aws-sdk-fms 1.67.0 → 1.69.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -100,7 +100,7 @@ module Aws::FMS
100
100
  #
101
101
  # @!attribute [rw] status
102
102
  # The current status of the request to onboard a member account as an
103
- # Firewall Manager administator.
103
+ # Firewall Manager administrator.
104
104
  #
105
105
  # * `ONBOARDING` - The account is onboarding to Firewall Manager as an
106
106
  # administrator.
@@ -528,6 +528,67 @@ module Aws::FMS
528
528
  include Aws::Structure
529
529
  end
530
530
 
531
+ # Information about the `CreateNetworkAcl` action in Amazon EC2. This is
532
+ # a remediation option in `RemediationAction`.
533
+ #
534
+ # @!attribute [rw] description
535
+ # Brief description of this remediation action.
536
+ # @return [String]
537
+ #
538
+ # @!attribute [rw] vpc
539
+ # The VPC that's associated with the remediation action.
540
+ # @return [Types::ActionTarget]
541
+ #
542
+ # @!attribute [rw] fms_can_remediate
543
+ # Indicates whether it is possible for Firewall Manager to perform
544
+ # this remediation action. A false value indicates that auto
545
+ # remediation is disabled or Firewall Manager is unable to perform the
546
+ # action due to a conflict of some kind.
547
+ # @return [Boolean]
548
+ #
549
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/CreateNetworkAclAction AWS API Documentation
550
+ #
551
+ class CreateNetworkAclAction < Struct.new(
552
+ :description,
553
+ :vpc,
554
+ :fms_can_remediate)
555
+ SENSITIVE = []
556
+ include Aws::Structure
557
+ end
558
+
559
+ # Information about the `CreateNetworkAclEntries` action in Amazon EC2.
560
+ # This is a remediation option in `RemediationAction`.
561
+ #
562
+ # @!attribute [rw] description
563
+ # Brief description of this remediation action.
564
+ # @return [String]
565
+ #
566
+ # @!attribute [rw] network_acl_id
567
+ # The network ACL that's associated with the remediation action.
568
+ # @return [Types::ActionTarget]
569
+ #
570
+ # @!attribute [rw] network_acl_entries_to_be_created
571
+ # Lists the entries that the remediation action would create.
572
+ # @return [Array<Types::EntryDescription>]
573
+ #
574
+ # @!attribute [rw] fms_can_remediate
575
+ # Indicates whether it is possible for Firewall Manager to perform
576
+ # this remediation action. A false value indicates that auto
577
+ # remediation is disabled or Firewall Manager is unable to perform the
578
+ # action due to a conflict of some kind.
579
+ # @return [Boolean]
580
+ #
581
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/CreateNetworkAclEntriesAction AWS API Documentation
582
+ #
583
+ class CreateNetworkAclEntriesAction < Struct.new(
584
+ :description,
585
+ :network_acl_id,
586
+ :network_acl_entries_to_be_created,
587
+ :fms_can_remediate)
588
+ SENSITIVE = []
589
+ include Aws::Structure
590
+ end
591
+
531
592
  # @!attribute [rw] list_id
532
593
  # The ID of the applications list that you want to delete. You can
533
594
  # retrieve this ID from `PutAppsList`, `ListAppsLists`, and
@@ -542,6 +603,39 @@ module Aws::FMS
542
603
  include Aws::Structure
543
604
  end
544
605
 
606
+ # Information about the `DeleteNetworkAclEntries` action in Amazon EC2.
607
+ # This is a remediation option in `RemediationAction`.
608
+ #
609
+ # @!attribute [rw] description
610
+ # Brief description of this remediation action.
611
+ # @return [String]
612
+ #
613
+ # @!attribute [rw] network_acl_id
614
+ # The network ACL that's associated with the remediation action.
615
+ # @return [Types::ActionTarget]
616
+ #
617
+ # @!attribute [rw] network_acl_entries_to_be_deleted
618
+ # Lists the entries that the remediation action would delete.
619
+ # @return [Array<Types::EntryDescription>]
620
+ #
621
+ # @!attribute [rw] fms_can_remediate
622
+ # Indicates whether it is possible for Firewall Manager to perform
623
+ # this remediation action. A false value indicates that auto
624
+ # remediation is disabled or Firewall Manager is unable to perform the
625
+ # action due to a conflict of some kind.
