aws-sdk-fms 1.67.0 → 1.69.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -100,7 +100,7 @@ module Aws::FMS
100
100
  #
101
101
  # @!attribute [rw] status
102
102
  # The current status of the request to onboard a member account as an
103
- # Firewall Manager administator.
103
+ # Firewall Manager administrator.
104
104
  #
105
105
  # * `ONBOARDING` - The account is onboarding to Firewall Manager as an
106
106
  # administrator.
@@ -528,6 +528,67 @@ module Aws::FMS
528
528
  include Aws::Structure
529
529
  end
530
530
 
531
+ # Information about the `CreateNetworkAcl` action in Amazon EC2. This is
532
+ # a remediation option in `RemediationAction`.
533
+ #
534
+ # @!attribute [rw] description
535
+ # Brief description of this remediation action.
536
+ # @return [String]
537
+ #
538
+ # @!attribute [rw] vpc
539
+ # The VPC that's associated with the remediation action.
540
+ # @return [Types::ActionTarget]
541
+ #
542
+ # @!attribute [rw] fms_can_remediate
543
+ # Indicates whether it is possible for Firewall Manager to perform
544
+ # this remediation action. A false value indicates that auto
545
+ # remediation is disabled or Firewall Manager is unable to perform the
546
+ # action due to a conflict of some kind.
547
+ # @return [Boolean]
548
+ #
549
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/CreateNetworkAclAction AWS API Documentation
550
+ #
551
+ class CreateNetworkAclAction < Struct.new(
552
+ :description,
553
+ :vpc,
554
+ :fms_can_remediate)
555
+ SENSITIVE = []
556
+ include Aws::Structure
557
+ end
558
+
559
+ # Information about the `CreateNetworkAclEntries` action in Amazon EC2.
560
+ # This is a remediation option in `RemediationAction`.
561
+ #
562
+ # @!attribute [rw] description
563
+ # Brief description of this remediation action.
564
+ # @return [String]
565
+ #
566
+ # @!attribute [rw] network_acl_id
567
+ # The network ACL that's associated with the remediation action.
568
+ # @return [Types::ActionTarget]
569
+ #
570
+ # @!attribute [rw] network_acl_entries_to_be_created
571
+ # Lists the entries that the remediation action would create.
572
+ # @return [Array<Types::EntryDescription>]
573
+ #
574
+ # @!attribute [rw] fms_can_remediate
575
+ # Indicates whether it is possible for Firewall Manager to perform
576
+ # this remediation action. A false value indicates that auto
577
+ # remediation is disabled or Firewall Manager is unable to perform the
578
+ # action due to a conflict of some kind.
579
+ # @return [Boolean]
580
+ #
581
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/CreateNetworkAclEntriesAction AWS API Documentation
582
+ #
583
+ class CreateNetworkAclEntriesAction < Struct.new(
584
+ :description,
585
+ :network_acl_id,
586
+ :network_acl_entries_to_be_created,
587
+ :fms_can_remediate)
588
+ SENSITIVE = []
589
+ include Aws::Structure
590
+ end
591
+
531
592
  # @!attribute [rw] list_id
532
593
  # The ID of the applications list that you want to delete. You can
533
594
  # retrieve this ID from `PutAppsList`, `ListAppsLists`, and
@@ -542,6 +603,39 @@ module Aws::FMS
542
603
  include Aws::Structure
543
604
  end
544
605
 
606
+ # Information about the `DeleteNetworkAclEntries` action in Amazon EC2.
607
+ # This is a remediation option in `RemediationAction`.
608
+ #
609
+ # @!attribute [rw] description
610
+ # Brief description of this remediation action.
611
+ # @return [String]
612
+ #
613
+ # @!attribute [rw] network_acl_id
614
+ # The network ACL that's associated with the remediation action.
615
+ # @return [Types::ActionTarget]
616
+ #
617
+ # @!attribute [rw] network_acl_entries_to_be_deleted
618
+ # Lists the entries that the remediation action would delete.
619
+ # @return [Array<Types::EntryDescription>]
620
+ #
621
+ # @!attribute [rw] fms_can_remediate
622
+ # Indicates whether it is possible for Firewall Manager to perform
623
+ # this remediation action. A false value indicates that auto
624
+ # remediation is disabled or Firewall Manager is unable to perform the
625
+ # action due to a conflict of some kind.
