aws-sdk-inspector2 1.10.0 → 1.12.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: d8a05c9f3073b7cd2de272a497ea7dc33241e5acc2f1ff97ac6c932ef0872a98
4
- data.tar.gz: 657a6c49c85d3ad04967a1372791f7371b39d21a4773c67e80a65c44a88decef
3
+ metadata.gz: 37045386cef6441373fa42145f3ecf648fef0f4322fad6515b80719539a77473
4
+ data.tar.gz: b815de9f7ae4804241a5aabc60fede44880a5ba087b92d4000e179b7c7fee2ca
5
5
  SHA512:
6
- metadata.gz: 11e3761219c9f9d140f48e298ecd05c7c5a34c22f8bd657ec554bf9abe8f4e9dda48a8cab421f9422ce5d5dbae0ac2f860cb6cf5105c8159e3e9078afbdb5f9a
7
- data.tar.gz: cb819fb1b69b9e446a9e223f6fd72dc5ddc8c6c04c415bbf4ff6af2ad2cde245dd2112dafd2615c7bae21b64d6f4a5bbdea4bc735f941990754655402adb17b8
6
+ metadata.gz: 1b1f03de0aaef59011515095e6fbd52e881a1ff9a49c798d7048af053da8d2db939b786a32f263332ebcd01e988d0df84b096f02af018f5c460055216687ab32
7
+ data.tar.gz: a20ac868d3f766413ca6cc2a70ed86276d9fcbeef6db46c9e2d609727c3ac2b2b903b109959141cca536e6d4ee92963af94fd7912f0785a05b110ddbdf26de70
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.12.0 (2023-05-05)
5
+ ------------------
6
+
7
+ * Feature - Amazon Inspector now allows customers to search its vulnerability intelligence database if any of the Inspector scanning types are activated.
8
+
9
+ 1.11.0 (2023-05-03)
10
+ ------------------
11
+
12
+ * Feature - This feature provides deep inspection for linux based instance
13
+
4
14
  1.10.0 (2023-01-18)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.10.0
1
+ 1.12.0
@@ -369,7 +369,16 @@ module Aws::Inspector2
369
369
  # @!group API Operations
370
370
 
371
371
  # Associates an Amazon Web Services account with an Amazon Inspector
372
- # delegated administrator.
372
+ # delegated administrator. An HTTP 200 response indicates the
373
+ # association was successfully started, but doesn’t indicate whether it
374
+ # was completed. You can check if the association completed by using
375
+ # [ListMembers][1] for multiple accounts or [GetMembers][2] for a single
376
+ # account.
377
+ #
378
+ #
379
+ #
380
+ # [1]: https://docs.aws.amazon.com/inspector/v2/APIReference/API_ListMembers.html
381
+ # [2]: https://docs.aws.amazon.com/inspector/v2/APIReference/API_GetMember.html
373
382
  #
374
383
  # @option params [required, String] :account_id
375
384
  # The Amazon Web Services account ID of the member account to be
@@ -489,6 +498,92 @@ module Aws::Inspector2
489
498
  req.send_request(options)
490
499
  end
491
500
 
501
+ # Retrieves Amazon Inspector deep inspection activation status of
502
+ # multiple member accounts within your organization. You must be the
503
+ # delegated administrator of an organization in Amazon Inspector to use
504
+ # this API.
505
+ #
506
+ # @option params [Array<String>] :account_ids
507
+ # The unique identifiers for the Amazon Web Services accounts to
508
+ # retrieve Amazon Inspector deep inspection activation status for.
