/**
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
* SPDX-License-Identifier: Apache-2.0.
*/
#pragma once
#include An Firewall Manager policy.See Also:
AWS API
* Reference
The ID of the Firewall Manager policy.
*/ inline const Aws::String& GetPolicyId() const{ return m_policyId; } /** *The ID of the Firewall Manager policy.
*/ inline bool PolicyIdHasBeenSet() const { return m_policyIdHasBeenSet; } /** *The ID of the Firewall Manager policy.
*/ inline void SetPolicyId(const Aws::String& value) { m_policyIdHasBeenSet = true; m_policyId = value; } /** *The ID of the Firewall Manager policy.
*/ inline void SetPolicyId(Aws::String&& value) { m_policyIdHasBeenSet = true; m_policyId = std::move(value); } /** *The ID of the Firewall Manager policy.
*/ inline void SetPolicyId(const char* value) { m_policyIdHasBeenSet = true; m_policyId.assign(value); } /** *The ID of the Firewall Manager policy.
*/ inline Policy& WithPolicyId(const Aws::String& value) { SetPolicyId(value); return *this;} /** *The ID of the Firewall Manager policy.
*/ inline Policy& WithPolicyId(Aws::String&& value) { SetPolicyId(std::move(value)); return *this;} /** *The ID of the Firewall Manager policy.
*/ inline Policy& WithPolicyId(const char* value) { SetPolicyId(value); return *this;} /** *The name of the Firewall Manager policy.
*/ inline const Aws::String& GetPolicyName() const{ return m_policyName; } /** *The name of the Firewall Manager policy.
*/ inline bool PolicyNameHasBeenSet() const { return m_policyNameHasBeenSet; } /** *The name of the Firewall Manager policy.
*/ inline void SetPolicyName(const Aws::String& value) { m_policyNameHasBeenSet = true; m_policyName = value; } /** *The name of the Firewall Manager policy.
*/ inline void SetPolicyName(Aws::String&& value) { m_policyNameHasBeenSet = true; m_policyName = std::move(value); } /** *The name of the Firewall Manager policy.
*/ inline void SetPolicyName(const char* value) { m_policyNameHasBeenSet = true; m_policyName.assign(value); } /** *The name of the Firewall Manager policy.
*/ inline Policy& WithPolicyName(const Aws::String& value) { SetPolicyName(value); return *this;} /** *The name of the Firewall Manager policy.
*/ inline Policy& WithPolicyName(Aws::String&& value) { SetPolicyName(std::move(value)); return *this;} /** *The name of the Firewall Manager policy.
*/ inline Policy& WithPolicyName(const char* value) { SetPolicyName(value); return *this;} /** *A unique identifier for each update to the policy. When issuing a
* PutPolicy
request, the PolicyUpdateToken
in the
* request must match the PolicyUpdateToken
of the current policy
* version. To get the PolicyUpdateToken
of the current policy
* version, use a GetPolicy
request.
A unique identifier for each update to the policy. When issuing a
* PutPolicy
request, the PolicyUpdateToken
in the
* request must match the PolicyUpdateToken
of the current policy
* version. To get the PolicyUpdateToken
of the current policy
* version, use a GetPolicy
request.
A unique identifier for each update to the policy. When issuing a
* PutPolicy
request, the PolicyUpdateToken
in the
* request must match the PolicyUpdateToken
of the current policy
* version. To get the PolicyUpdateToken
of the current policy
* version, use a GetPolicy
request.
A unique identifier for each update to the policy. When issuing a
* PutPolicy
request, the PolicyUpdateToken
in the
* request must match the PolicyUpdateToken
of the current policy
* version. To get the PolicyUpdateToken
of the current policy
* version, use a GetPolicy
request.
A unique identifier for each update to the policy. When issuing a
* PutPolicy
request, the PolicyUpdateToken
in the
* request must match the PolicyUpdateToken
of the current policy
* version. To get the PolicyUpdateToken
of the current policy
* version, use a GetPolicy
request.
A unique identifier for each update to the policy. When issuing a
* PutPolicy
request, the PolicyUpdateToken
in the
* request must match the PolicyUpdateToken
of the current policy
* version. To get the PolicyUpdateToken
of the current policy
* version, use a GetPolicy
request.
A unique identifier for each update to the policy. When issuing a
* PutPolicy
request, the PolicyUpdateToken
in the
* request must match the PolicyUpdateToken
of the current policy
* version. To get the PolicyUpdateToken
of the current policy
* version, use a GetPolicy
request.
A unique identifier for each update to the policy. When issuing a
* PutPolicy
request, the PolicyUpdateToken
in the
* request must match the PolicyUpdateToken
of the current policy
* version. To get the PolicyUpdateToken
of the current policy
* version, use a GetPolicy
request.
Details about the security service that is being used to protect the * resources.
*/ inline const SecurityServicePolicyData& GetSecurityServicePolicyData() const{ return m_securityServicePolicyData; } /** *Details about the security service that is being used to protect the * resources.
*/ inline bool SecurityServicePolicyDataHasBeenSet() const { return m_securityServicePolicyDataHasBeenSet; } /** *Details about the security service that is being used to protect the * resources.
*/ inline void SetSecurityServicePolicyData(const SecurityServicePolicyData& value) { m_securityServicePolicyDataHasBeenSet = true; m_securityServicePolicyData = value; } /** *Details about the security service that is being used to protect the * resources.
*/ inline void SetSecurityServicePolicyData(SecurityServicePolicyData&& value) { m_securityServicePolicyDataHasBeenSet = true; m_securityServicePolicyData = std::move(value); } /** *Details about the security service that is being used to protect the * resources.
*/ inline Policy& WithSecurityServicePolicyData(const SecurityServicePolicyData& value) { SetSecurityServicePolicyData(value); return *this;} /** *Details about the security service that is being used to protect the * resources.
