aws-sdk-fms 1.18.0 → 1.19.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 4fa045776728f3aac3709e2cdcdc61af5a55ec24
4
- data.tar.gz: ebfb0cedd0a8fe7326ea091362e5f1bec857bbd4
3
+ metadata.gz: 476466d4fe38aa8c9aa515c3aa5eb574b2af9354
4
+ data.tar.gz: 6e59a6eb401ffc20af8f21a1a2f40d8a1c7ed173
5
5
  SHA512:
6
- metadata.gz: 89eb0f70f4ba90f63bb78118421c2427a177bc0ab5d426b40a99f8e1d6e3f7c9f5e6c6edcb1872fe9c09ab1d99e48f5e7104b0595873ea88a693192bf25aa31c
7
- data.tar.gz: 23af38f841cf88850f69dc7b17f4e609f07e856cc8f64df917b2c6caa71e00d6254ec606c6b81fa75d10affdc3d862acd108fca2cd879cf94427e4f332286465
6
+ metadata.gz: 83f8ba6fb8a3c0386fdea27dfc740d9fb99975ab5f23363282f54a14d1b9107a6870e445dab2a593811bd90b5db490a57a8937dfa4c0259520a60c8c04e9f0c8
7
+ data.tar.gz: 35ea4ad21b1be2502c49663dc7a9b484165e93d381e39e36358f79e2d5493b9b53cac05615e849f9f1a68ad78dcba9a1f3a735d7116832da93194481e225fde8
@@ -42,6 +42,6 @@ require_relative 'aws-sdk-fms/customizations'
42
42
  # @service
43
43
  module Aws::FMS
44
44
 
45
- GEM_VERSION = '1.18.0'
45
+ GEM_VERSION = '1.19.0'
46
46
 
47
47
  end
@@ -265,7 +265,7 @@ module Aws::FMS
265
265
  # @!group API Operations
266
266
 
267
267
  # Sets the AWS Firewall Manager administrator account. AWS Firewall
268
- # Manager must be associated with the master account your AWS
268
+ # Manager must be associated with the master account of your AWS
269
269
  # organization or associated with a member account that has the
270
270
  # appropriate permissions. If the account ID that you submit is not an
271
271
  # AWS Organizations master account, AWS Firewall Manager will set the
@@ -324,21 +324,34 @@ module Aws::FMS
324
324
  # by `PutPolicy` and by `ListPolicies`.
325
325
  #
326
326
  # @option params [Boolean] :delete_all_policy_resources
327
- # If `True`, the request will also perform a clean-up process that will:
327
+ # If `True`, the request performs cleanup according to the policy type.
328
328
  #
329
- # * Delete rule groups created by AWS Firewall Manager
329
+ # For AWS WAF and Shield Advanced policies, the cleanup does the
330
+ # following:
330
331
  #
331
- # * Remove web ACLs from in-scope resources
332
+ # * Deletes rule groups created by AWS Firewall Manager
332
333
  #
333
- # * Delete web ACLs that contain no rules or rule groups
334
+ # * Removes web ACLs from in-scope resources
334
335
  #
335
- # After the cleanup, in-scope resources will no longer be protected by
336
- # web ACLs in this policy. Protection of out-of-scope resources will
337
- # remain unchanged. Scope is determined by tags and accounts associated
338
- # with the policy. When creating the policy, if you specified that only
339
- # resources in specific accounts or with specific tags be protected by
340
- # the policy, those resources are in-scope. All others are out of scope.
341
- # If you did not specify tags or accounts, all resources are in-scope.
336
+ # * Deletes web ACLs that contain no rules or rule groups
337
+ #
338
+ # For security group policies, the cleanup does the following for each
339
+ # security group in the policy:
340
+ #
341
+ # * Disassociates the security group from in-scope resources
342
+ #
343
+ # * Deletes the security group if it was created through Firewall
344
+ # Manager and if it's no longer associated with any resources through
345
+ # another policy
346
+ #
347
+ # After the cleanup, in-scope resources are no longer protected by web
348
+ # ACLs in this policy. Protection of out-of-scope resources remains
349
+ # unchanged. Scope is determined by tags that you create and accounts
350
+ # that you associate with the policy. When creating the policy, if you
351
+ # specify that only resources in specific accounts or with specific tags
352
+ # are in scope of the policy, those accounts and resources are handled
353
+ # by the policy. All others are out of scope. If you don't specify tags
354
+ # or accounts, all resources are in scope.
