NSX-T Data Center REST API

Get SecurityStrategy

Retrieves a specific Security Strategy by its unique identifier, providing detailed rule template definitions
that define security postures for a VPC. Security strategies are system-generated resources created
under the default project during system initialization and are automatically shared across all projects.
The response includes comprehensive rule template specifications with source/destination criteria, traffic actions,
service definitions, and placeholder references that are dynamically resolved when applied to specific VPCs.
These strategies serve as building blocks for VPC security profiles and define common security patterns
such as VPC isolation, external connectivity controls, essential service access, and inter-VPC communication policies.
All security strategies returned by this API are predefined, validated configurations maintained by the system.

Request:

Method:
GET
URI Path(s):
/policy/api/v1/orgs/{org-id}/projects/{project-id}/security-strategies/{security-strategy-id}
Request Headers:
n/a
Query Parameters:
n/a
Request Body:
n/a

Example Request:

GET https://<policy-mgr>/policy/api/v1/orgs/default/projects/default/security-strategies/vpc-external-connectivity

Successful Response:

Response Code:
200 OK
Response Headers:
Content-type: application/json
Response Body:
SecurityStrategy+

Example Response:

{ "rule_templates": [ { "source": [ "ANY" ], "destination": [ "ANY" ], "action": "JUMP_TO_APPLICATION", "services": [ "DHCP", "ICMP", "DNS", "NTP" ], "applied_to": [ "{VPC_DEFAULT_GROUP}" ], "name": "Allow-Essential-Services", "description": "Allow-Essential-Services" }, { "source": [ "{VPC_DEFAULT_GROUP}" ], "destination": [ "ANY" ], "action": "JUMP_TO_APPLICATION", "services": [ "ANY" ], "applied_to": [ "{VPC_DEFAULT_GROUP}" ], "name": "Allow-OUT", "description": "Allow-OUT" }, { "source": [ "ANY" ], "destination": [ "ANY" ], "action": "DROP", "services": [ "ANY" ], "applied_to": [ "{VPC_DEFAULT_GROUP}" ], "name": "Deny-All", "description": "Deny-All" } ], "resource_type": "SecurityStrategy", "id": "vpc-external-connectivity", "display_name": "VPC External Connectivity", "description": "Allow only Outgoing Communications, deny all incoming connections. VPC to VPC communication is blockedy.strategy.external.connectivity.description=Allow only Outgoing Communications, deny all incoming connections. VPC to VPC communication is blocked", "path": "/orgs/default/projects/default/security-strategies/vpc-external-connectivity", "relative_path": "vpc-external-connectivity", "parent_path": "/orgs/default/projects/default", "remote_path": "", "unique_id": "1f0f9650-bad8-4710-891c-718adce4a66a", "realization_id": "1f0f9650-bad8-4710-891c-718adce4a66a", "owner_id": "3ae63613-323b-4465-bf36-14274fd591e3", "marked_for_delete": false, "overridden": false, "_system_owned": true, "_protection": "NOT_PROTECTED", "_create_time": 1757926994760, "_create_user": "system", "_last_modified_time": 1757926994760, "_last_modified_user": "system", "_revision": 0 }

Required Permissions:

read

Feature:

policy_edge_fw

Additional Errors: