aws-sdk-fms 1.32.0 → 1.37.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 9457496898387c68d4bae01a7ea97f7c0c1fe73ff4cefacb2e5d7977845b3a01
4
- data.tar.gz: 3b40ad228d2cdf95aa7e1287fa5c6197dd912222e9e7ed1c5aac84a9967fc491
3
+ metadata.gz: c37272a3795fdc60b8570fcb8fb680ae61f694156bcab41f03e1bf86d6f7e47a
4
+ data.tar.gz: c9cd5778bf9f55358dbb14194f4ea98ecd809d666303f3d88ec3e69ecff311ed
5
5
  SHA512:
6
- metadata.gz: c17dbad12b9cde7435992286ab65416c228f3bd020c41f3273c6a1c55d897e875a364186d641f8d9c6e8119e2a7948ab961af37438fcc68b93c613ed7e670de9
7
- data.tar.gz: 81cfd8d5e23c34356ffacf08fde13a831c827e46bca8eaad8f2cba47b5ee7a193b1e88ad99f6ca1a6d880b35e4ff1262f060504e55566b96e9ef6c41e3c19a7d
6
+ metadata.gz: 825080cf8da456323d7ef9a7b7901d2a5219764157f1562e0ed46738aff341521ce157a039bb887b774674776625bc00b600c82c8a943985642cca4633f66d3b
7
+ data.tar.gz: 347a45ba0212c33f6090a4f2602061c8867f130def1acc2967337c7012920085ee2fe09405798c34f9bf42a9e8fd1be2f534054101f4f8c473874a4bf453e233
data/CHANGELOG.md ADDED
@@ -0,0 +1,198 @@
1
+ Unreleased Changes
2
+ ------------------
3
+
4
+ 1.37.0 (2021-07-08)
5
+ ------------------
6
+
7
+ * Feature - AWS Firewall Manager now supports route table monitoring, and provides remediation action recommendations to security administrators for AWS Network Firewall policies with misconfigured routes.
8
+
9
+ 1.36.0 (2021-04-01)
10
+ ------------------
11
+
12
+ * Feature - Added Firewall Manager policy support for AWS Route 53 Resolver DNS Firewall.
13
+
14
+ 1.35.0 (2021-03-10)
15
+ ------------------
16
+
17
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
18
+
19
+ 1.34.0 (2021-02-02)
20
+ ------------------
21
+
22
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
23
+
24
+ 1.33.0 (2020-11-17)
25
+ ------------------
26
+
27
+ * Feature - Added Firewall Manager policy support for AWS Network Firewall resources.
28
+
29
+ 1.32.0 (2020-09-30)
30
+ ------------------
31
+
32
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
33
+
34
+ 1.31.0 (2020-09-15)
35
+ ------------------
36
+
37
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
38
+
39
+ 1.30.0 (2020-08-25)
40
+ ------------------
41
+
42
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
43
+
44
+ 1.29.0 (2020-07-20)
45
+ ------------------
46
+
47
+ * Feature - Added managed policies for auditing security group rules, including the use of managed application and protocol lists.
48
+
49
+ 1.28.0 (2020-06-23)
50
+ ------------------
51
+
52
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
53
+
54
+ 1.27.1 (2020-06-11)
55
+ ------------------
56
+
57
+ * Issue - Republish previous version with correct dependency on `aws-sdk-core`.
58
+
59
+ 1.27.0 (2020-06-10)
60
+ ------------------
61
+
62
+ * Issue - This version has been yanked. (#2327).
63
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
64
+
65
+ 1.26.0 (2020-05-28)
66
+ ------------------
67
+
68
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
69
+
70
+ 1.25.0 (2020-05-07)
71
+ ------------------
72
+
73
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
74
+
75
+ 1.24.0 (2020-04-22)
76
+ ------------------
77
+
78
+ * Feature - This release is to support AWS Firewall Manager policy with Organizational Unit scope.
79
+
80
+ 1.23.0 (2020-03-31)
81
+ ------------------
82
+
83
+ * Feature - This release contains FMS wafv2 support.
84
+
85
+ 1.22.0 (2020-03-09)
86
+ ------------------
87
+
88
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
89
+
90
+ 1.21.0 (2020-01-08)
91
+ ------------------
92
+
93
+ * Feature - AWS Firewall Manager now supports tagging, and tag-based access control, of policies.
94
+
95
+ 1.20.0 (2019-10-23)
96
+ ------------------
97
+
98
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
99
+
100
+ 1.19.0 (2019-10-10)
101
+ ------------------
102
+
103
+ * Feature - Firewall Manager now supports Amazon VPC security groups, making it easier to configure and manage security groups across multiple accounts from a single place.
104
+
105
+ 1.18.0 (2019-07-25)
106
+ ------------------
107
+
108
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
109
+
110
+ 1.17.0 (2019-07-01)
111
+ ------------------
112
+
113
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
114
+
115
+ 1.16.0 (2019-06-17)
116
+ ------------------
117
+
118
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
119
+
120
+ 1.15.0 (2019-05-21)
121
+ ------------------
122
+
123
+ * Feature - API update.
124
+
125
+ 1.14.0 (2019-05-15)
126
+ ------------------
127
+
128
+ * Feature - API update.
129
+
130
+ 1.13.0 (2019-05-14)
131
+ ------------------
132
+
133
+ * Feature - API update.
134
+
135
+ 1.12.0 (2019-03-25)
136
+ ------------------
137
+
138
+ * Feature - API update.
139
+
140
+ 1.11.0 (2019-03-21)
141
+ ------------------
142
+
143
+ * Feature - API update.
144
+
145
+ 1.10.0 (2019-03-18)
146
+ ------------------
147
+
148
+ * Feature - API update.
149
+
150
+ 1.9.0 (2019-03-14)
151
+ ------------------
152
+
153
+ * Feature - API update.
154
+
155
+ 1.8.0 (2019-01-21)
156
+ ------------------
157
+
158
+ * Feature - API update.
159
+
160
+ 1.7.0 (2018-11-20)
161
+ ------------------
162
+
163
+ * Feature - API update.
164
+
165
+ 1.6.0 (2018-10-24)
166
+ ------------------
167
+
168
+ * Feature - API update.
169
+
170
+ 1.5.0 (2018-10-23)
171
+ ------------------
172
+
173
+ * Feature - API update.
174
+
175
+ 1.4.0 (2018-09-12)
176
+ ------------------
177
+
178
+ * Feature - API update.
179
+
180
+ 1.3.0 (2018-09-06)
181
+ ------------------
182
+
183
+ * Feature - Adds code paths and plugins for future SDK instrumentation and telemetry.
184
+
185
+ 1.2.0 (2018-09-05)
186
+ ------------------
187
+
188
+ * Feature - API update.
189
+
190
+ 1.1.0 (2018-06-26)
191
+ ------------------
192
+
193
+ * Feature - API update.
194
+
195
+ 1.0.0 (2018-04-04)
196
+ ------------------
197
+
198
+ * Feature - Initial release of `aws-sdk-fms`.
data/LICENSE.txt ADDED
@@ -0,0 +1,202 @@
1
+
2
+ Apache License
3
+ Version 2.0, January 2004
4
+ http://www.apache.org/licenses/
5
+
6
+ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
7
+
8
+ 1. Definitions.
9
+
10
+ "License" shall mean the terms and conditions for use, reproduction,
11
+ and distribution as defined by Sections 1 through 9 of this document.
12
+
13
+ "Licensor" shall mean the copyright owner or entity authorized by
14
+ the copyright owner that is granting the License.
15
+
16
+ "Legal Entity" shall mean the union of the acting entity and all
17
+ other entities that control, are controlled by, or are under common
18
+ control with that entity. For the purposes of this definition,
19
+ "control" means (i) the power, direct or indirect, to cause the
20
+ direction or management of such entity, whether by contract or
21
+ otherwise, or (ii) ownership of fifty percent (50%) or more of the
22
+ outstanding shares, or (iii) beneficial ownership of such entity.
23
+
24
+ "You" (or "Your") shall mean an individual or Legal Entity
25
+ exercising permissions granted by this License.
26
+
27
+ "Source" form shall mean the preferred form for making modifications,
28
+ including but not limited to software source code, documentation
29
+ source, and configuration files.
30
+
31
+ "Object" form shall mean any form resulting from mechanical
32
+ transformation or translation of a Source form, including but
33
+ not limited to compiled object code, generated documentation,
34
+ and conversions to other media types.
35
+
36
+ "Work" shall mean the work of authorship, whether in Source or
37
+ Object form, made available under the License, as indicated by a
38
+ copyright notice that is included in or attached to the work
39
+ (an example is provided in the Appendix below).
40
+
41
+ "Derivative Works" shall mean any work, whether in Source or Object
42
+ form, that is based on (or derived from) the Work and for which the
43
+ editorial revisions, annotations, elaborations, or other modifications
44
+ represent, as a whole, an original work of authorship. For the purposes
45
+ of this License, Derivative Works shall not include works that remain
46
+ separable from, or merely link (or bind by name) to the interfaces of,
47
+ the Work and Derivative Works thereof.
48
+
49
+ "Contribution" shall mean any work of authorship, including
50
+ the original version of the Work and any modifications or additions
51
+ to that Work or Derivative Works thereof, that is intentionally
52
+ submitted to Licensor for inclusion in the Work by the copyright owner
53
+ or by an individual or Legal Entity authorized to submit on behalf of
54
+ the copyright owner. For the purposes of this definition, "submitted"
55
+ means any form of electronic, verbal, or written communication sent
56
+ to the Licensor or its representatives, including but not limited to
57
+ communication on electronic mailing lists, source code control systems,
58
+ and issue tracking systems that are managed by, or on behalf of, the
59
+ Licensor for the purpose of discussing and improving the Work, but
60
+ excluding communication that is conspicuously marked or otherwise
61
+ designated in writing by the copyright owner as "Not a Contribution."
62
+
63
+ "Contributor" shall mean Licensor and any individual or Legal Entity
64
+ on behalf of whom a Contribution has been received by Licensor and
65
+ subsequently incorporated within the Work.
66
+
67
+ 2. Grant of Copyright License. Subject to the terms and conditions of
68
+ this License, each Contributor hereby grants to You a perpetual,
69
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
70
+ copyright license to reproduce, prepare Derivative Works of,
71
+ publicly display, publicly perform, sublicense, and distribute the
72
+ Work and such Derivative Works in Source or Object form.
73
+
74
+ 3. Grant of Patent License. Subject to the terms and conditions of
75
+ this License, each Contributor hereby grants to You a perpetual,
76
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
77
+ (except as stated in this section) patent license to make, have made,
78
+ use, offer to sell, sell, import, and otherwise transfer the Work,
79
+ where such license applies only to those patent claims licensable
80
+ by such Contributor that are necessarily infringed by their
81
+ Contribution(s) alone or by combination of their Contribution(s)
82
+ with the Work to which such Contribution(s) was submitted. If You
83
+ institute patent litigation against any entity (including a
84
+ cross-claim or counterclaim in a lawsuit) alleging that the Work
85
+ or a Contribution incorporated within the Work constitutes direct
86
+ or contributory patent infringement, then any patent licenses
87
+ granted to You under this License for that Work shall terminate
88
+ as of the date such litigation is filed.
89
+
90
+ 4. Redistribution. You may reproduce and distribute copies of the
91
+ Work or Derivative Works thereof in any medium, with or without
92
+ modifications, and in Source or Object form, provided that You
93
+ meet the following conditions:
94
+
95
+ (a) You must give any other recipients of the Work or
96
+ Derivative Works a copy of this License; and
97
+
98
+ (b) You must cause any modified files to carry prominent notices
99
+ stating that You changed the files; and
100
+
101
+ (c) You must retain, in the Source form of any Derivative Works
102
+ that You distribute, all copyright, patent, trademark, and
103
+ attribution notices from the Source form of the Work,
104
+ excluding those notices that do not pertain to any part of
105
+ the Derivative Works; and
106
+
107
+ (d) If the Work includes a "NOTICE" text file as part of its
108
+ distribution, then any Derivative Works that You distribute must
109
+ include a readable copy of the attribution notices contained
110
+ within such NOTICE file, excluding those notices that do not
111
+ pertain to any part of the Derivative Works, in at least one
112
+ of the following places: within a NOTICE text file distributed
113
+ as part of the Derivative Works; within the Source form or
114
+ documentation, if provided along with the Derivative Works; or,
115
+ within a display generated by the Derivative Works, if and
116
+ wherever such third-party notices normally appear. The contents
117
+ of the NOTICE file are for informational purposes only and
118
+ do not modify the License. You may add Your own attribution
119
+ notices within Derivative Works that You distribute, alongside
120
+ or as an addendum to the NOTICE text from the Work, provided
121
+ that such additional attribution notices cannot be construed
122
+ as modifying the License.
123
+
124
+ You may add Your own copyright statement to Your modifications and
125
+ may provide additional or different license terms and conditions
126
+ for use, reproduction, or distribution of Your modifications, or
127
+ for any such Derivative Works as a whole, provided Your use,
128
+ reproduction, and distribution of the Work otherwise complies with
129
+ the conditions stated in this License.
130
+
131
+ 5. Submission of Contributions. Unless You explicitly state otherwise,
132
+ any Contribution intentionally submitted for inclusion in the Work
133
+ by You to the Licensor shall be under the terms and conditions of
134
+ this License, without any additional terms or conditions.
135
+ Notwithstanding the above, nothing herein shall supersede or modify
136
+ the terms of any separate license agreement you may have executed
137
+ with Licensor regarding such Contributions.
138
+
139
+ 6. Trademarks. This License does not grant permission to use the trade
140
+ names, trademarks, service marks, or product names of the Licensor,
141
+ except as required for reasonable and customary use in describing the
142
+ origin of the Work and reproducing the content of the NOTICE file.
143
+
144
+ 7. Disclaimer of Warranty. Unless required by applicable law or
145
+ agreed to in writing, Licensor provides the Work (and each
146
+ Contributor provides its Contributions) on an "AS IS" BASIS,
147
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
148
+ implied, including, without limitation, any warranties or conditions
149
+ of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
150
+ PARTICULAR PURPOSE. You are solely responsible for determining the
151
+ appropriateness of using or redistributing the Work and assume any
152
+ risks associated with Your exercise of permissions under this License.
153
+
154
+ 8. Limitation of Liability. In no event and under no legal theory,
155
+ whether in tort (including negligence), contract, or otherwise,
156
+ unless required by applicable law (such as deliberate and grossly
157
+ negligent acts) or agreed to in writing, shall any Contributor be
158
+ liable to You for damages, including any direct, indirect, special,
159
+ incidental, or consequential damages of any character arising as a
160
+ result of this License or out of the use or inability to use the
161
+ Work (including but not limited to damages for loss of goodwill,
162
+ work stoppage, computer failure or malfunction, or any and all
163
+ other commercial damages or losses), even if such Contributor
164
+ has been advised of the possibility of such damages.
165
+
166
+ 9. Accepting Warranty or Additional Liability. While redistributing
167
+ the Work or Derivative Works thereof, You may choose to offer,
168
+ and charge a fee for, acceptance of support, warranty, indemnity,
169
+ or other liability obligations and/or rights consistent with this
170
+ License. However, in accepting such obligations, You may act only
171
+ on Your own behalf and on Your sole responsibility, not on behalf
172
+ of any other Contributor, and only if You agree to indemnify,
173
+ defend, and hold each Contributor harmless for any liability
174
+ incurred by, or claims asserted against, such Contributor by reason
175
+ of your accepting any such warranty or additional liability.
176
+
177
+ END OF TERMS AND CONDITIONS
178
+
179
+ APPENDIX: How to apply the Apache License to your work.
180
+
181
+ To apply the Apache License to your work, attach the following
182
+ boilerplate notice, with the fields enclosed by brackets "[]"
183
+ replaced with your own identifying information. (Don't include
184
+ the brackets!) The text should be enclosed in the appropriate
185
+ comment syntax for the file format. We also recommend that a
186
+ file or class name and description of purpose be included on the
187
+ same "printed page" as the copyright notice for easier
188
+ identification within third-party archives.
189
+
190
+ Copyright [yyyy] [name of copyright owner]
191
+
192
+ Licensed under the Apache License, Version 2.0 (the "License");
193
+ you may not use this file except in compliance with the License.
194
+ You may obtain a copy of the License at
195
+
196
+ http://www.apache.org/licenses/LICENSE-2.0
197
+
198
+ Unless required by applicable law or agreed to in writing, software
199
+ distributed under the License is distributed on an "AS IS" BASIS,
200
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
201
+ See the License for the specific language governing permissions and
202
+ limitations under the License.
data/VERSION ADDED
@@ -0,0 +1 @@
1
+ 1.37.0
data/lib/aws-sdk-fms.rb CHANGED
@@ -3,7 +3,7 @@
3
3
  # WARNING ABOUT GENERATED CODE
4
4
  #
5
5
  # This file is generated. See the contributing guide for more information:
6
- # https://github.com/aws/aws-sdk-ruby/blob/master/CONTRIBUTING.md
6
+ # https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
7
7
  #
8
8
  # WARNING ABOUT GENERATED CODE
9
9
 
