google-cloud-security_center-v1 0.8.1 → 0.9.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 1b657e12d5e2a6bfbd159e01b4b1eecdf8bf3b0cfeb568132dd0e7243e60dfa2
4
- data.tar.gz: b56ea7e9107c6e97921855134e4b80fd6b6293dddfa96fe53ba067a055d2ad28
3
+ metadata.gz: 9544668b93bf62b6a525f12c79213f71ad4113073505bdec57fea1ed5a10643e
4
+ data.tar.gz: 71f8ec0fef19f6a77ad40a3070c60d26ac68d176a57c6d005275ca811863a4f1
5
5
  SHA512:
6
- metadata.gz: 2b30d63db862f8a776031257236e97491ba717e687f7db64809b6e0c6afbd18b636b1f0dd5b8c999aa17e089c4ac935d709140927855dea9fdbc779e08343cc0
7
- data.tar.gz: a0ad157f2d483d34c2bb85b827d24e1327804e9de3732467928da3f5d50ca8fb283a5db12735c67dae3360e770e6c7bfc40def598225c4de3d4683de8892d3d0
6
+ metadata.gz: ba5853c6fdca6c247026b6fb1f0e86c784a5af98cea06a66582ff0f5fa4791da81412096ee18908e95424cd5c97f46f74446f2a12b08475570682dc34dea0b9a
7
+ data.tar.gz: 9d3652bc7ed972de2162d364970a35fbba0d93e44bf30492f40bc4912a1db6d886e212c09bdbfd02e590fe5e8ddb77e9abbab6fcd441897631a40babfb67ec72
@@ -21,7 +21,7 @@ module Google
21
21
  module Cloud
22
22
  module SecurityCenter
23
23
  module V1
24
- VERSION = "0.8.1"
24
+ VERSION = "0.9.0"
25
25
  end
26
26
  end
27
27
  end
@@ -1,14 +1,14 @@
1
1
  # Generated by the protocol buffer compiler. DO NOT EDIT!
2
2
  # source: google/cloud/securitycenter/v1/asset.proto
3
3
 
4
- require 'google/protobuf'
5
-
6
4
  require 'google/api/resource_pb'
7
5
  require 'google/cloud/securitycenter/v1/folder_pb'
8
6
  require 'google/cloud/securitycenter/v1/security_marks_pb'
9
7
  require 'google/protobuf/struct_pb'
10
8
  require 'google/protobuf/timestamp_pb'
11
9
  require 'google/api/annotations_pb'
10
+ require 'google/protobuf'
11
+
12
12
  Google::Protobuf::DescriptorPool.generated_pool.build do
13
13
  add_file("google/cloud/securitycenter/v1/asset.proto", :syntax => :proto3) do
14
14
  add_message "google.cloud.securitycenter.v1.Asset" do
@@ -1,15 +1,16 @@
1
1
  # Generated by the protocol buffer compiler. DO NOT EDIT!
2
2
  # source: google/cloud/securitycenter/v1/finding.proto
3
3
 
4
- require 'google/protobuf'
5
-
6
4
  require 'google/api/field_behavior_pb'
7
5
  require 'google/api/resource_pb'
8
6
  require 'google/cloud/securitycenter/v1/indicator_pb'
9
7
  require 'google/cloud/securitycenter/v1/security_marks_pb'
8
+ require 'google/cloud/securitycenter/v1/vulnerability_pb'
10
9
  require 'google/protobuf/struct_pb'
11
10
  require 'google/protobuf/timestamp_pb'
12
11
  require 'google/api/annotations_pb'
12
+ require 'google/protobuf'
13
+
13
14
  Google::Protobuf::DescriptorPool.generated_pool.build do
14
15
  add_file("google/cloud/securitycenter/v1/finding.proto", :syntax => :proto3) do
15
16
  add_message "google.cloud.securitycenter.v1.Finding" do
@@ -27,6 +28,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
27
28
  optional :canonical_name, :string, 14
28
29
  optional :finding_class, :enum, 17, "google.cloud.securitycenter.v1.Finding.FindingClass"
29
30
  optional :indicator, :message, 18, "google.cloud.securitycenter.v1.Indicator"
31
+ optional :vulnerability, :message, 20, "google.cloud.securitycenter.v1.Vulnerability"
30
32
  end
31
33
  add_enum "google.cloud.securitycenter.v1.Finding.State" do
32
34
  value :STATE_UNSPECIFIED, 0
@@ -1,9 +1,9 @@
1
1
  # Generated by the protocol buffer compiler. DO NOT EDIT!
2
2
  # source: google/cloud/securitycenter/v1/folder.proto
3
3
 
