aws-sdk-guardduty 1.149.0 → 1.150.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-guardduty/client.rb +7 -8
- data/lib/aws-sdk-guardduty.rb +1 -1
- data/sig/client.rbs +20 -168
- data/sig/params.rbs +73 -0
- data/sig/types.rbs +1 -1
- metadata +2 -1
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 870f235f6604863ea3cbc6f99ebb8a9468d529940d424c72277b329f95d0df9f
|
|
4
|
+
data.tar.gz: dff9ea616a7c356736a144432e141d9b441c2f3b0148b5b21c47c816e179980d
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: f2c3af14aab64f95007c0142ef412f8ebfd9e805aaf78eaabbee3711dc717c1429d35896bbe2af27de63d4b25815aad83f9e1acddac890169ffccdafe62f3424
|
|
7
|
+
data.tar.gz: 6f5436762419b277cf105edb9372eebba7d0d8c32690c8f07fc6edb3a5d8966d81c093a37000104f0375968ec061ab29acfc90e5a18107454e7d97bf139cc2a6
|
data/CHANGELOG.md
CHANGED
|
@@ -1,6 +1,11 @@
|
|
|
1
1
|
Unreleased Changes
|
|
2
2
|
------------------
|
|
3
3
|
|
|
4
|
+
1.150.0 (2026-05-19)
|
|
5
|
+
------------------
|
|
6
|
+
|
|
7
|
+
* Feature - Adding support for exposure and vulnerability context from AWS Security Hub in GuardDuty Extended Threat Detection attack sequence findings.
|
|
8
|
+
|
|
4
9
|
1.149.0 (2026-05-13)
|
|
5
10
|
------------------
|
|
6
11
|
|
data/VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
1.
|
|
1
|
+
1.150.0
|
|
@@ -2476,11 +2476,10 @@ module Aws::GuardDuty
|
|
|
2476
2476
|
end
|
|
2477
2477
|
|
|
2478
2478
|
# Creates a new threat entity set. In a threat entity set, you can
|
|
2479
|
-
# provide known malicious
|
|
2480
|
-
#
|
|
2481
|
-
#
|
|
2482
|
-
#
|
|
2483
|
-
# accounts.
|
|
2479
|
+
# provide known malicious threat entities for your Amazon Web Services
|
|
2480
|
+
# environment. GuardDuty generates findings based on the entries in the
|
|
2481
|
+
# threat entity sets. Only users of the administrator account can manage
|
|
2482
|
+
# entity sets, which automatically apply to member accounts.
|
|
2484
2483
|
#
|
|
2485
2484
|
# @option params [required, String] :detector_id
|
|
2486
2485
|
# The unique ID of the detector of the GuardDuty account for which you
|
|
@@ -4457,12 +4456,12 @@ module Aws::GuardDuty
|
|
|
4457
4456
|
# resp.findings[0].service.detection.sequence.signals[0].endpoint_ids #=> Array
|
|
4458
4457
|
# resp.findings[0].service.detection.sequence.signals[0].endpoint_ids[0] #=> String
|
|
4459
4458
|
# resp.findings[0].service.detection.sequence.signals[0].signal_indicators #=> Array
|
|
4460
|
-
# resp.findings[0].service.detection.sequence.signals[0].signal_indicators[0].key #=> String, one of "SUSPICIOUS_USER_AGENT", "SUSPICIOUS_NETWORK", "MALICIOUS_IP", "TOR_IP", "ATTACK_TACTIC", "HIGH_RISK_API", "ATTACK_TECHNIQUE", "UNUSUAL_API_FOR_ACCOUNT", "UNUSUAL_ASN_FOR_ACCOUNT", "UNUSUAL_ASN_FOR_USER", "SUSPICIOUS_PROCESS", "MALICIOUS_DOMAIN", "MALICIOUS_PROCESS", "CRYPTOMINING_IP", "CRYPTOMINING_DOMAIN", "CRYPTOMINING_PROCESS", "MALICIOUS_FILE"
|
|
4459
|
+
