aws-sdk-fms 1.18.0 → 1.19.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/lib/aws-sdk-fms.rb +1 -1
- data/lib/aws-sdk-fms/client.rb +62 -38
- data/lib/aws-sdk-fms/types.rb +137 -76
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 476466d4fe38aa8c9aa515c3aa5eb574b2af9354
|
4
|
+
data.tar.gz: 6e59a6eb401ffc20af8f21a1a2f40d8a1c7ed173
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 83f8ba6fb8a3c0386fdea27dfc740d9fb99975ab5f23363282f54a14d1b9107a6870e445dab2a593811bd90b5db490a57a8937dfa4c0259520a60c8c04e9f0c8
|
7
|
+
data.tar.gz: 35ea4ad21b1be2502c49663dc7a9b484165e93d381e39e36358f79e2d5493b9b53cac05615e849f9f1a68ad78dcba9a1f3a735d7116832da93194481e225fde8
|
data/lib/aws-sdk-fms.rb
CHANGED
data/lib/aws-sdk-fms/client.rb
CHANGED
@@ -265,7 +265,7 @@ module Aws::FMS
|
|
265
265
|
# @!group API Operations
|
266
266
|
|
267
267
|
# Sets the AWS Firewall Manager administrator account. AWS Firewall
|
268
|
-
# Manager must be associated with the master account your AWS
|
268
|
+
# Manager must be associated with the master account of your AWS
|
269
269
|
# organization or associated with a member account that has the
|
270
270
|
# appropriate permissions. If the account ID that you submit is not an
|
271
271
|
# AWS Organizations master account, AWS Firewall Manager will set the
|
@@ -324,21 +324,34 @@ module Aws::FMS
|
|
324
324
|
# by `PutPolicy` and by `ListPolicies`.
|
325
325
|
#
|
326
326
|
# @option params [Boolean] :delete_all_policy_resources
|
327
|
-
# If `True`, the request
|
327
|
+
# If `True`, the request performs cleanup according to the policy type.
|
328
328
|
#
|
329
|
-
#
|
329
|
+
# For AWS WAF and Shield Advanced policies, the cleanup does the
|
330
|
+
# following:
|
330
331
|
#
|
331
|
-
# *
|
332
|
+
# * Deletes rule groups created by AWS Firewall Manager
|
332
333
|
#
|
333
|
-
# *
|
334
|
+
# * Removes web ACLs from in-scope resources
|
334
335
|
#
|
335
|
-
#
|
336
|
-
#
|
337
|
-
#
|
338
|
-
#
|
339
|
-
#
|
340
|
-
# the
|
341
|
-
#
|
336
|
+
# * Deletes web ACLs that contain no rules or rule groups
|
337
|
+
#
|
338
|
+
# For security group policies, the cleanup does the following for each
|
339
|
+
# security group in the policy:
|
340
|
+
#
|
341
|
+
# * Disassociates the security group from in-scope resources
|
342
|
+
#
|
343
|
+
# * Deletes the security group if it was created through Firewall
|
344
|
+
# Manager and if it's no longer associated with any resources through
|
345
|
+
# another policy
|
346
|
+
#
|
347
|
+
# After the cleanup, in-scope resources are no longer protected by web
|
348
|
+
# ACLs in this policy. Protection of out-of-scope resources remains
|
349
|
+
# unchanged. Scope is determined by tags that you create and accounts
|
350
|
+
# that you associate with the policy. When creating the policy, if you
|
351
|
+
# specify that only resources in specific accounts or with specific tags
|
352
|
+
# are in scope of the policy, those accounts and resources are handled
|
353
|
+
# by the policy. All others are out of scope. If you don't specify tags
|
354
|
+
# or accounts, all resources are in scope.
|
342
355
|
#
|
343
356
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
344
357
|
#
|
@@ -361,7 +374,7 @@ module Aws::FMS
