aws-sdk-fms 1.67.0 → 1.68.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -100,7 +100,7 @@ module Aws::FMS
100
100
  #
101
101
  # @!attribute [rw] status
102
102
  # The current status of the request to onboard a member account as an
103
- # Firewall Manager administator.
103
+ # Firewall Manager administrator.
104
104
  #
105
105
  # * `ONBOARDING` - The account is onboarding to Firewall Manager as an
106
106
  # administrator.
@@ -528,6 +528,67 @@ module Aws::FMS
528
528
  include Aws::Structure
529
529
  end
530
530
 
531
+ # Information about the `CreateNetworkAcl` action in Amazon EC2. This is
532
+ # a remediation option in `RemediationAction`.
533
+ #
534
+ # @!attribute [rw] description
535
+ # Brief description of this remediation action.
536
+ # @return [String]
537
+ #
538
+ # @!attribute [rw] vpc
539
+ # The VPC that's associated with the remediation action.
540
+ # @return [Types::ActionTarget]
541
+ #
542
+ # @!attribute [rw] fms_can_remediate
543
+ # Indicates whether it is possible for Firewall Manager to perform
544
+ # this remediation action. A false value indicates that auto
545
+ # remediation is disabled or Firewall Manager is unable to perform the
546
+ # action due to a conflict of some kind.
547
+ # @return [Boolean]
548
+ #
549
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/CreateNetworkAclAction AWS API Documentation
550
+ #
551
+ class CreateNetworkAclAction < Struct.new(
552
+ :description,
553
+ :vpc,
554
+ :fms_can_remediate)
555
+ SENSITIVE = []
556
+ include Aws::Structure
557
+ end
558
+
559
+ # Information about the `CreateNetworkAclEntries` action in Amazon EC2.
560
+ # This is a remediation option in `RemediationAction`.
561
+ #
562
+ # @!attribute [rw] description
563
+ # Brief description of this remediation action.
564
+ # @return [String]
565
+ #
566
+ # @!attribute [rw] network_acl_id
567
+ # The network ACL that's associated with the remediation action.
568
+ # @return [Types::ActionTarget]
569
+ #
570
+ # @!attribute [rw] network_acl_entries_to_be_created
571
+ # Lists the entries that the remediation action would create.
572
+ # @return [Array<Types::EntryDescription>]
573
+ #
574
+ # @!attribute [rw] fms_can_remediate
575
+ # Indicates whether it is possible for Firewall Manager to perform
576
+ # this remediation action. A false value indicates that auto
577
+ # remediation is disabled or Firewall Manager is unable to perform the
578
+ # action due to a conflict of some kind.
579
+ # @return [Boolean]
580
+ #
581
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/CreateNetworkAclEntriesAction AWS API Documentation
582
+ #
583
+ class CreateNetworkAclEntriesAction < Struct.new(
584
+ :description,
585
+ :network_acl_id,
586
+ :network_acl_entries_to_be_created,
587
+ :fms_can_remediate)
588
+ SENSITIVE = []
589
+ include Aws::Structure
590
+ end
591
+
531
592
  # @!attribute [rw] list_id
532
593
  # The ID of the applications list that you want to delete. You can
533
594
  # retrieve this ID from `PutAppsList`, `ListAppsLists`, and
@@ -542,6 +603,39 @@ module Aws::FMS
542
603
  include Aws::Structure
543
604
  end
544
605
 
606
+ # Information about the `DeleteNetworkAclEntries` action in Amazon EC2.
607
+ # This is a remediation option in `RemediationAction`.
608
+ #
609
+ # @!attribute [rw] description
610
+ # Brief description of this remediation action.
611
+ # @return [String]
612
+ #
613
+ # @!attribute [rw] network_acl_id
614
+ # The network ACL that's associated with the remediation action.
615
+ # @return [Types::ActionTarget]
616
+ #
617
+ # @!attribute [rw] network_acl_entries_to_be_deleted
618
+ # Lists the entries that the remediation action would delete.
