aws-sdk-fms 1.67.0 → 1.69.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-fms/client.rb +309 -119
- data/lib/aws-sdk-fms/client_api.rb +114 -1
- data/lib/aws-sdk-fms/types.rb +560 -38
- data/lib/aws-sdk-fms.rb +1 -1
- data/sig/client.rbs +43 -3
- data/sig/types.rbs +106 -6
- metadata +4 -4
data/lib/aws-sdk-fms/types.rb
CHANGED
@@ -100,7 +100,7 @@ module Aws::FMS
|
|
100
100
|
#
|
101
101
|
# @!attribute [rw] status
|
102
102
|
# The current status of the request to onboard a member account as an
|
103
|
-
# Firewall Manager
|
103
|
+
# Firewall Manager administrator.
|
104
104
|
#
|
105
105
|
# * `ONBOARDING` - The account is onboarding to Firewall Manager as an
|
106
106
|
# administrator.
|
@@ -528,6 +528,67 @@ module Aws::FMS
|
|
528
528
|
include Aws::Structure
|
529
529
|
end
|
530
530
|
|
531
|
+
# Information about the `CreateNetworkAcl` action in Amazon EC2. This is
|
532
|
+
# a remediation option in `RemediationAction`.
|
533
|
+
#
|
534
|
+
# @!attribute [rw] description
|
535
|
+
# Brief description of this remediation action.
|
536
|
+
# @return [String]
|
537
|
+
#
|
538
|
+
# @!attribute [rw] vpc
|
539
|
+
# The VPC that's associated with the remediation action.
|
540
|
+
# @return [Types::ActionTarget]
|
541
|
+
#
|
542
|
+
# @!attribute [rw] fms_can_remediate
|
543
|
+
# Indicates whether it is possible for Firewall Manager to perform
|
544
|
+
# this remediation action. A false value indicates that auto
|
545
|
+
# remediation is disabled or Firewall Manager is unable to perform the
|
546
|
+
# action due to a conflict of some kind.
|
547
|
+
# @return [Boolean]
|
548
|
+
#
|
549
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/CreateNetworkAclAction AWS API Documentation
|
550
|
+
#
|
551
|
+
class CreateNetworkAclAction < Struct.new(
|
552
|
+
:description,
|
553
|
+
:vpc,
|
554
|
+
:fms_can_remediate)
|
555
|
+
SENSITIVE = []
|
556
|
+
include Aws::Structure
|
557
|
+
end
|
558
|
+
|
559
|
+
# Information about the `CreateNetworkAclEntries` action in Amazon EC2.
|
560
|
+
# This is a remediation option in `RemediationAction`.
|
561
|
+
#
|
562
|
+
# @!attribute [rw] description
|
563
|
+
# Brief description of this remediation action.
|
564
|
+
# @return [String]
|
565
|
+
#
|
566
|
+
# @!attribute [rw] network_acl_id
|
567
|
+
# The network ACL that's associated with the remediation action.
|
568
|
+
# @return [Types::ActionTarget]
|
569
|
+
#
|
570
|
+
# @!attribute [rw] network_acl_entries_to_be_created
|
571
|
+
# Lists the entries that the remediation action would create.
|
572
|
+
# @return [Array<Types::EntryDescription>]
|
573
|
+
#
|
574
|
+
# @!attribute [rw] fms_can_remediate
|
575
|
+
# Indicates whether it is possible for Firewall Manager to perform
|
576
|
+
# this remediation action. A false value indicates that auto
|
577
|
+
# remediation is disabled or Firewall Manager is unable to perform the
|
578
|
+
# action due to a conflict of some kind.
|
579
|
+
# @return [Boolean]
|
580
|
+
#
|
581
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/CreateNetworkAclEntriesAction AWS API Documentation
|
582
|
+
#
|
583
|
+
class CreateNetworkAclEntriesAction < Struct.new(
|
584
|
+
:description,
|
585
|
+
:network_acl_id,
|
586
|
+
:network_acl_entries_to_be_created,
|
587
|
+
:fms_can_remediate)
|
588
|
+
SENSITIVE = []