509
+ # </p>
510
+ #
511
+ # @return [Types::BatchGetMemberEc2DeepInspectionStatusResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
512
+ #
513
+ # * {Types::BatchGetMemberEc2DeepInspectionStatusResponse#account_ids #account_ids} => Array&lt;Types::MemberAccountEc2DeepInspectionStatusState&gt;
514
+ # * {Types::BatchGetMemberEc2DeepInspectionStatusResponse#failed_account_ids #failed_account_ids} => Array&lt;Types::FailedMemberAccountEc2DeepInspectionStatusState&gt;
515
+ #
516
+ # @example Request syntax with placeholder values
517
+ #
518
+ # resp = client.batch_get_member_ec2_deep_inspection_status({
519
+ # account_ids: ["AccountId"],
520
+ # })
521
+ #
522
+ # @example Response structure
523
+ #
524
+ # resp.account_ids #=> Array
525
+ # resp.account_ids[0].account_id #=> String
526
+ # resp.account_ids[0].error_message #=> String
527
+ # resp.account_ids[0].status #=> String, one of "ACTIVATED", "DEACTIVATED", "PENDING", "FAILED"
528
+ # resp.failed_account_ids #=> Array
529
+ # resp.failed_account_ids[0].account_id #=> String
530
+ # resp.failed_account_ids[0].ec2_scan_status #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
531
+ # resp.failed_account_ids[0].error_message #=> String
532
+ #
533
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/BatchGetMemberEc2DeepInspectionStatus AWS API Documentation
534
+ #
535
+ # @overload batch_get_member_ec2_deep_inspection_status(params = {})
536
+ # @param [Hash] params ({})
537
+ def batch_get_member_ec2_deep_inspection_status(params = {}, options = {})
538
+ req = build_request(:batch_get_member_ec2_deep_inspection_status, params)
539
+ req.send_request(options)
540
+ end
541
+
542
+ # Activates or deactivates Amazon Inspector deep inspection for the
543
+ # provided member accounts in your organization. You must be the
544
+ # delegated administrator of an organization in Amazon Inspector to use
545
+ # this API.
546
+ #
547
+ # @option params [required, Array<Types::MemberAccountEc2DeepInspectionStatus>] :account_ids
548
+ # The unique identifiers for the Amazon Web Services accounts to change
549
+ # Amazon Inspector deep inspection status for.
550
+ #
551
+ # @return [Types::BatchUpdateMemberEc2DeepInspectionStatusResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
552
+ #
553
+ # * {Types::BatchUpdateMemberEc2DeepInspectionStatusResponse#account_ids #account_ids} => Array&lt;Types::MemberAccountEc2DeepInspectionStatusState&gt;
554
+ # * {Types::BatchUpdateMemberEc2DeepInspectionStatusResponse#failed_account_ids #failed_account_ids} => Array&lt;Types::FailedMemberAccountEc2DeepInspectionStatusState&gt;
555
+ #
556
+ # @example Request syntax with placeholder values
557
+ #
558
+ # resp = client.batch_update_member_ec2_deep_inspection_status({
559
+ # account_ids: [ # required
560
+ # {
561
+ # account_id: "AccountId", # required
562
+ # activate_deep_inspection: false, # required
563
+ # },
564
+ # ],
565
+ # })
566
+ #
567
+ # @example Response structure
568
+ #
569
+ # resp.account_ids #=> Array
570
+ # resp.account_ids[0].account_id #=> String
571
+ # resp.account_ids[0].error_message #=> String
572
+ # resp.account_ids[0].status #=> String, one of "ACTIVATED", "DEACTIVATED", "PENDING", "FAILED"
573
+ # resp.failed_account_ids #=> Array
574
+ # resp.failed_account_ids[0].account_id #=> String
575
+ # resp.failed_account_ids[0].ec2_scan_status #=> String, one of "ENABLING", "ENABLED", "DISABLING", "DISABLED", "SUSPENDING", "SUSPENDED"
576
+ # resp.failed_account_ids[0].error_message #=> String
577
+ #
578
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/BatchUpdateMemberEc2DeepInspectionStatus AWS API Documentation
579
+ #
580
+ # @overload batch_update_member_ec2_deep_inspection_status(params = {})
581
+ # @param [Hash] params ({})
582
+ def batch_update_member_ec2_deep_inspection_status(params = {}, options = {})
583
+ req = build_request(:batch_update_member_ec2_deep_inspection_status, params)
584
+ req.send_request(options)
585
+ end
586
+
492
587
  # Cancels the given findings report.
493
588
  #
494
589
  # @option params [required, String] :report_id
@@ -826,7 +921,9 @@ module Aws::Inspector2
826
921
  req.send_request(options)
827
922
  end
828
923
 
829
- # Creates a finding report.
924
+ # Creates a finding report. By default only `ACTIVE` findings are
925
+ # returned in the report. To see `SUPRESSED` or `CLOSED` findings you
926
+ # must specify a value for the `findingStatus` filter criteria.