|
|
361
374
|
# Disassociates the account that has been set as the AWS Firewall
|
362
375
|
# Manager administrator account. To set a different account as the
|
363
376
|
# administrator account, you must submit an `AssociateAdminAccount`
|
364
|
-
# request
|
377
|
+
# request.
|
365
378
|
#
|
366
379
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
367
380
|
#
|
@@ -398,8 +411,12 @@ module Aws::FMS
|
|
398
411
|
|
399
412
|
# Returns detailed compliance information about the specified member
|
400
413
|
# account. Details include resources that are in and out of compliance
|
401
|
-
# with the specified policy. Resources are considered
|
402
|
-
# the specified policy has not
|
414
|
+
# with the specified policy. Resources are considered noncompliant for
|
415
|
+
# AWS WAF and Shield Advanced policies if the specified policy has not
|
416
|
+
# been applied to them. Resources are considered noncompliant for
|
417
|
+
# security group policies if they are in scope of the policy, they
|
418
|
+
# violate one or more of the policy rules, and remediation is disabled
|
419
|
+
# or not possible.
|
403
420
|
#
|
404
421
|
# @option params [required, String] :policy_id
|
405
422
|
# The ID of the policy that you want to get the details for. `PolicyId`
|
@@ -427,7 +444,7 @@ module Aws::FMS
|
|
427
444
|
# resp.policy_compliance_detail.member_account #=> String
|
428
445
|
# resp.policy_compliance_detail.violators #=> Array
|
429
446
|
# resp.policy_compliance_detail.violators[0].resource_id #=> String
|
430
|
-
# resp.policy_compliance_detail.violators[0].violation_reason #=> String, one of "WEB_ACL_MISSING_RULE_GROUP", "RESOURCE_MISSING_WEB_ACL", "RESOURCE_INCORRECT_WEB_ACL", "RESOURCE_MISSING_SHIELD_PROTECTION"
|
447
|
+
# resp.policy_compliance_detail.violators[0].violation_reason #=> String, one of "WEB_ACL_MISSING_RULE_GROUP", "RESOURCE_MISSING_WEB_ACL", "RESOURCE_INCORRECT_WEB_ACL", "RESOURCE_MISSING_SHIELD_PROTECTION", "RESOURCE_MISSING_WEB_ACL_OR_SHIELD_PROTECTION", "RESOURCE_MISSING_SECURITY_GROUP", "RESOURCE_VIOLATES_AUDIT_SECURITY_GROUP", "SECURITY_GROUP_UNUSED", "SECURITY_GROUP_REDUNDANT"
|
431
448
|
# resp.policy_compliance_detail.violators[0].resource_type #=> String
|
432
449
|
# resp.policy_compliance_detail.evaluation_limit_exceeded #=> Boolean
|
433
450
|
# resp.policy_compliance_detail.expired_at #=> Time
|
@@ -443,8 +460,8 @@ module Aws::FMS
|
|
443
460
|
req.send_request(options)
|
444
461
|
end
|
445
462
|
|
446
|
-
#
|
447
|
-
#
|
463
|
+
# Information about the Amazon Simple Notification Service (SNS) topic
|
464
|
+
# that is used to record AWS Firewall Manager SNS logs.
|
448
465
|
#
|
449
466
|
# @return [Types::GetNotificationChannelResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
450
467
|
#
|
@@ -487,7 +504,7 @@ module Aws::FMS
|
|
487
504
|
# resp.policy.policy_id #=> String
|
488
505
|
# resp.policy.policy_name #=> String
|
489
506
|
# resp.policy.policy_update_token #=> String
|
490
|
-
# resp.policy.security_service_policy_data.type #=> String, one of "WAF", "SHIELD_ADVANCED"
|
507
|
+
# resp.policy.security_service_policy_data.type #=> String, one of "WAF", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