@@ -48,6 +48,6 @@ require_relative 'aws-sdk-fms/customizations'
48
48
  # @!group service
49
49
  module Aws::FMS
50
50
 
51
- GEM_VERSION = '1.32.0'
51
+ GEM_VERSION = '1.37.0'
52
52
 
53
53
  end
@@ -3,7 +3,7 @@
3
3
  # WARNING ABOUT GENERATED CODE
4
4
  #
5
5
  # This file is generated. See the contributing guide for more information:
6
- # https://github.com/aws/aws-sdk-ruby/blob/master/CONTRIBUTING.md
6
+ # https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
7
7
  #
8
8
  # WARNING ABOUT GENERATED CODE
9
9
 
@@ -337,22 +337,20 @@ module Aws::FMS
337
337
 
338
338
  # @!group API Operations
339
339
 
340
- # Sets the AWS Firewall Manager administrator account. AWS Firewall
341
- # Manager must be associated with the master account of your AWS
342
- # organization or associated with a member account that has the
343
- # appropriate permissions. If the account ID that you submit is not an
344
- # AWS Organizations master account, AWS Firewall Manager will set the
345
- # appropriate permissions for the given member account.
340
+ # Sets the Firewall Manager administrator account. The account must be a
341
+ # member of the organization in Organizations whose resources you want
342
+ # to protect. Firewall Manager sets the permissions that allow the
343
+ # account to administer your Firewall Manager policies.
346
344
  #
347
- # The account that you associate with AWS Firewall Manager is called the
348
- # AWS Firewall Manager administrator account.
345
+ # The account that you associate with Firewall Manager is called the
346
+ # Firewall Manager administrator account.
349
347
  #
350
348
  # @option params [required, String] :admin_account
351
- # The AWS account ID to associate with AWS Firewall Manager as the AWS
352
- # Firewall Manager administrator account. This can be an AWS
353
- # Organizations master account or a member account. For more information
354
- # about AWS Organizations and master accounts, see [Managing the AWS
355
- # Accounts in Your Organization][1].
349
+ # The Amazon Web Services account ID to associate with Firewall Manager
350
+ # as the Firewall Manager administrator account. This must be an
351
+ # Organizations member account. For more information about
352
+ # Organizations, see [Managing the Amazon Web Services Accounts in Your
353
+ # Organization][1].
356
354
  #
357
355
  #
358
356
  #
@@ -375,7 +373,7 @@ module Aws::FMS
375
373
  req.send_request(options)
376
374
  end
377
375
 