619
+ # @return [Array<Types::EntryDescription>]
620
+ #
621
+ # @!attribute [rw] fms_can_remediate
622
+ # Indicates whether it is possible for Firewall Manager to perform
623
+ # this remediation action. A false value indicates that auto
624
+ # remediation is disabled or Firewall Manager is unable to perform the
625
+ # action due to a conflict of some kind.
626
+ # @return [Boolean]
627
+ #
628
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/DeleteNetworkAclEntriesAction AWS API Documentation
629
+ #
630
+ class DeleteNetworkAclEntriesAction < Struct.new(
631
+ :description,
632
+ :network_acl_id,
633
+ :network_acl_entries_to_be_deleted,
634
+ :fms_can_remediate)
635
+ SENSITIVE = []
636
+ include Aws::Structure
637
+ end
638
+
545
639
  # @api private
546
640
  #
547
641
  # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/DeleteNotificationChannelRequest AWS API Documentation
@@ -1014,6 +1108,96 @@ module Aws::FMS
1014
1108
  include Aws::Structure
1015
1109
  end
1016
1110
 
1111
+ # Describes a single rule in a network ACL.
1112
+ #
1113
+ # @!attribute [rw] entry_detail
1114
+ # Describes a rule in a network ACL.
1115
+ #
1116
+ # Each network ACL has a set of numbered ingress rules and a separate
1117
+ # set of numbered egress rules. When determining whether a packet
1118
+ # should be allowed in or out of a subnet associated with the network
1119
+ # ACL, Amazon Web Services processes the entries in the network ACL
1120
+ # according to the rule numbers, in ascending order.
1121
+ #
1122
+ # When you manage an individual network ACL, you explicitly specify
1123
+ # the rule numbers. When you specify the network ACL rules in a
1124
+ # Firewall Manager policy, you provide the rules to run first, in the
1125
+ # order that you want them to run, and the rules to run last, in the
1126
+ # order that you want them to run. Firewall Manager assigns the rule
1127
+ # numbers for you when you save the network ACL policy specification.
1128
+ # @return [Types::NetworkAclEntry]
1129
+ #
1130
+ # @!attribute [rw] entry_rule_number
1131
+ # The rule number for the entry. ACL entries are processed in
1132
+ # ascending order by rule number. In a Firewall Manager network ACL
1133
+ # policy, Firewall Manager assigns rule numbers.
1134
+ # @return [Integer]
1135
+ #
1136
+ # @!attribute [rw] entry_type
1137
+ # Specifies whether the entry is managed by Firewall Manager or by a
1138
+ # user, and, for Firewall Manager-managed entries, specifies whether
1139
+ # the entry is among those that run first in the network ACL or those
1140
+ # that run last.
1141
+ # @return [String]
1142
+ #
1143
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/EntryDescription AWS API Documentation
1144
+ #
1145
+ class EntryDescription < Struct.new(
1146
+ :entry_detail,
1147
+ :entry_rule_number,
1148
+ :entry_type)
1149
+ SENSITIVE = []
1150
+ include Aws::Structure
1151
+ end
1152
+
1153
+ # Detailed information about an entry violation in a network ACL. The
1154
+ # violation is against the network ACL specification inside the Firewall
1155
+ # Manager network ACL policy. This data object is part of
1156
+ # `InvalidNetworkAclEntriesViolation`.
1157
+ #
1158
+ # @!attribute [rw] expected_entry
1159
+ # The Firewall Manager-managed network ACL entry that is involved in
1160
+ # the entry violation.
1161
+ # @return [Types::EntryDescription]
1162
+ #
1163
+ # @!attribute [rw] expected_evaluation_order
1164
+ # The evaluation location within the ordered list of entries where the
1165
+ # `ExpectedEntry` should be, according to the network ACL policy
1166
+ # specifications.
1167
+ # @return [String]
1168
+ #
1169
+ # @!attribute [rw] actual_evaluation_order
1170
+ # The evaluation location within the ordered list of entries where the
1171
+ # `ExpectedEntry` is currently located.
1172
+ # @return [String]
1173
+ #
1174
+ # @!attribute [rw] entry_at_expected_evaluation_order
1175
+ # The entry that's currently in the `ExpectedEvaluationOrder`
1176
+ # location, in place of the expected entry.
