aws-sdk-fms 1.63.0 → 1.64.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 006e450a2654c8f5a8465278b9d0eb85510a075721014be0ec508cc866fb8b94
4
- data.tar.gz: 903dfdd380be50746ea325a9e1e2e3a31682318634a61b9eefffe0b5cff7f55f
3
+ metadata.gz: 39eb8bae4d7a1f5972c29f806406cc909eeec6aeea13793da7efc6c497c7e1ef
4
+ data.tar.gz: 1e06cb0918b3e945992322cfd9802dfb449b77ecc723bad67cc13026ae2e8072
5
5
  SHA512:
6
- metadata.gz: 0cefe496421fb0c0c34c9b55022a45af2b051de1d0591eb1175efef7f4b4fb39a684028db6a0a4c5e6bc2eb97830f763822e7df69b89b2ec45cee6e7068fe39f
7
- data.tar.gz: 5fe6ea26ced86d299e005ed062b7c6efb8aeae92d3963ffa8350d34e68d0b387cc468d8c3439f58847f96261002b4148be6c929ec1ef5c1c13afc1f727f8729b
6
+ metadata.gz: eacb5200cb9f01938ec2e4bcad981b40071f54eeb1d259a35bf4ca92f93a7f2aa6ac32ddfd6777761f37888ad5be91dda24bd012a3429b2fc6e5e6a67706685a
7
+ data.tar.gz: c4a1fdb5b78b74c4366ceb304e2f0d13a6af3d92321efff3a73b7dfd8bb0a515a784a88a65db8fba43d719670690e517ad8f096e229e638c0b857afe44f5b41e
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.64.0 (2023-11-10)
5
+ ------------------
6
+
7
+ * Feature - Adds optimizeUnassociatedWebACL flag to ManagedServiceData, updates third-party firewall examples, and other minor documentation updates.
8
+
4
9
  1.63.0 (2023-09-27)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.63.0
1
+ 1.64.0
@@ -616,6 +616,12 @@ module Aws::FMS
616
616
  # Manager and if it's no longer associated with any resources through
617
617
  # another policy
618
618
  #
619
+ # <note markdown="1"> For security group common policies, even if set to `False`, Firewall
620
+ # Manager deletes all security groups created by Firewall Manager that
621
+ # aren't associated with any other resources through another policy.
622
+ #
623
+ # </note>
624
+ #
619
625
  # After the cleanup, in-scope resources are no longer protected by web
620
626
  # ACLs in this policy. Protection of out-of-scope resources remains
621
627
  # unchanged. Scope is determined by tags that you create and accounts
@@ -1194,7 +1200,17 @@ module Aws::FMS
1194
1200
  #
1195
1201
  # @option params [required, String] :policy_id
1196
1202
  # The ID of the Firewall Manager policy that you want the details for.
1197
- # This currently only supports security group content audit policies.
1203
+ # You can get violation details for the following policy types:
1204
+ #
1205
+ # * DNS Firewall
1206
+ #
1207
+ # * Imported Network Firewall
1208
+ #
1209
+ # * Network Firewall
1210
+ #
1211
+ # * Security group content audit
1212
+ #
1213
+ # * Third-party firewall
1198
1214
  #
1199
1215
  # @option params [required, String] :member_account
1200
1216
  # The Amazon Web Services account ID that you want the details for.
@@ -2366,37 +2382,51 @@ module Aws::FMS
2366
2382
 
2367
2383
  # Creates an Firewall Manager policy.
2368
2384
  #
2369
- # Firewall Manager provides the following types of policies:
2385
+ # A Firewall Manager policy is specific to the individual policy type.
2386
+ # If you want to enforce multiple policy types across accounts, you can
2387
+ # create multiple policies. You can create more than one policy for each
2388
+ # type.
2370
2389
  #
2371
- # * An WAF policy (type WAFV2), which defines rule groups to run first
2372
- # in the corresponding WAF web ACL and rule groups to run last in the
2373
- # web ACL.
2390
+ # If you add a new account to an organization that you created with
2391
+ # Organizations, Firewall Manager automatically applies the policy to
2392
+ # the resources in that account that are within scope of the policy.
2393
+ #
2394
+ # Firewall Manager provides the following types of policies:
2374
2395
  #
2375
- # * An WAF Classic policy (type WAF), which defines a rule group.
2396
+ # * **Shield Advanced policy** - This policy applies Shield Advanced
2397
+ # protection to specified accounts and resources.