# resp.findings[0].service.detection.sequence.signals[0].signal_indicators[0].key #=> String, one of "SUSPICIOUS_USER_AGENT", "SUSPICIOUS_NETWORK", "MALICIOUS_IP", "TOR_IP", "ATTACK_TACTIC", "HIGH_RISK_API", "ATTACK_TECHNIQUE", "UNUSUAL_API_FOR_ACCOUNT", "UNUSUAL_ASN_FOR_ACCOUNT", "UNUSUAL_ASN_FOR_USER", "SUSPICIOUS_PROCESS", "MALICIOUS_DOMAIN", "MALICIOUS_PROCESS", "CRYPTOMINING_IP", "CRYPTOMINING_DOMAIN", "CRYPTOMINING_PROCESS", "MALICIOUS_FILE", "VULNERABILITY", "MALICIOUS_PACKAGE", "MISCONFIGURATION", "REACHABILITY", "SENSITIVE_DATA"
|
|
4461
4460
|
# resp.findings[0].service.detection.sequence.signals[0].signal_indicators[0].values #=> Array
|
|
4462
4461
|
# resp.findings[0].service.detection.sequence.signals[0].signal_indicators[0].values[0] #=> String
|
|
4463
4462
|
# resp.findings[0].service.detection.sequence.signals[0].signal_indicators[0].title #=> String
|
|
4464
4463
|
# resp.findings[0].service.detection.sequence.sequence_indicators #=> Array
|
|
4465
|
-
# resp.findings[0].service.detection.sequence.sequence_indicators[0].key #=> String, one of "SUSPICIOUS_USER_AGENT", "SUSPICIOUS_NETWORK", "MALICIOUS_IP", "TOR_IP", "ATTACK_TACTIC", "HIGH_RISK_API", "ATTACK_TECHNIQUE", "UNUSUAL_API_FOR_ACCOUNT", "UNUSUAL_ASN_FOR_ACCOUNT", "UNUSUAL_ASN_FOR_USER", "SUSPICIOUS_PROCESS", "MALICIOUS_DOMAIN", "MALICIOUS_PROCESS", "CRYPTOMINING_IP", "CRYPTOMINING_DOMAIN", "CRYPTOMINING_PROCESS", "MALICIOUS_FILE"
|
|
4464
|
+
# resp.findings[0].service.detection.sequence.sequence_indicators[0].key #=> String, one of "SUSPICIOUS_USER_AGENT", "SUSPICIOUS_NETWORK", "MALICIOUS_IP", "TOR_IP", "ATTACK_TACTIC", "HIGH_RISK_API", "ATTACK_TECHNIQUE", "UNUSUAL_API_FOR_ACCOUNT", "UNUSUAL_ASN_FOR_ACCOUNT", "UNUSUAL_ASN_FOR_USER", "SUSPICIOUS_PROCESS", "MALICIOUS_DOMAIN", "MALICIOUS_PROCESS", "CRYPTOMINING_IP", "CRYPTOMINING_DOMAIN", "CRYPTOMINING_PROCESS", "MALICIOUS_FILE", "VULNERABILITY", "MALICIOUS_PACKAGE", "MISCONFIGURATION", "REACHABILITY", "SENSITIVE_DATA"
|
|
4466
4465
|
# resp.findings[0].service.detection.sequence.sequence_indicators[0].values #=> Array
|
|
4467
4466
|
# resp.findings[0].service.detection.sequence.sequence_indicators[0].values[0] #=> String
|
|
4468
4467
|
# resp.findings[0].service.detection.sequence.sequence_indicators[0].title #=> String
|
|
@@ -8965,7 +8964,7 @@ module Aws::GuardDuty
|
|
|
8965
8964
|
tracer: tracer
|
|
8966
8965
|
)
|
|
8967
8966
|
context[:gem_name] = 'aws-sdk-guardduty'
|
|
8968
|
-
context[:gem_version] = '1.
|
|
8967
|
+
context[:gem_version] = '1.150.0'
|
|
8969
8968
|
Seahorse::Client::Request.new(handlers, context)
|
|
8970
8969
|
end
|
|
8971
8970
|
|
data/lib/aws-sdk-guardduty.rb
CHANGED
data/sig/client.rbs
CHANGED
|
@@ -120,33 +120,10 @@ module Aws
|
|
|
120
120
|
enable: bool,
|
|
121
121
|
?client_token: ::String,
|
|
122
122
|
?finding_publishing_frequency: ("FIFTEEN_MINUTES" | "ONE_HOUR" | "SIX_HOURS"),
|
|
123
|
-
?data_sources:
|
|
124
|
-
s3_logs: {
|
|
125
|
-
enable: bool
|
|
126
|
-
}?,
|
|
127
|
-
kubernetes: {
|
|
128
|
-
audit_logs: {
|
|
129
|
-
enable: bool
|
|
130
|
-
}
|
|
131
|
-
}?,
|
|
132
|
-
malware_protection: {
|
|
133
|
-
scan_ec2_instance_with_findings: {
|
|
134
|
-
ebs_volumes: bool?
