Software Secure Workload
Activity Configure

Policy Attributes

Table 1. Policy Properties

Security Policy Property

Description

Scope for which the policy is defined

A policy generally affects only workloads that are members of the scope associated with the workspace in which the policy is defined.

(However, see also the topics under Address Policy Complexities.)

For more information, see Policy Example.

Consumer

The client of a service or the initiator of a connection.

Any scope, cluster, or inventory filter can be used as the consumer in a policy.

See important information in About Consumer and Provider in Policies.

Provider

The server or the recipient of a connection.

Any scope, cluster, or inventory filter can be used as the provider in a policy.

See important information in About Consumer and Provider in Policies.

Protocols and Ports

The server (listening) port and IP protocol of the service made available by the provider that should be permitted or blocked.

Action

ALLOW or DENY: Whether to allow or drop traffic from consumer to provider on the given service port/protocol.

Rank and Priority

For more information the rank and priority of policies in a workspace, see Policy Rank: Absolute, Default, and Catch-All.