|
491
508
|
# resp.policy.security_service_policy_data.managed_service_data #=> String
|
492
509
|
# resp.policy.resource_type #=> String
|
493
510
|
# resp.policy.resource_type_list #=> Array
|
@@ -515,7 +532,8 @@ module Aws::FMS
|
|
515
532
|
end
|
516
533
|
|
517
534
|
# If you created a Shield Advanced policy, returns policy-level attack
|
518
|
-
# summary information in the event of a potential DDoS attack.
|
535
|
+
# summary information in the event of a potential DDoS attack. Other
|
536
|
+
# policy types are currently unsupported.
|
519
537
|
#
|
520
538
|
# @option params [required, String] :policy_id
|
521
539
|
# The ID of the policy for which you want to get the attack information.
|
@@ -526,21 +544,21 @@ module Aws::FMS
|
|
526
544
|
#
|
527
545
|
# @option params [Time,DateTime,Date,Integer,String] :start_time
|
528
546
|
# The start of the time period to query for the attacks. This is a
|
529
|
-
# `timestamp` type. The
|
547
|
+
# `timestamp` type. The request syntax listing indicates a `number` type
|
530
548
|
# because the default used by AWS Firewall Manager is Unix time in
|
531
549
|
# seconds. However, any valid `timestamp` format is allowed.
|
532
550
|
#
|
533
551
|
# @option params [Time,DateTime,Date,Integer,String] :end_time
|
534
552
|
# The end of the time period to query for the attacks. This is a
|
535
|
-
# `timestamp` type. The
|
553
|
+
# `timestamp` type. The request syntax listing indicates a `number` type
|
536
554
|
# because the default used by AWS Firewall Manager is Unix time in
|
537
555
|
# seconds. However, any valid `timestamp` format is allowed.
|
538
556
|
#
|
539
557
|
# @option params [String] :next_token
|
540
558
|
# If you specify a value for `MaxResults` and you have more objects than
|
541
559
|
# the number that you specify for `MaxResults`, AWS Firewall Manager
|
542
|
-
# returns a `NextToken` value in the response
|
543
|
-
# another group of objects. For the second and subsequent
|
560
|
+
# returns a `NextToken` value in the response, which you can use to
|
561
|
+
# retrieve another group of objects. For the second and subsequent
|
544
562
|
# `GetProtectionStatus` requests, specify the value of `NextToken` from
|
545
563
|
# the previous response to get information about another batch of
|
546
564
|
# objects.
|
@@ -572,7 +590,7 @@ module Aws::FMS
|
|
572
590
|
# @example Response structure
|
573
591
|
#
|
574
592
|
# resp.admin_account_id #=> String
|
575
|
-
# resp.service_type #=> String, one of "WAF", "SHIELD_ADVANCED"
|
593
|
+
# resp.service_type #=> String, one of "WAF", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
|
576
594
|
# resp.data #=> String
|
577
595
|
# resp.next_token #=> String
|
578
596
|
#
|
@@ -734,7 +752,7 @@ module Aws::FMS
|
|
734
752
|
# resp.policy_list[0].policy_id #=> String
|
735
753
|
# resp.policy_list[0].policy_name #=> String
|
736
754
|
# resp.policy_list[0].resource_type #=> String
|
737
|
-
# resp.policy_list[0].security_service_type #=> String, one of "WAF", "SHIELD_ADVANCED"
|
755
|
+
# resp.policy_list[0].security_service_type #=> String, one of "WAF", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
|
738
756
|
# resp.policy_list[0].remediation_enabled #=> Boolean
|
739
757
|
# resp.next_token #=> String
|
740
758
|
#
|
@@ -778,17 +796,23 @@ module Aws::FMS
|
|
778
796
|
|
779
797
|
# Creates an AWS Firewall Manager policy.
|
780
798
|
#
|
781
|
-
# Firewall Manager provides
|
782
|
-
#
|
783
|
-
#
|
784
|
-
#
|
785
|
-
#
|
786
|
-
#
|
787
|
-
#
|
788
|
-
#
|
799
|
+
# Firewall Manager provides the following types of policies:
|
800
|
+
#
|
801
|
+
# * A Shield Advanced policy, which applies Shield Advanced protection
|
802
|
+
# to specified accounts and resources
|
803
|
+
#
|
804
|
+
# * An AWS WAF policy, which contains a rule group and defines which
|
805
|
+
# resources are to be protected by that rule group
|
806
|
+
#
|
807
|
+
# * A security group policy, which manages VPC security groups across
|
808
|
+
# your AWS organization.
|
809
|
+
#
|
810
|
+
# Each policy is specific to one of the three types. If you want to
|
811
|
+
# enforce more than one policy type across accounts, you can create
|
812
|
+
# multiple policies. You can create multiple policies for each type.
|
789
813
|
#
|
790
814
|
# You must be subscribed to Shield Advanced to create a Shield Advanced
|
791
|
-
# policy. For more information
|
815
|
+
# policy. For more information about subscribing to Shield Advanced, see
|
792
816
|
# [CreateSubscription][1].
|
793
817
|
#
|
794
818
|
#
|
@@ -811,7 +835,7 @@ module Aws::FMS
|
|
811
835
|
# policy_name: "ResourceName", # required
|
812
836
|
# policy_update_token: "PolicyUpdateToken",
|
813
837
|
# security_service_policy_data: { # required
|
814
|
-
# type: "WAF", # required, accepts WAF, SHIELD_ADVANCED
|
838
|
+
# type: "WAF", # required, accepts WAF, SHIELD_ADVANCED, SECURITY_GROUPS_COMMON, SECURITY_GROUPS_CONTENT_AUDIT, SECURITY_GROUPS_USAGE_AUDIT
|
815
839
|
# managed_service_data: "ManagedServiceData",
|
816
840
|
# },
|
817
841
|
# resource_type: "ResourceType", # required
|
@@ -838,7 +862,7 @@ module Aws::FMS
|
|
838
862
|
# resp.policy.policy_id #=> String
|
839
863
|
# resp.policy.policy_name #=> String
|
840
864
|
# resp.policy.policy_update_token #=> String
|
841
|
-
# resp.policy.security_service_policy_data.type #=> String, one of "WAF", "SHIELD_ADVANCED"
|
865
|
+
# resp.policy.security_service_policy_data.type #=> String, one of "WAF", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
|
842
866
|
# resp.policy.security_service_policy_data.managed_service_data #=> String
|
843
867
|
# resp.policy.resource_type #=> String
|
844
868
|
# resp.policy.resource_type_list #=> Array
|
@@ -878,7 +902,7 @@ module Aws::FMS
|
|
878
902
|
params: params,
|
879
903
|
config: config)
|
880
904
|
context[:gem_name] = 'aws-sdk-fms'
|
881
|
-
context[:gem_version] = '1.