1177
+ # @return [Types::EntryDescription]
1178
+ #
1179
+ # @!attribute [rw] entries_with_conflicts
1180
+ # The list of entries that are in conflict with `ExpectedEntry`.
1181
+ # @return [Array<Types::EntryDescription>]
1182
+ #
1183
+ # @!attribute [rw] entry_violation_reasons
1184
+ # Descriptions of the violations that Firewall Manager found for these
1185
+ # entries.
1186
+ # @return [Array<String>]
1187
+ #
1188
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/EntryViolation AWS API Documentation
1189
+ #
1190
+ class EntryViolation < Struct.new(
1191
+ :expected_entry,
1192
+ :expected_evaluation_order,
1193
+ :actual_evaluation_order,
1194
+ :entry_at_expected_evaluation_order,
1195
+ :entries_with_conflicts,
1196
+ :entry_violation_reasons)
1197
+ SENSITIVE = []
1198
+ include Aws::Structure
1199
+ end
1200
+
1017
1201
  # Describes the compliance status for the account. An account is
1018
1202
  # considered noncompliant if it includes resources that are not
1019
1203
  # protected by the specified policy or that don't comply with the
@@ -1230,7 +1414,7 @@ module Aws::FMS
1230
1414
  end
1231
1415
 
1232
1416
  # @!attribute [rw] admin_account
1233
- # The administator account that you want to get the details for.
1417
+ # The administrator account that you want to get the details for.
1234
1418
  # @return [String]
1235
1419
  #
1236
1420
  # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/GetAdminScopeRequest AWS API Documentation
@@ -1248,7 +1432,7 @@ module Aws::FMS
1248
1432
  #
1249
1433
  # @!attribute [rw] status
1250
1434
  # The current status of the request to onboard a member account as an
1251
- # Firewall Manager administator.
1435
+ # Firewall Manager administrator.
1252
1436
  #
1253
1437
  # * `ONBOARDING` - The account is onboarding to Firewall Manager as an
1254
1438
  # administrator.
@@ -1637,6 +1821,8 @@ module Aws::FMS
1637
1821
  #
1638
1822
  # * Security group content audit
1639
1823
  #
1824
+ # * Network ACL
1825
+ #
1640
1826
  # * Third-party firewall
1641
1827
  # @return [String]
1642
1828
  #
@@ -1710,6 +1896,40 @@ module Aws::FMS
1710
1896
  include Aws::Structure
1711
1897
  end
1712
1898
 
1899
+ # Violation detail for the entries in a network ACL resource.
1900
+ #
1901
+ # @!attribute [rw] vpc
1902
+ # The VPC where the violation was found.
1903
+ # @return [String]
1904
+ #
1905
+ # @!attribute [rw] subnet
1906
+ # The subnet that's associated with the network ACL.
1907
+ # @return [String]
1908
+ #
1909
+ # @!attribute [rw] subnet_availability_zone
1910
+ # The Availability Zone where the network ACL is in use.
1911
+ # @return [String]
1912
+ #
1913
+ # @!attribute [rw] current_associated_network_acl
1914
+ # The network ACL containing the entry violations.
1915
+ # @return [String]
1916
+ #
1917
+ # @!attribute [rw] entry_violations
1918
+ # Detailed information about the entry violations in the network ACL.
1919
+ # @return [Array<Types::EntryViolation>]
1920
+ #
1921
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/InvalidNetworkAclEntriesViolation AWS API Documentation
1922
+ #
1923
+ class InvalidNetworkAclEntriesViolation < Struct.new(
1924
+ :vpc,
1925
+ :subnet,
1926
+ :subnet_availability_zone,
1927
+ :current_associated_network_acl,
1928
+ :entry_violations)
1929
+ SENSITIVE = []
1930
+ include Aws::Structure
1931
+ end
1932
+
1713
1933
  # The operation failed because there was nothing to do or the operation
1714
1934
  # wasn't possible. For example, you might have submitted an
1715
1935
  # `AssociateAdminAccount` request for an account ID that was already set
@@ -2351,6 +2571,199 @@ module Aws::FMS
2351
2571
  include Aws::Structure
2352
2572
  end
2353
2573
 
2574
+ # Defines a Firewall Manager network ACL policy. This is used in the
2575
+ # `PolicyOption` of a `SecurityServicePolicyData` for a `Policy`, when
2576
+ # the `SecurityServicePolicyData` type is set to `NETWORK_ACL_COMMON`.