|
589
|
+
include Aws::Structure
|
590
|
+
end
|
591
|
+
|
531
592
|
# @!attribute [rw] list_id
|
532
593
|
# The ID of the applications list that you want to delete. You can
|
533
594
|
# retrieve this ID from `PutAppsList`, `ListAppsLists`, and
|
@@ -542,6 +603,39 @@ module Aws::FMS
|
|
542
603
|
include Aws::Structure
|
543
604
|
end
|
544
605
|
|
606
|
+
# Information about the `DeleteNetworkAclEntries` action in Amazon EC2.
|
607
|
+
# This is a remediation option in `RemediationAction`.
|
608
|
+
#
|
609
|
+
# @!attribute [rw] description
|
610
|
+
# Brief description of this remediation action.
|
611
|
+
# @return [String]
|
612
|
+
#
|
613
|
+
# @!attribute [rw] network_acl_id
|
614
|
+
# The network ACL that's associated with the remediation action.
|
615
|
+
# @return [Types::ActionTarget]
|
616
|
+
#
|
617
|
+
# @!attribute [rw] network_acl_entries_to_be_deleted
|
618
|
+
# Lists the entries that the remediation action would delete.
|
619
|
+
# @return [Array<Types::EntryDescription>]
|
620
|
+
#
|
621
|
+
# @!attribute [rw] fms_can_remediate
|
622
|
+
# Indicates whether it is possible for Firewall Manager to perform
|
623
|
+
# this remediation action. A false value indicates that auto
|
624
|
+
# remediation is disabled or Firewall Manager is unable to perform the
|
625
|
+
# action due to a conflict of some kind.
|
626
|
+
# @return [Boolean]
|
627
|
+
#
|
628
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/DeleteNetworkAclEntriesAction AWS API Documentation
|
629
|
+
#
|
630
|
+
class DeleteNetworkAclEntriesAction < Struct.new(
|
631
|
+
:description,
|
632
|
+
:network_acl_id,
|
633
|
+
:network_acl_entries_to_be_deleted,
|
634
|
+
:fms_can_remediate)
|
635
|
+
SENSITIVE = []
|
636
|
+
include Aws::Structure
|
637
|
+
end
|
638
|
+
|
545
639
|
# @api private
|
546
640
|
#
|
547
641
|
# @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/DeleteNotificationChannelRequest AWS API Documentation
|
@@ -1014,6 +1108,96 @@ module Aws::FMS
|
|
1014
1108
|
include Aws::Structure
|
1015
1109
|
end
|
1016
1110
|
|
1111
|
+
# Describes a single rule in a network ACL.
|
1112
|
+
#
|
1113
|
+
# @!attribute [rw] entry_detail
|
1114
|
+
# Describes a rule in a network ACL.
|
1115
|
+
#
|
1116
|
+
# Each network ACL has a set of numbered ingress rules and a separate
|
1117
|
+
# set of numbered egress rules. When determining whether a packet
|
1118
|
+
# should be allowed in or out of a subnet associated with the network
|
1119
|
+
# ACL, Amazon Web Services processes the entries in the network ACL
|
1120
|
+
# according to the rule numbers, in ascending order.
|
1121
|
+
#
|
1122
|
+
# When you manage an individual network ACL, you explicitly specify
|
1123
|
+
# the rule numbers. When you specify the network ACL rules in a
|
1124
|
+
# Firewall Manager policy, you provide the rules to run first, in the
|
1125
|
+
# order that you want them to run, and the rules to run last, in the
|
1126
|
+
# order that you want them to run. Firewall Manager assigns the rule
|
1127
|
+
# numbers for you when you save the network ACL policy specification.
|
1128
|
+
# @return [Types::NetworkAclEntry]
|
1129
|
+
#
|
1130
|
+
# @!attribute [rw] entry_rule_number
|
1131
|
+
# The rule number for the entry. ACL entries are processed in
|
1132
|
+
# ascending order by rule number. In a Firewall Manager network ACL
|
1133
|
+
# policy, Firewall Manager assigns rule numbers.
|
1134
|
+
# @return [Integer]
|
1135
|
+
#
|
1136
|
+
# @!attribute [rw] entry_type
|
1137
|
+
# Specifies whether the entry is managed by Firewall Manager or by a
|
1138
|
+
# user, and, for Firewall Manager-managed entries, specifies whether
|
1139
|
+
# the entry is among those that run first in the network ACL or those
|
1140
|
+
# that run last.
|
1141
|
+
# @return [String]
|
1142
|
+
#
|
1143
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/EntryDescription AWS API Documentation
|
1144
|
+
#
|
1145
|
+
class EntryDescription < Struct.new(
|
1146
|
+
:entry_detail,
|
1147
|
+
:entry_rule_number,
|
1148
|
+
:entry_type)
|
1149
|
+
SENSITIVE = []
