oci_data_safe_security_assessment_finding
This resource provides the Security Assessment Finding resource in Oracle Cloud Infrastructure Data Safe service. Api doc link for the resource: https://docs.oracle.com/iaas/api/#/en/data-safe/latest/SecurityAssessmentFinding
Example terraform configs related to the resource : https://github.com/oracle/terraform-provider-oci/tree/master/examples/datasafe
Patches one or more findings in the specified template baseline type security assessment. Use it to modify max allowed risk level in template baseline.
Example Usage
resource "oci_data_safe_security_assessment_finding" "test_security_assessment_finding" {
#Required
security_assessment_id = oci_data_safe_security_assessment.test_security_assessment.id
#Optional
patch_operations {
#Required
operation = var.security_assessment_finding_patch_operations_operation
selection = var.security_assessment_finding_patch_operations_selection
#Optional
value = var.security_assessment_finding_patch_operations_value
}
}
Argument Reference
The following arguments are supported:
patch_operations- (Optional) (Updatable)operation- (Required) (Updatable) The operation can be one of these values:INSERT,MERGE,REMOVEselection- (Required) (Updatable)value- (Required when operation=INSERT | MERGE) (Updatable)
security_assessment_id- (Required)
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
Attributes Reference
The following attributes are exported:
assessment_id- The OCID of the assessment that generated this finding.category- The category to which the finding belongs to.details- The details of the finding. Provides detailed information to explain the finding summary, typically results from the assessed database, followed by any recommendations for changes.has_target_db_risk_level_changed- Determines if this risk level has changed on the target database since the last time ‘severity’ was modified by user.is_risk_modified- Determines if this risk level was modified by user.is_top_finding- Indicates whether a given finding is marked as topFinding or not.justification- User provided reason for accepting or modifying this finding if they choose to do so.key- The unique finding key. This is a system-generated identifier. To get the finding key for a finding, use ListFindings.lifecycle_details- Details about the current state of the finding.oneline- Provides a recommended approach to take to remediate the finding reported.oracle_defined_severity- The severity of the finding as determined by security assessment. This cannot be modified by user.references- Provides information on whether the finding is related to a CIS Oracle Database Benchmark recommendation, a STIG rule, or a GDPR Article/Recital.cis- Relevant section from CIS.gdpr- Relevant section from GDPR.obp- Relevant section from OBP.stig- Relevant section from STIG.
remarks- The explanation of the issue in this finding. It explains the reason for the rule and, if a risk is reported, it may also explain the recommended actions for remediation.severity- The severity of the finding as determined by security assessment and is same as oracleDefinedSeverity, unless modified by user.state- The current state of the finding.summary- The brief summary of the finding. When the finding is informational, the summary typically reports only the number of data elements that were examined.target_id- The OCID of the target database.time_updated- The date and time the risk level of finding was last updated, in the format defined by RFC3339.time_valid_until- The time until which the change in severity(deferred / modified) of this finding is valid.title- The short title for the finding.
Timeouts
The timeouts block allows you to specify timeouts for certain operations:
* create - (Defaults to 20 minutes), when creating the Security Assessment Finding
* update - (Defaults to 20 minutes), when updating the Security Assessment Finding
* delete - (Defaults to 20 minutes), when destroying the Security Assessment Finding
Import
SecurityAssessmentFindings can be imported using the id, e.g.
$ terraform import oci_data_safe_security_assessment_finding.test_security_assessment_finding "securityAssessments/{securityAssessmentId}/findings"