aws-sdk-securityhub 1.147.0 → 1.148.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 5e5a065401d6de4c1920b550db7c9e0cff4ae7ced0c74313e50ef4a3e3a20969
4
- data.tar.gz: a5ceb1a556c7df829581a3654d546659a2ec21d355408892d80cbef5a26fcc5f
3
+ metadata.gz: 94eaa9161386c98eea6c50b49ede1a3d853d7af7d523615b51a95b6dbb2c9b5e
4
+ data.tar.gz: 6c22c8e7783d14e95f48da893f42e68578070a4cd477a5816b83d2a82676e4e0
5
5
  SHA512:
6
- metadata.gz: 6e24ea1cc1c9fec6110fbe89f676cd6b1bf90ba9472e129017d1a2f150866c3c52b5fc6e50f6e1821d80d005db86de2c89a2135a7ea5b3d5046f745314c4ede0
7
- data.tar.gz: 7db29a409f58d36a17c51e93bb249aa37df07dd7691f996b346e8e521d9fbe0d96da29cba9134817496cf2c291c1899cf4ddd69950d5a97c1ca125dc127e724c
6
+ metadata.gz: 7c3654e4d24fcd09c022e727737975d919947d4163c5e2c99487e48c51445c6306b498663527ef8383dbdaacd1b5571b2dd482dd03ab037ba88da8e62fce05de
7
+ data.tar.gz: 24203610a07e82f3898ef94eb60f2f6de8b77d2db97d18c01dc55669331b511d3fbb616ec6669aabfc3768443d7fb53807d30b00e75a1fcd8c802f625ca05214
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.148.0 (2025-12-02)
5
+ ------------------
6
+
7
+ * Feature - ITSM enhancements: DRYRUN mode for testing ticket creation, ServiceNow now uses AWS Secrets Manager for credentials, ConnectorRegistrationsV2 renamed to RegisterConnectorV2, added ServiceQuotaExceededException error, and ConnectorStatus visibility in CreateConnectorV2.
8
+
4
9
  1.147.0 (2025-11-21)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.147.0
1
+ 1.148.0
@@ -2139,8 +2139,7 @@ module Aws::SecurityHub
2139
2139
  # permission to perform the `securityhub:BatchUpdateFindings` action.
2140
2140
  # Updates from `BatchUpdateFindingsV2` don't affect the value of
2141
2141
  # f`inding_info.modified_time`, `finding_info.modified_time_dt`, `time`,
2142
- # `time_dt for a finding`. This API is in public preview and subject to
2143
- # change.
2142
+ # `time_dt for a finding`.
2144
2143
  #
2145
2144
  # @option params [Array<String>] :metadata_uids
2146
2145
  # The list of finding `metadata.uid` to indicate findings to update.
@@ -2298,43 +2297,6 @@ module Aws::SecurityHub
2298
2297
  req.send_request(options)
2299
2298
  end
2300
2299
 
2301
- # Grants permission to complete the authorization based on input
2302
- # parameters. This API is in public preview and subject to change.
2303
- #
2304
- # @option params [required, String] :auth_code
2305
- # The authCode retrieved from authUrl to complete the OAuth 2.0
2306
- # authorization code flow.
2307
- #
2308
- # @option params [required, String] :auth_state
2309
- # The authState retrieved from authUrl to complete the OAuth 2.0
2310
- # authorization code flow.
2311
- #
2312
- # @return [Types::ConnectorRegistrationsV2Response] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
2313
- #
2314
- # * {Types::ConnectorRegistrationsV2Response#connector_arn #connector_arn} => String
2315
- # * {Types::ConnectorRegistrationsV2Response#connector_id #connector_id} => String
2316
- #
2317
- # @example Request syntax with placeholder values
2318
- #
2319
- # resp = client.connector_registrations_v2({
2320
- # auth_code: "NonEmptyString", # required
2321
- # auth_state: "NonEmptyString", # required
2322
- # })
2323
- #
2324
- # @example Response structure
2325
- #
2326
- # resp.connector_arn #=> String
2327
- # resp.connector_id #=> String
2328
- #
2329
- # @see http://docs.aws.amazon.com/goto/WebAPI/securityhub-2018-10-26/ConnectorRegistrationsV2 AWS API Documentation
2330
- #
2331
- # @overload connector_registrations_v2(params = {})
2332
- # @param [Hash] params ({})
2333
- def connector_registrations_v2(params = {}, options = {})
2334
- req = build_request(:connector_registrations_v2, params)
2335
- req.send_request(options)
2336
- end
2337
-
2338
2300
  # Creates a custom action target in Security Hub.
2339
2301
  #
2340
2302
  # You can use custom actions on findings and insights in Security Hub to
@@ -2392,8 +2354,7 @@ module Aws::SecurityHub
2392
2354
  req.send_request(options)
2393
2355
  end
2394
2356
 
2395
- # Enables aggregation across Amazon Web Services Regions. This API is in
2396
- # public preview and subject to change.
2357
+ # Enables aggregation across Amazon Web Services Regions.
2397
2358
  #
2398
2359
  # @option params [required, String] :region_linking_mode
2399
2360
  # Determines how Regions are linked to an Aggregator V2.
@@ -2878,8 +2839,7 @@ module Aws::SecurityHub
2878
2839
  req.send_request(options)
2879
2840
  end
2880
2841
 