626
+ # @return [Boolean]
627
+ #
628
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/DeleteNetworkAclEntriesAction AWS API Documentation
629
+ #
630
+ class DeleteNetworkAclEntriesAction < Struct.new(
631
+ :description,
632
+ :network_acl_id,
633
+ :network_acl_entries_to_be_deleted,
634
+ :fms_can_remediate)
635
+ SENSITIVE = []
636
+ include Aws::Structure
637
+ end
638
+
545
639
  # @api private
546
640
  #
547
641
  # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/DeleteNotificationChannelRequest AWS API Documentation
@@ -1014,6 +1108,96 @@ module Aws::FMS
1014
1108
  include Aws::Structure
1015
1109
  end
1016
1110
 
1111
+ # Describes a single rule in a network ACL.
1112
+ #
1113
+ # @!attribute [rw] entry_detail
1114
+ # Describes a rule in a network ACL.
1115
+ #
1116
+ # Each network ACL has a set of numbered ingress rules and a separate
1117
+ # set of numbered egress rules. When determining whether a packet
1118
+ # should be allowed in or out of a subnet associated with the network
1119
+ # ACL, Amazon Web Services processes the entries in the network ACL
1120
+ # according to the rule numbers, in ascending order.
1121
+ #
1122
+ # When you manage an individual network ACL, you explicitly specify
1123
+ # the rule numbers. When you specify the network ACL rules in a
1124
+ # Firewall Manager policy, you provide the rules to run first, in the
1125
+ # order that you want them to run, and the rules to run last, in the
1126
+ # order that you want them to run. Firewall Manager assigns the rule
1127
+ # numbers for you when you save the network ACL policy specification.
1128
+ # @return [Types::NetworkAclEntry]
1129
+ #
1130
+ # @!attribute [rw] entry_rule_number
1131
+ # The rule number for the entry. ACL entries are processed in
1132
+ # ascending order by rule number. In a Firewall Manager network ACL
1133
+ # policy, Firewall Manager assigns rule numbers.
1134
+ # @return [Integer]
1135
+ #
1136
+ # @!attribute [rw] entry_type
1137
+ # Specifies whether the entry is managed by Firewall Manager or by a
1138
+ # user, and, for Firewall Manager-managed entries, specifies whether
1139
+ # the entry is among those that run first in the network ACL or those
1140
+ # that run last.
1141
+ # @return [String]
1142
+ #
1143
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/EntryDescription AWS API Documentation
1144
+ #
1145
+ class EntryDescription < Struct.new(
1146
+ :entry_detail,
1147
+ :entry_rule_number,
1148
+ :entry_type)
1149
+ SENSITIVE = []
1150
+ include Aws::Structure
1151
+ end
1152
+
1153
+ # Detailed information about an entry violation in a network ACL. The
1154
+ # violation is against the network ACL specification inside the Firewall
1155
+ # Manager network ACL policy. This data object is part of
1156
+ # `InvalidNetworkAclEntriesViolation`.
1157
+ #
1158
+ # @!attribute [rw] expected_entry
1159
+ # The Firewall Manager-managed network ACL entry that is involved in
1160
+ # the entry violation.
1161
+ # @return [Types::EntryDescription]
1162
+ #
1163
+ # @!attribute [rw] expected_evaluation_order
1164
+ # The evaluation location within the ordered list of entries where the
1165
+ # `ExpectedEntry` should be, according to the network ACL policy
1166
+ # specifications.
1167
+ # @return [String]
1168
+ #
1169
+ # @!attribute [rw] actual_evaluation_order
1170
+ # The evaluation location within the ordered list of entries where the
1171
+ # `ExpectedEntry` is currently located.
1172
+ # @return [String]
1173
+ #
1174
+ # @!attribute [rw] entry_at_expected_evaluation_order
1175
+ # The entry that's currently in the `ExpectedEvaluationOrder`
1176
+ # location, in place of the expected entry.
1177
+ # @return [Types::EntryDescription]
1178
+ #
1179
+ # @!attribute [rw] entries_with_conflicts
1180
+ # The list of entries that are in conflict with `ExpectedEntry`.
1181
+ # @return [Array<Types::EntryDescription>]
1182
+ #
1183
+ # @!attribute [rw] entry_violation_reasons
1184
+ # Descriptions of the violations that Firewall Manager found for these
1185
+ # entries.
