aws-sdk-fms 1.18.0 → 1.19.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 4fa045776728f3aac3709e2cdcdc61af5a55ec24
4
- data.tar.gz: ebfb0cedd0a8fe7326ea091362e5f1bec857bbd4
3
+ metadata.gz: 476466d4fe38aa8c9aa515c3aa5eb574b2af9354
4
+ data.tar.gz: 6e59a6eb401ffc20af8f21a1a2f40d8a1c7ed173
5
5
  SHA512:
6
- metadata.gz: 89eb0f70f4ba90f63bb78118421c2427a177bc0ab5d426b40a99f8e1d6e3f7c9f5e6c6edcb1872fe9c09ab1d99e48f5e7104b0595873ea88a693192bf25aa31c
7
- data.tar.gz: 23af38f841cf88850f69dc7b17f4e609f07e856cc8f64df917b2c6caa71e00d6254ec606c6b81fa75d10affdc3d862acd108fca2cd879cf94427e4f332286465
6
+ metadata.gz: 83f8ba6fb8a3c0386fdea27dfc740d9fb99975ab5f23363282f54a14d1b9107a6870e445dab2a593811bd90b5db490a57a8937dfa4c0259520a60c8c04e9f0c8
7
+ data.tar.gz: 35ea4ad21b1be2502c49663dc7a9b484165e93d381e39e36358f79e2d5493b9b53cac05615e849f9f1a68ad78dcba9a1f3a735d7116832da93194481e225fde8
@@ -42,6 +42,6 @@ require_relative 'aws-sdk-fms/customizations'
42
42
  # @service
43
43
  module Aws::FMS
44
44
 
45
- GEM_VERSION = '1.18.0'
45
+ GEM_VERSION = '1.19.0'
46
46
 
47
47
  end
@@ -265,7 +265,7 @@ module Aws::FMS
265
265
  # @!group API Operations
266
266
 
267
267
  # Sets the AWS Firewall Manager administrator account. AWS Firewall
268
- # Manager must be associated with the master account your AWS
268
+ # Manager must be associated with the master account of your AWS
269
269
  # organization or associated with a member account that has the
270
270
  # appropriate permissions. If the account ID that you submit is not an
271
271
  # AWS Organizations master account, AWS Firewall Manager will set the
@@ -324,21 +324,34 @@ module Aws::FMS
324
324
  # by `PutPolicy` and by `ListPolicies`.
325
325
  #
326
326
  # @option params [Boolean] :delete_all_policy_resources
327
- # If `True`, the request will also perform a clean-up process that will:
327
+ # If `True`, the request performs cleanup according to the policy type.
328
328
  #
329
- # * Delete rule groups created by AWS Firewall Manager
329
+ # For AWS WAF and Shield Advanced policies, the cleanup does the
330
+ # following:
330
331
  #
331
- # * Remove web ACLs from in-scope resources
332
+ # * Deletes rule groups created by AWS Firewall Manager
332
333
  #
333
- # * Delete web ACLs that contain no rules or rule groups
334
+ # * Removes web ACLs from in-scope resources
334
335
  #
335
- # After the cleanup, in-scope resources will no longer be protected by
336
- # web ACLs in this policy. Protection of out-of-scope resources will
337
- # remain unchanged. Scope is determined by tags and accounts associated
338
- # with the policy. When creating the policy, if you specified that only
339
- # resources in specific accounts or with specific tags be protected by
340
- # the policy, those resources are in-scope. All others are out of scope.
341
- # If you did not specify tags or accounts, all resources are in-scope.
336
+ # * Deletes web ACLs that contain no rules or rule groups
337
+ #
338
+ # For security group policies, the cleanup does the following for each
339
+ # security group in the policy:
340
+ #
341
+ # * Disassociates the security group from in-scope resources
342
+ #
343
+ # * Deletes the security group if it was created through Firewall
344
+ # Manager and if it's no longer associated with any resources through
345
+ # another policy
346
+ #
347
+ # After the cleanup, in-scope resources are no longer protected by web
348
+ # ACLs in this policy. Protection of out-of-scope resources remains
349
+ # unchanged. Scope is determined by tags that you create and accounts
350
+ # that you associate with the policy. When creating the policy, if you
351
+ # specify that only resources in specific accounts or with specific tags
352
+ # are in scope of the policy, those accounts and resources are handled
353
+ # by the policy. All others are out of scope. If you don't specify tags
354
+ # or accounts, all resources are in scope.
