@awboost/cfn-resource-types 0.1.135 → 0.1.137

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (66) hide show
  1. package/lib/AWS-ApiGatewayV2-Integration.d.ts +6 -75
  2. package/lib/AWS-ApiGatewayV2-Integration.js +1 -2
  3. package/lib/AWS-AppIntegrations-Application.d.ts +1 -1
  4. package/lib/AWS-ApplicationSignals-ServiceLevelObjective.d.ts +72 -1
  5. package/lib/AWS-Backup-RestoreTestingPlan.d.ts +6 -0
  6. package/lib/AWS-Batch-ComputeEnvironment.d.ts +1 -0
  7. package/lib/AWS-Bedrock-Flow.d.ts +131 -1
  8. package/lib/AWS-Bedrock-FlowAlias.d.ts +1 -1
  9. package/lib/AWS-Bedrock-FlowVersion.d.ts +118 -1
  10. package/lib/AWS-Bedrock-PromptVersion.d.ts +17 -0
  11. package/lib/AWS-CloudWatch-Alarm.d.ts +7 -4
  12. package/lib/AWS-CodeBuild-Fleet.d.ts +6 -2
  13. package/lib/AWS-Deadline-Fleet.d.ts +1 -1
  14. package/lib/AWS-EC2-CustomerGateway.d.ts +1 -1
  15. package/lib/AWS-EC2-InternetGateway.d.ts +1 -1
  16. package/lib/AWS-EC2-KeyPair.d.ts +1 -1
  17. package/lib/AWS-EC2-LaunchTemplate.d.ts +2 -2
  18. package/lib/AWS-EC2-NatGateway.d.ts +1 -1
  19. package/lib/AWS-EC2-Subnet.d.ts +4 -4
  20. package/lib/AWS-EC2-VPCEndpoint.d.ts +4 -2
  21. package/lib/AWS-EC2-VPCEndpoint.js +2 -1
  22. package/lib/AWS-EC2-VPNConnection.d.ts +12 -1
  23. package/lib/AWS-EC2-VPNGateway.d.ts +1 -1
  24. package/lib/AWS-EC2-VPNGatewayRoutePropagation.d.ts +6 -0
  25. package/lib/AWS-EC2-Volume.d.ts +13 -7
  26. package/lib/AWS-EC2-Volume.js +4 -1
  27. package/lib/AWS-ECR-Repository.d.ts +1 -1
  28. package/lib/AWS-ECS-TaskDefinition.d.ts +73 -62
  29. package/lib/AWS-ECS-TaskDefinition.js +1 -1
  30. package/lib/AWS-ElasticLoadBalancingV2-LoadBalancer.d.ts +1 -0
  31. package/lib/AWS-EntityResolution-MatchingWorkflow.d.ts +8 -0
  32. package/lib/AWS-EntityResolution-SchemaMapping.d.ts +1 -1
  33. package/lib/AWS-Glue-Database.d.ts +61 -8
  34. package/lib/AWS-IVS-Channel.d.ts +1 -1
  35. package/lib/AWS-IVS-PublicKey.d.ts +67 -0
  36. package/lib/AWS-IVS-PublicKey.js +12 -0
  37. package/lib/AWS-IVS-Stage.d.ts +24 -0
  38. package/lib/AWS-IoTFleetWise-Campaign.d.ts +20 -0
  39. package/lib/AWS-IoTFleetWise-DecoderManifest.d.ts +2 -2
  40. package/lib/AWS-Location-APIKey.d.ts +2 -2
  41. package/lib/AWS-MSK-Replicator.d.ts +21 -0
  42. package/lib/AWS-MediaLive-Input.d.ts +27 -0
  43. package/lib/AWS-MediaPackageV2-OriginEndpoint.d.ts +2 -2
  44. package/lib/AWS-Neptune-DBCluster.d.ts +7 -3
  45. package/lib/AWS-OpenSearchService-Domain.d.ts +12 -0
  46. package/lib/AWS-PaymentCryptography-Key.d.ts +3 -3
  47. package/lib/AWS-QBusiness-Application.d.ts +45 -0
  48. package/lib/AWS-QBusiness-WebExperience.d.ts +40 -0
  49. package/lib/AWS-QuickSight-Analysis.d.ts +48 -0
  50. package/lib/AWS-QuickSight-Dashboard.d.ts +48 -0
  51. package/lib/AWS-QuickSight-DataSet.d.ts +2 -2
  52. package/lib/AWS-QuickSight-DataSource.d.ts +1 -1
  53. package/lib/AWS-QuickSight-Template.d.ts +48 -0
  54. package/lib/AWS-RDS-DBInstance.d.ts +2 -2
  55. package/lib/AWS-RDS-GlobalCluster.d.ts +2 -0
  56. package/lib/AWS-SES-ReceiptRule.d.ts +1 -0
  57. package/lib/AWS-SSMQuickSetup-ConfigurationManager.d.ts +104 -0
  58. package/lib/AWS-SSMQuickSetup-ConfigurationManager.js +12 -0
  59. package/lib/AWS-SageMaker-Domain.d.ts +1 -1
  60. package/lib/AWS-SageMaker-UserProfile.d.ts +1 -1
  61. package/lib/AWS-SecurityHub-AutomationRule.d.ts +332 -96
  62. package/lib/AWS-SecurityHub-DelegatedAdmin.d.ts +9 -7
  63. package/lib/AWS-SecurityHub-DelegatedAdmin.js +4 -1
  64. package/lib/AWS-SecurityHub-FindingAggregator.d.ts +20 -10
  65. package/lib/AWS-SecurityHub-FindingAggregator.js +3 -1
  66. package/package.json +1 -1
@@ -6,36 +6,43 @@ import type { ResourceOptions as $ResourceOptions } from "@awboost/cfn-template-
6
6
  */
7
7
  export type SecurityHubAutomationRuleProperties = {
8
8
  /**
9
+ * One or more actions to update finding fields if a finding matches the conditions specified in ``Criteria``.