*/ inline Policy& WithSecurityServicePolicyData(SecurityServicePolicyData&& value) { SetSecurityServicePolicyData(std::move(value)); return *this;} /** *The type of resource protected by or in scope of the policy. This is in the
* format shown in the Amazon
* Web Services Resource Types Reference. To apply this policy to multiple
* resource types, specify a resource type of ResourceTypeList
and
* then specify the resource types in a ResourceTypeList
.
For
* WAF and Shield Advanced, resource types include
* AWS::ElasticLoadBalancingV2::LoadBalancer
,
* AWS::ElasticLoadBalancing::LoadBalancer
,
* AWS::EC2::EIP
, and AWS::CloudFront::Distribution
. For
* a security group common policy, valid values are
* AWS::EC2::NetworkInterface
and AWS::EC2::Instance
. For
* a security group content audit policy, valid values are
* AWS::EC2::SecurityGroup
, AWS::EC2::NetworkInterface
,
* and AWS::EC2::Instance
. For a security group usage audit policy,
* the value is AWS::EC2::SecurityGroup
. For an Network Firewall
* policy or DNS Firewall policy, the value is AWS::EC2::VPC
.
The type of resource protected by or in scope of the policy. This is in the
* format shown in the Amazon
* Web Services Resource Types Reference. To apply this policy to multiple
* resource types, specify a resource type of ResourceTypeList
and
* then specify the resource types in a ResourceTypeList
.
For
* WAF and Shield Advanced, resource types include
* AWS::ElasticLoadBalancingV2::LoadBalancer
,
* AWS::ElasticLoadBalancing::LoadBalancer
,
* AWS::EC2::EIP
, and AWS::CloudFront::Distribution
. For
* a security group common policy, valid values are
* AWS::EC2::NetworkInterface
and AWS::EC2::Instance
. For
* a security group content audit policy, valid values are
* AWS::EC2::SecurityGroup
, AWS::EC2::NetworkInterface
,
* and AWS::EC2::Instance
. For a security group usage audit policy,
* the value is AWS::EC2::SecurityGroup
. For an Network Firewall
* policy or DNS Firewall policy, the value is AWS::EC2::VPC
.
The type of resource protected by or in scope of the policy. This is in the
* format shown in the Amazon
* Web Services Resource Types Reference. To apply this policy to multiple
* resource types, specify a resource type of ResourceTypeList
and
* then specify the resource types in a ResourceTypeList
.
For
* WAF and Shield Advanced, resource types include
* AWS::ElasticLoadBalancingV2::LoadBalancer
,
* AWS::ElasticLoadBalancing::LoadBalancer
,
* AWS::EC2::EIP
, and AWS::CloudFront::Distribution
. For
* a security group common policy, valid values are
* AWS::EC2::NetworkInterface
and AWS::EC2::Instance
. For
* a security group content audit policy, valid values are
* AWS::EC2::SecurityGroup
, AWS::EC2::NetworkInterface
,
* and AWS::EC2::Instance
. For a security group usage audit policy,
* the value is AWS::EC2::SecurityGroup
. For an Network Firewall
* policy or DNS Firewall policy, the value is AWS::EC2::VPC
.
The type of resource protected by or in scope of the policy. This is in the
* format shown in the Amazon
* Web Services Resource Types Reference. To apply this policy to multiple
* resource types, specify a resource type of ResourceTypeList
and
* then specify the resource types in a ResourceTypeList
.
For
* WAF and Shield Advanced, resource types include
* AWS::ElasticLoadBalancingV2::LoadBalancer
,
* AWS::ElasticLoadBalancing::LoadBalancer
,
* AWS::EC2::EIP
, and AWS::CloudFront::Distribution
. For
* a security group common policy, valid values are
* AWS::EC2::NetworkInterface
and AWS::EC2::Instance
. For
* a security group content audit policy, valid values are
* AWS::EC2::SecurityGroup
, AWS::EC2::NetworkInterface
,
* and AWS::EC2::Instance
. For a security group usage audit policy,
* the value is AWS::EC2::SecurityGroup
. For an Network Firewall
* policy or DNS Firewall policy, the value is AWS::EC2::VPC
.
The type of resource protected by or in scope of the policy. This is in the
* format shown in the Amazon
* Web Services Resource Types Reference. To apply this policy to multiple
* resource types, specify a resource type of ResourceTypeList
and
* then specify the resource types in a ResourceTypeList
.
For
* WAF and Shield Advanced, resource types include
* AWS::ElasticLoadBalancingV2::LoadBalancer
,
* AWS::ElasticLoadBalancing::LoadBalancer
,
* AWS::EC2::EIP
, and AWS::CloudFront::Distribution
. For
* a security group common policy, valid values are
* AWS::EC2::NetworkInterface
and AWS::EC2::Instance
. For
* a security group content audit policy, valid values are
* AWS::EC2::SecurityGroup
, AWS::EC2::NetworkInterface
,
* and AWS::EC2::Instance
. For a security group usage audit policy,
* the value is AWS::EC2::SecurityGroup
. For an Network Firewall
* policy or DNS Firewall policy, the value is AWS::EC2::VPC
.
The type of resource protected by or in scope of the policy. This is in the
* format shown in the Amazon
* Web Services Resource Types Reference. To apply this policy to multiple
* resource types, specify a resource type of ResourceTypeList
and
* then specify the resource types in a ResourceTypeList
.
