aws-sdk-fms 1.63.0 → 1.64.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 006e450a2654c8f5a8465278b9d0eb85510a075721014be0ec508cc866fb8b94
4
- data.tar.gz: 903dfdd380be50746ea325a9e1e2e3a31682318634a61b9eefffe0b5cff7f55f
3
+ metadata.gz: 39eb8bae4d7a1f5972c29f806406cc909eeec6aeea13793da7efc6c497c7e1ef
4
+ data.tar.gz: 1e06cb0918b3e945992322cfd9802dfb449b77ecc723bad67cc13026ae2e8072
5
5
  SHA512:
6
- metadata.gz: 0cefe496421fb0c0c34c9b55022a45af2b051de1d0591eb1175efef7f4b4fb39a684028db6a0a4c5e6bc2eb97830f763822e7df69b89b2ec45cee6e7068fe39f
7
- data.tar.gz: 5fe6ea26ced86d299e005ed062b7c6efb8aeae92d3963ffa8350d34e68d0b387cc468d8c3439f58847f96261002b4148be6c929ec1ef5c1c13afc1f727f8729b
6
+ metadata.gz: eacb5200cb9f01938ec2e4bcad981b40071f54eeb1d259a35bf4ca92f93a7f2aa6ac32ddfd6777761f37888ad5be91dda24bd012a3429b2fc6e5e6a67706685a
7
+ data.tar.gz: c4a1fdb5b78b74c4366ceb304e2f0d13a6af3d92321efff3a73b7dfd8bb0a515a784a88a65db8fba43d719670690e517ad8f096e229e638c0b857afe44f5b41e
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.64.0 (2023-11-10)
5
+ ------------------
6
+
7
+ * Feature - Adds optimizeUnassociatedWebACL flag to ManagedServiceData, updates third-party firewall examples, and other minor documentation updates.
8
+
4
9
  1.63.0 (2023-09-27)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.63.0
1
+ 1.64.0
@@ -616,6 +616,12 @@ module Aws::FMS
616
616
  # Manager and if it's no longer associated with any resources through
617
617
  # another policy
618
618
  #
619
+ # <note markdown="1"> For security group common policies, even if set to `False`, Firewall
620
+ # Manager deletes all security groups created by Firewall Manager that
621
+ # aren't associated with any other resources through another policy.
622
+ #
623
+ # </note>
624
+ #
619
625
  # After the cleanup, in-scope resources are no longer protected by web
620
626
  # ACLs in this policy. Protection of out-of-scope resources remains
621
627
  # unchanged. Scope is determined by tags that you create and accounts
@@ -1194,7 +1200,17 @@ module Aws::FMS
1194
1200
  #
1195
1201
  # @option params [required, String] :policy_id
1196
1202
  # The ID of the Firewall Manager policy that you want the details for.
1197
- # This currently only supports security group content audit policies.
1203
+ # You can get violation details for the following policy types:
1204
+ #
1205
+ # * DNS Firewall
1206
+ #
1207
+ # * Imported Network Firewall
1208
+ #
1209
+ # * Network Firewall
1210
+ #
1211
+ # * Security group content audit
1212
+ #
1213
+ # * Third-party firewall
1198
1214
  #
1199
1215
  # @option params [required, String] :member_account
1200
1216
  # The Amazon Web Services account ID that you want the details for.
@@ -2366,37 +2382,51 @@ module Aws::FMS
2366
2382
 
2367
2383
  # Creates an Firewall Manager policy.
2368
2384
  #
2369
- # Firewall Manager provides the following types of policies:
2385
+ # A Firewall Manager policy is specific to the individual policy type.
2386
+ # If you want to enforce multiple policy types across accounts, you can
2387
+ # create multiple policies. You can create more than one policy for each
2388
+ # type.
2370
2389
  #
2371
- # * An WAF policy (type WAFV2), which defines rule groups to run first
2372
- # in the corresponding WAF web ACL and rule groups to run last in the
2373
- # web ACL.
