aws-sdk-securityhub 1.89.0 → 1.91.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -449,10 +449,10 @@ module Aws::SecurityHub
449
449
  # Specifies whether a rule is the last to be applied with respect to a
450
450
  # finding that matches the rule criteria. This is useful when a
451
451
  # finding matches the criteria for multiple rules, and each rule has
452
- # different actions. If the value of this field is set to `true` for a
453
- # rule, Security Hub applies the rule action to a finding that matches
454
- # the rule criteria and doesn't evaluate other rules for the
455
- # finding.
 The default value of this field is `false`.
452
+ # different actions. If a rule is terminal, Security Hub applies the
453
+ # rule action to a finding that matches the rule criteria and doesn't
454
+ # evaluate other rules for the finding. By default, a rule isn't
455
+ # terminal.
 The default value of this field is `false`.
456
456
  # @return [Boolean]
457
457
  #
458
458
  # @!attribute [rw] criteria
@@ -891,10 +891,10 @@ module Aws::SecurityHub
891
891
  # Specifies whether a rule is the last to be applied with respect to a
892
892
  # finding that matches the rule criteria. This is useful when a
893
893
  # finding matches the criteria for multiple rules, and each rule has
894
- # different actions. If the value of this field is set to `true` for a
895
- # rule, Security Hub applies the rule action to a finding that matches
896
- # the rule criteria and doesn't evaluate other rules for the
897
- # finding.
 The default value of this field is `false`.
894
+ # different actions. If a rule is terminal, Security Hub applies the
895
+ # rule action to a finding that matches the rule criteria and doesn't
896
+ # evaluate other rules for the finding. By default, a rule isn't
897
+ # terminal.
 The default value of this field is `false`.
898
898
  # @return [Boolean]
899
899
  #
900
900
  # @!attribute [rw] created_at
@@ -2195,6 +2195,106 @@ module Aws::SecurityHub
2195
2195
  include Aws::Structure
2196
2196
  end
2197
2197
 
2198
+ # The configuration of the workgroup, which includes the location in
2199
+ # Amazon Simple Storage Service (Amazon S3) where query results are
2200
+ # stored, the encryption option, if any, used for query results, whether
2201
+ # Amazon CloudWatch metrics are enabled for the workgroup, and the limit
2202
+ # for the amount of bytes scanned (cutoff) per query, if it is
2203
+ # specified.
2204
+ #
2205
+ # @!attribute [rw] result_configuration
2206
+ # The location in Amazon S3 where query and calculation results are
2207
+ # stored and the encryption option, if any, used for query and
2208
+ # calculation results. These are known as client-side settings. If
2209
+ # workgroup settings override client-side settings, then the query
2210
+ # uses the workgroup settings.
2211
+ # @return [Types::AwsAthenaWorkGroupConfigurationResultConfigurationDetails]
2212
+ #
2213
+ # @see http://docs.aws.amazon.com/goto/WebAPI/securityhub-2018-10-26/AwsAthenaWorkGroupConfigurationDetails AWS API Documentation
2214
+ #
2215
+ class AwsAthenaWorkGroupConfigurationDetails < Struct.new(
2216
+ :result_configuration)
2217
+ SENSITIVE = []
2218
+ include Aws::Structure
2219
+ end
2220
+
2221
+ # The location in Amazon Simple Storage Service (Amazon S3) where query
2222
+ # and calculation results are stored and the encryption option, if any,
2223
+ # used for query and calculation results. These are known as client-side
2224
+ # settings. If workgroup settings override client-side settings, then
2225
+ # the query uses the workgroup settings.
2226
+ #
2227
+ # @!attribute [rw] encryption_configuration
2228
+ # Specifies the method used to encrypt the user’s data stores in the
2229
+ # Athena workgroup.
2230
+ # @return [Types::AwsAthenaWorkGroupConfigurationResultConfigurationEncryptionConfigurationDetails]
2231
+ #
2232
+ # @see http://docs.aws.amazon.com/goto/WebAPI/securityhub-2018-10-26/AwsAthenaWorkGroupConfigurationResultConfigurationDetails AWS API Documentation
2233
+ #
2234
+ class AwsAthenaWorkGroupConfigurationResultConfigurationDetails < Struct.new(
2235
+ :encryption_configuration)
2236
+ SENSITIVE = []
2237
+ include Aws::Structure
2238
+ end
2239
+
2240
+ # Specifies the method used to encrypt the user’s data stores in the
2241
+ # Athena workgroup.