For
* WAF and Shield Advanced, resource types include
* AWS::ElasticLoadBalancingV2::LoadBalancer
,
* AWS::ElasticLoadBalancing::LoadBalancer
,
* AWS::EC2::EIP
, and AWS::CloudFront::Distribution
. For
* a security group common policy, valid values are
* AWS::EC2::NetworkInterface
and AWS::EC2::Instance
. For
* a security group content audit policy, valid values are
* AWS::EC2::SecurityGroup
, AWS::EC2::NetworkInterface
,
* and AWS::EC2::Instance
. For a security group usage audit policy,
* the value is AWS::EC2::SecurityGroup
. For an Network Firewall
* policy or DNS Firewall policy, the value is AWS::EC2::VPC
.
The type of resource protected by or in scope of the policy. This is in the
* format shown in the Amazon
* Web Services Resource Types Reference. To apply this policy to multiple
* resource types, specify a resource type of ResourceTypeList
and
* then specify the resource types in a ResourceTypeList
.
For
* WAF and Shield Advanced, resource types include
* AWS::ElasticLoadBalancingV2::LoadBalancer
,
* AWS::ElasticLoadBalancing::LoadBalancer
,
* AWS::EC2::EIP
, and AWS::CloudFront::Distribution
. For
* a security group common policy, valid values are
* AWS::EC2::NetworkInterface
and AWS::EC2::Instance
. For
* a security group content audit policy, valid values are
* AWS::EC2::SecurityGroup
, AWS::EC2::NetworkInterface
,
* and AWS::EC2::Instance
. For a security group usage audit policy,
* the value is AWS::EC2::SecurityGroup
. For an Network Firewall
* policy or DNS Firewall policy, the value is AWS::EC2::VPC
.
The type of resource protected by or in scope of the policy. This is in the
* format shown in the Amazon
* Web Services Resource Types Reference. To apply this policy to multiple
* resource types, specify a resource type of ResourceTypeList
and
* then specify the resource types in a ResourceTypeList
.
For
* WAF and Shield Advanced, resource types include
* AWS::ElasticLoadBalancingV2::LoadBalancer
,
* AWS::ElasticLoadBalancing::LoadBalancer
,
* AWS::EC2::EIP
, and AWS::CloudFront::Distribution
. For
* a security group common policy, valid values are
* AWS::EC2::NetworkInterface
and AWS::EC2::Instance
. For
* a security group content audit policy, valid values are
* AWS::EC2::SecurityGroup
, AWS::EC2::NetworkInterface
,
* and AWS::EC2::Instance
. For a security group usage audit policy,
* the value is AWS::EC2::SecurityGroup
. For an Network Firewall
* policy or DNS Firewall policy, the value is AWS::EC2::VPC
.
An array of ResourceType
objects. Use this only to specify
* multiple resource types. To specify a single resource type, use
* ResourceType
.
An array of ResourceType
objects. Use this only to specify
* multiple resource types. To specify a single resource type, use
* ResourceType
.
An array of ResourceType
objects. Use this only to specify
* multiple resource types. To specify a single resource type, use
* ResourceType
.
An array of ResourceType
objects. Use this only to specify
* multiple resource types. To specify a single resource type, use
* ResourceType
.
An array of ResourceType
objects. Use this only to specify
* multiple resource types. To specify a single resource type, use
* ResourceType
.
An array of ResourceType
objects. Use this only to specify
* multiple resource types. To specify a single resource type, use
* ResourceType
.
An array of ResourceType
objects. Use this only to specify
* multiple resource types. To specify a single resource type, use
* ResourceType
.
An array of ResourceType
objects. Use this only to specify
* multiple resource types. To specify a single resource type, use
* ResourceType
.
An array of ResourceType
objects. Use this only to specify
* multiple resource types. To specify a single resource type, use
* ResourceType
.
An array of ResourceTag
objects.
An array of ResourceTag
objects.
An array of ResourceTag
objects.
An array of ResourceTag
objects.
An array of ResourceTag
objects.
An array of ResourceTag
objects.
An array of ResourceTag
objects.
An array of ResourceTag
objects.
If set to True
, resources with the tags that are specified in
* the ResourceTag
array are not in scope of the policy. If set to
* False
, and the ResourceTag
array is not null, only
* resources with the specified tags are in scope of the policy.
If set to True
, resources with the tags that are specified in
* the ResourceTag
array are not in scope of the policy. If set to
* False
, and the ResourceTag
array is not null, only
* resources with the specified tags are in scope of the policy.
If set to True
, resources with the tags that are specified in
* the ResourceTag
array are not in scope of the policy. If set to
* False
, and the ResourceTag
array is not null, only
* resources with the specified tags are in scope of the policy.
If set to True
, resources with the tags that are specified in
* the ResourceTag
array are not in scope of the policy. If set to
* False
, and the ResourceTag
array is not null, only
* resources with the specified tags are in scope of the policy.
Indicates if the policy should be automatically applied to new resources.
*/ inline bool GetRemediationEnabled() const{ return m_remediationEnabled; } /** *Indicates if the policy should be automatically applied to new resources.
*/ inline bool RemediationEnabledHasBeenSet() const { return m_remediationEnabledHasBeenSet; } /** *Indicates if the policy should be automatically applied to new resources.
*/ inline void SetRemediationEnabled(bool value) { m_remediationEnabledHasBeenSet = true; m_remediationEnabled = value; } /** *Indicates if the policy should be automatically applied to new resources.
*/ inline Policy& WithRemediationEnabled(bool value) { SetRemediationEnabled(value); return *this;} /** *Indicates whether Firewall Manager should automatically remove protections * from resources that leave the policy scope and clean up resources that Firewall * Manager is managing for accounts when those accounts leave policy scope. For * example, Firewall Manager will disassociate a Firewall Manager managed web ACL * from a protected customer resource when the customer resource leaves policy * scope.
By default, Firewall Manager doesn't remove protections or delete * Firewall Manager managed resources.
This option is not available for * Shield Advanced or WAF Classic policies.