|
1150
|
+
include Aws::Structure
|
1151
|
+
end
|
1152
|
+
|
1153
|
+
# Detailed information about an entry violation in a network ACL. The
|
1154
|
+
# violation is against the network ACL specification inside the Firewall
|
1155
|
+
# Manager network ACL policy. This data object is part of
|
1156
|
+
# `InvalidNetworkAclEntriesViolation`.
|
1157
|
+
#
|
1158
|
+
# @!attribute [rw] expected_entry
|
1159
|
+
# The Firewall Manager-managed network ACL entry that is involved in
|
1160
|
+
# the entry violation.
|
1161
|
+
# @return [Types::EntryDescription]
|
1162
|
+
#
|
1163
|
+
# @!attribute [rw] expected_evaluation_order
|
1164
|
+
# The evaluation location within the ordered list of entries where the
|
1165
|
+
# `ExpectedEntry` should be, according to the network ACL policy
|
1166
|
+
# specifications.
|
1167
|
+
# @return [String]
|
1168
|
+
#
|
1169
|
+
# @!attribute [rw] actual_evaluation_order
|
1170
|
+
# The evaluation location within the ordered list of entries where the
|
1171
|
+
# `ExpectedEntry` is currently located.
|
1172
|
+
# @return [String]
|
1173
|
+
#
|
1174
|
+
# @!attribute [rw] entry_at_expected_evaluation_order
|
1175
|
+
# The entry that's currently in the `ExpectedEvaluationOrder`
|
1176
|
+
# location, in place of the expected entry.
|
1177
|
+
# @return [Types::EntryDescription]
|
1178
|
+
#
|
1179
|
+
# @!attribute [rw] entries_with_conflicts
|
1180
|
+
# The list of entries that are in conflict with `ExpectedEntry`.
|
1181
|
+
# @return [Array<Types::EntryDescription>]
|
1182
|
+
#
|
1183
|
+
# @!attribute [rw] entry_violation_reasons
|
1184
|
+
# Descriptions of the violations that Firewall Manager found for these
|
1185
|
+
# entries.
|
1186
|
+
# @return [Array<String>]
|
1187
|
+
#
|
1188
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/EntryViolation AWS API Documentation
|
1189
|
+
#
|
1190
|
+
class EntryViolation < Struct.new(
|
1191
|
+
:expected_entry,
|
1192
|
+
:expected_evaluation_order,
|
1193
|
+
:actual_evaluation_order,
|
1194
|
+
:entry_at_expected_evaluation_order,
|
1195
|
+
:entries_with_conflicts,
|
1196
|
+
:entry_violation_reasons)
|
1197
|
+
SENSITIVE = []
|
1198
|
+
include Aws::Structure
|
1199
|
+
end
|
1200
|
+
|
1017
1201
|
# Describes the compliance status for the account. An account is
|
1018
1202
|
# considered noncompliant if it includes resources that are not
|
1019
1203
|
# protected by the specified policy or that don't comply with the
|
@@ -1230,7 +1414,7 @@ module Aws::FMS
|
|
1230
1414
|
end
|
1231
1415
|
|
1232
1416
|
# @!attribute [rw] admin_account
|
1233
|
-
# The
|
1417
|
+
# The administrator account that you want to get the details for.
|
1234
1418
|
# @return [String]
|
1235
1419
|
#
|
1236
1420
|
# @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/GetAdminScopeRequest AWS API Documentation
|
@@ -1248,7 +1432,7 @@ module Aws::FMS
|
|
1248
1432
|
#
|
1249
1433
|
# @!attribute [rw] status
|
1250
1434
|
# The current status of the request to onboard a member account as an
|
1251
|
-
# Firewall Manager
|
1435
|
+
# Firewall Manager administrator.
|
1252
1436
|
#
|
1253
1437
|
# * `ONBOARDING` - The account is onboarding to Firewall Manager as an
|
1254
1438
|
# administrator.
|
@@ -1637,6 +1821,8 @@ module Aws::FMS
|
|
1637
1821
|
#
|
1638
1822
|
# * Security group content audit
|
1639
1823
|
#
|
1824
|
+
# * Network ACL
|
1825
|
+
#
|
1640
1826
|
# * Third-party firewall
|
1641
1827
|
# @return [String]
|
1642
1828
|
#
|
@@ -1710,6 +1896,40 @@ module Aws::FMS
|
|
1710
1896
|
include Aws::Structure
|
1711
1897
|
end
|
1712
1898
|
|
1899
|
+
# Violation detail for the entries in a network ACL resource.
|
1900
|
+
#
|
1901
|
+
# @!attribute [rw] vpc
|
1902
|
+
# The VPC where the violation was found.
|
1903
|
+
# @return [String]
|
1904
|
+
#
|
1905
|
+
# @!attribute [rw] subnet
|
1906
|
+
# The subnet that's associated with the network ACL.
|
1907
|
+
# @return [String]
|
1908
|
+
#
|
1909
|
+
# @!attribute [rw] subnet_availability_zone
|
1910
|
+
# The Availability Zone where the network ACL is in use.
|
1911
|
+
# @return [String]
|
1912
|
+
#
|
1913
|
+
# @!attribute [rw] current_associated_network_acl
|
1914
|
+
# The network ACL containing the entry violations.
|
1915
|
+
# @return [String]
|
1916
|
+
#
|
1917
|
+
# @!attribute [rw] entry_violations
|
1918
|
+
# Detailed information about the entry violations in the network ACL.
|
1919
|
+
# @return [Array<Types::EntryViolation>]
|
1920
|
+
#
|
1921
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/InvalidNetworkAclEntriesViolation AWS API Documentation
|
1922
|
+
#
|
1923
|
+
class InvalidNetworkAclEntriesViolation < Struct.new(
|
1924
|
+
:vpc,
|
1925
|
+
:subnet,
|
1926
|
+
:subnet_availability_zone,
|
1927
|
+
:current_associated_network_acl,
|
1928
|
+
:entry_violations)
|
1929
|
+
SENSITIVE = []