|
|
135
|
-
}?
|
|
136
|
-
}?
|
|
137
|
-
},
|
|
123
|
+
?data_sources: Params::data_source_configurations,
|
|
138
124
|
?tags: Hash[::String, ::String],
|
|
139
125
|
?features: Array[
|
|
140
|
-
|
|
141
|
-
name: ("S3_DATA_EVENTS" | "EKS_AUDIT_LOGS" | "EBS_MALWARE_PROTECTION" | "RDS_LOGIN_EVENTS" | "LAMBDA_NETWORK_LOGS" | "EKS_RUNTIME_MONITORING" | "RUNTIME_MONITORING")?,
|
|
142
|
-
status: ("ENABLED" | "DISABLED")?,
|
|
143
|
-
additional_configuration: Array[
|
|
144
|
-
{
|
|
145
|
-
name: ("EKS_ADDON_MANAGEMENT" | "ECS_FARGATE_AGENT_MANAGEMENT" | "EC2_AGENT_MANAGEMENT")?,
|
|
146
|
-
status: ("ENABLED" | "DISABLED")?
|
|
147
|
-
},
|
|
148
|
-
]?
|
|
149
|
-
},
|
|
126
|
+
Params::detector_feature_configuration
|
|
150
127
|
]
|
|
151
128
|
) -> _CreateDetectorResponseSuccess
|
|
152
129
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _CreateDetectorResponseSuccess
|
|
@@ -162,24 +139,7 @@ module Aws
|
|
|
162
139
|
?description: ::String,
|
|
163
140
|
?action: ("NOOP" | "ARCHIVE"),
|
|
164
141
|
?rank: ::Integer,
|
|
165
|
-
finding_criteria:
|
|
166
|
-
criterion: Hash[::String, {
|
|
167
|
-
eq: Array[::String]?,
|
|
168
|
-
neq: Array[::String]?,
|
|
169
|
-
gt: ::Integer?,
|
|
170
|
-
gte: ::Integer?,
|
|
171
|
-
lt: ::Integer?,
|
|
172
|
-
lte: ::Integer?,
|
|
173
|
-
equals: Array[::String]?,
|
|
174
|
-
not_equals: Array[::String]?,
|
|
175
|
-
greater_than: ::Integer?,
|
|
176
|
-
greater_than_or_equal: ::Integer?,
|
|
177
|
-
less_than: ::Integer?,
|
|
178
|
-
less_than_or_equal: ::Integer?,
|
|
179
|
-
matches: Array[::String]?,
|
|
180
|
-
not_matches: Array[::String]?
|
|
181
|
-
}]?
|
|
182
|
-
},
|
|
142
|
+
finding_criteria: Params::finding_criteria,
|
|
183
143
|
?client_token: ::String,
|
|
184
144
|
?tags: Hash[::String, ::String]
|
|
185
145
|
) -> _CreateFilterResponseSuccess
|
|
@@ -236,7 +196,7 @@ module Aws
|
|
|
236
196
|
{
|
|
237
197
|
account_id: ::String,
|
|
238
198
|
email: ::String
|
|
239
|
-
}
|
|
199
|
+
}
|
|
240
200
|
]
|
|
241
201
|
) -> _CreateMembersResponseSuccess
|
|
242
202
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _CreateMembersResponseSuccess
|
|
@@ -444,7 +404,7 @@ module Aws
|
|
|
444
404
|
greater_than: ::Integer?,
|
|
445
405
|
less_than: ::Integer?
|
|
446
406
|
}?
|
|
447
|
-
}
|
|
407
|
+
}
|
|
448
408
|
]?