342
355
  #
343
356
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
344
357
  #
@@ -361,7 +374,7 @@ module Aws::FMS
361
374
  # Disassociates the account that has been set as the AWS Firewall
362
375
  # Manager administrator account. To set a different account as the
363
376
  # administrator account, you must submit an `AssociateAdminAccount`
364
- # request .
377
+ # request.
365
378
  #
366
379
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
367
380
  #
@@ -398,8 +411,12 @@ module Aws::FMS
398
411
 
399
412
  # Returns detailed compliance information about the specified member
400
413
  # account. Details include resources that are in and out of compliance
401
- # with the specified policy. Resources are considered non-compliant if
402
- # the specified policy has not been applied to them.
414
+ # with the specified policy. Resources are considered noncompliant for
415
+ # AWS WAF and Shield Advanced policies if the specified policy has not
416
+ # been applied to them. Resources are considered noncompliant for
417
+ # security group policies if they are in scope of the policy, they
418
+ # violate one or more of the policy rules, and remediation is disabled
419
+ # or not possible.
403
420
  #
404
421
  # @option params [required, String] :policy_id
405
422
  # The ID of the policy that you want to get the details for. `PolicyId`
@@ -427,7 +444,7 @@ module Aws::FMS
427
444
  # resp.policy_compliance_detail.member_account #=> String
428
445
  # resp.policy_compliance_detail.violators #=> Array
429
446
  # resp.policy_compliance_detail.violators[0].resource_id #=> String
430
- # resp.policy_compliance_detail.violators[0].violation_reason #=> String, one of "WEB_ACL_MISSING_RULE_GROUP", "RESOURCE_MISSING_WEB_ACL", "RESOURCE_INCORRECT_WEB_ACL", "RESOURCE_MISSING_SHIELD_PROTECTION"
447
+ # resp.policy_compliance_detail.violators[0].violation_reason #=> String, one of "WEB_ACL_MISSING_RULE_GROUP", "RESOURCE_MISSING_WEB_ACL", "RESOURCE_INCORRECT_WEB_ACL", "RESOURCE_MISSING_SHIELD_PROTECTION", "RESOURCE_MISSING_WEB_ACL_OR_SHIELD_PROTECTION", "RESOURCE_MISSING_SECURITY_GROUP", "RESOURCE_VIOLATES_AUDIT_SECURITY_GROUP", "SECURITY_GROUP_UNUSED", "SECURITY_GROUP_REDUNDANT"
431
448
  # resp.policy_compliance_detail.violators[0].resource_type #=> String
432
449
  # resp.policy_compliance_detail.evaluation_limit_exceeded #=> Boolean
433
450
  # resp.policy_compliance_detail.expired_at #=> Time
@@ -443,8 +460,8 @@ module Aws::FMS
443
460
  req.send_request(options)
444
461
  end
445
462
 
446
- # Returns information about the Amazon Simple Notification Service (SNS)
447
- # topic that is used to record AWS Firewall Manager SNS logs.
463
+ # Information about the Amazon Simple Notification Service (SNS) topic
464
+ # that is used to record AWS Firewall Manager SNS logs.
448
465
  #
449
466
  # @return [Types::GetNotificationChannelResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
450
467
  #
@@ -487,7 +504,7 @@ module Aws::FMS
487
504
  # resp.policy.policy_id #=> String
488
505
  # resp.policy.policy_name #=> String
489
506
  # resp.policy.policy_update_token #=> String
490
- # resp.policy.security_service_policy_data.type #=> String, one of "WAF", "SHIELD_ADVANCED"
507
+ # resp.policy.security_service_policy_data.type #=> String, one of "WAF", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
491
508
  # resp.policy.security_service_policy_data.managed_service_data #=> String
492
509
  # resp.policy.resource_type #=> String
493
510
  # resp.policy.resource_type_list #=> Array
@@ -515,7 +532,8 @@ module Aws::FMS
515
532
  end
516
533
 
517
534
  # If you created a Shield Advanced policy, returns policy-level attack
518
- # summary information in the event of a potential DDoS attack.
535
+ # summary information in the event of a potential DDoS attack. Other
536
+ # policy types are currently unsupported.