626
+ # @return [Boolean]
627
+ #
628
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/DeleteNetworkAclEntriesAction AWS API Documentation
629
+ #
630
+ class DeleteNetworkAclEntriesAction < Struct.new(
631
+ :description,
632
+ :network_acl_id,
633
+ :network_acl_entries_to_be_deleted,
634
+ :fms_can_remediate)
635
+ SENSITIVE = []
636
+ include Aws::Structure
637
+ end
638
+
545
639
  # @api private
546
640
  #
547
641
  # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/DeleteNotificationChannelRequest AWS API Documentation
@@ -1014,6 +1108,96 @@ module Aws::FMS
1014
1108
  include Aws::Structure
1015
1109
  end
1016
1110
 
1111
+ # Describes a single rule in a network ACL.
1112
+ #
1113
+ # @!attribute [rw] entry_detail
1114
+ # Describes a rule in a network ACL.
1115
+ #
1116
+ # Each network ACL has a set of numbered ingress rules and a separate
1117
+ # set of numbered egress rules. When determining whether a packet
1118
+ # should be allowed in or out of a subnet associated with the network
1119
+ # ACL, Amazon Web Services processes the entries in the network ACL
1120
+ # according to the rule numbers, in ascending order.
1121
+ #
1122
+ # When you manage an individual network ACL, you explicitly specify
1123
+ # the rule numbers. When you specify the network ACL rules in a
1124
+ # Firewall Manager policy, you provide the rules to run first, in the
1125
+ # order that you want them to run, and the rules to run last, in the
1126
+ # order that you want them to run. Firewall Manager assigns the rule
1127
+ # numbers for you when you save the network ACL policy specification.
1128
+ # @return [Types::NetworkAclEntry]
1129
+ #
1130
+ # @!attribute [rw] entry_rule_number
1131
+ # The rule number for the entry. ACL entries are processed in
1132
+ # ascending order by rule number. In a Firewall Manager network ACL
1133
+ # policy, Firewall Manager assigns rule numbers.
1134
+ # @return [Integer]
1135
+ #
1136
+ # @!attribute [rw] entry_type
1137
+ # Specifies whether the entry is managed by Firewall Manager or by a
1138
+ # user, and, for Firewall Manager-managed entries, specifies whether
1139
+ # the entry is among those that run first in the network ACL or those
1140
+ # that run last.
1141
+ # @return [String]
1142
+ #
1143
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/EntryDescription AWS API Documentation
1144
+ #
1145
+ class EntryDescription < Struct.new(
1146
+ :entry_detail,
1147
+ :entry_rule_number,
1148
+ :entry_type)
1149
+ SENSITIVE = []
1150
+ include Aws::Structure
1151
+ end
1152
+
1153
+ # Detailed information about an entry violation in a network ACL. The
1154
+ # violation is against the network ACL specification inside the Firewall
1155
+ # Manager network ACL policy. This data object is part of
1156
+ # `InvalidNetworkAclEntriesViolation`.
1157
+ #
1158
+ # @!attribute [rw] expected_entry
1159
+ # The Firewall Manager-managed network ACL entry that is involved in
1160
+ # the entry violation.
1161
+ # @return [Types::EntryDescription]
1162
+ #
1163
+ # @!attribute [rw] expected_evaluation_order
1164
+ # The evaluation location within the ordered list of entries where the
1165
+ # `ExpectedEntry` should be, according to the network ACL policy
1166
+ # specifications.
1167
+ # @return [String]
1168
+ #
1169
+ # @!attribute [rw] actual_evaluation_order
1170
+ # The evaluation location within the ordered list of entries where the
1171
+ # `ExpectedEntry` is currently located.
1172
+ # @return [String]
1173
+ #
1174
+ # @!attribute [rw] entry_at_expected_evaluation_order
1175
+ # The entry that's currently in the `ExpectedEvaluationOrder`
1176
+ # location, in place of the expected entry.
1177
+ # @return [Types::EntryDescription]
1178
+ #
1179
+ # @!attribute [rw] entries_with_conflicts
1180
+ # The list of entries that are in conflict with `ExpectedEntry`.
1181
+ # @return [Array<Types::EntryDescription>]
1182
+ #
1183
+ # @!attribute [rw] entry_violation_reasons
1184
+ # Descriptions of the violations that Firewall Manager found for these
1185
+ # entries.