9
10
  * @minLength `1`
10
11
  * @maxLength `1`
11
12
  */
12
- Actions?: AutomationRulesAction[];
13
+ Actions: AutomationRulesAction[];
13
14
  /**
14
15
  * A set of [Security Finding Format (ASFF)](https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-findings-format.html) finding field attributes and corresponding expected values that ASH uses to filter findings. If a rule is enabled and a finding matches the criteria specified in this parameter, ASH applies the rule action to the finding.
15
16
  */
16
- Criteria?: AutomationRulesFindingFilters;
17
+ Criteria: AutomationRulesFindingFilters;
17
18
  /**
19
+ * A description of the rule.
18
20
  * @minLength `1`
19
21
  * @maxLength `1024`
20
22
  */
21
- Description?: string;
23
+ Description: string;
24
+ /**
25
+ * Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding matches the criteria for multiple rules, and each rule has different actions. If a rule is terminal, Security Hub applies the rule action to a finding that matches the rule criteria and doesn't evaluate other rules for the finding. By default, a rule isn't terminal.
26
+ */
22
27
  IsTerminal?: boolean;
23
28
  /**
29
+ * The name of the rule.
24
30
  * @minLength `1`
25
31
  * @maxLength `256`
26
32
  */
27
- RuleName?: string;
33
+ RuleName: string;
28
34
  /**
35
+ * An integer ranging from 1 to 1000 that represents the order in which the rule action is applied to findings. Security Hub applies rules with lower values for this parameter first.
29
36
  * @min `1`
30
37
  * @max `1000`
31
38
  */
32
- RuleOrder?: number;
39
+ RuleOrder: number;
33
40
  /**
34
41
  * Whether the rule is active after it is created. If this parameter is equal to ``ENABLED``, ASH applies the rule to findings and finding updates after the rule is created.
35
42
  */
36
43
  RuleStatus?: "ENABLED" | "DISABLED";
37
44
  /**
38
- * A key-value pair to associate with a resource.
45
+ * User-defined tags associated with an automation rule.
39
46
  */
40
47
  Tags?: Tags;
41
48
  };
@@ -72,29 +79,33 @@ export type SecurityHubAutomationRuleAttributes = {
72
79
  export type arnOrId = string | string;
73
80
  /**
74
81
  * Type definition for `AWS::SecurityHub::AutomationRule.AutomationRulesAction`.
82
+ * One or more actions to update finding fields if a finding matches the defined criteria of the rule.
75
83
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-securityhub-automationrule-automationrulesaction.html}
76
84
  */
77
85
  export type AutomationRulesAction = {
78
86
  /**
79
- * The rule action will update the ``Note`` field of a finding.
87
+ * Specifies that the automation rule action is an update to a finding field.
80
88
  */
81
89
  FindingFieldsUpdate: AutomationRulesFindingFieldsUpdate;
90
+ /**
91
+ * Specifies that the rule action should update the ``Types`` finding field. The ``Types`` finding field classifies findings in the format of namespace/category/classifier. For more information, see [Types taxonomy for ASFF](https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-findings-format-type-taxonomy.html) in the *User Guide*.
92
+ */
82
93
  Type: "FINDING_FIELDS_UPDATE";
83
94
  };
84
95
  /**
85
96
  * Type definition for `AWS::SecurityHub::AutomationRule.AutomationRulesFindingFieldsUpdate`.
86
- * The rule action will update the ``Note`` field of a finding.
97
+ * Identifies the finding fields that the automation rule action updates when a finding matches the defined criteria.
87
98
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-securityhub-automationrule-automationrulesfindingfieldsupdate.html}
88
99
  */
89
100
  export type AutomationRulesFindingFieldsUpdate = {
90
101
  /**
91
- * Integer from 0 to 100.