519
537
  #
520
538
  # @option params [required, String] :policy_id
521
539
  # The ID of the policy for which you want to get the attack information.
@@ -526,21 +544,21 @@ module Aws::FMS
526
544
  #
527
545
  # @option params [Time,DateTime,Date,Integer,String] :start_time
528
546
  # The start of the time period to query for the attacks. This is a
529
- # `timestamp` type. The sample request above indicates a number type
547
+ # `timestamp` type. The request syntax listing indicates a `number` type
530
548
  # because the default used by AWS Firewall Manager is Unix time in
531
549
  # seconds. However, any valid `timestamp` format is allowed.
532
550
  #
533
551
  # @option params [Time,DateTime,Date,Integer,String] :end_time
534
552
  # The end of the time period to query for the attacks. This is a
535
- # `timestamp` type. The sample request above indicates a number type
553
+ # `timestamp` type. The request syntax listing indicates a `number` type
536
554
  # because the default used by AWS Firewall Manager is Unix time in
537
555
  # seconds. However, any valid `timestamp` format is allowed.
538
556
  #
539
557
  # @option params [String] :next_token
540
558
  # If you specify a value for `MaxResults` and you have more objects than
541
559
  # the number that you specify for `MaxResults`, AWS Firewall Manager
542
- # returns a `NextToken` value in the response that allows you to list
543
- # another group of objects. For the second and subsequent
560
+ # returns a `NextToken` value in the response, which you can use to
561
+ # retrieve another group of objects. For the second and subsequent
544
562
  # `GetProtectionStatus` requests, specify the value of `NextToken` from
545
563
  # the previous response to get information about another batch of
546
564
  # objects.
@@ -572,7 +590,7 @@ module Aws::FMS
572
590
  # @example Response structure
573
591
  #
574
592
  # resp.admin_account_id #=> String
575
- # resp.service_type #=> String, one of "WAF", "SHIELD_ADVANCED"
593
+ # resp.service_type #=> String, one of "WAF", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
576
594
  # resp.data #=> String
577
595
  # resp.next_token #=> String
578
596
  #
@@ -734,7 +752,7 @@ module Aws::FMS
734
752
  # resp.policy_list[0].policy_id #=> String
735
753
  # resp.policy_list[0].policy_name #=> String
736
754
  # resp.policy_list[0].resource_type #=> String
737
- # resp.policy_list[0].security_service_type #=> String, one of "WAF", "SHIELD_ADVANCED"
755
+ # resp.policy_list[0].security_service_type #=> String, one of "WAF", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
738
756
  # resp.policy_list[0].remediation_enabled #=> Boolean
739
757
  # resp.next_token #=> String
740
758
  #
@@ -778,17 +796,23 @@ module Aws::FMS
778
796
 
779
797
  # Creates an AWS Firewall Manager policy.
780
798
  #
781
- # Firewall Manager provides two types of policies: A Shield Advanced
782
- # policy, which applies Shield Advanced protection to specified accounts
783
- # and resources, or a WAF policy, which contains a rule group and
784
- # defines which resources are to be protected by that rule group. A
785
- # policy is specific to either WAF or Shield Advanced. If you want to
786
- # enforce both WAF rules and Shield Advanced protection across accounts,
787
- # you can create multiple policies. You can create one or more policies
788
- # for WAF rules, and one or more policies for Shield Advanced.
799
+ # Firewall Manager provides the following types of policies:
800
+ #
801
+ # * A Shield Advanced policy, which applies Shield Advanced protection
802
+ # to specified accounts and resources
803
+ #
804
+ # * An AWS WAF policy, which contains a rule group and defines which
805
+ # resources are to be protected by that rule group
806
+ #
807
+ # * A security group policy, which manages VPC security groups across
808
+ # your AWS organization.
809
+ #
810
+ # Each policy is specific to one of the three types. If you want to
811
+ # enforce more than one policy type across accounts, you can create
812
+ # multiple policies. You can create multiple policies for each type.