1186
+ # @return [Array<String>]
1187
+ #
1188
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/EntryViolation AWS API Documentation
1189
+ #
1190
+ class EntryViolation < Struct.new(
1191
+ :expected_entry,
1192
+ :expected_evaluation_order,
1193
+ :actual_evaluation_order,
1194
+ :entry_at_expected_evaluation_order,
1195
+ :entries_with_conflicts,
1196
+ :entry_violation_reasons)
1197
+ SENSITIVE = []
1198
+ include Aws::Structure
1199
+ end
1200
+
1017
1201
  # Describes the compliance status for the account. An account is
1018
1202
  # considered noncompliant if it includes resources that are not
1019
1203
  # protected by the specified policy or that don't comply with the
@@ -1230,7 +1414,7 @@ module Aws::FMS
1230
1414
  end
1231
1415
 
1232
1416
  # @!attribute [rw] admin_account
1233
- # The administator account that you want to get the details for.
1417
+ # The administrator account that you want to get the details for.
1234
1418
  # @return [String]
1235
1419
  #
1236
1420
  # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/GetAdminScopeRequest AWS API Documentation
@@ -1248,7 +1432,7 @@ module Aws::FMS
1248
1432
  #
1249
1433
  # @!attribute [rw] status
1250
1434
  # The current status of the request to onboard a member account as an
1251
- # Firewall Manager administator.
1435
+ # Firewall Manager administrator.
1252
1436
  #
1253
1437
  # * `ONBOARDING` - The account is onboarding to Firewall Manager as an
1254
1438
  # administrator.
@@ -1637,6 +1821,8 @@ module Aws::FMS
1637
1821
  #
1638
1822
  # * Security group content audit
1639
1823
  #
1824
+ # * Network ACL
1825
+ #
1640
1826
  # * Third-party firewall
1641
1827
  # @return [String]
1642
1828
  #
@@ -1710,6 +1896,40 @@ module Aws::FMS
1710
1896
  include Aws::Structure
1711
1897
  end
1712
1898
 
1899
+ # Violation detail for the entries in a network ACL resource.
1900
+ #
1901
+ # @!attribute [rw] vpc
1902
+ # The VPC where the violation was found.
1903
+ # @return [String]
1904
+ #
1905
+ # @!attribute [rw] subnet
1906
+ # The subnet that's associated with the network ACL.
1907
+ # @return [String]
1908
+ #
1909
+ # @!attribute [rw] subnet_availability_zone
1910
+ # The Availability Zone where the network ACL is in use.
1911
+ # @return [String]
1912
+ #
1913
+ # @!attribute [rw] current_associated_network_acl
1914
+ # The network ACL containing the entry violations.
1915
+ # @return [String]
1916
+ #
1917
+ # @!attribute [rw] entry_violations
1918
+ # Detailed information about the entry violations in the network ACL.
1919
+ # @return [Array<Types::EntryViolation>]
1920
+ #
1921
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/InvalidNetworkAclEntriesViolation AWS API Documentation
1922
+ #
1923
+ class InvalidNetworkAclEntriesViolation < Struct.new(
1924
+ :vpc,
1925
+ :subnet,
1926
+ :subnet_availability_zone,
1927
+ :current_associated_network_acl,
1928
+ :entry_violations)
1929
+ SENSITIVE = []
1930
+ include Aws::Structure
1931
+ end
1932
+
1713
1933
  # The operation failed because there was nothing to do or the operation
1714
1934
  # wasn't possible. For example, you might have submitted an
1715
1935
  # `AssociateAdminAccount` request for an account ID that was already set
@@ -2351,6 +2571,205 @@ module Aws::FMS
2351
2571
  include Aws::Structure
2352
2572
  end
2353
2573
 
2574
+ # Defines a Firewall Manager network ACL policy. This is used in the
2575
+ # `PolicyOption` of a `SecurityServicePolicyData` for a `Policy`, when
2576
+ # the `SecurityServicePolicyData` type is set to `NETWORK_ACL_COMMON`.
2577
+ #
2578
+ # For information about network ACLs, see [Control traffic to subnets
2579
+ # using network ACLs][1] in the *Amazon Virtual Private Cloud User
2580
+ # Guide*.
2581
+ #
2582
+ #
2583
+ #
2584
+ # [1]: https://docs.aws.amazon.com/vpc/latest/userguide/vpc-network-acls.html
2585
+ #
2586
+ # @!attribute [rw] network_acl_entry_set
2587
+ # The definition of the first and last rules for the network ACL
2588
+ # policy.
2589
+ # @return [Types::NetworkAclEntrySet]
2590
+ #
2591
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/NetworkAclCommonPolicy AWS API Documentation
2592
+ #
2593
+ class NetworkAclCommonPolicy < Struct.new(
2594
+ :network_acl_entry_set)
2595
+ SENSITIVE = []
2596
+ include Aws::Structure
2597
+ end
2598
+
2599
+ # Describes a rule in a network ACL.