2376
2398
  #
2377
- # * A Shield Advanced policy, which applies Shield Advanced protection
2378
- # to specified accounts and resources.
2399
+ # * **Security Groups policy** - This type of policy gives you control
2400
+ # over security groups that are in use throughout your organization in
2401
+ # Organizations and lets you enforce a baseline set of rules across
2402
+ # your organization.
2379
2403
  #
2380
- # * A security group policy, which manages VPC security groups across
2381
- # your Amazon Web Services organization.
2404
+ # * **Network Firewall policy** - This policy applies Network Firewall
2405
+ # protection to your organization's VPCs.
2382
2406
  #
2383
- # * An Network Firewall policy, which provides firewall rules to filter
2384
- # network traffic in specified Amazon VPCs.
2407
+ # * **DNS Firewall policy** - This policy applies Amazon Route 53
2408
+ # Resolver DNS Firewall protections to your organization's VPCs.
2385
2409
  #
2386
- # * A DNS Firewall policy, which provides Route 53 Resolver DNS Firewall
2387
- # rules to filter DNS queries for specified VPCs.
2410
+ # * **Third-party firewall policy** - This policy applies third-party
2411
+ # firewall protections. Third-party firewalls are available by
2412
+ # subscription through the Amazon Web Services Marketplace console at
2413
+ # [Amazon Web Services Marketplace][1].
2388
2414
  #
2389
- # Each policy is specific to one of the types. If you want to enforce
2390
- # more than one policy type across accounts, create multiple policies.
2391
- # You can create multiple policies for each type.
2415
+ # * **Palo Alto Networks Cloud NGFW policy** - This policy applies
2416
+ # Palo Alto Networks Cloud Next Generation Firewall (NGFW)
2417
+ # protections and Palo Alto Networks Cloud NGFW rulestacks to your
2418
+ # organization's VPCs.
2392
2419
  #
2393
- # You must be subscribed to Shield Advanced to create a Shield Advanced
2394
- # policy. For more information about subscribing to Shield Advanced, see
2395
- # [CreateSubscription][1].
2420
+ # * **Fortigate CNF policy** - This policy applies Fortigate Cloud
2421
+ # Native Firewall (CNF) protections. Fortigate CNF is a
2422
+ # cloud-centered solution that blocks Zero-Day threats and secures
2423
+ # cloud infrastructures with industry-leading advanced threat
2424
+ # prevention, smart web application firewalls (WAF), and API
2425
+ # protection.
2396
2426
  #
2397
2427
  #
2398
2428
  #
2399
- # [1]: https://docs.aws.amazon.com/waf/latest/DDOSAPIReference/API_CreateSubscription.html
2429
+ # [1]: https://aws.amazon.com/marketplace
2400
2430
  #
2401
2431
  # @option params [required, Types::Policy] :policy
2402
2432
  # The details of the Firewall Manager policy to be created.
@@ -2690,7 +2720,7 @@ module Aws::FMS
2690
2720
  params: params,
2691
2721
  config: config)
2692
2722
  context[:gem_name] = 'aws-sdk-fms'
2693
- context[:gem_version] = '1.63.0'
2723
+ context[:gem_version] = '1.64.0'
2694
2724
  Seahorse::Client::Request.new(handlers, context)
2695
2725
  end
2696
2726
 
@@ -32,7 +32,7 @@ module Aws::FMS
32
32
  raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
33
33
  end
34
34
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
35
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
35
+ if Aws::Endpoints::Matchers.boolean_equals?(Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"), true)
36
36
  return Aws::Endpoints::Endpoint.new(url: "https://fms-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
37
37
  end
38
38
  raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
@@ -575,6 +575,12 @@ module Aws::FMS
575
575
  # Manager and if it's no longer associated with any resources
576
576
  # through another policy
577
577
  #
578
+ # <note markdown="1"> For security group common policies, even if set to `False`, Firewall
579
+ # Manager deletes all security groups created by Firewall Manager that
580
+ # aren't associated with any other resources through another policy.
581
+ #
582
+ # </note>
583
+ #
578
584
  # After the cleanup, in-scope resources are no longer protected by web
579
585
  # ACLs in this policy. Protection of out-of-scope resources remains
580
586
  # unchanged. Scope is determined by tags that you create and accounts
@@ -1621,7 +1627,17 @@ module Aws::FMS
1621
1627
 
1622
1628
  # @!attribute [rw] policy_id
1623
1629
  # The ID of the Firewall Manager policy that you want the details for.
1624
- # This currently only supports security group content audit policies.