|
1930
|
+
include Aws::Structure
|
1931
|
+
end
|
1932
|
+
|
1713
1933
|
# The operation failed because there was nothing to do or the operation
|
1714
1934
|
# wasn't possible. For example, you might have submitted an
|
1715
1935
|
# `AssociateAdminAccount` request for an account ID that was already set
|
@@ -2351,6 +2571,205 @@ module Aws::FMS
|
|
2351
2571
|
include Aws::Structure
|
2352
2572
|
end
|
2353
2573
|
|
2574
|
+
# Defines a Firewall Manager network ACL policy. This is used in the
|
2575
|
+
# `PolicyOption` of a `SecurityServicePolicyData` for a `Policy`, when
|
2576
|
+
# the `SecurityServicePolicyData` type is set to `NETWORK_ACL_COMMON`.
|
2577
|
+
#
|
2578
|
+
# For information about network ACLs, see [Control traffic to subnets
|
2579
|
+
# using network ACLs][1] in the *Amazon Virtual Private Cloud User
|
2580
|
+
# Guide*.
|
2581
|
+
#
|
2582
|
+
#
|
2583
|
+
#
|
2584
|
+
# [1]: https://docs.aws.amazon.com/vpc/latest/userguide/vpc-network-acls.html
|
2585
|
+
#
|
2586
|
+
# @!attribute [rw] network_acl_entry_set
|
2587
|
+
# The definition of the first and last rules for the network ACL
|
2588
|
+
# policy.
|
2589
|
+
# @return [Types::NetworkAclEntrySet]
|
2590
|
+
#
|
2591
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/NetworkAclCommonPolicy AWS API Documentation
|
2592
|
+
#
|
2593
|
+
class NetworkAclCommonPolicy < Struct.new(
|
2594
|
+
:network_acl_entry_set)
|
2595
|
+
SENSITIVE = []
|
2596
|
+
include Aws::Structure
|
2597
|
+
end
|
2598
|
+
|
2599
|
+
# Describes a rule in a network ACL.
|
2600
|
+
#
|
2601
|
+
# Each network ACL has a set of numbered ingress rules and a separate
|
2602
|
+
# set of numbered egress rules. When determining whether a packet should
|
2603
|
+
# be allowed in or out of a subnet associated with the network ACL,
|
2604
|
+
# Amazon Web Services processes the entries in the network ACL according
|
2605
|
+
# to the rule numbers, in ascending order.
|
2606
|
+
#
|
2607
|
+
# When you manage an individual network ACL, you explicitly specify the
|
2608
|
+
# rule numbers. When you specify the network ACL rules in a Firewall
|
2609
|
+
# Manager policy, you provide the rules to run first, in the order that
|
2610
|
+
# you want them to run, and the rules to run last, in the order that you
|
2611
|
+
# want them to run. Firewall Manager assigns the rule numbers for you
|
2612
|
+
# when you save the network ACL policy specification.
|
2613
|
+
#
|
2614
|
+
# @!attribute [rw] icmp_type_code
|
2615
|
+
# ICMP protocol: The ICMP type and code.
|
2616
|
+
# @return [Types::NetworkAclIcmpTypeCode]
|
2617
|
+
#
|
2618
|
+
# @!attribute [rw] protocol
|
2619
|
+
# The protocol number. A value of "-1" means all protocols.
|
2620
|
+
# @return [String]
|
2621
|
+
#
|
2622
|
+
# @!attribute [rw] port_range
|
2623
|
+
# TCP or UDP protocols: The range of ports the rule applies to.
|
2624
|
+
# @return [Types::NetworkAclPortRange]
|
2625
|
+
#
|
2626
|
+
# @!attribute [rw] cidr_block
|
2627
|
+
# The IPv4 network range to allow or deny, in CIDR notation.
|
2628
|
+
# @return [String]
|
2629
|
+
#
|
2630
|
+
# @!attribute [rw] ipv_6_cidr_block
|
2631
|
+
# The IPv6 network range to allow or deny, in CIDR notation.
|
2632
|
+
# @return [String]
|
2633
|
+
#
|
2634
|
+
# @!attribute [rw] rule_action
|
2635
|
+
# Indicates whether to allow or deny the traffic that matches the
|
2636
|
+
# rule.
|
2637
|
+
# @return [String]
|
2638
|
+
#
|
2639
|
+
# @!attribute [rw] egress
|
2640
|
+
# Indicates whether the rule is an egress, or outbound, rule (applied
|
2641
|
+
# to traffic leaving the subnet). If it's not an egress rule, then
|
2642
|
+
# it's an ingress, or inbound, rule.
|
2643
|
+
# @return [Boolean]
|
2644
|
+
#
|
2645
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/NetworkAclEntry AWS API Documentation
|
2646
|
+
#
|
2647
|
+
class NetworkAclEntry < Struct.new(
|
2648
|
+
:icmp_type_code,
|
2649
|
+
:protocol,
|
2650
|
+
:port_range,
|
2651
|
+
:cidr_block,
|
2652
|
+
:ipv_6_cidr_block,
|
2653
|
+
:rule_action,
|
2654
|
+
:egress)
|
2655
|
+
SENSITIVE = []
|
2656
|
+
include Aws::Structure
|
2657
|
+
end
|
2658
|
+
|
2659
|
+
# The configuration of the first and last rules for the network ACL
|
2660
|
+
# policy, and the remediation settings for each.
|
2661
|
+
#
|
2662
|
+
# @!attribute [rw] first_entries
|
2663
|
+
# The rules that you want to run first in the Firewall Manager managed
|
2664
|
+
# network ACLs.
|
2665
|
+
#
|
2666
|
+
# <note markdown="1"> Provide these in the order in which you want them to run. Firewall
|
2667
|
+
# Manager will assign the specific rule numbers for you, in the
|
2668
|
+
# network ACLs that it creates.
|
2669
|
+
#
|
2670
|
+
# </note>
|
2671
|
+
#
|
2672
|
+
# You must specify at least one first entry or one last entry in any
|
2673
|
+
# network ACL policy.
|
2674
|
+
# @return [Array<Types::NetworkAclEntry>]
|
2675
|
+
#
|
2676
|
+
# @!attribute [rw] force_remediate_for_first_entries
|
2677
|
+
# Applies only when remediation is enabled for the policy as a whole.
|
2678
|
+
# Firewall Manager uses this setting when it finds policy violations
|
2679
|
+
# that involve conflicts between the custom entries and the policy
|
2680
|
+
# entries.
|
2681
|
+
#
|
2682
|
+
# If forced remediation is disabled, Firewall Manager marks the
|
2683
|
+
# network ACL as noncompliant and does not try to remediate. For more
|
2684
|
+
# information about the remediation behavior, see [Network access
|
2685
|
+
# control list (ACL) policies][1] in the *Firewall Manager Developer
|
2686
|
+
# Guide*.
|
2687
|
+
#
|
2688
|
+
#
|
2689
|
+
#
|
2690
|
+
# [1]: https://docs.aws.amazon.com/waf/latest/developerguide/network-acl-policies.html
|
2691
|
+
# @return [Boolean]
|
2692
|
+
#
|
2693
|
+
# @!attribute [rw] last_entries
|
2694
|
+
# The rules that you want to run last in the Firewall Manager managed
|
2695
|
+
# network ACLs.
|
2696
|
+
#
|
2697
|
+
# <note markdown="1"> Provide these in the order in which you want them to run. Firewall
|
2698
|
+
# Manager will assign the specific rule numbers for you, in the
|
2699
|
+
# network ACLs that it creates.
|
2700
|
+
#
|
2701
|
+
# </note>
|
2702
|
+
#
|
2703
|
+
# You must specify at least one first entry or one last entry in any
|
2704
|
+
# network ACL policy.
|
2705
|
+
# @return [Array<Types::NetworkAclEntry>]
|
2706
|
+
#
|
2707
|
+
# @!attribute [rw] force_remediate_for_last_entries
|
2708
|
+
# Applies only when remediation is enabled for the policy as a whole.
|
2709
|
+
# Firewall Manager uses this setting when it finds policy violations
|
2710
|
+
# that involve conflicts between the custom entries and the policy
|
2711
|
+
# entries.
|
2712
|
+
#
|
2713
|
+
# If forced remediation is disabled, Firewall Manager marks the
|
2714
|
+
# network ACL as noncompliant and does not try to remediate. For more
|
2715
|
+
# information about the remediation behavior, see [Network access
|
2716
|
+
# control list (ACL) policies][1] in the *Firewall Manager Developer
|
2717
|
+
# Guide*.
|
2718
|
+
#
|
2719
|
+
#
|
2720
|
+
#
|
2721
|
+
# [1]: https://docs.aws.amazon.com/waf/latest/developerguide/network-acl-policies.html
|
2722
|
+
# @return [Boolean]
|
2723
|
+
#
|
2724
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/NetworkAclEntrySet AWS API Documentation
|
2725
|
+
#
|
2726
|
+
class NetworkAclEntrySet < Struct.new(
|
2727
|
+
:first_entries,
|
2728
|
+
:force_remediate_for_first_entries,
|
2729
|
+
:last_entries,
|
2730
|
+
:force_remediate_for_last_entries)
|
2731
|
+
SENSITIVE = []
|
2732
|
+
include Aws::Structure
|
2733
|
+
end
|
2734
|
+
|
2735
|
+
# ICMP protocol: The ICMP type and code.
|
2736
|
+
#
|
2737
|
+
# @!attribute [rw] code
|
2738
|
+
# ICMP code.
|
2739
|
+
# @return [Integer]
|
2740
|
+
#
|
2741
|
+
# @!attribute [rw] type
|
2742
|
+
# ICMP type.
|
2743
|
+
# @return [Integer]
|
2744
|
+
#
|
2745
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/NetworkAclIcmpTypeCode AWS API Documentation
|
2746
|
+
#
|
2747
|
+
class NetworkAclIcmpTypeCode < Struct.new(
|
2748
|
+
:code,
|
2749
|
+
:type)
|
2750
|
+
SENSITIVE = []
|
2751
|
+
include Aws::Structure
|
2752
|
+
end
|
2753
|
+
|
2754
|
+
# TCP or UDP protocols: The range of ports the rule applies to.
|
2755
|
+
#
|
2756
|
+
# @!attribute [rw] from
|
2757
|
+
# The beginning port number of the range.
|
2758
|
+
# @return [Integer]
|
2759
|
+
#
|
2760
|
+
# @!attribute [rw] to
|
2761
|
+
# The ending port number of the range.
|
2762
|
+
# @return [Integer]
|
2763
|
+
#
|
2764
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/NetworkAclPortRange AWS API Documentation
|
2765
|
+
#
|
2766
|
+
class NetworkAclPortRange < Struct.new(
|
2767
|
+
:from,
|
2768
|
+
:to)
|
2769
|
+
SENSITIVE = []
