Policy: AWS > ECR > Private Registry > Scanning Configuration > Scan on Push Filters
A list of repositories to scan for vulnerabilities on image push. Filters with wildcards (*)
will match a repository name where the wildcard replaces zero or more characters in the repository name.
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Controls
Policy Specification
Default |
|
---|---|
Examples [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/turbot#/control/categories/security
- tmod:@turbot/aws-ecr#/policy/types/privateRegistryScanningConfigurationScanOnPushFilters
- turbot graphql policy-type --id "tmod:@turbot/aws-ecr#/policy/types/privateRegistryScanningConfigurationScanOnPushFilters"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/aws-ecr#/policy/types/privateRegistryScanningConfigurationScanOnPushFilters"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI