aws-sdk-fms 1.18.0 → 1.19.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/aws-sdk-fms.rb +1 -1
- data/lib/aws-sdk-fms/client.rb +62 -38
- data/lib/aws-sdk-fms/types.rb +137 -76
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 476466d4fe38aa8c9aa515c3aa5eb574b2af9354
|
4
|
+
data.tar.gz: 6e59a6eb401ffc20af8f21a1a2f40d8a1c7ed173
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 83f8ba6fb8a3c0386fdea27dfc740d9fb99975ab5f23363282f54a14d1b9107a6870e445dab2a593811bd90b5db490a57a8937dfa4c0259520a60c8c04e9f0c8
|
7
|
+
data.tar.gz: 35ea4ad21b1be2502c49663dc7a9b484165e93d381e39e36358f79e2d5493b9b53cac05615e849f9f1a68ad78dcba9a1f3a735d7116832da93194481e225fde8
|
data/lib/aws-sdk-fms.rb
CHANGED
data/lib/aws-sdk-fms/client.rb
CHANGED
@@ -265,7 +265,7 @@ module Aws::FMS
|
|
265
265
|
# @!group API Operations
|
266
266
|
|
267
267
|
# Sets the AWS Firewall Manager administrator account. AWS Firewall
|
268
|
-
# Manager must be associated with the master account your AWS
|
268
|
+
# Manager must be associated with the master account of your AWS
|
269
269
|
# organization or associated with a member account that has the
|
270
270
|
# appropriate permissions. If the account ID that you submit is not an
|
271
271
|
# AWS Organizations master account, AWS Firewall Manager will set the
|
@@ -324,21 +324,34 @@ module Aws::FMS
|
|
324
324
|
# by `PutPolicy` and by `ListPolicies`.
|
325
325
|
#
|
326
326
|
# @option params [Boolean] :delete_all_policy_resources
|
327
|
-
# If `True`, the request
|
327
|
+
# If `True`, the request performs cleanup according to the policy type.
|
328
328
|
#
|
329
|
-
#
|
329
|
+
# For AWS WAF and Shield Advanced policies, the cleanup does the
|
330
|
+
# following:
|
330
331
|
#
|
331
|
-
# *
|
332
|
+
# * Deletes rule groups created by AWS Firewall Manager
|
332
333
|
#
|
333
|
-
# *
|
334
|
+
# * Removes web ACLs from in-scope resources
|
334
335
|
#
|
335
|
-
#
|
336
|
-
#
|
337
|
-
#
|
338
|
-
#
|
339
|
-
#
|
340
|
-
# the
|
341
|
-
#
|
336
|
+
# * Deletes web ACLs that contain no rules or rule groups
|
337
|
+
#
|
338
|
+
# For security group policies, the cleanup does the following for each
|
339
|
+
# security group in the policy:
|
340
|
+
#
|
341
|
+
# * Disassociates the security group from in-scope resources
|
342
|
+
#
|
343
|
+
# * Deletes the security group if it was created through Firewall
|
344
|
+
# Manager and if it's no longer associated with any resources through
|
345
|
+
# another policy
|
346
|
+
#
|
347
|
+
# After the cleanup, in-scope resources are no longer protected by web
|
348
|
+
# ACLs in this policy. Protection of out-of-scope resources remains
|
349
|
+
# unchanged. Scope is determined by tags that you create and accounts
|
350
|
+
# that you associate with the policy. When creating the policy, if you
|
351
|
+
# specify that only resources in specific accounts or with specific tags
|
352
|
+
# are in scope of the policy, those accounts and resources are handled
|
353
|
+
# by the policy. All others are out of scope. If you don't specify tags
|
354
|
+
# or accounts, all resources are in scope.
|
342
355
|
#
|
343
356
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
344
357
|
#
|
@@ -361,7 +374,7 @@ module Aws::FMS