|
2770
|
+
include Aws::Structure
|
2771
|
+
end
|
2772
|
+
|
2354
2773
|
# Violation detail for an internet gateway route with an inactive state
|
2355
2774
|
# in the customer subnet route table or Network Firewall subnet route
|
2356
2775
|
# table.
|
@@ -2997,17 +3416,19 @@ module Aws::FMS
|
|
2997
3416
|
# `AWS::ElasticLoadBalancingV2::LoadBalancer`, and
|
2998
3417
|
# `AWS::CloudFront::Distribution`.
|
2999
3418
|
#
|
3000
|
-
# * DNS Firewall, Network Firewall, and third-party firewall -
|
3001
|
-
# `AWS::EC2::VPC`.
|
3002
|
-
#
|
3003
3419
|
# * Shield Advanced - `AWS::ElasticLoadBalancingV2::LoadBalancer`,
|
3004
3420
|
# `AWS::ElasticLoadBalancing::LoadBalancer`, `AWS::EC2::EIP`, and
|
3005
3421
|
# `AWS::CloudFront::Distribution`.
|
3006
3422
|
#
|
3423
|
+
# * Network ACL - `AWS::EC2::Subnet`.
|
3424
|
+
#
|
3425
|
+
# * Security group usage audit - `AWS::EC2::SecurityGroup`.
|
3426
|
+
#
|
3007
3427
|
# * Security group content audit - `AWS::EC2::SecurityGroup`,
|
3008
3428
|
# `AWS::EC2::NetworkInterface`, and `AWS::EC2::Instance`.
|
3009
3429
|
#
|
3010
|
-
# *
|
3430
|
+
# * DNS Firewall, Network Firewall, and third-party firewall -
|
3431
|
+
# `AWS::EC2::VPC`.
|
3011
3432
|
#
|
3012
3433
|
#
|
3013
3434
|
#
|
@@ -3257,8 +3678,9 @@ module Aws::FMS
|
|
3257
3678
|
include Aws::Structure
|
3258
3679
|
end
|
3259
3680
|
|
3260
|
-
# Contains the
|
3261
|
-
# policy
|
3681
|
+
# Contains the settings to configure a network ACL policy, a Network
|
3682
|
+
# Firewall firewall policy deployment model, or a third-party firewall
|
3683
|
+
# policy.
|
3262
3684
|
#
|
3263
3685
|
# @!attribute [rw] network_firewall_policy
|
3264
3686
|
# Defines the deployment model to use for the firewall policy.
|
@@ -3268,11 +3690,16 @@ module Aws::FMS
|
|
3268
3690
|
# Defines the policy options for a third-party firewall policy.
|
3269
3691
|
# @return [Types::ThirdPartyFirewallPolicy]
|
3270
3692
|
#
|
3693
|
+
# @!attribute [rw] network_acl_common_policy
|
3694
|
+
# Defines a Firewall Manager network ACL policy.
|
3695
|
+
# @return [Types::NetworkAclCommonPolicy]
|
3696
|
+
#
|
3271
3697
|
# @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/PolicyOption AWS API Documentation
|
3272
3698
|
#
|
3273
3699
|
class PolicyOption < Struct.new(
|
3274
3700
|
:network_firewall_policy,
|
3275
|
-
:third_party_firewall_policy
|
3701
|
+
:third_party_firewall_policy,
|
3702
|
+
:network_acl_common_policy)
|
3276
3703
|
SENSITIVE = []