2881
- # Creates a V2 automation rule. This API is in public preview and
2882
- # subject to change.
2842
+ # Creates a V2 automation rule.
2883
2843
  #
2884
2844
  # @option params [required, String] :rule_name
2885
2845
  # The name of the V2 automation rule.
@@ -2926,7 +2886,7 @@ module Aws::SecurityHub
2926
2886
  # {
2927
2887
  # string_filters: [
2928
2888
  # {
2929
- # field_name: "metadata.uid", # accepts metadata.uid, activity_name, cloud.account.uid, cloud.provider, cloud.region, compliance.assessments.category, compliance.assessments.name, compliance.control, compliance.status, compliance.standards, finding_info.desc, finding_info.src_url, finding_info.title, finding_info.types, finding_info.uid, finding_info.related_events.uid, finding_info.related_events.product.uid, finding_info.related_events.title, metadata.product.name, metadata.product.uid, metadata.product.vendor_name, remediation.desc, remediation.references, resources.cloud_partition, resources.region, resources.type, resources.uid, severity, status, comment, vulnerabilities.fix_coverage, class_name, databucket.encryption_details.algorithm, databucket.encryption_details.key_uid, databucket.file.data_classifications.classifier_details.type, evidences.actor.user.account.uid, evidences.api.operation, evidences.api.response.error_message, evidences.api.service.name, evidences.connection_info.direction, evidences.connection_info.protocol_name, evidences.dst_endpoint.autonomous_system.name, evidences.dst_endpoint.location.city, evidences.dst_endpoint.location.country, evidences.src_endpoint.autonomous_system.name, evidences.src_endpoint.hostname, evidences.src_endpoint.location.city, evidences.src_endpoint.location.country, finding_info.analytic.name, malware.name, malware_scan_info.uid, malware.severity, resources.cloud_function.layers.uid_alt, resources.cloud_function.runtime, resources.cloud_function.user.uid, resources.device.encryption_details.key_uid, resources.device.image.uid, resources.image.architecture, resources.image.registry_uid, resources.image.repository_name, resources.image.uid, resources.subnet_info.uid, resources.vpc_uid, vulnerabilities.affected_code.file.path, vulnerabilities.affected_packages.name, vulnerabilities.cve.epss.score, vulnerabilities.cve.uid, vulnerabilities.related_vulnerabilities, cloud.account.name
2889
+ # field_name: "metadata.uid", # accepts metadata.uid, activity_name, cloud.account.uid, cloud.provider, cloud.region, compliance.assessments.category, compliance.assessments.name, compliance.control, compliance.status, compliance.standards, finding_info.desc, finding_info.src_url, finding_info.title, finding_info.types, finding_info.uid, finding_info.related_events.traits.category, finding_info.related_events.uid, finding_info.related_events.product.uid, finding_info.related_events.title, metadata.product.name, metadata.product.uid, metadata.product.vendor_name, remediation.desc, remediation.references, resources.cloud_partition, resources.region, resources.type, resources.uid, severity, status, comment, vulnerabilities.fix_coverage, class_name, databucket.encryption_details.algorithm, databucket.encryption_details.key_uid, databucket.file.data_classifications.classifier_details.type, evidences.actor.user.account.uid, evidences.api.operation, evidences.api.response.error_message, evidences.api.service.name, evidences.connection_info.direction, evidences.connection_info.protocol_name, evidences.dst_endpoint.autonomous_system.name, evidences.dst_endpoint.location.city, evidences.dst_endpoint.location.country, evidences.src_endpoint.autonomous_system.name, evidences.src_endpoint.hostname, evidences.src_endpoint.location.city, evidences.src_endpoint.location.country, finding_info.analytic.name, malware.name, malware_scan_info.uid, malware.severity, resources.cloud_function.layers.uid_alt, resources.cloud_function.runtime, resources.cloud_function.user.uid, resources.device.encryption_details.key_uid, resources.device.image.uid, resources.image.architecture, resources.image.registry_uid, resources.image.repository_name, resources.image.uid, resources.subnet_info.uid, resources.vpc_uid, vulnerabilities.affected_code.file.path, vulnerabilities.affected_packages.name, vulnerabilities.cve.epss.score, vulnerabilities.cve.uid, vulnerabilities.related_vulnerabilities, cloud.account.name, vendor_attributes.severity
2930
2890
  # filter: {
2931
2891
  # value: "NonEmptyString",
2932
2892
  # comparison: "EQUALS", # accepts EQUALS, PREFIX, NOT_EQUALS, PREFIX_NOT_EQUALS, CONTAINS, NOT_CONTAINS, CONTAINS_WORD
@@ -2956,7 +2916,7 @@ module Aws::SecurityHub
2956
2916
  # ],
2957
2917
  # number_filters: [
2958
2918
  # {
2959
- # field_name: "activity_id", # accepts activity_id, compliance.status_id, confidence_score, severity_id, status_id, finding_info.related_events_count, evidences.api.response.code, evidences.dst_endpoint.autonomous_system.number, evidences.dst_endpoint.port, evidences.src_endpoint.autonomous_system.number, evidences.src_endpoint.port, resources.image.in_use_count
2919
+ # field_name: "activity_id", # accepts activity_id, compliance.status_id, confidence_score, severity_id, status_id, finding_info.related_events_count, evidences.api.response.code, evidences.dst_endpoint.autonomous_system.number, evidences.dst_endpoint.port, evidences.src_endpoint.autonomous_system.number, evidences.src_endpoint.port, resources.image.in_use_count, vulnerabilities.cve.cvss.base_score, vendor_attributes.severity_id
2960
2920
  # filter: {
2961
2921
  # gte: 1.0,
2962
2922
  # lte: 1.0,
@@ -3222,7 +3182,6 @@ module Aws::SecurityHub
3222
3182
  end
3223
3183
 
3224
3184
  # Grants permission to create a connectorV2 based on input parameters.
3225
- # This API is in public preview and subject to change.
3226
3185
  #
3227
3186
  # @option params [required, String] :name
3228
3187
  # The unique name of the connectorV2.
@@ -3251,6 +3210,7 @@ module Aws::SecurityHub
3251
3210
  # * {Types::CreateConnectorV2Response#connector_arn #connector_arn} => String
3252
3211
  # * {Types::CreateConnectorV2Response#connector_id #connector_id} => String
3253
3212
  # * {Types::CreateConnectorV2Response#auth_url #auth_url} => String
3213
+ # * {Types::CreateConnectorV2Response#connector_status #connector_status} => String
3254
3214
  #
3255
3215
  # @example Request syntax with placeholder values
3256
3216
  #
@@ -3263,8 +3223,7 @@ module Aws::SecurityHub
3263
3223
  # },
3264
3224
  # service_now: {
3265
3225
  # instance_name: "NonEmptyString", # required
3266
- # client_id: "NonEmptyString", # required
3267
- # client_secret: "SensitiveNonEmptyString", # required
3226
+ # secret_arn: "NonEmptyString", # required
3268
3227
  # },
3269
3228
  # },
3270
3229
  # kms_key_arn: "NonEmptyString",
@@ -3279,6 +3238,7 @@ module Aws::SecurityHub
3279
3238
  # resp.connector_arn #=> String
3280
3239
  # resp.connector_id #=> String
3281
3240
  # resp.auth_url #=> String
3241
+ # resp.connector_status #=> String, one of "CONNECTED", "FAILED_TO_CONNECT", "PENDING_CONFIGURATION", "PENDING_AUTHORIZATION"
3282
3242
  #
3283
3243
  # @see http://docs.aws.amazon.com/goto/WebAPI/securityhub-2018-10-26/CreateConnectorV2 AWS API Documentation
3284
3244
  #
@@ -4279,8 +4239,7 @@ module Aws::SecurityHub
4279
4239
  end
4280
4240
 