2390
+ # If you add a new account to an organization that you created with
2391
+ # Organizations, Firewall Manager automatically applies the policy to
2392
+ # the resources in that account that are within scope of the policy.
2393
+ #
2394
+ # Firewall Manager provides the following types of policies:
2374
2395
  #
2375
- # * An WAF Classic policy (type WAF), which defines a rule group.
2396
+ # * **Shield Advanced policy** - This policy applies Shield Advanced
2397
+ # protection to specified accounts and resources.
2376
2398
  #
2377
- # * A Shield Advanced policy, which applies Shield Advanced protection
2378
- # to specified accounts and resources.
2399
+ # * **Security Groups policy** - This type of policy gives you control
2400
+ # over security groups that are in use throughout your organization in
2401
+ # Organizations and lets you enforce a baseline set of rules across
2402
+ # your organization.
2379
2403
  #
2380
- # * A security group policy, which manages VPC security groups across
2381
- # your Amazon Web Services organization.
2404
+ # * **Network Firewall policy** - This policy applies Network Firewall
2405
+ # protection to your organization's VPCs.
2382
2406
  #
2383
- # * An Network Firewall policy, which provides firewall rules to filter
2384
- # network traffic in specified Amazon VPCs.
2407
+ # * **DNS Firewall policy** - This policy applies Amazon Route 53
2408
+ # Resolver DNS Firewall protections to your organization's VPCs.
2385
2409
  #
2386
- # * A DNS Firewall policy, which provides Route 53 Resolver DNS Firewall
2387
- # rules to filter DNS queries for specified VPCs.
2410
+ # * **Third-party firewall policy** - This policy applies third-party
2411
+ # firewall protections. Third-party firewalls are available by
2412
+ # subscription through the Amazon Web Services Marketplace console at
2413
+ # [Amazon Web Services Marketplace][1].
2388
2414
  #
2389
- # Each policy is specific to one of the types. If you want to enforce
2390
- # more than one policy type across accounts, create multiple policies.
2391
- # You can create multiple policies for each type.
2415
+ # * **Palo Alto Networks Cloud NGFW policy** - This policy applies
2416
+ # Palo Alto Networks Cloud Next Generation Firewall (NGFW)
2417
+ # protections and Palo Alto Networks Cloud NGFW rulestacks to your
2418
+ # organization's VPCs.
2392
2419
  #
2393
- # You must be subscribed to Shield Advanced to create a Shield Advanced
2394
- # policy. For more information about subscribing to Shield Advanced, see
2395
- # [CreateSubscription][1].
2420
+ # * **Fortigate CNF policy** - This policy applies Fortigate Cloud
2421
+ # Native Firewall (CNF) protections. Fortigate CNF is a
2422
+ # cloud-centered solution that blocks Zero-Day threats and secures
2423
+ # cloud infrastructures with industry-leading advanced threat
2424
+ # prevention, smart web application firewalls (WAF), and API
2425
+ # protection.
2396
2426
  #
2397
2427
  #
2398
2428
  #
2399
- # [1]: https://docs.aws.amazon.com/waf/latest/DDOSAPIReference/API_CreateSubscription.html