2242
+ #
2243
+ # @!attribute [rw] encryption_option
2244
+ # Indicates whether Amazon Simple Storage Service (Amazon S3)
2245
+ # server-side encryption with Amazon S3 managed keys (SSE\_S3),
2246
+ # server-side encryption with KMS keys (SSE\_KMS), or client-side
2247
+ # encryption with KMS customer managed keys (CSE\_KMS) is used.
2248
+ # @return [String]
2249
+ #
2250
+ # @!attribute [rw] kms_key
2251
+ # For `SSE_KMS` and `CSE_KMS`, this is the KMS key Amazon Resource
2252
+ # Name (ARN) or ID.
2253
+ # @return [String]
2254
+ #
2255
+ # @see http://docs.aws.amazon.com/goto/WebAPI/securityhub-2018-10-26/AwsAthenaWorkGroupConfigurationResultConfigurationEncryptionConfigurationDetails AWS API Documentation
2256
+ #
2257
+ class AwsAthenaWorkGroupConfigurationResultConfigurationEncryptionConfigurationDetails < Struct.new(
2258
+ :encryption_option,
2259
+ :kms_key)
2260
+ SENSITIVE = []
2261
+ include Aws::Structure
2262
+ end
2263
+
2264
+ # Provides information about an Amazon Athena workgroup.
2265
+ #
2266
+ # @!attribute [rw] name
2267
+ # The workgroup name.
2268
+ # @return [String]
2269
+ #
2270
+ # @!attribute [rw] description
2271
+ # The workgroup description.
2272
+ # @return [String]
2273
+ #
2274
+ # @!attribute [rw] state
2275
+ # Whether the workgroup is enabled or disabled.
2276
+ # @return [String]
2277
+ #
2278
+ # @!attribute [rw] configuration
2279
+ # The configuration of the workgroup, which includes the location in
2280
+ # Amazon Simple Storage Service (Amazon S3) where query results are
2281
+ # stored, the encryption option, if any, used for query results,
2282
+ # whether Amazon CloudWatch metrics are enabled for the workgroup, and
2283
+ # the limit for the amount of bytes scanned (cutoff) per query, if it
2284
+ # is specified.
2285
+ # @return [Types::AwsAthenaWorkGroupConfigurationDetails]
2286
+ #
2287
+ # @see http://docs.aws.amazon.com/goto/WebAPI/securityhub-2018-10-26/AwsAthenaWorkGroupDetails AWS API Documentation
2288
+ #
2289
+ class AwsAthenaWorkGroupDetails < Struct.new(
2290
+ :name,
2291
+ :description,
2292
+ :state,
2293
+ :configuration)
2294
+ SENSITIVE = []
2295
+ include Aws::Structure
2296
+ end
2297
+
2198
2298
  # An Availability Zone for the automatic scaling group.
2199
2299
  #
2200
2300
  # @!attribute [rw] value
@@ -14129,6 +14229,35 @@ module Aws::SecurityHub
14129
14229
  include Aws::Structure
14130
14230
  end
14131
14231
 
14232
+ # Contains the name and values of a manual Amazon Relational Database
14233
+ # Service (RDS) DB cluster snapshot attribute.
14234
+ #
14235
+ # @!attribute [rw] attribute_name
14236
+ # The name of the manual DB cluster snapshot attribute. The attribute
14237
+ # named `restore` refers to the list of Amazon Web Services accounts
14238
+ # that have permission to copy or restore the manual DB cluster
14239
+ # snapshot.
14240
+ # @return [String]
14241
+ #
14242
+ # @!attribute [rw] attribute_values
14243
+ # The value(s) for the manual DB cluster snapshot attribute. If the
14244
+ # `AttributeName` field is set to `restore`, then this element returns
14245
+ # a list of IDs of the Amazon Web Services accounts that are
14246
+ # authorized to copy or restore the manual DB cluster snapshot. If a
14247
+ # value of `all` is in the list, then the manual DB cluster snapshot
14248
+ # is public and available for any Amazon Web Services account to copy
14249
+ # or restore.