2600
+ #
2601
+ # Each network ACL has a set of numbered ingress rules and a separate
2602
+ # set of numbered egress rules. When determining whether a packet should
2603
+ # be allowed in or out of a subnet associated with the network ACL,
2604
+ # Amazon Web Services processes the entries in the network ACL according
2605
+ # to the rule numbers, in ascending order.
2606
+ #
2607
+ # When you manage an individual network ACL, you explicitly specify the
2608
+ # rule numbers. When you specify the network ACL rules in a Firewall
2609
+ # Manager policy, you provide the rules to run first, in the order that
2610
+ # you want them to run, and the rules to run last, in the order that you
2611
+ # want them to run. Firewall Manager assigns the rule numbers for you
2612
+ # when you save the network ACL policy specification.
2613
+ #
2614
+ # @!attribute [rw] icmp_type_code
2615
+ # ICMP protocol: The ICMP type and code.
2616
+ # @return [Types::NetworkAclIcmpTypeCode]
2617
+ #
2618
+ # @!attribute [rw] protocol
2619
+ # The protocol number. A value of "-1" means all protocols.
2620
+ # @return [String]
2621
+ #
2622
+ # @!attribute [rw] port_range
2623
+ # TCP or UDP protocols: The range of ports the rule applies to.
2624
+ # @return [Types::NetworkAclPortRange]
2625
+ #
2626
+ # @!attribute [rw] cidr_block
2627
+ # The IPv4 network range to allow or deny, in CIDR notation.
2628
+ # @return [String]
2629
+ #
2630
+ # @!attribute [rw] ipv_6_cidr_block
2631
+ # The IPv6 network range to allow or deny, in CIDR notation.
2632
+ # @return [String]
2633
+ #
2634
+ # @!attribute [rw] rule_action
2635
+ # Indicates whether to allow or deny the traffic that matches the
2636
+ # rule.
2637
+ # @return [String]
2638
+ #
2639
+ # @!attribute [rw] egress
2640
+ # Indicates whether the rule is an egress, or outbound, rule (applied
2641
+ # to traffic leaving the subnet). If it's not an egress rule, then
2642
+ # it's an ingress, or inbound, rule.
2643
+ # @return [Boolean]
2644
+ #
2645
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/NetworkAclEntry AWS API Documentation
2646
+ #
2647
+ class NetworkAclEntry < Struct.new(
2648
+ :icmp_type_code,
2649
+ :protocol,
2650
+ :port_range,
2651
+ :cidr_block,
2652
+ :ipv_6_cidr_block,
2653
+ :rule_action,
2654
+ :egress)
2655
+ SENSITIVE = []
2656
+ include Aws::Structure
2657
+ end
2658
+
2659
+ # The configuration of the first and last rules for the network ACL
2660
+ # policy, and the remediation settings for each.
2661
+ #
2662
+ # @!attribute [rw] first_entries
2663
+ # The rules that you want to run first in the Firewall Manager managed
2664
+ # network ACLs.
2665
+ #
2666
+ # <note markdown="1"> Provide these in the order in which you want them to run. Firewall
2667
+ # Manager will assign the specific rule numbers for you, in the
2668
+ # network ACLs that it creates.
2669
+ #
2670
+ # </note>
2671
+ #
2672
+ # You must specify at least one first entry or one last entry in any
2673
+ # network ACL policy.
2674
+ # @return [Array<Types::NetworkAclEntry>]
2675
+ #
2676
+ # @!attribute [rw] force_remediate_for_first_entries
2677
+ # Applies only when remediation is enabled for the policy as a whole.
2678
+ # Firewall Manager uses this setting when it finds policy violations
2679
+ # that involve conflicts between the custom entries and the policy
2680
+ # entries.
2681
+ #
2682
+ # If forced remediation is disabled, Firewall Manager marks the
2683
+ # network ACL as noncompliant and does not try to remediate. For more
2684
+ # information about the remediation behavior, see [Network access
2685
+ # control list (ACL) policies][1] in the *Firewall Manager Developer
2686
+ # Guide*.
2687
+ #
2688
+ #
2689
+ #
2690
+ # [1]: https://docs.aws.amazon.com/waf/latest/developerguide/network-acl-policies.html
2691
+ # @return [Boolean]
2692
+ #
2693
+ # @!attribute [rw] last_entries
2694
+ # The rules that you want to run last in the Firewall Manager managed
2695
+ # network ACLs.