789
813
  #
790
814
  # You must be subscribed to Shield Advanced to create a Shield Advanced
791
- # policy. For more information on subscribing to Shield Advanced, see
815
+ # policy. For more information about subscribing to Shield Advanced, see
792
816
  # [CreateSubscription][1].
793
817
  #
794
818
  #
@@ -811,7 +835,7 @@ module Aws::FMS
811
835
  # policy_name: "ResourceName", # required
812
836
  # policy_update_token: "PolicyUpdateToken",
813
837
  # security_service_policy_data: { # required
814
- # type: "WAF", # required, accepts WAF, SHIELD_ADVANCED
838
+ # type: "WAF", # required, accepts WAF, SHIELD_ADVANCED, SECURITY_GROUPS_COMMON, SECURITY_GROUPS_CONTENT_AUDIT, SECURITY_GROUPS_USAGE_AUDIT
815
839
  # managed_service_data: "ManagedServiceData",
816
840
  # },
817
841
  # resource_type: "ResourceType", # required
@@ -838,7 +862,7 @@ module Aws::FMS
838
862
  # resp.policy.policy_id #=> String
839
863
  # resp.policy.policy_name #=> String
840
864
  # resp.policy.policy_update_token #=> String
841
- # resp.policy.security_service_policy_data.type #=> String, one of "WAF", "SHIELD_ADVANCED"
865
+ # resp.policy.security_service_policy_data.type #=> String, one of "WAF", "SHIELD_ADVANCED", "SECURITY_GROUPS_COMMON", "SECURITY_GROUPS_CONTENT_AUDIT", "SECURITY_GROUPS_USAGE_AUDIT"
842
866
  # resp.policy.security_service_policy_data.managed_service_data #=> String
843
867
  # resp.policy.resource_type #=> String
844
868
  # resp.policy.resource_type_list #=> Array
@@ -878,7 +902,7 @@ module Aws::FMS
878
902
  params: params,
879
903
  config: config)
880
904
  context[:gem_name] = 'aws-sdk-fms'
881
- context[:gem_version] = '1.18.0'
905
+ context[:gem_version] = '1.19.0'
882
906
  Seahorse::Client::Request.new(handlers, context)
883
907
  end
884
908
 
@@ -45,7 +45,7 @@ module Aws::FMS
45
45
  # @return [String]
46
46
  #
47
47
  # @!attribute [rw] resource_type
48
- # The resource type. This is in the format shown in [AWS Resource
48
+ # The resource type. This is in the format shown in the [AWS Resource
49
49
  # Types Reference][1]. For example:
50
50
  # `AWS::ElasticLoadBalancingV2::LoadBalancer` or
51
51
  # `AWS::CloudFront::Distribution`.
@@ -84,23 +84,35 @@ module Aws::FMS
84
84
  # @return [String]
85
85
  #
86
86
  # @!attribute [rw] delete_all_policy_resources
87
- # If `True`, the request will also perform a clean-up process that
88
- # will:
87
+ # If `True`, the request performs cleanup according to the policy
88
+ # type.
89
89
  #
90
- # * Delete rule groups created by AWS Firewall Manager
90
+ # For AWS WAF and Shield Advanced policies, the cleanup does the
91
+ # following:
91
92
  #
92
- # * Remove web ACLs from in-scope resources
93
+ # * Deletes rule groups created by AWS Firewall Manager
93
94
  #
94
- # * Delete web ACLs that contain no rules or rule groups
95
+ # * Removes web ACLs from in-scope resources
95
96
  #
96
- # After the cleanup, in-scope resources will no longer be protected by
97
- # web ACLs in this policy. Protection of out-of-scope resources will
98
- # remain unchanged. Scope is determined by tags and accounts
99
- # associated with the policy. When creating the policy, if you
100
- # specified that only resources in specific accounts or with specific
101
- # tags be protected by the policy, those resources are in-scope. All
102
- # others are out of scope. If you did not specify tags or accounts,
103
- # all resources are in-scope.
97
+ # * Deletes web ACLs that contain no rules or rule groups
98
+ #
99
+ # For security group policies, the cleanup does the following for each
100
+ # security group in the policy:
101
+ #
102
+ # * Disassociates the security group from in-scope resources
103
+ #
104
+ # * Deletes the security group if it was created through Firewall
105
+ # Manager and if it's no longer associated with any resources
106
+ # through another policy
107
+ #
108
+ # After the cleanup, in-scope resources are no longer protected by web
109
+ # ACLs in this policy. Protection of out-of-scope resources remains
110
+ # unchanged. Scope is determined by tags that you create and accounts
111
+ # that you associate with the policy. When creating the policy, if you
112
+ # specify that only resources in specific accounts or with specific
113
+ # tags are in scope of the policy, those accounts and resources are
114
+ # handled by the policy. All others are out of scope. If you don't
115
+ # specify tags or accounts, all resources are in scope.
104
116
  # @return [Boolean]
105
117
  #
106
118
  # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/DeletePolicyRequest AWS API Documentation
@@ -118,8 +130,9 @@ module Aws::FMS
118
130
  class DisassociateAdminAccountRequest < Aws::EmptyStructure; end
119
131
 
120
132
  # Describes the compliance status for the account. An account is
121
- # considered non-compliant if it includes resources that are not
122
- # protected by the specified policy.
133
+ # considered noncompliant if it includes resources that are not
134
+ # protected by the specified policy or that don't comply with the
135
+ # policy.