1630
+ # You can get violation details for the following policy types:
1631
+ #
1632
+ # * DNS Firewall
1633
+ #
1634
+ # * Imported Network Firewall
1635
+ #
1636
+ # * Network Firewall
1637
+ #
1638
+ # * Security group content audit
1639
+ #
1640
+ # * Third-party firewall
1625
1641
  # @return [String]
1626
1642
  #
1627
1643
  # @!attribute [rw] member_account
@@ -2970,17 +2986,28 @@ module Aws::FMS
2970
2986
  # specify a resource type of `ResourceTypeList` and then specify the
2971
2987
  # resource types in a `ResourceTypeList`.
2972
2988
  #
2973
- # For WAF and Shield Advanced, resource types include
2974
- # `AWS::ElasticLoadBalancingV2::LoadBalancer`,
2975
- # `AWS::ElasticLoadBalancing::LoadBalancer`, `AWS::EC2::EIP`, and
2976
- # `AWS::CloudFront::Distribution`. For a security group common policy,
2977
- # valid values are `AWS::EC2::NetworkInterface` and
2978
- # `AWS::EC2::Instance`. For a security group content audit policy,
2979
- # valid values are `AWS::EC2::SecurityGroup`,
2980
- # `AWS::EC2::NetworkInterface`, and `AWS::EC2::Instance`. For a
2981
- # security group usage audit policy, the value is
2982
- # `AWS::EC2::SecurityGroup`. For an Network Firewall policy or DNS
2983
- # Firewall policy, the value is `AWS::EC2::VPC`.
2989
+ # The following are valid resource types for each Firewall Manager
2990
+ # policy type:
2991
+ #
2992
+ # * Amazon Web Services WAF Classic - `AWS::ApiGateway::Stage`,
2993
+ # `AWS::CloudFront::Distribution`, and
2994
+ # `AWS::ElasticLoadBalancingV2::LoadBalancer`.
2995
+ #
2996
+ # * WAF - `AWS::ApiGateway::Stage`,
2997
+ # `AWS::ElasticLoadBalancingV2::LoadBalancer`, and
2998
+ # `AWS::CloudFront::Distribution`.
2999
+ #
3000
+ # * DNS Firewall, Network Firewall, and third-party firewall -
3001
+ # `AWS::EC2::VPC`.
3002
+ #
3003
+ # * Shield Advanced - `AWS::ElasticLoadBalancingV2::LoadBalancer`,
3004
+ # `AWS::ElasticLoadBalancing::LoadBalancer`, `AWS::EC2::EIP`, and
3005
+ # `AWS::CloudFront::Distribution`.
3006
+ #
3007
+ # * Security group content audit - `AWS::EC2::SecurityGroup`,
3008
+ # `AWS::EC2::NetworkInterface`, and `AWS::EC2::Instance`.
3009
+ #
3010
+ # * Security group usage audit - `AWS::EC2::SecurityGroup`.
2984
3011
  #
2985
3012
  #
2986
3013
  #
@@ -4307,6 +4334,7 @@ module Aws::FMS
4307
4334
  # </note>
4308
4335
  #
4309
4336
  # * Example: `IMPORT_NETWORK_FIREWALL`
4337
+ #
4310
4338
  # `"\{"type":"IMPORT_NETWORK_FIREWALL","awsNetworkFirewallConfig":\{"networkFirewallStatelessRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-west-2:000000000000:stateless-rulegroup\/rg1","priority":1\}],"networkFirewallStatelessDefaultActions":["aws:drop"],"networkFirewallStatelessFragmentDefaultActions":["aws:pass"],"networkFirewallStatelessCustomActions":[],"networkFirewallStatefulRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-west-2:aws-managed:stateful-rulegroup\/ThreatSignaturesEmergingEventsStrictOrder","priority":8\}],"networkFirewallStatefulEngineOptions":\{"ruleOrder":"STRICT_ORDER"\},"networkFirewallStatefulDefaultActions":["aws:drop_strict"]\}\}"`
4311
4339
  #
4312
4340
  # `"\{"type":"DNS_FIREWALL","preProcessRuleGroups":[\{"ruleGroupId":"rslvr-frg-1","priority":10\}],"postProcessRuleGroups":[\{"ruleGroupId":"rslvr-frg-2","priority":9911\}]\}"`