2696
+ #
2697
+ # <note markdown="1"> Provide these in the order in which you want them to run. Firewall
2698
+ # Manager will assign the specific rule numbers for you, in the
2699
+ # network ACLs that it creates.
2700
+ #
2701
+ # </note>
2702
+ #
2703
+ # You must specify at least one first entry or one last entry in any
2704
+ # network ACL policy.
2705
+ # @return [Array<Types::NetworkAclEntry>]
2706
+ #
2707
+ # @!attribute [rw] force_remediate_for_last_entries
2708
+ # Applies only when remediation is enabled for the policy as a whole.
2709
+ # Firewall Manager uses this setting when it finds policy violations
2710
+ # that involve conflicts between the custom entries and the policy
2711
+ # entries.
2712
+ #
2713
+ # If forced remediation is disabled, Firewall Manager marks the
2714
+ # network ACL as noncompliant and does not try to remediate. For more
2715
+ # information about the remediation behavior, see [Network access
2716
+ # control list (ACL) policies][1] in the *Firewall Manager Developer
2717
+ # Guide*.
2718
+ #
2719
+ #
2720
+ #
2721
+ # [1]: https://docs.aws.amazon.com/waf/latest/developerguide/network-acl-policies.html
2722
+ # @return [Boolean]
2723
+ #
2724
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/NetworkAclEntrySet AWS API Documentation
2725
+ #
2726
+ class NetworkAclEntrySet < Struct.new(
2727
+ :first_entries,
2728
+ :force_remediate_for_first_entries,
2729
+ :last_entries,
2730
+ :force_remediate_for_last_entries)
2731
+ SENSITIVE = []
2732
+ include Aws::Structure
2733
+ end
2734
+
2735
+ # ICMP protocol: The ICMP type and code.
2736
+ #
2737
+ # @!attribute [rw] code
2738
+ # ICMP code.
2739
+ # @return [Integer]
2740
+ #
2741
+ # @!attribute [rw] type
2742
+ # ICMP type.
2743
+ # @return [Integer]
2744
+ #
2745
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/NetworkAclIcmpTypeCode AWS API Documentation
2746
+ #
2747
+ class NetworkAclIcmpTypeCode < Struct.new(
2748
+ :code,
2749
+ :type)
2750
+ SENSITIVE = []
2751
+ include Aws::Structure
2752
+ end
2753
+
2754
+ # TCP or UDP protocols: The range of ports the rule applies to.
2755
+ #
2756
+ # @!attribute [rw] from
2757
+ # The beginning port number of the range.
2758
+ # @return [Integer]
2759
+ #
2760
+ # @!attribute [rw] to
2761
+ # The ending port number of the range.
2762
+ # @return [Integer]
2763
+ #
2764
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/NetworkAclPortRange AWS API Documentation
2765
+ #
2766
+ class NetworkAclPortRange < Struct.new(
2767
+ :from,
2768
+ :to)
2769
+ SENSITIVE = []
2770
+ include Aws::Structure
2771
+ end
2772
+
2354
2773
  # Violation detail for an internet gateway route with an inactive state
2355
2774
  # in the customer subnet route table or Network Firewall subnet route
2356
2775
  # table.
@@ -2997,17 +3416,19 @@ module Aws::FMS
2997
3416
  # `AWS::ElasticLoadBalancingV2::LoadBalancer`, and
2998
3417
  # `AWS::CloudFront::Distribution`.
2999
3418
  #
3000
- # * DNS Firewall, Network Firewall, and third-party firewall -
3001
- # `AWS::EC2::VPC`.
3002
- #
3003
3419
  # * Shield Advanced - `AWS::ElasticLoadBalancingV2::LoadBalancer`,
3004
3420
  # `AWS::ElasticLoadBalancing::LoadBalancer`, `AWS::EC2::EIP`, and
3005
3421
  # `AWS::CloudFront::Distribution`.
3006
3422
  #
3423
+ # * Network ACL - `AWS::EC2::Subnet`.
3424
+ #
3425
+ # * Security group usage audit - `AWS::EC2::SecurityGroup`.
3426
+ #
3007
3427
  # * Security group content audit - `AWS::EC2::SecurityGroup`,
3008
3428
  # `AWS::EC2::NetworkInterface`, and `AWS::EC2::Instance`.
3009
3429
  #
3010
- # * Security group usage audit - `AWS::EC2::SecurityGroup`.
3430
+ # * DNS Firewall, Network Firewall, and third-party firewall -
3431
+ # `AWS::EC2::VPC`.