*/ inline bool GetDeleteUnusedFMManagedResources() const{ return m_deleteUnusedFMManagedResources; } /** *Indicates whether Firewall Manager should automatically remove protections * from resources that leave the policy scope and clean up resources that Firewall * Manager is managing for accounts when those accounts leave policy scope. For * example, Firewall Manager will disassociate a Firewall Manager managed web ACL * from a protected customer resource when the customer resource leaves policy * scope.
By default, Firewall Manager doesn't remove protections or delete * Firewall Manager managed resources.
This option is not available for * Shield Advanced or WAF Classic policies.
*/ inline bool DeleteUnusedFMManagedResourcesHasBeenSet() const { return m_deleteUnusedFMManagedResourcesHasBeenSet; } /** *Indicates whether Firewall Manager should automatically remove protections * from resources that leave the policy scope and clean up resources that Firewall * Manager is managing for accounts when those accounts leave policy scope. For * example, Firewall Manager will disassociate a Firewall Manager managed web ACL * from a protected customer resource when the customer resource leaves policy * scope.
By default, Firewall Manager doesn't remove protections or delete * Firewall Manager managed resources.
This option is not available for * Shield Advanced or WAF Classic policies.
*/ inline void SetDeleteUnusedFMManagedResources(bool value) { m_deleteUnusedFMManagedResourcesHasBeenSet = true; m_deleteUnusedFMManagedResources = value; } /** *Indicates whether Firewall Manager should automatically remove protections * from resources that leave the policy scope and clean up resources that Firewall * Manager is managing for accounts when those accounts leave policy scope. For * example, Firewall Manager will disassociate a Firewall Manager managed web ACL * from a protected customer resource when the customer resource leaves policy * scope.
By default, Firewall Manager doesn't remove protections or delete * Firewall Manager managed resources.
This option is not available for * Shield Advanced or WAF Classic policies.
*/ inline Policy& WithDeleteUnusedFMManagedResources(bool value) { SetDeleteUnusedFMManagedResources(value); return *this;} /** *Specifies the Amazon Web Services account IDs and Organizations * organizational units (OUs) to include in the policy. Specifying an OU is the * equivalent of specifying all accounts in the OU and in any of its child OUs, * including any child OUs and accounts that are added at a later time.
You
* can specify inclusions or exclusions, but not both. If you specify an
* IncludeMap
, Firewall Manager applies the policy to all accounts
* specified by the IncludeMap
, and does not evaluate any
* ExcludeMap
specifications. If you do not specify an
* IncludeMap
, then Firewall Manager applies the policy to all
* accounts except for those specified by the ExcludeMap
.
You * can specify account IDs, OUs, or a combination:
Specify
* account IDs by setting the key to ACCOUNT
. For example, the
* following is a valid map: {“ACCOUNT” : [“accountID1”,
* “accountID2”]}
.
Specify OUs by setting the key to
* ORG_UNIT
. For example, the following is a valid map:
* {“ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specify
* accounts and OUs together in a single map, separated with a comma. For example,
* the following is a valid map: {“ACCOUNT” : [“accountID1”, “accountID2”],
* “ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specifies the Amazon Web Services account IDs and Organizations * organizational units (OUs) to include in the policy. Specifying an OU is the * equivalent of specifying all accounts in the OU and in any of its child OUs, * including any child OUs and accounts that are added at a later time.
You
* can specify inclusions or exclusions, but not both. If you specify an
* IncludeMap
, Firewall Manager applies the policy to all accounts
* specified by the IncludeMap
, and does not evaluate any
* ExcludeMap
specifications. If you do not specify an
* IncludeMap
, then Firewall Manager applies the policy to all
* accounts except for those specified by the ExcludeMap
.
You * can specify account IDs, OUs, or a combination:
Specify
* account IDs by setting the key to ACCOUNT
. For example, the
* following is a valid map: {“ACCOUNT” : [“accountID1”,
* “accountID2”]}
.
Specify OUs by setting the key to
* ORG_UNIT
. For example, the following is a valid map:
* {“ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specify
* accounts and OUs together in a single map, separated with a comma. For example,
* the following is a valid map: {“ACCOUNT” : [“accountID1”, “accountID2”],
* “ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specifies the Amazon Web Services account IDs and Organizations * organizational units (OUs) to include in the policy. Specifying an OU is the * equivalent of specifying all accounts in the OU and in any of its child OUs, * including any child OUs and accounts that are added at a later time.
You
* can specify inclusions or exclusions, but not both. If you specify an
* IncludeMap
, Firewall Manager applies the policy to all accounts
* specified by the IncludeMap
, and does not evaluate any
* ExcludeMap
specifications. If you do not specify an
* IncludeMap
, then Firewall Manager applies the policy to all
* accounts except for those specified by the ExcludeMap
.
You * can specify account IDs, OUs, or a combination:
Specify
* account IDs by setting the key to ACCOUNT
. For example, the
* following is a valid map: {“ACCOUNT” : [“accountID1”,
* “accountID2”]}
.
Specify OUs by setting the key to
* ORG_UNIT
. For example, the following is a valid map:
* {“ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specify
* accounts and OUs together in a single map, separated with a comma. For example,
* the following is a valid map: {“ACCOUNT” : [“accountID1”, “accountID2”],
* “ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specifies the Amazon Web Services account IDs and Organizations * organizational units (OUs) to include in the policy. Specifying an OU is the * equivalent of specifying all accounts in the OU and in any of its child OUs, * including any child OUs and accounts that are added at a later time.
You
* can specify inclusions or exclusions, but not both. If you specify an
* IncludeMap
, Firewall Manager applies the policy to all accounts
* specified by the IncludeMap
, and does not evaluate any
* ExcludeMap
specifications. If you do not specify an
* IncludeMap
, then Firewall Manager applies the policy to all
* accounts except for those specified by the ExcludeMap
.