2429
+ # [1]: https://aws.amazon.com/marketplace
2400
2430
  #
2401
2431
  # @option params [required, Types::Policy] :policy
2402
2432
  # The details of the Firewall Manager policy to be created.
@@ -2690,7 +2720,7 @@ module Aws::FMS
2690
2720
  params: params,
2691
2721
  config: config)
2692
2722
  context[:gem_name] = 'aws-sdk-fms'
2693
- context[:gem_version] = '1.63.0'
2723
+ context[:gem_version] = '1.64.0'
2694
2724
  Seahorse::Client::Request.new(handlers, context)
2695
2725
  end
2696
2726
 
@@ -32,7 +32,7 @@ module Aws::FMS
32
32
  raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
33
33
  end
34
34
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
35
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
35
+ if Aws::Endpoints::Matchers.boolean_equals?(Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"), true)
36
36
  return Aws::Endpoints::Endpoint.new(url: "https://fms-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
37
37
  end
38
38
  raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
@@ -575,6 +575,12 @@ module Aws::FMS
575
575
  # Manager and if it's no longer associated with any resources
576
576
  # through another policy
577
577
  #
578
+ # <note markdown="1"> For security group common policies, even if set to `False`, Firewall
579
+ # Manager deletes all security groups created by Firewall Manager that
580
+ # aren't associated with any other resources through another policy.
581
+ #
582
+ # </note>
583
+ #
578
584
  # After the cleanup, in-scope resources are no longer protected by web
579
585
  # ACLs in this policy. Protection of out-of-scope resources remains
580
586
  # unchanged. Scope is determined by tags that you create and accounts
@@ -1621,7 +1627,17 @@ module Aws::FMS
1621
1627
 
1622
1628
  # @!attribute [rw] policy_id
1623
1629
  # The ID of the Firewall Manager policy that you want the details for.
1624
- # This currently only supports security group content audit policies.
1630
+ # You can get violation details for the following policy types:
1631
+ #
1632
+ # * DNS Firewall
1633
+ #
1634
+ # * Imported Network Firewall
1635
+ #
1636
+ # * Network Firewall
1637
+ #
1638
+ # * Security group content audit
1639
+ #
1640
+ # * Third-party firewall
1625
1641
  # @return [String]
1626
1642
  #
1627
1643
  # @!attribute [rw] member_account
@@ -2970,17 +2986,28 @@ module Aws::FMS
2970
2986
  # specify a resource type of `ResourceTypeList` and then specify the
2971
2987
  # resource types in a `ResourceTypeList`.
2972
2988
  #
2973
- # For WAF and Shield Advanced, resource types include
2974
- # `AWS::ElasticLoadBalancingV2::LoadBalancer`,
2975
- # `AWS::ElasticLoadBalancing::LoadBalancer`, `AWS::EC2::EIP`, and
2976
- # `AWS::CloudFront::Distribution`. For a security group common policy,
2977
- # valid values are `AWS::EC2::NetworkInterface` and
2978
- # `AWS::EC2::Instance`. For a security group content audit policy,
2979
- # valid values are `AWS::EC2::SecurityGroup`,
2980
- # `AWS::EC2::NetworkInterface`, and `AWS::EC2::Instance`. For a
2981
- # security group usage audit policy, the value is
2982
- # `AWS::EC2::SecurityGroup`. For an Network Firewall policy or DNS
2983
- # Firewall policy, the value is `AWS::EC2::VPC`.
2989
+ # The following are valid resource types for each Firewall Manager
2990
+ # policy type:
2991
+ #
2992
+ # * Amazon Web Services WAF Classic - `AWS::ApiGateway::Stage`,
2993
+ # `AWS::CloudFront::Distribution`, and
2994
+ # `AWS::ElasticLoadBalancingV2::LoadBalancer`.
2995
+ #
2996
+ # * WAF - `AWS::ApiGateway::Stage`,
2997
+ # `AWS::ElasticLoadBalancingV2::LoadBalancer`, and
2998
+ # `AWS::CloudFront::Distribution`.
2999
+ #
3000
+ # * DNS Firewall, Network Firewall, and third-party firewall -
3001
+ # `AWS::EC2::VPC`.
3002
+ #
3003
+ # * Shield Advanced - `AWS::ElasticLoadBalancingV2::LoadBalancer`,
3004
+ # `AWS::ElasticLoadBalancing::LoadBalancer`, `AWS::EC2::EIP`, and
3005
+ # `AWS::CloudFront::Distribution`.
3006
+ #
3007
+ # * Security group content audit - `AWS::EC2::SecurityGroup`,
3008
+ # `AWS::EC2::NetworkInterface`, and `AWS::EC2::Instance`.