14250
+ # @return [Array<String>]
14251
+ #
14252
+ # @see http://docs.aws.amazon.com/goto/WebAPI/securityhub-2018-10-26/AwsRdsDbClusterSnapshotDbClusterSnapshotAttribute AWS API Documentation
14253
+ #
14254
+ class AwsRdsDbClusterSnapshotDbClusterSnapshotAttribute < Struct.new(
14255
+ :attribute_name,
14256
+ :attribute_values)
14257
+ SENSITIVE = []
14258
+ include Aws::Structure
14259
+ end
14260
+
14132
14261
  # Information about an Amazon RDS DB cluster snapshot.
14133
14262
  #
14134
14263
  # @!attribute [rw] availability_zones
@@ -14227,6 +14356,11 @@ module Aws::SecurityHub
14227
14356
  # Whether mapping of IAM accounts to database accounts is enabled.
14228
14357
  # @return [Boolean]
14229
14358
  #
14359
+ # @!attribute [rw] db_cluster_snapshot_attributes
14360
+ # Contains the name and values of a manual DB cluster snapshot
14361
+ # attribute.
14362
+ # @return [Array<Types::AwsRdsDbClusterSnapshotDbClusterSnapshotAttribute>]
14363
+ #
14230
14364
  # @see http://docs.aws.amazon.com/goto/WebAPI/securityhub-2018-10-26/AwsRdsDbClusterSnapshotDetails AWS API Documentation
14231
14365
  #
14232
14366
  class AwsRdsDbClusterSnapshotDetails < Struct.new(
@@ -14247,7 +14381,8 @@ module Aws::SecurityHub
14247
14381
  :kms_key_id,
14248
14382
  :db_cluster_identifier,
14249
14383
  :db_cluster_snapshot_identifier,
14250
- :iam_database_authentication_enabled)
14384
+ :iam_database_authentication_enabled,
14385
+ :db_cluster_snapshot_attributes)
14251
14386
  SENSITIVE = []
14252
14387
  include Aws::Structure
14253
14388
  end
@@ -17586,6 +17721,15 @@ module Aws::SecurityHub
17586
17721
  # Indicates whether the finding is a sample finding.
17587
17722
  # @return [Boolean]
17588
17723
  #
17724
+ # @!attribute [rw] generator_details
17725
+ # Provides metadata for the Amazon CodeGuru detector associated with a
17726
+ # finding. This field pertains to findings that relate to Lambda
17727
+ # functions. Amazon Inspector identifies policy violations and
17728
+ # vulnerabilities in Lambda function code based on internal detectors
17729
+ # developed in collaboration with Amazon CodeGuru. Security Hub
17730
+ # receives those findings.
17731
+ # @return [Types::GeneratorDetails]
17732
+ #
17589
17733
  # @see http://docs.aws.amazon.com/goto/WebAPI/securityhub-2018-10-26/AwsSecurityFinding AWS API Documentation
17590
17734
  #
17591
17735
  class AwsSecurityFinding < Struct.new(
@@ -17629,7 +17773,8 @@ module Aws::SecurityHub
17629
17773
  :patch_summary,
17630
17774
  :action,
17631
17775
  :finding_provider_fields,
17632
- :sample)
17776
+ :sample,
17777
+ :generator_details)
17633
17778
  SENSITIVE = []
17634
17779
  include Aws::Structure
17635
17780
  end
@@ -20527,6 +20672,38 @@ module Aws::SecurityHub
20527
20672
  include Aws::Structure
20528
20673
  end
20529
20674
 
20675
+ # Provides details about where a code vulnerability is located in your
20676
+ # Lambda function.
20677
+ #
20678
+ # @!attribute [rw] end_line
20679
+ # The line number of the last line of code in which the vulnerability
20680
+ # is located.
20681
+ # @return [Integer]
20682
+ #
20683
+ # @!attribute [rw] file_name
20684
+ # The name of the file in which the code vulnerability is located.
20685
+ # @return [String]
20686
+ #
20687
+ # @!attribute [rw] file_path
20688
+ # The file path to the code in which the vulnerability is located.
20689
+ # @return [String]
20690
+ #
20691
+ # @!attribute [rw] start_line
20692
+ # The line number of the first line of code in which the vulnerability
20693
+ # is located.
20694
+ # @return [Integer]
20695
+ #
20696
+ # @see http://docs.aws.amazon.com/goto/WebAPI/securityhub-2018-10-26/CodeVulnerabilitiesFilePath AWS API Documentation
20697
+ #
20698
+ class CodeVulnerabilitiesFilePath < Struct.new(
20699
+ :end_line,
20700
+ :file_name,
20701
+ :file_path,
20702
+ :start_line)
20703
+ SENSITIVE = []
20704
+ include Aws::Structure
20705
+ end
20706
+
20530
20707
  # Contains finding details that are specific to control-based findings.
20531
20708
  # Only returned for findings generated from controls.
20532
20709
  #
@@ -20734,10 +20911,10 @@ module Aws::SecurityHub
20734
20911
  # Specifies whether a rule is the last to be applied with respect to a
20735
20912
  # finding that matches the rule criteria. This is useful when a
20736
20913
  # finding matches the criteria for multiple rules, and each rule has
20737
- # different actions. If the value of this field is set to `true` for a
20738
- # rule, Security Hub applies the rule action to a finding that matches
20739
- # the rule criteria and doesn't evaluate other rules for the finding.