|
|
449
409
|
},
|
|
450
410
|
?sort_criteria: {
|
|
@@ -551,17 +511,7 @@ module Aws
|
|
|
551
511
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/GuardDuty/Client.html#get_coverage_statistics-instance_method
|
|
552
512
|
def get_coverage_statistics: (
|
|
553
513
|
detector_id: ::String,
|
|
554
|
-
?filter_criteria:
|
|
555
|
-
filter_criterion: Array[
|
|
556
|
-
{
|
|
557
|
-
criterion_key: ("ACCOUNT_ID" | "RESOURCE_TYPE" | "COVERAGE_STATUS" | "ADDON_VERSION" | "CLUSTER_NAME" | "ECS_CLUSTER_NAME" | "MANAGEMENT_TYPE" | "EKS_CLUSTER_NAME" | "AGENT_VERSION" | "INSTANCE_ID" | "CLUSTER_ARN")?,
|
|
558
|
-
filter_condition: {
|
|
559
|
-
equals: Array[::String]?,
|
|
560
|
-
not_equals: Array[::String]?
|
|
561
|
-
}?
|
|
562
|
-
},
|
|
563
|
-
]?
|
|
564
|
-
},
|
|
514
|
+
?filter_criteria: Params::coverage_filter_criteria,
|
|
565
515
|
statistics_type: Array[("COUNT_BY_RESOURCE_TYPE" | "COUNT_BY_COVERAGE_STATUS")]
|
|
566
516
|
) -> _GetCoverageStatisticsResponseSuccess
|
|
567
517
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _GetCoverageStatisticsResponseSuccess
|
|
@@ -623,24 +573,7 @@ module Aws
|
|
|
623
573
|
def get_findings_statistics: (
|
|
624
574
|
detector_id: ::String,
|
|
625
575
|
?finding_statistic_types: Array[("COUNT_BY_SEVERITY")],
|
|
626
|
-
?finding_criteria:
|
|
627
|
-
criterion: Hash[::String, {
|
|
628
|
-
eq: Array[::String]?,
|
|
629
|
-
neq: Array[::String]?,
|
|
630
|
-
gt: ::Integer?,
|
|
631
|
-
gte: ::Integer?,
|
|
632
|
-
lt: ::Integer?,
|
|
633
|
-
lte: ::Integer?,
|
|
634
|
-
equals: Array[::String]?,
|
|
635
|
-
not_equals: Array[::String]?,
|
|
636
|
-
greater_than: ::Integer?,
|
|
637
|
-
greater_than_or_equal: ::Integer?,
|
|
638
|
-
less_than: ::Integer?,
|
|
639
|
-
less_than_or_equal: ::Integer?,
|
|
640
|
-
matches: Array[::String]?,
|
|
641
|
-
not_matches: Array[::String]?
|
|
642
|
-
}]?
|
|
643
|
-
},
|
|
576
|
+
?finding_criteria: Params::finding_criteria,
|
|
644
577
|
?group_by: ("ACCOUNT" | "DATE" | "FINDING_TYPE" | "RESOURCE" | "SEVERITY"),
|
|
645
578
|
?order_by: ("ASC" | "DESC"),
|
|
646
579
|
?max_results: ::Integer
|
|
@@ -878,17 +811,7 @@ module Aws
|
|
|
878
811
|
detector_id: ::String,
|
|
879
812
|
?next_token: ::String,
|
|
880
813
|
?max_results: ::Integer,
|
|
881
|
-
?filter_criteria:
|
|
882
|
-
filter_criterion: Array[
|
|
883
|
-
{
|
|
884
|
-
criterion_key: ("ACCOUNT_ID" | "RESOURCE_TYPE" | "COVERAGE_STATUS" | "ADDON_VERSION" | "CLUSTER_NAME" | "ECS_CLUSTER_NAME" | "MANAGEMENT_TYPE" | "EKS_CLUSTER_NAME" | "AGENT_VERSION" | "INSTANCE_ID" | "CLUSTER_ARN")?,
|
|
885
|
-
filter_condition: {
|
|
886
|
-
equals: Array[::String]?,
|
|
887
|
-
not_equals: Array[::String]?
|
|
888
|
-
}?
|
|
889
|
-
},
|
|
890
|
-
]?