|
905
|
+
context[:gem_version] = '1.19.0'
|
882
906
|
Seahorse::Client::Request.new(handlers, context)
|
883
907
|
end
|
884
908
|
|
data/lib/aws-sdk-fms/types.rb
CHANGED
@@ -45,7 +45,7 @@ module Aws::FMS
|
|
45
45
|
# @return [String]
|
46
46
|
#
|
47
47
|
# @!attribute [rw] resource_type
|
48
|
-
# The resource type. This is in the format shown in [AWS Resource
|
48
|
+
# The resource type. This is in the format shown in the [AWS Resource
|
49
49
|
# Types Reference][1]. For example:
|
50
50
|
# `AWS::ElasticLoadBalancingV2::LoadBalancer` or
|
51
51
|
# `AWS::CloudFront::Distribution`.
|
@@ -84,23 +84,35 @@ module Aws::FMS
|
|
84
84
|
# @return [String]
|
85
85
|
#
|
86
86
|
# @!attribute [rw] delete_all_policy_resources
|
87
|
-
# If `True`, the request
|
88
|
-
#
|
87
|
+
# If `True`, the request performs cleanup according to the policy
|
88
|
+
# type.
|
89
89
|
#
|
90
|
-
#
|
90
|
+
# For AWS WAF and Shield Advanced policies, the cleanup does the
|
91
|
+
# following:
|
91
92
|
#
|
92
|
-
# *
|
93
|
+
# * Deletes rule groups created by AWS Firewall Manager
|
93
94
|
#
|
94
|
-
# *
|
95
|
+
# * Removes web ACLs from in-scope resources
|
95
96
|
#
|
96
|
-
#
|
97
|
-
#
|
98
|
-
#
|
99
|
-
#
|
100
|
-
#
|
101
|
-
#
|
102
|
-
#
|
103
|
-
#
|
97
|
+
# * Deletes web ACLs that contain no rules or rule groups
|
98
|
+
#
|
99
|
+
# For security group policies, the cleanup does the following for each
|
100
|
+
# security group in the policy:
|
101
|
+
#
|
102
|
+
# * Disassociates the security group from in-scope resources
|
103
|
+
#
|
104
|
+
# * Deletes the security group if it was created through Firewall
|
105
|
+
# Manager and if it's no longer associated with any resources
|
106
|
+
# through another policy
|
107
|
+
#
|
108
|
+
# After the cleanup, in-scope resources are no longer protected by web
|
109
|
+
# ACLs in this policy. Protection of out-of-scope resources remains
|
110
|
+
# unchanged. Scope is determined by tags that you create and accounts
|
111
|
+
# that you associate with the policy. When creating the policy, if you
|
112
|
+
# specify that only resources in specific accounts or with specific
|
113
|
+
# tags are in scope of the policy, those accounts and resources are
|
114
|
+
# handled by the policy. All others are out of scope. If you don't
|
115
|
+
# specify tags or accounts, all resources are in scope.
|
104
116
|
# @return [Boolean]
|
105
117
|
#
|
106
118
|
# @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/DeletePolicyRequest AWS API Documentation
|
@@ -118,8 +130,9 @@ module Aws::FMS
|
|
118
130
|
class DisassociateAdminAccountRequest < Aws::EmptyStructure; end
|
119
131
|
|
120
132
|
# Describes the compliance status for the account. An account is
|
121
|
-
# considered
|
122
|
-
# protected by the specified policy
|
133
|
+
# considered noncompliant if it includes resources that are not
|
134
|
+
# protected by the specified policy or that don't comply with the
|
135
|
+
# policy.
|
123
136
|
#
|
124
137
|
# @!attribute [rw] compliance_status
|
125
138
|
# Describes an AWS account's compliance with the AWS Firewall Manager
|
@@ -127,13 +140,16 @@ module Aws::FMS
|
|
127
140
|
# @return [String]
|
128
141
|
#
|
129
142
|
# @!attribute [rw] violator_count
|
130
|
-
#
|
131
|
-
# policy.
|
132
|
-
# associated with the
|
143
|
+
# The number of resources that are noncompliant with the specified
|
144
|
+
# policy. For AWS WAF and Shield Advanced policies, a resource is
|