|
|
361
374
|
# Disassociates the account that has been set as the AWS Firewall
|
362
375
|
# Manager administrator account. To set a different account as the
|
363
376
|
# administrator account, you must submit an `AssociateAdminAccount`
|
364
|
-
# request
|
377
|
+
# request.
|
365
378
|
#
|
366
379
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
367
380
|
#
|
@@ -398,8 +411,12 @@ module Aws::FMS
|
|
398
411
|
|
399
412
|
# Returns detailed compliance information about the specified member
|
400
413
|
# account. Details include resources that are in and out of compliance
|
401
|
-
# with the specified policy. Resources are considered
|
402
|
-
# the specified policy has not
|
414
|
+
# with the specified policy. Resources are considered noncompliant for
|
415
|
+
# AWS WAF and Shield Advanced policies if the specified policy has not
|
416
|
+
# been applied to them. Resources are considered noncompliant for
|
417
|
+
# security group policies if they are in scope of the policy, they
|
418
|
+
# violate one or more of the policy rules, and remediation is disabled
|
419
|
+
# or not possible.
|
403
420
|
#
|
404
421
|
# @option params [required, String] :policy_id
|
405
422
|
# The ID of the policy that you want to get the details for. `PolicyId`
|
@@ -427,7 +444,7 @@ module Aws::FMS
|
|
427
444
|
# resp.policy_compliance_detail.member_account #=> String
|
428
445
|
# resp.policy_compliance_detail.violators #=> Array
|
429
446
|
# resp.policy_compliance_detail.violators[0].resource_id #=> String
|
430
|
-
# resp.policy_compliance_detail.violators[0].violation_reason #=> String, one of "WEB_ACL_MISSING_RULE_GROUP", "RESOURCE_MISSING_WEB_ACL", "RESOURCE_INCORRECT_WEB_ACL", "RESOURCE_MISSING_SHIELD_PROTECTION"
|
447
|
+
# resp.policy_compliance_detail.violators[0].violation_reason #=> String, one of "WEB_ACL_MISSING_RULE_GROUP", "RESOURCE_MISSING_WEB_ACL", "RESOURCE_INCORRECT_WEB_ACL", "RESOURCE_MISSING_SHIELD_PROTECTION", "RESOURCE_MISSING_WEB_ACL_OR_SHIELD_PROTECTION", "RESOURCE_MISSING_SECURITY_GROUP", "RESOURCE_VIOLATES_AUDIT_SECURITY_GROUP", "SECURITY_GROUP_UNUSED", "SECURITY_GROUP_REDUNDANT"
|
431
448
|
# resp.policy_compliance_detail.violators[0].resource_type #=> String
|
432
449
|
# resp.policy_compliance_detail.evaluation_limit_exceeded #=> Boolean
|
433
450
|
# resp.policy_compliance_detail.expired_at #=> Time
|
@@ -443,8 +460,8 @@ module Aws::FMS
|
|
443
460
|
req.send_request(options)
|
444
461
|
end
|
445
462
|
|
446
|
-
#
|
447
|
-
#
|
463
|
+
# Information about the Amazon Simple Notification Service (SNS) topic
|
464
|
+
# that is used to record AWS Firewall Manager SNS logs.
|
448
465
|
#
|
449
466
|
# @return [Types::GetNotificationChannelResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
450
467
|
#
|
@@ -487,7 +504,7 @@ module Aws::FMS
|
|
487
504
|
# resp.policy.policy_id #=> String
|
488
505
|
# resp.policy.policy_name #=> String
|
489
506
|
# resp.policy.policy_update_token #=> String
|
490
|
-
# resp.policy.security_service_policy_data.type #=> String, one of "WAF", "SHIELD_ADVANCED"
|
507
|
+
# resp.policy.security_service_policy_data.type #=> String, one of "WAF", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