342
355
  #
343
356
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
344
357
  #
@@ -361,7 +374,7 @@ module Aws::FMS
361
374
  # Disassociates the account that has been set as the AWS Firewall
362
375
  # Manager administrator account. To set a different account as the
363
376
  # administrator account, you must submit an `AssociateAdminAccount`
364
- # request .
377
+ # request.
365
378
  #
366
379
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
367
380
  #
@@ -398,8 +411,12 @@ module Aws::FMS
398
411
 
399
412
  # Returns detailed compliance information about the specified member
400
413
  # account. Details include resources that are in and out of compliance
401
- # with the specified policy. Resources are considered non-compliant if
402
- # the specified policy has not been applied to them.
414
+ # with the specified policy. Resources are considered noncompliant for
415
+ # AWS WAF and Shield Advanced policies if the specified policy has not
416
+ # been applied to them. Resources are considered noncompliant for
417
+ # security group policies if they are in scope of the policy, they
418
+ # violate one or more of the policy rules, and remediation is disabled
419
+ # or not possible.
403
420
  #
404
421
  # @option params [required, String] :policy_id
405
422
  # The ID of the policy that you want to get the details for. `PolicyId`
@@ -427,7 +444,7 @@ module Aws::FMS
427
444
  # resp.policy_compliance_detail.member_account #=> String
428
445
  # resp.policy_compliance_detail.violators #=> Array
429
446
  # resp.policy_compliance_detail.violators[0].resource_id #=> String
430
- # resp.policy_compliance_detail.violators[0].violation_reason #=> String, one of "WEB_ACL_MISSING_RULE_GROUP", "RESOURCE_MISSING_WEB_ACL", "RESOURCE_INCORRECT_WEB_ACL", "RESOURCE_MISSING_SHIELD_PROTECTION"
447
+ # resp.policy_compliance_detail.violators[0].violation_reason #=> String, one of "WEB_ACL_MISSING_RULE_GROUP", "RESOURCE_MISSING_WEB_ACL", "RESOURCE_INCORRECT_WEB_ACL", "RESOURCE_MISSING_SHIELD_PROTECTION", "RESOURCE_MISSING_WEB_ACL_OR_SHIELD_PROTECTION", "RESOURCE_MISSING_SECURITY_GROUP", "RESOURCE_VIOLATES_AUDIT_SECURITY_GROUP", "SECURITY_GROUP_UNUSED", "SECURITY_GROUP_REDUNDANT"
431
448
  # resp.policy_compliance_detail.violators[0].resource_type #=> String
432
449
  # resp.policy_compliance_detail.evaluation_limit_exceeded #=> Boolean
433
450
  # resp.policy_compliance_detail.expired_at #=> Time
@@ -443,8 +460,8 @@ module Aws::FMS
443
460
  req.send_request(options)
444
461
  end
445
462
 
446
- # Returns information about the Amazon Simple Notification Service (SNS)
447
- # topic that is used to record AWS Firewall Manager SNS logs.
463
+ # Information about the Amazon Simple Notification Service (SNS) topic
464
+ # that is used to record AWS Firewall Manager SNS logs.
448
465
  #
449
466
  # @return [Types::GetNotificationChannelResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
450
467
  #
@@ -487,7 +504,7 @@ module Aws::FMS
487
504
  # resp.policy.policy_id #=> String
488
505
  # resp.policy.policy_name #=> String
489
506
  # resp.policy.policy_update_token #=> String
490
- # resp.policy.security_service_policy_data.type #=> String, one of "WAF", "SHIELD_ADVANCED"
507
+ # resp.policy.security_service_policy_data.type #=> String, one of "WAF", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
491
508
  # resp.policy.security_service_policy_data.managed_service_data #=> String
492
509
  # resp.policy.resource_type #=> String
493
510
  # resp.policy.resource_type_list #=> Array
@@ -515,7 +532,8 @@ module Aws::FMS
515
532
  end
516
533
 
517
534
  # If you created a Shield Advanced policy, returns policy-level attack
518
- # summary information in the event of a potential DDoS attack.
535
+ # summary information in the event of a potential DDoS attack. Other
536
+ # policy types are currently unsupported.