4
+ require 'google/api/annotations_pb'
4
5
  require 'google/protobuf'
5
6
 
6
- require 'google/api/annotations_pb'
7
7
  Google::Protobuf::DescriptorPool.generated_pool.build do
8
8
  add_file("google/cloud/securitycenter/v1/folder.proto", :syntax => :proto3) do
9
9
  add_message "google.cloud.securitycenter.v1.Folder" do
@@ -1,9 +1,9 @@
1
1
  # Generated by the protocol buffer compiler. DO NOT EDIT!
2
2
  # source: google/cloud/securitycenter/v1/indicator.proto
3
3
 
4
+ require 'google/api/annotations_pb'
4
5
  require 'google/protobuf'
5
6
 
6
- require 'google/api/annotations_pb'
7
7
  Google::Protobuf::DescriptorPool.generated_pool.build do
8
8
  add_file("google/cloud/securitycenter/v1/indicator.proto", :syntax => :proto3) do
9
9
  add_message "google.cloud.securitycenter.v1.Indicator" do
@@ -1,11 +1,11 @@
1
1
  # Generated by the protocol buffer compiler. DO NOT EDIT!
2
2
  # source: google/cloud/securitycenter/v1/notification_config.proto
3
3
 
4
- require 'google/protobuf'
5
-
6
4
  require 'google/api/field_behavior_pb'
7
5
  require 'google/api/resource_pb'
8
6
  require 'google/api/annotations_pb'
7
+ require 'google/protobuf'
8
+
9
9
  Google::Protobuf::DescriptorPool.generated_pool.build do
10
10
  add_file("google/cloud/securitycenter/v1/notification_config.proto", :syntax => :proto3) do
11
11
  add_message "google.cloud.securitycenter.v1.NotificationConfig" do
@@ -1,11 +1,11 @@
1
1
  # Generated by the protocol buffer compiler. DO NOT EDIT!
2
2
  # source: google/cloud/securitycenter/v1/notification_message.proto
3
3
 
4
- require 'google/protobuf'
5
-
6
4
  require 'google/cloud/securitycenter/v1/finding_pb'
7
5
  require 'google/cloud/securitycenter/v1/resource_pb'
8
6
  require 'google/api/annotations_pb'
7
+ require 'google/protobuf'
8
+
9
9
  Google::Protobuf::DescriptorPool.generated_pool.build do
10
10
  add_file("google/cloud/securitycenter/v1/notification_message.proto", :syntax => :proto3) do
11
11
  add_message "google.cloud.securitycenter.v1.NotificationMessage" do
@@ -1,10 +1,10 @@
1
1
  # Generated by the protocol buffer compiler. DO NOT EDIT!
2
2
  # source: google/cloud/securitycenter/v1/organization_settings.proto
3
3
 
4
- require 'google/protobuf'
5
-
6
4
  require 'google/api/resource_pb'
7
5
  require 'google/api/annotations_pb'
6
+ require 'google/protobuf'
7
+
8
8
  Google::Protobuf::DescriptorPool.generated_pool.build do
9
9
  add_file("google/cloud/securitycenter/v1/organization_settings.proto", :syntax => :proto3) do
10
10
  add_message "google.cloud.securitycenter.v1.OrganizationSettings" do
@@ -1,11 +1,11 @@
1
1
  # Generated by the protocol buffer compiler. DO NOT EDIT!
2
2
  # source: google/cloud/securitycenter/v1/resource.proto
3
3
 