@@ -4376,20 +4404,6 @@ module Aws::FMS
4376
4404
  # To use the distributed deployment model, you must set
4377
4405
  # [PolicyOption][1] to `NULL`.
4378
4406
  #
4379
- # * Example: `THIRD_PARTY_FIREWALL`
4380
- #
4381
- # `"\{ "type":"THIRD_PARTY_FIREWALL",
4382
- # "thirdPartyFirewall":"PALO_ALTO_NETWORKS_CLOUD_NGFW",
4383
- # "thirdPartyFirewallConfig":\{
4384
- # "thirdPartyFirewallPolicyList":["global-1"] \},
4385
- # "firewallDeploymentModel":\{
4386
- # "distributedFirewallDeploymentModel":\{
4387
- # "distributedFirewallOrchestrationConfig":\{
4388
- # "firewallCreationConfig":\{ "endpointLocation":\{
4389
- # "availabilityZoneConfigList":[ \{
4390
- # "availabilityZoneName":"$\{AvailabilityZone\}" \} ] \} \},
4391
- # "allowedIPV4CidrList":[ ] \} \} \} \}"`
4392
- #
4393
4407
  # * Example: `SECURITY_GROUPS_COMMON`
4394
4408
  #
4395
4409
  # `"\{"type":"SECURITY_GROUPS_COMMON","revertManualSecurityGroupChanges":false,"exclusiveResourceSecurityGroupManagement":false,
@@ -4436,13 +4450,40 @@ module Aws::FMS
4436
4450
  #
4437
4451
  # `"\{"type":"SECURITY_GROUPS_USAGE_AUDIT","deleteUnusedSecurityGroups":true,"coalesceRedundantSecurityGroups":true\}"`
4438
4452
  #
4453
+ # * Example: `SHIELD_ADVANCED` with web ACL management
4454
+ #
4455
+ # `"\{"type":"SHIELD_ADVANCED","optimizeUnassociatedWebACL":true\}"`
4456
+ #
4457
+ # If you set `optimizeUnassociatedWebACL` to `true`, Firewall
4458
+ # Manager creates web ACLs in accounts within the policy scope if
4459
+ # the web ACLs will be used by at least one resource. Firewall
4460
+ # Manager creates web ACLs in the accounts within policy scope only
4461
+ # if the web ACLs will be used by at least one resource. If at any
4462
+ # time an account comes into policy scope, Firewall Manager
4463
+ # automatically creates a web ACL in the account if at least one
4464
+ # resource will use the web ACL.
4465
+ #
4466
+ # Upon enablement, Firewall Manager performs a one-time cleanup of
4467
+ # unused web ACLs in your account. The cleanup process can take
4468
+ # several hours. If a resource leaves policy scope after Firewall
4469
+ # Manager creates a web ACL, Firewall Manager doesn't disassociate
4470
+ # the resource from the web ACL. If you want Firewall Manager to
4471
+ # clean up the web ACL, you must first manually disassociate the
4472
+ # resources from the web ACL, and then enable the manage unused web
4473
+ # ACLs option in your policy.
4474
+ #
4475
+ # If you set `optimizeUnassociatedWebACL` to `false`, and Firewall
4476
+ # Manager automatically creates an empty web ACL in each account
4477
+ # that's within policy scope.