|
491
508
|
# resp.policy.security_service_policy_data.managed_service_data #=> String
|
492
509
|
# resp.policy.resource_type #=> String
|
493
510
|
# resp.policy.resource_type_list #=> Array
|
@@ -515,7 +532,8 @@ module Aws::FMS
|
|
515
532
|
end
|
516
533
|
|
517
534
|
# If you created a Shield Advanced policy, returns policy-level attack
|
518
|
-
# summary information in the event of a potential DDoS attack.
|
535
|
+
# summary information in the event of a potential DDoS attack. Other
|
536
|
+
# policy types are currently unsupported.
|
519
537
|
#
|
520
538
|
# @option params [required, String] :policy_id
|
521
539
|
# The ID of the policy for which you want to get the attack information.
|
@@ -526,21 +544,21 @@ module Aws::FMS
|
|
526
544
|
#
|
527
545
|
# @option params [Time,DateTime,Date,Integer,String] :start_time
|
528
546
|
# The start of the time period to query for the attacks. This is a
|
529
|
-
# `timestamp` type. The
|
547
|
+
# `timestamp` type. The request syntax listing indicates a `number` type
|
530
548
|
# because the default used by AWS Firewall Manager is Unix time in
|
531
549
|
# seconds. However, any valid `timestamp` format is allowed.
|
532
550
|
#
|
533
551
|
# @option params [Time,DateTime,Date,Integer,String] :end_time
|
534
552
|
# The end of the time period to query for the attacks. This is a
|
535
|
-
# `timestamp` type. The
|
553
|
+
# `timestamp` type. The request syntax listing indicates a `number` type
|
536
554
|
# because the default used by AWS Firewall Manager is Unix time in
|
537
555
|
# seconds. However, any valid `timestamp` format is allowed.
|
538
556
|
#
|
539
557
|
# @option params [String] :next_token
|
540
558
|
# If you specify a value for `MaxResults` and you have more objects than
|
541
559
|
# the number that you specify for `MaxResults`, AWS Firewall Manager
|
542
|
-
# returns a `NextToken` value in the response
|
543
|
-
# another group of objects. For the second and subsequent
|
560
|
+
# returns a `NextToken` value in the response, which you can use to
|
561
|
+
# retrieve another group of objects. For the second and subsequent
|
544
562
|
# `GetProtectionStatus` requests, specify the value of `NextToken` from
|
545
563
|
# the previous response to get information about another batch of
|
546
564
|
# objects.
|
@@ -572,7 +590,7 @@ module Aws::FMS
|
|
572
590
|
# @example Response structure
|
573
591
|
#
|
574
592
|
# resp.admin_account_id #=> String
|
575
|
-
# resp.service_type #=> String, one of "WAF", "SHIELD_ADVANCED"
|
593
|
+
# resp.service_type #=> String, one of "WAF", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
|
576
594
|
# resp.data #=> String
|
577
595
|
# resp.next_token #=> String
|
578
596
|
#
|
@@ -734,7 +752,7 @@ module Aws::FMS
|
|
734
752
|
# resp.policy_list[0].policy_id #=> String
|
735
753
|
# resp.policy_list[0].policy_name #=> String
|
736
754
|
# resp.policy_list[0].resource_type #=> String
|
737
|
-
# resp.policy_list[0].security_service_type #=> String, one of "WAF", "SHIELD_ADVANCED"
|
755
|
+
# resp.policy_list[0].security_service_type #=> String, one of "WAF", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
|
738
756
|
# resp.policy_list[0].remediation_enabled #=> Boolean
|
739
757
|
# resp.next_token #=> String
|
740
758
|
#
|
@@ -778,17 +796,23 @@ module Aws::FMS
|
|
778
796
|
|
779
797
|
# Creates an AWS Firewall Manager policy.
|
780
798
|
#
|
781
|
-
# Firewall Manager provides
|
782
|
-
#
|
783
|
-
#
|
784
|
-
#
|
785
|
-
#
|
786
|
-
#
|
787
|
-
#
|
788
|
-
#
|
799
|
+
# Firewall Manager provides the following types of policies:
|
800
|
+
#
|
801
|
+
# * A Shield Advanced policy, which applies Shield Advanced protection
|
802
|
+
# to specified accounts and resources
|
803
|
+
#
|
804
|
+
# * An AWS WAF policy, which contains a rule group and defines which
|
805
|
+
# resources are to be protected by that rule group
|
806
|
+
#
|
807
|
+
# * A security group policy, which manages VPC security groups across
|
808
|
+
# your AWS organization.
|
809
|
+
#
|
810
|
+
# Each policy is specific to one of the three types. If you want to
|
811
|
+
# enforce more than one policy type across accounts, you can create
|
812
|
+
# multiple policies. You can create multiple policies for each type.
|
789
813
|
#
|
790
814
|
# You must be subscribed to Shield Advanced to create a Shield Advanced
|
791
|
-
# policy. For more information
|
815
|
+
# policy. For more information about subscribing to Shield Advanced, see
|
792
816
|
# [CreateSubscription][1].
|
793
817
|
#
|
794
818
|
#
|
@@ -811,7 +835,7 @@ module Aws::FMS
|
|
811
835
|
# policy_name: "ResourceName", # required
|
812
836
|
# policy_update_token: "PolicyUpdateToken",
|
813
837
|
# security_service_policy_data: { # required
|
814
|
-
# type: "WAF", # required, accepts WAF, SHIELD_ADVANCED
|
838
|
+
# type: "WAF", # required, accepts WAF, SHIELD_ADVANCED, SECURITY_GROUPS_COMMON, SECURITY_GROUPS_CONTENT_AUDIT, SECURITY_GROUPS_USAGE_AUDIT
|
815
839
|
# managed_service_data: "ManagedServiceData",
|
816
840
|
# },
|
817
841
|
# resource_type: "ResourceType", # required
|
@@ -838,7 +862,7 @@ module Aws::FMS
|
|
838
862
|
# resp.policy.policy_id #=> String
|
839
863
|
# resp.policy.policy_name #=> String
|
840
864
|
# resp.policy.policy_update_token #=> String
|
841
|
-
# resp.policy.security_service_policy_data.type #=> String, one of "WAF", "SHIELD_ADVANCED"
|
865
|
+
# resp.policy.security_service_policy_data.type #=> String, one of "WAF", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
|
842
866
|
# resp.policy.security_service_policy_data.managed_service_data #=> String
|
843
867
|
# resp.policy.resource_type #=> String
|
844
868
|
# resp.policy.resource_type_list #=> Array
|
@@ -878,7 +902,7 @@ module Aws::FMS
|
|
878
902
|
params: params,
|
879
903
|
config: config)
|
880
904
|
context[:gem_name] = 'aws-sdk-fms'
|
881
|
-
context[:gem_version] = '1.