4
- require 'google/protobuf'
5
-
6
4
  require 'google/api/field_behavior_pb'
7
5
  require 'google/cloud/securitycenter/v1/folder_pb'
8
6
  require 'google/api/annotations_pb'
7
+ require 'google/protobuf'
8
+
9
9
  Google::Protobuf::DescriptorPool.generated_pool.build do
10
10
  add_file("google/cloud/securitycenter/v1/resource.proto", :syntax => :proto3) do
11
11
  add_message "google.cloud.securitycenter.v1.Resource" do
@@ -14,6 +14,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
14
14
  optional :project_display_name, :string, 3
15
15
  optional :parent, :string, 4
16
16
  optional :parent_display_name, :string, 5
17
+ optional :type, :string, 6
17
18
  repeated :folders, :message, 7, "google.cloud.securitycenter.v1.Folder"
18
19
  end
19
20
  end
@@ -1,10 +1,10 @@
1
1
  # Generated by the protocol buffer compiler. DO NOT EDIT!
2
2
  # source: google/cloud/securitycenter/v1/run_asset_discovery_response.proto
3
3
 
4
- require 'google/protobuf'
5
-
6
4
  require 'google/protobuf/duration_pb'
7
5
  require 'google/api/annotations_pb'
6
+ require 'google/protobuf'
7
+
8
8
  Google::Protobuf::DescriptorPool.generated_pool.build do
9
9
  add_file("google/cloud/securitycenter/v1/run_asset_discovery_response.proto", :syntax => :proto3) do
10
10
  add_message "google.cloud.securitycenter.v1.RunAssetDiscoveryResponse" do
@@ -1,10 +1,10 @@
1
1
  # Generated by the protocol buffer compiler. DO NOT EDIT!
2
2
  # source: google/cloud/securitycenter/v1/security_marks.proto
3
3
 
4
- require 'google/protobuf'
5
-
6
4
  require 'google/api/resource_pb'
7
5
  require 'google/api/annotations_pb'
6
+ require 'google/protobuf'
7
+
8
8
  Google::Protobuf::DescriptorPool.generated_pool.build do
9
9
  add_file("google/cloud/securitycenter/v1/security_marks.proto", :syntax => :proto3) do
10
10
  add_message "google.cloud.securitycenter.v1.SecurityMarks" do
@@ -1,8 +1,6 @@
1
1
  # Generated by the protocol buffer compiler. DO NOT EDIT!
2
2
  # source: google/cloud/securitycenter/v1/securitycenter_service.proto
3
3
 
4
- require 'google/protobuf'
5
-
6
4
  require 'google/cloud/securitycenter/v1/run_asset_discovery_response_pb'
7
5
  require 'google/api/annotations_pb'
8
6
  require 'google/api/client_pb'
@@ -23,6 +21,8 @@ require 'google/protobuf/empty_pb'
23
21
  require 'google/protobuf/field_mask_pb'
24
22
  require 'google/protobuf/struct_pb'
25
23
  require 'google/protobuf/timestamp_pb'
24
+ require 'google/protobuf'
25
+
26
26
  Google::Protobuf::DescriptorPool.generated_pool.build do
27
27
  add_file("google/cloud/securitycenter/v1/securitycenter_service.proto", :syntax => :proto3) do
28
28
  add_message "google.cloud.securitycenter.v1.CreateFindingRequest" do
@@ -27,7 +27,7 @@ module Google
27
27
  # V1 APIs for Security Center service.
28
28
  class Service
29
29
 
