zscaler.ziacloud.zia_risk_profiles module – Adds a new cloud application risk profile
Note
This module is part of the zscaler.ziacloud collection (version 2.0.3).
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install zscaler.ziacloud
.
You need further requirements to be able to use this module,
see Requirements for details.
To use it in a playbook, specify: zscaler.ziacloud.zia_risk_profiles
.
New in zscaler.ziacloud 2.0.0
Synopsis
Adds a new cloud application risk profile
Requirements
The below requirements are needed on the host that executes this module.
Zscaler SDK Python can be obtained from PyPI https://pypi.org/project/zscaler-sdk-python/
Parameters
Parameter |
Comments |
---|---|
Support for admin activity audit logs Choices:
|
|
A string that contains the obfuscated API key. |
|
List of compliance certifications for the profile Choices:
|
|
The client ID for OAuth2 authentication. |
|
The client secret for OAuth2 authentication. |
|
The Zscaler cloud name provisioned for your organization. Choices:
|
|
List of custom tag blocks to include or exclude |
|
History of reported data breaches Choices:
|
|
Encryption methods supported for data in transit Choices:
|
|
Presence of a DNS CAA policy Choices:
|
|
Support for Domain-Based Message Authentication (DMARC) Choices:
|
|
Support for DomainKeys Identified Mail (DKIM) Choices:
|
|
Support for anonymous or evasive access Choices:
|
|
Whether to include (0) or exclude (1) certificates |
|
Support for file sharing features Choices:
|
|
Support for standard HTTP security headers Choices:
|
|
The unique identifier for the risk profile |
|
Support for content malware scanning Choices:
|
|
Support for multi-factor authentication Choices:
|
|
A string that contains the password for the API admin. |
|
Password strength rating in hosting info Choices:
|
|
Flag for questionable legal terms in the service Choices:
|
|
The private key for JWT-based OAuth2 authentication. |
|
Cloud application risk profile name |
|
Risk profile type. Supported value: CLOUD_APPLICATIONS Choices:
|
|
A dict containing authentication credentials. |
|
Obfuscated API key. |
|
OAuth2 client ID. |
|
OAuth2 client secret. |
|
Zscaler cloud name. Choices:
|
|
Password for the API admin. |
|
Private key for OAuth2 JWT. |
|
Sandbox Cloud environment. |
|
Sandbox API Key. |
|
Whether to use the legacy Zscaler API client. Choices:
|
|
Email ID of the API admin. |
|
Vanity domain for OAuth2. |
|
Support for remote screen sharing capabilities Choices:
|
|
Risk index scores assigned to cloud applications |
|
The Sandbox cloud environment for API access. |
|
A string that contains the Sandbox API Key. |
|
Support for Sender Policy Framework (SPF) Choices:
|
|
Support for restricting access by source IP Choices:
|
|
Minimum SSL certificate key size Choices:
|
|
Validity period of SSL certificates Choices:
|
|
Use of pinned SSL certificates Choices:
|
|
Specifies the desired state of the resource. Choices:
|
|
Application status Choices:
|
|
Support for Web Application Firewalls Choices:
|
|
Whether to use the legacy Zscaler API client. Choices:
|
|
A string that contains the email ID of the API admin. |
|
The vanity domain provisioned by Zscaler for OAuth2 flows. |
|
Mitigation for known CVE vulnerabilities Choices:
|
|
Policy or transparency around vulnerability disclosure Choices:
|
|
Whether the app is vulnerable to Heartbleed Choices:
|
|
Whether the app is vulnerable to Logjam Choices:
|
|
Whether the app is vulnerable to POODLE Choices:
|
|
Support for weak encryption ciphers Choices:
|
Notes
Note
Check mode is supported.
Examples
- name: Configure Risk Profiles
zscaler.ziacloud.zia_risk_profiles:
profile_name: "RiskProfile_12345"
profile_type: "CLOUD_APPLICATIONS"
status: "SANCTIONED"
risk_index: [1, 2, 3, 4, 5]
custom_tags: []
certifications:
- AICPA
- CCPA
- CISP
- ISO_27001
password_strength: "GOOD"
poor_items_of_service: "YES"
admin_audit_logs: "YES"
data_breach: "YES"
source_ip_restrictions: "YES"
file_sharing: "YES"
mfa_support: "YES"
ssl_pinned: "YES"
data_encryption_in_transit:
- SSLV2
- SSLV3
- TLSV1_0
- TLSV1_1
- TLSV1_2
- TLSV1_3
- UN_KNOWN
http_security_headers: "YES"
evasive: "YES"
dns_caa_policy: "YES"
ssl_cert_validity: "YES"
weak_cipher_support: "YES"
vulnerability: "YES"
vulnerable_to_heart_bleed: "YES"
ssl_cert_key_size: "BITS_2048"
vulnerable_to_poodle: "YES"
support_for_waf: "YES"
vulnerability_disclosure: "YES"
domain_keys_identified_mail: "YES"
malware_scanning_for_content: "YES"
domain_based_message_auth: "YES"
sender_policy_framework: "YES"
remote_screen_sharing: "YES"
vulnerable_to_log_jam: "YES"