3009
+ #
3010
+ # * Security group usage audit - `AWS::EC2::SecurityGroup`.
2984
3011
  #
2985
3012
  #
2986
3013
  #
@@ -4307,6 +4334,7 @@ module Aws::FMS
4307
4334
  # </note>
4308
4335
  #
4309
4336
  # * Example: `IMPORT_NETWORK_FIREWALL`
4337
+ #
4310
4338
  # `"\{"type":"IMPORT_NETWORK_FIREWALL","awsNetworkFirewallConfig":\{"networkFirewallStatelessRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-west-2:000000000000:stateless-rulegroup\/rg1","priority":1\}],"networkFirewallStatelessDefaultActions":["aws:drop"],"networkFirewallStatelessFragmentDefaultActions":["aws:pass"],"networkFirewallStatelessCustomActions":[],"networkFirewallStatefulRuleGroupReferences":[\{"resourceARN":"arn:aws:network-firewall:us-west-2:aws-managed:stateful-rulegroup\/ThreatSignaturesEmergingEventsStrictOrder","priority":8\}],"networkFirewallStatefulEngineOptions":\{"ruleOrder":"STRICT_ORDER"\},"networkFirewallStatefulDefaultActions":["aws:drop_strict"]\}\}"`
4311
4339
  #
4312
4340
  # `"\{"type":"DNS_FIREWALL","preProcessRuleGroups":[\{"ruleGroupId":"rslvr-frg-1","priority":10\}],"postProcessRuleGroups":[\{"ruleGroupId":"rslvr-frg-2","priority":9911\}]\}"`
@@ -4376,20 +4404,6 @@ module Aws::FMS
4376
4404
  # To use the distributed deployment model, you must set
4377
4405
  # [PolicyOption][1] to `NULL`.
4378
4406
  #
4379
- # * Example: `THIRD_PARTY_FIREWALL`
4380
- #
4381
- # `"\{ "type":"THIRD_PARTY_FIREWALL",
4382
- # "thirdPartyFirewall":"PALO_ALTO_NETWORKS_CLOUD_NGFW",
4383
- # "thirdPartyFirewallConfig":\{
4384
- # "thirdPartyFirewallPolicyList":["global-1"] \},
4385
- # "firewallDeploymentModel":\{
4386
- # "distributedFirewallDeploymentModel":\{
4387
- # "distributedFirewallOrchestrationConfig":\{
4388
- # "firewallCreationConfig":\{ "endpointLocation":\{
4389
- # "availabilityZoneConfigList":[ \{
4390
- # "availabilityZoneName":"$\{AvailabilityZone\}" \} ] \} \},
4391
- # "allowedIPV4CidrList":[ ] \} \} \} \}"`
4392
- #
4393
4407
  # * Example: `SECURITY_GROUPS_COMMON`
4394
4408
  #
4395
4409
  # `"\{"type":"SECURITY_GROUPS_COMMON","revertManualSecurityGroupChanges":false,"exclusiveResourceSecurityGroupManagement":false,
@@ -4436,13 +4450,40 @@ module Aws::FMS
4436
4450
  #
4437
4451
  # `"\{"type":"SECURITY_GROUPS_USAGE_AUDIT","deleteUnusedSecurityGroups":true,"coalesceRedundantSecurityGroups":true\}"`
4438
4452
  #
4453
+ # * Example: `SHIELD_ADVANCED` with web ACL management
4454
+ #
4455
+ # `"\{"type":"SHIELD_ADVANCED","optimizeUnassociatedWebACL":true\}"`
4456
+ #
4457
+ # If you set `optimizeUnassociatedWebACL` to `true`, Firewall
4458
+ # Manager creates web ACLs in accounts within the policy scope if
4459
+ # the web ACLs will be used by at least one resource. Firewall
4460
+ # Manager creates web ACLs in the accounts within policy scope only
4461
+ # if the web ACLs will be used by at least one resource. If at any
4462
+ # time an account comes into policy scope, Firewall Manager
4463
+ # automatically creates a web ACL in the account if at least one
4464
+ # resource will use the web ACL.