2577
+ #
2578
+ # For information about network ACLs, see [Control traffic to subnets
2579
+ # using network ACLs][1] in the *Amazon Virtual Private Cloud User
2580
+ # Guide*.
2581
+ #
2582
+ #
2583
+ #
2584
+ # [1]: https://docs.aws.amazon.com/vpc/latest/userguide/vpc-network-acls.html
2585
+ #
2586
+ # @!attribute [rw] network_acl_entry_set
2587
+ # The definition of the first and last rules for the network ACL
2588
+ # policy.
2589
+ # @return [Types::NetworkAclEntrySet]
2590
+ #
2591
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/NetworkAclCommonPolicy AWS API Documentation
2592
+ #
2593
+ class NetworkAclCommonPolicy < Struct.new(
2594
+ :network_acl_entry_set)
2595
+ SENSITIVE = []
2596
+ include Aws::Structure
2597
+ end
2598
+
2599
+ # Describes a rule in a network ACL.
2600
+ #
2601
+ # Each network ACL has a set of numbered ingress rules and a separate
2602
+ # set of numbered egress rules. When determining whether a packet should
2603
+ # be allowed in or out of a subnet associated with the network ACL,
2604
+ # Amazon Web Services processes the entries in the network ACL according
2605
+ # to the rule numbers, in ascending order.
2606
+ #
2607
+ # When you manage an individual network ACL, you explicitly specify the
2608
+ # rule numbers. When you specify the network ACL rules in a Firewall
2609
+ # Manager policy, you provide the rules to run first, in the order that
2610
+ # you want them to run, and the rules to run last, in the order that you
2611
+ # want them to run. Firewall Manager assigns the rule numbers for you
2612
+ # when you save the network ACL policy specification.
2613
+ #
2614
+ # @!attribute [rw] icmp_type_code
2615
+ # ICMP protocol: The ICMP type and code.
2616
+ # @return [Types::NetworkAclIcmpTypeCode]
2617
+ #
2618
+ # @!attribute [rw] protocol
2619
+ # The protocol number. A value of "-1" means all protocols.
2620
+ # @return [String]
2621
+ #
2622
+ # @!attribute [rw] port_range
2623
+ # TCP or UDP protocols: The range of ports the rule applies to.
2624
+ # @return [Types::NetworkAclPortRange]
2625
+ #
2626
+ # @!attribute [rw] cidr_block
2627
+ # The IPv4 network range to allow or deny, in CIDR notation.
2628
+ # @return [String]
2629
+ #
2630
+ # @!attribute [rw] ipv_6_cidr_block
2631
+ # The IPv6 network range to allow or deny, in CIDR notation.
2632
+ # @return [String]
2633
+ #
2634
+ # @!attribute [rw] rule_action
2635
+ # Indicates whether to allow or deny the traffic that matches the
2636
+ # rule.
2637
+ # @return [String]
2638
+ #
2639
+ # @!attribute [rw] egress
2640
+ # Indicates whether the rule is an egress, or outbound, rule (applied
2641
+ # to traffic leaving the subnet). If it's not an egress rule, then
2642
+ # it's an ingress, or inbound, rule.
2643
+ # @return [Boolean]
2644
+ #
2645
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/NetworkAclEntry AWS API Documentation
2646
+ #
2647
+ class NetworkAclEntry < Struct.new(
2648
+ :icmp_type_code,
2649
+ :protocol,
2650
+ :port_range,
2651
+ :cidr_block,
2652
+ :ipv_6_cidr_block,
2653
+ :rule_action,
2654
+ :egress)
2655
+ SENSITIVE = []
2656
+ include Aws::Structure
2657
+ end
2658
+
2659
+ # The configuration of the first and last rules for the network ACL
2660
+ # policy, and the remediation settings for each.