519
537
  #
520
538
  # @option params [required, String] :policy_id
521
539
  # The ID of the policy for which you want to get the attack information.
@@ -526,21 +544,21 @@ module Aws::FMS
526
544
  #
527
545
  # @option params [Time,DateTime,Date,Integer,String] :start_time
528
546
  # The start of the time period to query for the attacks. This is a
529
- # `timestamp` type. The sample request above indicates a number type
547
+ # `timestamp` type. The request syntax listing indicates a `number` type
530
548
  # because the default used by AWS Firewall Manager is Unix time in
531
549
  # seconds. However, any valid `timestamp` format is allowed.
532
550
  #
533
551
  # @option params [Time,DateTime,Date,Integer,String] :end_time
534
552
  # The end of the time period to query for the attacks. This is a
535
- # `timestamp` type. The sample request above indicates a number type
553
+ # `timestamp` type. The request syntax listing indicates a `number` type
536
554
  # because the default used by AWS Firewall Manager is Unix time in
537
555
  # seconds. However, any valid `timestamp` format is allowed.
538
556
  #
539
557
  # @option params [String] :next_token
540
558
  # If you specify a value for `MaxResults` and you have more objects than
541
559
  # the number that you specify for `MaxResults`, AWS Firewall Manager
542
- # returns a `NextToken` value in the response that allows you to list
543
- # another group of objects. For the second and subsequent
560
+ # returns a `NextToken` value in the response, which you can use to
561
+ # retrieve another group of objects. For the second and subsequent
544
562
  # `GetProtectionStatus` requests, specify the value of `NextToken` from
545
563
  # the previous response to get information about another batch of
546
564
  # objects.
@@ -572,7 +590,7 @@ module Aws::FMS
572
590
  # @example Response structure
573
591
  #
574
592
  # resp.admin_account_id #=> String
575
- # resp.service_type #=> String, one of "WAF", "SHIELD_ADVANCED"
593
+ # resp.service_type #=> String, one of "WAF", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
576
594
  # resp.data #=> String
577
595
  # resp.next_token #=> String
578
596
  #
@@ -734,7 +752,7 @@ module Aws::FMS
734
752
  # resp.policy_list[0].policy_id #=> String
735
753
  # resp.policy_list[0].policy_name #=> String
736
754
  # resp.policy_list[0].resource_type #=> String
737
- # resp.policy_list[0].security_service_type #=> String, one of "WAF", "SHIELD_ADVANCED"
755
+ # resp.policy_list[0].security_service_type #=> String, one of "WAF", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
738
756
  # resp.policy_list[0].remediation_enabled #=> Boolean
739
757
  # resp.next_token #=> String
740
758
  #
@@ -778,17 +796,23 @@ module Aws::FMS
778
796
 
779
797
  # Creates an AWS Firewall Manager policy.
780
798
  #
781
- # Firewall Manager provides two types of policies: A Shield Advanced
782
- # policy, which applies Shield Advanced protection to specified accounts
783
- # and resources, or a WAF policy, which contains a rule group and
784
- # defines which resources are to be protected by that rule group. A
785
- # policy is specific to either WAF or Shield Advanced. If you want to
786
- # enforce both WAF rules and Shield Advanced protection across accounts,
787
- # you can create multiple policies. You can create one or more policies
788
- # for WAF rules, and one or more policies for Shield Advanced.
799
+ # Firewall Manager provides the following types of policies:
800
+ #
801
+ # * A Shield Advanced policy, which applies Shield Advanced protection
802
+ # to specified accounts and resources
803
+ #
804
+ # * An AWS WAF policy, which contains a rule group and defines which
805
+ # resources are to be protected by that rule group
806
+ #
807
+ # * A security group policy, which manages VPC security groups across
808
+ # your AWS organization.
809
+ #
810
+ # Each policy is specific to one of the three types. If you want to
811
+ # enforce more than one policy type across accounts, you can create
812
+ # multiple policies. You can create multiple policies for each type.