4281
4241
  # Grants permission to create a ticket in the chosen ITSM based on
4282
- # finding information for the provided finding metadata UID. This API is
4283
- # in public preview and subject to change.
4242
+ # finding information for the provided finding metadata UID.
4284
4243
  #
4285
4244
  # @option params [required, String] :connector_id
4286
4245
  # The UUID of the connectorV2 to identify connectorV2 resource.
@@ -4294,6 +4253,11 @@ module Aws::SecurityHub
4294
4253
  # **A suitable default value is auto-generated.** You should normally
4295
4254
  # not need to pass this option.**
4296
4255
  #
4256
+ # @option params [String] :mode
4257
+ # The mode for ticket creation. When set to DRYRUN, the ticket is
4258
+ # created using a Security Hub owned template test finding to verify the
4259
+ # integration is working correctly.
4260
+ #
4297
4261
  # @return [Types::CreateTicketV2Response] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
4298
4262
  #
4299
4263
  # * {Types::CreateTicketV2Response#ticket_id #ticket_id} => String
@@ -4305,6 +4269,7 @@ module Aws::SecurityHub
4305
4269
  # connector_id: "NonEmptyString", # required
4306
4270
  # finding_metadata_uid: "NonEmptyString", # required
4307
4271
  # client_token: "ClientToken",
4272
+ # mode: "DRYRUN", # accepts DRYRUN
4308
4273
  # })
4309
4274
  #
4310
4275
  # @example Response structure
@@ -4437,8 +4402,7 @@ module Aws::SecurityHub
4437
4402
  req.send_request(options)
4438
4403
  end
4439
4404
 
4440
- # Deletes the Aggregator V2. This API is in public preview and subject
4441
- # to change.
4405
+ # Deletes the Aggregator V2.
4442
4406
  #
4443
4407
  # @option params [required, String] :aggregator_v2_arn
4444
4408
  # The ARN of the Aggregator V2.
@@ -4460,8 +4424,7 @@ module Aws::SecurityHub
4460
4424
  req.send_request(options)
4461
4425
  end
4462
4426
 
4463
- # Deletes a V2 automation rule. This API is in public preview and
4464
- # subject to change.
4427
+ # Deletes a V2 automation rule.
4465
4428
  #
4466
4429
  # @option params [required, String] :identifier
4467
4430
  # The ARN of the V2 automation rule.
@@ -4519,8 +4482,7 @@ module Aws::SecurityHub
4519
4482
  req.send_request(options)
4520
4483
  end
4521
4484
 
4522
- # Grants permission to delete a connectorV2. This API is in public
4523
- # preview and subject to change.
4485
+ # Grants permission to delete a connectorV2.
4524
4486
  #
4525
4487
  # @option params [required, String] :connector_id
4526
4488
  # The UUID of the connectorV2 to identify connectorV2 resource.
@@ -5026,8 +4988,7 @@ module Aws::SecurityHub
5026
4988
  req.send_request(options)
5027
4989
  end
5028
4990
 
5029
- # Gets information about the product integration. This API is in public
5030
- # preview and subject to change.
4991
+ # Gets information about the product integration.
5031
4992
  #
5032
4993
  # @option params [String] :next_token
5033
4994
  # The token required for pagination. On your first call, set the value
@@ -5075,8 +5036,7 @@ module Aws::SecurityHub
5075
5036
  req.send_request(options)
5076
5037
  end
5077
5038
 
5078
- # Returns details about the service resource in your account. This API
5079
- # is in public preview and subject to change.
5039
+ # Returns details about the service resource in your account.
5080
5040
  #
5081
5041
  # @return [Types::DescribeSecurityHubV2Response] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
5082
5042
  #
@@ -5405,8 +5365,7 @@ module Aws::SecurityHub
5405
5365
  end
5406
5366
 
5407
5367
  # Disable the service for the current Amazon Web Services Region or
5408
- # specified Amazon Web Services Region. This API is in public preview
5409
- # and subject to change.
5368
+ # specified Amazon Web Services Region.
5410
5369
  #
5411
5370
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
5412
5371
  #
@@ -5703,8 +5662,7 @@ module Aws::SecurityHub
5703
5662
  end
5704
5663
 
5705
5664
  # Enables the service in account for the current Amazon Web Services
5706
- # Region or specified Amazon Web Services Region. This API is in public
5707
- # preview and subject to change.
5665
+ # Region or specified Amazon Web Services Region.
5708
5666
  #
5709
5667
  # @option params [Hash<String,String>] :tags
5710
5668
  # The tags to add to the hub V2 resource when you enable Security Hub.
@@ -5778,8 +5736,7 @@ module Aws::SecurityHub
5778
5736
  req.send_request(options)
5779
5737
  end
5780
5738
 
5781
- # Returns the configuration of the specified Aggregator V2. This API is
5782
- # in public preview and subject to change.
5739
+ # Returns the configuration of the specified Aggregator V2.
5783
5740
  #
5784
5741
  # @option params [required, String] :aggregator_v2_arn
5785
5742
  # The ARN of the Aggregator V2.
@@ -5814,8 +5771,7 @@ module Aws::SecurityHub
5814
5771
  req.send_request(options)
5815
5772
  end
5816
5773
 
