This is the new AWS CloudFormation Template Reference Guide. Please update your bookmarks and links. For help getting started with CloudFormation, see the AWS CloudFormation User Guide.
AWS::GuardDuty::ThreatIntelSet
The AWS::GuardDuty::ThreatIntelSet
resource helps you create a list of
known malicious IP addresses in your AWS environment. Once you activate this
list, GuardDuty will use list the entries in this list as an additional source for
threat detection and generate findings when there is an activity associated with these
known malicious IP addresses. GuardDuty continues to monitor independently of this
custom threat intelligence set.
Only the users of the GuardDuty administrator account can manage this list. These settings automatically apply to the member accounts.
Syntax
To declare this entity in your AWS CloudFormation template, use the following syntax:
JSON
{ "Type" : "AWS::GuardDuty::ThreatIntelSet", "Properties" : { "Activate" :
Boolean
, "DetectorId" :String
, "ExpectedBucketOwner" :String
, "Format" :String
, "Location" :String
, "Name" :String
, "Tags" :[ TagItem, ... ]
} }
YAML
Type: AWS::GuardDuty::ThreatIntelSet Properties: Activate:
Boolean
DetectorId:String
ExpectedBucketOwner:String
Format:String
Location:String
Name:String
Tags:- TagItem
Properties
Activate
-
A boolean value that determines if GuardDuty can start using this list for custom threat detection. For GuardDuty to be able to generate findings based on an activity associated with these entries, this list must be active.
Required: No
Type: Boolean
Update requires: No interruption
DetectorId
-
The unique ID of the detector of the GuardDuty account for which you want to create a
threatIntelSet
.To find the
detectorId
in the current Region, see the Settings page in the GuardDuty console, or run the ListDetectors API.Required: No
Type: String
Minimum:
1
Maximum:
32
Update requires: Replacement
ExpectedBucketOwner
-
The AWS account ID that owns the Amazon S3 bucket specified in the Location field.
When you provide this account ID, GuardDuty will validate that the S3 bucket belongs to this account. If you don't specify an account ID owner, GuardDuty doesn't perform any validation.
Required: No
Type: String
Update requires: No interruption
Format
-
The format of the file that contains the
ThreatIntelSet
. For information about supported formats, see List formats in the Amazon GuardDuty User Guide.Required: Yes
Type: String
Minimum:
1
Maximum:
300
Update requires: Replacement
Location
-
The URI of the file that contains the ThreatIntelSet.
Required: Yes
Type: String
Minimum:
1
Maximum:
300
Update requires: No interruption
Name
-
The user-friendly name to identify the ThreatIntelSet.
The name of your list must be unique within an AWS account and Region. Valid characters are alphanumeric, whitespace, dash (-), and underscores (_).
Required: No
Type: String
Minimum:
1
Maximum:
300
Update requires: No interruption
-
The tags to be added to a new threat entity set resource. Each tag consists of a key and an optional value, both of which you define.
For more information, see Tag.
Required: No
Type: Array of TagItem
Update requires: No interruption
Return values
Ref
When you pass the logical ID of this resource to the intrinsic Ref
function, Ref
returns the unique ID of the ThreatIntelSet
.
For more information about using the Ref
function, see Ref
.
Fn::GetAtt
The Fn::GetAtt
intrinsic function returns a value for a specified attribute of this type. The following are the available attributes and sample return values.
For more information about using the Fn::GetAtt
intrinsic function, see Fn::GetAtt
.
Id
-
The unique ID of the
threatIntelSet
.
Examples
Declare a ThreatIntelSet Resource
The following example shows how to declare a GuardDutyThreatIntelSet
resource:
JSON
"mythreatintelset": { "Type": "AWS::GuardDuty::ThreatIntelSet", "Properties": { "Activate": true, "DetectorId": "12abc34d567e8f4912ab3d45e67891f2", "ExpectedBucketOwner" : "111122223333", "Format": "TXT", "Location": "https://s3-us-west-2.amazonaws.com/amzn-s3-demo-bucket1/mythreatintelset.txt", "Name": "MyThreatIntelSet" } }
YAML
mythreatintelset: Type: AWS::GuardDuty::ThreatIntelSet Properties: Activate: true DetectorId: "12abc34d567e8f4912ab3d45e67891f2" ExpectedBucketOwner : "111122223333" Format: "TXT" Location: "https://s3-us-west-2.amazonaws.com/amzn-s3-demo-bucket1/mythreatintelset.txt" Name: "MyThreatIntelSet"