30
- include GRPC::GenericService
30
+ include ::GRPC::GenericService
31
31
 
32
32
  self.marshal_class_method = :encode
33
33
  self.unmarshal_class_method = :decode
@@ -1,10 +1,10 @@
1
1
  # Generated by the protocol buffer compiler. DO NOT EDIT!
2
2
  # source: google/cloud/securitycenter/v1/source.proto
3
3
 
4
- require 'google/protobuf'
5
-
6
4
  require 'google/api/resource_pb'
7
5
  require 'google/api/annotations_pb'
6
+ require 'google/protobuf'
7
+
8
8
  Google::Protobuf::DescriptorPool.generated_pool.build do
9
9
  add_file("google/cloud/securitycenter/v1/source.proto", :syntax => :proto3) do
10
10
  add_message "google.cloud.securitycenter.v1.Source" do
@@ -0,0 +1,86 @@
1
+ # Generated by the protocol buffer compiler. DO NOT EDIT!
2
+ # source: google/cloud/securitycenter/v1/vulnerability.proto
3
+
4
+ require 'google/api/annotations_pb'
5
+ require 'google/protobuf'
6
+
7
+ Google::Protobuf::DescriptorPool.generated_pool.build do
8
+ add_file("google/cloud/securitycenter/v1/vulnerability.proto", :syntax => :proto3) do
9
+ add_message "google.cloud.securitycenter.v1.Vulnerability" do
10
+ optional :cve, :message, 1, "google.cloud.securitycenter.v1.Cve"
11
+ end
12
+ add_message "google.cloud.securitycenter.v1.Cve" do
13
+ optional :id, :string, 1
14
+ repeated :references, :message, 2, "google.cloud.securitycenter.v1.Reference"
15
+ optional :cvssv3, :message, 3, "google.cloud.securitycenter.v1.Cvssv3"
16
+ end
17
+ add_message "google.cloud.securitycenter.v1.Reference" do
18
+ optional :source, :string, 1
19
+ optional :uri, :string, 2
20
+ end
21
+ add_message "google.cloud.securitycenter.v1.Cvssv3" do
22
+ optional :base_score, :double, 1
23
+ optional :attack_vector, :enum, 5, "google.cloud.securitycenter.v1.Cvssv3.AttackVector"
24
+ optional :attack_complexity, :enum, 6, "google.cloud.securitycenter.v1.Cvssv3.AttackComplexity"
25
+ optional :privileges_required, :enum, 7, "google.cloud.securitycenter.v1.Cvssv3.PrivilegesRequired"
26
+ optional :user_interaction, :enum, 8, "google.cloud.securitycenter.v1.Cvssv3.UserInteraction"
27
+ optional :scope, :enum, 9, "google.cloud.securitycenter.v1.Cvssv3.Scope"
28
+ optional :confidentiality_impact, :enum, 10, "google.cloud.securitycenter.v1.Cvssv3.Impact"
29
+ optional :integrity_impact, :enum, 11, "google.cloud.securitycenter.v1.Cvssv3.Impact"
30
+ optional :availability_impact, :enum, 12, "google.cloud.securitycenter.v1.Cvssv3.Impact"
31
+ end
32
+ add_enum "google.cloud.securitycenter.v1.Cvssv3.AttackVector" do
33
+ value :ATTACK_VECTOR_UNSPECIFIED, 0
34
+ value :ATTACK_VECTOR_NETWORK, 1
35
+ value :ATTACK_VECTOR_ADJACENT, 2
36
+ value :ATTACK_VECTOR_LOCAL, 3
37
+ value :ATTACK_VECTOR_PHYSICAL, 4
38
+ end
39
+ add_enum "google.cloud.securitycenter.v1.Cvssv3.AttackComplexity" do
40
+ value :ATTACK_COMPLEXITY_UNSPECIFIED, 0
41
+ value :ATTACK_COMPLEXITY_LOW, 1
42
+ value :ATTACK_COMPLEXITY_HIGH, 2
43
+ end
44
+ add_enum "google.cloud.securitycenter.v1.Cvssv3.PrivilegesRequired" do
45
+ value :PRIVILEGES_REQUIRED_UNSPECIFIED, 0
46
+ value :PRIVILEGES_REQUIRED_NONE, 1
47
+ value :PRIVILEGES_REQUIRED_LOW, 2
48
+ value :PRIVILEGES_REQUIRED_HIGH, 3
49
+ end
50
+ add_enum "google.cloud.securitycenter.v1.Cvssv3.UserInteraction" do
51
+ value :USER_INTERACTION_UNSPECIFIED, 0
52
+ value :USER_INTERACTION_NONE, 1
53
+ value :USER_INTERACTION_REQUIRED, 2
