the OU and in any of its child OUs, including any child OUs and accounts that are added at a later time.
You can specify inclusions or exclusions, but not both. If you specify an IncludeMap , AWS Firewall Manager applies the policy to all accounts specified by the IncludeMap , and does not evaluate any ExcludeMap specifications. If you do not specify an IncludeMap , then Firewall Manager applies the policy to all accounts except for those specified by the ExcludeMap .
You can specify account IDs, OUs, or a combination:
ACCOUNT . For example, the following is a valid map: {“ACCOUNT” : [“accountID1”, “accountID2”]} .ORGUNIT . For example, the following is a valid map: {“ORGUNIT” : [“ouid111”, “ouid112”]} .{“ACCOUNT” : [“accountID1”, “accountID2”], “ORGUNIT” : [“ouid111”, “ouid112”]} .ReadonlyexcludeUsed only when tags are specified in the ResourceTags property.
If this property is True , resources with the specified tags are not in scope of the policy. If it's False , only resources with the specified tags are in scope of the policy.
ReadonlyGeneralOptional ReadonlyCreateDefines whether to set up a dashboard for your firewall in the central security account. To use this feature, cross-account functionality must be enabled in CloudWatch.
Optional ReadonlyDeployOptional ReadonlyFireDefine KMS Key to be used for Kinesis Firehose.
ReadonlyLoggingDefines the selected logging option for the WAF.
ReadonlyPrefix: stringDefines a Prefix which will be added to all resources.
ReadonlyS3Define Name of the S3 Bucket where the Firewall logs will be stored.
ReadonlySecuredDefines the domain(s) that can be checked to audit your WAF.
ReadonlyStage: stringDefines a Stage which will be added to all resources.
Optional ReadonlyincludeSpecifies the AWS account IDs and AWS Organizations organizational units (OUs) to include in the policy.
Specifying an OU is the equivalent of specifying all accounts in the OU and in any of its child OUs, including any child OUs and accounts that are added at a later time.
You can specify inclusions or exclusions, but not both. If you specify an IncludeMap , AWS Firewall Manager applies the policy to all accounts specified by the IncludeMap , and does not evaluate any ExcludeMap specifications. If you do not specify an IncludeMap , then Firewall Manager applies the policy to all accounts except for those specified by the ExcludeMap .
You can specify account IDs, OUs, or a combination:
ACCOUNT . For example, the following is a valid map: {“ACCOUNT” : [“accountID1”, “accountID2”]} .ORGUNIT . For example, the following is a valid map: {“ORGUNIT” : [“ouid111”, “ouid112”]} .{“ACCOUNT” : [“accountID1”, “accountID2”], “ORGUNIT” : [“ouid111”, “ouid112”]} .ReadonlypolicyThe name of the AWS Firewall Manager policy.
ReadonlyremediationIndicates if the policy should be automatically applied to new resources.
Optional ReadonlyresourceThe type of resource protected by or in scope of the policy.
This is in the format shown in the AWS Resource Types Reference . To apply this policy to multiple resource types, specify a resource type of ResourceTypeList and then specify the resource types in a ResourceTypeList .
The following are valid resource types for each Firewall Manager policy type:
AWS::ApiGateway::Stage , AWS::CloudFront::Distribution , and AWS::ElasticLoadBalancingV2::LoadBalancer .AWS::ApiGateway::Stage , AWS::ElasticLoadBalancingV2::LoadBalancer , and AWS::CloudFront::Distribution .AWS::EC2::VPC .AWS::ElasticLoadBalancingV2::LoadBalancer , AWS::ElasticLoadBalancing::LoadBalancer , AWS::EC2::EIP , and AWS::CloudFront::Distribution .AWS::EC2::SecurityGroup , AWS::EC2::NetworkInterface , and AWS::EC2::Instance .AWS::EC2::SecurityGroup .Optional ReadonlyresourceAn array of ResourceType objects.
Use this only to specify multiple resource types. To specify a single resource type, use ResourceType .
ReadonlyWebOptional ReadonlyOverrideReplace web ACLs that are currently associated with in-scope resources with the web ACLs created by this policy - Default is False
Interface for Shield Configuration in the Firewall Factory