102
+ * The rule action updates the ``Confidence`` field of a finding.
92
103
  * @min `0`
93
104
  * @max `100`
94
105
  */
95
106
  Confidence?: number;
96
107
  /**
97
- * Integer from 0 to 100.
108
+ * The rule action updates the ``Criticality`` field of a finding.
98
109
  * @min `0`
99
110
  * @max `100`
100
111
  */
@@ -114,13 +125,17 @@ export type AutomationRulesFindingFieldsUpdate = {
114
125
  */
115
126
  Severity?: SeverityUpdate;
116
127
  /**
128
+ * The rule action updates the ``Types`` field of a finding.
117
129
  * @maxLength `50`
118
130
  */
119
131
  Types?: string[];
120
132
  /**
121
- * An object of user-defined name and value string pair added to a finding.
133
+ * The rule action updates the ``UserDefinedFields`` field of a finding.
122
134
  */
123
135
  UserDefinedFields?: map;
136
+ /**
137
+ * The rule action updates the ``VerificationState`` field of a finding.
138
+ */
124
139
  VerificationState?: "UNKNOWN" | "TRUE_POSITIVE" | "FALSE_POSITIVE" | "BENIGN_POSITIVE";
125
140
  /**
126
141
  * The rule action will update the ``Workflow`` field of a finding.
@@ -129,173 +144,302 @@ export type AutomationRulesFindingFieldsUpdate = {
129
144
  };
130
145
  /**
131
146
  * Type definition for `AWS::SecurityHub::AutomationRule.AutomationRulesFindingFilters`.
147
+ * The criteria that determine which findings a rule applies to.
132
148
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-securityhub-automationrule-automationrulesfindingfilters.html}
133
149
  */
134
150
  export type AutomationRulesFindingFilters = {
135
151
  /**
136
- * @maxLength `100`
137
- */
152
+ * The AWS-account ID in which a finding was generated.
153
+ Array Members: Minimum number of 1 item. Maximum number of 100 items.
154
+ * @maxLength `100`
155
+ */
138
156
  AwsAccountId?: StringFilter[];
139
157
  /**
140
- * @maxLength `20`
141
- */
158
+ * The name of the company for the product that generated the finding. For control-based findings, the company is AWS.
159
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
160
+ * @maxLength `20`
161
+ */
142
162
  CompanyName?: StringFilter[];
143
163
  /**
144
- * @maxLength `20`
145
- */
164
+ * The unique identifier of a standard in which a control is enabled. This field consists of the resource portion of the Amazon Resource Name (ARN) returned for a standard in the [DescribeStandards](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_DescribeStandards.html) API response.
165
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
166
+ * @maxLength `20`
167
+ */
146
168
  ComplianceAssociatedStandardsId?: StringFilter[];
147
169
  /**
148
- * @maxLength `20`
149
- */
170
+ * The security control ID for which a finding was generated. Security control IDs are the same across standards.
171
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
172
+ * @maxLength `20`
173
+ */
150
174
  ComplianceSecurityControlId?: StringFilter[];
151
175
  /**
152
- * @maxLength `20`
153
- */
176
+ * The result of a security check. This field is only used for findings generated from controls.
177
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
178
+ * @maxLength `20`
179
+ */
154
180
  ComplianceStatus?: StringFilter[];
155
181
  /**
156
- * @maxLength `20`
157
- */
182
+ * The likelihood that a finding accurately identifies the behavior or issue that it was intended to identify. ``Confidence`` is scored on a 0–100 basis using a ratio scale. A value of ``0`` means 0 percent confidence, and a value of ``100`` means 100 percent confidence. For example, a data exfiltration detection based on a statistical deviation of network traffic has low confidence because an actual exfiltration hasn't been verified. For more information, see [Confidence](https://docs.aws.amazon.com/securityhub/latest/userguide/asff-top-level-attributes.html#asff-confidence) in the *User Guide*.
183
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
184
+ * @maxLength `20`
185
+ */
158
186
  Confidence?: NumberFilter[];
159
187
  /**
160
- * @maxLength `20`
161
- */
188
+ * A timestamp that indicates when this finding record was created.