You * can specify account IDs, OUs, or a combination:
Specify
* account IDs by setting the key to ACCOUNT
. For example, the
* following is a valid map: {“ACCOUNT” : [“accountID1”,
* “accountID2”]}
.
Specify OUs by setting the key to
* ORG_UNIT
. For example, the following is a valid map:
* {“ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specify
* accounts and OUs together in a single map, separated with a comma. For example,
* the following is a valid map: {“ACCOUNT” : [“accountID1”, “accountID2”],
* “ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specifies the Amazon Web Services account IDs and Organizations * organizational units (OUs) to include in the policy. Specifying an OU is the * equivalent of specifying all accounts in the OU and in any of its child OUs, * including any child OUs and accounts that are added at a later time.
You
* can specify inclusions or exclusions, but not both. If you specify an
* IncludeMap
, Firewall Manager applies the policy to all accounts
* specified by the IncludeMap
, and does not evaluate any
* ExcludeMap
specifications. If you do not specify an
* IncludeMap
, then Firewall Manager applies the policy to all
* accounts except for those specified by the ExcludeMap
.
You * can specify account IDs, OUs, or a combination:
Specify
* account IDs by setting the key to ACCOUNT
. For example, the
* following is a valid map: {“ACCOUNT” : [“accountID1”,
* “accountID2”]}
.
Specify OUs by setting the key to
* ORG_UNIT
. For example, the following is a valid map:
* {“ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specify
* accounts and OUs together in a single map, separated with a comma. For example,
* the following is a valid map: {“ACCOUNT” : [“accountID1”, “accountID2”],
* “ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specifies the Amazon Web Services account IDs and Organizations * organizational units (OUs) to include in the policy. Specifying an OU is the * equivalent of specifying all accounts in the OU and in any of its child OUs, * including any child OUs and accounts that are added at a later time.
You
* can specify inclusions or exclusions, but not both. If you specify an
* IncludeMap
, Firewall Manager applies the policy to all accounts
* specified by the IncludeMap
, and does not evaluate any
* ExcludeMap
specifications. If you do not specify an
* IncludeMap
, then Firewall Manager applies the policy to all
* accounts except for those specified by the ExcludeMap
.
You * can specify account IDs, OUs, or a combination:
Specify
* account IDs by setting the key to ACCOUNT
. For example, the
* following is a valid map: {“ACCOUNT” : [“accountID1”,
* “accountID2”]}
.
Specify OUs by setting the key to
* ORG_UNIT
. For example, the following is a valid map:
* {“ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specify
* accounts and OUs together in a single map, separated with a comma. For example,
* the following is a valid map: {“ACCOUNT” : [“accountID1”, “accountID2”],
* “ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specifies the Amazon Web Services account IDs and Organizations * organizational units (OUs) to include in the policy. Specifying an OU is the * equivalent of specifying all accounts in the OU and in any of its child OUs, * including any child OUs and accounts that are added at a later time.
You
* can specify inclusions or exclusions, but not both. If you specify an
* IncludeMap
, Firewall Manager applies the policy to all accounts
* specified by the IncludeMap
, and does not evaluate any
* ExcludeMap
specifications. If you do not specify an
* IncludeMap
, then Firewall Manager applies the policy to all
* accounts except for those specified by the ExcludeMap
.
You * can specify account IDs, OUs, or a combination:
Specify
* account IDs by setting the key to ACCOUNT
. For example, the
* following is a valid map: {“ACCOUNT” : [“accountID1”,
* “accountID2”]}
.
Specify OUs by setting the key to
* ORG_UNIT
. For example, the following is a valid map:
* {“ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specify
* accounts and OUs together in a single map, separated with a comma. For example,
* the following is a valid map: {“ACCOUNT” : [“accountID1”, “accountID2”],
* “ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specifies the Amazon Web Services account IDs and Organizations * organizational units (OUs) to include in the policy. Specifying an OU is the * equivalent of specifying all accounts in the OU and in any of its child OUs, * including any child OUs and accounts that are added at a later time.
You
* can specify inclusions or exclusions, but not both. If you specify an
* IncludeMap
, Firewall Manager applies the policy to all accounts
* specified by the IncludeMap
, and does not evaluate any
* ExcludeMap
specifications. If you do not specify an
* IncludeMap
, then Firewall Manager applies the policy to all
* accounts except for those specified by the ExcludeMap
.
You * can specify account IDs, OUs, or a combination:
Specify
* account IDs by setting the key to ACCOUNT
. For example, the
* following is a valid map: {“ACCOUNT” : [“accountID1”,
* “accountID2”]}
.
Specify OUs by setting the key to
* ORG_UNIT
. For example, the following is a valid map:
* {“ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specify
* accounts and OUs together in a single map, separated with a comma. For example,
* the following is a valid map: {“ACCOUNT” : [“accountID1”, “accountID2”],
* “ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specifies the Amazon Web Services account IDs and Organizations * organizational units (OUs) to include in the policy. Specifying an OU is the * equivalent of specifying all accounts in the OU and in any of its child OUs, * including any child OUs and accounts that are added at a later time.
You
* can specify inclusions or exclusions, but not both. If you specify an
* IncludeMap
, Firewall Manager applies the policy to all accounts
* specified by the IncludeMap
, and does not evaluate any
* ExcludeMap
specifications. If you do not specify an
* IncludeMap
, then Firewall Manager applies the policy to all
* accounts except for those specified by the ExcludeMap
.
You * can specify account IDs, OUs, or a combination:
Specify
* account IDs by setting the key to ACCOUNT
. For example, the
* following is a valid map: {“ACCOUNT” : [“accountID1”,
* “accountID2”]}
.