1186
+ # @return [Array<String>]
1187
+ #
1188
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/EntryViolation AWS API Documentation
1189
+ #
1190
+ class EntryViolation < Struct.new(
1191
+ :expected_entry,
1192
+ :expected_evaluation_order,
1193
+ :actual_evaluation_order,
1194
+ :entry_at_expected_evaluation_order,
1195
+ :entries_with_conflicts,
1196
+ :entry_violation_reasons)
1197
+ SENSITIVE = []
1198
+ include Aws::Structure
1199
+ end
1200
+
1017
1201
  # Describes the compliance status for the account. An account is
1018
1202
  # considered noncompliant if it includes resources that are not
1019
1203
  # protected by the specified policy or that don't comply with the
@@ -1230,7 +1414,7 @@ module Aws::FMS
1230
1414
  end
1231
1415
 
1232
1416
  # @!attribute [rw] admin_account
1233
- # The administator account that you want to get the details for.
1417
+ # The administrator account that you want to get the details for.
1234
1418
  # @return [String]
1235
1419
  #
1236
1420
  # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/GetAdminScopeRequest AWS API Documentation
@@ -1248,7 +1432,7 @@ module Aws::FMS
1248
1432
  #
1249
1433
  # @!attribute [rw] status
1250
1434
  # The current status of the request to onboard a member account as an
1251
- # Firewall Manager administator.
1435
+ # Firewall Manager administrator.
1252
1436
  #
1253
1437
  # * `ONBOARDING` - The account is onboarding to Firewall Manager as an
1254
1438
  # administrator.
@@ -1637,6 +1821,8 @@ module Aws::FMS
1637
1821
  #
1638
1822
  # * Security group content audit
1639
1823
  #
1824
+ # * Network ACL
1825
+ #
1640
1826
  # * Third-party firewall
1641
1827
  # @return [String]
1642
1828
  #
@@ -1710,6 +1896,40 @@ module Aws::FMS
1710
1896
  include Aws::Structure
1711
1897
  end
1712
1898
 
1899
+ # Violation detail for the entries in a network ACL resource.
1900
+ #
1901
+ # @!attribute [rw] vpc
1902
+ # The VPC where the violation was found.
1903
+ # @return [String]
1904
+ #
1905
+ # @!attribute [rw] subnet
1906
+ # The subnet that's associated with the network ACL.
1907
+ # @return [String]
1908
+ #
1909
+ # @!attribute [rw] subnet_availability_zone
1910
+ # The Availability Zone where the network ACL is in use.
1911
+ # @return [String]
1912
+ #
1913
+ # @!attribute [rw] current_associated_network_acl
1914
+ # The network ACL containing the entry violations.
1915
+ # @return [String]
1916
+ #
1917
+ # @!attribute [rw] entry_violations
1918
+ # Detailed information about the entry violations in the network ACL.
1919
+ # @return [Array<Types::EntryViolation>]
1920
+ #
1921
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/InvalidNetworkAclEntriesViolation AWS API Documentation
1922
+ #
1923
+ class InvalidNetworkAclEntriesViolation < Struct.new(
1924
+ :vpc,
1925
+ :subnet,
1926
+ :subnet_availability_zone,
1927
+ :current_associated_network_acl,
1928
+ :entry_violations)
1929
+ SENSITIVE = []
1930
+ include Aws::Structure
1931
+ end
1932
+
1713
1933
  # The operation failed because there was nothing to do or the operation
1714
1934
  # wasn't possible. For example, you might have submitted an
1715
1935
  # `AssociateAdminAccount` request for an account ID that was already set
@@ -2351,6 +2571,205 @@ module Aws::FMS
2351
2571
  include Aws::Structure
2352
2572
  end
2353
2573
 
2574
+ # Defines a Firewall Manager network ACL policy. This is used in the
2575
+ # `PolicyOption` of a `SecurityServicePolicyData` for a `Policy`, when
2576
+ # the `SecurityServicePolicyData` type is set to `NETWORK_ACL_COMMON`.
2577
+ #
2578
+ # For information about network ACLs, see [Control traffic to subnets
2579
+ # using network ACLs][1] in the *Amazon Virtual Private Cloud User
2580
+ # Guide*.
2581
+ #
2582
+ #
2583
+ #
2584
+ # [1]: https://docs.aws.amazon.com/vpc/latest/userguide/vpc-network-acls.html
2585
+ #
2586
+ # @!attribute [rw] network_acl_entry_set
2587
+ # The definition of the first and last rules for the network ACL
2588
+ # policy.
2589
+ # @return [Types::NetworkAclEntrySet]
2590
+ #
2591
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/NetworkAclCommonPolicy AWS API Documentation
2592
+ #
2593
+ class NetworkAclCommonPolicy < Struct.new(
2594
+ :network_acl_entry_set)
2595
+ SENSITIVE = []
2596
+ include Aws::Structure
2597
+ end
2598
+
2599
+ # Describes a rule in a network ACL.