|
|
891
|
-
},
|
|
814
|
+
?filter_criteria: Params::coverage_filter_criteria,
|
|
892
815
|
?sort_criteria: {
|
|
893
816
|
attribute_name: ("ACCOUNT_ID" | "COVERAGE_STATUS" | "ISSUE" | "ADDON_VERSION" | "UPDATED_AT" | "CLUSTER_NAME" | "EKS_CLUSTER_NAME" | "ECS_CLUSTER_NAME" | "INSTANCE_ID")?,
|
|
894
817
|
order_by: ("ASC" | "DESC")?
|
|
@@ -929,24 +852,7 @@ module Aws
|
|
|
929
852
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/GuardDuty/Client.html#list_findings-instance_method
|
|
930
853
|
def list_findings: (
|
|
931
854
|
detector_id: ::String,
|
|
932
|
-
?finding_criteria:
|
|
933
|
-
criterion: Hash[::String, {
|
|
934
|
-
eq: Array[::String]?,
|
|
935
|
-
neq: Array[::String]?,
|
|
936
|
-
gt: ::Integer?,
|
|
937
|
-
gte: ::Integer?,
|
|
938
|
-
lt: ::Integer?,
|
|
939
|
-
lte: ::Integer?,
|
|
940
|
-
equals: Array[::String]?,
|
|
941
|
-
not_equals: Array[::String]?,
|
|
942
|
-
greater_than: ::Integer?,
|
|
943
|
-
greater_than_or_equal: ::Integer?,
|
|
944
|
-
less_than: ::Integer?,
|
|
945
|
-
less_than_or_equal: ::Integer?,
|
|
946
|
-
matches: Array[::String]?,
|
|
947
|
-
not_matches: Array[::String]?
|
|
948
|
-
}]?
|
|
949
|
-
},
|
|
855
|
+
?finding_criteria: Params::finding_criteria,
|
|
950
856
|
?sort_criteria: {
|
|
951
857
|
attribute_name: ::String?,
|
|
952
858
|
order_by: ("ASC" | "DESC")?
|
|
@@ -1010,7 +916,7 @@ module Aws
|
|
|
1010
916
|
greater_than: ::Integer?,
|
|
1011
917
|
less_than: ::Integer?
|
|
1012
918
|
}?
|
|
1013
|
-
}
|
|
919
|
+
}
|
|
1014
920
|
]?
|
|
1015
921
|
},
|
|
1016
922
|
?sort_criteria: {
|
|
@@ -1201,32 +1107,9 @@ module Aws
|
|
|
1201
1107
|
detector_id: ::String,
|
|
1202
1108
|
?enable: bool,
|
|
1203
1109
|
?finding_publishing_frequency: ("FIFTEEN_MINUTES" | "ONE_HOUR" | "SIX_HOURS"),
|
|
1204
|
-
?data_sources:
|
|
1205
|
-
s3_logs: {
|
|
1206
|
-
enable: bool
|
|
1207
|
-
}?,
|
|
1208
|
-
kubernetes: {
|
|
1209
|
-
audit_logs: {
|
|
1210
|
-
enable: bool
|
|
1211
|
-
}
|
|
1212
|
-
}?,
|
|
1213
|
-
malware_protection: {
|
|
1214
|
-
scan_ec2_instance_with_findings: {
|
|
1215
|
-
ebs_volumes: bool?
|
|
1216
|
-
}?
|
|
1217
|
-
}?
|
|
1218
|
-
},
|
|
1110
|
+
?data_sources: Params::data_source_configurations,
|
|
1219
1111
|
?features: Array[
|
|
1220
|
-
|
|
1221
|
-
name: ("S3_DATA_EVENTS" | "EKS_AUDIT_LOGS" | "EBS_MALWARE_PROTECTION" | "RDS_LOGIN_EVENTS" | "LAMBDA_NETWORK_LOGS" | "EKS_RUNTIME_MONITORING" | "RUNTIME_MONITORING")?,
|
|
1222
|
-
status: ("ENABLED" | "DISABLED")?,
|
|
1223
|
-
additional_configuration: Array[
|
|
1224
|
-
{
|
|
1225
|
-
name: ("EKS_ADDON_MANAGEMENT" | "ECS_FARGATE_AGENT_MANAGEMENT" | "EC2_AGENT_MANAGEMENT")?,
|
|
1226
|
-
status: ("ENABLED" | "DISABLED")?