4478
+ #
4439
4479
  # * Specification for `SHIELD_ADVANCED` for Amazon CloudFront
4440
4480
  # distributions
4441
4481
  #
4442
4482
  # `"\{"type":"SHIELD_ADVANCED","automaticResponseConfiguration":
4443
4483
  # \{"automaticResponseStatus":"ENABLED|IGNORED|DISABLED",
4444
4484
  # "automaticResponseAction":"BLOCK|COUNT"\},
4445
- # "overrideCustomerWebaclClassic":true|false\}"`
4485
+ # "overrideCustomerWebaclClassic":true|false,
4486
+ # "optimizeUnassociatedWebACL":true|false\}"`
4446
4487
  #
4447
4488
  # For example:
4448
4489
  # `"\{"type":"SHIELD_ADVANCED","automaticResponseConfiguration":
@@ -4458,21 +4499,62 @@ module Aws::FMS
4458
4499
  # Advanced policy, this `ManagedServiceData` configuration is an
4459
4500
  # empty string.
4460
4501
  #
4461
- # * Example: `WAFV2` - Account takeover prevention and Bot Control
4462
- # managed rule groups, and rule action override
4502
+ # * Example: `THIRD_PARTY_FIREWALL`
4463
4503
  #
4464
- # `"\{"type":"WAFV2","preProcessRuleGroups":[\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesATPRuleSet","managedRuleGroupConfigs":[\{"awsmanagedRulesATPRuleSet":\{"loginPath":"/loginpath","requestInspection":\{"payloadType":"FORM_ENCODED|JSON","usernameField":\{"identifier":"/form/username"\},"passwordField":\{"identifier":"/form/password"\}\}\}\}]\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true\},\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesBotControlRuleSet","managedRuleGroupConfigs":[\{"awsmanagedRulesBotControlRuleSet":\{"inspectionLevel":"TARGETED|COMMON"\}\}]\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true,"ruleActionOverrides":[\{"name":"Rule1","actionToUse":\{"allow|block|count|captcha|challenge":\{\}\}\},\{"name":"Rule2","actionToUse":\{"allow|block|count|captcha|challenge":\{\}\}\}]\}],"postProcessRuleGroups":[],"defaultAction":\{"type":"ALLOW"\},"customRequestHandling":null,"customResponse":null,"overrideCustomerWebACLAssociation":false,"loggingConfiguration":null,"sampledRequestsEnabledForDefaultActions":true\}"`
4504
+ # Replace `THIRD_PARTY_FIREWALL_NAME` with the name of the
4505
+ # third-party firewall.
4465
4506
  #
4466
- # * Fraud Control account takeover prevention (ATP) - For
4467
- # information about the properties available for
4468
- # `AWSManagedRulesATPRuleSet` managed rule groups, see
4469
- # [AWSManagedRulesATPRuleSet][2] in the *WAF API Reference*.
4507
+ # `"\{ "type":"THIRD_PARTY_FIREWALL",
4508
+ # "thirdPartyFirewall":"THIRD_PARTY_FIREWALL_NAME",
4509
+ # "thirdPartyFirewallConfig":\{
4510
+ # "thirdPartyFirewallPolicyList":["global-1"] \},
4511
+ # "firewallDeploymentModel":\{
4512
+ # "distributedFirewallDeploymentModel":\{
4513
+ # "distributedFirewallOrchestrationConfig":\{
4514
+ # "firewallCreationConfig":\{ "endpointLocation":\{
4515
+ # "availabilityZoneConfigList":[ \{
4516
+ # "availabilityZoneName":"$\{AvailabilityZone\}" \} ] \} \},
4517
+ # "allowedIPV4CidrList":[ ] \} \} \} \}"`
4518
+ #
4519
+ # * Example: `WAFV2` - Account takeover prevention, Bot Control
4520
+ # managed rule groups, optimize unassociated web ACL, and rule
4521
+ # action override
4522
+ #
4523
+ # `"\{"type":"WAFV2","preProcessRuleGroups":[\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesATPRuleSet","managedRuleGroupConfigs":[\{"awsmanagedRulesATPRuleSet":\{"loginPath":"/loginpath","requestInspection":\{"payloadType":"FORM_ENCODED|JSON","usernameField":\{"identifier":"/form/username"\},"passwordField":\{"identifier":"/form/password"\}\}\}\}]\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true\},\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesBotControlRuleSet","managedRuleGroupConfigs":[\{"awsmanagedRulesBotControlRuleSet":\{"inspectionLevel":"TARGETED|COMMON"\}\}]\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true,"ruleActionOverrides":[\{"name":"Rule1","actionToUse":\{"allow|block|count|captcha|challenge":\{\}\}\},\{"name":"Rule2","actionToUse":\{"allow|block|count|captcha|challenge":\{\}\}\}]\}],"postProcessRuleGroups":[],"defaultAction":\{"type":"ALLOW"\},"customRequestHandling":null,"customResponse":null,"overrideCustomerWebACLAssociation":false,"loggingConfiguration":null,"sampledRequestsEnabledForDefaultActions":true,"optimizeUnassociatedWebACL":true\}"`
4470
4524
  #
4471
4525
  # * Bot Control - For information about
4472
4526
  # `AWSManagedRulesBotControlRuleSet` managed rule groups, see
4473
- # [AWSManagedRulesBotControlRuleSet][3] in the *WAF API
4527
+ # [AWSManagedRulesBotControlRuleSet][2] in the *WAF API
4474
4528
  # Reference*.
4475
4529
  #
4530
+ # * Fraud Control account takeover prevention (ATP) - For
4531
+ # information about the properties available for
4532
+ # `AWSManagedRulesATPRuleSet` managed rule groups, see
4533
+ # [AWSManagedRulesATPRuleSet][3] in the *WAF API Reference*.