2600
+ #
2601
+ # Each network ACL has a set of numbered ingress rules and a separate
2602
+ # set of numbered egress rules. When determining whether a packet should
2603
+ # be allowed in or out of a subnet associated with the network ACL,
2604
+ # Amazon Web Services processes the entries in the network ACL according
2605
+ # to the rule numbers, in ascending order.
2606
+ #
2607
+ # When you manage an individual network ACL, you explicitly specify the
2608
+ # rule numbers. When you specify the network ACL rules in a Firewall
2609
+ # Manager policy, you provide the rules to run first, in the order that
2610
+ # you want them to run, and the rules to run last, in the order that you
2611
+ # want them to run. Firewall Manager assigns the rule numbers for you
2612
+ # when you save the network ACL policy specification.
2613
+ #
2614
+ # @!attribute [rw] icmp_type_code
2615
+ # ICMP protocol: The ICMP type and code.
2616
+ # @return [Types::NetworkAclIcmpTypeCode]
2617
+ #
2618
+ # @!attribute [rw] protocol
2619
+ # The protocol number. A value of "-1" means all protocols.
2620
+ # @return [String]
2621
+ #
2622
+ # @!attribute [rw] port_range
2623
+ # TCP or UDP protocols: The range of ports the rule applies to.
2624
+ # @return [Types::NetworkAclPortRange]
2625
+ #
2626
+ # @!attribute [rw] cidr_block
2627
+ # The IPv4 network range to allow or deny, in CIDR notation.
2628
+ # @return [String]
2629
+ #
2630
+ # @!attribute [rw] ipv_6_cidr_block
2631
+ # The IPv6 network range to allow or deny, in CIDR notation.
2632
+ # @return [String]
2633
+ #
2634
+ # @!attribute [rw] rule_action
2635
+ # Indicates whether to allow or deny the traffic that matches the
2636
+ # rule.
2637
+ # @return [String]
2638
+ #
2639
+ # @!attribute [rw] egress
2640
+ # Indicates whether the rule is an egress, or outbound, rule (applied
2641
+ # to traffic leaving the subnet). If it's not an egress rule, then
2642
+ # it's an ingress, or inbound, rule.
2643
+ # @return [Boolean]
2644
+ #
2645
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/NetworkAclEntry AWS API Documentation
2646
+ #
2647
+ class NetworkAclEntry < Struct.new(
2648
+ :icmp_type_code,
2649
+ :protocol,
2650
+ :port_range,
2651
+ :cidr_block,
2652
+ :ipv_6_cidr_block,
2653
+ :rule_action,
2654
+ :egress)
2655
+ SENSITIVE = []
2656
+ include Aws::Structure
2657
+ end
2658
+
2659
+ # The configuration of the first and last rules for the network ACL
2660
+ # policy, and the remediation settings for each.
2661
+ #
2662
+ # @!attribute [rw] first_entries
2663
+ # The rules that you want to run first in the Firewall Manager managed
2664
+ # network ACLs.
2665
+ #
2666
+ # <note markdown="1"> Provide these in the order in which you want them to run. Firewall
2667
+ # Manager will assign the specific rule numbers for you, in the
2668
+ # network ACLs that it creates.
2669
+ #
2670
+ # </note>
2671
+ #
2672
+ # You must specify at least one first entry or one last entry in any
2673
+ # network ACL policy.
2674
+ # @return [Array<Types::NetworkAclEntry>]
2675
+ #
2676
+ # @!attribute [rw] force_remediate_for_first_entries
2677
+ # Applies only when remediation is enabled for the policy as a whole.
2678
+ # Firewall Manager uses this setting when it finds policy violations
2679
+ # that involve conflicts between the custom entries and the policy
2680
+ # entries.
2681
+ #
2682
+ # If forced remediation is disabled, Firewall Manager marks the
2683
+ # network ACL as noncompliant and does not try to remediate. For more
2684
+ # information about the remediation behavior, see [Network access
2685
+ # control list (ACL) policies][1] in the *Firewall Manager Developer
2686
+ # Guide*.
2687
+ #
2688
+ #
2689
+ #
2690
+ # [1]: https://docs.aws.amazon.com/waf/latest/developerguide/network-acl-policies.html
2691
+ # @return [Boolean]
2692
+ #
2693
+ # @!attribute [rw] last_entries
2694
+ # The rules that you want to run last in the Firewall Manager managed
2695
+ # network ACLs.