145
|
+
# considered noncompliant if it is not associated with the policy. For
|
146
|
+
# security group policies, a resource is considered noncompliant if it
|
147
|
+
# doesn't comply with the rules of the policy and remediation is
|
148
|
+
# disabled or not possible.
|
133
149
|
# @return [Integer]
|
134
150
|
#
|
135
151
|
# @!attribute [rw] evaluation_limit_exceeded
|
136
|
-
# Indicates that over 100 resources are
|
152
|
+
# Indicates that over 100 resources are noncompliant with the AWS
|
137
153
|
# Firewall Manager policy.
|
138
154
|
# @return [Boolean]
|
139
155
|
#
|
@@ -290,26 +306,26 @@ module Aws::FMS
|
|
290
306
|
#
|
291
307
|
# @!attribute [rw] start_time
|
292
308
|
# The start of the time period to query for the attacks. This is a
|
293
|
-
# `timestamp` type. The
|
294
|
-
# because the default used by AWS Firewall Manager is Unix time
|
295
|
-
# seconds. However, any valid `timestamp` format is allowed.
|
309
|
+
# `timestamp` type. The request syntax listing indicates a `number`
|
310
|
+
# type because the default used by AWS Firewall Manager is Unix time
|
311
|
+
# in seconds. However, any valid `timestamp` format is allowed.
|
296
312
|
# @return [Time]
|
297
313
|
#
|
298
314
|
# @!attribute [rw] end_time
|
299
315
|
# The end of the time period to query for the attacks. This is a
|
300
|
-
# `timestamp` type. The
|
301
|
-
# because the default used by AWS Firewall Manager is Unix time
|
302
|
-
# seconds. However, any valid `timestamp` format is allowed.
|
316
|
+
# `timestamp` type. The request syntax listing indicates a `number`
|
317
|
+
# type because the default used by AWS Firewall Manager is Unix time
|
318
|
+
# in seconds. However, any valid `timestamp` format is allowed.
|
303
319
|
# @return [Time]
|
304
320
|
#
|
305
321
|
# @!attribute [rw] next_token
|
306
322
|
# If you specify a value for `MaxResults` and you have more objects
|
307
323
|
# than the number that you specify for `MaxResults`, AWS Firewall
|
308
|
-
# Manager returns a `NextToken` value in the response
|
309
|
-
# to
|
310
|
-
# `GetProtectionStatus` requests, specify the value of
|
311
|
-
# from the previous response to get information about
|
312
|
-
# objects.
|
324
|
+
# Manager returns a `NextToken` value in the response, which you can
|
325
|
+
# use to retrieve another group of objects. For the second and
|
326
|
+
# subsequent `GetProtectionStatus` requests, specify the value of
|
327
|
+
# `NextToken` from the previous response to get information about
|
328
|
+
# another batch of objects.
|
313
329
|
# @return [String]
|
314
330
|
#
|
315
331
|
# @!attribute [rw] max_results
|
@@ -353,8 +369,7 @@ module Aws::FMS
|
|
353
369
|
#
|
354
370
|
# * End time of the attack (ongoing attacks will not have an end time)
|
355
371
|
#
|
356
|
-
# The details are in JSON format.
|
357
|
-
# section below.
|
372
|
+
# The details are in JSON format.
|
358
373
|
# @return [String]
|
359
374
|
#
|
360
375
|
# @!attribute [rw] next_token
|
@@ -635,7 +650,7 @@ module Aws::FMS
|
|
635
650
|
# policy_name: "ResourceName", # required
|
636
651
|
# policy_update_token: "PolicyUpdateToken",
|
637
652
|
# security_service_policy_data: { # required
|
638
|
-
# type: "WAF", # required, accepts WAF, SHIELD_ADVANCED
|
653
|
+
# type: "WAF", # required, accepts WAF, SHIELD_ADVANCED, SECURITY_GROUPS_COMMON, SECURITY_GROUPS_CONTENT_AUDIT, SECURITY_GROUPS_USAGE_AUDIT