54
+ end
55
+ add_enum "google.cloud.securitycenter.v1.Cvssv3.Scope" do
56
+ value :SCOPE_UNSPECIFIED, 0
57
+ value :SCOPE_UNCHANGED, 1
58
+ value :SCOPE_CHANGED, 2
59
+ end
60
+ add_enum "google.cloud.securitycenter.v1.Cvssv3.Impact" do
61
+ value :IMPACT_UNSPECIFIED, 0
62
+ value :IMPACT_HIGH, 1
63
+ value :IMPACT_LOW, 2
64
+ value :IMPACT_NONE, 3
65
+ end
66
+ end
67
+ end
68
+
69
+ module Google
70
+ module Cloud
71
+ module SecurityCenter
72
+ module V1
73
+ Vulnerability = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.securitycenter.v1.Vulnerability").msgclass
74
+ Cve = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.securitycenter.v1.Cve").msgclass
75
+ Reference = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.securitycenter.v1.Reference").msgclass
76
+ Cvssv3 = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.securitycenter.v1.Cvssv3").msgclass
77
+ Cvssv3::AttackVector = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.securitycenter.v1.Cvssv3.AttackVector").enummodule
78
+ Cvssv3::AttackComplexity = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.securitycenter.v1.Cvssv3.AttackComplexity").enummodule
79
+ Cvssv3::PrivilegesRequired = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.securitycenter.v1.Cvssv3.PrivilegesRequired").enummodule
80
+ Cvssv3::UserInteraction = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.securitycenter.v1.Cvssv3.UserInteraction").enummodule
81
+ Cvssv3::Scope = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.securitycenter.v1.Cvssv3.Scope").enummodule
82
+ Cvssv3::Impact = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.securitycenter.v1.Cvssv3.Impact").enummodule
83
+ end
84
+ end
85
+ end
86
+ end
@@ -106,6 +106,11 @@ module Google
106
106
  # operating system that, with high confidence, indicates a computer
107
107
  # intrusion.
108
108
  # Reference: https://en.wikipedia.org/wiki/Indicator_of_compromise
109
+ # @!attribute [rw] vulnerability
110
+ # @return [::Google::Cloud::SecurityCenter::V1::Vulnerability]
111
+ # Represents vulnerability specific fields like cve, cvss scores etc.
112
+ # CVE stands for Common Vulnerabilities and Exposures
113
+ # (https://cve.mitre.org/about/)
109
114
  class Finding
110
115
  include ::Google::Protobuf::MessageExts
111
116
  extend ::Google::Protobuf::MessageExts::ClassMethods
@@ -38,6 +38,9 @@ module Google
38
38
  # @!attribute [rw] parent_display_name
39
39
  # @return [::String]
40
40
  # The human readable name of resource's parent.
41
+ # @!attribute [rw] type
42
+ # @return [::String]
43
+ # The full resource type of the resource.
41
44
  # @!attribute [r] folders
42
45
  # @return [::Array<::Google::Cloud::SecurityCenter::V1::Folder>]
43
46
  # Output only. Contains a Folder message for each folder in the assets ancestry.
@@ -0,0 +1,226 @@
1
+ # frozen_string_literal: true
2
+
3
+ # Copyright 2021 Google LLC
4
+ #
5
+ # Licensed under the Apache License, Version 2.0 (the "License");
6
+ # you may not use this file except in compliance with the License.
7
+ # You may obtain a copy of the License at
8
+ #
9
+ # https://www.apache.org/licenses/LICENSE-2.0
10
+ #
11
+ # Unless required by applicable law or agreed to in writing, software
12
+ # distributed under the License is distributed on an "AS IS" BASIS,
13