2661
+ #
2662
+ # @!attribute [rw] first_entries
2663
+ # The rules that you want to run first in the Firewall Manager managed
2664
+ # network ACLs.
2665
+ #
2666
+ # <note markdown="1"> Provide these in the order in which you want them to run. Firewall
2667
+ # Manager will assign the specific rule numbers for you, in the
2668
+ # network ACLs that it creates.
2669
+ #
2670
+ # </note>
2671
+ # @return [Array<Types::NetworkAclEntry>]
2672
+ #
2673
+ # @!attribute [rw] force_remediate_for_first_entries
2674
+ # Applies only when remediation is enabled for the policy as a whole.
2675
+ # Firewall Manager uses this setting when it finds policy violations
2676
+ # that involve conflicts between the custom entries and the policy
2677
+ # entries.
2678
+ #
2679
+ # If forced remediation is disabled, Firewall Manager marks the
2680
+ # network ACL as noncompliant and does not try to remediate. For more
2681
+ # information about the remediation behavior, see [Network access
2682
+ # control list (ACL) policies][1] in the *Firewall Manager Developer
2683
+ # Guide*.
2684
+ #
2685
+ #
2686
+ #
2687
+ # [1]: https://docs.aws.amazon.com/waf/latest/developerguide/network-acl-policies.html
2688
+ # @return [Boolean]
2689
+ #
2690
+ # @!attribute [rw] last_entries
2691
+ # The rules that you want to run last in the Firewall Manager managed
2692
+ # network ACLs.
2693
+ #
2694
+ # <note markdown="1"> Provide these in the order in which you want them to run. Firewall
2695
+ # Manager will assign the specific rule numbers for you, in the
2696
+ # network ACLs that it creates.
2697
+ #
2698
+ # </note>
2699
+ # @return [Array<Types::NetworkAclEntry>]
2700
+ #
2701
+ # @!attribute [rw] force_remediate_for_last_entries
2702
+ # Applies only when remediation is enabled for the policy as a whole.
2703
+ # Firewall Manager uses this setting when it finds policy violations
2704
+ # that involve conflicts between the custom entries and the policy
2705
+ # entries.
2706
+ #
2707
+ # If forced remediation is disabled, Firewall Manager marks the
2708
+ # network ACL as noncompliant and does not try to remediate. For more
2709
+ # information about the remediation behavior, see [Network access
2710
+ # control list (ACL) policies][1] in the *Firewall Manager Developer
2711
+ # Guide*.
2712
+ #
2713
+ #
2714
+ #
2715
+ # [1]: https://docs.aws.amazon.com/waf/latest/developerguide/network-acl-policies.html
2716
+ # @return [Boolean]
2717
+ #
2718
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/NetworkAclEntrySet AWS API Documentation
2719
+ #
2720
+ class NetworkAclEntrySet < Struct.new(
2721
+ :first_entries,
2722
+ :force_remediate_for_first_entries,
2723
+ :last_entries,
2724
+ :force_remediate_for_last_entries)
2725
+ SENSITIVE = []
2726
+ include Aws::Structure
2727
+ end
2728
+
2729
+ # ICMP protocol: The ICMP type and code.
2730
+ #
2731
+ # @!attribute [rw] code
2732
+ # ICMP code.
2733
+ # @return [Integer]
2734
+ #
2735
+ # @!attribute [rw] type
2736
+ # ICMP type.
2737
+ # @return [Integer]
2738
+ #
2739
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/NetworkAclIcmpTypeCode AWS API Documentation
2740
+ #
2741
+ class NetworkAclIcmpTypeCode < Struct.new(
2742
+ :code,
2743
+ :type)
2744
+ SENSITIVE = []
2745
+ include Aws::Structure
2746
+ end
2747
+
2748
+ # TCP or UDP protocols: The range of ports the rule applies to.
2749
+ #
2750
+ # @!attribute [rw] from
2751
+ # The beginning port number of the range.
2752
+ # @return [Integer]
2753
+ #
2754
+ # @!attribute [rw] to
2755
+ # The ending port number of the range.