20740
- # The default value of this field is `false`.
20914
+ # different actions. If a rule is terminal, Security Hub applies the
20915
+ # rule action to a finding that matches the rule criteria and doesn't
20916
+ # evaluate other rules for the finding. By default, a rule isn't
20917
+ # terminal.
20741
20918
  # @return [Boolean]
20742
20919
  #
20743
20920
  # @!attribute [rw] criteria
@@ -22058,6 +22235,37 @@ module Aws::SecurityHub
22058
22235
  include Aws::Structure
22059
22236
  end
22060
22237
 
22238
+ # Provides metadata for the Amazon CodeGuru detector associated with a
22239
+ # finding. This field pertains to findings that relate to Lambda
22240
+ # functions. Amazon Inspector identifies policy violations and
22241
+ # vulnerabilities in Lambda function code based on internal detectors
22242
+ # developed in collaboration with Amazon CodeGuru. Security Hub receives
22243
+ # those findings.
22244
+ #
22245
+ # @!attribute [rw] name
22246
+ # The name of the detector used to identify the code vulnerability.
22247
+ # @return [String]
22248
+ #
22249
+ # @!attribute [rw] description
22250
+ # The description of the detector used to identify the code
22251
+ # vulnerability.
22252
+ # @return [String]
22253
+ #
22254
+ # @!attribute [rw] labels
22255
+ # An array of tags used to identify the detector associated with the
22256
+ # finding.
22257
+ # @return [Array<String>]
22258
+ #
22259
+ # @see http://docs.aws.amazon.com/goto/WebAPI/securityhub-2018-10-26/GeneratorDetails AWS API Documentation
22260
+ #
22261
+ class GeneratorDetails < Struct.new(
22262
+ :name,
22263
+ :description,
22264
+ :labels)
22265
+ SENSITIVE = []
22266
+ include Aws::Structure
22267
+ end
22268
+
22061
22269
  # Provides the latitude and longitude coordinates of a location.
22062
22270
  #
22063
22271
  # @!attribute [rw] lon
@@ -23264,8 +23472,9 @@ module Aws::SecurityHub
23264
23472
  include Aws::Structure
23265
23473
  end
23266
23474
 
23267
- # A map filter for querying findings. Each map filter provides the field
23268
- # to check, the value to look for, and the comparison operator.
23475
+ # A map filter for filtering Security Hub findings. Each map filter
23476
+ # provides the field to check for, the value to check for, and the
23477
+ # comparison operator.
23269
23478
  #
23270
23479
  # @!attribute [rw] key
23271
23480
  # The key of the map filter. For example, for `ResourceTags`, `Key`
@@ -23277,31 +23486,69 @@ module Aws::SecurityHub
23277
23486
  # The value for the key in the map filter. Filter values are case
23278
23487
  # sensitive. For example, one of the values for a tag called
23279
23488
  # `Department` might be `Security`. If you provide `security` as the
23280
- # filter value, then there is no match.
23489
+ # filter value, then there's no match.
23281
23490
  # @return [String]
23282
23491
  #
23283
23492
  # @!attribute [rw] comparison
23284
- # The condition to apply to the key value when querying for findings
23285
- # with a map filter.
23493
+ # The condition to apply to the key value when filtering Security Hub
23494
+ # findings with a map filter.
23286
23495
  #
23287
- # To search for values that exactly match the filter value, use
23288
- # `EQUALS`. For example, for the `ResourceTags` field, the filter
23289
- # `Department EQUALS Security` matches findings that have the value
23290
- # `Security` for the tag `Department`.
23496
+ # To search for values that have the filter value, use one of the
23497
+ # following comparison operators:
23291
23498
  #
23292
- # To search for values other than the filter value, use `NOT_EQUALS`.
23293
- # For example, for the `ResourceTags` field, the filter `Department
23294
- # NOT_EQUALS Finance` matches findings that do not have the value
23295
- # `Finance` for the tag `Department`.