|
905
|
+
context[:gem_version] = '1.19.0'
|
882
906
|
Seahorse::Client::Request.new(handlers, context)
|
883
907
|
end
|
884
908
|
|
data/lib/aws-sdk-fms/types.rb
CHANGED
@@ -45,7 +45,7 @@ module Aws::FMS
|
|
45
45
|
# @return [String]
|
46
46
|
#
|
47
47
|
# @!attribute [rw] resource_type
|
48
|
-
# The resource type. This is in the format shown in [AWS Resource
|
48
|
+
# The resource type. This is in the format shown in the [AWS Resource
|
49
49
|
# Types Reference][1]. For example:
|
50
50
|
# `AWS::ElasticLoadBalancingV2::LoadBalancer` or
|
51
51
|
# `AWS::CloudFront::Distribution`.
|
@@ -84,23 +84,35 @@ module Aws::FMS
|
|
84
84
|
# @return [String]
|
85
85
|
#
|
86
86
|
# @!attribute [rw] delete_all_policy_resources
|
87
|
-
# If `True`, the request
|
88
|
-
#
|
87
|
+
# If `True`, the request performs cleanup according to the policy
|
88
|
+
# type.
|
89
89
|
#
|
90
|
-
#
|
90
|
+
# For AWS WAF and Shield Advanced policies, the cleanup does the
|
91
|
+
# following:
|
91
92
|
#
|
92
|
-
# *
|
93
|
+
# * Deletes rule groups created by AWS Firewall Manager
|
93
94
|
#
|
94
|
-
# *
|
95
|
+
# * Removes web ACLs from in-scope resources
|
95
96
|
#
|
96
|
-
#
|
97
|
-
#
|
98
|
-
#
|
99
|
-
#
|
100
|
-
#
|
101
|
-
#
|
102
|
-
#
|
103
|
-
#
|
97
|
+
# * Deletes web ACLs that contain no rules or rule groups
|
98
|
+
#
|
99
|
+
# For security group policies, the cleanup does the following for each
|
100
|
+
# security group in the policy:
|
101
|
+
#
|
102
|
+
# * Disassociates the security group from in-scope resources
|
103
|
+
#
|
104
|
+
# * Deletes the security group if it was created through Firewall
|
105
|
+
# Manager and if it's no longer associated with any resources
|
106
|
+
# through another policy
|
107
|
+
#
|
108
|
+
# After the cleanup, in-scope resources are no longer protected by web
|
109
|
+
# ACLs in this policy. Protection of out-of-scope resources remains
|
110
|
+
# unchanged. Scope is determined by tags that you create and accounts
|
111
|
+
# that you associate with the policy. When creating the policy, if you
|
112
|
+
# specify that only resources in specific accounts or with specific
|
113
|
+
# tags are in scope of the policy, those accounts and resources are
|
114
|
+
# handled by the policy. All others are out of scope. If you don't
|
115
|
+
# specify tags or accounts, all resources are in scope.
|
104
116
|
# @return [Boolean]
|
105
117
|
#
|
106
118
|
# @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/DeletePolicyRequest AWS API Documentation
|
@@ -118,8 +130,9 @@ module Aws::FMS
|
|
118
130
|
class DisassociateAdminAccountRequest < Aws::EmptyStructure; end
|
119
131
|
|
120
132
|
# Describes the compliance status for the account. An account is
|
121
|
-
# considered
|
122
|
-
# protected by the specified policy
|
133
|
+
# considered noncompliant if it includes resources that are not
|
134
|
+
# protected by the specified policy or that don't comply with the
|
135
|
+
# policy.
|
123
136
|
#
|
124
137
|
# @!attribute [rw] compliance_status
|
125
138
|
# Describes an AWS account's compliance with the AWS Firewall Manager
|
@@ -127,13 +140,16 @@ module Aws::FMS
|
|
127
140
|
# @return [String]
|
128
141
|
#
|
129
142
|
# @!attribute [rw] violator_count
|
130
|
-
#
|
131
|
-
# policy.
|
132
|
-
# associated with the
|
143
|
+
# The number of resources that are noncompliant with the specified
|
144
|
+
# policy. For AWS WAF and Shield Advanced policies, a resource is
|