378
- # Permanently deletes an AWS Firewall Manager applications list.
376
+ # Permanently deletes an Firewall Manager applications list.
379
377
  #
380
378
  # @option params [required, String] :list_id
381
379
  # The ID of the applications list that you want to delete. You can
@@ -399,9 +397,9 @@ module Aws::FMS
399
397
  req.send_request(options)
400
398
  end
401
399
 
402
- # Deletes an AWS Firewall Manager association with the IAM role and the
400
+ # Deletes an Firewall Manager association with the IAM role and the
403
401
  # Amazon Simple Notification Service (SNS) topic that is used to record
404
- # AWS Firewall Manager SNS logs.
402
+ # Firewall Manager SNS logs.
405
403
  #
406
404
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
407
405
  #
@@ -414,7 +412,7 @@ module Aws::FMS
414
412
  req.send_request(options)
415
413
  end
416
414
 
417
- # Permanently deletes an AWS Firewall Manager policy.
415
+ # Permanently deletes an Firewall Manager policy.
418
416
  #
419
417
  # @option params [required, String] :policy_id
420
418
  # The ID of the policy that you want to delete. You can retrieve this ID
@@ -423,10 +421,9 @@ module Aws::FMS
423
421
  # @option params [Boolean] :delete_all_policy_resources
424
422
  # If `True`, the request performs cleanup according to the policy type.
425
423
  #
426
- # For AWS WAF and Shield Advanced policies, the cleanup does the
427
- # following:
424
+ # For WAF and Shield Advanced policies, the cleanup does the following:
428
425
  #
429
- # * Deletes rule groups created by AWS Firewall Manager
426
+ # * Deletes rule groups created by Firewall Manager
430
427
  #
431
428
  # * Removes web ACLs from in-scope resources
432
429
  #
@@ -468,7 +465,7 @@ module Aws::FMS
468
465
  req.send_request(options)
469
466
  end
470
467
 
471
- # Permanently deletes an AWS Firewall Manager protocols list.
468
+ # Permanently deletes an Firewall Manager protocols list.
472
469
  #
473
470
  # @option params [required, String] :list_id
474
471
  # The ID of the protocols list that you want to delete. You can retrieve
@@ -492,10 +489,9 @@ module Aws::FMS
492
489
  req.send_request(options)
493
490
  end
494
491
 
495
- # Disassociates the account that has been set as the AWS Firewall
496
- # Manager administrator account. To set a different account as the
497
- # administrator account, you must submit an `AssociateAdminAccount`
498
- # request.
492
+ # Disassociates the account that has been set as the Firewall Manager
493
+ # administrator account. To set a different account as the administrator
494
+ # account, you must submit an `AssociateAdminAccount` request.
499
495
  #
500
496
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
501
497
  #
@@ -508,8 +504,8 @@ module Aws::FMS
508
504
  req.send_request(options)
509
505
  end
510
506
 
511
- # Returns the AWS Organizations master account that is associated with
512
- # AWS Firewall Manager as the AWS Firewall Manager administrator.
507
+ # Returns the Organizations account that is associated with Firewall
508
+ # Manager as the Firewall Manager administrator.
513
509
  #
514
510
  # @return [Types::GetAdminAccountResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
515
511
  #
@@ -530,15 +526,15 @@ module Aws::FMS
530
526
  req.send_request(options)
531
527
  end
532
528
 
533
- # Returns information about the specified AWS Firewall Manager
534
- # applications list.
529
+ # Returns information about the specified Firewall Manager applications
530
+ # list.
535
531
  #
536
532
  # @option params [required, String] :list_id
537
- # The ID of the AWS Firewall Manager applications list that you want the
533
+ # The ID of the Firewall Manager applications list that you want the
538
534
  # details for.
539
535
  #
540
536
  # @option params [Boolean] :default_list
541
- # Specifies whether the list to retrieve is a default list owned by AWS
537
+ # Specifies whether the list to retrieve is a default list owned by
542
538
  # Firewall Manager.
543
539
  #
544
540
  # @return [Types::GetAppsListResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
@@ -582,20 +578,33 @@ module Aws::FMS
582
578
 
583
579
  # Returns detailed compliance information about the specified member
584
580
  # account. Details include resources that are in and out of compliance
585
- # with the specified policy. Resources are considered noncompliant for
586
- # AWS WAF and Shield Advanced policies if the specified policy has not
587
- # been applied to them. Resources are considered noncompliant for
588
- # security group policies if they are in scope of the policy, they
589
- # violate one or more of the policy rules, and remediation is disabled
590
- # or not possible.
581
+ # with the specified policy.
582
+ #
583
+ # * Resources are considered noncompliant for WAF and Shield Advanced
584
+ # policies if the specified policy has not been applied to them.
585
+ #
586
+ # * Resources are considered noncompliant for security group policies if
587
+ # they are in scope of the policy, they violate one or more of the
588
+ # policy rules, and remediation is disabled or not possible.
589
+ #
590
+ # * Resources are considered noncompliant for Network Firewall policies
591
+ # if a firewall is missing in the VPC, if the firewall endpoint isn't
592
+ # set up in an expected Availability Zone and subnet, if a subnet
593
+ # created by the Firewall Manager doesn't have the expected route
594
+ # table, and for modifications to a firewall policy that violate the
595
+ # Firewall Manager policy's rules.
596
+ #
597
+ # * Resources are considered noncompliant for DNS Firewall policies if a
598
+ # DNS Firewall rule group is missing from the rule group associations
599
+ # for the VPC.
591
600
  #
592
601
  # @option params [required, String] :policy_id
593
602
  # The ID of the policy that you want to get the details for. `PolicyId`
594
603
  # is returned by `PutPolicy` and by `ListPolicies`.
595
604
  #
596
605
  # @option params [required, String] :member_account
597
- # The AWS account that owns the resources that you want to get the
598
- # details for.
606
+ # The Amazon Web Services account that owns the resources that you want
607
+ # to get the details for.
599
608
  #
600
609
  # @return [Types::GetComplianceDetailResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
601
610
  #
@@ -615,7 +624,7 @@ module Aws::FMS
615
624
  # resp.policy_compliance_detail.member_account #=> String
616
625
  # resp.policy_compliance_detail.violators #=> Array
617
626
  # resp.policy_compliance_detail.violators[0].resource_id #=> String
618
- # resp.policy_compliance_detail.violators[0].violation_reason #=> String, one of "WEB_ACL_MISSING_RULE_GROUP", "RESOURCE_MISSING_WEB_ACL", "RESOURCE_INCORRECT_WEB_ACL", "RESOURCE_MISSING_SHIELD_PROTECTION", "RESOURCE_MISSING_WEB_ACL_OR_SHIELD_PROTECTION", "RESOURCE_MISSING_SECURITY_GROUP", "RESOURCE_VIOLATES_AUDIT_SECURITY_GROUP", "SECURITY_GROUP_UNUSED", "SECURITY_GROUP_REDUNDANT"
627
+ # resp.policy_compliance_detail.violators[0].violation_reason #=> String, one of "WEB_ACL_MISSING_RULE_GROUP", "RESOURCE_MISSING_WEB_ACL", "RESOURCE_INCORRECT_WEB_ACL", "RESOURCE_MISSING_SHIELD_PROTECTION", "RESOURCE_MISSING_WEB_ACL_OR_SHIELD_PROTECTION", "RESOURCE_MISSING_SECURITY_GROUP", "RESOURCE_VIOLATES_AUDIT_SECURITY_GROUP", "SECURITY_GROUP_UNUSED", "SECURITY_GROUP_REDUNDANT", "FMS_CREATED_SECURITY_GROUP_EDITED", "MISSING_FIREWALL", "MISSING_FIREWALL_SUBNET_IN_AZ", "MISSING_EXPECTED_ROUTE_TABLE", "NETWORK_FIREWALL_POLICY_MODIFIED", "INTERNET_GATEWAY_MISSING_EXPECTED_ROUTE", "FIREWALL_SUBNET_MISSING_EXPECTED_ROUTE", "UNEXPECTED_FIREWALL_ROUTES", "UNEXPECTED_TARGET_GATEWAY_ROUTES", "TRAFFIC_INSPECTION_CROSSES_AZ_BOUNDARY", "INVALID_ROUTE_CONFIGURATION", "MISSING_TARGET_GATEWAY", "INTERNET_TRAFFIC_NOT_INSPECTED", "BLACK_HOLE_ROUTE_DETECTED", "BLACK_HOLE_ROUTE_DETECTED_IN_FIREWALL_SUBNET", "RESOURCE_MISSING_DNS_FIREWALL"
619
628
  # resp.policy_compliance_detail.violators[0].resource_type #=> String
620
629
  # resp.policy_compliance_detail.evaluation_limit_exceeded #=> Boolean
621
630
  # resp.policy_compliance_detail.expired_at #=> Time
@@ -632,7 +641,7 @@ module Aws::FMS
632
641
  end
633
642
 