4465
+ #
4466
+ # Upon enablement, Firewall Manager performs a one-time cleanup of
4467
+ # unused web ACLs in your account. The cleanup process can take
4468
+ # several hours. If a resource leaves policy scope after Firewall
4469
+ # Manager creates a web ACL, Firewall Manager doesn't disassociate
4470
+ # the resource from the web ACL. If you want Firewall Manager to
4471
+ # clean up the web ACL, you must first manually disassociate the
4472
+ # resources from the web ACL, and then enable the manage unused web
4473
+ # ACLs option in your policy.
4474
+ #
4475
+ # If you set `optimizeUnassociatedWebACL` to `false`, and Firewall
4476
+ # Manager automatically creates an empty web ACL in each account
4477
+ # that's within policy scope.
4478
+ #
4439
4479
  # * Specification for `SHIELD_ADVANCED` for Amazon CloudFront
4440
4480
  # distributions
4441
4481
  #
4442
4482
  # `"\{"type":"SHIELD_ADVANCED","automaticResponseConfiguration":
4443
4483
  # \{"automaticResponseStatus":"ENABLED|IGNORED|DISABLED",
4444
4484
  # "automaticResponseAction":"BLOCK|COUNT"\},
4445
- # "overrideCustomerWebaclClassic":true|false\}"`
4485
+ # "overrideCustomerWebaclClassic":true|false,
4486
+ # "optimizeUnassociatedWebACL":true|false\}"`
4446
4487
  #
4447
4488
  # For example:
4448
4489
  # `"\{"type":"SHIELD_ADVANCED","automaticResponseConfiguration":
@@ -4458,21 +4499,62 @@ module Aws::FMS
4458
4499
  # Advanced policy, this `ManagedServiceData` configuration is an
4459
4500
  # empty string.
4460
4501
  #
4461
- # * Example: `WAFV2` - Account takeover prevention and Bot Control
4462
- # managed rule groups, and rule action override
4502
+ # * Example: `THIRD_PARTY_FIREWALL`
4463
4503
  #
4464
- # `"\{"type":"WAFV2","preProcessRuleGroups":[\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesATPRuleSet","managedRuleGroupConfigs":[\{"awsmanagedRulesATPRuleSet":\{"loginPath":"/loginpath","requestInspection":\{"payloadType":"FORM_ENCODED|JSON","usernameField":\{"identifier":"/form/username"\},"passwordField":\{"identifier":"/form/password"\}\}\}\}]\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true\},\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesBotControlRuleSet","managedRuleGroupConfigs":[\{"awsmanagedRulesBotControlRuleSet":\{"inspectionLevel":"TARGETED|COMMON"\}\}]\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true,"ruleActionOverrides":[\{"name":"Rule1","actionToUse":\{"allow|block|count|captcha|challenge":\{\}\}\},\{"name":"Rule2","actionToUse":\{"allow|block|count|captcha|challenge":\{\}\}\}]\}],"postProcessRuleGroups":[],"defaultAction":\{"type":"ALLOW"\},"customRequestHandling":null,"customResponse":null,"overrideCustomerWebACLAssociation":false,"loggingConfiguration":null,"sampledRequestsEnabledForDefaultActions":true\}"`
4504
+ # Replace `THIRD_PARTY_FIREWALL_NAME` with the name of the
4505
+ # third-party firewall.
4465
4506
  #
4466
- # * Fraud Control account takeover prevention (ATP) - For
4467
- # information about the properties available for
4468
- # `AWSManagedRulesATPRuleSet` managed rule groups, see
4469
- # [AWSManagedRulesATPRuleSet][2] in the *WAF API Reference*.