2756
+ # @return [Integer]
2757
+ #
2758
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/NetworkAclPortRange AWS API Documentation
2759
+ #
2760
+ class NetworkAclPortRange < Struct.new(
2761
+ :from,
2762
+ :to)
2763
+ SENSITIVE = []
2764
+ include Aws::Structure
2765
+ end
2766
+
2354
2767
  # Violation detail for an internet gateway route with an inactive state
2355
2768
  # in the customer subnet route table or Network Firewall subnet route
2356
2769
  # table.
@@ -2997,17 +3410,19 @@ module Aws::FMS
2997
3410
  # `AWS::ElasticLoadBalancingV2::LoadBalancer`, and
2998
3411
  # `AWS::CloudFront::Distribution`.
2999
3412
  #
3000
- # * DNS Firewall, Network Firewall, and third-party firewall -
3001
- # `AWS::EC2::VPC`.
3002
- #
3003
3413
  # * Shield Advanced - `AWS::ElasticLoadBalancingV2::LoadBalancer`,
3004
3414
  # `AWS::ElasticLoadBalancing::LoadBalancer`, `AWS::EC2::EIP`, and
3005
3415
  # `AWS::CloudFront::Distribution`.
3006
3416
  #
3417
+ # * Network ACL - `AWS::EC2::Subnet`.
3418
+ #
3419
+ # * Security group usage audit - `AWS::EC2::SecurityGroup`.
3420
+ #
3007
3421
  # * Security group content audit - `AWS::EC2::SecurityGroup`,
3008
3422
  # `AWS::EC2::NetworkInterface`, and `AWS::EC2::Instance`.
3009
3423
  #
3010
- # * Security group usage audit - `AWS::EC2::SecurityGroup`.
3424
+ # * DNS Firewall, Network Firewall, and third-party firewall -
3425
+ # `AWS::EC2::VPC`.
3011
3426
  #
3012
3427
  #
3013
3428
  #
@@ -3257,8 +3672,9 @@ module Aws::FMS
3257
3672
  include Aws::Structure
3258
3673
  end
3259
3674
 
3260
- # Contains the Network Firewall firewall policy options to configure the
3261
- # policy's deployment model and third-party firewall policy settings.
3675
+ # Contains the settings to configure a network ACL policy, a Network
3676
+ # Firewall firewall policy deployment model, or a third-party firewall
3677
+ # policy.
3262
3678
  #
3263
3679
  # @!attribute [rw] network_firewall_policy
3264
3680
  # Defines the deployment model to use for the firewall policy.
@@ -3268,11 +3684,16 @@ module Aws::FMS
3268
3684
  # Defines the policy options for a third-party firewall policy.
3269
3685
  # @return [Types::ThirdPartyFirewallPolicy]
3270
3686
  #
3687
+ # @!attribute [rw] network_acl_common_policy
3688
+ # Defines a Firewall Manager network ACL policy.
3689
+ # @return [Types::NetworkAclCommonPolicy]
3690
+ #
3271
3691
  # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/PolicyOption AWS API Documentation
3272
3692
  #
3273
3693
  class PolicyOption < Struct.new(
3274
3694
  :network_firewall_policy,
3275
- :third_party_firewall_policy)
3695
+ :third_party_firewall_policy,
3696
+ :network_acl_common_policy)
3276
3697
  SENSITIVE = []
3277
3698
  include Aws::Structure
3278
3699
  end
@@ -3294,16 +3715,7 @@ module Aws::FMS
3294
3715
  # @!attribute [rw] resource_type
3295
3716
  # The type of resource protected by or in scope of the policy. This is
3296
3717
  # in the format shown in the [Amazon Web Services Resource Types
3297
- # Reference][1]. For WAF and Shield Advanced, examples include
3298
- # `AWS::ElasticLoadBalancingV2::LoadBalancer` and
3299
- # `AWS::CloudFront::Distribution`. For a security group common policy,
3300
- # valid values are `AWS::EC2::NetworkInterface` and
3301
- # `AWS::EC2::Instance`. For a security group content audit policy,
3302
- # valid values are `AWS::EC2::SecurityGroup`,
3303
- # `AWS::EC2::NetworkInterface`, and `AWS::EC2::Instance`. For a
3304
- # security group usage audit policy, the value is
3305
- # `AWS::EC2::SecurityGroup`. For an Network Firewall policy or DNS
3306
- # Firewall policy, the value is `AWS::EC2::VPC`.