23499
+ # * To search for values that include the filter value, use
23500
+ # `CONTAINS`. For example, for the `ResourceTags` field, the filter
23501
+ # `Department CONTAINS Security` matches findings that include the
23502
+ # value `Security` for the `Department` tag. In the same example, a
23503
+ # finding with a value of `Security team` for the `Department` tag
23504
+ # is a match.
23296
23505
  #
23297
- # `EQUALS` filters on the same field are joined by `OR`. A finding
23298
- # matches if it matches any one of those filters.
23506
+ # * To search for values that exactly match the filter value, use
23507
+ # `EQUALS`. For example, for the `ResourceTags` field, the filter
23508
+ # `Department EQUALS Security` matches findings that have the value
23509
+ # `Security` for the `Department` tag.
23510
+ #
23511
+ # `CONTAINS` and `EQUALS` filters on the same field are joined by
23512
+ # `OR`. A finding matches if it matches any one of those filters. For
23513
+ # example, the filters `Department CONTAINS Security OR Department
23514
+ # CONTAINS Finance` match a finding that includes either `Security`,
23515
+ # `Finance`, or both values.
23516
+ #
23517
+ # To search for values that don't have the filter value, use one of
23518
+ # the following comparison operators:
23519
+ #
23520
+ # * To search for values that exclude the filter value, use
23521
+ # `NOT_CONTAINS`. For example, for the `ResourceTags` field, the
23522
+ # filter `Department NOT_CONTAINS Finance` matches findings that
23523
+ # exclude the value `Finance` for the `Department` tag.
23524
+ #
23525
+ # * To search for values other than the filter value, use
23526
+ # `NOT_EQUALS`. For example, for the `ResourceTags` field, the
23527
+ # filter `Department NOT_EQUALS Finance` matches findings that don’t
23528
+ # have the value `Finance` for the `Department` tag.
23529
+ #
23530
+ # `NOT_CONTAINS` and `NOT_EQUALS` filters on the same field are joined
23531
+ # by `AND`. A finding matches only if it matches all of those filters.
23532
+ # For example, the filters `Department NOT_CONTAINS Security AND
23533
+ # Department NOT_CONTAINS Finance` match a finding that excludes both
23534
+ # the `Security` and `Finance` values.
23535
+ #
23536
+ # `CONTAINS` filters can only be used with other `CONTAINS` filters.
23537
+ # `NOT_CONTAINS` filters can only be used with other `NOT_CONTAINS`
23538
+ # filters.
23539
+ #
23540
+ # You can’t have both a `CONTAINS` filter and a `NOT_CONTAINS` filter
23541
+ # on the same field. Similarly, you can’t have both an `EQUALS` filter
23542
+ # and a `NOT_EQUALS` filter on the same field. Combining filters in
23543
+ # this way returns an error.
23544
+ #
23545
+ # `CONTAINS` and `NOT_CONTAINS` operators can be used only with
23546
+ # automation rules. For more information, see [Automation rules][1] in
23547
+ # the *Security Hub User Guide*.
23299
23548
  #
23300
- # `NOT_EQUALS` filters on the same field are joined by `AND`. A
23301
- # finding matches only if it matches all of those filters.
23302
23549
  #
23303
- # You cannot have both an `EQUALS` filter and a `NOT_EQUALS` filter on
23304
- # the same field.
23550
+ #
23551
+ # [1]: https://docs.aws.amazon.com/securityhub/latest/userguide/automation-rules.html
23305
23552
  # @return [String]
23306
23553
  #
23307
23554
  # @see http://docs.aws.amazon.com/goto/WebAPI/securityhub-2018-10-26/MapFilter AWS API Documentation
@@ -24648,6 +24895,12 @@ module Aws::SecurityHub
24648
24895
  # workflow consisting of a series of event-driven steps.
24649
24896
  # @return [Types::AwsStepFunctionStateMachineDetails]
24650
24897
  #
24898
+ # @!attribute [rw] aws_athena_work_group
24899
+ # Provides information about an Amazon Athena workgroup. A workgroup
24900
+ # helps you separate users, teams, applications, or workloads. It also
24901
+ # helps you set limits on data processing and track costs.
24902
+ # @return [Types::AwsAthenaWorkGroupDetails]
24903
+ #
24651
24904
  # @see http://docs.aws.amazon.com/goto/WebAPI/securityhub-2018-10-26/ResourceDetails AWS API Documentation
24652
24905
  #
24653
24906
  class ResourceDetails < Struct.new(
@@ -24739,7 +24992,8 @@ module Aws::SecurityHub
24739
24992
  :aws_app_sync_graph_ql_api,
24740
24993
  :aws_event_schemas_registry,
24741
24994
  :aws_guard_duty_detector,
24742
- :aws_step_function_state_machine)
24995
+ :aws_step_function_state_machine,
24996
+ :aws_athena_work_group)
24743
24997
  SENSITIVE = []
24744
24998
  include Aws::Structure
24745
24999
  end
@@ -26189,75 +26443,85 @@ module Aws::SecurityHub
26189
26443
  include Aws::Structure
26190
26444
  end
26191
26445
 
26192
- # A string filter for querying findings.