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ # See the License for the specific language governing permissions and
15
+ # limitations under the License.
16
+
17
+ # Auto-generated by gapic-generator-ruby. DO NOT EDIT!
18
+
19
+
20
+ module Google
21
+ module Cloud
22
+ module SecurityCenter
23
+ module V1
24
+ # Refers to common vulnerability fields e.g. cve, cvss, cwe etc.
25
+ # @!attribute [rw] cve
26
+ # @return [::Google::Cloud::SecurityCenter::V1::Cve]
27
+ # CVE stands for Common Vulnerabilities and Exposures
28
+ # (https://cve.mitre.org/about/)
29
+ class Vulnerability
30
+ include ::Google::Protobuf::MessageExts
31
+ extend ::Google::Protobuf::MessageExts::ClassMethods
32
+ end
33
+
34
+ # CVE stands for Common Vulnerabilities and Exposures.
35
+ # More information: https://cve.mitre.org
36
+ # @!attribute [rw] id
37
+ # @return [::String]
38
+ # The unique identifier for the vulnerability. e.g. CVE-2021-34527
39
+ # @!attribute [rw] references
40
+ # @return [::Array<::Google::Cloud::SecurityCenter::V1::Reference>]
41
+ # Additional information about the CVE.
42
+ # e.g. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527
43
+ # @!attribute [rw] cvssv3
44
+ # @return [::Google::Cloud::SecurityCenter::V1::Cvssv3]
45
+ # Describe Common Vulnerability Scoring System specified at
46
+ # https://www.first.org/cvss/v3.1/specification-document
47
+ class Cve
48
+ include ::Google::Protobuf::MessageExts
49
+ extend ::Google::Protobuf::MessageExts::ClassMethods
50
+ end
51
+
52
+ # Additional Links
53
+ # @!attribute [rw] source
54
+ # @return [::String]
55
+ # Source of the reference e.g. NVD
56
+ # @!attribute [rw] uri
57
+ # @return [::String]
58
+ # Uri for the mentioned source e.g.
59
+ # https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527.
60
+ class Reference
61
+ include ::Google::Protobuf::MessageExts
62
+ extend ::Google::Protobuf::MessageExts::ClassMethods
63
+ end
64
+
65
+ # Common Vulnerability Scoring System version 3.
66
+ # @!attribute [rw] base_score
67
+ # @return [::Float]
68
+ # The base score is a function of the base metric scores.
69
+ # @!attribute [rw] attack_vector
70
+ # @return [::Google::Cloud::SecurityCenter::V1::Cvssv3::AttackVector]
71
+ # Base Metrics
72
+ # Represents the intrinsic characteristics of a vulnerability that are
73
+ # constant over time and across user environments.
74
+ # This metric reflects the context by which vulnerability exploitation is
75
+ # possible.
76
+ # @!attribute [rw] attack_complexity
77
+ # @return [::Google::Cloud::SecurityCenter::V1::Cvssv3::AttackComplexity]
78
+ # This metric describes the conditions beyond the attacker's control that
79
+ # must exist in order to exploit the vulnerability.
80
+ # @!attribute [rw] privileges_required
81
+ # @return [::Google::Cloud::SecurityCenter::V1::Cvssv3::PrivilegesRequired]
82
+ # This metric describes the level of privileges an attacker must possess
83
+ # before successfully exploiting the vulnerability.
84
+ # @!attribute [rw] user_interaction
85
+ # @return [::Google::Cloud::SecurityCenter::V1::Cvssv3::UserInteraction]
86
+ # This metric captures the requirement for a human user, other than the
87
+ # attacker, to participate in the successful compromise of the vulnerable
88
+ # component.
89
+ # @!attribute [rw] scope
90
+ # @return [::Google::Cloud::SecurityCenter::V1::Cvssv3::Scope]
91