|
639
654
|
# managed_service_data: "ManagedServiceData",
|
640
655
|
# },
|
641
656
|
# resource_type: "ResourceType", # required
|
@@ -678,10 +693,17 @@ module Aws::FMS
|
|
678
693
|
# @return [Types::SecurityServicePolicyData]
|
679
694
|
#
|
680
695
|
# @!attribute [rw] resource_type
|
681
|
-
# The type of resource
|
682
|
-
# format shown in [AWS Resource Types Reference][1]. For
|
683
|
-
#
|
684
|
-
# `AWS::
|
696
|
+
# The type of resource protected by or in scope of the policy. This is
|
697
|
+
# in the format shown in the [AWS Resource Types Reference][1]. For
|
698
|
+
# AWS WAF and Shield Advanced, examples include
|
699
|
+
# `AWS::ElasticLoadBalancingV2::LoadBalancer` and
|
700
|
+
# `AWS::CloudFront::Distribution`. For a security group common policy,
|
701
|
+
# valid values are `AWS::EC2::NetworkInterface` and
|
702
|
+
# `AWS::EC2::Instance`. For a security group content audit policy,
|
703
|
+
# valid values are `AWS::EC2::SecurityGroup`,
|
704
|
+
# `AWS::EC2::NetworkInterface`, and `AWS::EC2::Instance`. For a
|
705
|
+
# security group usage audit policy, the value is
|
706
|
+
# `AWS::EC2::SecurityGroup`.
|
685
707
|
#
|
686
708
|
#
|
687
709
|
#
|
@@ -698,9 +720,9 @@ module Aws::FMS
|
|
698
720
|
#
|
699
721
|
# @!attribute [rw] exclude_resource_tags
|
700
722
|
# If set to `True`, resources with the tags that are specified in the
|
701
|
-
# `ResourceTag` array are not
|
723
|
+
# `ResourceTag` array are not in scope of the policy. If set to
|
702
724
|
# `False`, and the `ResourceTag` array is not null, only resources
|
703
|
-
# with the specified tags are
|
725
|
+
# with the specified tags are in scope of the policy.
|
704
726
|
# @return [Boolean]
|
705
727
|
#
|
706
728
|
# @!attribute [rw] remediation_enabled
|
@@ -746,9 +768,9 @@ module Aws::FMS
|
|
746
768
|
include Aws::Structure
|
747
769
|
end
|
748
770
|
|
749
|
-
# Describes the
|
771
|
+
# Describes the noncompliant resources in a member account for a
|
750
772
|
# specific AWS Firewall Manager policy. A maximum of 100 entries are
|
751
|
-
# displayed. If more than 100 resources are
|
773
|
+
# displayed. If more than 100 resources are noncompliant,
|
752
774
|
# `EvaluationLimitExceeded` is set to `True`.
|
753
775
|
#
|
754
776
|
# @!attribute [rw] policy_owner
|
@@ -764,22 +786,24 @@ module Aws::FMS
|
|
764
786
|
# @return [String]
|
765
787
|
#
|
766
788
|
# @!attribute [rw] violators
|
767
|
-
# An array of resources that
|
789
|
+
# An array of resources that aren't protected by the AWS WAF or
|
790
|
+
# Shield Advanced policy or that aren't in compliance with the
|
791
|
+
# security group policy.
|
768
792
|
# @return [Array<Types::ComplianceViolator>]
|
769
793
|
#
|
770
794
|
# @!attribute [rw] evaluation_limit_exceeded
|
771
|
-
# Indicates if over 100 resources are
|
795
|
+
# Indicates if over 100 resources are noncompliant with the AWS
|
772
796
|
# Firewall Manager policy.
|
773
797
|
# @return [Boolean]
|
774
798
|
#
|
775
799
|
# @!attribute [rw] expired_at
|
776
|
-
# A
|
777
|
-
# considered out
|
800
|
+
# A timestamp that indicates when the returned information should be
|
801
|
+
# considered out of date.
|
778
802
|
# @return [Time]
|
779
803
|
#
|
780
804
|
# @!attribute [rw] issue_info_map
|
781
805
|
# Details about problems with dependent services, such as AWS WAF or
|
782
|
-
# AWS Config, that are causing a resource to be
|
806
|
+
# AWS Config, that are causing a resource to be noncompliant. The
|
783
807
|
# details include the name of the dependent service and the error
|
784
808
|
# message received that indicates the problem with the service.
|
785
809
|
# @return [Hash<String,String>]
|
@@ -798,8 +822,10 @@ module Aws::FMS
|
|
798
822
|
end
|
799
823
|
|
800
824
|
# Indicates whether the account is compliant with the specified policy.
|
801
|
-
# An account is considered
|
802
|
-
# are not protected by the policy
|
825
|
+
# An account is considered noncompliant if it includes resources that
|
826
|
+
# are not protected by the policy, for AWS WAF and Shield Advanced
|
827
|
+
# policies, or that are noncompliant with the policy, for security group
|
828
|
+
# policies.
|
803
829
|
#
|
804
830
|
# @!attribute [rw] policy_owner
|
805
831
|