4507
+ # `"\{ "type":"THIRD_PARTY_FIREWALL",
4508
+ # "thirdPartyFirewall":"THIRD_PARTY_FIREWALL_NAME",
4509
+ # "thirdPartyFirewallConfig":\{
4510
+ # "thirdPartyFirewallPolicyList":["global-1"] \},
4511
+ # "firewallDeploymentModel":\{
4512
+ # "distributedFirewallDeploymentModel":\{
4513
+ # "distributedFirewallOrchestrationConfig":\{
4514
+ # "firewallCreationConfig":\{ "endpointLocation":\{
4515
+ # "availabilityZoneConfigList":[ \{
4516
+ # "availabilityZoneName":"$\{AvailabilityZone\}" \} ] \} \},
4517
+ # "allowedIPV4CidrList":[ ] \} \} \} \}"`
4518
+ #
4519
+ # * Example: `WAFV2` - Account takeover prevention, Bot Control
4520
+ # managed rule groups, optimize unassociated web ACL, and rule
4521
+ # action override
4522
+ #
4523
+ # `"\{"type":"WAFV2","preProcessRuleGroups":[\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesATPRuleSet","managedRuleGroupConfigs":[\{"awsmanagedRulesATPRuleSet":\{"loginPath":"/loginpath","requestInspection":\{"payloadType":"FORM_ENCODED|JSON","usernameField":\{"identifier":"/form/username"\},"passwordField":\{"identifier":"/form/password"\}\}\}\}]\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true\},\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesBotControlRuleSet","managedRuleGroupConfigs":[\{"awsmanagedRulesBotControlRuleSet":\{"inspectionLevel":"TARGETED|COMMON"\}\}]\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true,"ruleActionOverrides":[\{"name":"Rule1","actionToUse":\{"allow|block|count|captcha|challenge":\{\}\}\},\{"name":"Rule2","actionToUse":\{"allow|block|count|captcha|challenge":\{\}\}\}]\}],"postProcessRuleGroups":[],"defaultAction":\{"type":"ALLOW"\},"customRequestHandling":null,"customResponse":null,"overrideCustomerWebACLAssociation":false,"loggingConfiguration":null,"sampledRequestsEnabledForDefaultActions":true,"optimizeUnassociatedWebACL":true\}"`
4470
4524
  #
4471
4525
  # * Bot Control - For information about
4472
4526
  # `AWSManagedRulesBotControlRuleSet` managed rule groups, see
4473
- # [AWSManagedRulesBotControlRuleSet][3] in the *WAF API
4527
+ # [AWSManagedRulesBotControlRuleSet][2] in the *WAF API
4474
4528
  # Reference*.
4475
4529
  #
4530
+ # * Fraud Control account takeover prevention (ATP) - For
4531
+ # information about the properties available for
4532
+ # `AWSManagedRulesATPRuleSet` managed rule groups, see
4533
+ # [AWSManagedRulesATPRuleSet][3] in the *WAF API Reference*.
4534
+ #
4535
+ # * Optimize unassociated web ACL - If you set
4536
+ # `optimizeUnassociatedWebACL` to `true`, Firewall Manager creates
4537
+ # web ACLs in accounts within the policy scope if the web ACLs
4538
+ # will be used by at least one resource. Firewall Manager creates
4539
+ # web ACLs in the accounts within policy scope only if the web
4540
+ # ACLs will be used by at least one resource. If at any time an
4541
+ # account comes into policy scope, Firewall Manager automatically
4542
+ # creates a web ACL in the account if at least one resource will
4543
+ # use the web ACL.
4544
+ #
4545
+ # Upon enablement, Firewall Manager performs a one-time cleanup of
4546
+ # unused web ACLs in your account. The cleanup process can take
4547
+ # several hours. If a resource leaves policy scope after Firewall
4548
+ # Manager creates a web ACL, Firewall Manager disassociates the
4549
+ # resource from the web ACL, but won't clean up the unused web
4550
+ # ACL. Firewall Manager only cleans up unused web ACLs when you
4551
+ # first enable management of unused web ACLs in a policy.