789
813
  #
790
814
  # You must be subscribed to Shield Advanced to create a Shield Advanced
791
- # policy. For more information on subscribing to Shield Advanced, see
815
+ # policy. For more information about subscribing to Shield Advanced, see
792
816
  # [CreateSubscription][1].
793
817
  #
794
818
  #
@@ -811,7 +835,7 @@ module Aws::FMS
811
835
  # policy_name: "ResourceName", # required
812
836
  # policy_update_token: "PolicyUpdateToken",
813
837
  # security_service_policy_data: { # required
814
- # type: "WAF", # required, accepts WAF, SHIELD_ADVANCED
838
+ # type: "WAF", # required, accepts WAF, SHIELD_ADVANCED, SECURITY_GROUPS_COMMON, SECURITY_GROUPS_CONTENT_AUDIT, SECURITY_GROUPS_USAGE_AUDIT
815
839
  # managed_service_data: "ManagedServiceData",
816
840
  # },
817
841
  # resource_type: "ResourceType", # required
@@ -838,7 +862,7 @@ module Aws::FMS
838
862
  # resp.policy.policy_id #=> String
839
863
  # resp.policy.policy_name #=> String
840
864
  # resp.policy.policy_update_token #=> String
841
- # resp.policy.security_service_policy_data.type #=> String, one of "WAF", "SHIELD_ADVANCED"
865
+ # resp.policy.security_service_policy_data.type #=> String, one of "WAF", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
842
866
  # resp.policy.security_service_policy_data.managed_service_data #=> String
843
867
  # resp.policy.resource_type #=> String
844
868
  # resp.policy.resource_type_list #=> Array
@@ -878,7 +902,7 @@ module Aws::FMS
878
902
  params: params,
879
903
  config: config)
880
904
  context[:gem_name] = 'aws-sdk-fms'
881
- context[:gem_version] = '1.18.0'
905
+ context[:gem_version] = '1.19.0'
882
906
  Seahorse::Client::Request.new(handlers, context)
883
907
  end
884
908
 
@@ -45,7 +45,7 @@ module Aws::FMS
45
45
  # @return [String]
46
46
  #
47
47
  # @!attribute [rw] resource_type
48
- # The resource type. This is in the format shown in [AWS Resource
48
+ # The resource type. This is in the format shown in the [AWS Resource
49
49
  # Types Reference][1]. For example:
50
50
  # `AWS::ElasticLoadBalancingV2::LoadBalancer` or
51
51
  # `AWS::CloudFront::Distribution`.
@@ -84,23 +84,35 @@ module Aws::FMS
84
84
  # @return [String]
85
85
  #
86
86
  # @!attribute [rw] delete_all_policy_resources
87
- # If `True`, the request will also perform a clean-up process that
88
- # will:
87
+ # If `True`, the request performs cleanup according to the policy
88
+ # type.
89
89
  #
90
- # * Delete rule groups created by AWS Firewall Manager
90
+ # For AWS WAF and Shield Advanced policies, the cleanup does the
91
+ # following:
91
92
  #
92
- # * Remove web ACLs from in-scope resources
93
+ # * Deletes rule groups created by AWS Firewall Manager
93
94
  #
94
- # * Delete web ACLs that contain no rules or rule groups
95
+ # * Removes web ACLs from in-scope resources
95
96
  #
96
- # After the cleanup, in-scope resources will no longer be protected by
97
- # web ACLs in this policy. Protection of out-of-scope resources will
98
- # remain unchanged. Scope is determined by tags and accounts
99
- # associated with the policy. When creating the policy, if you
100
- # specified that only resources in specific accounts or with specific
101
- # tags be protected by the policy, those resources are in-scope. All
102
- # others are out of scope. If you did not specify tags or accounts,
103
- # all resources are in-scope.
97
+ # * Deletes web ACLs that contain no rules or rule groups
98
+ #
99
+ # For security group policies, the cleanup does the following for each
100
+ # security group in the policy:
101
+ #
102
+ # * Disassociates the security group from in-scope resources
103
+ #
104
+ # * Deletes the security group if it was created through Firewall
105
+ # Manager and if it's no longer associated with any resources
106
+ # through another policy
107
+ #
108
+ # After the cleanup, in-scope resources are no longer protected by web
109
+ # ACLs in this policy. Protection of out-of-scope resources remains
110
+ # unchanged. Scope is determined by tags that you create and accounts
111
+ # that you associate with the policy. When creating the policy, if you
112
+ # specify that only resources in specific accounts or with specific
113
+ # tags are in scope of the policy, those accounts and resources are
114
+ # handled by the policy. All others are out of scope. If you don't
115
+ # specify tags or accounts, all resources are in scope.
104
116
  # @return [Boolean]
105
117
  #
106
118
  # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/DeletePolicyRequest AWS API Documentation
@@ -118,8 +130,9 @@ module Aws::FMS
118
130
  class DisassociateAdminAccountRequest < Aws::EmptyStructure; end
119
131
 
120
132
  # Describes the compliance status for the account. An account is
121
- # considered non-compliant if it includes resources that are not
122
- # protected by the specified policy.
133
+ # considered noncompliant if it includes resources that are not
134
+ # protected by the specified policy or that don't comply with the
135
+ # policy.