189
+ This field accepts only the specified formats. Timestamps can end with ``Z`` or ``("+" / "-") time-hour [":" time-minute]``. The time-secfrac after seconds is limited to a maximum of 9 digits. The offset is bounded by +/-18:00. Here are valid timestamp formats with examples:
190
+ + ``YYYY-MM-DDTHH:MM:SSZ`` (for example, ``2019-01-31T23:00:00Z``)
191
+ + ``YYYY-MM-DDTHH:MM:SS.mmmmmmmmmZ`` (for example, ``2019-01-31T23:00:00.123456789Z``)
192
+ + ``YYYY-MM-DDTHH:MM:SS+HH:MM`` (for example, ``2024-01-04T15:25:10+17:59``)
193
+ + ``YYYY-MM-DDTHH:MM:SS-HHMM`` (for example, ``2024-01-04T15:25:10-1759``)
194
+ + ``YYYY-MM-DDTHH:MM:SS.mmmmmmmmm+HH:MM`` (for example, ``2024-01-04T15:25:10.123456789+17:59``)
195
+
196
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
197
+ * @maxLength `20`
198
+ */
162
199
  CreatedAt?: DateFilter[];
163
200
  /**
164
- * @maxLength `20`
165
- */
201
+ * The level of importance that is assigned to the resources that are associated with a finding. ``Criticality`` is scored on a 0–100 basis, using a ratio scale that supports only full integers. A score of ``0`` means that the underlying resources have no criticality, and a score of ``100`` is reserved for the most critical resources. For more information, see [Criticality](https://docs.aws.amazon.com/securityhub/latest/userguide/asff-top-level-attributes.html#asff-criticality) in the *User Guide*.
202
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
203
+ * @maxLength `20`
204
+ */
166
205
  Criticality?: NumberFilter[];
167
206
  /**
168
- * @maxLength `20`
169
- */
207
+ * A finding's description.
208
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
209
+ * @maxLength `20`
210
+ */
170
211
  Description?: StringFilter[];
171
212
  /**
172
- * @maxLength `20`
173
- */
213
+ * A timestamp that indicates when the potential security issue captured by a finding was first observed by the security findings product.
214
+ This field accepts only the specified formats. Timestamps can end with ``Z`` or ``("+" / "-") time-hour [":" time-minute]``. The time-secfrac after seconds is limited to a maximum of 9 digits. The offset is bounded by +/-18:00. Here are valid timestamp formats with examples:
215
+ + ``YYYY-MM-DDTHH:MM:SSZ`` (for example, ``2019-01-31T23:00:00Z``)
216
+ + ``YYYY-MM-DDTHH:MM:SS.mmmmmmmmmZ`` (for example, ``2019-01-31T23:00:00.123456789Z``)
217
+ + ``YYYY-MM-DDTHH:MM:SS+HH:MM`` (for example, ``2024-01-04T15:25:10+17:59``)
218
+ + ``YYYY-MM-DDTHH:MM:SS-HHMM`` (for example, ``2024-01-04T15:25:10-1759``)
219
+ + ``YYYY-MM-DDTHH:MM:SS.mmmmmmmmm+HH:MM`` (for example, ``2024-01-04T15:25:10.123456789+17:59``)
220
+
221
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
222
+ * @maxLength `20`
223
+ */
174
224
  FirstObservedAt?: DateFilter[];
175
225
  /**
176
- * @maxLength `100`
177
- */
226
+ * The identifier for the solution-specific component that generated a finding.
227
+ Array Members: Minimum number of 1 item. Maximum number of 100 items.
228
+ * @maxLength `100`
229
+ */
178
230
  GeneratorId?: StringFilter[];
179
231
  /**
180
- * @maxLength `20`
181
- */
232
+ * The product-specific identifier for a finding.
233
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
234
+ * @maxLength `20`
235
+ */
182
236
  Id?: StringFilter[];
183
237
  /**
184
- * @maxLength `20`
185
- */
238
+ * A timestamp that indicates when the potential security issue captured by a finding was most recently observed by the security findings product.
239
+ This field accepts only the specified formats. Timestamps can end with ``Z`` or ``("+" / "-") time-hour [":" time-minute]``. The time-secfrac after seconds is limited to a maximum of 9 digits. The offset is bounded by +/-18:00. Here are valid timestamp formats with examples:
240
+ + ``YYYY-MM-DDTHH:MM:SSZ`` (for example, ``2019-01-31T23:00:00Z``)
241
+ + ``YYYY-MM-DDTHH:MM:SS.mmmmmmmmmZ`` (for example, ``2019-01-31T23:00:00.123456789Z``)
242
+ + ``YYYY-MM-DDTHH:MM:SS+HH:MM`` (for example, ``2024-01-04T15:25:10+17:59``)
243
+ + ``YYYY-MM-DDTHH:MM:SS-HHMM`` (for example, ``2024-01-04T15:25:10-1759``)
244
+ + ``YYYY-MM-DDTHH:MM:SS.mmmmmmmmm+HH:MM`` (for example, ``2024-01-04T15:25:10.123456789+17:59``)
245
+
246
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
247
+ * @maxLength `20`
248
+ */
186
249
  LastObservedAt?: DateFilter[];
187
250
  /**
188
- * @maxLength `20`
189
- */
251
+ * The text of a user-defined note that's added to a finding.
252
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
253
+ * @maxLength `20`
254
+ */
190
255
  NoteText?: StringFilter[];
191
256
  /**
192
- * @maxLength `20`
193
- */
257
+ * The timestamp of when the note was updated.