2696
+ #
2697
+ # <note markdown="1"> Provide these in the order in which you want them to run. Firewall
2698
+ # Manager will assign the specific rule numbers for you, in the
2699
+ # network ACLs that it creates.
2700
+ #
2701
+ # </note>
2702
+ #
2703
+ # You must specify at least one first entry or one last entry in any
2704
+ # network ACL policy.
2705
+ # @return [Array<Types::NetworkAclEntry>]
2706
+ #
2707
+ # @!attribute [rw] force_remediate_for_last_entries
2708
+ # Applies only when remediation is enabled for the policy as a whole.
2709
+ # Firewall Manager uses this setting when it finds policy violations
2710
+ # that involve conflicts between the custom entries and the policy
2711
+ # entries.
2712
+ #
2713
+ # If forced remediation is disabled, Firewall Manager marks the
2714
+ # network ACL as noncompliant and does not try to remediate. For more
2715
+ # information about the remediation behavior, see [Network access
2716
+ # control list (ACL) policies][1] in the *Firewall Manager Developer
2717
+ # Guide*.
2718
+ #
2719
+ #
2720
+ #
2721
+ # [1]: https://docs.aws.amazon.com/waf/latest/developerguide/network-acl-policies.html
2722
+ # @return [Boolean]
2723
+ #
2724
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/NetworkAclEntrySet AWS API Documentation
2725
+ #
2726
+ class NetworkAclEntrySet < Struct.new(
2727
+ :first_entries,
2728
+ :force_remediate_for_first_entries,
2729
+ :last_entries,
2730
+ :force_remediate_for_last_entries)
2731
+ SENSITIVE = []
2732
+ include Aws::Structure
2733
+ end
2734
+
2735
+ # ICMP protocol: The ICMP type and code.
2736
+ #
2737
+ # @!attribute [rw] code
2738
+ # ICMP code.
2739
+ # @return [Integer]
2740
+ #
2741
+ # @!attribute [rw] type
2742
+ # ICMP type.
2743
+ # @return [Integer]
2744
+ #
2745
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/NetworkAclIcmpTypeCode AWS API Documentation
2746
+ #
2747
+ class NetworkAclIcmpTypeCode < Struct.new(
2748
+ :code,
2749
+ :type)
2750
+ SENSITIVE = []
2751
+ include Aws::Structure
2752
+ end
2753
+
2754
+ # TCP or UDP protocols: The range of ports the rule applies to.
2755
+ #
2756
+ # @!attribute [rw] from
2757
+ # The beginning port number of the range.
2758
+ # @return [Integer]
2759
+ #
2760
+ # @!attribute [rw] to
2761
+ # The ending port number of the range.
2762
+ # @return [Integer]
2763
+ #
2764
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/NetworkAclPortRange AWS API Documentation
2765
+ #
2766
+ class NetworkAclPortRange < Struct.new(
2767
+ :from,
2768
+ :to)
2769
+ SENSITIVE = []
2770
+ include Aws::Structure
2771
+ end
2772
+
2354
2773
  # Violation detail for an internet gateway route with an inactive state
2355
2774
  # in the customer subnet route table or Network Firewall subnet route
2356
2775
  # table.
@@ -2997,17 +3416,19 @@ module Aws::FMS
2997
3416
  # `AWS::ElasticLoadBalancingV2::LoadBalancer`, and
2998
3417
  # `AWS::CloudFront::Distribution`.
2999
3418
  #
3000
- # * DNS Firewall, Network Firewall, and third-party firewall -
3001
- # `AWS::EC2::VPC`.
3002
- #
3003
3419
  # * Shield Advanced - `AWS::ElasticLoadBalancingV2::LoadBalancer`,
3004
3420
  # `AWS::ElasticLoadBalancing::LoadBalancer`, `AWS::EC2::EIP`, and
3005
3421
  # `AWS::CloudFront::Distribution`.
3006
3422
  #
3423
+ # * Network ACL - `AWS::EC2::Subnet`.
3424
+ #
3425
+ # * Security group usage audit - `AWS::EC2::SecurityGroup`.
3426
+ #
3007
3427
  # * Security group content audit - `AWS::EC2::SecurityGroup`,
3008
3428
  # `AWS::EC2::NetworkInterface`, and `AWS::EC2::Instance`.
3009
3429
  #
3010
- # * Security group usage audit - `AWS::EC2::SecurityGroup`.
3430
+ # * DNS Firewall, Network Firewall, and third-party firewall -
3431
+ # `AWS::EC2::VPC`.