|
|
1227
|
-
},
|
|
1228
|
-
]?
|
|
1229
|
-
},
|
|
1112
|
+
Params::detector_feature_configuration
|
|
1230
1113
|
]
|
|
1231
1114
|
) -> _UpdateDetectorResponseSuccess
|
|
1232
1115
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _UpdateDetectorResponseSuccess
|
|
@@ -1242,24 +1125,7 @@ module Aws
|
|
|
1242
1125
|
?description: ::String,
|
|
1243
1126
|
?action: ("NOOP" | "ARCHIVE"),
|
|
1244
1127
|
?rank: ::Integer,
|
|
1245
|
-
?finding_criteria:
|
|
1246
|
-
criterion: Hash[::String, {
|
|
1247
|
-
eq: Array[::String]?,
|
|
1248
|
-
neq: Array[::String]?,
|
|
1249
|
-
gt: ::Integer?,
|
|
1250
|
-
gte: ::Integer?,
|
|
1251
|
-
lt: ::Integer?,
|
|
1252
|
-
lte: ::Integer?,
|
|
1253
|
-
equals: Array[::String]?,
|
|
1254
|
-
not_equals: Array[::String]?,
|
|
1255
|
-
greater_than: ::Integer?,
|
|
1256
|
-
greater_than_or_equal: ::Integer?,
|
|
1257
|
-
less_than: ::Integer?,
|
|
1258
|
-
less_than_or_equal: ::Integer?,
|
|
1259
|
-
matches: Array[::String]?,
|
|
1260
|
-
not_matches: Array[::String]?
|
|
1261
|
-
}]?
|
|
1262
|
-
}
|
|
1128
|
+
?finding_criteria: Params::finding_criteria
|
|
1263
1129
|
) -> _UpdateFilterResponseSuccess
|
|
1264
1130
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _UpdateFilterResponseSuccess
|
|
1265
1131
|
|
|
@@ -1318,7 +1184,7 @@ module Aws
|
|
|
1318
1184
|
{
|
|
1319
1185
|
key: ::String,
|
|
1320
1186
|
value: ::String?
|
|
1321
|
-
}
|
|
1187
|
+
}
|
|
1322
1188
|
]
|
|
1323
1189
|
}]?,
|
|
1324
1190
|
exclude: Hash[("EC2_INSTANCE_TAG"), {
|
|
@@ -1326,7 +1192,7 @@ module Aws
|
|
|
1326
1192
|
{
|
|
1327
1193
|
key: ::String,
|
|
1328
1194
|
value: ::String?
|
|
1329
|
-
}
|
|
1195
|
+
}
|
|
1330
1196
|
]
|
|
1331
1197
|
}]?
|
|
1332
1198
|
},
|
|
@@ -1342,21 +1208,7 @@ module Aws
|
|
|
1342
1208
|
def update_member_detectors: (
|
|
1343
1209
|
detector_id: ::String,
|
|
1344
1210
|
account_ids: Array[::String],
|
|
1345
|
-
?data_sources:
|
|
1346
|
-
s3_logs: {
|
|
1347
|
-
enable: bool
|
|
1348
|
-
}?,
|
|
1349
|
-
kubernetes: {
|
|
1350
|
-
audit_logs: {
|
|
1351
|
-
enable: bool
|
|
1352
|
-
}
|
|
1353
|
-
}?,
|
|
1354
|
-
malware_protection: {
|
|
1355
|
-
scan_ec2_instance_with_findings: {
|
|
1356
|
-
ebs_volumes: bool?
|
|
1357
|
-
}?
|
|
1358
|
-
}?
|
|
1359
|
-
},
|
|
1211
|
+
?data_sources: Params::data_source_configurations,
|
|
1360
1212
|
?features: Array[
|
|
1361
1213
|
{
|
|
1362
1214
|
name: ("S3_DATA_EVENTS" | "EKS_AUDIT_LOGS" | "EBS_MALWARE_PROTECTION" | "RDS_LOGIN_EVENTS" | "LAMBDA_NETWORK_LOGS" | "EKS_RUNTIME_MONITORING" | "RUNTIME_MONITORING")?,
|
|
@@ -1365,9 +1217,9 @@ module Aws
|
|
|
1365
1217
|
{
|
|
1366
1218
|
name: ("EKS_ADDON_MANAGEMENT" | "ECS_FARGATE_AGENT_MANAGEMENT" | "EC2_AGENT_MANAGEMENT")?,
|
|
1367
1219
|
status: ("ENABLED" | "DISABLED")?