+ # The Scope metric captures whether a vulnerability in one vulnerable
92
+ # component impacts resources in components beyond its security scope.
93
+ # @!attribute [rw] confidentiality_impact
94
+ # @return [::Google::Cloud::SecurityCenter::V1::Cvssv3::Impact]
95
+ # This metric measures the impact to the confidentiality of the information
96
+ # resources managed by a software component due to a successfully exploited
97
+ # vulnerability.
98
+ # @!attribute [rw] integrity_impact
99
+ # @return [::Google::Cloud::SecurityCenter::V1::Cvssv3::Impact]
100
+ # This metric measures the impact to integrity of a successfully exploited
101
+ # vulnerability.
102
+ # @!attribute [rw] availability_impact
103
+ # @return [::Google::Cloud::SecurityCenter::V1::Cvssv3::Impact]
104
+ # This metric measures the impact to the availability of the impacted
105
+ # component resulting from a successfully exploited vulnerability.
106
+ class Cvssv3
107
+ include ::Google::Protobuf::MessageExts
108
+ extend ::Google::Protobuf::MessageExts::ClassMethods
109
+
110
+ # This metric reflects the context by which vulnerability exploitation is
111
+ # possible.
112
+ module AttackVector
113
+ # Invalid value.
114
+ ATTACK_VECTOR_UNSPECIFIED = 0
115
+
116
+ # The vulnerable component is bound to the network stack and the set of
117
+ # possible attackers extends beyond the other options listed below, up to
118
+ # and including the entire Internet.
119
+ ATTACK_VECTOR_NETWORK = 1
120
+
121
+ # The vulnerable component is bound to the network stack, but the attack is
122
+ # limited at the protocol level to a logically adjacent topology.
123
+ ATTACK_VECTOR_ADJACENT = 2
124
+
125
+ # The vulnerable component is not bound to the network stack and the
126
+ # attacker's path is via read/write/execute capabilities.
127
+ ATTACK_VECTOR_LOCAL = 3
128
+
129
+ # The attack requires the attacker to physically touch or manipulate the
130
+ # vulnerable component.
131
+ ATTACK_VECTOR_PHYSICAL = 4
132
+ end
133
+
134
+ # This metric describes the conditions beyond the attacker's control that
135
+ # must exist in order to exploit the vulnerability.
136
+ module AttackComplexity
137
+ # Invalid value.
138
+ ATTACK_COMPLEXITY_UNSPECIFIED = 0
139
+
140
+ # Specialized access conditions or extenuating circumstances do not exist.
141
+ # An attacker can expect repeatable success when attacking the vulnerable
142
+ # component.
143
+ ATTACK_COMPLEXITY_LOW = 1
144
+
145
+ # A successful attack depends on conditions beyond the attacker's control.
146
+ # That is, a successful attack cannot be accomplished at will, but requires
147
+ # the attacker to invest in some measurable amount of effort in preparation
148
+ # or execution against the vulnerable component before a successful attack
149
+ # can be expected.
150
+ ATTACK_COMPLEXITY_HIGH = 2
151
+ end
152
+
153
+ # This metric describes the level of privileges an attacker must possess
154
+ # before successfully exploiting the vulnerability.
155
+ module PrivilegesRequired
156
+ # Invalid value.
157
+ PRIVILEGES_REQUIRED_UNSPECIFIED = 0
158
+
159
+ # The attacker is unauthorized prior to attack, and therefore does not
160
+ # require any access to settings or files of the vulnerable system to
161
+ # carry out an attack.
162
+ PRIVILEGES_REQUIRED_NONE = 1
163
+
164
+ # The attacker requires privileges that provide basic user capabilities