4534
+ #
4535
+ # * Optimize unassociated web ACL - If you set
4536
+ # `optimizeUnassociatedWebACL` to `true`, Firewall Manager creates
4537
+ # web ACLs in accounts within the policy scope if the web ACLs
4538
+ # will be used by at least one resource. Firewall Manager creates
4539
+ # web ACLs in the accounts within policy scope only if the web
4540
+ # ACLs will be used by at least one resource. If at any time an
4541
+ # account comes into policy scope, Firewall Manager automatically
4542
+ # creates a web ACL in the account if at least one resource will
4543
+ # use the web ACL.
4544
+ #
4545
+ # Upon enablement, Firewall Manager performs a one-time cleanup of
4546
+ # unused web ACLs in your account. The cleanup process can take
4547
+ # several hours. If a resource leaves policy scope after Firewall
4548
+ # Manager creates a web ACL, Firewall Manager disassociates the
4549
+ # resource from the web ACL, but won't clean up the unused web
4550
+ # ACL. Firewall Manager only cleans up unused web ACLs when you
4551
+ # first enable management of unused web ACLs in a policy.
4552
+ #
4553
+ # If you set `optimizeUnassociatedWebACL` to `false` Firewall
4554
+ # Manager doesn't manage unused web ACLs, and Firewall Manager
4555
+ # automatically creates an empty web ACL in each account that's
4556
+ # within policy scope.
4557
+ #
4476
4558
  # * Rule action overrides - Firewall Manager supports rule action
4477
4559
  # overrides only for managed rule groups. To configure a
4478
4560
  # `RuleActionOverrides` add the `Name` of the rule to override,
@@ -4482,16 +4564,25 @@ module Aws::FMS
4482
4564
  #
4483
4565
  # * Example: `WAFV2` - `CAPTCHA` and `Challenge` configs
4484
4566
  #
4485
- # `"\{"type":"WAFV2","preProcessRuleGroups":[\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesAdminProtectionRuleSet"\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true\}],"postProcessRuleGroups":[],"defaultAction":\{"type":"ALLOW"\},"customRequestHandling":null,"customResponse":null,"overrideCustomerWebACLAssociation":false,"loggingConfiguration":null,"sampledRequestsEnabledForDefaultActions":true,"captchaConfig":\{"immunityTimeProperty":\{"immunityTime":500\}\},"challengeConfig":\{"immunityTimeProperty":\{"immunityTime":800\}\},"tokenDomains":["google.com","amazon.com"]\}"`
4486
- #
4487
- # If you update the policy's values for `captchaConfig`,
4488
- # `challengeConfig`, or `tokenDomains`, Firewall Manager will
4489
- # overwrite your local web ACLs to contain the new value(s).
4490
- # However, if you don't update the policy's `captchaConfig`,
4491
- # `challengeConfig`, or `tokenDomains` values, the values in your
4492
- # local web ACLs will remain unchanged. For information about
4493
- # CAPTCHA and Challenge configs, see [CaptchaConfig][5] and
4494
- # [ChallengeConfig][6] in the *WAF API Reference*.
4567
+ # `"\{"type":"WAFV2","preProcessRuleGroups":[\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesAdminProtectionRuleSet"\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true\}],"postProcessRuleGroups":[],"defaultAction":\{"type":"ALLOW"\},"customRequestHandling":null,"customResponse":null,"overrideCustomerWebACLAssociation":false,"loggingConfiguration":null,"sampledRequestsEnabledForDefaultActions":true,"captchaConfig":\{"immunityTimeProperty":\{"immunityTime":500\}\},"challengeConfig":\{"immunityTimeProperty":\{"immunityTime":800\}\},"tokenDomains":["google.com","amazon.com"],"associationConfig":\{"requestBody":\{"CLOUDFRONT":\{"defaultSizeInspectionLimit":"KB_16"\}\}\}\}"`
4568
+ #
4569
+ # * `CAPTCHA` and `Challenge` configs - If you update the policy's
4570
+ # values for `associationConfig`, `captchaConfig`,
4571
+ # `challengeConfig`, or `tokenDomains`, Firewall Manager will
4572
+ # overwrite your local web ACLs to contain the new value(s).