145
|
+
# considered noncompliant if it is not associated with the policy. For
|
146
|
+
# security group policies, a resource is considered noncompliant if it
|
147
|
+
# doesn't comply with the rules of the policy and remediation is
|
148
|
+
# disabled or not possible.
|
133
149
|
# @return [Integer]
|
134
150
|
#
|
135
151
|
# @!attribute [rw] evaluation_limit_exceeded
|
136
|
-
# Indicates that over 100 resources are
|
152
|
+
# Indicates that over 100 resources are noncompliant with the AWS
|
137
153
|
# Firewall Manager policy.
|
138
154
|
# @return [Boolean]
|
139
155
|
#
|
@@ -290,26 +306,26 @@ module Aws::FMS
|
|
290
306
|
#
|
291
307
|
# @!attribute [rw] start_time
|
292
308
|
# The start of the time period to query for the attacks. This is a
|
293
|
-
# `timestamp` type. The
|
294
|
-
# because the default used by AWS Firewall Manager is Unix time
|
295
|
-
# seconds. However, any valid `timestamp` format is allowed.
|
309
|
+
# `timestamp` type. The request syntax listing indicates a `number`
|
310
|
+
# type because the default used by AWS Firewall Manager is Unix time
|
311
|
+
# in seconds. However, any valid `timestamp` format is allowed.
|
296
312
|
# @return [Time]
|
297
313
|
#
|
298
314
|
# @!attribute [rw] end_time
|
299
315
|
# The end of the time period to query for the attacks. This is a
|
300
|
-
# `timestamp` type. The
|
301
|
-
# because the default used by AWS Firewall Manager is Unix time
|
302
|
-
# seconds. However, any valid `timestamp` format is allowed.
|
316
|
+
# `timestamp` type. The request syntax listing indicates a `number`
|
317
|
+
# type because the default used by AWS Firewall Manager is Unix time
|
318
|
+
# in seconds. However, any valid `timestamp` format is allowed.
|
303
319
|
# @return [Time]
|
304
320
|
#
|
305
321
|
# @!attribute [rw] next_token
|
306
322
|
# If you specify a value for `MaxResults` and you have more objects
|
307
323
|
# than the number that you specify for `MaxResults`, AWS Firewall
|
308
|
-
# Manager returns a `NextToken` value in the response
|
309
|
-
# to
|
310
|
-
# `GetProtectionStatus` requests, specify the value of
|
311
|
-
# from the previous response to get information about
|
312
|
-
# objects.
|
324
|
+
# Manager returns a `NextToken` value in the response, which you can
|
325
|
+
# use to retrieve another group of objects. For the second and
|
326
|
+
# subsequent `GetProtectionStatus` requests, specify the value of
|
327
|
+
# `NextToken` from the previous response to get information about
|
328
|
+
# another batch of objects.
|
313
329
|
# @return [String]
|
314
330
|
#
|
315
331
|
# @!attribute [rw] max_results
|
@@ -353,8 +369,7 @@ module Aws::FMS
|
|
353
369
|
#
|
354
370
|
# * End time of the attack (ongoing attacks will not have an end time)
|
355
371
|
#
|
356
|
-
# The details are in JSON format.
|
357
|
-
# section below.
|
372
|
+
# The details are in JSON format.
|
358
373
|
# @return [String]
|
359
374
|
#
|
360
375
|
# @!attribute [rw] next_token
|
@@ -635,7 +650,7 @@ module Aws::FMS
|
|
635
650
|
# policy_name: "ResourceName", # required
|
636
651
|
# policy_update_token: "PolicyUpdateToken",
|
637
652
|
# security_service_policy_data: { # required
|
638
|
-
# type: "WAF", # required, accepts WAF, SHIELD_ADVANCED
|
653
|
+
# type: "WAF", # required, accepts WAF, SHIELD_ADVANCED, SECURITY_GROUPS_COMMON, SECURITY_GROUPS_CONTENT_AUDIT, SECURITY_GROUPS_USAGE_AUDIT