258
+ This field accepts only the specified formats. Timestamps can end with ``Z`` or ``("+" / "-") time-hour [":" time-minute]``. The time-secfrac after seconds is limited to a maximum of 9 digits. The offset is bounded by +/-18:00. Here are valid timestamp formats with examples:
259
+ + ``YYYY-MM-DDTHH:MM:SSZ`` (for example, ``2019-01-31T23:00:00Z``)
260
+ + ``YYYY-MM-DDTHH:MM:SS.mmmmmmmmmZ`` (for example, ``2019-01-31T23:00:00.123456789Z``)
261
+ + ``YYYY-MM-DDTHH:MM:SS+HH:MM`` (for example, ``2024-01-04T15:25:10+17:59``)
262
+ + ``YYYY-MM-DDTHH:MM:SS-HHMM`` (for example, ``2024-01-04T15:25:10-1759``)
263
+ + ``YYYY-MM-DDTHH:MM:SS.mmmmmmmmm+HH:MM`` (for example, ``2024-01-04T15:25:10.123456789+17:59``)
264
+
265
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
266
+ * @maxLength `20`
267
+ */
194
268
  NoteUpdatedAt?: DateFilter[];
195
269
  /**
196
- * @maxLength `20`
197
- */
270
+ * The principal that created a note.
271
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
272
+ * @maxLength `20`
273
+ */
198
274
  NoteUpdatedBy?: StringFilter[];
199
275
  /**
200
- * @maxLength `20`
201
- */
276
+ * The Amazon Resource Name (ARN) for a third-party product that generated a finding in Security Hub.
277
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
278
+ * @maxLength `20`
279
+ */
202
280
  ProductArn?: StringFilter[];
203
281
  /**
204
- * @maxLength `20`
205
- */
282
+ * Provides the name of the product that generated the finding. For control-based findings, the product name is Security Hub.
283
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
284
+ * @maxLength `20`
285
+ */
206
286
  ProductName?: StringFilter[];
207
287
  /**
208
- * @maxLength `20`
209
- */
288
+ * Provides the current state of a finding.
289
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
290
+ * @maxLength `20`
291
+ */
210
292
  RecordState?: StringFilter[];
211
293
  /**
212
- * @maxLength `20`
213
- */
294
+ * The product-generated identifier for a related finding.
295
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
296
+ * @maxLength `20`
297
+ */
214
298
  RelatedFindingsId?: StringFilter[];
215
299
  /**
216
- * @maxLength `20`
217
- */
300
+ * The ARN for the product that generated a related finding.
301
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
302
+ * @maxLength `20`
303
+ */
218
304
  RelatedFindingsProductArn?: StringFilter[];
219
305
  /**
220
- * @maxLength `20`
221
- */
306
+ * Custom fields and values about the resource that a finding pertains to.
307
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
308
+ * @maxLength `20`
309
+ */
222
310
  ResourceDetailsOther?: MapFilter[];
223
311
  /**
224
- * @maxLength `100`
225
- */
312
+ * The identifier for the given resource type. For AWS resources that are identified by Amazon Resource Names (ARNs), this is the ARN. For AWS resources that lack ARNs, this is the identifier as defined by the AWS-service that created the resource. For non-AWS resources, this is a unique identifier that is associated with the resource.
313
+ Array Members: Minimum number of 1 item. Maximum number of 100 items.
314
+ * @maxLength `100`
315
+ */
226
316
  ResourceId?: StringFilter[];
227
317
  /**
228
- * @maxLength `20`
229
- */
318
+ * The partition in which the resource that the finding pertains to is located. A partition is a group of AWS-Regions. Each AWS-account is scoped to one partition.
319
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
320
+ * @maxLength `20`
321
+ */
230
322
  ResourcePartition?: StringFilter[];
231
323
  /**
232
- * @maxLength `20`
233
- */
324
+ * The AWS-Region where the resource that a finding pertains to is located.
325
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
326
+ * @maxLength `20`
327
+ */
234
328
  ResourceRegion?: StringFilter[];
235
329
  /**
236
- * @maxLength `20`
237
- */
330
+ * A list of AWS tags associated with a resource at the time the finding was processed.
331
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
332
+ * @maxLength `20`
333
+ */
238
334
  ResourceTags?: MapFilter[];
239
335
  /**
240
- * @maxLength `20`
241
- */
336
+ * A finding's title.
337
+ Array Members: Minimum number of 1 item. Maximum number of 100 items.
338
+ * @maxLength `20`
339
+ */
242
340
  ResourceType?: StringFilter[];
243
341
  /**
244
- * @maxLength `20`
245
- */
342
+ * The severity value of the finding.
343
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
344
+ * @maxLength `20`
345
+ */
246
346
  SeverityLabel?: StringFilter[];
247
347
  /**
248
- * @maxLength `20`
249
- */
348
+ * Provides a URL that links to a page about the current finding in the finding product.