4552
+ #
4553
+ # If you set `optimizeUnassociatedWebACL` to `false` Firewall
4554
+ # Manager doesn't manage unused web ACLs, and Firewall Manager
4555
+ # automatically creates an empty web ACL in each account that's
4556
+ # within policy scope.
4557
+ #
4476
4558
  # * Rule action overrides - Firewall Manager supports rule action
4477
4559
  # overrides only for managed rule groups. To configure a
4478
4560
  # `RuleActionOverrides` add the `Name` of the rule to override,
@@ -4482,16 +4564,25 @@ module Aws::FMS
4482
4564
  #
4483
4565
  # * Example: `WAFV2` - `CAPTCHA` and `Challenge` configs
4484
4566
  #
4485
- # `"\{"type":"WAFV2","preProcessRuleGroups":[\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesAdminProtectionRuleSet"\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true\}],"postProcessRuleGroups":[],"defaultAction":\{"type":"ALLOW"\},"customRequestHandling":null,"customResponse":null,"overrideCustomerWebACLAssociation":false,"loggingConfiguration":null,"sampledRequestsEnabledForDefaultActions":true,"captchaConfig":\{"immunityTimeProperty":\{"immunityTime":500\}\},"challengeConfig":\{"immunityTimeProperty":\{"immunityTime":800\}\},"tokenDomains":["google.com","amazon.com"]\}"`
4486
- #
4487
- # If you update the policy's values for `captchaConfig`,
4488
- # `challengeConfig`, or `tokenDomains`, Firewall Manager will
4489
- # overwrite your local web ACLs to contain the new value(s).
4490
- # However, if you don't update the policy's `captchaConfig`,
4491
- # `challengeConfig`, or `tokenDomains` values, the values in your
4492
- # local web ACLs will remain unchanged. For information about
4493
- # CAPTCHA and Challenge configs, see [CaptchaConfig][5] and
4494
- # [ChallengeConfig][6] in the *WAF API Reference*.
4567
+ # `"\{"type":"WAFV2","preProcessRuleGroups":[\{"ruleGroupArn":null,"overrideAction":\{"type":"NONE"\},"managedRuleGroupIdentifier":\{"versionEnabled":null,"version":null,"vendorName":"AWS","managedRuleGroupName":"AWSManagedRulesAdminProtectionRuleSet"\},"ruleGroupType":"ManagedRuleGroup","excludeRules":[],"sampledRequestsEnabled":true\}],"postProcessRuleGroups":[],"defaultAction":\{"type":"ALLOW"\},"customRequestHandling":null,"customResponse":null,"overrideCustomerWebACLAssociation":false,"loggingConfiguration":null,"sampledRequestsEnabledForDefaultActions":true,"captchaConfig":\{"immunityTimeProperty":\{"immunityTime":500\}\},"challengeConfig":\{"immunityTimeProperty":\{"immunityTime":800\}\},"tokenDomains":["google.com","amazon.com"],"associationConfig":\{"requestBody":\{"CLOUDFRONT":\{"defaultSizeInspectionLimit":"KB_16"\}\}\}\}"`
4568
+ #
4569
+ # * `CAPTCHA` and `Challenge` configs - If you update the policy's
4570
+ # values for `associationConfig`, `captchaConfig`,
4571
+ # `challengeConfig`, or `tokenDomains`, Firewall Manager will
4572
+ # overwrite your local web ACLs to contain the new value(s).
4573
+ # However, if you don't update the policy's `associationConfig`,
4574
+ # `captchaConfig`, `challengeConfig`, or `tokenDomains` values,
4575
+ # the values in your local web ACLs will remain unchanged. For
4576
+ # information about association configs, see
4577
+ # [AssociationConfig][5]. For information about CAPTCHA and
4578
+ # Challenge configs, see [CaptchaConfig][6] and
4579
+ # [ChallengeConfig][7] in the *WAF API Reference*.