634
643
  # Information about the Amazon Simple Notification Service (SNS) topic
635
- # that is used to record AWS Firewall Manager SNS logs.
644
+ # that is used to record Firewall Manager SNS logs.
636
645
  #
637
646
  # @return [Types::GetNotificationChannelResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
638
647
  #
@@ -653,11 +662,10 @@ module Aws::FMS
653
662
  req.send_request(options)
654
663
  end
655
664
 
656
- # Returns information about the specified AWS Firewall Manager policy.
665
+ # Returns information about the specified Firewall Manager policy.
657
666
  #
658
667
  # @option params [required, String] :policy_id
659
- # The ID of the AWS Firewall Manager policy that you want the details
660
- # for.
668
+ # The ID of the Firewall Manager policy that you want the details for.
661
669
  #
662
670
  # @return [Types::GetPolicyResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
663
671
  #
@@ -675,7 +683,7 @@ module Aws::FMS
675
683
  # resp.policy.policy_id #=> String
676
684
  # resp.policy.policy_name #=> String
677
685
  # resp.policy.policy_update_token #=> String
678
- # resp.policy.security_service_policy_data.type #=> String, one of "WAF", "WAFV2", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
686
+ # resp.policy.security_service_policy_data.type #=> String, one of "WAF", "WAFV2", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT", "NETWORK_FIREWALL", "DNS_FIREWALL"
679
687
  # resp.policy.security_service_policy_data.managed_service_data #=> String
680
688
  # resp.policy.resource_type #=> String
681
689
  # resp.policy.resource_type_list #=> Array
@@ -710,32 +718,32 @@ module Aws::FMS
710
718
  # The ID of the policy for which you want to get the attack information.
711
719
  #
712
720
  # @option params [String] :member_account_id
713
- # The AWS account that is in scope of the policy that you want to get
714
- # the details for.
721
+ # The Amazon Web Services account that is in scope of the policy that
722
+ # you want to get the details for.
715
723
  #
716
724
  # @option params [Time,DateTime,Date,Integer,String] :start_time
717
725
  # The start of the time period to query for the attacks. This is a
718
726
  # `timestamp` type. The request syntax listing indicates a `number` type
719
- # because the default used by AWS Firewall Manager is Unix time in
720
- # seconds. However, any valid `timestamp` format is allowed.
727
+ # because the default used by Firewall Manager is Unix time in seconds.
728
+ # However, any valid `timestamp` format is allowed.
721
729
  #
722
730
  # @option params [Time,DateTime,Date,Integer,String] :end_time
723
731
  # The end of the time period to query for the attacks. This is a
724
732
  # `timestamp` type. The request syntax listing indicates a `number` type
725
- # because the default used by AWS Firewall Manager is Unix time in
726
- # seconds. However, any valid `timestamp` format is allowed.
733
+ # because the default used by Firewall Manager is Unix time in seconds.
734
+ # However, any valid `timestamp` format is allowed.
727
735
  #
728
736
  # @option params [String] :next_token
729
737
  # If you specify a value for `MaxResults` and you have more objects than
730
- # the number that you specify for `MaxResults`, AWS Firewall Manager
731
- # returns a `NextToken` value in the response, which you can use to
732
- # retrieve another group of objects. For the second and subsequent
738
+ # the number that you specify for `MaxResults`, Firewall Manager returns
739
+ # a `NextToken` value in the response, which you can use to retrieve
740
+ # another group of objects. For the second and subsequent
733
741
  # `GetProtectionStatus` requests, specify the value of `NextToken` from
734
742
  # the previous response to get information about another batch of
735
743
  # objects.
736
744
  #
737
745
  # @option params [Integer] :max_results
738
- # Specifies the number of objects that you want AWS Firewall Manager to
746
+ # Specifies the number of objects that you want Firewall Manager to
739
747
  # return for this request. If you have more objects than the number that
740
748
  # you specify for `MaxResults`, the response includes a `NextToken`
741
749
  # value that you can use to get another batch of objects.
@@ -761,7 +769,7 @@ module Aws::FMS
761
769
  # @example Response structure
762
770
  #
763
771
  # resp.admin_account_id #=> String
764
- # resp.service_type #=> String, one of "WAF", "WAFV2", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
772
+ # resp.service_type #=> String, one of "WAF", "WAFV2", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT", "NETWORK_FIREWALL", "DNS_FIREWALL"
765
773
  # resp.data #=> String
766
774
  # resp.next_token #=> String
767
775
  #
@@ -774,15 +782,15 @@ module Aws::FMS
774
782
  req.send_request(options)
775
783
  end
776
784
 
777
- # Returns information about the specified AWS Firewall Manager protocols
785
+ # Returns information about the specified Firewall Manager protocols
778
786
  # list.
779
787
  #
780
788
  # @option params [required, String] :list_id
781
- # The ID of the AWS Firewall Manager protocols list that you want the
789
+ # The ID of the Firewall Manager protocols list that you want the
782
790
  # details for.
783
791
  #
784
792
  # @option params [Boolean] :default_list
785
- # Specifies whether the list to retrieve is a default list owned by AWS
793
+ # Specifies whether the list to retrieve is a default list owned by
786
794
  # Firewall Manager.
787
795
  #
788
796
  # @return [Types::GetProtocolsListResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
@@ -820,25 +828,25 @@ module Aws::FMS
820
828
  req.send_request(options)
821
829
  end
822
830
 