3011
3432
  #
3012
3433
  #
3013
3434
  #
@@ -3257,8 +3678,9 @@ module Aws::FMS
3257
3678
  include Aws::Structure
3258
3679
  end
3259
3680
 
3260
- # Contains the Network Firewall firewall policy options to configure the
3261
- # policy's deployment model and third-party firewall policy settings.
3681
+ # Contains the settings to configure a network ACL policy, a Network
3682
+ # Firewall firewall policy deployment model, or a third-party firewall
3683
+ # policy.
3262
3684
  #
3263
3685
  # @!attribute [rw] network_firewall_policy
3264
3686
  # Defines the deployment model to use for the firewall policy.
@@ -3268,11 +3690,16 @@ module Aws::FMS
3268
3690
  # Defines the policy options for a third-party firewall policy.
3269
3691
  # @return [Types::ThirdPartyFirewallPolicy]
3270
3692
  #
3693
+ # @!attribute [rw] network_acl_common_policy
3694
+ # Defines a Firewall Manager network ACL policy.
3695
+ # @return [Types::NetworkAclCommonPolicy]
3696
+ #
3271
3697
  # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/PolicyOption AWS API Documentation
3272
3698
  #
3273
3699
  class PolicyOption < Struct.new(
3274
3700
  :network_firewall_policy,
3275
- :third_party_firewall_policy)
3701
+ :third_party_firewall_policy,
3702
+ :network_acl_common_policy)
3276
3703
  SENSITIVE = []
3277
3704
  include Aws::Structure
3278
3705
  end
@@ -3294,16 +3721,7 @@ module Aws::FMS
3294
3721
  # @!attribute [rw] resource_type
3295
3722
  # The type of resource protected by or in scope of the policy. This is
3296
3723
  # in the format shown in the [Amazon Web Services Resource Types
3297
- # Reference][1]. For WAF and Shield Advanced, examples include
3298
- # `AWS::ElasticLoadBalancingV2::LoadBalancer` and
3299
- # `AWS::CloudFront::Distribution`. For a security group common policy,
3300
- # valid values are `AWS::EC2::NetworkInterface` and
3301
- # `AWS::EC2::Instance`. For a security group content audit policy,
3302
- # valid values are `AWS::EC2::SecurityGroup`,
3303
- # `AWS::EC2::NetworkInterface`, and `AWS::EC2::Instance`. For a
3304
- # security group usage audit policy, the value is
3305
- # `AWS::EC2::SecurityGroup`. For an Network Firewall policy or DNS
3306
- # Firewall policy, the value is `AWS::EC2::VPC`.
3724
+ # Reference][1].
3307
3725
  #
3308
3726
  #
3309
3727
  #
@@ -3760,6 +4178,25 @@ module Aws::FMS
3760
4178
  # The remedial action to take when updating a firewall configuration.
3761
4179
  # @return [Types::FMSPolicyUpdateFirewallCreationConfigAction]
3762
4180
  #
4181
+ # @!attribute [rw] create_network_acl_action
4182
+ # Information about the `CreateNetworkAcl` action in Amazon EC2.
4183
+ # @return [Types::CreateNetworkAclAction]
4184
+ #
4185
+ # @!attribute [rw] replace_network_acl_association_action
4186
+ # Information about the `ReplaceNetworkAclAssociation` action in
4187
+ # Amazon EC2.
4188
+ # @return [Types::ReplaceNetworkAclAssociationAction]
4189
+ #
4190
+ # @!attribute [rw] create_network_acl_entries_action
4191
+ # Information about the `CreateNetworkAclEntries` action in Amazon
4192
+ # EC2.
4193
+ # @return [Types::CreateNetworkAclEntriesAction]
4194
+ #
4195
+ # @!attribute [rw] delete_network_acl_entries_action
4196
+ # Information about the `DeleteNetworkAclEntries` action in Amazon
4197
+ # EC2.
4198
+ # @return [Types::DeleteNetworkAclEntriesAction]
4199
+ #
3763
4200
  # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/RemediationAction AWS API Documentation
3764
4201
  #
3765
4202
  class RemediationAction < Struct.new(
@@ -3771,7 +4208,11 @@ module Aws::FMS
3771
4208
  :ec2_replace_route_table_association_action,
3772
4209
  :ec2_associate_route_table_action,
3773
4210
  :ec2_create_route_table_action,
3774
- :fms_policy_update_firewall_creation_config_action)
4211
+ :fms_policy_update_firewall_creation_config_action,
4212
+ :create_network_acl_action,
4213
+ :replace_network_acl_association_action,
4214
+ :create_network_acl_entries_action,
4215
+ :delete_network_acl_entries_action)
3775
4216
  SENSITIVE = []
3776
4217
  include Aws::Structure
3777
4218
  end
@@ -3795,6 +4236,39 @@ module Aws::FMS
3795
4236
  include Aws::Structure
3796
4237
  end
3797
4238
 
4239
+ # Information about the `ReplaceNetworkAclAssociation` action in Amazon
4240
+ # EC2. This is a remediation option in `RemediationAction`.
