This is the new AWS CloudFormation Template Reference Guide. Please update your bookmarks and links. For help getting started with CloudFormation, see the AWS CloudFormation User Guide.
AWS::SSM::PatchBaseline Rule
The Rule property type specifies an approval rule for a Systems Manager patch baseline.
The PatchRules property of the RuleGroup property type contains a list of Rule property
types.
Syntax
To declare this entity in your AWS CloudFormation template, use the following syntax:
JSON
{ "ApproveAfterDays" :Integer, "ApproveUntilDate" :String, "ComplianceLevel" :String, "EnableNonSecurity" :Boolean, "PatchFilterGroup" :PatchFilterGroup}
YAML
ApproveAfterDays:IntegerApproveUntilDate:StringComplianceLevel:StringEnableNonSecurity:BooleanPatchFilterGroup:PatchFilterGroup
Properties
ApproveAfterDays-
The number of days after the release date of each patch matched by the rule that the patch is marked as approved in the patch baseline. For example, a value of
7means that patches are approved seven days after they are released.Patch Manager evaluates patch release dates using Coordinated Universal Time (UTC). If the day represented by
7is2025-11-16, patches released between2025-11-16T00:00:00Zand2025-11-16T23:59:59Zwill be included in the approval.This parameter is marked as
Required: No, but your request must include a value for eitherApproveAfterDaysorApproveUntilDate.Not supported for Debian Server or Ubuntu Server.
Important
Use caution when setting this value for Windows Server patch baselines. Because patch updates that are replaced by later updates are removed, setting too broad a value for this parameter can result in crucial patches not being installed. For more information, see the Windows Server tab in the topic How security patches are selected in the AWS Systems Manager User Guide.
Required: No
Type: Integer
Minimum:
0Maximum:
360Update requires: No interruption
ApproveUntilDate-
The cutoff date for auto approval of released patches. Any patches released on or before this date are installed automatically.
Enter dates in the format
YYYY-MM-DD. For example,2025-11-16.Patch Manager evaluates patch release dates using Coordinated Universal Time (UTC). If you enter the date
2025-11-16, patches released between2025-11-16T00:00:00Zand2025-11-16T23:59:59Zwill be included in the approval.This parameter is marked as
Required: No, but your request must include a value for eitherApproveUntilDateorApproveAfterDays.Not supported for Debian Server or Ubuntu Server.
Important
Use caution when setting this value for Windows Server patch baselines. Because patch updates that are replaced by later updates are removed, setting too broad a value for this parameter can result in crucial patches not being installed. For more information, see the Windows Server tab in the topic How security patches are selected in the AWS Systems Manager User Guide.
Required: No
Type: String
Minimum:
0Maximum:
10Update requires: No interruption
ComplianceLevel-
A compliance severity level for all approved patches in a patch baseline. Valid compliance severity levels include the following:
UNSPECIFIED,CRITICAL,HIGH,MEDIUM,LOW, andINFORMATIONAL.Required: No
Type: String
Allowed values:
CRITICAL | HIGH | INFORMATIONAL | LOW | MEDIUM | UNSPECIFIEDUpdate requires: No interruption
EnableNonSecurity-
For managed nodes identified by the approval rule filters, enables a patch baseline to apply non-security updates available in the specified repository. The default value is
false. Applies to Linux managed nodes only.Required: No
Type: Boolean
Update requires: No interruption
PatchFilterGroup-
The patch filter group that defines the criteria for the rule.
Required: No
Type: PatchFilterGroup
Update requires: No interruption
See also
-
PatchRule in the AWS Systems Manager API Reference.