823
- # Retrieves violations for a resource based on the specified AWS
824
- # Firewall Manager policy and AWS account.
831
+ # Retrieves violations for a resource based on the specified Firewall
832
+ # Manager policy and Amazon Web Services account.
825
833
  #
826
834
  # @option params [required, String] :policy_id
827
- # The ID of the AWS Firewall Manager policy that you want the details
828
- # for. This currently only supports security group content audit
829
- # policies.
835
+ # The ID of the Firewall Manager policy that you want the details for.
836
+ # This currently only supports security group content audit policies.
830
837
  #
831
838
  # @option params [required, String] :member_account
832
- # The AWS account ID that you want the details for.
839
+ # The Amazon Web Services account ID that you want the details for.
833
840
  #
834
841
  # @option params [required, String] :resource_id
835
842
  # The ID of the resource that has violations.
836
843
  #
837
844
  # @option params [required, String] :resource_type
838
- # The resource type. This is in the format shown in the [AWS Resource
839
- # Types Reference][1]. Supported resource types are:
840
- # `AWS::EC2::Instance`, `AWS::EC2::NetworkInterface`, or
841
- # `AWS::EC2::SecurityGroup`.
845
+ # The resource type. This is in the format shown in the [Amazon Web
846
+ # Services Resource Types Reference][1]. Supported resource types are:
847
+ # `AWS::EC2::Instance`, `AWS::EC2::NetworkInterface`,
848
+ # `AWS::EC2::SecurityGroup`, `AWS::NetworkFirewall::FirewallPolicy`, and
849
+ # `AWS::EC2::Subnet`.
842
850
  #
843
851
  #
844
852
  #
@@ -888,6 +896,231 @@ module Aws::FMS
888
896
  # resp.violation_detail.resource_violations[0].aws_ec2_instance_violation.aws_ec2_network_interface_violations[0].violation_target #=> String
889
897
  # resp.violation_detail.resource_violations[0].aws_ec2_instance_violation.aws_ec2_network_interface_violations[0].violating_security_groups #=> Array
890
898
  # resp.violation_detail.resource_violations[0].aws_ec2_instance_violation.aws_ec2_network_interface_violations[0].violating_security_groups[0] #=> String
899
+ # resp.violation_detail.resource_violations[0].network_firewall_missing_firewall_violation.violation_target #=> String
900
+ # resp.violation_detail.resource_violations[0].network_firewall_missing_firewall_violation.vpc #=> String
901
+ # resp.violation_detail.resource_violations[0].network_firewall_missing_firewall_violation.availability_zone #=> String
902
+ # resp.violation_detail.resource_violations[0].network_firewall_missing_firewall_violation.target_violation_reason #=> String
903
+ # resp.violation_detail.resource_violations[0].network_firewall_missing_subnet_violation.violation_target #=> String
904
+ # resp.violation_detail.resource_violations[0].network_firewall_missing_subnet_violation.vpc #=> String
905
+ # resp.violation_detail.resource_violations[0].network_firewall_missing_subnet_violation.availability_zone #=> String
906
+ # resp.violation_detail.resource_violations[0].network_firewall_missing_subnet_violation.target_violation_reason #=> String
907
+ # resp.violation_detail.resource_violations[0].network_firewall_missing_expected_rt_violation.violation_target #=> String
908
+ # resp.violation_detail.resource_violations[0].network_firewall_missing_expected_rt_violation.vpc #=> String
909
+ # resp.violation_detail.resource_violations[0].network_firewall_missing_expected_rt_violation.availability_zone #=> String
910
+ # resp.violation_detail.resource_violations[0].network_firewall_missing_expected_rt_violation.current_route_table #=> String
911
+ # resp.violation_detail.resource_violations[0].network_firewall_missing_expected_rt_violation.expected_route_table #=> String
912
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.violation_target #=> String
913
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_rule_groups #=> Array
914
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_rule_groups[0].rule_group_name #=> String
915
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_rule_groups[0].resource_id #=> String
916
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_rule_groups[0].priority #=> Integer
917
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_default_actions #=> Array
918
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_default_actions[0] #=> String
919
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_fragment_default_actions #=> Array
920
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_fragment_default_actions[0] #=> String
921
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_custom_actions #=> Array
922
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateless_custom_actions[0] #=> String
923
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateful_rule_groups #=> Array
924
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateful_rule_groups[0].rule_group_name #=> String
925
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.current_policy_description.stateful_rule_groups[0].resource_id #=> String
926
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_rule_groups #=> Array
927
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_rule_groups[0].rule_group_name #=> String
928
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_rule_groups[0].resource_id #=> String
929
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_rule_groups[0].priority #=> Integer
930
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_default_actions #=> Array
931
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_default_actions[0] #=> String
932
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_fragment_default_actions #=> Array
933
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_fragment_default_actions[0] #=> String
934
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_custom_actions #=> Array
935
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateless_custom_actions[0] #=> String
936
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateful_rule_groups #=> Array
937
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateful_rule_groups[0].rule_group_name #=> String
938
+ # resp.violation_detail.resource_violations[0].network_firewall_policy_modified_violation.expected_policy_description.stateful_rule_groups[0].resource_id #=> String
939
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.subnet_id #=> String
940
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.subnet_availability_zone #=> String
941
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.route_table_id #=> String
942
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.violating_routes #=> Array
943
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.violating_routes[0].destination_type #=> String, one of "IPV4", "IPV6", "PREFIX_LIST"
944
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.violating_routes[0].target_type #=> String, one of "GATEWAY", "CARRIER_GATEWAY", "INSTANCE", "LOCAL_GATEWAY", "NAT_GATEWAY", "NETWORK_INTERFACE", "VPC_ENDPOINT", "VPC_PEERING_CONNECTION", "EGRESS_ONLY_INTERNET_GATEWAY", "TRANSIT_GATEWAY"
945
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.violating_routes[0].destination #=> String
946
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.violating_routes[0].target #=> String
947
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.is_route_table_used_in_different_az #=> Boolean
948
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.current_firewall_subnet_route_table #=> String
949
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_endpoint #=> String
950
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.firewall_subnet_id #=> String
951
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_subnet_routes #=> Array
952
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_subnet_routes[0].ip_v4_cidr #=> String
953
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_subnet_routes[0].prefix_list_id #=> String
954
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_subnet_routes[0].ip_v6_cidr #=> String
955
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_subnet_routes[0].contributing_subnets #=> Array
956
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_subnet_routes[0].contributing_subnets[0] #=> String
957
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_subnet_routes[0].allowed_targets #=> Array
958
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_subnet_routes[0].allowed_targets[0] #=> String
959
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_firewall_subnet_routes[0].route_table_id #=> String
960
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_firewall_subnet_routes #=> Array
961
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_firewall_subnet_routes[0].destination_type #=> String, one of "IPV4", "IPV6", "PREFIX_LIST"
962
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_firewall_subnet_routes[0].target_type #=> String, one of "GATEWAY", "CARRIER_GATEWAY", "INSTANCE", "LOCAL_GATEWAY", "NAT_GATEWAY", "NETWORK_INTERFACE", "VPC_ENDPOINT", "VPC_PEERING_CONNECTION", "EGRESS_ONLY_INTERNET_GATEWAY", "TRANSIT_GATEWAY"
963
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_firewall_subnet_routes[0].destination #=> String
964
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_firewall_subnet_routes[0].target #=> String
965
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.internet_gateway_id #=> String
966
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.current_internet_gateway_route_table #=> String
967
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_internet_gateway_routes #=> Array
968
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_internet_gateway_routes[0].ip_v4_cidr #=> String
969
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_internet_gateway_routes[0].prefix_list_id #=> String
970
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_internet_gateway_routes[0].ip_v6_cidr #=> String
971
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_internet_gateway_routes[0].contributing_subnets #=> Array
972
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_internet_gateway_routes[0].contributing_subnets[0] #=> String
973
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_internet_gateway_routes[0].allowed_targets #=> Array
974
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_internet_gateway_routes[0].allowed_targets[0] #=> String
975
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.expected_internet_gateway_routes[0].route_table_id #=> String
976
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_internet_gateway_routes #=> Array
977
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_internet_gateway_routes[0].destination_type #=> String, one of "IPV4", "IPV6", "PREFIX_LIST"
978
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_internet_gateway_routes[0].target_type #=> String, one of "GATEWAY", "CARRIER_GATEWAY", "INSTANCE", "LOCAL_GATEWAY", "NAT_GATEWAY", "NETWORK_INTERFACE", "VPC_ENDPOINT", "VPC_PEERING_CONNECTION", "EGRESS_ONLY_INTERNET_GATEWAY", "TRANSIT_GATEWAY"
979
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_internet_gateway_routes[0].destination #=> String
980
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.actual_internet_gateway_routes[0].target #=> String
981
+ # resp.violation_detail.resource_violations[0].network_firewall_internet_traffic_not_inspected_violation.vpc_id #=> String
982
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.affected_subnets #=> Array
983
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.affected_subnets[0] #=> String
984
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.route_table_id #=> String
985
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.is_route_table_used_in_different_az #=> Boolean
986
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.violating_route.destination_type #=> String, one of "IPV4", "IPV6", "PREFIX_LIST"
987
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.violating_route.target_type #=> String, one of "GATEWAY", "CARRIER_GATEWAY", "INSTANCE", "LOCAL_GATEWAY", "NAT_GATEWAY", "NETWORK_INTERFACE", "VPC_ENDPOINT", "VPC_PEERING_CONNECTION", "EGRESS_ONLY_INTERNET_GATEWAY", "TRANSIT_GATEWAY"
988
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.violating_route.destination #=> String
989
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.violating_route.target #=> String
990
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.current_firewall_subnet_route_table #=> String
991
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_endpoint #=> String
992
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_firewall_endpoint #=> String
993
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_id #=> String
994
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_firewall_subnet_id #=> String
995
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_routes #=> Array
996
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_routes[0].ip_v4_cidr #=> String
997
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_routes[0].prefix_list_id #=> String
998
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_routes[0].ip_v6_cidr #=> String
999
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_routes[0].contributing_subnets #=> Array
1000
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_routes[0].contributing_subnets[0] #=> String
1001
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_routes[0].allowed_targets #=> Array
1002
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_routes[0].allowed_targets[0] #=> String
1003
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_firewall_subnet_routes[0].route_table_id #=> String
1004
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_firewall_subnet_routes #=> Array
1005
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_firewall_subnet_routes[0].destination_type #=> String, one of "IPV4", "IPV6", "PREFIX_LIST"
1006
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_firewall_subnet_routes[0].target_type #=> String, one of "GATEWAY", "CARRIER_GATEWAY", "INSTANCE", "LOCAL_GATEWAY", "NAT_GATEWAY", "NETWORK_INTERFACE", "VPC_ENDPOINT", "VPC_PEERING_CONNECTION", "EGRESS_ONLY_INTERNET_GATEWAY", "TRANSIT_GATEWAY"
1007
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_firewall_subnet_routes[0].destination #=> String
1008
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_firewall_subnet_routes[0].target #=> String
1009
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.internet_gateway_id #=> String
1010
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.current_internet_gateway_route_table #=> String
1011
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_internet_gateway_routes #=> Array
1012
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_internet_gateway_routes[0].ip_v4_cidr #=> String
1013
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_internet_gateway_routes[0].prefix_list_id #=> String
1014
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_internet_gateway_routes[0].ip_v6_cidr #=> String
1015
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_internet_gateway_routes[0].contributing_subnets #=> Array
1016
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_internet_gateway_routes[0].contributing_subnets[0] #=> String
1017
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_internet_gateway_routes[0].allowed_targets #=> Array
1018
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_internet_gateway_routes[0].allowed_targets[0] #=> String
1019
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.expected_internet_gateway_routes[0].route_table_id #=> String
1020
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_internet_gateway_routes #=> Array
1021
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_internet_gateway_routes[0].destination_type #=> String, one of "IPV4", "IPV6", "PREFIX_LIST"
1022
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_internet_gateway_routes[0].target_type #=> String, one of "GATEWAY", "CARRIER_GATEWAY", "INSTANCE", "LOCAL_GATEWAY", "NAT_GATEWAY", "NETWORK_INTERFACE", "VPC_ENDPOINT", "VPC_PEERING_CONNECTION", "EGRESS_ONLY_INTERNET_GATEWAY", "TRANSIT_GATEWAY"
1023
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_internet_gateway_routes[0].destination #=> String
1024
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.actual_internet_gateway_routes[0].target #=> String
1025