830
927
  #
831
928
  # @option params [Types::FilterCriteria] :filter_criteria
832
929
  # The filter criteria to apply to the results of the finding report.
@@ -1416,6 +1513,34 @@ module Aws::Inspector2
1416
1513
  req.send_request(options)
1417
1514
  end
1418
1515
 
1516
+ # Retrieves the activation status of Amazon Inspector deep inspection
1517
+ # and custom paths associated with your account.
1518
+ #
1519
+ # @return [Types::GetEc2DeepInspectionConfigurationResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1520
+ #
1521
+ # * {Types::GetEc2DeepInspectionConfigurationResponse#error_message #error_message} => String
1522
+ # * {Types::GetEc2DeepInspectionConfigurationResponse#org_package_paths #org_package_paths} => Array&lt;String&gt;
1523
+ # * {Types::GetEc2DeepInspectionConfigurationResponse#package_paths #package_paths} => Array&lt;String&gt;
1524
+ # * {Types::GetEc2DeepInspectionConfigurationResponse#status #status} => String
1525
+ #
1526
+ # @example Response structure
1527
+ #
1528
+ # resp.error_message #=> String
1529
+ # resp.org_package_paths #=> Array
1530
+ # resp.org_package_paths[0] #=> String
1531
+ # resp.package_paths #=> Array
1532
+ # resp.package_paths[0] #=> String
1533
+ # resp.status #=> String, one of "ACTIVATED", "DEACTIVATED", "PENDING", "FAILED"
1534
+ #
1535
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/GetEc2DeepInspectionConfiguration AWS API Documentation
1536
+ #
1537
+ # @overload get_ec2_deep_inspection_configuration(params = {})
1538
+ # @param [Hash] params ({})
1539
+ def get_ec2_deep_inspection_configuration(params = {}, options = {})
1540
+ req = build_request(:get_ec2_deep_inspection_configuration, params)
1541
+ req.send_request(options)
1542
+ end
1543
+
1419
1544
  # Gets the status of a findings report.
1420
1545
  #
1421
1546
  # @option params [String] :report_id
@@ -1786,7 +1911,7 @@ module Aws::Inspector2
1786
1911
  # resp.covered_resources[0].resource_metadata.lambda_function.layers[0] #=> String
1787
1912
  # resp.covered_resources[0].resource_metadata.lambda_function.runtime #=> String, one of "NODEJS", "NODEJS_12_X", "NODEJS_14_X", "NODEJS_16_X", "JAVA_8", "JAVA_8_AL2", "JAVA_11", "PYTHON_3_7", "PYTHON_3_8", "PYTHON_3_9", "UNSUPPORTED", "NODEJS_18_X", "GO_1_X"
1788
1913
  # resp.covered_resources[0].resource_type #=> String, one of "AWS_EC2_INSTANCE", "AWS_ECR_CONTAINER_IMAGE", "AWS_ECR_REPOSITORY", "AWS_LAMBDA_FUNCTION"
1789
- # resp.covered_resources[0].scan_status.reason #=> String, one of "PENDING_INITIAL_SCAN", "ACCESS_DENIED", "INTERNAL_ERROR", "UNMANAGED_EC2_INSTANCE", "UNSUPPORTED_OS", "SCAN_ELIGIBILITY_EXPIRED", "RESOURCE_TERMINATED", "SUCCESSFUL", "NO_RESOURCES_FOUND", "IMAGE_SIZE_EXCEEDED", "SCAN_FREQUENCY_MANUAL", "SCAN_FREQUENCY_SCAN_ON_PUSH", "EC2_INSTANCE_STOPPED", "PENDING_DISABLE", "NO_INVENTORY", "STALE_INVENTORY", "EXCLUDED_BY_TAG", "UNSUPPORTED_RUNTIME"
1914