123
136
  #
124
137
  # @!attribute [rw] compliance_status
125
138
  # Describes an AWS account's compliance with the AWS Firewall Manager
@@ -127,13 +140,16 @@ module Aws::FMS
127
140
  # @return [String]
128
141
  #
129
142
  # @!attribute [rw] violator_count
130
- # Number of resources that are non-compliant with the specified
131
- # policy. A resource is considered non-compliant if it is not
132
- # associated with the specified policy.
143
+ # The number of resources that are noncompliant with the specified
144
+ # policy. For AWS WAF and Shield Advanced policies, a resource is
145
+ # considered noncompliant if it is not associated with the policy. For
146
+ # security group policies, a resource is considered noncompliant if it
147
+ # doesn't comply with the rules of the policy and remediation is
148
+ # disabled or not possible.
133
149
  # @return [Integer]
134
150
  #
135
151
  # @!attribute [rw] evaluation_limit_exceeded
136
- # Indicates that over 100 resources are non-compliant with the AWS
152
+ # Indicates that over 100 resources are noncompliant with the AWS
137
153
  # Firewall Manager policy.
138
154
  # @return [Boolean]
139
155
  #
@@ -290,26 +306,26 @@ module Aws::FMS
290
306
  #
291
307
  # @!attribute [rw] start_time
292
308
  # The start of the time period to query for the attacks. This is a
293
- # `timestamp` type. The sample request above indicates a number type
294
- # because the default used by AWS Firewall Manager is Unix time in
295
- # seconds. However, any valid `timestamp` format is allowed.
309
+ # `timestamp` type. The request syntax listing indicates a `number`
310
+ # type because the default used by AWS Firewall Manager is Unix time
311
+ # in seconds. However, any valid `timestamp` format is allowed.
296
312
  # @return [Time]
297
313
  #
298
314
  # @!attribute [rw] end_time
299
315
  # The end of the time period to query for the attacks. This is a
300
- # `timestamp` type. The sample request above indicates a number type
301
- # because the default used by AWS Firewall Manager is Unix time in
302
- # seconds. However, any valid `timestamp` format is allowed.
316
+ # `timestamp` type. The request syntax listing indicates a `number`
317
+ # type because the default used by AWS Firewall Manager is Unix time
318
+ # in seconds. However, any valid `timestamp` format is allowed.
303
319
  # @return [Time]
304
320
  #
305
321
  # @!attribute [rw] next_token
306
322
  # If you specify a value for `MaxResults` and you have more objects
307
323
  # than the number that you specify for `MaxResults`, AWS Firewall
308
- # Manager returns a `NextToken` value in the response that allows you
309
- # to list another group of objects. For the second and subsequent
310
- # `GetProtectionStatus` requests, specify the value of `NextToken`
311
- # from the previous response to get information about another batch of
312
- # objects.
324
+ # Manager returns a `NextToken` value in the response, which you can
325
+ # use to retrieve another group of objects. For the second and
326
+ # subsequent `GetProtectionStatus` requests, specify the value of
327
+ # `NextToken` from the previous response to get information about
328
+ # another batch of objects.
313
329
  # @return [String]
314
330
  #
315
331
  # @!attribute [rw] max_results
@@ -353,8 +369,7 @@ module Aws::FMS
353
369
  #
354
370
  # * End time of the attack (ongoing attacks will not have an end time)
355
371
  #
356
- # The details are in JSON format. An example is shown in the Examples
357
- # section below.
372
+ # The details are in JSON format.
358
373
  # @return [String]
359
374
  #
360
375
  # @!attribute [rw] next_token
@@ -635,7 +650,7 @@ module Aws::FMS
635
650
  # policy_name: "ResourceName", # required
636
651
  # policy_update_token: "PolicyUpdateToken",
637
652
  # security_service_policy_data: { # required
638
- # type: "WAF", # required, accepts WAF, SHIELD_ADVANCED
653
+ # type: "WAF", # required, accepts WAF, SHIELD_ADVANCED, SECURITY_GROUPS_COMMON, SECURITY_GROUPS_CONTENT_AUDIT, SECURITY_GROUPS_USAGE_AUDIT
639
654
  # managed_service_data: "ManagedServiceData",
640
655
  # },
641
656
  # resource_type: "ResourceType", # required
@@ -678,10 +693,17 @@ module Aws::FMS
678
693
  # @return [Types::SecurityServicePolicyData]
679
694
  #
680
695
  # @!attribute [rw] resource_type
681
- # The type of resource to protect with the policy. This is in the
682
- # format shown in [AWS Resource Types Reference][1]. For example:
683
- # `AWS::ElasticLoadBalancingV2::LoadBalancer` or
684
- # `AWS::CloudFront::Distribution`.