# The AWS account that created the AWS Firewall Manager policy.
|
@@ -822,12 +848,12 @@ module Aws::FMS
|
|
822
848
|
# @return [Array<Types::EvaluationResult>]
|
823
849
|
#
|
824
850
|
# @!attribute [rw] last_updated
|
825
|
-
#
|
851
|
+
# Timestamp of the last update to the `EvaluationResult` objects.
|
826
852
|
# @return [Time]
|
827
853
|
#
|
828
854
|
# @!attribute [rw] issue_info_map
|
829
855
|
# Details about problems with dependent services, such as AWS WAF or
|
830
|
-
# AWS Config, that are causing a resource to be
|
856
|
+
# AWS Config, that are causing a resource to be noncompliant. The
|
831
857
|
# details include the name of the dependent service and the error
|
832
858
|
# message received that indicates the problem with the service.
|
833
859
|
# @return [Hash<String,String>]
|
@@ -860,10 +886,17 @@ module Aws::FMS
|
|
860
886
|
# @return [String]
|
861
887
|
#
|
862
888
|
# @!attribute [rw] resource_type
|
863
|
-
# The type of resource
|
864
|
-
# format shown in [AWS Resource Types Reference][1]. For
|
865
|
-
#
|
866
|
-
# `AWS::
|
889
|
+
# The type of resource protected by or in scope of the policy. This is
|
890
|
+
# in the format shown in the [AWS Resource Types Reference][1]. For
|
891
|
+
# AWS WAF and Shield Advanced, examples include
|
892
|
+
# `AWS::ElasticLoadBalancingV2::LoadBalancer` and
|
893
|
+
# `AWS::CloudFront::Distribution`. For a security group common policy,
|
894
|
+
# valid values are `AWS::EC2::NetworkInterface` and
|
895
|
+
# `AWS::EC2::Instance`. For a security group content audit policy,
|
896
|
+
# valid values are `AWS::EC2::SecurityGroup`,
|
897
|
+
# `AWS::EC2::NetworkInterface`, and `AWS::EC2::Instance`. For a
|
898
|
+
# security group usage audit policy, the value is
|
899
|
+
# `AWS::EC2::SecurityGroup`.
|
867
900
|
#
|
868
901
|
#
|
869
902
|
#
|
@@ -872,8 +905,8 @@ module Aws::FMS
|
|
872
905
|
#
|
873
906
|
# @!attribute [rw] security_service_type
|
874
907
|
# The service that the policy is using to protect the resources. This
|
875
|
-
# specifies the type of policy that is created, either
|
876
|
-
# Shield Advanced policy.
|
908
|
+
# specifies the type of policy that is created, either an AWS WAF
|
909
|
+
# policy, a Shield Advanced policy, or a security group policy.
|
877
910
|
# @return [String]
|
878
911
|
#
|
879
912
|
# @!attribute [rw] remediation_enabled
|
@@ -928,7 +961,7 @@ module Aws::FMS
|
|
928
961
|
# policy_name: "ResourceName", # required
|
929
962
|
# policy_update_token: "PolicyUpdateToken",
|
930
963
|
# security_service_policy_data: { # required
|
931
|
-
# type: "WAF", # required, accepts WAF, SHIELD_ADVANCED
|
964
|
+
# type: "WAF", # required, accepts WAF, SHIELD_ADVANCED, SECURITY_GROUPS_COMMON, SECURITY_GROUPS_CONTENT_AUDIT, SECURITY_GROUPS_USAGE_AUDIT
|
932
965
|
# managed_service_data: "ManagedServiceData",
|
933
966
|
# },
|
934
967
|
# resource_type: "ResourceType", # required
|
@@ -990,14 +1023,14 @@ module Aws::FMS
|
|
990
1023
|
end
|
991
1024
|
|
992
1025
|
# The resource tags that AWS Firewall Manager uses to determine if a
|
993
|
-
# particular resource should be included or excluded from
|
994
|
-
#
|
995
|
-
#
|
996
|
-
# environment. Each tag consists of a key and an optional value
|
997
|
-
#
|
998
|
-
#
|
999
|
-
#
|
1000
|
-
# Editor][1].
|
1026
|
+
# particular resource should be included or excluded from the AWS
|
1027
|
+
# Firewall Manager policy. Tags enable you to categorize your AWS
|
1028
|
+
# resources in different ways, for example, by purpose, owner, or
|
1029
|
+
# environment. Each tag consists of a key and an optional value.
|
1030
|
+
# Firewall Manager combines the tags with "AND" so that, if you add
|
1031
|
+
# more than one tag to a policy scope, a resource must have all the
|
1032
|
+
# specified tags to be included or excluded. For more information, see
|
1033
|
+
# [Working with Tag Editor][1].
|
1001
1034
|
#
|
1002
1035
|
#
|
1003
1036
|
#
|
@@ -1034,26 +1067,54 @@ module Aws::FMS
|
|
1034
1067
|
# data as a hash:
|
1035
1068
|
#
|
1036
1069
|
# {
|
1037
|
-
# type: "WAF", # required, accepts WAF, SHIELD_ADVANCED
|
1070
|
+
# type: "WAF", # required, accepts WAF, SHIELD_ADVANCED, SECURITY_GROUPS_COMMON, SECURITY_GROUPS_CONTENT_AUDIT, SECURITY_GROUPS_USAGE_AUDIT