26446
+ # A string filter for filtering Security Hub findings.
26193
26447
  #
26194
26448
  # @!attribute [rw] value
26195
26449
  # The string filter value. Filter values are case sensitive. For
26196
26450
  # example, the product name for control-based findings is `Security
26197
- # Hub`. If you provide `security hub` as the filter text, then there
26198
- # is no match.
26451
+ # Hub`. If you provide `security hub` as the filter value, there's no
26452
+ # match.
26199
26453
  # @return [String]
26200
26454
  #
26201
26455
  # @!attribute [rw] comparison
26202
- # The condition to apply to a string value when querying for findings.
26203
- # To search for values that contain the filter criteria value, use one
26204
- # of the following comparison operators:
26456
+ # The condition to apply to a string value when filtering Security Hub
26457
+ # findings.
26205
26458
  #
26206
- # * To search for values that exactly match the filter value, use
26207
- # `EQUALS`.
26459
+ # To search for values that have the filter value, use one of the
26460
+ # following comparison operators:
26208
26461
  #
26209
- # For example, the filter `ResourceType EQUALS AwsEc2SecurityGroup`
26210
- # only matches findings that have a resource type of
26211
- # `AwsEc2SecurityGroup`.
26462
+ # * To search for values that include the filter value, use
26463
+ # `CONTAINS`. For example, the filter `Title CONTAINS CloudFront`
26464
+ # matches findings that have a `Title` that includes the string
26465
+ # CloudFront.
26212
26466
  #
26213
- # * To search for values that start with the filter value, use
26214
- # `PREFIX`.
26215
- #
26216
- # For example, the filter `ResourceType PREFIX AwsIam` matches
26217
- # findings that have a resource type that starts with `AwsIam`.
26218
- # Findings with a resource type of `AwsIamPolicy`, `AwsIamRole`, or
26219
- # `AwsIamUser` would all match.
26220
- #
26221
- # `EQUALS` and `PREFIX` filters on the same field are joined by `OR`.
26222
- # A finding matches if it matches any one of those filters.
26223
- #
26224
- # To search for values that do not contain the filter criteria value,
26225
- # use one of the following comparison operators:
26226
- #
26227
- # * To search for values that do not exactly match the filter value,
26228
- # use `NOT_EQUALS`.
26229
- #
26230
- # For example, the filter `ResourceType NOT_EQUALS AwsIamPolicy`
26231
- # matches findings that have a resource type other than
26232
- # `AwsIamPolicy`.
26233
- #
26234
- # * To search for values that do not start with the filter value, use
26235
- # `PREFIX_NOT_EQUALS`.
26236
- #
26237
- # For example, the filter `ResourceType PREFIX_NOT_EQUALS AwsIam`
26238
- # matches findings that have a resource type that does not start
26239
- # with `AwsIam`. Findings with a resource type of `AwsIamPolicy`,
26240
- # `AwsIamRole`, or `AwsIamUser` would all be excluded from the
26241
- # results.
26467
+ # * To search for values that exactly match the filter value, use
26468
+ # `EQUALS`. For example, the filter `AwsAccountId EQUALS
26469
+ # 123456789012` only matches findings that have an account ID of
26470
+ # `123456789012`.
26242
26471
  #
26243
- # `NOT_EQUALS` and `PREFIX_NOT_EQUALS` filters on the same field are
26244
- # joined by `AND`. A finding matches only if it matches all of those
26472
+ # * To search for values that start with the filter value, use
26473
+ # `PREFIX`. For example, the filter `ResourceRegion PREFIX us`
26474
+ # matches findings that have a `ResourceRegion` that starts with
26475
+ # `us`. A `ResourceRegion` that starts with a different value, such
26476
+ # as `af`, `ap`, or `ca`, doesn't match.
26477
+ #
26478
+ # `CONTAINS`, `EQUALS`, and `PREFIX` filters on the same field are
26479
+ # joined by `OR`. A finding matches if it matches any one of those
26480
+ # filters. For example, the filters `Title CONTAINS CloudFront OR
26481
+ # Title CONTAINS CloudWatch` match a finding that includes either
26482
+ # `CloudFront`, `CloudWatch`, or both strings in the title.