696
+ # The type of resource protected by or in scope of the policy. This is
697
+ # in the format shown in the [AWS Resource Types Reference][1]. For
698
+ # AWS WAF and Shield Advanced, examples include
699
+ # `AWS::ElasticLoadBalancingV2::LoadBalancer` and
700
+ # `AWS::CloudFront::Distribution`. For a security group common policy,
701
+ # valid values are `AWS::EC2::NetworkInterface` and
702
+ # `AWS::EC2::Instance`. For a security group content audit policy,
703
+ # valid values are `AWS::EC2::SecurityGroup`,
704
+ # `AWS::EC2::NetworkInterface`, and `AWS::EC2::Instance`. For a
705
+ # security group usage audit policy, the value is
706
+ # `AWS::EC2::SecurityGroup`.
685
707
  #
686
708
  #
687
709
  #
@@ -698,9 +720,9 @@ module Aws::FMS
698
720
  #
699
721
  # @!attribute [rw] exclude_resource_tags
700
722
  # If set to `True`, resources with the tags that are specified in the
701
- # `ResourceTag` array are not protected by the policy. If set to
723
+ # `ResourceTag` array are not in scope of the policy. If set to
702
724
  # `False`, and the `ResourceTag` array is not null, only resources
703
- # with the specified tags are associated with the policy.
725
+ # with the specified tags are in scope of the policy.
704
726
  # @return [Boolean]
705
727
  #
706
728
  # @!attribute [rw] remediation_enabled
@@ -746,9 +768,9 @@ module Aws::FMS
746
768
  include Aws::Structure
747
769
  end
748
770
 
749
- # Describes the non-compliant resources in a member account for a
771
+ # Describes the noncompliant resources in a member account for a
750
772
  # specific AWS Firewall Manager policy. A maximum of 100 entries are
751
- # displayed. If more than 100 resources are non-compliant,
773
+ # displayed. If more than 100 resources are noncompliant,
752
774
  # `EvaluationLimitExceeded` is set to `True`.
753
775
  #
754
776
  # @!attribute [rw] policy_owner
@@ -764,22 +786,24 @@ module Aws::FMS
764
786
  # @return [String]
765
787
  #
766
788
  # @!attribute [rw] violators
767
- # An array of resources that are not protected by the policy.
789
+ # An array of resources that aren't protected by the AWS WAF or
790
+ # Shield Advanced policy or that aren't in compliance with the
791
+ # security group policy.
768
792
  # @return [Array<Types::ComplianceViolator>]
769
793
  #
770
794
  # @!attribute [rw] evaluation_limit_exceeded
771
- # Indicates if over 100 resources are non-compliant with the AWS
795
+ # Indicates if over 100 resources are noncompliant with the AWS
772
796
  # Firewall Manager policy.
773
797
  # @return [Boolean]
774
798
  #
775
799
  # @!attribute [rw] expired_at
776
- # A time stamp that indicates when the returned information should be
777
- # considered out-of-date.
800
+ # A timestamp that indicates when the returned information should be
801
+ # considered out of date.
778
802
  # @return [Time]
779
803
  #
780
804
  # @!attribute [rw] issue_info_map
781
805
  # Details about problems with dependent services, such as AWS WAF or
782
- # AWS Config, that are causing a resource to be non-compliant. The
806
+ # AWS Config, that are causing a resource to be noncompliant. The
783
807
  # details include the name of the dependent service and the error
784
808
  # message received that indicates the problem with the service.
785
809
  # @return [Hash<String,String>]
@@ -798,8 +822,10 @@ module Aws::FMS
798
822
  end
799
823
 
800
824
  # Indicates whether the account is compliant with the specified policy.
801
- # An account is considered non-compliant if it includes resources that
802
- # are not protected by the policy.
825
+ # An account is considered noncompliant if it includes resources that
826
+ # are not protected by the policy, for AWS WAF and Shield Advanced
827
+ # policies, or that are noncompliant with the policy, for security group
828
+ # policies.
803
829
  #
804
830
  # @!attribute [rw] policy_owner
805
831
  # The AWS account that created the AWS Firewall Manager policy.
@@ -822,12 +848,12 @@ module Aws::FMS
822
848
  # @return [Array<Types::EvaluationResult>]
823
849
  #
824
850
  # @!attribute [rw] last_updated
825
- # Time stamp of the last update to the `EvaluationResult` objects.
851
+ # Timestamp of the last update to the `EvaluationResult` objects.