349
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
350
+ * @maxLength `20`
351
+ */
250
352
  SourceUrl?: StringFilter[];
251
353
  /**
252
- * @maxLength `100`
253
- */
354
+ * A finding's title.
355
+ Array Members: Minimum number of 1 item. Maximum number of 100 items.
356
+ * @maxLength `100`
357
+ */
254
358
  Title?: StringFilter[];
255
359
  /**
256
- * @maxLength `20`
257
- */
360
+ * One or more finding types in the format of namespace/category/classifier that classify a finding. For a list of namespaces, classifiers, and categories, see [Types taxonomy for ASFF](https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-findings-format-type-taxonomy.html) in the *User Guide*.
361
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
362
+ * @maxLength `20`
363
+ */
258
364
  Type?: StringFilter[];
259
365
  /**
260
- * @maxLength `20`
261
- */
366
+ * A timestamp that indicates when the finding record was most recently updated.
367
+ This field accepts only the specified formats. Timestamps can end with ``Z`` or ``("+" / "-") time-hour [":" time-minute]``. The time-secfrac after seconds is limited to a maximum of 9 digits. The offset is bounded by +/-18:00. Here are valid timestamp formats with examples:
368
+ + ``YYYY-MM-DDTHH:MM:SSZ`` (for example, ``2019-01-31T23:00:00Z``)
369
+ + ``YYYY-MM-DDTHH:MM:SS.mmmmmmmmmZ`` (for example, ``2019-01-31T23:00:00.123456789Z``)
370
+ + ``YYYY-MM-DDTHH:MM:SS+HH:MM`` (for example, ``2024-01-04T15:25:10+17:59``)
371
+ + ``YYYY-MM-DDTHH:MM:SS-HHMM`` (for example, ``2024-01-04T15:25:10-1759``)
372
+ + ``YYYY-MM-DDTHH:MM:SS.mmmmmmmmm+HH:MM`` (for example, ``2024-01-04T15:25:10.123456789+17:59``)
373
+
374
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
375
+ * @maxLength `20`
376
+ */
262
377
  UpdatedAt?: DateFilter[];
263
378
  /**
264
- * @maxLength `20`
265
- */
379
+ * A list of user-defined name and value string pairs added to a finding.
380
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
381
+ * @maxLength `20`
382
+ */
266
383
  UserDefinedFields?: MapFilter[];
267
384
  /**
268
- * @maxLength `20`
269
- */
385
+ * Provides the veracity of a finding.
386
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
387
+ * @maxLength `20`
388
+ */
270
389
  VerificationState?: StringFilter[];
271
390
  /**
272
- * @maxLength `20`
273
- */
391
+ * Provides information about the status of the investigation into a finding.
392
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
393
+ * @maxLength `20`
394
+ */
274
395
  WorkflowStatus?: StringFilter[];
275
396
  };
276
397
  /**
277
398
  * Type definition for `AWS::SecurityHub::AutomationRule.DateFilter`.
399
+ * A date filter for querying findings.
278
400
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-securityhub-automationrule-datefilter.html}
279
401
  */
280
402
  export type DateFilter = {
281
- DateRange?: DateRange;
282
403
  /**
283
- * The date and time, in UTC and ISO 8601 format.
284
- * @pattern `^(\d\d\d\d)-([0][1-9]|[1][0-2])-([0][1-9]|[1-2](\d)|[3][0-1])[T](?:([0-1](\d)|[2][0-3]):[0-5](\d):[0-5](\d)|23:59:60)(?:\.(\d)+)?([Z]|[+-](\d\d)(:?(\d\d))?)$`
404
+ * A date range for the date filter.
285
405
  */
406
+ DateRange?: DateRange;
407
+ /**
408
+ * A timestamp that provides the end date for the date filter.
409
+ This field accepts only the specified formats. Timestamps can end with ``Z`` or ``("+" / "-") time-hour [":" time-minute]``. The time-secfrac after seconds is limited to a maximum of 9 digits. The offset is bounded by +/-18:00. Here are valid timestamp formats with examples:
410
+ + ``YYYY-MM-DDTHH:MM:SSZ`` (for example, ``2019-01-31T23:00:00Z``)
411
+ + ``YYYY-MM-DDTHH:MM:SS.mmmmmmmmmZ`` (for example, ``2019-01-31T23:00:00.123456789Z``)
412
+ + ``YYYY-MM-DDTHH:MM:SS+HH:MM`` (for example, ``2024-01-04T15:25:10+17:59``)
413
+ + ``YYYY-MM-DDTHH:MM:SS-HHMM`` (for example, ``2024-01-04T15:25:10-1759``)
414
+ + ``YYYY-MM-DDTHH:MM:SS.mmmmmmmmm+HH:MM`` (for example, ``2024-01-04T15:25:10.123456789+17:59``)
415
+ * @pattern `^(\d\d\d\d)-([0][1-9]|[1][0-2])-([0][1-9]|[1-2](\d)|[3][0-1])[T](?:([0-1](\d)|[2][0-3]):[0-5](\d):[0-5](\d)|23:59:60)(?:\.(\d)+)?([Z]|[+-](\d\d)(:?(\d\d))?)$`
416
+ */
286
417
  End?: string;
287
418
  /**
288
- * The date and time, in UTC and ISO 8601 format.