Specify OUs by setting the key to
* ORG_UNIT
. For example, the following is a valid map:
* {“ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specify
* accounts and OUs together in a single map, separated with a comma. For example,
* the following is a valid map: {“ACCOUNT” : [“accountID1”, “accountID2”],
* “ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specifies the Amazon Web Services account IDs and Organizations * organizational units (OUs) to include in the policy. Specifying an OU is the * equivalent of specifying all accounts in the OU and in any of its child OUs, * including any child OUs and accounts that are added at a later time.
You
* can specify inclusions or exclusions, but not both. If you specify an
* IncludeMap
, Firewall Manager applies the policy to all accounts
* specified by the IncludeMap
, and does not evaluate any
* ExcludeMap
specifications. If you do not specify an
* IncludeMap
, then Firewall Manager applies the policy to all
* accounts except for those specified by the ExcludeMap
.
You * can specify account IDs, OUs, or a combination:
Specify
* account IDs by setting the key to ACCOUNT
. For example, the
* following is a valid map: {“ACCOUNT” : [“accountID1”,
* “accountID2”]}
.
Specify OUs by setting the key to
* ORG_UNIT
. For example, the following is a valid map:
* {“ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specify
* accounts and OUs together in a single map, separated with a comma. For example,
* the following is a valid map: {“ACCOUNT” : [“accountID1”, “accountID2”],
* “ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specifies the Amazon Web Services account IDs and Organizations * organizational units (OUs) to exclude from the policy. Specifying an OU is the * equivalent of specifying all accounts in the OU and in any of its child OUs, * including any child OUs and accounts that are added at a later time.
You
* can specify inclusions or exclusions, but not both. If you specify an
* IncludeMap
, Firewall Manager applies the policy to all accounts
* specified by the IncludeMap
, and does not evaluate any
* ExcludeMap
specifications. If you do not specify an
* IncludeMap
, then Firewall Manager applies the policy to all
* accounts except for those specified by the ExcludeMap
.
You * can specify account IDs, OUs, or a combination:
Specify
* account IDs by setting the key to ACCOUNT
. For example, the
* following is a valid map: {“ACCOUNT” : [“accountID1”,
* “accountID2”]}
.
Specify OUs by setting the key to
* ORG_UNIT
. For example, the following is a valid map:
* {“ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specify
* accounts and OUs together in a single map, separated with a comma. For example,
* the following is a valid map: {“ACCOUNT” : [“accountID1”, “accountID2”],
* “ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specifies the Amazon Web Services account IDs and Organizations * organizational units (OUs) to exclude from the policy. Specifying an OU is the * equivalent of specifying all accounts in the OU and in any of its child OUs, * including any child OUs and accounts that are added at a later time.
You
* can specify inclusions or exclusions, but not both. If you specify an
* IncludeMap
, Firewall Manager applies the policy to all accounts
* specified by the IncludeMap
, and does not evaluate any
* ExcludeMap
specifications. If you do not specify an
* IncludeMap
, then Firewall Manager applies the policy to all
* accounts except for those specified by the ExcludeMap
.
You * can specify account IDs, OUs, or a combination:
Specify
* account IDs by setting the key to ACCOUNT
. For example, the
* following is a valid map: {“ACCOUNT” : [“accountID1”,
* “accountID2”]}
.
Specify OUs by setting the key to
* ORG_UNIT
. For example, the following is a valid map:
* {“ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specify
* accounts and OUs together in a single map, separated with a comma. For example,
* the following is a valid map: {“ACCOUNT” : [“accountID1”, “accountID2”],
* “ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specifies the Amazon Web Services account IDs and Organizations * organizational units (OUs) to exclude from the policy. Specifying an OU is the * equivalent of specifying all accounts in the OU and in any of its child OUs, * including any child OUs and accounts that are added at a later time.
You
* can specify inclusions or exclusions, but not both. If you specify an
* IncludeMap
, Firewall Manager applies the policy to all accounts
* specified by the IncludeMap
, and does not evaluate any
* ExcludeMap
specifications. If you do not specify an
* IncludeMap
, then Firewall Manager applies the policy to all
* accounts except for those specified by the ExcludeMap
.
You * can specify account IDs, OUs, or a combination:
Specify
* account IDs by setting the key to ACCOUNT
. For example, the
* following is a valid map: {“ACCOUNT” : [“accountID1”,
* “accountID2”]}
.
Specify OUs by setting the key to
* ORG_UNIT
. For example, the following is a valid map:
* {“ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specify
* accounts and OUs together in a single map, separated with a comma. For example,
* the following is a valid map: {“ACCOUNT” : [“accountID1”, “accountID2”],
* “ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specifies the Amazon Web Services account IDs and Organizations * organizational units (OUs) to exclude from the policy. Specifying an OU is the * equivalent of specifying all accounts in the OU and in any of its child OUs, * including any child OUs and accounts that are added at a later time.
You
* can specify inclusions or exclusions, but not both. If you specify an
* IncludeMap
, Firewall Manager applies the policy to all accounts
* specified by the IncludeMap
, and does not evaluate any
* ExcludeMap
specifications. If you do not specify an
* IncludeMap
, then Firewall Manager applies the policy to all
* accounts except for those specified by the ExcludeMap
.
You * can specify account IDs, OUs, or a combination:
Specify
* account IDs by setting the key to ACCOUNT
. For example, the
* following is a valid map: {“ACCOUNT” : [“accountID1”,
* “accountID2”]}
.
Specify OUs by setting the key to
* ORG_UNIT
. For example, the following is a valid map:
* {“ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specify
* accounts and OUs together in a single map, separated with a comma. For example,
* the following is a valid map: {“ACCOUNT” : [“accountID1”, “accountID2”],
* “ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specifies the Amazon Web Services account IDs and Organizations * organizational units (OUs) to exclude from the policy. Specifying an OU is the * equivalent of specifying all accounts in the OU and in any of its child OUs, * including any child OUs and accounts that are added at a later time.
