File: put_governance_rule_example.py

package info (click to toggle)
python-azure 20251104%2Bgit-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 770,224 kB
  • sloc: python: 6,357,217; ansic: 804; javascript: 287; makefile: 198; sh: 193; xml: 109
file content (71 lines) | stat: -rw-r--r-- 2,863 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
# pylint: disable=line-too-long,useless-suppression
# coding=utf-8
# --------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License. See License.txt in the project root for license information.
# Code generated by Microsoft (R) AutoRest Code Generator.
# Changes may cause incorrect behavior and will be lost if the code is regenerated.
# --------------------------------------------------------------------------

from azure.identity import DefaultAzureCredential

from azure.mgmt.security import SecurityCenter

"""
# PREREQUISITES
    pip install azure-identity
    pip install azure-mgmt-security
# USAGE
    python put_governance_rule_example.py

    Before run the sample, please set the values of the client ID, tenant ID and client secret
    of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID,
    AZURE_CLIENT_SECRET. For more info about how to get the value, please see:
    https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal
"""


def main():
    client = SecurityCenter(
        credential=DefaultAzureCredential(),
        subscription_id="SUBSCRIPTION_ID",
    )

    response = client.governance_rules.create_or_update(
        scope="subscriptions/20ff7fc3-e762-44dd-bd96-b71116dcdc23",
        rule_id="ad9a8e26-29d9-4829-bb30-e597a58cdbb8",
        governance_rule={
            "properties": {
                "conditionSets": [
                    {
                        "conditions": [
                            {
                                "operator": "In",
                                "property": "$.AssessmentKey",
                                "value": '["b1cd27e0-4ecc-4246-939f-49c426d9d72f", "fe83f80b-073d-4ccf-93d9-6797eb870201"]',
                            }
                        ]
                    }
                ],
                "description": "A rule for critical recommendations",
                "displayName": "Admin's rule",
                "governanceEmailNotification": {
                    "disableManagerEmailNotification": False,
                    "disableOwnerEmailNotification": False,
                },
                "isDisabled": False,
                "isGracePeriod": True,
                "ownerSource": {"type": "Manually", "value": "user@contoso.com"},
                "remediationTimeframe": "7.00:00:00",
                "rulePriority": 200,
                "ruleType": "Integrated",
                "sourceResourceType": "Assessments",
            }
        },
    )
    print(response)


# x-ms-original-file: specification/security/resource-manager/Microsoft.Security/preview/2022-01-01-preview/examples/GovernanceRules/PutGovernanceRule_example.json
if __name__ == "__main__":
    main()