+ # resp.violation_detail.resource_violations[0].network_firewall_invalid_route_configuration_violation.vpc_id #=> String
1026
+ # resp.violation_detail.resource_violations[0].network_firewall_black_hole_route_detected_violation.violation_target #=> String
1027
+ # resp.violation_detail.resource_violations[0].network_firewall_black_hole_route_detected_violation.route_table_id #=> String
1028
+ # resp.violation_detail.resource_violations[0].network_firewall_black_hole_route_detected_violation.vpc_id #=> String
1029
+ # resp.violation_detail.resource_violations[0].network_firewall_black_hole_route_detected_violation.violating_routes #=> Array
1030
+ # resp.violation_detail.resource_violations[0].network_firewall_black_hole_route_detected_violation.violating_routes[0].destination_type #=> String, one of "IPV4", "IPV6", "PREFIX_LIST"
1031
+ # resp.violation_detail.resource_violations[0].network_firewall_black_hole_route_detected_violation.violating_routes[0].target_type #=> String, one of "GATEWAY", "CARRIER_GATEWAY", "INSTANCE", "LOCAL_GATEWAY", "NAT_GATEWAY", "NETWORK_INTERFACE", "VPC_ENDPOINT", "VPC_PEERING_CONNECTION", "EGRESS_ONLY_INTERNET_GATEWAY", "TRANSIT_GATEWAY"
1032
+ # resp.violation_detail.resource_violations[0].network_firewall_black_hole_route_detected_violation.violating_routes[0].destination #=> String
1033
+ # resp.violation_detail.resource_violations[0].network_firewall_black_hole_route_detected_violation.violating_routes[0].target #=> String
1034
+ # resp.violation_detail.resource_violations[0].network_firewall_unexpected_firewall_routes_violation.firewall_subnet_id #=> String
1035
+ # resp.violation_detail.resource_violations[0].network_firewall_unexpected_firewall_routes_violation.violating_routes #=> Array
1036
+ # resp.violation_detail.resource_violations[0].network_firewall_unexpected_firewall_routes_violation.violating_routes[0].destination_type #=> String, one of "IPV4", "IPV6", "PREFIX_LIST"
1037
+ # resp.violation_detail.resource_violations[0].network_firewall_unexpected_firewall_routes_violation.violating_routes[0].target_type #=> String, one of "GATEWAY", "CARRIER_GATEWAY", "INSTANCE", "LOCAL_GATEWAY", "NAT_GATEWAY", "NETWORK_INTERFACE", "VPC_ENDPOINT", "VPC_PEERING_CONNECTION", "EGRESS_ONLY_INTERNET_GATEWAY", "TRANSIT_GATEWAY"
1038
+ # resp.violation_detail.resource_violations[0].network_firewall_unexpected_firewall_routes_violation.violating_routes[0].destination #=> String
1039
+ # resp.violation_detail.resource_violations[0].network_firewall_unexpected_firewall_routes_violation.violating_routes[0].target #=> String
1040
+ # resp.violation_detail.resource_violations[0].network_firewall_unexpected_firewall_routes_violation.route_table_id #=> String
1041
+ # resp.violation_detail.resource_violations[0].network_firewall_unexpected_firewall_routes_violation.firewall_endpoint #=> String
1042
+ # resp.violation_detail.resource_violations[0].network_firewall_unexpected_firewall_routes_violation.vpc_id #=> String
1043
+ # resp.violation_detail.resource_violations[0].network_firewall_unexpected_gateway_routes_violation.gateway_id #=> String
1044
+ # resp.violation_detail.resource_violations[0].network_firewall_unexpected_gateway_routes_violation.violating_routes #=> Array
1045
+ # resp.violation_detail.resource_violations[0].network_firewall_unexpected_gateway_routes_violation.violating_routes[0].destination_type #=> String, one of "IPV4", "IPV6", "PREFIX_LIST"
1046
+ # resp.violation_detail.resource_violations[0].network_firewall_unexpected_gateway_routes_violation.violating_routes[0].target_type #=> String, one of "GATEWAY", "CARRIER_GATEWAY", "INSTANCE", "LOCAL_GATEWAY", "NAT_GATEWAY", "NETWORK_INTERFACE", "VPC_ENDPOINT", "VPC_PEERING_CONNECTION", "EGRESS_ONLY_INTERNET_GATEWAY", "TRANSIT_GATEWAY"
1047
+ # resp.violation_detail.resource_violations[0].network_firewall_unexpected_gateway_routes_violation.violating_routes[0].destination #=> String
1048
+ # resp.violation_detail.resource_violations[0].network_firewall_unexpected_gateway_routes_violation.violating_routes[0].target #=> String
1049
+ # resp.violation_detail.resource_violations[0].network_firewall_unexpected_gateway_routes_violation.route_table_id #=> String
1050
+ # resp.violation_detail.resource_violations[0].network_firewall_unexpected_gateway_routes_violation.vpc_id #=> String
1051
+ # resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.violation_target #=> String
1052
+ # resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.expected_routes #=> Array
1053
+ # resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.expected_routes[0].ip_v4_cidr #=> String
1054
+ # resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.expected_routes[0].prefix_list_id #=> String
1055
+ # resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.expected_routes[0].ip_v6_cidr #=> String
1056
+ # resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.expected_routes[0].contributing_subnets #=> Array
1057
+ # resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.expected_routes[0].contributing_subnets[0] #=> String
1058
+ # resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.expected_routes[0].allowed_targets #=> Array
1059
+ # resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.expected_routes[0].allowed_targets[0] #=> String
1060
+ # resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.expected_routes[0].route_table_id #=> String
1061
+ # resp.violation_detail.resource_violations[0].network_firewall_missing_expected_routes_violation.vpc_id #=> String
1062
+ # resp.violation_detail.resource_violations[0].dns_rule_group_priority_conflict_violation.violation_target #=> String
1063
+ # resp.violation_detail.resource_violations[0].dns_rule_group_priority_conflict_violation.violation_target_description #=> String
1064
+ # resp.violation_detail.resource_violations[0].dns_rule_group_priority_conflict_violation.conflicting_priority #=> Integer
1065
+ # resp.violation_detail.resource_violations[0].dns_rule_group_priority_conflict_violation.conflicting_policy_id #=> String
1066
+ # resp.violation_detail.resource_violations[0].dns_rule_group_priority_conflict_violation.unavailable_priorities #=> Array
1067
+ # resp.violation_detail.resource_violations[0].dns_rule_group_priority_conflict_violation.unavailable_priorities[0] #=> Integer
1068
+ # resp.violation_detail.resource_violations[0].dns_duplicate_rule_group_violation.violation_target #=> String
1069
+ # resp.violation_detail.resource_violations[0].dns_duplicate_rule_group_violation.violation_target_description #=> String
1070
+ # resp.violation_detail.resource_violations[0].dns_rule_group_limit_exceeded_violation.violation_target #=> String
1071
+ # resp.violation_detail.resource_violations[0].dns_rule_group_limit_exceeded_violation.violation_target_description #=> String
1072
+ # resp.violation_detail.resource_violations[0].dns_rule_group_limit_exceeded_violation.number_of_rule_groups_already_associated #=> Integer
1073
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.description #=> String
1074
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions #=> Array
1075
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].description #=> String
1076
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions #=> Array
1077
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.description #=> String
1078
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.description #=> String
1079
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.destination_cidr_block #=> String
1080
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.destination_prefix_list_id #=> String
1081
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.destination_ipv_6_cidr_block #=> String
1082
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.vpc_endpoint_id.resource_id #=> String
1083
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.vpc_endpoint_id.description #=> String
1084
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.gateway_id.resource_id #=> String
1085
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.gateway_id.description #=> String
1086
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.route_table_id.resource_id #=> String
1087
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_action.route_table_id.description #=> String
1088
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_action.description #=> String
1089
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_action.destination_cidr_block #=> String
1090
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_action.destination_prefix_list_id #=> String
1091
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_action.destination_ipv_6_cidr_block #=> String
1092
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_action.gateway_id.resource_id #=> String
1093
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_action.gateway_id.description #=> String
1094
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_action.route_table_id.resource_id #=> String
1095
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_action.route_table_id.description #=> String
1096
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_delete_route_action.description #=> String
1097
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_delete_route_action.destination_cidr_block #=> String
1098
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_delete_route_action.destination_prefix_list_id #=> String
1099
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_delete_route_action.destination_ipv_6_cidr_block #=> String
1100
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_delete_route_action.route_table_id.resource_id #=> String
1101
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_delete_route_action.route_table_id.description #=> String
1102
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_copy_route_table_action.description #=> String
1103
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_copy_route_table_action.vpc_id.resource_id #=> String
1104
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_copy_route_table_action.vpc_id.description #=> String
1105
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_copy_route_table_action.route_table_id.resource_id #=> String
1106
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_copy_route_table_action.route_table_id.description #=> String
1107
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_table_association_action.description #=> String
1108
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_table_association_action.association_id.resource_id #=> String
1109
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_table_association_action.association_id.description #=> String
1110
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_table_association_action.route_table_id.resource_id #=> String
1111
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_replace_route_table_association_action.route_table_id.description #=> String
1112
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_associate_route_table_action.description #=> String
1113
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_associate_route_table_action.route_table_id.resource_id #=> String
1114
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_associate_route_table_action.route_table_id.description #=> String
1115
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_associate_route_table_action.subnet_id.resource_id #=> String
1116
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_associate_route_table_action.subnet_id.description #=> String
1117
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_associate_route_table_action.gateway_id.resource_id #=> String
1118
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_associate_route_table_action.gateway_id.description #=> String
1119
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_table_action.description #=> String
1120
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_table_action.vpc_id.resource_id #=> String
1121
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].remediation_action.ec2_create_route_table_action.vpc_id.description #=> String
1122
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].ordered_remediation_actions[0].order #=> Integer
1123
+ # resp.violation_detail.resource_violations[0].possible_remediation_actions.actions[0].is_default_action #=> Boolean
891
1124
  # resp.violation_detail.resource_tags #=> Array
892
1125
  # resp.violation_detail.resource_tags[0].key #=> String
893
1126
  # resp.violation_detail.resource_tags[0].value #=> String
@@ -905,23 +1138,23 @@ module Aws::FMS
905
1138
  # Returns an array of `AppsListDataSummary` objects.
906
1139
  #
907
1140
  # @option params [Boolean] :default_lists
908
- # Specifies whether the lists to retrieve are default lists owned by AWS
1141
+ # Specifies whether the lists to retrieve are default lists owned by
909
1142
  # Firewall Manager.
910
1143
  #
911
1144
  # @option params [String] :next_token
912
1145
  # If you specify a value for `MaxResults` in your list request, and you
913
- # have more objects than the maximum, AWS Firewall Manager returns this
1146
+ # have more objects than the maximum, Firewall Manager returns this
914
1147
  # token in the response. For all but the first request, you provide the
915
1148
  # token returned by the prior request in the request parameters, to
916
1149
  # retrieve the next batch of objects.
917
1150
  #
918
1151
  # @option params [required, Integer] :max_results
919
- # The maximum number of objects that you want AWS Firewall Manager to
920
- # return for this request. If more objects are available, in the
921
- # response, AWS Firewall Manager provides a `NextToken` value that you
922
- # can use in a subsequent call to get the next batch of objects.
1152
+ # The maximum number of objects that you want Firewall Manager to return
1153
+ # for this request. If more objects are available, in the response,
1154
+ # Firewall Manager provides a `NextToken` value that you can use in a
1155
+ # subsequent call to get the next batch of objects.
923
1156
  #
924
- # If you don't specify this, AWS Firewall Manager returns all available
1157
+ # If you don't specify this, Firewall Manager returns all available
925
1158
  # objects.
926
1159
  #
927
1160
  # @return [Types::ListAppsListsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
@@ -929,6 +1162,8 @@ module Aws::FMS
929
1162
  # * {Types::ListAppsListsResponse#apps_lists #apps_lists} => Array<Types::AppsListDataSummary>
930
1163
  # * {Types::ListAppsListsResponse#next_token #next_token} => String
931
1164
  #
1165
+ # The returned {Seahorse::Client::Response response} is a pageable response and is Enumerable. For details on usage see {Aws::PageableResponse PageableResponse}.
1166
+ #
932
1167
  # @example Request syntax with placeholder values
933
1168
  #
934
1169
  # resp = client.list_apps_lists({
@@ -963,13 +1198,12 @@ module Aws::FMS
963
1198
  # protected by the specified policy.
964
1199
  #
965
1200
  # @option params [required, String] :policy_id
966
- # The ID of the AWS Firewall Manager policy that you want the details
967
- # for.
1201
+ # The ID of the Firewall Manager policy that you want the details for.
968
1202
  #
969
1203
  # @option params [String] :next_token
970
1204
  # If you specify a value for `MaxResults` and you have more
971
1205
  # `PolicyComplianceStatus` objects than the number that you specify for
972
- # `MaxResults`, AWS Firewall Manager returns a `NextToken` value in the
1206
+ # `MaxResults`, Firewall Manager returns a `NextToken` value in the
973
1207
  # response that allows you to list another group of
974
1208
  # `PolicyComplianceStatus` objects. For the second and subsequent
975
1209
  # `ListComplianceStatus` requests, specify the value of `NextToken` from
@@ -978,7 +1212,7 @@ module Aws::FMS
978
1212
  #
979
1213
  # @option params [Integer] :max_results
980
1214
  # Specifies the number of `PolicyComplianceStatus` objects that you want
981
- # AWS Firewall Manager to return for this request. If you have more
1215
+ # Firewall Manager to return for this request. If you have more
982
1216
  # `PolicyComplianceStatus` objects than the number that you specify for
983
1217
  # `MaxResults`, the response includes a `NextToken` value that you can
984
1218
  # use to get another batch of `PolicyComplianceStatus` objects.
@@ -1024,22 +1258,22 @@ module Aws::FMS
1024
1258
  end
1025
1259
 