|
639
654
|
# managed_service_data: "ManagedServiceData",
|
640
655
|
# },
|
641
656
|
# resource_type: "ResourceType", # required
|
@@ -678,10 +693,17 @@ module Aws::FMS
|
|
678
693
|
# @return [Types::SecurityServicePolicyData]
|
679
694
|
#
|
680
695
|
# @!attribute [rw] resource_type
|
681
|
-
# The type of resource
|
682
|
-
# format shown in [AWS Resource Types Reference][1]. For
|
683
|
-
#
|
684
|
-
# `AWS::
|
696
|
+
# The type of resource protected by or in scope of the policy. This is
|
697
|
+
# in the format shown in the [AWS Resource Types Reference][1]. For
|
698
|
+
# AWS WAF and Shield Advanced, examples include
|
699
|
+
# `AWS::ElasticLoadBalancingV2::LoadBalancer` and
|
700
|
+
# `AWS::CloudFront::Distribution`. For a security group common policy,
|
701
|
+
# valid values are `AWS::EC2::NetworkInterface` and
|
702
|
+
# `AWS::EC2::Instance`. For a security group content audit policy,
|
703
|
+
# valid values are `AWS::EC2::SecurityGroup`,
|
704
|
+
# `AWS::EC2::NetworkInterface`, and `AWS::EC2::Instance`. For a
|
705
|
+
# security group usage audit policy, the value is
|
706
|
+
# `AWS::EC2::SecurityGroup`.
|
685
707
|
#
|
686
708
|
#
|
687
709
|
#
|
@@ -698,9 +720,9 @@ module Aws::FMS
|
|
698
720
|
#
|
699
721
|
# @!attribute [rw] exclude_resource_tags
|
700
722
|
# If set to `True`, resources with the tags that are specified in the
|
701
|
-
# `ResourceTag` array are not
|
723
|
+
# `ResourceTag` array are not in scope of the policy. If set to
|
702
724
|
# `False`, and the `ResourceTag` array is not null, only resources
|
703
|
-
# with the specified tags are
|
725
|
+
# with the specified tags are in scope of the policy.
|
704
726
|
# @return [Boolean]
|
705
727
|
#
|
706
728
|
# @!attribute [rw] remediation_enabled
|
@@ -746,9 +768,9 @@ module Aws::FMS
|
|
746
768
|
include Aws::Structure
|
747
769
|
end
|
748
770
|
|
749
|
-
# Describes the
|
771
|
+
# Describes the noncompliant resources in a member account for a
|
750
772
|
# specific AWS Firewall Manager policy. A maximum of 100 entries are
|
751
|
-
# displayed. If more than 100 resources are
|
773
|
+
# displayed. If more than 100 resources are noncompliant,
|
752
774
|
# `EvaluationLimitExceeded` is set to `True`.
|
753
775
|
#
|
754
776
|
# @!attribute [rw] policy_owner
|
@@ -764,22 +786,24 @@ module Aws::FMS
|
|
764
786
|
# @return [String]
|
765
787
|
#
|
766
788
|
# @!attribute [rw] violators
|
767
|
-
# An array of resources that
|
789
|
+
# An array of resources that aren't protected by the AWS WAF or
|
790
|
+
# Shield Advanced policy or that aren't in compliance with the
|
791
|
+
# security group policy.
|
768
792
|
# @return [Array<Types::ComplianceViolator>]
|
769
793
|
#
|
770
794
|
# @!attribute [rw] evaluation_limit_exceeded
|
771
|
-
# Indicates if over 100 resources are
|
795
|
+
# Indicates if over 100 resources are noncompliant with the AWS
|
772
796
|
# Firewall Manager policy.
|
773
797
|
# @return [Boolean]
|
774
798
|
#
|
775
799
|
# @!attribute [rw] expired_at
|
776
|
-
# A
|
777
|
-
# considered out
|
800
|
+
# A timestamp that indicates when the returned information should be
|
801
|
+
# considered out of date.
|
778
802
|
# @return [Time]
|
779
803
|
#
|
780
804
|
# @!attribute [rw] issue_info_map
|
781
805
|
# Details about problems with dependent services, such as AWS WAF or
|
782
|
-
# AWS Config, that are causing a resource to be
|
806
|
+
# AWS Config, that are causing a resource to be noncompliant. The
|
783
807
|
# details include the name of the dependent service and the error
|
784
808
|
# message received that indicates the problem with the service.
|
785
809
|
# @return [Hash<String,String>]
|
@@ -798,8 +822,10 @@ module Aws::FMS
|
|
798
822
|
end
|
799
823
|
|
800
824
|
# Indicates whether the account is compliant with the specified policy.
|
801
|
-
# An account is considered
|
802
|
-
# are not protected by the policy
|
825
|
+
# An account is considered noncompliant if it includes resources that
|
826
|
+
# are not protected by the policy, for AWS WAF and Shield Advanced
|
827
|
+
# policies, or that are noncompliant with the policy, for security group
|
828
|
+
# policies.
|
803
829
|
#
|
804
830
|
# @!attribute [rw] policy_owner
|
805
831
|