4241
+ #
4242
+ # @!attribute [rw] description
4243
+ # Brief description of this remediation action.
4244
+ # @return [String]
4245
+ #
4246
+ # @!attribute [rw] association_id
4247
+ # Describes a remediation action target.
4248
+ # @return [Types::ActionTarget]
4249
+ #
4250
+ # @!attribute [rw] network_acl_id
4251
+ # The network ACL that's associated with the remediation action.
4252
+ # @return [Types::ActionTarget]
4253
+ #
4254
+ # @!attribute [rw] fms_can_remediate
4255
+ # Indicates whether it is possible for Firewall Manager to perform
4256
+ # this remediation action. A false value indicates that auto
4257
+ # remediation is disabled or Firewall Manager is unable to perform the
4258
+ # action due to a conflict of some kind.
4259
+ # @return [Boolean]
4260
+ #
4261
+ # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/ReplaceNetworkAclAssociationAction AWS API Documentation
4262
+ #
4263
+ class ReplaceNetworkAclAssociationAction < Struct.new(
4264
+ :description,
4265
+ :association_id,
4266
+ :network_acl_id,
4267
+ :fms_can_remediate)
4268
+ SENSITIVE = []
4269
+ include Aws::Structure
4270
+ end
4271
+
3798
4272
  # Details of a resource that is associated to an Firewall Manager
3799
4273
  # resource set.
3800
4274
  #
@@ -4067,12 +4541,6 @@ module Aws::FMS
4067
4541
  # and failed.
4068
4542
  # @return [Types::DnsRuleGroupLimitExceededViolation]
4069
4543
  #
4070
- # @!attribute [rw] possible_remediation_actions
4071
- # A list of possible remediation action lists. Each individual
4072
- # possible remediation action is a list of individual remediation
4073
- # actions.
4074
- # @return [Types::PossibleRemediationActions]
4075
- #
4076
4544
  # @!attribute [rw] firewall_subnet_is_out_of_scope_violation
4077
4545
  # Contains details about the firewall subnet that violates the policy
4078
4546
  # scope.
@@ -4104,6 +4572,16 @@ module Aws::FMS
4104
4572
  # subnet that was deleted.
4105
4573
  # @return [Types::FirewallSubnetMissingVPCEndpointViolation]
4106
4574
  #
4575
+ # @!attribute [rw] invalid_network_acl_entries_violation
4576
+ # Violation detail for the entries in a network ACL resource.
4577
+ # @return [Types::InvalidNetworkAclEntriesViolation]
4578
+ #
4579
+ # @!attribute [rw] possible_remediation_actions
4580
+ # A list of possible remediation action lists. Each individual
4581
+ # possible remediation action is a list of individual remediation
4582
+ # actions.
4583
+ # @return [Types::PossibleRemediationActions]
4584
+ #
4107
4585
  # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/ResourceViolation AWS API Documentation
4108
4586
  #
4109
4587
  class ResourceViolation < Struct.new(
@@ -4123,13 +4601,14 @@ module Aws::FMS
4123
4601
  :dns_rule_group_priority_conflict_violation,
4124
4602
  :dns_duplicate_rule_group_violation,
4125
4603
  :dns_rule_group_limit_exceeded_violation,
4126
- :possible_remediation_actions,
4127
4604
  :firewall_subnet_is_out_of_scope_violation,
4128
4605
  :route_has_out_of_scope_endpoint_violation,
4129
4606
  :third_party_firewall_missing_firewall_violation,
4130
4607
  :third_party_firewall_missing_subnet_violation,
4131
4608
  :third_party_firewall_missing_expected_route_table_violation,
4132
- :firewall_subnet_missing_vpc_endpoint_violation)
4609
+ :firewall_subnet_missing_vpc_endpoint_violation,
4610
+ :invalid_network_acl_entries_violation,
4611
+ :possible_remediation_actions)
4133
4612
  SENSITIVE = []