123
136
  #
124
137
  # @!attribute [rw] compliance_status
125
138
  # Describes an AWS account's compliance with the AWS Firewall Manager
@@ -127,13 +140,16 @@ module Aws::FMS
127
140
  # @return [String]
128
141
  #
129
142
  # @!attribute [rw] violator_count
130
- # Number of resources that are non-compliant with the specified
131
- # policy. A resource is considered non-compliant if it is not
132
- # associated with the specified policy.
143
+ # The number of resources that are noncompliant with the specified
144
+ # policy. For AWS WAF and Shield Advanced policies, a resource is
145
+ # considered noncompliant if it is not associated with the policy. For
146
+ # security group policies, a resource is considered noncompliant if it
147
+ # doesn't comply with the rules of the policy and remediation is
148
+ # disabled or not possible.
133
149
  # @return [Integer]
134
150
  #
135
151
  # @!attribute [rw] evaluation_limit_exceeded
136
- # Indicates that over 100 resources are non-compliant with the AWS
152
+ # Indicates that over 100 resources are noncompliant with the AWS
137
153
  # Firewall Manager policy.
138
154
  # @return [Boolean]
139
155
  #
@@ -290,26 +306,26 @@ module Aws::FMS
290
306
  #
291
307
  # @!attribute [rw] start_time
292
308
  # The start of the time period to query for the attacks. This is a
293
- # `timestamp` type. The sample request above indicates a number type
294
- # because the default used by AWS Firewall Manager is Unix time in
295
- # seconds. However, any valid `timestamp` format is allowed.
309
+ # `timestamp` type. The request syntax listing indicates a `number`
310
+ # type because the default used by AWS Firewall Manager is Unix time
311
+ # in seconds. However, any valid `timestamp` format is allowed.
296
312
  # @return [Time]
297
313
  #
298
314
  # @!attribute [rw] end_time
299
315
  # The end of the time period to query for the attacks. This is a
300
- # `timestamp` type. The sample request above indicates a number type
301
- # because the default used by AWS Firewall Manager is Unix time in
302
- # seconds. However, any valid `timestamp` format is allowed.
316
+ # `timestamp` type. The request syntax listing indicates a `number`
317
+ # type because the default used by AWS Firewall Manager is Unix time
318
+ # in seconds. However, any valid `timestamp` format is allowed.
303
319
  # @return [Time]
304
320
  #
305
321
  # @!attribute [rw] next_token
306
322
  # If you specify a value for `MaxResults` and you have more objects
307
323
  # than the number that you specify for `MaxResults`, AWS Firewall
308
- # Manager returns a `NextToken` value in the response that allows you
309
- # to list another group of objects. For the second and subsequent
310
- # `GetProtectionStatus` requests, specify the value of `NextToken`
311
- # from the previous response to get information about another batch of
312
- # objects.
324
+ # Manager returns a `NextToken` value in the response, which you can
325
+ # use to retrieve another group of objects. For the second and
326
+ # subsequent `GetProtectionStatus` requests, specify the value of
327
+ # `NextToken` from the previous response to get information about
328
+ # another batch of objects.
313
329
  # @return [String]
314
330
  #
315
331
  # @!attribute [rw] max_results
@@ -353,8 +369,7 @@ module Aws::FMS
353
369
  #
354
370
  # * End time of the attack (ongoing attacks will not have an end time)
355
371
  #
356
- # The details are in JSON format. An example is shown in the Examples
357
- # section below.
372
+ # The details are in JSON format.
358
373
  # @return [String]
359
374
  #
360
375
  # @!attribute [rw] next_token
@@ -635,7 +650,7 @@ module Aws::FMS
635
650
  # policy_name: "ResourceName", # required
636
651
  # policy_update_token: "PolicyUpdateToken",
637
652
  # security_service_policy_data: { # required
638
- # type: "WAF", # required, accepts WAF, SHIELD_ADVANCED
653
+ # type: "WAF", # required, accepts WAF, SHIELD_ADVANCED, SECURITY_GROUPS_COMMON, SECURITY_GROUPS_CONTENT_AUDIT, SECURITY_GROUPS_USAGE_AUDIT
639
654
  # managed_service_data: "ManagedServiceData",
640
655
  # },
641
656
  # resource_type: "ResourceType", # required
@@ -678,10 +693,17 @@ module Aws::FMS
678
693
  # @return [Types::SecurityServicePolicyData]
679
694
  #
680
695
  # @!attribute [rw] resource_type
681
- # The type of resource to protect with the policy. This is in the
682
- # format shown in [AWS Resource Types Reference][1]. For example:
683
- # `AWS::ElasticLoadBalancingV2::LoadBalancer` or
684
- # `AWS::CloudFront::Distribution`.