You
* can specify inclusions or exclusions, but not both. If you specify an
* IncludeMap
, Firewall Manager applies the policy to all accounts
* specified by the IncludeMap
, and does not evaluate any
* ExcludeMap
specifications. If you do not specify an
* IncludeMap
, then Firewall Manager applies the policy to all
* accounts except for those specified by the ExcludeMap
.
You * can specify account IDs, OUs, or a combination:
Specify
* account IDs by setting the key to ACCOUNT
. For example, the
* following is a valid map: {“ACCOUNT” : [“accountID1”,
* “accountID2”]}
.
Specify OUs by setting the key to
* ORG_UNIT
. For example, the following is a valid map:
* {“ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specify
* accounts and OUs together in a single map, separated with a comma. For example,
* the following is a valid map: {“ACCOUNT” : [“accountID1”, “accountID2”],
* “ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specifies the Amazon Web Services account IDs and Organizations * organizational units (OUs) to exclude from the policy. Specifying an OU is the * equivalent of specifying all accounts in the OU and in any of its child OUs, * including any child OUs and accounts that are added at a later time.
You
* can specify inclusions or exclusions, but not both. If you specify an
* IncludeMap
, Firewall Manager applies the policy to all accounts
* specified by the IncludeMap
, and does not evaluate any
* ExcludeMap
specifications. If you do not specify an
* IncludeMap
, then Firewall Manager applies the policy to all
* accounts except for those specified by the ExcludeMap
.
You * can specify account IDs, OUs, or a combination:
Specify
* account IDs by setting the key to ACCOUNT
. For example, the
* following is a valid map: {“ACCOUNT” : [“accountID1”,
* “accountID2”]}
.
Specify OUs by setting the key to
* ORG_UNIT
. For example, the following is a valid map:
* {“ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specify
* accounts and OUs together in a single map, separated with a comma. For example,
* the following is a valid map: {“ACCOUNT” : [“accountID1”, “accountID2”],
* “ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specifies the Amazon Web Services account IDs and Organizations * organizational units (OUs) to exclude from the policy. Specifying an OU is the * equivalent of specifying all accounts in the OU and in any of its child OUs, * including any child OUs and accounts that are added at a later time.
You
* can specify inclusions or exclusions, but not both. If you specify an
* IncludeMap
, Firewall Manager applies the policy to all accounts
* specified by the IncludeMap
, and does not evaluate any
* ExcludeMap
specifications. If you do not specify an
* IncludeMap
, then Firewall Manager applies the policy to all
* accounts except for those specified by the ExcludeMap
.
You * can specify account IDs, OUs, or a combination:
Specify
* account IDs by setting the key to ACCOUNT
. For example, the
* following is a valid map: {“ACCOUNT” : [“accountID1”,
* “accountID2”]}
.
Specify OUs by setting the key to
* ORG_UNIT
. For example, the following is a valid map:
* {“ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specify
* accounts and OUs together in a single map, separated with a comma. For example,
* the following is a valid map: {“ACCOUNT” : [“accountID1”, “accountID2”],
* “ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specifies the Amazon Web Services account IDs and Organizations * organizational units (OUs) to exclude from the policy. Specifying an OU is the * equivalent of specifying all accounts in the OU and in any of its child OUs, * including any child OUs and accounts that are added at a later time.
You
* can specify inclusions or exclusions, but not both. If you specify an
* IncludeMap
, Firewall Manager applies the policy to all accounts
* specified by the IncludeMap
, and does not evaluate any
* ExcludeMap
specifications. If you do not specify an
* IncludeMap
, then Firewall Manager applies the policy to all
* accounts except for those specified by the ExcludeMap
.
You * can specify account IDs, OUs, or a combination:
Specify
* account IDs by setting the key to ACCOUNT
. For example, the
* following is a valid map: {“ACCOUNT” : [“accountID1”,
* “accountID2”]}
.
Specify OUs by setting the key to
* ORG_UNIT
. For example, the following is a valid map:
* {“ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specify
* accounts and OUs together in a single map, separated with a comma. For example,
* the following is a valid map: {“ACCOUNT” : [“accountID1”, “accountID2”],
* “ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specifies the Amazon Web Services account IDs and Organizations * organizational units (OUs) to exclude from the policy. Specifying an OU is the * equivalent of specifying all accounts in the OU and in any of its child OUs, * including any child OUs and accounts that are added at a later time.
You
* can specify inclusions or exclusions, but not both. If you specify an
* IncludeMap
, Firewall Manager applies the policy to all accounts
* specified by the IncludeMap
, and does not evaluate any
* ExcludeMap
specifications. If you do not specify an
* IncludeMap
, then Firewall Manager applies the policy to all
* accounts except for those specified by the ExcludeMap
.
You * can specify account IDs, OUs, or a combination:
Specify
* account IDs by setting the key to ACCOUNT
. For example, the
* following is a valid map: {“ACCOUNT” : [“accountID1”,
* “accountID2”]}
.
Specify OUs by setting the key to
* ORG_UNIT
. For example, the following is a valid map:
* {“ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specify
* accounts and OUs together in a single map, separated with a comma. For example,
* the following is a valid map: {“ACCOUNT” : [“accountID1”, “accountID2”],
* “ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specifies the Amazon Web Services account IDs and Organizations * organizational units (OUs) to exclude from the policy. Specifying an OU is the * equivalent of specifying all accounts in the OU and in any of its child OUs, * including any child OUs and accounts that are added at a later time.