826
852
  # @return [Time]
827
853
  #
828
854
  # @!attribute [rw] issue_info_map
829
855
  # Details about problems with dependent services, such as AWS WAF or
830
- # AWS Config, that are causing a resource to be non-compliant. The
856
+ # AWS Config, that are causing a resource to be noncompliant. The
831
857
  # details include the name of the dependent service and the error
832
858
  # message received that indicates the problem with the service.
833
859
  # @return [Hash<String,String>]
@@ -860,10 +886,17 @@ module Aws::FMS
860
886
  # @return [String]
861
887
  #
862
888
  # @!attribute [rw] resource_type
863
- # The type of resource to protect with the policy. This is in the
864
- # format shown in [AWS Resource Types Reference][1]. For example:
865
- # `AWS::ElasticLoadBalancingV2::LoadBalancer` or
866
- # `AWS::CloudFront::Distribution`.
889
+ # The type of resource protected by or in scope of the policy. This is
890
+ # in the format shown in the [AWS Resource Types Reference][1]. For
891
+ # AWS WAF and Shield Advanced, examples include
892
+ # `AWS::ElasticLoadBalancingV2::LoadBalancer` and
893
+ # `AWS::CloudFront::Distribution`. For a security group common policy,
894
+ # valid values are `AWS::EC2::NetworkInterface` and
895
+ # `AWS::EC2::Instance`. For a security group content audit policy,
896
+ # valid values are `AWS::EC2::SecurityGroup`,
897
+ # `AWS::EC2::NetworkInterface`, and `AWS::EC2::Instance`. For a
898
+ # security group usage audit policy, the value is
899
+ # `AWS::EC2::SecurityGroup`.
867
900
  #
868
901
  #
869
902
  #
@@ -872,8 +905,8 @@ module Aws::FMS
872
905
  #
873
906
  # @!attribute [rw] security_service_type
874
907
  # The service that the policy is using to protect the resources. This
875
- # specifies the type of policy that is created, either a WAF policy or
876
- # Shield Advanced policy.
908
+ # specifies the type of policy that is created, either an AWS WAF
909
+ # policy, a Shield Advanced policy, or a security group policy.
877
910
  # @return [String]
878
911
  #
879
912
  # @!attribute [rw] remediation_enabled
@@ -928,7 +961,7 @@ module Aws::FMS
928
961
  # policy_name: "ResourceName", # required
929
962
  # policy_update_token: "PolicyUpdateToken",
930
963
  # security_service_policy_data: { # required
931
- # type: "WAF", # required, accepts WAF, SHIELD_ADVANCED
964
+ # type: "WAF", # required, accepts WAF, SHIELD_ADVANCED, SECURITY_GROUPS_COMMON, SECURITY_GROUPS_CONTENT_AUDIT, SECURITY_GROUPS_USAGE_AUDIT
932
965
  # managed_service_data: "ManagedServiceData",
933
966
  # },
934
967
  # resource_type: "ResourceType", # required
@@ -990,14 +1023,14 @@ module Aws::FMS
990
1023
  end
991
1024
 
992
1025
  # The resource tags that AWS Firewall Manager uses to determine if a
993
- # particular resource should be included or excluded from protection by
994
- # the AWS Firewall Manager policy. Tags enable you to categorize your
995
- # AWS resources in different ways, for example, by purpose, owner, or
996
- # environment. Each tag consists of a key and an optional value, both of
997
- # which you define. Tags are combined with an "OR." That is, if you
998
- # add more than one tag, if any of the tags matches, the resource is
999
- # considered a match for the include or exclude. [Working with Tag
1000
- # Editor][1].
1026
+ # particular resource should be included or excluded from the AWS
1027
+ # Firewall Manager policy. Tags enable you to categorize your AWS
1028
+ # resources in different ways, for example, by purpose, owner, or
1029
+ # environment. Each tag consists of a key and an optional value.
1030
+ # Firewall Manager combines the tags with "AND" so that, if you add
1031
+ # more than one tag to a policy scope, a resource must have all the
1032
+ # specified tags to be included or excluded. For more information, see
1033
+ # [Working with Tag Editor][1].
1001
1034
  #
1002
1035
  #
1003
1036
  #
@@ -1034,26 +1067,54 @@ module Aws::FMS
1034
1067
  # data as a hash:
1035
1068
  #
1036
1069
  # {
1037
- # type: "WAF", # required, accepts WAF, SHIELD_ADVANCED
1070
+ # type: "WAF", # required, accepts WAF, SHIELD_ADVANCED, SECURITY_GROUPS_COMMON, SECURITY_GROUPS_CONTENT_AUDIT, SECURITY_GROUPS_USAGE_AUDIT
1038
1071
  # managed_service_data: "ManagedServiceData",
1039
1072
  # }
1040
1073
  #
1041
1074
  # @!attribute [rw] type
1042
1075
  # The service that the policy is using to protect the resources. This
1043
- # specifies the type of policy that is created, either a WAF policy or
1044
- # Shield Advanced policy.