3011
3432
  #
3012
3433
  #
3013
3434
  #
@@ -3257,8 +3678,9 @@ module Aws::FMS
3257
3678
  include Aws::Structure
3258
3679
  end
3259
3680
 
3260
- # Contains the Network Firewall firewall policy options to configure the
3261
- # policy's deployment model and third-party firewall policy settings.
3681
+ # Contains the settings to configure a network ACL policy, a Network
3682
+ # Firewall firewall policy deployment model, or a third-party firewall
3683
+ # policy.
3262
3684
  #
3263
3685
  # @!attribute [rw] network_firewall_policy
3264
3686
  # Defines the deployment model to use for the firewall policy.
@@ -3268,11 +3690,16 @@ module Aws::FMS
3268
3690
  # Defines the policy options for a third-party firewall policy.
3269
3691
  # @return [Types::ThirdPartyFirewallPolicy]
3270
3692
  #
3693
+ # @!attribute [rw] network_acl_common_policy
3694
+ # Defines a Firewall Manager network ACL policy.
3695
+ # @return [Types::NetworkAclCommonPolicy]
3696
+ #
3271
3697
  # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/PolicyOption AWS API Documentation
3272
3698
  #
3273
3699
  class PolicyOption < Struct.new(
3274
3700
  :network_firewall_policy,
3275
- :third_party_firewall_policy)
3701
+ :third_party_firewall_policy,
3702
+ :network_acl_common_policy)
3276
3703
  SENSITIVE = []
3277
3704
  include Aws::Structure
3278
3705
  end
@@ -3294,16 +3721,7 @@ module Aws::FMS
3294
3721
  # @!attribute [rw] resource_type
3295
3722
  # The type of resource protected by or in scope of the policy. This is
3296
3723
  # in the format shown in the [Amazon Web Services Resource Types
3297
- # Reference][1]. For WAF and Shield Advanced, examples include
3298
- # `AWS::ElasticLoadBalancingV2::LoadBalancer` and
3299
- # `AWS::CloudFront::Distribution`. For a security group common policy,
3300
- # valid values are `AWS::EC2::NetworkInterface` and
3301
- # `AWS::EC2::Instance`. For a security group content audit policy,
3302
- # valid values are `AWS::EC2::SecurityGroup`,
3303
- # `AWS::EC2::NetworkInterface`, and `AWS::EC2::Instance`. For a
3304
- # security group usage audit policy, the value is
3305
- # `AWS::EC2::SecurityGroup`. For an Network Firewall policy or DNS
3306
- # Firewall policy, the value is `AWS::EC2::VPC`.
3724
+ # Reference][1].
3307
3725
  #
3308
3726
  #
3309
3727
  #
@@ -3760,6 +4178,25 @@ module Aws::FMS
3760
4178
  # The remedial action to take when updating a firewall configuration.
3761
4179
  # @return [Types::FMSPolicyUpdateFirewallCreationConfigAction]
3762
4180
  #
4181
+ # @!attribute [rw] create_network_acl_action
4182
+ # Information about the `CreateNetworkAcl` action in Amazon EC2.
4183
+ # @return [Types::CreateNetworkAclAction]
4184
+ #
4185
+ # @!attribute [rw] replace_network_acl_association_action
4186
+ # Information about the `ReplaceNetworkAclAssociation` action in
4187
+ # Amazon EC2.
4188
+ # @return [Types::ReplaceNetworkAclAssociationAction]
4189
+ #
4190
+ # @!attribute [rw] create_network_acl_entries_action
4191
+ # Information about the `CreateNetworkAclEntries` action in Amazon
4192
+ # EC2.
4193
+ # @return [Types::CreateNetworkAclEntriesAction]
4194
+ #
4195
+ # @!attribute [rw] delete_network_acl_entries_action
4196
+ # Information about the `DeleteNetworkAclEntries` action in Amazon
4197
+ # EC2.
4198
+ # @return [Types::DeleteNetworkAclEntriesAction]
4199
+ #
3763
4200
  # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/RemediationAction AWS API Documentation
3764
4201
  #
3765
4202
  class RemediationAction < Struct.new(
@@ -3771,7 +4208,11 @@ module Aws::FMS
3771
4208
  :ec2_replace_route_table_association_action,
3772
4209
  :ec2_associate_route_table_action,
3773
4210
  :ec2_create_route_table_action,
3774
- :fms_policy_update_firewall_creation_config_action)
4211
+ :fms_policy_update_firewall_creation_config_action,
4212
+ :create_network_acl_action,
4213
+ :replace_network_acl_association_action,
4214
+ :create_network_acl_entries_action,
4215
+ :delete_network_acl_entries_action)
3775
4216
  SENSITIVE = []
3776
4217
  include Aws::Structure
3777
4218
  end
@@ -3795,6 +4236,39 @@ module Aws::FMS
3795
4236
  include Aws::Structure
3796
4237
  end
3797
4238
 
4239
+ # Information about the `ReplaceNetworkAclAssociation` action in Amazon
4240
+ # EC2. This is a remediation option in `RemediationAction`.