+ # resp.covered_resources[0].scan_status.reason #=> String, one of "PENDING_INITIAL_SCAN", "ACCESS_DENIED", "INTERNAL_ERROR", "UNMANAGED_EC2_INSTANCE", "UNSUPPORTED_OS", "SCAN_ELIGIBILITY_EXPIRED", "RESOURCE_TERMINATED", "SUCCESSFUL", "NO_RESOURCES_FOUND", "IMAGE_SIZE_EXCEEDED", "SCAN_FREQUENCY_MANUAL", "SCAN_FREQUENCY_SCAN_ON_PUSH", "EC2_INSTANCE_STOPPED", "PENDING_DISABLE", "NO_INVENTORY", "STALE_INVENTORY", "EXCLUDED_BY_TAG", "UNSUPPORTED_RUNTIME", "UNSUPPORTED_MEDIA_TYPE", "UNSUPPORTED_CONFIG_FILE", "DEEP_INSPECTION_PACKAGE_COLLECTION_LIMIT_EXCEEDED", "DEEP_INSPECTION_DAILY_SSM_INVENTORY_LIMIT_EXCEEDED", "DEEP_INSPECTION_COLLECTION_TIME_LIMIT_EXCEEDED", "DEEP_INSPECTION_NO_INVENTORY"
1790
1915
  # resp.covered_resources[0].scan_status.status_code #=> String, one of "ACTIVE", "INACTIVE"
1791
1916
  # resp.covered_resources[0].scan_type #=> String, one of "NETWORK", "PACKAGE"
1792
1917
  # resp.next_token #=> String
@@ -2836,7 +2961,7 @@ module Aws::Inspector2
2836
2961
  # resp.findings[0].package_vulnerability_details.vulnerable_packages[0].file_path #=> String
2837
2962
  # resp.findings[0].package_vulnerability_details.vulnerable_packages[0].fixed_in_version #=> String
2838
2963
  # resp.findings[0].package_vulnerability_details.vulnerable_packages[0].name #=> String
2839
- # resp.findings[0].package_vulnerability_details.vulnerable_packages[0].package_manager #=> String, one of "BUNDLER", "CARGO", "COMPOSER", "NPM", "NUGET", "PIPENV", "POETRY", "YARN", "GOBINARY", "GOMOD", "JAR", "OS", "PIP", "PYTHONPKG", "NODEPKG", "POM"
2964
+ # resp.findings[0].package_vulnerability_details.vulnerable_packages[0].package_manager #=> String, one of "BUNDLER", "CARGO", "COMPOSER", "NPM", "NUGET", "PIPENV", "POETRY", "YARN", "GOBINARY", "GOMOD", "JAR", "OS", "PIP", "PYTHONPKG", "NODEPKG", "POM", "GEMSPEC"
2840
2965
  # resp.findings[0].package_vulnerability_details.vulnerable_packages[0].release #=> String
2841
2966
  # resp.findings[0].package_vulnerability_details.vulnerable_packages[0].remediation #=> String
2842
2967
  # resp.findings[0].package_vulnerability_details.vulnerable_packages[0].source_lambda_layer_arn #=> String
@@ -3033,6 +3158,79 @@ module Aws::Inspector2
3033
3158
  req.send_request(options)
3034
3159
  end
3035
3160
 
3161
+ # Lists Amazon Inspector coverage details for a specific vulnerability.
3162
+ #
3163
+ # @option params [required, Types::SearchVulnerabilitiesFilterCriteria] :filter_criteria
3164
+ # The criteria used to filter the results of a vulnerability search.
3165
+ #
3166
+ # @option params [String] :next_token
3167
+ # A token to use for paginating results that are returned in the
3168
+ # response. Set the value of this parameter to null for the first
3169
+ # request to a list action. For subsequent calls, use the `NextToken`
3170
+ # value returned from the previous request to continue listing results
3171
+ # after the first page.
3172
+ #
3173
+ # @return [Types::SearchVulnerabilitiesResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
3174
+ #
3175
+ # * {Types::SearchVulnerabilitiesResponse#next_token #next_token} => String
3176
+ # * {Types::SearchVulnerabilitiesResponse#vulnerabilities #vulnerabilities} => Array&lt;Types::Vulnerability&gt;
3177
+ #
3178
+ # The returned {Seahorse::Client::Response response} is a pageable response and is Enumerable. For details on usage see {Aws::PageableResponse PageableResponse}.
