<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Error when creating policy and compliance with Terraform code in Prisma Cloud Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/error-when-creating-policy-and-compliance-with-terraform-code/m-p/345526#M293</link>
    <description>&lt;P&gt;I have completed creating the compliance with Terraform code in Prisma Cloud. And it is possible to create policies with Terraform.&lt;/P&gt;&lt;P&gt;But I can't link the compliance metadata I created to the policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Initially, I tried to set up compliance while creating a policy in Terraform in the same way as the Prisma Cloud Console GUI, but it failed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Failure Terraform code.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;resource "prismacloud_policy" "p2" {
    policy_type = "config"
    cloud_type = "aws"
    name = "ACM - Manage unused certificates"
    severity = "medium"
    labels = ["AWS-ACM-05"]
    description = "Are you performing periodic checks on this, such as deleting obsolete or expired certificates?"
    rule {
        name = "ACM - Manage unused certificates"
        criteria = "config where cloud.type = 'aws' AND api.name = 'aws-acm-describe-certificate' AND json.rule = '(inUseBy[*] is empty or inUseBy does not exist)'"
        parameters = {
            savedSearch = "false"
            withIac = "false"
        }
        rule_type = "Config"
    }
    compliance_metadata { 
        compliance_id = "61bdbedb-49b3-436f-9f4a-798a30bcfb87"
        standard_name = "My Cloud Security"
        standard_description = "My Company Cloud Security"
        requirement_id = "13"
        requirement_name = "ACM"
        section_id = "13.5"
        section_description = "Manage unused certificates"
        custom_assigned = true
    }
}&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Perhaps, Policy ID seems to be a prerequisite&amp;nbsp;in compliance_metadata.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, when I first created a policy, obtained the Policy ID, and then added it to the compliance_metadata, it turned out that the metadata was added without errors in Terraform.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Terraform code with Policy_ID added in compliance metadata&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;resource "prismacloud_policy" "p2" {
    policy_type = "config"
    cloud_type = "aws"
    name = "ACM - Manage unused certificates"
    severity = "medium"
    labels = ["AWS-ACM-05"]
    description = "Are you performing periodic checks on this, such as deleting obsolete or expired certificates?"
    rule {
        name = "ACM - Manage unused certificates"
        criteria = "config where cloud.type = 'aws' AND api.name = 'aws-acm-describe-certificate' AND json.rule = '(inUseBy[*] is empty or inUseBy does not exist)'"
        parameters = {
            savedSearch = "false"
            withIac = "false"
        }
        rule_type = "Config"
    }
    compliance_metadata {
        policy_id = "13697ac1-5e60-4b22-a8ac-a8dfae25bafa"
        compliance_id = "61bdbedb-49b3-436f-9f4a-798a30bcfb87"
        standard_name = "My Cloud Security"
        standard_description = "My Company Cloud Security"
        requirement_id = "13"
        requirement_name = "ACM"
        section_id = "13.5"
        section_description = "Manage unused certificates"
        custom_assigned = true
    }
}&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;but there was an error that the compliance was not connected in the actual Prisma Cloud Console GUI.&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;I would like to know how and how to apply compliance to policies with Terraform.&lt;/P&gt;&lt;P&gt;however, Both the Terraform page and the Prisma Cloud API documentation lack error details and explanations.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Reference&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.terraform.io/docs/providers/prismacloud/r/policy.html" target="_blank" rel="noopener"&gt;https://www.terraform.io/docs/providers/prismacloud/r/policy.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://api.docs.prismacloud.io/reference#add-policy" target="_blank" rel="noopener"&gt;https://api.docs.prismacloud.io/reference#add-policy&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/python-api-add-compliance-standard-to-policy/m-p/261425" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/python-api-add-compliance-standard-to-policy/m-p/261425&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 02 Sep 2020 17:43:45 GMT</pubDate>
    <dc:creator>KRyu</dc:creator>
    <dc:date>2020-09-02T17:43:45Z</dc:date>
    <item>
      <title>Error when creating policy and compliance with Terraform code</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/error-when-creating-policy-and-compliance-with-terraform-code/m-p/345526#M293</link>
      <description>&lt;P&gt;I have completed creating the compliance with Terraform code in Prisma Cloud. And it is possible to create policies with Terraform.&lt;/P&gt;&lt;P&gt;But I can't link the compliance metadata I created to the policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Initially, I tried to set up compliance while creating a policy in Terraform in the same way as the Prisma Cloud Console GUI, but it failed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Failure Terraform code.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;resource "prismacloud_policy" "p2" {
    policy_type = "config"
    cloud_type = "aws"
    name = "ACM - Manage unused certificates"
    severity = "medium"
    labels = ["AWS-ACM-05"]
    description = "Are you performing periodic checks on this, such as deleting obsolete or expired certificates?"