26483
+ #
26484
+ # To search for values that don’t have the filter value, use one of
26485
+ # the following comparison operators:
26486
+ #
26487
+ # * To search for values that exclude the filter value, use
26488
+ # `NOT_CONTAINS`. For example, the filter `Title NOT_CONTAINS
26489
+ # CloudFront` matches findings that have a `Title` that excludes the
26490
+ # string CloudFront.
26491
+ #
26492
+ # * To search for values other than the filter value, use
26493
+ # `NOT_EQUALS`. For example, the filter `AwsAccountId NOT_EQUALS
26494
+ # 123456789012` only matches findings that have an account ID other
26495
+ # than `123456789012`.
26496
+ #
26497
+ # * To search for values that don't start with the filter value, use
26498
+ # `PREFIX_NOT_EQUALS`. For example, the filter `ResourceRegion
26499
+ # PREFIX_NOT_EQUALS us` matches findings with a `ResourceRegion`
26500
+ # that starts with a value other than `us`.
26501
+ #
26502
+ # `NOT_CONTAINS`, `NOT_EQUALS`, and `PREFIX_NOT_EQUALS` filters on the
26503
+ # same field are joined by `AND`. A finding matches only if it matches
26504
+ # all of those filters. For example, the filters `Title NOT_CONTAINS
26505
+ # CloudFront AND Title NOT_CONTAINS CloudWatch` match a finding that
26506
+ # excludes both `CloudFront` and `CloudWatch` in the title.
26507
+ #
26508
+ # You can’t have both a `CONTAINS` filter and a `NOT_CONTAINS` filter
26509
+ # on the same field. Similarly, you can't provide both an `EQUALS`
26510
+ # filter and a `NOT_EQUALS` or `PREFIX_NOT_EQUALS` filter on the same
26511
+ # field. Combining filters in this way returns an error. `CONTAINS`
26512
+ # filters can only be used with other `CONTAINS` filters.
26513
+ # `NOT_CONTAINS` filters can only be used with other `NOT_CONTAINS`
26245
26514
  # filters.
26246
26515
  #
26247
- # For filters on the same field, you cannot provide both an `EQUALS`
26248
- # filter and a `NOT_EQUALS` or `PREFIX_NOT_EQUALS` filter. Combining
26249
- # filters in this way always returns an error, even if the provided
26250
- # filter values would return valid results.
26251
- #
26252
26516
  # You can combine `PREFIX` filters with `NOT_EQUALS` or
26253
26517
  # `PREFIX_NOT_EQUALS` filters for the same field. Security Hub first
26254
- # processes the `PREFIX` filters, then the `NOT_EQUALS` or
26518
+ # processes the `PREFIX` filters, and then the `NOT_EQUALS` or
26255
26519
  # `PREFIX_NOT_EQUALS` filters.
26256
26520
  #
26257
- # For example, for the following filter, Security Hub first identifies
26258
- # findings that have resource types that start with either `AwsIAM` or
26259
- # `AwsEc2`. It then excludes findings that have a resource type of
26260
- # `AwsIamPolicy` and findings that have a resource type of
26521
+ # For example, for the following filters, Security Hub first
26522
+ # identifies findings that have resource types that start with either
26523
+ # `AwsIam` or `AwsEc2`. It then excludes findings that have a resource
26524
+ # type of `AwsIamPolicy` and findings that have a resource type of
26261
26525
  # `AwsEc2NetworkInterface`.
26262
26526
  #
26263
26527
  # * `ResourceType PREFIX AwsIam`
@@ -26267,6 +26531,14 @@ module Aws::SecurityHub
26267
26531
  # * `ResourceType NOT_EQUALS AwsIamPolicy`
26268
26532
  #
26269
26533
  # * `ResourceType NOT_EQUALS AwsEc2NetworkInterface`
26534
+ #
26535
+ # `CONTAINS` and `NOT_CONTAINS` operators can be used only with
26536
+ # automation rules. For more information, see [Automation rules][1] in
26537
+ # the *Security Hub User Guide*.