696
+ # The type of resource protected by or in scope of the policy. This is
697
+ # in the format shown in the [AWS Resource Types Reference][1]. For
698
+ # AWS WAF and Shield Advanced, examples include
699
+ # `AWS::ElasticLoadBalancingV2::LoadBalancer` and
700
+ # `AWS::CloudFront::Distribution`. For a security group common policy,
701
+ # valid values are `AWS::EC2::NetworkInterface` and
702
+ # `AWS::EC2::Instance`. For a security group content audit policy,
703
+ # valid values are `AWS::EC2::SecurityGroup`,
704
+ # `AWS::EC2::NetworkInterface`, and `AWS::EC2::Instance`. For a
705
+ # security group usage audit policy, the value is
706
+ # `AWS::EC2::SecurityGroup`.
685
707
  #
686
708
  #
687
709
  #
@@ -698,9 +720,9 @@ module Aws::FMS
698
720
  #
699
721
  # @!attribute [rw] exclude_resource_tags
700
722
  # If set to `True`, resources with the tags that are specified in the
701
- # `ResourceTag` array are not protected by the policy. If set to
723
+ # `ResourceTag` array are not in scope of the policy. If set to
702
724
  # `False`, and the `ResourceTag` array is not null, only resources
703
- # with the specified tags are associated with the policy.
725
+ # with the specified tags are in scope of the policy.
704
726
  # @return [Boolean]
705
727
  #
706
728
  # @!attribute [rw] remediation_enabled
@@ -746,9 +768,9 @@ module Aws::FMS
746
768
  include Aws::Structure
747
769
  end
748
770
 
749
- # Describes the non-compliant resources in a member account for a
771
+ # Describes the noncompliant resources in a member account for a
750
772
  # specific AWS Firewall Manager policy. A maximum of 100 entries are
751
- # displayed. If more than 100 resources are non-compliant,
773
+ # displayed. If more than 100 resources are noncompliant,
752
774
  # `EvaluationLimitExceeded` is set to `True`.
753
775
  #
754
776
  # @!attribute [rw] policy_owner
@@ -764,22 +786,24 @@ module Aws::FMS
764
786
  # @return [String]
765
787
  #
766
788
  # @!attribute [rw] violators
767
- # An array of resources that are not protected by the policy.
789
+ # An array of resources that aren't protected by the AWS WAF or
790
+ # Shield Advanced policy or that aren't in compliance with the
791
+ # security group policy.
768
792
  # @return [Array<Types::ComplianceViolator>]
769
793
  #
770
794
  # @!attribute [rw] evaluation_limit_exceeded
771
- # Indicates if over 100 resources are non-compliant with the AWS
795
+ # Indicates if over 100 resources are noncompliant with the AWS
772
796
  # Firewall Manager policy.
773
797
  # @return [Boolean]
774
798
  #
775
799
  # @!attribute [rw] expired_at
776
- # A time stamp that indicates when the returned information should be
777
- # considered out-of-date.
800
+ # A timestamp that indicates when the returned information should be
801
+ # considered out of date.
778
802
  # @return [Time]
779
803
  #
780
804
  # @!attribute [rw] issue_info_map
781
805
  # Details about problems with dependent services, such as AWS WAF or
782
- # AWS Config, that are causing a resource to be non-compliant. The
806
+ # AWS Config, that are causing a resource to be noncompliant. The
783
807
  # details include the name of the dependent service and the error
784
808
  # message received that indicates the problem with the service.
785
809
  # @return [Hash<String,String>]
@@ -798,8 +822,10 @@ module Aws::FMS
798
822
  end
799
823
 
800
824
  # Indicates whether the account is compliant with the specified policy.
801
- # An account is considered non-compliant if it includes resources that
802
- # are not protected by the policy.
825
+ # An account is considered noncompliant if it includes resources that
826
+ # are not protected by the policy, for AWS WAF and Shield Advanced
827
+ # policies, or that are noncompliant with the policy, for security group
828
+ # policies.
803
829
  #
804
830
  # @!attribute [rw] policy_owner
805
831
  # The AWS account that created the AWS Firewall Manager policy.
@@ -822,12 +848,12 @@ module Aws::FMS
822
848
  # @return [Array<Types::EvaluationResult>]
823
849
  #
824
850
  # @!attribute [rw] last_updated
825
- # Time stamp of the last update to the `EvaluationResult` objects.
851
+ # Timestamp of the last update to the `EvaluationResult` objects.