4573
+ # However, if you don't update the policy's `associationConfig`,
4574
+ # `captchaConfig`, `challengeConfig`, or `tokenDomains` values,
4575
+ # the values in your local web ACLs will remain unchanged. For
4576
+ # information about association configs, see
4577
+ # [AssociationConfig][5]. For information about CAPTCHA and
4578
+ # Challenge configs, see [CaptchaConfig][6] and
4579
+ # [ChallengeConfig][7] in the *WAF API Reference*.
4580
+ #
4581
+ # * `defaultSizeInspectionLimit` - Specifies the maximum size of the
4582
+ # web request body component that an associated Amazon CloudFront
4583
+ # distribution should send to WAF for inspection. For more
4584
+ # information, see [DefaultSizeInspectionLimit][8] in the *WAF API
4585
+ # Reference*.
4495
4586
  #
4496
4587
  # * Example: `WAFV2` - Firewall Manager support for WAF managed rule
4497
4588
  # group versioning
@@ -4526,7 +4617,7 @@ module Aws::FMS
4526
4617
  # Firewall Manager supports Amazon Kinesis Data Firehose and Amazon
4527
4618
  # S3 as the `logDestinationConfigs` in your `loggingConfiguration`.
4528
4619
  # For information about WAF logging configurations, see
4529
- # [LoggingConfiguration][7] in the *WAF API Reference*
4620
+ # [LoggingConfiguration][9] in the *WAF API Reference*
4530
4621
  #
4531
4622
  # In the `loggingConfiguration`, you can specify one
4532
4623
  # `logDestinationConfigs`. Optionally provide as many as 20
@@ -4543,12 +4634,14 @@ module Aws::FMS
4543
4634
  #
4544
4635
  #
4545
4636
  # [1]: https://docs.aws.amazon.com/fms/2018-01-01/APIReference/API_PolicyOption.html
4546
- # [2]: https://docs.aws.amazon.com/waf/latest/APIReference/API_AWSManagedRulesATPRuleSet.html
4547
- # [3]: https://docs.aws.amazon.com/waf/latest/APIReference/API_AWSManagedRulesBotControlRuleSet.html
4637
+ # [2]: https://docs.aws.amazon.com/waf/latest/APIReference/API_AWSManagedRulesBotControlRuleSet.html
4638
+ # [3]: https://docs.aws.amazon.com/waf/latest/APIReference/API_AWSManagedRulesATPRuleSet.html
4548
4639
  # [4]: https://docs.aws.amazon.com/waf/latest/APIReference/API_RuleActionOverride.html
4549
- # [5]: https://docs.aws.amazon.com/waf/latest/APIReference/API_CaptchaConfig.html
4550
- # [6]: https://docs.aws.amazon.com/waf/latest/APIReference/API_ChallengeConfig.html
4551
- # [7]: https://docs.aws.amazon.com/waf/latest/APIReference/API_LoggingConfiguration.html
4640
+ # [5]: https://docs.aws.amazon.com/waf/latest/APIReference/API_AssociationConfig.html
4641
+ # [6]: https://docs.aws.amazon.com/waf/latest/APIReference/API_CaptchaConfig.html
4642
+ # [7]: https://docs.aws.amazon.com/waf/latest/APIReference/API_ChallengeConfig.html
4643
+ # [8]: https://docs.aws.amazon.com/waf/latest/APIReference/API_RequestBodyAssociatedResourceTypeConfig.html#WAF-Type-RequestBodyAssociatedResourceTypeConfig-DefaultSizeInspectionLimit
4644
+ # [9]: https://docs.aws.amazon.com/waf/latest/APIReference/API_LoggingConfiguration.html
4552
4645
  # @return [String]
4553
4646
  #
4554
4647
  # @!attribute [rw] policy_option
data/lib/aws-sdk-fms.rb CHANGED
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-fms/customizations'
52
52
  # @!group service
53
53
  module Aws::FMS
54
54
 
55
- GEM_VERSION = '1.63.0'
55
+ GEM_VERSION = '1.64.0'
56
56
 
57
57
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-fms
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.63.0
4
+ version: 1.64.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-09-27 00:00:00.000000000 Z
11
+ date: 2023-11-10 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core