1026
1260
  # Returns a `MemberAccounts` object that lists the member accounts in
1027
- # the administrator's AWS organization.
1261
+ # the administrator's Amazon Web Services organization.
1028
1262
  #
1029
1263
  # The `ListMemberAccounts` must be submitted by the account that is set
1030
- # as the AWS Firewall Manager administrator.
1264
+ # as the Firewall Manager administrator.
1031
1265
  #
1032
1266
  # @option params [String] :next_token
1033
1267
  # If you specify a value for `MaxResults` and you have more account IDs
1034
- # than the number that you specify for `MaxResults`, AWS Firewall
1035
- # Manager returns a `NextToken` value in the response that allows you to
1036
- # list another group of IDs. For the second and subsequent
1268
+ # than the number that you specify for `MaxResults`, Firewall Manager
1269
+ # returns a `NextToken` value in the response that allows you to list
1270
+ # another group of IDs. For the second and subsequent
1037
1271
  # `ListMemberAccountsRequest` requests, specify the value of `NextToken`
1038
1272
  # from the previous response to get information about another batch of
1039
1273
  # member account IDs.
1040
1274
  #
1041
1275
  # @option params [Integer] :max_results
1042
- # Specifies the number of member account IDs that you want AWS Firewall
1276
+ # Specifies the number of member account IDs that you want Firewall
1043
1277
  # Manager to return for this request. If you have more IDs than the
1044
1278
  # number that you specify for `MaxResults`, the response includes a
1045
1279
  # `NextToken` value that you can use to get another batch of member
@@ -1079,18 +1313,18 @@ module Aws::FMS
1079
1313
  # @option params [String] :next_token
1080
1314
  # If you specify a value for `MaxResults` and you have more
1081
1315
  # `PolicySummary` objects than the number that you specify for
1082
- # `MaxResults`, AWS Firewall Manager returns a `NextToken` value in the
1316
+ # `MaxResults`, Firewall Manager returns a `NextToken` value in the
1083
1317
  # response that allows you to list another group of `PolicySummary`
1084
1318
  # objects. For the second and subsequent `ListPolicies` requests,
1085
1319
  # specify the value of `NextToken` from the previous response to get
1086
1320
  # information about another batch of `PolicySummary` objects.
1087
1321
  #
1088
1322
  # @option params [Integer] :max_results
1089
- # Specifies the number of `PolicySummary` objects that you want AWS
1090
- # Firewall Manager to return for this request. If you have more
1091
- # `PolicySummary` objects than the number that you specify for
1092
- # `MaxResults`, the response includes a `NextToken` value that you can
1093
- # use to get another batch of `PolicySummary` objects.
1323
+ # Specifies the number of `PolicySummary` objects that you want Firewall
1324
+ # Manager to return for this request. If you have more `PolicySummary`
1325
+ # objects than the number that you specify for `MaxResults`, the
1326
+ # response includes a `NextToken` value that you can use to get another
1327
+ # batch of `PolicySummary` objects.
1094
1328
  #
1095
1329
  # @return [Types::ListPoliciesResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1096
1330
  #
@@ -1113,7 +1347,7 @@ module Aws::FMS
1113
1347
  # resp.policy_list[0].policy_id #=> String
1114
1348
  # resp.policy_list[0].policy_name #=> String
1115
1349
  # resp.policy_list[0].resource_type #=> String
1116
- # resp.policy_list[0].security_service_type #=> String, one of "WAF", "WAFV2", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
1350
+ # resp.policy_list[0].security_service_type #=> String, one of "WAF", "WAFV2", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT", "NETWORK_FIREWALL", "DNS_FIREWALL"
1117
1351
  # resp.policy_list[0].remediation_enabled #=> Boolean
1118
1352
  # resp.next_token #=> String
1119
1353
  #
@@ -1129,23 +1363,23 @@ module Aws::FMS
1129
1363
  # Returns an array of `ProtocolsListDataSummary` objects.
1130
1364
  #
1131
1365
  # @option params [Boolean] :default_lists
1132
- # Specifies whether the lists to retrieve are default lists owned by AWS
1366
+ # Specifies whether the lists to retrieve are default lists owned by
1133
1367
  # Firewall Manager.
1134
1368
  #
1135
1369
  # @option params [String] :next_token
1136
1370
  # If you specify a value for `MaxResults` in your list request, and you
1137
- # have more objects than the maximum, AWS Firewall Manager returns this
1371
+ # have more objects than the maximum, Firewall Manager returns this
1138
1372
  # token in the response. For all but the first request, you provide the
1139
1373
  # token returned by the prior request in the request parameters, to
1140
1374
  # retrieve the next batch of objects.
1141
1375
  #
1142
1376
  # @option params [required, Integer] :max_results
1143
- # The maximum number of objects that you want AWS Firewall Manager to
1144
- # return for this request. If more objects are available, in the
1145
- # response, AWS Firewall Manager provides a `NextToken` value that you
1146
- # can use in a subsequent call to get the next batch of objects.
1377
+ # The maximum number of objects that you want Firewall Manager to return
1378
+ # for this request. If more objects are available, in the response,
1379
+ # Firewall Manager provides a `NextToken` value that you can use in a
1380
+ # subsequent call to get the next batch of objects.
1147
1381
  #
1148
- # If you don't specify this, AWS Firewall Manager returns all available
1382
+ # If you don't specify this, Firewall Manager returns all available
1149
1383
  # objects.
1150
1384
  #
1151
1385
  # @return [Types::ListProtocolsListsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
@@ -1153,6 +1387,8 @@ module Aws::FMS
1153
1387
  # * {Types::ListProtocolsListsResponse#protocols_lists #protocols_lists} => Array<Types::ProtocolsListDataSummary>
1154
1388
  # * {Types::ListProtocolsListsResponse#next_token #next_token} => String
1155
1389
  #
1390
+ # The returned {Seahorse::Client::Response response} is a pageable response and is Enumerable. For details on usage see {Aws::PageableResponse PageableResponse}.
1391
+ #
1156
1392
  # @example Request syntax with placeholder values
1157
1393
  #
1158
1394
  # resp = client.list_protocols_lists({
@@ -1180,11 +1416,12 @@ module Aws::FMS
1180
1416
  req.send_request(options)
1181
1417
  end
1182
1418
 