4134
4613
  include Aws::Structure
4135
4614
  end
@@ -4424,7 +4903,7 @@ module Aws::FMS
4424
4903
  # and reports when the security groups created by this policy become
4425
4904
  # non-compliant.
4426
4905
  #
4427
- # Firewall Manager won't distrubute system tags added by Amazon Web
4906
+ # Firewall Manager won't distribute system tags added by Amazon Web
4428
4907
  # Services services into the replica security groups. System tags
4429
4908
  # begin with the `aws:` prefix.
4430
4909
  #
@@ -4645,8 +5124,9 @@ module Aws::FMS
4645
5124
  # @return [String]
4646
5125
  #
4647
5126
  # @!attribute [rw] policy_option
4648
- # Contains the Network Firewall firewall policy options to configure a
4649
- # centralized deployment model.
5127
+ # Contains the settings to configure a network ACL policy, a Network
5128
+ # Firewall firewall policy deployment model, or a third-party firewall
5129
+ # policy.
4650
5130
  # @return [Types::PolicyOption]
4651
5131
  #
4652
5132
  # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/SecurityServicePolicyData AWS API Documentation
@@ -4664,21 +5144,63 @@ module Aws::FMS
4664
5144
  #
4665
5145
  # @!attribute [rw] rule_order
4666
5146
  # Indicates how to manage the order of stateful rule evaluation for
4667
- # the policy. `DEFAULT_ACTION_ORDER` is the default behavior. Stateful
4668
- # rules are provided to the rule engine as Suricata compatible
4669
- # strings, and Suricata evaluates them based on certain settings. For
4670
- # more information, see [Evaluation order for stateful rules][1] in
4671
- # the *Network Firewall Developer Guide*.
5147
+ # the policy. Stateful rules are provided to the rule engine as
5148
+ # Suricata compatible strings, and Suricata evaluates them based on
5149
+ # certain settings. For more information, see [Evaluation order for
5150
+ # stateful rules][1] in the *Network Firewall Developer Guide*.
5151
+ #
5152
+ # Default: `DEFAULT_ACTION_ORDER`
4672
5153
  #
4673
5154
  #
4674
5155
  #
4675
5156
  # [1]: https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html
4676
5157
  # @return [String]
4677
5158
  #
5159
+ # @!attribute [rw] stream_exception_policy
5160
+ # Indicates how Network Firewall should handle traffic when a network
5161
+ # connection breaks midstream.
5162
+ #
5163
+ # * `DROP` - Fail closed and drop all subsequent traffic going to the
5164
+ # firewall.
5165
+ #
5166
+ # * `CONTINUE` - Continue to apply rules to subsequent traffic without
5167
+ # context from traffic before the break. This impacts the behavior
5168
+ # of rules that depend on context. For example, with a stateful rule
5169
+ # that drops HTTP traffic, Network Firewall won't match subsequent
5170
+ # traffic because the it won't have the context from session
5171
+ # initialization, which defines the application layer protocol as
5172
+ # HTTP. However, a TCP-layer rule using a `flow:stateless` rule
5173
+ # would still match, and so would the `aws:drop_strict` default
5174
+ # action.
5175
+ #
5176
+ # * `REJECT` - Fail closed and drop all subsequent traffic going to
5177
+ # the firewall. With this option, Network Firewall also sends a TCP
5178
+ # reject packet back to the client so the client can immediately
5179
+ # establish a new session. With the new session, Network Firewall
5180
+ # will have context and will apply rules appropriately.
5181
+ #
5182
+ # For applications that are reliant on long-lived TCP connections
5183
+ # that trigger Gateway Load Balancer idle timeouts, this is the
5184
+ # recommended setting.
5185
+ #
5186
+ # * `FMS_IGNORE` - Firewall Manager doesn't monitor or modify the
5187
+ # Network Firewall stream exception policy settings.
5188
+ #
5189
+ # For more information, see [Stream exception policy in your firewall
5190
+ # policy][1] in the *Network Firewall Developer Guide*.
5191
+ #
5192
+ # Default: `FMS_IGNORE`
5193
+ #
5194
+ #
5195
+ #
5196
+ # [1]: https://docs.aws.amazon.com/network-firewall/latest/developerguide/stream-exception-policy.html
5197
+ # @return [String]
5198
+ #
4678
5199
  # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/StatefulEngineOptions AWS API Documentation
4679
5200
  #
4680
5201
  class StatefulEngineOptions < Struct.new(
4681
- :rule_order)
5202
+ :rule_order,
5203
+ :stream_exception_policy)
4682
5204
  SENSITIVE = []
4683
5205
  include Aws::Structure
4684
5206
  end