    rule {
        name = "ACM - Manage unused certificates"
        criteria = "config where cloud.type = 'aws' AND api.name = 'aws-acm-describe-certificate' AND json.rule = '(inUseBy[*] is empty or inUseBy does not exist)'"
        parameters = {
            savedSearch = "false"
            withIac = "false"
        }
        rule_type = "Config"
    }
    compliance_metadata { 
        compliance_id = "61bdbedb-49b3-436f-9f4a-798a30bcfb87"
        standard_name = "My Cloud Security"
        standard_description = "My Company Cloud Security"
        requirement_id = "13"
        requirement_name = "ACM"
        section_id = "13.5"
        section_description = "Manage unused certificates"
        custom_assigned = true
    }
}&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Perhaps, Policy ID seems to be a prerequisite&amp;nbsp;in compliance_metadata.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, when I first created a policy, obtained the Policy ID, and then added it to the compliance_metadata, it turned out that the metadata was added without errors in Terraform.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Terraform code with Policy_ID added in compliance metadata&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;resource "prismacloud_policy" "p2" {
    policy_type = "config"
    cloud_type = "aws"
    name = "ACM - Manage unused certificates"
    severity = "medium"
    labels = ["AWS-ACM-05"]
    description = "Are you performing periodic checks on this, such as deleting obsolete or expired certificates?"
    rule {
        name = "ACM - Manage unused certificates"
        criteria = "config where cloud.type = 'aws' AND api.name = 'aws-acm-describe-certificate' AND json.rule = '(inUseBy[*] is empty or inUseBy does not exist)'"
        parameters = {
            savedSearch = "false"
            withIac = "false"
        }
        rule_type = "Config"
    }
    compliance_metadata {
        policy_id = "13697ac1-5e60-4b22-a8ac-a8dfae25bafa"
        compliance_id = "61bdbedb-49b3-436f-9f4a-798a30bcfb87"
        standard_name = "My Cloud Security"
        standard_description = "My Company Cloud Security"
        requirement_id = "13"
        requirement_name = "ACM"
        section_id = "13.5"
        section_description = "Manage unused certificates"
        custom_assigned = true
    }
}&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;but there was an error that the compliance was not connected in the actual Prisma Cloud Console GUI.&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;I would like to know how and how to apply compliance to policies with Terraform.&lt;/P&gt;&lt;P&gt;however, Both the Terraform page and the Prisma Cloud API documentation lack error details and explanations.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Reference&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.terraform.io/docs/providers/prismacloud/r/policy.html" target="_blank" rel="noopener"&gt;https://www.terraform.io/docs/providers/prismacloud/r/policy.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://api.docs.prismacloud.io/reference#add-policy" target="_blank" rel="noopener"&gt;https://api.docs.prismacloud.io/reference#add-policy&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/python-api-add-compliance-standard-to-policy/m-p/261425" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/python-api-add-compliance-standard-to-policy/m-p/261425&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Sep 2020 17:43:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/error-when-creating-policy-and-compliance-with-terraform-code/m-p/345526#M293</guid>
      <dc:creator>KRyu</dc:creator>
      <dc:date>2020-09-02T17:43:45Z</dc:date>
    </item>
    <item>
      <title>Re: Error when creating policy and compliance with Terraform code</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/error-when-creating-policy-and-compliance-with-terraform-code/m-p/345806#M294</link>
      <description>&lt;P&gt;I solved the problem.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem was compliance_id in compliance_metadata. This was the same as the csrs_id in section.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And it was confirmed that Policy_id is not necessary.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Aug 2020 05:41:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/error-when-creating-policy-and-compliance-with-terraform-code/m-p/345806#M294</guid>
      <dc:creator>KRyu</dc:creator>
      <dc:date>2020-08-28T05:41:23Z</dc:date>
    </item>
  </channel>
</rss>