1076
+ # specifies the type of policy that is created, either an AWS WAF
1077
+ # policy, a Shield Advanced policy, or a security group policy. For
1078
+ # security group policies, Firewall Manager supports one security
1079
+ # group for each common policy and for each content audit policy. This
1080
+ # is an adjustable limit that you can increase by contacting AWS
1081
+ # Support.
1045
1082
  # @return [String]
1046
1083
  #
1047
1084
  # @!attribute [rw] managed_service_data
1048
- # Details about the service. This contains `WAF` data in JSON format,
1049
- # as shown in the following example:
1085
+ # Details about the service that are specific to the service type, in
1086
+ # JSON format. For service type `SHIELD_ADVANCED`, this is an empty
1087
+ # string.
1088
+ #
1089
+ # * Example: `WAF`
1090
+ #
1091
+ # `ManagedServiceData": "\{"type": "WAF", "ruleGroups":
1092
+ # [\{"id": "12345678-1bcd-9012-efga-0987654321ab",
1093
+ # "overrideAction" : \{"type": "COUNT"\}\}],
1094
+ # "defaultAction": \{"type": "BLOCK"\}\}`
1095
+ #
1096
+ # * Example: `SECURITY_GROUPS_COMMON`
1097
+ #
1098
+ # `"SecurityServicePolicyData":\{"Type":"SECURITY_GROUPS_COMMON","ManagedServiceData":"\{"type":"SECURITY_GROUPS_COMMON","revertManualSecurityGroupChanges":false,"exclusiveResourceSecurityGroupManagement":false,"securityGroups":[\{"id":"
1099
+ # sg-000e55995d61a06bd"\}]\}"\},"RemediationEnabled":false,"ResourceType":"AWS::EC2::NetworkInterface"\}`
1100
+ #
1101
+ # * Example: `SECURITY_GROUPS_CONTENT_AUDIT`
1102
+ #
1103
+ # `"SecurityServicePolicyData":\{"Type":"SECURITY_GROUPS_CONTENT_AUDIT","ManagedServiceData":"\{"type":"SECURITY_GROUPS_CONTENT_AUDIT","securityGroups":[\{"id":"
1104
+ # sg-000e55995d61a06bd
1105
+ # "\}],"securityGroupAction":\{"type":"ALLOW"\}\}"\},"RemediationEnabled":false,"ResourceType":"AWS::EC2::NetworkInterface"\}`
1106
+ #
1107
+ # The security group action for content audit can be `ALLOW` or
1108
+ # `DENY`. For `ALLOW`, all in-scope security group rules must be
1109
+ # within the allowed range of the policy's security group rules.
1110
+ # For `DENY`, all in-scope security group rules must not contain a
1111
+ # value or a range that matches a rule value or range in the policy
1112
+ # security group.
1050
1113
  #
1051
- # `ManagedServiceData": "\{"type": "WAF", "ruleGroups":
1052
- # [\{"id": "12345678-1bcd-9012-efga-0987654321ab",
1053
- # "overrideAction" : \{"type": "COUNT"\}\}], "defaultAction":
1054
- # \{"type": "BLOCK"\}\}`
1114
+ # * Example: `SECURITY_GROUPS_USAGE_AUDIT`
1055
1115
  #
1056
- # If this is a Shield Advanced policy, this string will be empty.
1116
+ # `"SecurityServicePolicyData":\{"Type":"SECURITY_GROUPS_USAGE_AUDIT","ManagedServiceData":"\{"type":"SECURITY_GROUPS_USAGE_AUDIT","deleteUnusedSecurityGroups":true,"coalesceRedundantSecurityGroups":true\}"\},"RemediationEnabled":false,"Resou
1117
+ # rceType":"AWS::EC2::SecurityGroup"\}`
1057
1118
  # @return [String]
1058
1119
  #
1059
1120
  # @see http://docs.aws.amazon.com/goto/WebAPI/fms-2018-01-01/SecurityServicePolicyData AWS API Documentation
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-fms
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.18.0
4
+ version: 1.19.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2019-07-25 00:00:00.000000000 Z
11
+ date: 2019-10-10 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core