826
852
  # @return [Time]
827
853
  #
828
854
  # @!attribute [rw] issue_info_map
829
855
  # Details about problems with dependent services, such as AWS WAF or
830
- # AWS Config, that are causing a resource to be non-compliant. The
856
+ # AWS Config, that are causing a resource to be noncompliant. The
831
857
  # details include the name of the dependent service and the error
832
858
  # message received that indicates the problem with the service.
833
859
  # @return [Hash<String,String>]
@@ -860,10 +886,17 @@ module Aws::FMS
860
886
  # @return [String]
861
887
  #
862
888
  # @!attribute [rw] resource_type
863
- # The type of resource to protect with the policy. This is in the
864
- # format shown in [AWS Resource Types Reference][1]. For example:
865
- # `AWS::ElasticLoadBalancingV2::LoadBalancer` or
866
- # `AWS::CloudFront::Distribution`.
889
+ # The type of resource protected by or in scope of the policy. This is
890
+ # in the format shown in the [AWS Resource Types Reference][1]. For
891
+ # AWS WAF and Shield Advanced, examples include
892
+ # `AWS::ElasticLoadBalancingV2::LoadBalancer` and
893
+ # `AWS::CloudFront::Distribution`. For a security group common policy,
894
+ # valid values are `AWS::EC2::NetworkInterface` and
895
+ # `AWS::EC2::Instance`. For a security group content audit policy,
896
+ # valid values are `AWS::EC2::SecurityGroup`,
897
+ # `AWS::EC2::NetworkInterface`, and `AWS::EC2::Instance`. For a
898
+ # security group usage audit policy, the value is
899
+ # `AWS::EC2::SecurityGroup`.
867
900
  #
868
901
  #
869
902
  #
@@ -872,8 +905,8 @@ module Aws::FMS
872
905
  #
873
906
  # @!attribute [rw] security_service_type
874
907
  # The service that the policy is using to protect the resources. This
875
- # specifies the type of policy that is created, either a WAF policy or
876
- # Shield Advanced policy.
908
+ # specifies the type of policy that is created, either an AWS WAF
909
+ # policy, a Shield Advanced policy, or a security group policy.
877
910
  # @return [String]
878
911
  #
879
912
  # @!attribute [rw] remediation_enabled
@@ -928,7 +961,7 @@ module Aws::FMS
928
961
  # policy_name: "ResourceName", # required
929
962
  # policy_update_token: "PolicyUpdateToken",
930
963
  # security_service_policy_data: { # required
931
- # type: "WAF", # required, accepts WAF, SHIELD_ADVANCED
964
+ # type: "WAF", # required, accepts WAF, SHIELD_ADVANCED, SECURITY_GROUPS_COMMON, SECURITY_GROUPS_CONTENT_AUDIT, SECURITY_GROUPS_USAGE_AUDIT
932
965
  # managed_service_data: "ManagedServiceData",
933
966
  # },
934
967
  # resource_type: "ResourceType", # required
@@ -990,14 +1023,14 @@ module Aws::FMS
990
1023
  end
991
1024
 
992
1025
  # The resource tags that AWS Firewall Manager uses to determine if a
993
- # particular resource should be included or excluded from protection by
994
- # the AWS Firewall Manager policy. Tags enable you to categorize your
995
- # AWS resources in different ways, for example, by purpose, owner, or
996
- # environment. Each tag consists of a key and an optional value, both of
997
- # which you define. Tags are combined with an "OR." That is, if you
998
- # add more than one tag, if any of the tags matches, the resource is
999
- # considered a match for the include or exclude. [Working with Tag
1000
- # Editor][1].
1026
+ # particular resource should be included or excluded from the AWS
1027
+ # Firewall Manager policy. Tags enable you to categorize your AWS
1028
+ # resources in different ways, for example, by purpose, owner, or
1029
+ # environment. Each tag consists of a key and an optional value.
1030
+ # Firewall Manager combines the tags with "AND" so that, if you add
1031
+ # more than one tag to a policy scope, a resource must have all the
1032
+ # specified tags to be included or excluded. For more information, see
1033
+ # [Working with Tag Editor][1].