# The AWS account that created the AWS Firewall Manager policy.
|
@@ -822,12 +848,12 @@ module Aws::FMS
|
|
822
848
|
# @return [Array<Types::EvaluationResult>]
|
823
849
|
#
|
824
850
|
# @!attribute [rw] last_updated
|
825
|
-
#
|
851
|
+
# Timestamp of the last update to the `EvaluationResult` objects.
|
826
852
|
# @return [Time]
|
827
853
|
#
|
828
854
|
# @!attribute [rw] issue_info_map
|
829
855
|
# Details about problems with dependent services, such as AWS WAF or
|
830
|
-
# AWS Config, that are causing a resource to be
|
856
|
+
# AWS Config, that are causing a resource to be noncompliant. The
|
831
857
|
# details include the name of the dependent service and the error
|
832
858
|
# message received that indicates the problem with the service.
|
833
859
|
# @return [Hash<String,String>]
|
@@ -860,10 +886,17 @@ module Aws::FMS
|
|
860
886
|
# @return [String]
|
861
887
|
#
|
862
888
|
# @!attribute [rw] resource_type
|
863
|
-
# The type of resource
|
864
|
-
# format shown in [AWS Resource Types Reference][1]. For
|
865
|
-
#
|
866
|
-
# `AWS::
|
889
|
+
# The type of resource protected by or in scope of the policy. This is
|
890
|
+
# in the format shown in the [AWS Resource Types Reference][1]. For
|
891
|
+
# AWS WAF and Shield Advanced, examples include
|
892
|
+
# `AWS::ElasticLoadBalancingV2::LoadBalancer` and
|
893
|
+
# `AWS::CloudFront::Distribution`. For a security group common policy,
|
894
|
+
# valid values are `AWS::EC2::NetworkInterface` and
|
895
|
+
# `AWS::EC2::Instance`. For a security group content audit policy,
|
896
|
+
# valid values are `AWS::EC2::SecurityGroup`,
|
897
|
+
# `AWS::EC2::NetworkInterface`, and `AWS::EC2::Instance`. For a
|
898
|
+
# security group usage audit policy, the value is
|
899
|
+
# `AWS::EC2::SecurityGroup`.
|
867
900
|
#
|
868
901
|
#
|
869
902
|
#
|
@@ -872,8 +905,8 @@ module Aws::FMS
|
|
872
905
|
#
|
873
906
|
# @!attribute [rw] security_service_type
|
874
907
|
# The service that the policy is using to protect the resources. This
|
875
|
-
# specifies the type of policy that is created, either
|
876
|
-
# Shield Advanced policy.
|
908
|
+
# specifies the type of policy that is created, either an AWS WAF
|
909
|
+
# policy, a Shield Advanced policy, or a security group policy.
|
877
910
|
# @return [String]
|
878
911
|
#
|
879
912
|
# @!attribute [rw] remediation_enabled
|
@@ -928,7 +961,7 @@ module Aws::FMS
|
|
928
961
|
# policy_name: "ResourceName", # required
|
929
962
|
# policy_update_token: "PolicyUpdateToken",
|
930
963
|
# security_service_policy_data: { # required
|
931
|
-
# type: "WAF", # required, accepts WAF, SHIELD_ADVANCED
|
964
|
+
# type: "WAF", # required, accepts WAF, SHIELD_ADVANCED, SECURITY_GROUPS_COMMON, SECURITY_GROUPS_CONTENT_AUDIT, SECURITY_GROUPS_USAGE_AUDIT
|
932
965
|
# managed_service_data: "ManagedServiceData",
|
933
966
|
# },
|
934
967
|
# resource_type: "ResourceType", # required
|
@@ -990,14 +1023,14 @@ module Aws::FMS
|
|
990
1023
|
end
|
991
1024
|
|
992
1025
|
# The resource tags that AWS Firewall Manager uses to determine if a
|
993
|
-
# particular resource should be included or excluded from
|
994
|
-
#
|
995
|
-
#
|
996
|
-
# environment. Each tag consists of a key and an optional value
|
997
|
-
#
|
998
|
-
#
|
999
|
-
#
|
1000
|
-
# Editor][1].
|
1026
|
+
# particular resource should be included or excluded from the AWS
|
1027
|
+
# Firewall Manager policy. Tags enable you to categorize your AWS
|
1028
|
+
# resources in different ways, for example, by purpose, owner, or
|
1029
|
+
# environment. Each tag consists of a key and an optional value.
|
1030
|
+
# Firewall Manager combines the tags with "AND" so that, if you add
|
1031
|
+
# more than one tag to a policy scope, a resource must have all the
|
1032
|
+
# specified tags to be included or excluded. For more information, see
|
1033
|
+
# [Working with Tag Editor][1].
|
1001
1034
|
#
|
1002
1035
|
#
|
1003
1036
|
#
|
@@ -1034,26 +1067,54 @@ module Aws::FMS
|
|
1034
1067
|
# data as a hash:
|
1035
1068
|
#
|
1036
1069
|
# {
|
1037
|
-
# type: "WAF", # required, accepts WAF, SHIELD_ADVANCED
|
1070
|
+
# type: "WAF", # required, accepts WAF, SHIELD_ADVANCED, SECURITY_GROUPS_COMMON, SECURITY_GROUPS_CONTENT_AUDIT, SECURITY_GROUPS_USAGE_AUDIT