5817
- # Returns an automation rule for the V2 service. This API is in public
5818
- # preview and subject to change.
5774
+ # Returns an automation rule for the V2 service.
5819
5775
  #
5820
5776
  # @option params [required, String] :identifier
5821
5777
  # The ARN of the V2 automation rule.
@@ -5849,7 +5805,7 @@ module Aws::SecurityHub
5849
5805
  # resp.description #=> String
5850
5806
  # resp.criteria.ocsf_finding_criteria.composite_filters #=> Array
5851
5807
  # resp.criteria.ocsf_finding_criteria.composite_filters[0].string_filters #=> Array
5852
- # resp.criteria.ocsf_finding_criteria.composite_filters[0].string_filters[0].field_name #=> String, one of "metadata.uid", "activity_name", "cloud.account.uid", "cloud.provider", "cloud.region", "compliance.assessments.category", "compliance.assessments.name", "compliance.control", "compliance.status", "compliance.standards", "finding_info.desc", "finding_info.src_url", "finding_info.title", "finding_info.types", "finding_info.uid", "finding_info.related_events.uid", "finding_info.related_events.product.uid", "finding_info.related_events.title", "metadata.product.name", "metadata.product.uid", "metadata.product.vendor_name", "remediation.desc", "remediation.references", "resources.cloud_partition", "resources.region", "resources.type", "resources.uid", "severity", "status", "comment", "vulnerabilities.fix_coverage", "class_name", "databucket.encryption_details.algorithm", "databucket.encryption_details.key_uid", "databucket.file.data_classifications.classifier_details.type", "evidences.actor.user.account.uid", "evidences.api.operation", "evidences.api.response.error_message", "evidences.api.service.name", "evidences.connection_info.direction", "evidences.connection_info.protocol_name", "evidences.dst_endpoint.autonomous_system.name", "evidences.dst_endpoint.location.city", "evidences.dst_endpoint.location.country", "evidences.src_endpoint.autonomous_system.name", "evidences.src_endpoint.hostname", "evidences.src_endpoint.location.city", "evidences.src_endpoint.location.country", "finding_info.analytic.name", "malware.name", "malware_scan_info.uid", "malware.severity", "resources.cloud_function.layers.uid_alt", "resources.cloud_function.runtime", "resources.cloud_function.user.uid", "resources.device.encryption_details.key_uid", "resources.device.image.uid", "resources.image.architecture", "resources.image.registry_uid", "resources.image.repository_name", "resources.image.uid", "resources.subnet_info.uid", "resources.vpc_uid", "vulnerabilities.affected_code.file.path", "vulnerabilities.affected_packages.name", "vulnerabilities.cve.epss.score", "vulnerabilities.cve.uid", "vulnerabilities.related_vulnerabilities", "cloud.account.name"
5808
+ # resp.criteria.ocsf_finding_criteria.composite_filters[0].string_filters[0].field_name #=> String, one of "metadata.uid", "activity_name", "cloud.account.uid", "cloud.provider", "cloud.region", "compliance.assessments.category", "compliance.assessments.name", "compliance.control", "compliance.status", "compliance.standards", "finding_info.desc", "finding_info.src_url", "finding_info.title", "finding_info.types", "finding_info.uid", "finding_info.related_events.traits.category", "finding_info.related_events.uid", "finding_info.related_events.product.uid", "finding_info.related_events.title", "metadata.product.name", "metadata.product.uid", "metadata.product.vendor_name", "remediation.desc", "remediation.references", "resources.cloud_partition", "resources.region", "resources.type", "resources.uid", "severity", "status", "comment", "vulnerabilities.fix_coverage", "class_name", "databucket.encryption_details.algorithm", "databucket.encryption_details.key_uid", "databucket.file.data_classifications.classifier_details.type", "evidences.actor.user.account.uid", "evidences.api.operation", "evidences.api.response.error_message", "evidences.api.service.name", "evidences.connection_info.direction", "evidences.connection_info.protocol_name", "evidences.dst_endpoint.autonomous_system.name", "evidences.dst_endpoint.location.city", "evidences.dst_endpoint.location.country", "evidences.src_endpoint.autonomous_system.name", "evidences.src_endpoint.hostname", "evidences.src_endpoint.location.city", "evidences.src_endpoint.location.country", "finding_info.analytic.name", "malware.name", "malware_scan_info.uid", "malware.severity", "resources.cloud_function.layers.uid_alt", "resources.cloud_function.runtime", "resources.cloud_function.user.uid", "resources.device.encryption_details.key_uid", "resources.device.image.uid", "resources.image.architecture", "resources.image.registry_uid", "resources.image.repository_name", "resources.image.uid", "resources.subnet_info.uid", "resources.vpc_uid", "vulnerabilities.affected_code.file.path", "vulnerabilities.affected_packages.name", "vulnerabilities.cve.epss.score", "vulnerabilities.cve.uid", "vulnerabilities.related_vulnerabilities", "cloud.account.name", "vendor_attributes.severity"
5853
5809
  # resp.criteria.ocsf_finding_criteria.composite_filters[0].string_filters[0].filter.value #=> String
5854
5810
  # resp.criteria.ocsf_finding_criteria.composite_filters[0].string_filters[0].filter.comparison #=> String, one of "EQUALS", "PREFIX", "NOT_EQUALS", "PREFIX_NOT_EQUALS", "CONTAINS", "NOT_CONTAINS", "CONTAINS_WORD"
5855
5811
  # resp.criteria.ocsf_finding_criteria.composite_filters[0].date_filters #=> Array
@@ -5862,7 +5818,7 @@ module Aws::SecurityHub
5862
5818
  # resp.criteria.ocsf_finding_criteria.composite_filters[0].boolean_filters[0].field_name #=> String, one of "compliance.assessments.meets_criteria", "vulnerabilities.is_exploit_available", "vulnerabilities.is_fix_available"
5863
5819
  # resp.criteria.ocsf_finding_criteria.composite_filters[0].boolean_filters[0].filter.value #=> Boolean
5864
5820
  # resp.criteria.ocsf_finding_criteria.composite_filters[0].number_filters #=> Array
5865
- # resp.criteria.ocsf_finding_criteria.composite_filters[0].number_filters[0].field_name #=> String, one of "activity_id", "compliance.status_id", "confidence_score", "severity_id", "status_id", "finding_info.related_events_count", "evidences.api.response.code", "evidences.dst_endpoint.autonomous_system.number", "evidences.dst_endpoint.port", "evidences.src_endpoint.autonomous_system.number", "evidences.src_endpoint.port", "resources.image.in_use_count"
5821
+ # resp.criteria.ocsf_finding_criteria.composite_filters[0].number_filters[0].field_name #=> String, one of "activity_id", "compliance.status_id", "confidence_score", "severity_id", "status_id", "finding_info.related_events_count", "evidences.api.response.code", "evidences.dst_endpoint.autonomous_system.number", "evidences.dst_endpoint.port", "evidences.src_endpoint.autonomous_system.number", "evidences.src_endpoint.port", "resources.image.in_use_count", "vulnerabilities.cve.cvss.base_score", "vendor_attributes.severity_id"
5866
5822
  # resp.criteria.ocsf_finding_criteria.composite_filters[0].number_filters[0].filter.gte #=> Float
5867
5823
  # resp.criteria.ocsf_finding_criteria.composite_filters[0].number_filters[0].filter.lte #=> Float
5868
5824
  # resp.criteria.ocsf_finding_criteria.composite_filters[0].number_filters[0].filter.eq #=> Float
@@ -6080,7 +6036,7 @@ module Aws::SecurityHub
6080
6036
  end
6081
6037
 