1001
1034
  #
1002
1035
  #
1003
1036
  #
@@ -1034,26 +1067,54 @@ module Aws::FMS
1034
1067
  # data as a hash:
1035
1068
  #
1036
1069
  # {
1037
- # type: "WAF", # required, accepts WAF, SHIELD_ADVANCED
1070
+ # type: "WAF", # required, accepts WAF, SHIELD_ADVANCED, SECURITY_GROUPS_COMMON, SECURITY_GROUPS_CONTENT_AUDIT, SECURITY_GROUPS_USAGE_AUDIT
1038
1071
  # managed_service_data: "ManagedServiceData",
1039
1072
  # }
1040
1073
  #
1041
1074
  # @!attribute [rw] type
1042
1075
  # The service that the policy is using to protect the resources. This
1043
- # specifies the type of policy that is created, either a WAF policy or
1044
- # Shield Advanced policy.
1076
+ # specifies the type of policy that is created, either an AWS WAF
1077
+ # policy, a Shield Advanced policy, or a security group policy. For
1078
+ # security group policies, Firewall Manager supports one security
1079
+ # group for each common policy and for each content audit policy. This
1080
+ # is an adjustable limit that you can increase by contacting AWS
1081
+ # Support.
1045
1082
  # @return [String]
1046
1083
  #
1047
1084
  # @!attribute [rw] managed_service_data
1048
- # Details about the service. This contains `WAF` data in JSON format,
1049
- # as shown in the following example:
1085
+ # Details about the service that are specific to the service type, in
1086
+ # JSON format. For service type `SHIELD_ADVANCED`, this is an empty
1087
+ # string.
1088
+ #
1089
+ # * Example: `WAF`
1090
+ #
1091
+ # `ManagedServiceData": "\{"type": "WAF", "ruleGroups":
1092
+ # [\{"id": "12345678-1bcd-9012-efga-0987654321ab",
1093
+ # "overrideAction" : \{"type": "COUNT"\}\}],
1094
+ # "defaultAction": \{"type": "BLOCK"\}\}`
1095
+ #
1096
+ # * Example: `SECURITY_GROUPS_COMMON`
1097
+ #
1098
+ # `"SecurityServicePolicyData":\{"Type":"SECURITY_GROUPS_COMMON","ManagedServiceData":"\{"type":"SECURITY_GROUPS_COMMON","revertManualSecurityGroupChanges":false,"exclusiveResourceSecurityGroupManagement":false,"securityGroups":[\{"id":"
1099
+ # sg-000e55995d61a06bd"\}]\}"\},"RemediationEnabled":false,"ResourceType":"AWS::EC2::NetworkInterface"\}`
1100
+ #
1101
+ # * Example: `SECURITY_GROUPS_CONTENT_AUDIT`
1102
+ #
1103
+ # `"SecurityServicePolicyData":\{"Type":"SECURITY_GROUPS_CONTENT_AUDIT","ManagedServiceData":"\{"type":"SECURITY_GROUPS_CONTENT_AUDIT","securityGroups":[\{"id":"
1104
+ # sg-000e55995d61a06bd
1105
+ # "\}],"securityGroupAction":\{"type":"ALLOW"\}\}"\},"RemediationEnabled":false,"ResourceType":"AWS::EC2::NetworkInterface"\}`
1106
+ #
1107
+ # The security group action for content audit can be `ALLOW` or
1108
+ # `DENY`. For `ALLOW`, all in-scope security group rules must be
1109
+ # within the allowed range of the policy's security group rules.
1110
+ # For `DENY`, all in-scope security group rules must not contain a
1111
+ # value or a range that matches a rule value or range in the policy
1112
+ # security group.
1050
1113
  #
1051
- # `ManagedServiceData": "\{"type": "WAF", "ruleGroups":
1052
- # [\{"id": "12345678-1bcd-9012-efga-0987654321ab",
1053
- # "overrideAction" : \{"type": "COUNT"\}\}], "defaultAction":
1054
- # \{"type": "BLOCK"\}\}`
1114
+ # * Example: `SECURITY_GROUPS_USAGE_AUDIT`
1055
1115
  #
1056
- # If this is a Shield Advanced policy, this string will be empty.
1116
+ # `"SecurityServicePolicyData":\{"Type":"SECURITY_GROUPS_USAGE_AUDIT","ManagedServiceData":"\{"type":"SECURITY_GROUPS_USAGE_AUDIT","deleteUnusedSecurityGroups":true,"coalesceRedundantSecurityGroups":true\}"\},"RemediationEnabled":false,"Resou
1117
+ # rceType":"AWS::EC2::SecurityGroup"\}`
1057
1118
  # @return [String]
1058
1119
  #
1059
1120
  # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/SecurityServicePolicyData AWS API Documentation
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-fms
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.18.0
4
+ version: 1.19.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2019-07-25 00:00:00.000000000 Z
11
+ date: 2019-10-10 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core