You
* can specify inclusions or exclusions, but not both. If you specify an
* IncludeMap
, Firewall Manager applies the policy to all accounts
* specified by the IncludeMap
, and does not evaluate any
* ExcludeMap
specifications. If you do not specify an
* IncludeMap
, then Firewall Manager applies the policy to all
* accounts except for those specified by the ExcludeMap
.
You * can specify account IDs, OUs, or a combination:
Specify
* account IDs by setting the key to ACCOUNT
. For example, the
* following is a valid map: {“ACCOUNT” : [“accountID1”,
* “accountID2”]}
.
Specify OUs by setting the key to
* ORG_UNIT
. For example, the following is a valid map:
* {“ORG_UNIT” : [“ouid111”, “ouid112”]}
.
Specify
* accounts and OUs together in a single map, separated with a comma. For example,
* the following is a valid map: {“ACCOUNT” : [“accountID1”, “accountID2”],
* “ORG_UNIT” : [“ouid111”, “ouid112”]}
.
The unique identifiers of the resource sets used by the policy.
*/ inline const Aws::VectorThe unique identifiers of the resource sets used by the policy.
*/ inline bool ResourceSetIdsHasBeenSet() const { return m_resourceSetIdsHasBeenSet; } /** *The unique identifiers of the resource sets used by the policy.
*/ inline void SetResourceSetIds(const Aws::VectorThe unique identifiers of the resource sets used by the policy.
*/ inline void SetResourceSetIds(Aws::VectorThe unique identifiers of the resource sets used by the policy.
*/ inline Policy& WithResourceSetIds(const Aws::VectorThe unique identifiers of the resource sets used by the policy.
*/ inline Policy& WithResourceSetIds(Aws::VectorThe unique identifiers of the resource sets used by the policy.
*/ inline Policy& AddResourceSetIds(const Aws::String& value) { m_resourceSetIdsHasBeenSet = true; m_resourceSetIds.push_back(value); return *this; } /** *The unique identifiers of the resource sets used by the policy.
*/ inline Policy& AddResourceSetIds(Aws::String&& value) { m_resourceSetIdsHasBeenSet = true; m_resourceSetIds.push_back(std::move(value)); return *this; } /** *The unique identifiers of the resource sets used by the policy.
*/ inline Policy& AddResourceSetIds(const char* value) { m_resourceSetIdsHasBeenSet = true; m_resourceSetIds.push_back(value); return *this; } /** *The definition of the Network Firewall firewall policy.
*/ inline const Aws::String& GetPolicyDescription() const{ return m_policyDescription; } /** *The definition of the Network Firewall firewall policy.
*/ inline bool PolicyDescriptionHasBeenSet() const { return m_policyDescriptionHasBeenSet; } /** *The definition of the Network Firewall firewall policy.
*/ inline void SetPolicyDescription(const Aws::String& value) { m_policyDescriptionHasBeenSet = true; m_policyDescription = value; } /** *The definition of the Network Firewall firewall policy.
*/ inline void SetPolicyDescription(Aws::String&& value) { m_policyDescriptionHasBeenSet = true; m_policyDescription = std::move(value); } /** *The definition of the Network Firewall firewall policy.
*/ inline void SetPolicyDescription(const char* value) { m_policyDescriptionHasBeenSet = true; m_policyDescription.assign(value); } /** *The definition of the Network Firewall firewall policy.
*/ inline Policy& WithPolicyDescription(const Aws::String& value) { SetPolicyDescription(value); return *this;} /** *The definition of the Network Firewall firewall policy.
*/ inline Policy& WithPolicyDescription(Aws::String&& value) { SetPolicyDescription(std::move(value)); return *this;} /** *The definition of the Network Firewall firewall policy.
*/ inline Policy& WithPolicyDescription(const char* value) { SetPolicyDescription(value); return *this;} /** *Indicates whether the policy is in or out of an admin's policy or Region * scope.
ACTIVE
- The administrator can manage and
* delete the policy.
OUT_OF_ADMIN_SCOPE
- The
* administrator can view the policy, but they can't edit or delete the policy.
* Existing policy protections stay in place. Any new resources that come into
* scope of the policy won't be protected.
Indicates whether the policy is in or out of an admin's policy or Region * scope.
ACTIVE
- The administrator can manage and
* delete the policy.
OUT_OF_ADMIN_SCOPE
- The
* administrator can view the policy, but they can't edit or delete the policy.
* Existing policy protections stay in place. Any new resources that come into
* scope of the policy won't be protected.
Indicates whether the policy is in or out of an admin's policy or Region * scope.
ACTIVE
- The administrator can manage and
* delete the policy.
OUT_OF_ADMIN_SCOPE
- The
* administrator can view the policy, but they can't edit or delete the policy.
* Existing policy protections stay in place. Any new resources that come into
* scope of the policy won't be protected.
Indicates whether the policy is in or out of an admin's policy or Region * scope.
ACTIVE
- The administrator can manage and
* delete the policy.
OUT_OF_ADMIN_SCOPE
- The
* administrator can view the policy, but they can't edit or delete the policy.
* Existing policy protections stay in place. Any new resources that come into
* scope of the policy won't be protected.
Indicates whether the policy is in or out of an admin's policy or Region * scope.
ACTIVE
- The administrator can manage and
* delete the policy.
OUT_OF_ADMIN_SCOPE
- The
* administrator can view the policy, but they can't edit or delete the policy.
* Existing policy protections stay in place. Any new resources that come into
* scope of the policy won't be protected.
Indicates whether the policy is in or out of an admin's policy or Region * scope.
ACTIVE
- The administrator can manage and
* delete the policy.
OUT_OF_ADMIN_SCOPE
- The
* administrator can view the policy, but they can't edit or delete the policy.
* Existing policy protections stay in place. Any new resources that come into
* scope of the policy won't be protected.