6082
6038
  # Grants permission to retrieve details for a connectorV2 based on
6083
- # connector id. This API is in public preview and subject to change.
6039
+ # connector id.
6084
6040
  #
6085
6041
  # @option params [required, String] :connector_id
6086
6042
  # The UUID of the connectorV2 to identify connectorV2 resource.
@@ -6121,7 +6077,7 @@ module Aws::SecurityHub
6121
6077
  # resp.provider_detail.jira_cloud.auth_url #=> String
6122
6078
  # resp.provider_detail.jira_cloud.auth_status #=> String, one of "ACTIVE", "FAILED"
6123
6079
  # resp.provider_detail.service_now.instance_name #=> String
6124
- # resp.provider_detail.service_now.client_id #=> String
6080
+ # resp.provider_detail.service_now.secret_arn #=> String
6125
6081
  # resp.provider_detail.service_now.auth_status #=> String, one of "ACTIVE", "FAILED"
6126
6082
  #
6127
6083
  # @see http://docs.aws.amazon.com/goto/WebAPI/securityhub-2018-10-26/GetConnectorV2 AWS API Documentation
@@ -6438,8 +6394,7 @@ module Aws::SecurityHub
6438
6394
  # Returns aggregated statistical data about findings.
6439
6395
  # `GetFindingStatisticsV2` use `securityhub:GetAdhocInsightResults` in
6440
6396
  # the `Action` element of an IAM policy statement. You must have
6441
- # permission to perform the `s` action. This API is in public preview
6442
- # and subject to change.
6397
+ # permission to perform the `s` action.
6443
6398
  #
6444
6399
  # @option params [required, Array<Types::GroupByRule>] :group_by_rules
6445
6400
  # Specifies how security findings should be aggregated and organized in
@@ -6467,7 +6422,7 @@ module Aws::SecurityHub
6467
6422
  # {
6468
6423
  # string_filters: [
6469
6424
  # {
6470
- # field_name: "metadata.uid", # accepts metadata.uid, activity_name, cloud.account.uid, cloud.provider, cloud.region, compliance.assessments.category, compliance.assessments.name, compliance.control, compliance.status, compliance.standards, finding_info.desc, finding_info.src_url, finding_info.title, finding_info.types, finding_info.uid, finding_info.related_events.uid, finding_info.related_events.product.uid, finding_info.related_events.title, metadata.product.name, metadata.product.uid, metadata.product.vendor_name, remediation.desc, remediation.references, resources.cloud_partition, resources.region, resources.type, resources.uid, severity, status, comment, vulnerabilities.fix_coverage, class_name, databucket.encryption_details.algorithm, databucket.encryption_details.key_uid, databucket.file.data_classifications.classifier_details.type, evidences.actor.user.account.uid, evidences.api.operation, evidences.api.response.error_message, evidences.api.service.name, evidences.connection_info.direction, evidences.connection_info.protocol_name, evidences.dst_endpoint.autonomous_system.name, evidences.dst_endpoint.location.city, evidences.dst_endpoint.location.country, evidences.src_endpoint.autonomous_system.name, evidences.src_endpoint.hostname, evidences.src_endpoint.location.city, evidences.src_endpoint.location.country, finding_info.analytic.name, malware.name, malware_scan_info.uid, malware.severity, resources.cloud_function.layers.uid_alt, resources.cloud_function.runtime, resources.cloud_function.user.uid, resources.device.encryption_details.key_uid, resources.device.image.uid, resources.image.architecture, resources.image.registry_uid, resources.image.repository_name, resources.image.uid, resources.subnet_info.uid, resources.vpc_uid, vulnerabilities.affected_code.file.path, vulnerabilities.affected_packages.name, vulnerabilities.cve.epss.score, vulnerabilities.cve.uid, vulnerabilities.related_vulnerabilities, cloud.account.name
6425
+ # field_name: "metadata.uid", # accepts metadata.uid, activity_name, cloud.account.uid, cloud.provider, cloud.region, compliance.assessments.category, compliance.assessments.name, compliance.control, compliance.status, compliance.standards, finding_info.desc, finding_info.src_url, finding_info.title, finding_info.types, finding_info.uid, finding_info.related_events.traits.category, finding_info.related_events.uid, finding_info.related_events.product.uid, finding_info.related_events.title, metadata.product.name, metadata.product.uid, metadata.product.vendor_name, remediation.desc, remediation.references, resources.cloud_partition, resources.region, resources.type, resources.uid, severity, status, comment, vulnerabilities.fix_coverage, class_name, databucket.encryption_details.algorithm, databucket.encryption_details.key_uid, databucket.file.data_classifications.classifier_details.type, evidences.actor.user.account.uid, evidences.api.operation, evidences.api.response.error_message, evidences.api.service.name, evidences.connection_info.direction, evidences.connection_info.protocol_name, evidences.dst_endpoint.autonomous_system.name, evidences.dst_endpoint.location.city, evidences.dst_endpoint.location.country, evidences.src_endpoint.autonomous_system.name, evidences.src_endpoint.hostname, evidences.src_endpoint.location.city, evidences.src_endpoint.location.country, finding_info.analytic.name, malware.name, malware_scan_info.uid, malware.severity, resources.cloud_function.layers.uid_alt, resources.cloud_function.runtime, resources.cloud_function.user.uid, resources.device.encryption_details.key_uid, resources.device.image.uid, resources.image.architecture, resources.image.registry_uid, resources.image.repository_name, resources.image.uid, resources.subnet_info.uid, resources.vpc_uid, vulnerabilities.affected_code.file.path, vulnerabilities.affected_packages.name, vulnerabilities.cve.epss.score, vulnerabilities.cve.uid, vulnerabilities.related_vulnerabilities, cloud.account.name, vendor_attributes.severity
6471
6426
  # filter: {
6472
6427
  # value: "NonEmptyString",
6473
6428
  # comparison: "EQUALS", # accepts EQUALS, PREFIX, NOT_EQUALS, PREFIX_NOT_EQUALS, CONTAINS, NOT_CONTAINS, CONTAINS_WORD
@@ -6497,7 +6452,7 @@ module Aws::SecurityHub
6497
6452
  # ],
6498
6453
  # number_filters: [
6499
6454
  # {
6500
- # field_name: "activity_id", # accepts activity_id, compliance.status_id, confidence_score, severity_id, status_id, finding_info.related_events_count, evidences.api.response.code, evidences.dst_endpoint.autonomous_system.number, evidences.dst_endpoint.port, evidences.src_endpoint.autonomous_system.number, evidences.src_endpoint.port, resources.image.in_use_count
6455
+ # field_name: "activity_id", # accepts activity_id, compliance.status_id, confidence_score, severity_id, status_id, finding_info.related_events_count, evidences.api.response.code, evidences.dst_endpoint.autonomous_system.number, evidences.dst_endpoint.port, evidences.src_endpoint.autonomous_system.number, evidences.src_endpoint.port, resources.image.in_use_count, vulnerabilities.cve.cvss.base_score, vendor_attributes.severity_id
6501
6456
  # filter: {
6502
6457
  # gte: 1.0,
6503
6458
  # lte: 1.0,
@@ -6533,7 +6488,7 @@ module Aws::SecurityHub
6533
6488
  # ],
6534
6489
  # composite_operator: "AND", # accepts AND, OR
6535
6490
  # },
6536
- # group_by_field: "activity_name", # required, accepts activity_name, cloud.account.uid, cloud.provider, cloud.region, compliance.assessments.name, compliance.status, compliance.control, finding_info.title, finding_info.types, metadata.product.name, metadata.product.uid, resources.type, resources.uid, severity, status, vulnerabilities.fix_coverage, class_name, vulnerabilities.affected_packages.name, finding_info.analytic.name, compliance.standards, cloud.account.name
6491
+ # group_by_field: "activity_name", # required, accepts activity_name, cloud.account.uid, cloud.provider, cloud.region, compliance.assessments.name, compliance.status, compliance.control, finding_info.title, finding_info.related_events.traits.category, finding_info.types, metadata.product.name, metadata.product.uid, resources.type, resources.uid, severity, status, vulnerabilities.fix_coverage, class_name, vulnerabilities.affected_packages.name, finding_info.analytic.name, compliance.standards, cloud.account.name, vendor_attributes.severity
6537
6492
  # },
6538
6493
  # ],
6539
6494
  # sort_order: "asc", # accepts asc, desc
@@ -7424,7 +7379,7 @@ module Aws::SecurityHub
7424
7379
 