4580
+ #
4581
+ # * `defaultSizeInspectionLimit` - Specifies the maximum size of the
4582
+ # web request body component that an associated Amazon CloudFront
4583
+ # distribution should send to WAF for inspection. For more
4584
+ # information, see [DefaultSizeInspectionLimit][8] in the *WAF API
4585
+ # Reference*.
4495
4586
  #
4496
4587
  # * Example: `WAFV2` - Firewall Manager support for WAF managed rule
4497
4588
  # group versioning
@@ -4526,7 +4617,7 @@ module Aws::FMS
4526
4617
  # Firewall Manager supports Amazon Kinesis Data Firehose and Amazon
4527
4618
  # S3 as the `logDestinationConfigs` in your `loggingConfiguration`.
4528
4619
  # For information about WAF logging configurations, see
4529
- # [LoggingConfiguration][7] in the *WAF API Reference*
4620
+ # [LoggingConfiguration][9] in the *WAF API Reference*
4530
4621
  #
4531
4622
  # In the `loggingConfiguration`, you can specify one
4532
4623
  # `logDestinationConfigs`. Optionally provide as many as 20
@@ -4543,12 +4634,14 @@ module Aws::FMS
4543
4634
  #
4544
4635
  #
4545
4636
  # [1]: https://docs.aws.amazon.com/fms/2018-01-01/APIReference/API_PolicyOption.html
4546
- # [2]: https://docs.aws.amazon.com/waf/latest/APIReference/API_AWSManagedRulesATPRuleSet.html
4547
- # [3]: https://docs.aws.amazon.com/waf/latest/APIReference/API_AWSManagedRulesBotControlRuleSet.html
4637
+ # [2]: https://docs.aws.amazon.com/waf/latest/APIReference/API_AWSManagedRulesBotControlRuleSet.html
4638
+ # [3]: https://docs.aws.amazon.com/waf/latest/APIReference/API_AWSManagedRulesATPRuleSet.html
4548
4639
  # [4]: https://docs.aws.amazon.com/waf/latest/APIReference/API_RuleActionOverride.html
4549
- # [5]: https://docs.aws.amazon.com/waf/latest/APIReference/API_CaptchaConfig.html
4550
- # [6]: https://docs.aws.amazon.com/waf/latest/APIReference/API_ChallengeConfig.html
4551
- # [7]: https://docs.aws.amazon.com/waf/latest/APIReference/API_LoggingConfiguration.html
4640
+ # [5]: https://docs.aws.amazon.com/waf/latest/APIReference/API_AssociationConfig.html
4641
+ # [6]: https://docs.aws.amazon.com/waf/latest/APIReference/API_CaptchaConfig.html
4642
+ # [7]: https://docs.aws.amazon.com/waf/latest/APIReference/API_ChallengeConfig.html
4643
+ # [8]: https://docs.aws.amazon.com/waf/latest/APIReference/API_RequestBodyAssociatedResourceTypeConfig.html#WAF-Type-RequestBodyAssociatedResourceTypeConfig-DefaultSizeInspectionLimit
4644
+ # [9]: https://docs.aws.amazon.com/waf/latest/APIReference/API_LoggingConfiguration.html
4552
4645
  # @return [String]
4553
4646
  #
4554
4647
  # @!attribute [rw] policy_option
data/lib/aws-sdk-fms.rb CHANGED
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-fms/customizations'
52
52
  # @!group service
53
53
  module Aws::FMS
54
54
 
55
- GEM_VERSION = '1.63.0'
55
+ GEM_VERSION = '1.64.0'
56
56
 
57
57
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-fms
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.63.0
4
+ version: 1.64.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-09-27 00:00:00.000000000 Z
11
+ date: 2023-11-10 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core