4241
+ #
4242
+ # @!attribute [rw] description
4243
+ # Brief description of this remediation action.
4244
+ # @return [String]
4245
+ #
4246
+ # @!attribute [rw] association_id
4247
+ # Describes a remediation action target.
4248
+ # @return [Types::ActionTarget]
4249
+ #
4250
+ # @!attribute [rw] network_acl_id
4251
+ # The network ACL that's associated with the remediation action.
4252
+ # @return [Types::ActionTarget]
4253
+ #
4254
+ # @!attribute [rw] fms_can_remediate
4255
+ # Indicates whether it is possible for Firewall Manager to perform
4256
+ # this remediation action. A false value indicates that auto
4257
+ # remediation is disabled or Firewall Manager is unable to perform the
4258
+ # action due to a conflict of some kind.
4259
+ # @return [Boolean]
4260
+ #
4261
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/ReplaceNetworkAclAssociationAction AWS API Documentation
4262
+ #
4263
+ class ReplaceNetworkAclAssociationAction < Struct.new(
4264
+ :description,
4265
+ :association_id,
4266
+ :network_acl_id,
4267
+ :fms_can_remediate)
4268
+ SENSITIVE = []
4269
+ include Aws::Structure
4270
+ end
4271
+
3798
4272
  # Details of a resource that is associated to an Firewall Manager
3799
4273
  # resource set.
3800
4274
  #
@@ -4067,12 +4541,6 @@ module Aws::FMS
4067
4541
  # and failed.
4068
4542
  # @return [Types::DnsRuleGroupLimitExceededViolation]
4069
4543
  #
4070
- # @!attribute [rw] possible_remediation_actions
4071
- # A list of possible remediation action lists. Each individual
4072
- # possible remediation action is a list of individual remediation
4073
- # actions.
4074
- # @return [Types::PossibleRemediationActions]
4075
- #
4076
4544
  # @!attribute [rw] firewall_subnet_is_out_of_scope_violation
4077
4545
  # Contains details about the firewall subnet that violates the policy
4078
4546
  # scope.
@@ -4104,6 +4572,16 @@ module Aws::FMS
4104
4572
  # subnet that was deleted.
4105
4573
  # @return [Types::FirewallSubnetMissingVPCEndpointViolation]
4106
4574
  #
4575
+ # @!attribute [rw] invalid_network_acl_entries_violation
4576
+ # Violation detail for the entries in a network ACL resource.
4577
+ # @return [Types::InvalidNetworkAclEntriesViolation]
4578
+ #
4579
+ # @!attribute [rw] possible_remediation_actions
4580
+ # A list of possible remediation action lists. Each individual
4581
+ # possible remediation action is a list of individual remediation
4582
+ # actions.
4583
+ # @return [Types::PossibleRemediationActions]
4584
+ #
4107
4585
  # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/ResourceViolation AWS API Documentation
4108
4586
  #
4109
4587
  class ResourceViolation < Struct.new(
@@ -4123,13 +4601,14 @@ module Aws::FMS
4123
4601
  :dns_rule_group_priority_conflict_violation,
4124
4602
  :dns_duplicate_rule_group_violation,
4125
4603
  :dns_rule_group_limit_exceeded_violation,
4126
- :possible_remediation_actions,
4127
4604
  :firewall_subnet_is_out_of_scope_violation,
4128
4605
  :route_has_out_of_scope_endpoint_violation,
4129
4606
  :third_party_firewall_missing_firewall_violation,
4130
4607
  :third_party_firewall_missing_subnet_violation,
4131
4608
  :third_party_firewall_missing_expected_route_table_violation,
4132
- :firewall_subnet_missing_vpc_endpoint_violation)
4609
+ :firewall_subnet_missing_vpc_endpoint_violation,
4610
+ :invalid_network_acl_entries_violation,
4611
+ :possible_remediation_actions)
4133
4612
  SENSITIVE = []