|
3277
3704
|
include Aws::Structure
|
3278
3705
|
end
|
@@ -3294,16 +3721,7 @@ module Aws::FMS
|
|
3294
3721
|
# @!attribute [rw] resource_type
|
3295
3722
|
# The type of resource protected by or in scope of the policy. This is
|
3296
3723
|
# in the format shown in the [Amazon Web Services Resource Types
|
3297
|
-
# Reference][1].
|
3298
|
-
# `AWS::ElasticLoadBalancingV2::LoadBalancer` and
|
3299
|
-
# `AWS::CloudFront::Distribution`. For a security group common policy,
|
3300
|
-
# valid values are `AWS::EC2::NetworkInterface` and
|
3301
|
-
# `AWS::EC2::Instance`. For a security group content audit policy,
|
3302
|
-
# valid values are `AWS::EC2::SecurityGroup`,
|
3303
|
-
# `AWS::EC2::NetworkInterface`, and `AWS::EC2::Instance`. For a
|
3304
|
-
# security group usage audit policy, the value is
|
3305
|
-
# `AWS::EC2::SecurityGroup`. For an Network Firewall policy or DNS
|
3306
|
-
# Firewall policy, the value is `AWS::EC2::VPC`.
|
3724
|
+
# Reference][1].
|
3307
3725
|
#
|
3308
3726
|
#
|
3309
3727
|
#
|
@@ -3760,6 +4178,25 @@ module Aws::FMS
|
|
3760
4178
|
# The remedial action to take when updating a firewall configuration.
|
3761
4179
|
# @return [Types::FMSPolicyUpdateFirewallCreationConfigAction]
|
3762
4180
|
#
|
4181
|
+
# @!attribute [rw] create_network_acl_action
|
4182
|
+
# Information about the `CreateNetworkAcl` action in Amazon EC2.
|
4183
|
+
# @return [Types::CreateNetworkAclAction]
|
4184
|
+
#
|
4185
|
+
# @!attribute [rw] replace_network_acl_association_action
|
4186
|
+
# Information about the `ReplaceNetworkAclAssociation` action in
|
4187
|
+
# Amazon EC2.
|
4188
|
+
# @return [Types::ReplaceNetworkAclAssociationAction]
|
4189
|
+
#
|
4190
|
+
# @!attribute [rw] create_network_acl_entries_action
|
4191
|
+
# Information about the `CreateNetworkAclEntries` action in Amazon
|
4192
|
+
# EC2.
|
4193
|
+
# @return [Types::CreateNetworkAclEntriesAction]
|
4194
|
+
#
|
4195
|
+
# @!attribute [rw] delete_network_acl_entries_action
|
4196
|
+
# Information about the `DeleteNetworkAclEntries` action in Amazon
|
4197
|
+
# EC2.
|
4198
|
+
# @return [Types::DeleteNetworkAclEntriesAction]
|
4199
|
+
#
|
3763
4200
|
# @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/RemediationAction AWS API Documentation
|
3764
4201
|
#
|
3765
4202
|
class RemediationAction < Struct.new(
|
@@ -3771,7 +4208,11 @@ module Aws::FMS
|
|
3771
4208
|
:ec2_replace_route_table_association_action,
|
3772
4209
|
:ec2_associate_route_table_action,
|
3773
4210
|
:ec2_create_route_table_action,
|
3774
|
-
:fms_policy_update_firewall_creation_config_action
|
4211
|
+
:fms_policy_update_firewall_creation_config_action,
|
4212
|
+
:create_network_acl_action,
|
4213
|
+
:replace_network_acl_association_action,
|
4214
|
+
:create_network_acl_entries_action,
|
4215
|
+
:delete_network_acl_entries_action)
|
3775
4216
|
SENSITIVE = []
|
3776
4217
|
include Aws::Structure
|
3777
4218
|
end
|
@@ -3795,6 +4236,39 @@ module Aws::FMS
|
|
3795
4236
|
include Aws::Structure
|
3796
4237
|
end
|
3797
4238
|
|
4239
|
+
# Information about the `ReplaceNetworkAclAssociation` action in Amazon
|
4240
|
+
# EC2. This is a remediation option in `RemediationAction`.
|
4241
|
+
#
|
4242
|
+
# @!attribute [rw] description
|
4243
|
+
# Brief description of this remediation action.
|
4244
|
+
# @return [String]
|
4245
|
+
#
|
4246
|
+
# @!attribute [rw] association_id
|
4247
|
+
# Describes a remediation action target.
|
4248
|
+
# @return [Types::ActionTarget]
|
4249
|
+
#
|
4250
|
+
# @!attribute [rw] network_acl_id
|
4251
|
+
# The network ACL that's associated with the remediation action.
|
4252
|
+
# @return [Types::ActionTarget]
|
4253
|
+
#
|
4254
|
+
# @!attribute [rw] fms_can_remediate
|
4255
|
+
# Indicates whether it is possible for Firewall Manager to perform
|
4256
|
+
# this remediation action. A false value indicates that auto
|
4257
|
+
# remediation is disabled or Firewall Manager is unable to perform the
|
4258
|
+
# action due to a conflict of some kind.
|
4259
|
+
# @return [Boolean]
|
4260
|
+
#
|
4261
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/ReplaceNetworkAclAssociationAction AWS API Documentation
|
4262
|
+
#
|
4263
|
+
class ReplaceNetworkAclAssociationAction < Struct.new(
|
4264
|
+
:description,
|
4265
|
+
:association_id,
|
4266
|
+
:network_acl_id,
|
4267
|
+
:fms_can_remediate)
|
4268
|
+
SENSITIVE = []
|
4269
|
+
include Aws::Structure
|
4270
|
+
end
|
4271
|
+
|
3798
4272
|
# Details of a resource that is associated to an Firewall Manager
|
3799
4273
|
# resource set.
|
3800
4274
|
#
|
@@ -4067,12 +4541,6 @@ module Aws::FMS
|
|
4067
4541
|
# and failed.
|
4068
4542
|
# @return [Types::DnsRuleGroupLimitExceededViolation]
|
4069
4543
|
#
|
4070
|
-
# @!attribute [rw] possible_remediation_actions
|
4071
|
-
# A list of possible remediation action lists. Each individual
|
4072
|
-
# possible remediation action is a list of individual remediation
|
4073
|
-
# actions.
|
4074
|
-
# @return [Types::PossibleRemediationActions]
|
4075
|
-
#
|
4076
4544
|
# @!attribute [rw] firewall_subnet_is_out_of_scope_violation
|
4077
4545
|
# Contains details about the firewall subnet that violates the policy
|
4078
4546
|
# scope.
|
@@ -4104,6 +4572,16 @@ module Aws::FMS
|
|
4104
4572
|
# subnet that was deleted.
|
4105
4573
|
# @return [Types::FirewallSubnetMissingVPCEndpointViolation]
|
4106
4574
|
#
|
4575
|
+
# @!attribute [rw] invalid_network_acl_entries_violation
|
4576
|
+
# Violation detail for the entries in a network ACL resource.
|
4577
|
+
# @return [Types::InvalidNetworkAclEntriesViolation]
|
4578
|
+
#
|
4579
|
+
# @!attribute [rw] possible_remediation_actions
|
4580
|
+
# A list of possible remediation action lists. Each individual
|
4581
|
+
# possible remediation action is a list of individual remediation
|
4582
|
+
# actions.
|
4583
|
+
# @return [Types::PossibleRemediationActions]
|
4584
|
+
#
|
4107
4585
|
# @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/ResourceViolation AWS API Documentation
|
4108
4586
|
#
|
4109
4587
|
class ResourceViolation < Struct.new(
|
@@ -4123,13 +4601,14 @@ module Aws::FMS
|
|
4123
4601
|
:dns_rule_group_priority_conflict_violation,
|
4124
4602
|
:dns_duplicate_rule_group_violation,
|
4125
4603
|
:dns_rule_group_limit_exceeded_violation,
|
4126
|
-
:possible_remediation_actions,
|
4127
4604
|
:firewall_subnet_is_out_of_scope_violation,
|
4128
4605
|
:route_has_out_of_scope_endpoint_violation,
|
4129
4606
|
:third_party_firewall_missing_firewall_violation,
|
4130
4607
|
:third_party_firewall_missing_subnet_violation,
|
4131
4608
|
:third_party_firewall_missing_expected_route_table_violation,
|
4132
|
-
:firewall_subnet_missing_vpc_endpoint_violation
|
4609
|
+
:firewall_subnet_missing_vpc_endpoint_violation,
|
4610
|
+
:invalid_network_acl_entries_violation,
|
4611
|
+
:possible_remediation_actions)
|
4133
4612
|
SENSITIVE = []