3179
+ #
3180
+ # @example Request syntax with placeholder values
3181
+ #
3182
+ # resp = client.search_vulnerabilities({
3183
+ # filter_criteria: { # required
3184
+ # vulnerability_ids: ["VulnId"], # required
3185
+ # },
3186
+ # next_token: "NextToken",
3187
+ # })
3188
+ #
3189
+ # @example Response structure
3190
+ #
3191
+ # resp.next_token #=> String
3192
+ # resp.vulnerabilities #=> Array
3193
+ # resp.vulnerabilities[0].atig_data.first_seen #=> Time
3194
+ # resp.vulnerabilities[0].atig_data.last_seen #=> Time
3195
+ # resp.vulnerabilities[0].atig_data.targets #=> Array
3196
+ # resp.vulnerabilities[0].atig_data.targets[0] #=> String
3197
+ # resp.vulnerabilities[0].atig_data.ttps #=> Array
3198
+ # resp.vulnerabilities[0].atig_data.ttps[0] #=> String
3199
+ # resp.vulnerabilities[0].cisa_data.action #=> String
3200
+ # resp.vulnerabilities[0].cisa_data.date_added #=> Time
3201
+ # resp.vulnerabilities[0].cisa_data.date_due #=> Time
3202
+ # resp.vulnerabilities[0].cvss2.base_score #=> Float
3203
+ # resp.vulnerabilities[0].cvss2.scoring_vector #=> String
3204
+ # resp.vulnerabilities[0].cvss3.base_score #=> Float
3205
+ # resp.vulnerabilities[0].cvss3.scoring_vector #=> String
3206
+ # resp.vulnerabilities[0].cwes #=> Array
3207
+ # resp.vulnerabilities[0].cwes[0] #=> String
3208
+ # resp.vulnerabilities[0].description #=> String
3209
+ # resp.vulnerabilities[0].detection_platforms #=> Array
3210
+ # resp.vulnerabilities[0].detection_platforms[0] #=> String
3211
+ # resp.vulnerabilities[0].epss.score #=> Float
3212
+ # resp.vulnerabilities[0].exploit_observed.first_seen #=> Time
3213
+ # resp.vulnerabilities[0].exploit_observed.last_seen #=> Time
3214
+ # resp.vulnerabilities[0].id #=> String
3215
+ # resp.vulnerabilities[0].reference_urls #=> Array
3216
+ # resp.vulnerabilities[0].reference_urls[0] #=> String
3217
+ # resp.vulnerabilities[0].related_vulnerabilities #=> Array
3218
+ # resp.vulnerabilities[0].related_vulnerabilities[0] #=> String
3219
+ # resp.vulnerabilities[0].source #=> String, one of "NVD"
3220
+ # resp.vulnerabilities[0].source_url #=> String
3221
+ # resp.vulnerabilities[0].vendor_created_at #=> Time
3222
+ # resp.vulnerabilities[0].vendor_severity #=> String
3223
+ # resp.vulnerabilities[0].vendor_updated_at #=> Time
3224
+ #
3225
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/SearchVulnerabilities AWS API Documentation
3226
+ #
3227
+ # @overload search_vulnerabilities(params = {})
3228
+ # @param [Hash] params ({})
3229
+ def search_vulnerabilities(params = {}, options = {})
3230
+ req = build_request(:search_vulnerabilities, params)
3231
+ req.send_request(options)
3232
+ end
3233
+
3036
3234
  # Adds tags to a resource.
3037
3235
  #
3038
3236
  # @option params [required, String] :resource_arn
@@ -3115,6 +3313,56 @@ module Aws::Inspector2
3115
3313
  req.send_request(options)
3116
3314
  end
3117
3315
 
3316
+ # Activates, deactivates Amazon Inspector deep inspection, or updates
3317
+ # custom paths for your account.
3318
+ #
3319
+ # @option params [Boolean] :activate_deep_inspection
3320
+ # Specify `TRUE` to activate Amazon Inspector deep inspection in your
3321
+ # account, or `FALSE` to deactivate. Member accounts in an organization
3322
+ # cannot deactivate deep inspection, instead the delegated administrator
3323
+ # for the organization can deactivate a member account using
3324
+ # [BatchUpdateMemberEc2DeepInspectionStatus][1].