4134
4613
  include Aws::Structure
4135
4614
  end
@@ -4424,7 +4903,7 @@ module Aws::FMS
4424
4903
  # and reports when the security groups created by this policy become
4425
4904
  # non-compliant.
4426
4905
  #
4427
- # Firewall Manager won't distrubute system tags added by Amazon Web
4906
+ # Firewall Manager won't distribute system tags added by Amazon Web
4428
4907
  # Services services into the replica security groups. System tags
4429
4908
  # begin with the `aws:` prefix.
4430
4909
  #
@@ -4645,8 +5124,9 @@ module Aws::FMS
4645
5124
  # @return [String]
4646
5125
  #
4647
5126
  # @!attribute [rw] policy_option
4648
- # Contains the Network Firewall firewall policy options to configure a
4649
- # centralized deployment model.
5127
+ # Contains the settings to configure a network ACL policy, a Network
5128
+ # Firewall firewall policy deployment model, or a third-party firewall
5129
+ # policy.
4650
5130
  # @return [Types::PolicyOption]
4651
5131
  #
4652
5132
  # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/SecurityServicePolicyData AWS API Documentation
@@ -4664,21 +5144,63 @@ module Aws::FMS
4664
5144
  #
4665
5145
  # @!attribute [rw] rule_order
4666
5146
  # Indicates how to manage the order of stateful rule evaluation for
4667
- # the policy. `DEFAULT_ACTION_ORDER` is the default behavior. Stateful
4668
- # rules are provided to the rule engine as Suricata compatible
4669
- # strings, and Suricata evaluates them based on certain settings. For
4670
- # more information, see [Evaluation order for stateful rules][1] in
4671
- # the *Network Firewall Developer Guide*.
5147
+ # the policy. Stateful rules are provided to the rule engine as
5148
+ # Suricata compatible strings, and Suricata evaluates them based on
5149
+ # certain settings. For more information, see [Evaluation order for
5150
+ # stateful rules][1] in the *Network Firewall Developer Guide*.
5151
+ #
5152
+ # Default: `DEFAULT_ACTION_ORDER`
4672
5153
  #
4673
5154
  #
4674
5155
  #
4675
5156
  # [1]: https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html
4676
5157
  # @return [String]
4677
5158
  #
5159
+ # @!attribute [rw] stream_exception_policy
5160
+ # Indicates how Network Firewall should handle traffic when a network
5161
+ # connection breaks midstream.
5162
+ #
5163
+ # * `DROP` - Fail closed and drop all subsequent traffic going to the
5164
+ # firewall.
5165
+ #
5166
+ # * `CONTINUE` - Continue to apply rules to subsequent traffic without
5167
+ # context from traffic before the break. This impacts the behavior
5168
+ # of rules that depend on context. For example, with a stateful rule
5169
+ # that drops HTTP traffic, Network Firewall won't match subsequent
5170
+ # traffic because the it won't have the context from session
5171
+ # initialization, which defines the application layer protocol as
5172
+ # HTTP. However, a TCP-layer rule using a `flow:stateless` rule
5173
+ # would still match, and so would the `aws:drop_strict` default
5174
+ # action.
5175
+ #
5176
+ # * `REJECT` - Fail closed and drop all subsequent traffic going to
5177
+ # the firewall. With this option, Network Firewall also sends a TCP
5178
+ # reject packet back to the client so the client can immediately
5179
+ # establish a new session. With the new session, Network Firewall
5180
+ # will have context and will apply rules appropriately.
5181
+ #
5182
+ # For applications that are reliant on long-lived TCP connections
5183
+ # that trigger Gateway Load Balancer idle timeouts, this is the
5184
+ # recommended setting.
5185
+ #
5186
+ # * `FMS_IGNORE` - Firewall Manager doesn't monitor or modify the
5187
+ # Network Firewall stream exception policy settings.
5188
+ #
5189
+ # For more information, see [Stream exception policy in your firewall
5190
+ # policy][1] in the *Network Firewall Developer Guide*.
5191
+ #
5192
+ # Default: `FMS_IGNORE`
5193
+ #
5194
+ #
5195
+ #
5196
+ # [1]: https://docs.aws.amazon.com/network-firewall/latest/developerguide/stream-exception-policy.html
5197
+ # @return [String]
5198
+ #
4678
5199
  # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/StatefulEngineOptions AWS API Documentation
4679
5200
  #
4680
5201
  class StatefulEngineOptions < Struct.new(
4681
- :rule_order)
5202
+ :rule_order,
5203
+ :stream_exception_policy)
4682
5204
  SENSITIVE = []
4683
5205
  include Aws::Structure
4684
5206
  end