|
|
1368
|
-
}
|
|
1220
|
+
}
|
|
1369
1221
|
]?
|
|
1370
|
-
}
|
|
1222
|
+
}
|
|
1371
1223
|
]
|
|
1372
1224
|
) -> _UpdateMemberDetectorsResponseSuccess
|
|
1373
1225
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _UpdateMemberDetectorsResponseSuccess
|
|
@@ -1404,9 +1256,9 @@ module Aws
|
|
|
1404
1256
|
{
|
|
1405
1257
|
name: ("EKS_ADDON_MANAGEMENT" | "ECS_FARGATE_AGENT_MANAGEMENT" | "EC2_AGENT_MANAGEMENT")?,
|
|
1406
1258
|
auto_enable: ("NEW" | "NONE" | "ALL")?
|
|
1407
|
-
}
|
|
1259
|
+
}
|
|
1408
1260
|
]?
|
|
1409
|
-
}
|
|
1261
|
+
}
|
|
1410
1262
|
],
|
|
1411
1263
|
?auto_enable_organization_members: ("NEW" | "ALL" | "NONE")
|
|
1412
1264
|
) -> _UpdateOrganizationConfigurationResponseSuccess
|
data/sig/params.rbs
ADDED
|
@@ -0,0 +1,73 @@
|
|
|
1
|
+
# WARNING ABOUT GENERATED CODE
|
|
2
|
+
#
|
|
3
|
+
# This file is generated. See the contributing guide for more information:
|
|
4
|
+
# https://github.com/aws/aws-sdk-ruby/blob/version-3/CONTRIBUTING.md
|
|
5
|
+
#
|
|
6
|
+
# WARNING ABOUT GENERATED CODE
|
|
7
|
+
|
|
8
|
+
module Aws
|
|
9
|
+
module GuardDuty
|
|
10
|
+
module Params
|
|
11
|
+
type data_source_configurations = {
|
|
12
|
+
s3_logs: {
|
|
13
|
+
enable: bool
|
|
14
|
+
}?,
|
|
15
|
+
kubernetes: {
|
|
16
|
+
audit_logs: {
|
|
17
|
+
enable: bool
|
|
18
|
+
}
|
|
19
|
+
}?,
|
|
20
|
+
malware_protection: {
|
|
21
|
+
scan_ec2_instance_with_findings: {
|
|
22
|
+
ebs_volumes: bool?
|
|
23
|
+
}?
|
|
24
|
+
}?
|
|
25
|
+
}
|
|
26
|
+
|
|
27
|
+
type detector_feature_configuration = {
|
|
28
|
+
name: ("S3_DATA_EVENTS" | "EKS_AUDIT_LOGS" | "EBS_MALWARE_PROTECTION" | "RDS_LOGIN_EVENTS" | "LAMBDA_NETWORK_LOGS" | "EKS_RUNTIME_MONITORING" | "RUNTIME_MONITORING")?,
|
|
29
|
+
status: ("ENABLED" | "DISABLED")?,
|
|
30
|
+
additional_configuration: Array[
|
|
31
|
+
{
|
|
32
|
+
name: ("EKS_ADDON_MANAGEMENT" | "ECS_FARGATE_AGENT_MANAGEMENT" | "EC2_AGENT_MANAGEMENT")?,
|
|
33
|
+
status: ("ENABLED" | "DISABLED")?
|
|
34
|
+
}
|
|
35
|
+
]?
|
|
36
|
+
}
|
|
37
|
+
|
|
38
|
+
type finding_criteria = {
|
|
39
|
+
criterion: Hash[::String, Params::condition]?