7425
7380
  # Returns findings trend data based on the specified criteria. This
7426
7381
  # operation helps you analyze patterns and changes in findings over
7427
- # time. This API is in public preview and subject to change.
7382
+ # time.
7428
7383
  #
7429
7384
  # @option params [Types::FindingsTrendsFilters] :filters
7430
7385
  # The filters to apply to the findings trend data.
@@ -7509,8 +7464,7 @@ module Aws::SecurityHub
7509
7464
  # Return a list of findings that match the specified criteria.
7510
7465
  # `GetFindings` and `GetFindingsV2` both use `securityhub:GetFindings`
7511
7466
  # in the `Action` element of an IAM policy statement. You must have
7512
- # permission to perform the `securityhub:GetFindings` action. This API
7513
- # is in public preview and subject to change.
7467
+ # permission to perform the `securityhub:GetFindings` action.
7514
7468
  #
7515
7469
  # @option params [Types::OcsfFindingFilters] :filters
7516
7470
  # The finding attributes used to define a condition to filter the
@@ -7545,7 +7499,7 @@ module Aws::SecurityHub
7545
7499
  # {
7546
7500
  # string_filters: [
7547
7501
  # {
7548
- # field_name: "metadata.uid", # accepts metadata.uid, activity_name, cloud.account.uid, cloud.provider, cloud.region, compliance.assessments.category, compliance.assessments.name, compliance.control, compliance.status, compliance.standards, finding_info.desc, finding_info.src_url, finding_info.title, finding_info.types, finding_info.uid, finding_info.related_events.uid, finding_info.related_events.product.uid, finding_info.related_events.title, metadata.product.name, metadata.product.uid, metadata.product.vendor_name, remediation.desc, remediation.references, resources.cloud_partition, resources.region, resources.type, resources.uid, severity, status, comment, vulnerabilities.fix_coverage, class_name, databucket.encryption_details.algorithm, databucket.encryption_details.key_uid, databucket.file.data_classifications.classifier_details.type, evidences.actor.user.account.uid, evidences.api.operation, evidences.api.response.error_message, evidences.api.service.name, evidences.connection_info.direction, evidences.connection_info.protocol_name, evidences.dst_endpoint.autonomous_system.name, evidences.dst_endpoint.location.city, evidences.dst_endpoint.location.country, evidences.src_endpoint.autonomous_system.name, evidences.src_endpoint.hostname, evidences.src_endpoint.location.city, evidences.src_endpoint.location.country, finding_info.analytic.name, malware.name, malware_scan_info.uid, malware.severity, resources.cloud_function.layers.uid_alt, resources.cloud_function.runtime, resources.cloud_function.user.uid, resources.device.encryption_details.key_uid, resources.device.image.uid, resources.image.architecture, resources.image.registry_uid, resources.image.repository_name, resources.image.uid, resources.subnet_info.uid, resources.vpc_uid, vulnerabilities.affected_code.file.path, vulnerabilities.affected_packages.name, vulnerabilities.cve.epss.score, vulnerabilities.cve.uid, vulnerabilities.related_vulnerabilities, cloud.account.name
7502
+ # field_name: "metadata.uid", # accepts metadata.uid, activity_name, cloud.account.uid, cloud.provider, cloud.region, compliance.assessments.category, compliance.assessments.name, compliance.control, compliance.status, compliance.standards, finding_info.desc, finding_info.src_url, finding_info.title, finding_info.types, finding_info.uid, finding_info.related_events.traits.category, finding_info.related_events.uid, finding_info.related_events.product.uid, finding_info.related_events.title, metadata.product.name, metadata.product.uid, metadata.product.vendor_name, remediation.desc, remediation.references, resources.cloud_partition, resources.region, resources.type, resources.uid, severity, status, comment, vulnerabilities.fix_coverage, class_name, databucket.encryption_details.algorithm, databucket.encryption_details.key_uid, databucket.file.data_classifications.classifier_details.type, evidences.actor.user.account.uid, evidences.api.operation, evidences.api.response.error_message, evidences.api.service.name, evidences.connection_info.direction, evidences.connection_info.protocol_name, evidences.dst_endpoint.autonomous_system.name, evidences.dst_endpoint.location.city, evidences.dst_endpoint.location.country, evidences.src_endpoint.autonomous_system.name, evidences.src_endpoint.hostname, evidences.src_endpoint.location.city, evidences.src_endpoint.location.country, finding_info.analytic.name, malware.name, malware_scan_info.uid, malware.severity, resources.cloud_function.layers.uid_alt, resources.cloud_function.runtime, resources.cloud_function.user.uid, resources.device.encryption_details.key_uid, resources.device.image.uid, resources.image.architecture, resources.image.registry_uid, resources.image.repository_name, resources.image.uid, resources.subnet_info.uid, resources.vpc_uid, vulnerabilities.affected_code.file.path, vulnerabilities.affected_packages.name, vulnerabilities.cve.epss.score, vulnerabilities.cve.uid, vulnerabilities.related_vulnerabilities, cloud.account.name, vendor_attributes.severity
7549
7503
  # filter: {
7550
7504
  # value: "NonEmptyString",
7551
7505
  # comparison: "EQUALS", # accepts EQUALS, PREFIX, NOT_EQUALS, PREFIX_NOT_EQUALS, CONTAINS, NOT_CONTAINS, CONTAINS_WORD
@@ -7575,7 +7529,7 @@ module Aws::SecurityHub
7575
7529
  # ],
7576
7530
  # number_filters: [
7577
7531
  # {
7578
- # field_name: "activity_id", # accepts activity_id, compliance.status_id, confidence_score, severity_id, status_id, finding_info.related_events_count, evidences.api.response.code, evidences.dst_endpoint.autonomous_system.number, evidences.dst_endpoint.port, evidences.src_endpoint.autonomous_system.number, evidences.src_endpoint.port, resources.image.in_use_count
7532
+ # field_name: "activity_id", # accepts activity_id, compliance.status_id, confidence_score, severity_id, status_id, finding_info.related_events_count, evidences.api.response.code, evidences.dst_endpoint.autonomous_system.number, evidences.dst_endpoint.port, evidences.src_endpoint.autonomous_system.number, evidences.src_endpoint.port, resources.image.in_use_count, vulnerabilities.cve.cvss.base_score, vendor_attributes.severity_id
7579
7533
  # filter: {
7580
7534
  # gte: 1.0,
7581
7535
  # lte: 1.0,
@@ -8309,8 +8263,7 @@ module Aws::SecurityHub
8309
8263
  end
8310
8264
 