289
- * @pattern `^(\d\d\d\d)-([0][1-9]|[1][0-2])-([0][1-9]|[1-2](\d)|[3][0-1])[T](?:([0-1](\d)|[2][0-3]):[0-5](\d):[0-5](\d)|23:59:60)(?:\.(\d)+)?([Z]|[+-](\d\d)(:?(\d\d))?)$`
290
- */
419
+ * A timestamp that provides the start date for the date filter.
420
+ This field accepts only the specified formats. Timestamps can end with ``Z`` or ``("+" / "-") time-hour [":" time-minute]``. The time-secfrac after seconds is limited to a maximum of 9 digits. The offset is bounded by +/-18:00. Here are valid timestamp formats with examples:
421
+ + ``YYYY-MM-DDTHH:MM:SSZ`` (for example, ``2019-01-31T23:00:00Z``)
422
+ + ``YYYY-MM-DDTHH:MM:SS.mmmmmmmmmZ`` (for example, ``2019-01-31T23:00:00.123456789Z``)
423
+ + ``YYYY-MM-DDTHH:MM:SS+HH:MM`` (for example, ``2024-01-04T15:25:10+17:59``)
424
+ + ``YYYY-MM-DDTHH:MM:SS-HHMM`` (for example, ``2024-01-04T15:25:10-1759``)
425
+ + ``YYYY-MM-DDTHH:MM:SS.mmmmmmmmm+HH:MM`` (for example, ``2024-01-04T15:25:10.123456789+17:59``)
426
+ * @pattern `^(\d\d\d\d)-([0][1-9]|[1][0-2])-([0][1-9]|[1-2](\d)|[3][0-1])[T](?:([0-1](\d)|[2][0-3]):[0-5](\d):[0-5](\d)|23:59:60)(?:\.(\d)+)?([Z]|[+-](\d\d)(:?(\d\d))?)$`
427
+ */
291
428
  Start?: string;
292
429
  };
293
430
  /**
294
431
  * Type definition for `AWS::SecurityHub::AutomationRule.DateRange`.
432
+ * A date range for the date filter.
295
433
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-securityhub-automationrule-daterange.html}
296
434
  */
297
435
  export type DateRange = {
436
+ /**
437
+ * A date range unit for the date filter.
438
+ */
298
439
  Unit: "DAYS";
440
+ /**
441
+ * A date range value for the date filter.
442
+ */
299
443
  Value: number;
300
444
  };
301
445
  /**
@@ -306,35 +450,70 @@ export type DateRange = {
306
450
  export type map = Record<string, string>;
307
451
  /**
308
452
  * Type definition for `AWS::SecurityHub::AutomationRule.MapFilter`.
453
+ * A map filter for filtering ASHlong findings. Each map filter provides the field to check for, the value to check for, and the comparison operator.
309
454
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-securityhub-automationrule-mapfilter.html}
310
455
  */
311
456
  export type MapFilter = {
457
+ /**
458
+ * The condition to apply to the key value when filtering Security Hub findings with a map filter.
459
+ To search for values that have the filter value, use one of the following comparison operators:
460
+ + To search for values that include the filter value, use ``CONTAINS``. For example, for the ``ResourceTags`` field, the filter ``Department CONTAINS Security`` matches findings that include the value ``Security`` for the ``Department`` tag. In the same example, a finding with a value of ``Security team`` for the ``Department`` tag is a match.
461
+ + To search for values that exactly match the filter value, use ``EQUALS``. For example, for the ``ResourceTags`` field, the filter ``Department EQUALS Security`` matches findings that have the value ``Security`` for the ``Department`` tag.
462
+
463
+ ``CONTAINS`` and ``EQUALS`` filters on the same field are joined by ``OR``. A finding matches if it matches any one of those filters. For example, the filters ``Department CONTAINS Security OR Department CONTAINS Finance`` match a finding that includes either ``Security``, ``Finance``, or both values.
464
+ To search for values that don't have the filter value, use one of the following comparison operators:
465
+ + To search for values that exclude the filter value, use ``NOT_CONTAINS``. For example, for the ``ResourceTags`` field, the filter ``Department NOT_CONTAINS Finance`` matches findings that exclude the value ``Finance`` for the ``Department`` tag.
466
+ + To search for values other than the filter value, use ``NOT_EQUALS``. For example, for the ``ResourceTags`` field, the filter ``Department NOT_EQUALS Finance`` matches findings that don’t have the value ``Finance`` for the ``Department`` tag.