|
|
40
|
+
}
|
|
41
|
+
|
|
42
|
+
type condition = {
|
|
43
|
+
eq: Array[::String]?,
|
|
44
|
+
neq: Array[::String]?,
|
|
45
|
+
gt: ::Integer?,
|
|
46
|
+
gte: ::Integer?,
|
|
47
|
+
lt: ::Integer?,
|
|
48
|
+
lte: ::Integer?,
|
|
49
|
+
equals: Array[::String]?,
|
|
50
|
+
not_equals: Array[::String]?,
|
|
51
|
+
greater_than: ::Integer?,
|
|
52
|
+
greater_than_or_equal: ::Integer?,
|
|
53
|
+
less_than: ::Integer?,
|
|
54
|
+
less_than_or_equal: ::Integer?,
|
|
55
|
+
matches: Array[::String]?,
|
|
56
|
+
not_matches: Array[::String]?
|
|
57
|
+
}
|
|
58
|
+
|
|
59
|
+
type coverage_filter_criteria = {
|
|
60
|
+
filter_criterion: Array[
|
|
61
|
+
{
|
|
62
|
+
criterion_key: ("ACCOUNT_ID" | "RESOURCE_TYPE" | "COVERAGE_STATUS" | "ADDON_VERSION" | "CLUSTER_NAME" | "ECS_CLUSTER_NAME" | "MANAGEMENT_TYPE" | "EKS_CLUSTER_NAME" | "AGENT_VERSION" | "INSTANCE_ID" | "CLUSTER_ARN")?,
|
|
63
|
+
filter_condition: {
|
|
64
|
+
equals: Array[::String]?,
|
|
65
|
+
not_equals: Array[::String]?
|
|
66
|
+
}?
|
|
67
|
+
}
|
|
68
|
+
]?
|
|
69
|
+
}
|
|
70
|
+
|
|
71
|
+
end
|
|
72
|
+
end
|
|
73
|
+
end
|
data/sig/types.rbs
CHANGED
|
@@ -1380,7 +1380,7 @@ module Aws::GuardDuty
|
|
|
1380
1380
|
end
|
|
1381
1381
|
|
|
1382
1382
|
class Indicator
|
|
1383
|
-
attr_accessor key: ("SUSPICIOUS_USER_AGENT" | "SUSPICIOUS_NETWORK" | "MALICIOUS_IP" | "TOR_IP" | "ATTACK_TACTIC" | "HIGH_RISK_API" | "ATTACK_TECHNIQUE" | "UNUSUAL_API_FOR_ACCOUNT" | "UNUSUAL_ASN_FOR_ACCOUNT" | "UNUSUAL_ASN_FOR_USER" | "SUSPICIOUS_PROCESS" | "MALICIOUS_DOMAIN" | "MALICIOUS_PROCESS" | "CRYPTOMINING_IP" | "CRYPTOMINING_DOMAIN" | "CRYPTOMINING_PROCESS" | "MALICIOUS_FILE")
|
|
1383
|
+
attr_accessor key: ("SUSPICIOUS_USER_AGENT" | "SUSPICIOUS_NETWORK" | "MALICIOUS_IP" | "TOR_IP" | "ATTACK_TACTIC" | "HIGH_RISK_API" | "ATTACK_TECHNIQUE" | "UNUSUAL_API_FOR_ACCOUNT" | "UNUSUAL_ASN_FOR_ACCOUNT" | "UNUSUAL_ASN_FOR_USER" | "SUSPICIOUS_PROCESS" | "MALICIOUS_DOMAIN" | "MALICIOUS_PROCESS" | "CRYPTOMINING_IP" | "CRYPTOMINING_DOMAIN" | "CRYPTOMINING_PROCESS" | "MALICIOUS_FILE" | "VULNERABILITY" | "MALICIOUS_PACKAGE" | "MISCONFIGURATION" | "REACHABILITY" | "SENSITIVE_DATA")
|
|
1384
1384
|
attr_accessor values: ::Array[::String]
|
|
1385
1385
|
attr_accessor title: ::String
|
|
1386
1386
|
SENSITIVE: []
|
metadata
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: aws-sdk-guardduty
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 1.
|
|
4
|
+
version: 1.150.0
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Amazon Web Services
|
|
@@ -67,6 +67,7 @@ files:
|
|
|
67
67
|
- lib/aws-sdk-guardduty/types.rb
|
|
68
68
|
- sig/client.rbs
|
|
69
69
|
- sig/errors.rbs
|
|
70
|
+
- sig/params.rbs
|
|
70
71
|
- sig/resource.rbs
|
|
71
72
|
- sig/types.rbs
|
|
72
73
|
- sig/waiters.rbs
|