3718
+ # Reference][1].
3307
3719
  #
3308
3720
  #
3309
3721
  #
@@ -3760,6 +4172,25 @@ module Aws::FMS
3760
4172
  # The remedial action to take when updating a firewall configuration.
3761
4173
  # @return [Types::FMSPolicyUpdateFirewallCreationConfigAction]
3762
4174
  #
4175
+ # @!attribute [rw] create_network_acl_action
4176
+ # Information about the `CreateNetworkAcl` action in Amazon EC2.
4177
+ # @return [Types::CreateNetworkAclAction]
4178
+ #
4179
+ # @!attribute [rw] replace_network_acl_association_action
4180
+ # Information about the `ReplaceNetworkAclAssociation` action in
4181
+ # Amazon EC2.
4182
+ # @return [Types::ReplaceNetworkAclAssociationAction]
4183
+ #
4184
+ # @!attribute [rw] create_network_acl_entries_action
4185
+ # Information about the `CreateNetworkAclEntries` action in Amazon
4186
+ # EC2.
4187
+ # @return [Types::CreateNetworkAclEntriesAction]
4188
+ #
4189
+ # @!attribute [rw] delete_network_acl_entries_action
4190
+ # Information about the `DeleteNetworkAclEntries` action in Amazon
4191
+ # EC2.
4192
+ # @return [Types::DeleteNetworkAclEntriesAction]
4193
+ #
3763
4194
  # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/RemediationAction AWS API Documentation
3764
4195
  #
3765
4196
  class RemediationAction < Struct.new(
@@ -3771,7 +4202,11 @@ module Aws::FMS
3771
4202
  :ec2_replace_route_table_association_action,
3772
4203
  :ec2_associate_route_table_action,
3773
4204
  :ec2_create_route_table_action,
3774
- :fms_policy_update_firewall_creation_config_action)
4205
+ :fms_policy_update_firewall_creation_config_action,
4206
+ :create_network_acl_action,
4207
+ :replace_network_acl_association_action,
4208
+ :create_network_acl_entries_action,
4209
+ :delete_network_acl_entries_action)
3775
4210
  SENSITIVE = []
3776
4211
  include Aws::Structure
3777
4212
  end
@@ -3795,6 +4230,39 @@ module Aws::FMS
3795
4230
  include Aws::Structure
3796
4231
  end
3797
4232
 
4233
+ # Information about the `ReplaceNetworkAclAssociation` action in Amazon
4234
+ # EC2. This is a remediation option in `RemediationAction`.
4235
+ #
4236
+ # @!attribute [rw] description
4237
+ # Brief description of this remediation action.
4238
+ # @return [String]
4239
+ #
4240
+ # @!attribute [rw] association_id
4241
+ # Describes a remediation action target.
4242
+ # @return [Types::ActionTarget]
4243
+ #
4244
+ # @!attribute [rw] network_acl_id
4245
+ # The network ACL that's associated with the remediation action.
4246
+ # @return [Types::ActionTarget]
4247
+ #
4248
+ # @!attribute [rw] fms_can_remediate
4249
+ # Indicates whether it is possible for Firewall Manager to perform
4250
+ # this remediation action. A false value indicates that auto
4251
+ # remediation is disabled or Firewall Manager is unable to perform the
4252
+ # action due to a conflict of some kind.