|
1038
1071
|
# managed_service_data: "ManagedServiceData",
|
1039
1072
|
# }
|
1040
1073
|
#
|
1041
1074
|
# @!attribute [rw] type
|
1042
1075
|
# The service that the policy is using to protect the resources. This
|
1043
|
-
# specifies the type of policy that is created, either
|
1044
|
-
# Shield Advanced policy.
|
1076
|
+
# specifies the type of policy that is created, either an AWS WAF
|
1077
|
+
# policy, a Shield Advanced policy, or a security group policy. For
|
1078
|
+
# security group policies, Firewall Manager supports one security
|
1079
|
+
# group for each common policy and for each content audit policy. This
|
1080
|
+
# is an adjustable limit that you can increase by contacting AWS
|
1081
|
+
# Support.
|
1045
1082
|
# @return [String]
|
1046
1083
|
#
|
1047
1084
|
# @!attribute [rw] managed_service_data
|
1048
|
-
# Details about the service
|
1049
|
-
#
|
1085
|
+
# Details about the service that are specific to the service type, in
|
1086
|
+
# JSON format. For service type `SHIELD_ADVANCED`, this is an empty
|
1087
|
+
# string.
|
1088
|
+
#
|
1089
|
+
# * Example: `WAF`
|
1090
|
+
#
|
1091
|
+
# `ManagedServiceData": "\{"type": "WAF", "ruleGroups":
|
1092
|
+
# [\{"id": "12345678-1bcd-9012-efga-0987654321ab",
|
1093
|
+
# "overrideAction" : \{"type": "COUNT"\}\}],
|
1094
|
+
# "defaultAction": \{"type": "BLOCK"\}\}`
|
1095
|
+
#
|
1096
|
+
# * Example: `SECURITY_GROUPS_COMMON`
|
1097
|
+
#
|
1098
|
+
# `"SecurityServicePolicyData":\{"Type":"SECURITY_GROUPS_COMMON","ManagedServiceData":"\{"type":"SECURITY_GROUPS_COMMON","revertManualSecurityGroupChanges":false,"exclusiveResourceSecurityGroupManagement":false,"securityGroups":[\{"id":"
|
1099
|
+
# sg-000e55995d61a06bd"\}]\}"\},"RemediationEnabled":false,"ResourceType":"AWS::EC2::NetworkInterface"\}`
|
1100
|
+
#
|
1101
|
+
# * Example: `SECURITY_GROUPS_CONTENT_AUDIT`
|
1102
|
+
#
|
1103
|
+
# `"SecurityServicePolicyData":\{"Type":"SECURITY_GROUPS_CONTENT_AUDIT","ManagedServiceData":"\{"type":"SECURITY_GROUPS_CONTENT_AUDIT","securityGroups":[\{"id":"
|
1104
|
+
# sg-000e55995d61a06bd
|
1105
|
+
# "\}],"securityGroupAction":\{"type":"ALLOW"\}\}"\},"RemediationEnabled":false,"ResourceType":"AWS::EC2::NetworkInterface"\}`
|
1106
|
+
#
|
1107
|
+
# The security group action for content audit can be `ALLOW` or
|
1108
|
+
# `DENY`. For `ALLOW`, all in-scope security group rules must be
|
1109
|
+
# within the allowed range of the policy's security group rules.
|
1110
|
+
# For `DENY`, all in-scope security group rules must not contain a
|
1111
|
+
# value or a range that matches a rule value or range in the policy
|
1112
|
+
# security group.
|
1050
1113
|
#
|
1051
|
-
#
|
1052
|
-
# [\{"id": "12345678-1bcd-9012-efga-0987654321ab",
|
1053
|
-
# "overrideAction" : \{"type": "COUNT"\}\}], "defaultAction":
|
1054
|
-
# \{"type": "BLOCK"\}\}`
|
1114
|
+
# * Example: `SECURITY_GROUPS_USAGE_AUDIT`
|
1055
1115
|
#
|
1056
|
-
#
|
1116
|
+
# `"SecurityServicePolicyData":\{"Type":"SECURITY_GROUPS_USAGE_AUDIT","ManagedServiceData":"\{"type":"SECURITY_GROUPS_USAGE_AUDIT","deleteUnusedSecurityGroups":true,"coalesceRedundantSecurityGroups":true\}"\},"RemediationEnabled":false,"Resou
|
1117
|
+
# rceType":"AWS::EC2::SecurityGroup"\}`
|
1057
1118
|
# @return [String]
|
1058
1119
|
#
|
1059
1120
|
# @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/SecurityServicePolicyData AWS API Documentation
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-fms
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.19.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2019-
|
11
|
+
date: 2019-10-10 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|