From vision-one-api
Create, manage, and test custom security rules for Cloud Risk Management in Trend Micro Vision One. Custom rules allow organizations to define their own compliance checks tailored to specific security requirements.
npx claudepluginhub trendmicro/vision-one-skills --plugin vision-one-apiThis skill uses the workspace's default tool permissions.
Create, manage, and test custom security rules for Cloud Risk Management in Trend Micro Vision One. Custom rules allow organizations to define their own compliance checks tailored to specific security requirements.
Implements Clean Architecture in Android and Kotlin Multiplatform projects: module layouts, dependency rules, UseCases, Repositories, domain models, and data layers with Room, SQLDelight, Ktor.
Enforces code quality on file edits via Plankton hooks: auto-formats, lints, Claude-powered fixes with model tiering, config protection, and legacy package manager blocks.
Enforces C++ Core Guidelines for writing, reviewing, and refactoring modern C++ code (C++17+), promoting RAII, immutability, type safety, and idiomatic practices.
Create, manage, and test custom security rules for Cloud Risk Management in Trend Micro Vision One. Custom rules allow organizations to define their own compliance checks tailored to specific security requirements.
When the user asks about custom rules, custom compliance checks, or organization-specific security rules, use this skill.
List existing rules: Start with cloud_posture_custom_rules_list to see all custom rules in the organization.
Get rule details: Use cloud_posture_custom_rule_get to retrieve the full configuration of a specific rule.
Test before deploying: Always use cloud_posture_custom_rule_test to validate rule configuration before creating or updating rules.
Write operations require Master Administrator role: Creating, updating, and deleting custom rules requires elevated permissions.
Confirm with user: Always confirm with the user before executing create, update, or delete operations.
Understand rule structure: Custom rules consist of attributes (data to extract from resources) and event rules (conditions to evaluate).
This skill uses the following Vision One MCP tools:
| Tool | Purpose | Type | Role Required |
|---|---|---|---|
cloud_posture_custom_rules_list | List all custom rules in the organization | Read | Any |
cloud_posture_custom_rule_get | Get detailed configuration of a specific rule | Read | Any |
cloud_posture_custom_rule_create | Create a new custom rule | Write | Master Administrator |
cloud_posture_custom_rule_update | Update an existing custom rule | Write | Master Administrator |
cloud_posture_custom_rule_delete | Permanently delete a custom rule | Write | Master Administrator |
cloud_posture_custom_rule_test | Test a rule configuration against an account or mock data | Write | Master Administrator |
| Field | Description | Example Values |
|---|---|---|
name | Display name for the rule | "Require S3 bucket encryption" |
description | Detailed explanation | "Ensures all S3 buckets have encryption enabled" |
categories | Compliance categories | security, cost-optimisation, reliability, performance-efficiency, operational-excellence, sustainability |
riskLevel | Severity level | LOW, MEDIUM, HIGH, VERY_HIGH, EXTREME |
provider | Cloud provider | aws, azure, gcp, oci, alibabaCloud |
enabled | Whether rule is active | true, false |
service | Cloud service | S3, EC2, IAM, etc. |
resourceType | Resource to evaluate | AWS::S3::Bucket, AWS::EC2::Instance, etc. |
attributes | Data to extract | Array of {name, path, required} |
eventRules | Evaluation conditions | Array of {conditions, description} |
| Field | Description |
|---|---|
slug | URL-friendly identifier (auto-generated if omitted) |
remediationNote | Steps to fix issues |
resolutionReferenceLink | URL to documentation |
cloud_posture_custom_rules_list to get all rulescloud_posture_custom_rule_test with mock data or a test accountcloud_posture_custom_rule_createcloud_posture_custom_rule_getcloud_posture_custom_rule_updateaccountId to test against real cloud resourcesresource object with mock data for isolated testingcloud_posture_custom_rule_testcloud_posture_custom_rule_delete## Custom Rules Summary
**Total Rules**: [count]
**Enabled**: [count] | **Disabled**: [count]
### Rules by Provider
| Provider | Count |
|----------|-------|
| AWS | [count] |
| Azure | [count] |
| GCP | [count] |
### Rule List
| Name | Rule ID | Provider | Service | Risk Level | Status |
|------|---------|----------|---------|------------|--------|
| [name] | [id] | [provider] | [service] | [risk] | Enabled/Disabled |
## Custom Rule: [Name]
**Rule ID**: [id]
**Status**: Enabled/Disabled
**Risk Level**: [EXTREME/VERY_HIGH/HIGH/MEDIUM/LOW]
### Target
- **Provider**: [aws/azure/gcp/oci/alibabaCloud]
- **Service**: [service]
- **Resource Type**: [resourceType]
### Categories
- [category1]
- [category2]
### Description
[description]
### Attributes
| Name | Path | Required |
|------|------|----------|
| [name] | [JSONPath] | Yes/No |
### Event Rules
[conditions and logic]
### Remediation
[remediationNote or "Not specified"]
### Reference
[resolutionReferenceLink or "Not specified"]
## Rule Test Results
**Configuration**: [Valid/Invalid]
**Test Method**: Account [id] / Mock Resource
### Results Summary
- **Resources Evaluated**: [count]
- **Passed**: [count]
- **Failed**: [count]
### Findings
| Resource | Status | Details |
|----------|--------|---------|
| [resource] | Pass/Fail | [reason] |
## Action Required: [Create/Update/Delete] Custom Rule
**Operation**: [Description]
**Rule**: [name or id]
### Details
[Configuration summary or changes]
### Impact
- This rule will be [created/modified/permanently deleted]
- [Additional impact notes]
**Do you want to proceed? (yes/no)**
{
"name": "Require S3 Server-Side Encryption",
"description": "Ensures all S3 buckets have server-side encryption enabled",
"categories": ["security"],
"riskLevel": "HIGH",
"provider": "aws",
"enabled": true,
"service": "S3",
"resourceType": "AWS::S3::Bucket",
"attributes": [
{
"name": "BucketEncryption",
"path": "$.BucketEncryption",
"required": false
}
],
"eventRules": [
{
"conditions": {
"all": [
{
"fact": "BucketEncryption",
"operator": "equal",
"value": null
}
]
},
"description": "S3 bucket does not have encryption enabled"
}
],
"remediationNote": "Enable server-side encryption in the S3 bucket settings"
}