165
+ # that could normally affect only settings and files owned by a user.
166
+ # Alternatively, an attacker with Low privileges has the ability to access
167
+ # only non-sensitive resources.
168
+ PRIVILEGES_REQUIRED_LOW = 2
169
+
170
+ # The attacker requires privileges that provide significant (e.g.,
171
+ # administrative) control over the vulnerable component allowing access to
172
+ # component-wide settings and files.
173
+ PRIVILEGES_REQUIRED_HIGH = 3
174
+ end
175
+
176
+ # This metric captures the requirement for a human user, other than the
177
+ # attacker, to participate in the successful compromise of the vulnerable
178
+ # component.
179
+ module UserInteraction
180
+ # Invalid value.
181
+ USER_INTERACTION_UNSPECIFIED = 0
182
+
183
+ # The vulnerable system can be exploited without interaction from any user.
184
+ USER_INTERACTION_NONE = 1
185
+
186
+ # Successful exploitation of this vulnerability requires a user to take
187
+ # some action before the vulnerability can be exploited.
188
+ USER_INTERACTION_REQUIRED = 2
189
+ end
190
+
191
+ # The Scope metric captures whether a vulnerability in one vulnerable
192
+ # component impacts resources in components beyond its security scope.
193
+ module Scope
194
+ # Invalid value.
195
+ SCOPE_UNSPECIFIED = 0
196
+
197
+ # An exploited vulnerability can only affect resources managed by the same
198
+ # security authority.
199
+ SCOPE_UNCHANGED = 1
200
+
201
+ # An exploited vulnerability can affect resources beyond the security scope
202
+ # managed by the security authority of the vulnerable component.
203
+ SCOPE_CHANGED = 2
204
+ end
205
+
206
+ # The Impact metrics capture the effects of a successfully exploited
207
+ # vulnerability on the component that suffers the worst outcome that is most
208
+ # directly and predictably associated with the attack.
209
+ module Impact
210
+ # Invalid value.
211
+ IMPACT_UNSPECIFIED = 0
212
+
213
+ # High impact.
214
+ IMPACT_HIGH = 1
215
+
216
+ # Low impact.
217
+ IMPACT_LOW = 2
218
+
219
+ # No impact.
220
+ IMPACT_NONE = 3
221
+ end
222
+ end
223
+ end
224
+ end
225
+ end
226
+ end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-cloud-security_center-v1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.8.1
4
+ version: 0.9.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-08-11 00:00:00.000000000 Z
11
+ date: 2021-10-18 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: gapic-common
@@ -210,6 +210,7 @@ files:
210
210
  - lib/google/cloud/securitycenter/v1/securitycenter_service_pb.rb
211
211
  - lib/google/cloud/securitycenter/v1/securitycenter_service_services_pb.rb
212
212
  - lib/google/cloud/securitycenter/v1/source_pb.rb
213
+ - lib/google/cloud/securitycenter/v1/vulnerability_pb.rb
213
214
  - proto_docs/README.md
214
215
  - proto_docs/google/api/field_behavior.rb
215
216
  - proto_docs/google/api/resource.rb
@@ -225,6 +226,7 @@ files:
225
226
  - proto_docs/google/cloud/securitycenter/v1/security_marks.rb
226
227
  - proto_docs/google/cloud/securitycenter/v1/securitycenter_service.rb
227
228
  - proto_docs/google/cloud/securitycenter/v1/source.rb
229
+ - proto_docs/google/cloud/securitycenter/v1/vulnerability.rb
228
230
  - proto_docs/google/iam/v1/iam_policy.rb
229
231
  - proto_docs/google/iam/v1/options.rb
230
232
  - proto_docs/google/iam/v1/policy.rb