8311
8265
  # Retrieves statistical information about Amazon Web Services resources
8312
- # and their associated security findings. This API is in public preview
8313
- # and subject to change.
8266
+ # and their associated security findings.
8314
8267
  #
8315
8268
  # @option params [required, Array<Types::ResourceGroupByRule>] :group_by_rules
8316
8269
  # How resource statistics should be aggregated and organized in the
@@ -8412,8 +8365,7 @@ module Aws::SecurityHub
8412
8365
 
8413
8366
  # Returns resource trend data based on the specified criteria. This
8414
8367
  # operation helps you analyze patterns and changes in resource
8415
- # compliance over time. This API is in public preview and subject to
8416
- # change.
8368
+ # compliance over time.
8417
8369
  #
8418
8370
  # @option params [Types::ResourcesTrendsFilters] :filters
8419
8371
  # The filters to apply to the resources trend data.
@@ -8488,8 +8440,7 @@ module Aws::SecurityHub
8488
8440
  req.send_request(options)
8489
8441
  end
8490
8442
 
8491
- # Returns a list of resources. This API is in public preview and subject
8492
- # to change.
8443
+ # Returns a list of resources.
8493
8444
  #
8494
8445
  # @option params [Types::ResourcesFilters] :filters
8495
8446
  # Filters resources based on a set of criteria.
@@ -8796,8 +8747,7 @@ module Aws::SecurityHub
8796
8747
  req.send_request(options)
8797
8748
  end
8798
8749
 
8799
- # Retrieves a list of V2 aggregators. This API is in public preview and
8800
- # subject to change.
8750
+ # Retrieves a list of V2 aggregators.
8801
8751
  #
8802
8752
  # @option params [String] :next_token
8803
8753
  # The token required for pagination. On your first call, set the value
@@ -8922,7 +8872,7 @@ module Aws::SecurityHub
8922
8872
  end
8923
8873
 
8924
8874
  # Returns a list of automation rules and metadata for the calling
8925
- # account. This API is in public preview and subject to change.
8875
+ # account.
8926
8876
  #
8927
8877
  # @option params [String] :next_token
8928
8878
  # The token required for pagination. On your first call, set the value
@@ -9149,8 +9099,7 @@ module Aws::SecurityHub
9149
9099
  end
9150
9100
 
9151
9101
  # Grants permission to retrieve a list of connectorsV2 and their
9152
- # metadata for the calling account. This API is in public preview and
9153
- # subject to change.
9102
+ # metadata for the calling account.
9154
9103
  #
9155
9104
  # @option params [String] :next_token
9156
9105
  # The pagination token per the Amazon Web Services Pagination standard
@@ -9855,6 +9804,43 @@ module Aws::SecurityHub
9855
9804
  req.send_request(options)
9856
9805
  end
9857
9806
 
9807
+ # Grants permission to complete the authorization based on input
9808
+ # parameters.
9809
+ #
9810
+ # @option params [required, String] :auth_code
9811
+ # The authCode retrieved from authUrl to complete the OAuth 2.0
9812
+ # authorization code flow.
9813
+ #
9814
+ # @option params [required, String] :auth_state
9815
+ # The authState retrieved from authUrl to complete the OAuth 2.0
9816
+ # authorization code flow.
9817
+ #
9818
+ # @return [Types::RegisterConnectorV2Response] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
9819
+ #
9820
+ # * {Types::RegisterConnectorV2Response#connector_arn #connector_arn} => String
9821
+ # * {Types::RegisterConnectorV2Response#connector_id #connector_id} => String
9822
+ #
9823
+ # @example Request syntax with placeholder values
9824
+ #
9825
+ # resp = client.register_connector_v2({
9826
+ # auth_code: "NonEmptyString", # required
9827
+ # auth_state: "NonEmptyString", # required
9828
+ # })
9829
+ #
9830
+ # @example Response structure
9831
+ #
9832
+ # resp.connector_arn #=> String
9833
+ # resp.connector_id #=> String
9834
+ #
9835
+ # @see http://docs.aws.amazon.com/goto/WebAPI/securityhub-2018-10-26/RegisterConnectorV2 AWS API Documentation
9836
+ #
9837
+ # @overload register_connector_v2(params = {})
9838
+ # @param [Hash] params ({})
9839
+ def register_connector_v2(params = {}, options = {})
9840
+ req = build_request(:register_connector_v2, params)
9841
+ req.send_request(options)
9842
+ end
9843
+
9858
9844
  # Associates a target account, organizational unit, or the root with a
9859
9845
  # specified configuration. The target can be associated with a
9860
9846
  # configuration policy or self-managed behavior. Only the Security Hub
@@ -10112,8 +10098,7 @@ module Aws::SecurityHub
10112
10098
  req.send_request(options)
10113
10099
  end
10114
10100
 
10115
- # Udpates the configuration for the Aggregator V2. This API is in public
10116
- # preview and subject to change.
10101
+ # Udpates the configuration for the Aggregator V2.
10117
10102
  #
10118
10103
  # @option params [required, String] :aggregator_v2_arn
10119
10104
  # The ARN of the Aggregator V2.
@@ -10157,8 +10142,7 @@ module Aws::SecurityHub
10157
10142
  req.send_request(options)
10158
10143
  end
10159
10144
 