26538
+ #
26539
+ #
26540
+ #
26541
+ # [1]: https://docs.aws.amazon.com/securityhub/latest/userguide/automation-rules.html
26270
26542
  # @return [String]
26271
26543
  #
26272
26544
  # @see http://docs.aws.amazon.com/goto/WebAPI/securityhub-2018-10-26/StringFilter AWS API Documentation
@@ -26598,10 +26870,10 @@ module Aws::SecurityHub
26598
26870
  # Specifies whether a rule is the last to be applied with respect to a
26599
26871
  # finding that matches the rule criteria. This is useful when a
26600
26872
  # finding matches the criteria for multiple rules, and each rule has
26601
- # different actions. If the value of this field is set to `true` for a
26602
- # rule, Security Hub applies the rule action to a finding that matches
26603
- # the rule criteria and doesn't evaluate other rules for the
26604
- # finding.
 The default value of this field is `false`.
26873
+ # different actions. If a rule is terminal, Security Hub applies the
26874
+ # rule action to a finding that matches the rule criteria and doesn't
26875
+ # evaluate other rules for the finding. By default, a rule isn't
26876
+ # terminal.
 The default value of this field is `false`.
26605
26877
  # @return [Boolean]
26606
26878
  #
26607
26879
  # @!attribute [rw] criteria
@@ -26994,6 +27266,20 @@ module Aws::SecurityHub
26994
27266
  # * `PARTIAL` otherwise
26995
27267
  # @return [String]
26996
27268
  #
27269
+ # @!attribute [rw] epss_score
27270
+ # The Exploit Prediction Scoring System (EPSS) score for a finding.
27271
+ # @return [Float]
27272
+ #
27273
+ # @!attribute [rw] exploit_available
27274
+ # Whether an exploit is available for a finding.
27275
+ # @return [String]
27276
+ #
27277
+ # @!attribute [rw] code_vulnerabilities
27278
+ # The vulnerabilities found in your Lambda function code. This field
27279
+ # pertains to findings that Security Hub receives from Amazon
27280
+ # Inspector.
27281
+ # @return [Array<Types::VulnerabilityCodeVulnerabilities>]
27282
+ #
26997
27283
  # @see http://docs.aws.amazon.com/goto/WebAPI/securityhub-2018-10-26/Vulnerability AWS API Documentation
26998
27284
  #
26999
27285
  class Vulnerability < Struct.new(
@@ -27003,7 +27289,39 @@ module Aws::SecurityHub
27003
27289
  :related_vulnerabilities,
27004
27290
  :vendor,
27005
27291
  :reference_urls,
27006
- :fix_available)
27292
+ :fix_available,
27293
+ :epss_score,
27294
+ :exploit_available,
27295
+ :code_vulnerabilities)
27296
+ SENSITIVE = []
27297
+ include Aws::Structure
27298
+ end
27299
+
27300
+ # Provides details about the vulnerabilities found in your Lambda
27301
+ # function code. This field pertains to findings that Security Hub
27302
+ # receives from Amazon Inspector.
27303
+ #
27304
+ # @!attribute [rw] cwes
27305
+ # The Common Weakness Enumeration (CWE) item associated with the
27306
+ # detected code vulnerability.
27307
+ # @return [Array<String>]
27308
+ #
27309
+ # @!attribute [rw] file_path
27310
+ # Provides details about where a code vulnerability is located in your
27311
+ # Lambda function.
27312
+ # @return [Types::CodeVulnerabilitiesFilePath]
27313
+ #
27314
+ # @!attribute [rw] source_arn
27315
+ # The Amazon Resource Name (ARN) of the Lambda layer in which the code
27316
+ # vulnerability is located.
27317
+ # @return [String]
27318
+ #
27319
+ # @see http://docs.aws.amazon.com/goto/WebAPI/securityhub-2018-10-26/VulnerabilityCodeVulnerabilities AWS API Documentation
27320
+ #
27321
+ class VulnerabilityCodeVulnerabilities < Struct.new(
27322
+ :cwes,
27323
+ :file_path,
27324
+ :source_arn)
27007
27325
  SENSITIVE = []
27008
27326
  include Aws::Structure
27009
27327
  end
@@ -27118,8 +27436,7 @@ module Aws::SecurityHub
27118
27436
  include Aws::Structure
27119
27437
  end
27120
27438
 
27121
- # Provides information about the status of the investigation into a
27122
- # finding.
27439
+ # Provides details about the status of the investigation into a finding.
27123
27440
  #
27124
27441
  # @!attribute [rw] status
27125
27442
  # The status of the investigation into the finding. The workflow
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-securityhub/customizations'
52
52
  # @!group service
53
53
  module Aws::SecurityHub
54
54
 
55
- GEM_VERSION = '1.89.0'
55
+ GEM_VERSION = '1.91.0'
56
56
 
57
57
  end