|
4134
4613
|
include Aws::Structure
|
4135
4614
|
end
|
@@ -4424,7 +4903,7 @@ module Aws::FMS
|
|
4424
4903
|
# and reports when the security groups created by this policy become
|
4425
4904
|
# non-compliant.
|
4426
4905
|
#
|
4427
|
-
# Firewall Manager won't
|
4906
|
+
# Firewall Manager won't distribute system tags added by Amazon Web
|
4428
4907
|
# Services services into the replica security groups. System tags
|
4429
4908
|
# begin with the `aws:` prefix.
|
4430
4909
|
#
|
@@ -4645,8 +5124,9 @@ module Aws::FMS
|
|
4645
5124
|
# @return [String]
|
4646
5125
|
#
|
4647
5126
|
# @!attribute [rw] policy_option
|
4648
|
-
# Contains the
|
4649
|
-
#
|
5127
|
+
# Contains the settings to configure a network ACL policy, a Network
|
5128
|
+
# Firewall firewall policy deployment model, or a third-party firewall
|
5129
|
+
# policy.
|
4650
5130
|
# @return [Types::PolicyOption]
|
4651
5131
|
#
|
4652
5132
|
# @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/SecurityServicePolicyData AWS API Documentation
|
@@ -4664,21 +5144,63 @@ module Aws::FMS
|
|
4664
5144
|
#
|
4665
5145
|
# @!attribute [rw] rule_order
|
4666
5146
|
# Indicates how to manage the order of stateful rule evaluation for
|
4667
|
-
# the policy.
|
4668
|
-
#
|
4669
|
-
#
|
4670
|
-
#
|
4671
|
-
#
|
5147
|
+
# the policy. Stateful rules are provided to the rule engine as
|
5148
|
+
# Suricata compatible strings, and Suricata evaluates them based on
|
5149
|
+
# certain settings. For more information, see [Evaluation order for
|
5150
|
+
# stateful rules][1] in the *Network Firewall Developer Guide*.
|
5151
|
+
#
|
5152
|
+
# Default: `DEFAULT_ACTION_ORDER`
|
4672
5153
|
#
|
4673
5154
|
#
|
4674
5155
|
#
|
4675
5156
|
# [1]: https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html
|
4676
5157
|
# @return [String]
|
4677
5158
|
#
|
5159
|
+
# @!attribute [rw] stream_exception_policy
|
5160
|
+
# Indicates how Network Firewall should handle traffic when a network
|
5161
|
+
# connection breaks midstream.
|
5162
|
+
#
|
5163
|
+
# * `DROP` - Fail closed and drop all subsequent traffic going to the
|
5164
|
+
# firewall.
|
5165
|
+
#
|
5166
|
+
# * `CONTINUE` - Continue to apply rules to subsequent traffic without
|
5167
|
+
# context from traffic before the break. This impacts the behavior
|
5168
|
+
# of rules that depend on context. For example, with a stateful rule
|
5169
|
+
# that drops HTTP traffic, Network Firewall won't match subsequent
|
5170
|
+
# traffic because the it won't have the context from session
|
5171
|
+
# initialization, which defines the application layer protocol as
|
5172
|
+
# HTTP. However, a TCP-layer rule using a `flow:stateless` rule
|
5173
|
+
# would still match, and so would the `aws:drop_strict` default
|
5174
|
+
# action.
|
5175
|
+
#
|
5176
|
+
# * `REJECT` - Fail closed and drop all subsequent traffic going to
|
5177
|
+
# the firewall. With this option, Network Firewall also sends a TCP
|
5178
|
+
# reject packet back to the client so the client can immediately
|
5179
|
+
# establish a new session. With the new session, Network Firewall
|
5180
|
+
# will have context and will apply rules appropriately.
|
5181
|
+
#
|
5182
|
+
# For applications that are reliant on long-lived TCP connections
|
5183
|
+
# that trigger Gateway Load Balancer idle timeouts, this is the
|
5184
|
+
# recommended setting.
|
5185
|
+
#
|
5186
|
+
# * `FMS_IGNORE` - Firewall Manager doesn't monitor or modify the
|
5187
|
+
# Network Firewall stream exception policy settings.
|
5188
|
+
#
|
5189
|
+
# For more information, see [Stream exception policy in your firewall
|
5190
|
+
# policy][1] in the *Network Firewall Developer Guide*.
|
5191
|
+
#
|
5192
|
+
# Default: `FMS_IGNORE`
|
5193
|
+
#
|
5194
|
+
#
|
5195
|
+
#
|
5196
|
+
# [1]: https://docs.aws.amazon.com/network-firewall/latest/developerguide/stream-exception-policy.html
|
5197
|
+
# @return [String]
|
5198
|
+
#
|
4678
5199
|
# @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/StatefulEngineOptions AWS API Documentation
|
4679
5200
|
#
|
4680
5201
|
class StatefulEngineOptions < Struct.new(
|
4681
|
-
:rule_order
|
5202
|
+
:rule_order,
|
5203
|
+
:stream_exception_policy)
|
4682
5204
|
SENSITIVE = []
|
4683
5205
|
include Aws::Structure
|
4684
5206
|
end
|