1183
- # Retrieves the list of tags for the specified AWS resource.
1419
+ # Retrieves the list of tags for the specified Amazon Web Services
1420
+ # resource.
1184
1421
  #
1185
1422
  # @option params [required, String] :resource_arn
1186
1423
  # The Amazon Resource Name (ARN) of the resource to return tags for. The
1187
- # AWS Firewall Manager resources that support tagging are policies,
1424
+ # Firewall Manager resources that support tagging are policies,
1188
1425
  # applications lists, and protocols lists.
1189
1426
  #
1190
1427
  # @return [Types::ListTagsForResourceResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
@@ -1212,11 +1449,10 @@ module Aws::FMS
1212
1449
  req.send_request(options)
1213
1450
  end
1214
1451
 
1215
- # Creates an AWS Firewall Manager applications list.
1452
+ # Creates an Firewall Manager applications list.
1216
1453
  #
1217
1454
  # @option params [required, Types::AppsListData] :apps_list
1218
- # The details of the AWS Firewall Manager applications list to be
1219
- # created.
1455
+ # The details of the Firewall Manager applications list to be created.
1220
1456
  #
1221
1457
  # @option params [Array<Types::Tag>] :tag_list
1222
1458
  # The tags associated with the resource.
@@ -1288,15 +1524,25 @@ module Aws::FMS
1288
1524
  end
1289
1525
 
1290
1526
  # Designates the IAM role and Amazon Simple Notification Service (SNS)
1291
- # topic that AWS Firewall Manager uses to record SNS logs.
1527
+ # topic that Firewall Manager uses to record SNS logs.
1528
+ #
1529
+ # To perform this action outside of the console, you must configure the
1530
+ # SNS topic to allow the Firewall Manager role `AWSServiceRoleForFMS` to
1531
+ # publish SNS logs. For more information, see [Firewall Manager required
1532
+ # permissions for API actions][1] in the *Firewall Manager Developer
1533
+ # Guide*.
1534
+ #
1535
+ #
1536
+ #
1537
+ # [1]: https://docs.aws.amazon.com/waf/latest/developerguide/fms-api-permissions-ref.html
1292
1538
  #
1293
1539
  # @option params [required, String] :sns_topic_arn
1294
1540
  # The Amazon Resource Name (ARN) of the SNS topic that collects
1295
- # notifications from AWS Firewall Manager.
1541
+ # notifications from Firewall Manager.
1296
1542
  #
1297
1543
  # @option params [required, String] :sns_role_name
1298
1544
  # The Amazon Resource Name (ARN) of the IAM role that allows Amazon SNS
1299
- # to record AWS Firewall Manager activity.
1545
+ # to record Firewall Manager activity.
1300
1546
  #
1301
1547
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
1302
1548
  #
@@ -1316,21 +1562,27 @@ module Aws::FMS
1316
1562
  req.send_request(options)
1317
1563
  end
1318
1564
 
1319
- # Creates an AWS Firewall Manager policy.
1565
+ # Creates an Firewall Manager policy.
1320
1566
  #
1321
1567
  # Firewall Manager provides the following types of policies:
1322
1568
  #
1323
- # * A Shield Advanced policy, which applies Shield Advanced protection
1324
- # to specified accounts and resources
1569
+ # * An WAF policy (type WAFV2), which defines rule groups to run first
1570
+ # in the corresponding WAF web ACL and rule groups to run last in the
1571
+ # web ACL.
1325
1572
  #
1326
- # * An AWS WAF policy (type WAFV2), which defines rule groups to run
1327
- # first in the corresponding AWS WAF web ACL and rule groups to run
1328
- # last in the web ACL.
1573
+ # * An WAF Classic policy (type WAF), which defines a rule group.
1329
1574
  #
1330
- # * An AWS WAF Classic policy (type WAF), which defines a rule group.
1575
+ # * A Shield Advanced policy, which applies Shield Advanced protection
1576
+ # to specified accounts and resources.
1331
1577
  #
1332
1578
  # * A security group policy, which manages VPC security groups across
1333
- # your AWS organization.
1579
+ # your Amazon Web Services organization.
1580
+ #
1581
+ # * An Network Firewall policy, which provides firewall rules to filter
1582
+ # network traffic in specified Amazon VPCs.
1583
+ #
1584
+ # * A DNS Firewall policy, which provides Route 53 Resolver DNS Firewall
1585
+ # rules to filter DNS queries for specified VPCs.
1334
1586
  #
1335
1587
  # Each policy is specific to one of the types. If you want to enforce
1336
1588
  # more than one policy type across accounts, create multiple policies.
@@ -1345,10 +1597,10 @@ module Aws::FMS
1345
1597
  # [1]: https://docs.aws.amazon.com/waf/latest/DDOSAPIReference/API_CreateSubscription.html
1346
1598
  #
1347
1599
  # @option params [required, Types::Policy] :policy
1348
- # The details of the AWS Firewall Manager policy to be created.
1600
+ # The details of the Firewall Manager policy to be created.
1349
1601
  #
1350
1602
  # @option params [Array<Types::Tag>] :tag_list
1351
- # The tags to add to the AWS resource.
1603
+ # The tags to add to the Amazon Web Services resource.
1352
1604
  #
1353
1605
  # @return [Types::PutPolicyResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1354
1606
  #
@@ -1363,7 +1615,7 @@ module Aws::FMS
1363
1615
  # policy_name: "ResourceName", # required
1364
1616
  # policy_update_token: "PolicyUpdateToken",
1365
1617
  # security_service_policy_data: { # required
1366
- # type: "WAF", # required, accepts WAF, WAFV2, SHIELD_ADVANCED, SECURITY_GROUPS_COMMON, SECURITY_GROUPS_CONTENT_AUDIT, SECURITY_GROUPS_USAGE_AUDIT
1618
+ # type: "WAF", # required, accepts WAF, WAFV2, SHIELD_ADVANCED, SECURITY_GROUPS_COMMON, SECURITY_GROUPS_CONTENT_AUDIT, SECURITY_GROUPS_USAGE_AUDIT, NETWORK_FIREWALL, DNS_FIREWALL
1367
1619
  # managed_service_data: "ManagedServiceData",
1368
1620
  # },
1369
1621
  # resource_type: "ResourceType", # required
@@ -1396,7 +1648,7 @@ module Aws::FMS
1396
1648
  # resp.policy.policy_id #=> String
1397
1649
  # resp.policy.policy_name #=> String
1398
1650
  # resp.policy.policy_update_token #=> String
1399
- # resp.policy.security_service_policy_data.type #=> String, one of "WAF", "WAFV2", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
1651
+ # resp.policy.security_service_policy_data.type #=> String, one of "WAF", "WAFV2", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT", "NETWORK_FIREWALL", "DNS_FIREWALL"
1400
1652
  # resp.policy.security_service_policy_data.managed_service_data #=> String
1401
1653
  # resp.policy.resource_type #=> String
1402
1654
  # resp.policy.resource_type_list #=> Array
@@ -1423,10 +1675,10 @@ module Aws::FMS
1423
1675
  req.send_request(options)
1424
1676
  end
1425
1677
 
1426
- # Creates an AWS Firewall Manager protocols list.
1678
+ # Creates an Firewall Manager protocols list.
1427
1679
  #
1428
1680
  # @option params [required, Types::ProtocolsListData] :protocols_list
1429
- # The details of the AWS Firewall Manager protocols list to be created.
1681
+ # The details of the Firewall Manager protocols list to be created.
1430
1682
  #
1431
1683
  # @option params [Array<Types::Tag>] :tag_list
1432
1684
  # The tags associated with the resource.
@@ -1481,11 +1733,11 @@ module Aws::FMS
1481
1733
  req.send_request(options)
1482
1734
  end
1483
1735
 
1484
- # Adds one or more tags to an AWS resource.
1736
+ # Adds one or more tags to an Amazon Web Services resource.
1485
1737
  #
1486
1738
  # @option params [required, String] :resource_arn
1487
1739
  # The Amazon Resource Name (ARN) of the resource to return tags for. The
1488
- # AWS Firewall Manager resources that support tagging are policies,
1740
+ # Firewall Manager resources that support tagging are policies,
1489
1741
  # applications lists, and protocols lists.
1490
1742
  #
1491
1743
  # @option params [required, Array<Types::Tag>] :tag_list
@@ -1514,11 +1766,11 @@ module Aws::FMS
1514
1766
  req.send_request(options)
1515
1767
  end
1516
1768
 
1517
- # Removes one or more tags from an AWS resource.
1769
+ # Removes one or more tags from an Amazon Web Services resource.
1518
1770
  #
1519
1771
  # @option params [required, String] :resource_arn
1520
1772
  # The Amazon Resource Name (ARN) of the resource to return tags for. The
1521
- # AWS Firewall Manager resources that support tagging are policies,
1773
+ # Firewall Manager resources that support tagging are policies,
1522
1774
  # applications lists, and protocols lists.
1523
1775
  #
1524
1776
  # @option params [required, Array<String>] :tag_keys
@@ -1555,7 +1807,7 @@ module Aws::FMS
1555
1807
  params: params,
1556
1808
  config: config)
1557
1809
  context[:gem_name] = 'aws-sdk-fms'
1558
- context[:gem_version] = '1.32.0'
1810
+ context[:gem_version] = '1.37.0'
1559
1811
  Seahorse::Client::Request.new(handlers, context)
1560
1812
  end
1561
1813