4253
+ # @return [Boolean]
4254
+ #
4255
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/ReplaceNetworkAclAssociationAction AWS API Documentation
4256
+ #
4257
+ class ReplaceNetworkAclAssociationAction < Struct.new(
4258
+ :description,
4259
+ :association_id,
4260
+ :network_acl_id,
4261
+ :fms_can_remediate)
4262
+ SENSITIVE = []
4263
+ include Aws::Structure
4264
+ end
4265
+
3798
4266
  # Details of a resource that is associated to an Firewall Manager
3799
4267
  # resource set.
3800
4268
  #
@@ -4067,12 +4535,6 @@ module Aws::FMS
4067
4535
  # and failed.
4068
4536
  # @return [Types::DnsRuleGroupLimitExceededViolation]
4069
4537
  #
4070
- # @!attribute [rw] possible_remediation_actions
4071
- # A list of possible remediation action lists. Each individual
4072
- # possible remediation action is a list of individual remediation
4073
- # actions.
4074
- # @return [Types::PossibleRemediationActions]
4075
- #
4076
4538
  # @!attribute [rw] firewall_subnet_is_out_of_scope_violation
4077
4539
  # Contains details about the firewall subnet that violates the policy
4078
4540
  # scope.
@@ -4104,6 +4566,16 @@ module Aws::FMS
4104
4566
  # subnet that was deleted.
4105
4567
  # @return [Types::FirewallSubnetMissingVPCEndpointViolation]
4106
4568
  #
4569
+ # @!attribute [rw] invalid_network_acl_entries_violation
4570
+ # Violation detail for the entries in a network ACL resource.
4571
+ # @return [Types::InvalidNetworkAclEntriesViolation]
4572
+ #
4573
+ # @!attribute [rw] possible_remediation_actions
4574
+ # A list of possible remediation action lists. Each individual
4575
+ # possible remediation action is a list of individual remediation
4576
+ # actions.
4577
+ # @return [Types::PossibleRemediationActions]
4578
+ #
4107
4579
  # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/ResourceViolation AWS API Documentation
4108
4580
  #
4109
4581
  class ResourceViolation < Struct.new(
@@ -4123,13 +4595,14 @@ module Aws::FMS
4123
4595
  :dns_rule_group_priority_conflict_violation,
4124
4596
  :dns_duplicate_rule_group_violation,
4125
4597
  :dns_rule_group_limit_exceeded_violation,
4126
- :possible_remediation_actions,
4127
4598
  :firewall_subnet_is_out_of_scope_violation,
4128
4599
  :route_has_out_of_scope_endpoint_violation,
4129
4600
  :third_party_firewall_missing_firewall_violation,
4130
4601
  :third_party_firewall_missing_subnet_violation,
4131
4602
  :third_party_firewall_missing_expected_route_table_violation,
4132
- :firewall_subnet_missing_vpc_endpoint_violation)
4603
+ :firewall_subnet_missing_vpc_endpoint_violation,
4604
+ :invalid_network_acl_entries_violation,
4605
+ :possible_remediation_actions)
4133
4606
  SENSITIVE = []
4134
4607
  include Aws::Structure
4135
4608
  end
@@ -4424,7 +4897,7 @@ module Aws::FMS
4424
4897
  # and reports when the security groups created by this policy become
4425
4898
  # non-compliant.
4426
4899
  #
4427
- # Firewall Manager won't distrubute system tags added by Amazon Web
4900
+ # Firewall Manager won't distribute system tags added by Amazon Web
4428
4901
  # Services services into the replica security groups. System tags
4429
4902
  # begin with the `aws:` prefix.
4430
4903
  #
@@ -4645,8 +5118,9 @@ module Aws::FMS
4645
5118
  # @return [String]
4646
5119
  #
4647
5120
  # @!attribute [rw] policy_option
4648
- # Contains the Network Firewall firewall policy options to configure a
4649
- # centralized deployment model.
5121
+ # Contains the settings to configure a network ACL policy, a Network
5122
+ # Firewall firewall policy deployment model, or a third-party firewall
5123
+ # policy.
4650
5124
  # @return [Types::PolicyOption]
4651
5125
  #
4652
5126
  # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/SecurityServicePolicyData AWS API Documentation
data/lib/aws-sdk-fms.rb CHANGED
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-fms/customizations'
52
52
  # @!group service
53
53
  module Aws::FMS
54
54
 
55
- GEM_VERSION = '1.67.0'
55
+ GEM_VERSION = '1.68.0'
56
56
 
57
57
  end