3325
+ #
3326
+ #
3327
+ #
3328
+ # [1]: https://docs.aws.amazon.com/inspector/v2/APIReference/API_BatchUpdateMemberEc2DeepInspectionStatus.html
3329
+ #
3330
+ # @option params [Array<String>] :package_paths
3331
+ # The Amazon Inspector deep inspection custom paths you are adding for
3332
+ # your account.
3333
+ #
3334
+ # @return [Types::UpdateEc2DeepInspectionConfigurationResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
3335
+ #
3336
+ # * {Types::UpdateEc2DeepInspectionConfigurationResponse#error_message #error_message} => String
3337
+ # * {Types::UpdateEc2DeepInspectionConfigurationResponse#org_package_paths #org_package_paths} => Array&lt;String&gt;
3338
+ # * {Types::UpdateEc2DeepInspectionConfigurationResponse#package_paths #package_paths} => Array&lt;String&gt;
3339
+ # * {Types::UpdateEc2DeepInspectionConfigurationResponse#status #status} => String
3340
+ #
3341
+ # @example Request syntax with placeholder values
3342
+ #
3343
+ # resp = client.update_ec2_deep_inspection_configuration({
3344
+ # activate_deep_inspection: false,
3345
+ # package_paths: ["Path"],
3346
+ # })
3347
+ #
3348
+ # @example Response structure
3349
+ #
3350
+ # resp.error_message #=> String
3351
+ # resp.org_package_paths #=> Array
3352
+ # resp.org_package_paths[0] #=> String
3353
+ # resp.package_paths #=> Array
3354
+ # resp.package_paths[0] #=> String
3355
+ # resp.status #=> String, one of "ACTIVATED", "DEACTIVATED", "PENDING", "FAILED"
3356
+ #
3357
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/UpdateEc2DeepInspectionConfiguration AWS API Documentation
3358
+ #
3359
+ # @overload update_ec2_deep_inspection_configuration(params = {})
3360
+ # @param [Hash] params ({})
3361
+ def update_ec2_deep_inspection_configuration(params = {}, options = {})
3362
+ req = build_request(:update_ec2_deep_inspection_configuration, params)
3363
+ req.send_request(options)
3364
+ end
3365
+
3118
3366
  # Specifies the action that is to be applied to the findings that match
3119
3367
  # the filter.
3120
3368
  #
@@ -3421,6 +3669,31 @@ module Aws::Inspector2
3421
3669
  req.send_request(options)
3422
3670
  end
3423
3671
 
3672
+ # Updates the Amazon Inspector deep inspection custom paths for your
3673
+ # organization. You must be an Amazon Inspector delegated administrator
3674
+ # to use this API.
3675
+ #
3676
+ # @option params [required, Array<String>] :org_package_paths
3677
+ # The Amazon Inspector deep inspection custom paths you are adding for
3678
+ # your organization.
3679
+ #
3680
+ # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
3681
+ #
3682
+ # @example Request syntax with placeholder values
3683
+ #
3684
+ # resp = client.update_org_ec2_deep_inspection_configuration({
3685
+ # org_package_paths: ["Path"], # required
3686
+ # })
3687
+ #
3688
+ # @see http://docs.aws.amazon.com/goto/WebAPI/inspector2-2020-06-08/UpdateOrgEc2DeepInspectionConfiguration AWS API Documentation
3689
+ #
3690
+ # @overload update_org_ec2_deep_inspection_configuration(params = {})
3691
+ # @param [Hash] params ({})
3692
+ def update_org_ec2_deep_inspection_configuration(params = {}, options = {})
3693
+ req = build_request(:update_org_ec2_deep_inspection_configuration, params)
3694
+ req.send_request(options)
3695
+ end
3696
+
3424
3697
  # Updates the configurations for your Amazon Inspector organization.
3425
3698
  #
3426
3699
  # @option params [required, Types::AutoEnable] :auto_enable
@@ -3469,7 +3742,7 @@ module Aws::Inspector2
3469
3742
  params: params,
3470
3743
  config: config)
3471
3744
  context[:gem_name] = 'aws-sdk-inspector2'
3472
- context[:gem_version] = '1.10.0'
3745
+ context[:gem_version] = '1.12.0'
3473
3746
  Seahorse::Client::Request.new(handlers, context)
3474
3747
  end
3475
3748