|
1038
1071
|
# managed_service_data: "ManagedServiceData",
|
1039
1072
|
# }
|
1040
1073
|
#
|
1041
1074
|
# @!attribute [rw] type
|
1042
1075
|
# The service that the policy is using to protect the resources. This
|
1043
|
-
# specifies the type of policy that is created, either
|
1044
|
-
# Shield Advanced policy.
|
1076
|
+
# specifies the type of policy that is created, either an AWS WAF
|
1077
|
+
# policy, a Shield Advanced policy, or a security group policy. For
|
1078
|
+
# security group policies, Firewall Manager supports one security
|
1079
|
+
# group for each common policy and for each content audit policy. This
|
1080
|
+
# is an adjustable limit that you can increase by contacting AWS
|
1081
|
+
# Support.
|
1045
1082
|
# @return [String]
|
1046
1083
|
#
|
1047
1084
|
# @!attribute [rw] managed_service_data
|
1048
|
-
# Details about the service
|
1049
|
-
#
|
1085
|
+
# Details about the service that are specific to the service type, in
|
1086
|
+
# JSON format. For service type `SHIELD_ADVANCED`, this is an empty
|
1087
|
+
# string.
|
1088
|
+
#
|
1089
|
+
# * Example: `WAF`
|
1090
|
+
#
|
1091
|
+
# `ManagedServiceData": "\{"type": "WAF", "ruleGroups":
|
1092
|
+
# [\{"id": "12345678-1bcd-9012-efga-0987654321ab",
|
1093
|
+
# "overrideAction" : \{"type": "COUNT"\}\}],
|
1094
|
+
# "defaultAction": \{"type": "BLOCK"\}\}`
|
1095
|
+
#
|
1096
|
+
# * Example: `SECURITY_GROUPS_COMMON`
|
1097
|
+
#
|
1098
|
+
# `"SecurityServicePolicyData":\{"Type":"SECURITY_GROUPS_COMMON","ManagedServiceData":"\{"type":"SECURITY_GROUPS_COMMON","revertManualSecurityGroupChanges":false,"exclusiveResourceSecurityGroupManagement":false,"securityGroups":[\{"id":"
|
1099
|
+
# sg-000e55995d61a06bd"\}]\}"\},"RemediationEnabled":false,"ResourceType":"AWS::EC2::NetworkInterface"\}`
|
1100
|
+
#
|
1101
|
+
# * Example: `SECURITY_GROUPS_CONTENT_AUDIT`
|
1102
|
+
#
|
1103
|
+
# `"SecurityServicePolicyData":\{"Type":"SECURITY_GROUPS_CONTENT_AUDIT","ManagedServiceData":"\{"type":"SECURITY_GROUPS_CONTENT_AUDIT","securityGroups":[\{"id":"
|
1104
|
+
# sg-000e55995d61a06bd
|
1105
|
+
# "\}],"securityGroupAction":\{"type":"ALLOW"\}\}"\},"RemediationEnabled":false,"ResourceType":"AWS::EC2::NetworkInterface"\}`
|
1106
|
+
#
|
1107
|
+
# The security group action for content audit can be `ALLOW` or
|
1108
|
+
# `DENY`. For `ALLOW`, all in-scope security group rules must be
|
1109
|
+
# within the allowed range of the policy's security group rules.
|
1110
|
+
# For `DENY`, all in-scope security group rules must not contain a
|
1111
|
+
# value or a range that matches a rule value or range in the policy
|
1112
|
+
# security group.
|
1050
1113
|
#
|
1051
|
-
#
|
1052
|
-
# [\{"id": "12345678-1bcd-9012-efga-0987654321ab",
|
1053
|
-
# "overrideAction" : \{"type": "COUNT"\}\}], "defaultAction":
|
1054
|
-
# \{"type": "BLOCK"\}\}`
|
1114
|
+
# * Example: `SECURITY_GROUPS_USAGE_AUDIT`
|
1055
1115
|
#
|
1056
|
-
#
|
1116
|
+
# `"SecurityServicePolicyData":\{"Type":"SECURITY_GROUPS_USAGE_AUDIT","ManagedServiceData":"\{"type":"SECURITY_GROUPS_USAGE_AUDIT","deleteUnusedSecurityGroups":true,"coalesceRedundantSecurityGroups":true\}"\},"RemediationEnabled":false,"Resou
|
1117
|
+
# rceType":"AWS::EC2::SecurityGroup"\}`
|
1057
1118
|
# @return [String]
|
1058
1119
|
#
|
1059
1120
|
# @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/SecurityServicePolicyData AWS API Documentation
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-fms
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.19.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2019-
|
11
|
+
date: 2019-10-10 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|