10160
- # Updates a V2 automation rule. This API is in public preview and
10161
- # subject to change.
10145
+ # Updates a V2 automation rule.
10162
10146
  #
10163
10147
  # @option params [required, String] :identifier
10164
10148
  # The ARN of the automation rule.
@@ -10197,7 +10181,7 @@ module Aws::SecurityHub
10197
10181
  # {
10198
10182
  # string_filters: [
10199
10183
  # {
10200
- # field_name: "metadata.uid", # accepts metadata.uid, activity_name, cloud.account.uid, cloud.provider, cloud.region, compliance.assessments.category, compliance.assessments.name, compliance.control, compliance.status, compliance.standards, finding_info.desc, finding_info.src_url, finding_info.title, finding_info.types, finding_info.uid, finding_info.related_events.uid, finding_info.related_events.product.uid, finding_info.related_events.title, metadata.product.name, metadata.product.uid, metadata.product.vendor_name, remediation.desc, remediation.references, resources.cloud_partition, resources.region, resources.type, resources.uid, severity, status, comment, vulnerabilities.fix_coverage, class_name, databucket.encryption_details.algorithm, databucket.encryption_details.key_uid, databucket.file.data_classifications.classifier_details.type, evidences.actor.user.account.uid, evidences.api.operation, evidences.api.response.error_message, evidences.api.service.name, evidences.connection_info.direction, evidences.connection_info.protocol_name, evidences.dst_endpoint.autonomous_system.name, evidences.dst_endpoint.location.city, evidences.dst_endpoint.location.country, evidences.src_endpoint.autonomous_system.name, evidences.src_endpoint.hostname, evidences.src_endpoint.location.city, evidences.src_endpoint.location.country, finding_info.analytic.name, malware.name, malware_scan_info.uid, malware.severity, resources.cloud_function.layers.uid_alt, resources.cloud_function.runtime, resources.cloud_function.user.uid, resources.device.encryption_details.key_uid, resources.device.image.uid, resources.image.architecture, resources.image.registry_uid, resources.image.repository_name, resources.image.uid, resources.subnet_info.uid, resources.vpc_uid, vulnerabilities.affected_code.file.path, vulnerabilities.affected_packages.name, vulnerabilities.cve.epss.score, vulnerabilities.cve.uid, vulnerabilities.related_vulnerabilities, cloud.account.name
10184
+ # field_name: "metadata.uid", # accepts metadata.uid, activity_name, cloud.account.uid, cloud.provider, cloud.region, compliance.assessments.category, compliance.assessments.name, compliance.control, compliance.status, compliance.standards, finding_info.desc, finding_info.src_url, finding_info.title, finding_info.types, finding_info.uid, finding_info.related_events.traits.category, finding_info.related_events.uid, finding_info.related_events.product.uid, finding_info.related_events.title, metadata.product.name, metadata.product.uid, metadata.product.vendor_name, remediation.desc, remediation.references, resources.cloud_partition, resources.region, resources.type, resources.uid, severity, status, comment, vulnerabilities.fix_coverage, class_name, databucket.encryption_details.algorithm, databucket.encryption_details.key_uid, databucket.file.data_classifications.classifier_details.type, evidences.actor.user.account.uid, evidences.api.operation, evidences.api.response.error_message, evidences.api.service.name, evidences.connection_info.direction, evidences.connection_info.protocol_name, evidences.dst_endpoint.autonomous_system.name, evidences.dst_endpoint.location.city, evidences.dst_endpoint.location.country, evidences.src_endpoint.autonomous_system.name, evidences.src_endpoint.hostname, evidences.src_endpoint.location.city, evidences.src_endpoint.location.country, finding_info.analytic.name, malware.name, malware_scan_info.uid, malware.severity, resources.cloud_function.layers.uid_alt, resources.cloud_function.runtime, resources.cloud_function.user.uid, resources.device.encryption_details.key_uid, resources.device.image.uid, resources.image.architecture, resources.image.registry_uid, resources.image.repository_name, resources.image.uid, resources.subnet_info.uid, resources.vpc_uid, vulnerabilities.affected_code.file.path, vulnerabilities.affected_packages.name, vulnerabilities.cve.epss.score, vulnerabilities.cve.uid, vulnerabilities.related_vulnerabilities, cloud.account.name, vendor_attributes.severity
10201
10185
  # filter: {
10202
10186
  # value: "NonEmptyString",
10203
10187
  # comparison: "EQUALS", # accepts EQUALS, PREFIX, NOT_EQUALS, PREFIX_NOT_EQUALS, CONTAINS, NOT_CONTAINS, CONTAINS_WORD
@@ -10227,7 +10211,7 @@ module Aws::SecurityHub
10227
10211
  # ],
10228
10212
  # number_filters: [
10229
10213
  # {
10230
- # field_name: "activity_id", # accepts activity_id, compliance.status_id, confidence_score, severity_id, status_id, finding_info.related_events_count, evidences.api.response.code, evidences.dst_endpoint.autonomous_system.number, evidences.dst_endpoint.port, evidences.src_endpoint.autonomous_system.number, evidences.src_endpoint.port, resources.image.in_use_count
10214
+ # field_name: "activity_id", # accepts activity_id, compliance.status_id, confidence_score, severity_id, status_id, finding_info.related_events_count, evidences.api.response.code, evidences.dst_endpoint.autonomous_system.number, evidences.dst_endpoint.port, evidences.src_endpoint.autonomous_system.number, evidences.src_endpoint.port, resources.image.in_use_count, vulnerabilities.cve.cvss.base_score, vendor_attributes.severity_id
10231
10215
  # filter: {
10232
10216
  # gte: 1.0,
10233
10217
  # lte: 1.0,
@@ -10489,14 +10473,11 @@ module Aws::SecurityHub
10489
10473
  end
10490
10474
 
10491
10475
  # Grants permission to update a connectorV2 based on its id and input
10492
- # parameters. This API is in public preview and subject to change.
10476
+ # parameters.
10493
10477
  #
10494
10478
  # @option params [required, String] :connector_id
10495
10479
  # The UUID of the connectorV2 to identify connectorV2 resource.
10496
10480
  #
10497
- # @option params [String] :client_secret
10498
- # The clientSecret of ServiceNow.
10499
- #
10500
10481
  # @option params [String] :description
10501
10482
  # The description of the connectorV2.
10502
10483
  #
@@ -10509,11 +10490,13 @@ module Aws::SecurityHub
10509
10490
  #
10510
10491
  # resp = client.update_connector_v2({
10511
10492
  # connector_id: "NonEmptyString", # required
10512
- # client_secret: "SensitiveNonEmptyString",
10513
10493
  # description: "NonEmptyString",
10514
10494
  # provider: {
10515
10495
  # jira_cloud: {
10516
- # project_key: "NonEmptyString", # required
10496
+ # project_key: "NonEmptyString",
10497
+ # },
10498
+ # service_now: {
10499
+ # secret_arn: "NonEmptyString",
10517
10500
  # },
10518
10501
  # },
10519
10502
  # })
@@ -12411,7 +12394,7 @@ module Aws::SecurityHub
12411
12394
  tracer: tracer
12412
12395
  )
12413
12396
  context[:gem_name] = 'aws-sdk-securityhub'
12414
- context[:gem_version] = '1.147.0'
12397
+ context[:gem_version] = '1.148.0'
12415
12398
  Seahorse::Client::Request.new(handlers, context)
12416
12399
  end
12417
12400