467
+
468
+ ``NOT_CONTAINS`` and ``NOT_EQUALS`` filters on the same field are joined by ``AND``. A finding matches only if it matches all of those filters. For example, the filters ``Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance`` match a finding that excludes both the ``Security`` and ``Finance`` values.
469
+ ``CONTAINS`` filters can only be used with other ``CONTAINS`` filters. ``NOT_CONTAINS`` filters can only be used with other ``NOT_CONTAINS`` filters.
470
+ You can’t have both a ``CONTAINS`` filter and a ``NOT_CONTAINS`` filter on the same field. Similarly, you can’t have both an ``EQUALS`` filter and a ``NOT_EQUALS`` filter on the same field. Combining filters in this way returns an error.
471
+ ``CONTAINS`` and ``NOT_CONTAINS`` operators can be used only with automation rules. For more information, see [Automation rules](https://docs.aws.amazon.com/securityhub/latest/userguide/automation-rules.html) in the *User Guide*.
472
+ */
312
473
  Comparison: "EQUALS" | "NOT_EQUALS" | "CONTAINS" | "NOT_CONTAINS";
474
+ /**
475
+ * The key of the map filter. For example, for ``ResourceTags``, ``Key`` identifies the name of the tag. For ``UserDefinedFields``, ``Key`` is the name of the field.
476
+ */
313
477
  Key: string;
478
+ /**
479
+ * The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called ``Department`` might be ``Security``. If you provide ``security`` as the filter value, then there's no match.
480
+ */
314
481
  Value: string;
315
482
  };
316
483
  /**
317
484
  * Type definition for `AWS::SecurityHub::AutomationRule.NoteUpdate`.
485
+ * The updated note.
318
486
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-securityhub-automationrule-noteupdate.html}
319
487
  */
320
488
  export type NoteUpdate = {
321
489
  /**
490
+ * The updated note text.
322
491
  * @minLength `1`
323
492
  * @maxLength `512`
324
493
  */
325
494
  Text: string;
326
495
  /**
327
- * The Amazon Resource Name (ARN) or Id of the automation rule.
496
+ * The principal that updated the note.
328
497
  */
329
498
  UpdatedBy: arnOrId;
330
499
  };
331
500
  /**
332
501
  * Type definition for `AWS::SecurityHub::AutomationRule.NumberFilter`.
502
+ * A number filter for querying findings.
333
503
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-securityhub-automationrule-numberfilter.html}
334
504
  */
335
505
  export type NumberFilter = {
506
+ /**
507
+ * The equal-to condition to be applied to a single field when querying for findings.
508
+ */
336
509
  Eq?: number;
510
+ /**
511
+ * The greater-than-equal condition to be applied to a single field when querying for findings.
512
+ */
337
513
  Gte?: number;
514
+ /**
515
+ * The less-than-equal condition to be applied to a single field when querying for findings.
516
+ */
338
517
  Lte?: number;
339
518
  };
340
519
  /**
@@ -344,8 +523,9 @@ export type NumberFilter = {
344
523
  */
345
524
  export type RelatedFinding = {
346
525
  /**
347
- * The Amazon Resource Name (ARN) or Id of the automation rule.
348
- */
526
+ * The product-generated identifier for a related finding.
527
+ Array Members: Minimum number of 1 item. Maximum number of 20 items.
528
+ */
349
529
  Id: arnOrId;
350
530
  /**
351
531
  * The Amazon Resource Name (ARN) for the product that generated a related finding.
@@ -357,27 +537,70 @@ export type RelatedFinding = {
357
537
  };
358
538
  /**
359
539
  * Type definition for `AWS::SecurityHub::AutomationRule.SeverityUpdate`.
540
+ * Updates to the severity information for a finding.
360
541
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-securityhub-automationrule-severityupdate.html}
361
542
  */
362
543
  export type SeverityUpdate = {
544
+ /**
545
+ * The severity value of the finding. The allowed values are the following.
546
+ + ``INFORMATIONAL`` - No issue was found.
547
+ + ``LOW`` - The issue does not require action on its own.
548
+ + ``MEDIUM`` - The issue must be addressed but not urgently.
549
+ + ``HIGH`` - The issue must be addressed as a priority.
550
+ + ``CRITICAL`` - The issue must be remediated immediately to avoid it escalating.
551
+ */
363
552
  Label?: "INFORMATIONAL" | "LOW" | "MEDIUM" | "HIGH" | "CRITICAL";
364
553
  /**
365
- * Integer from 0 to 100.
366
- * @min `0`
367
- * @max `100`
368
- */
554
+ * The normalized severity for the finding. This attribute is to be deprecated in favor of ``Label``.
555
+ If you provide ``Normalized`` and do not provide ``Label``, ``Label`` is set automatically as follows.
556
+ + 0 - ``INFORMATIONAL``
557
+ + 1–39 - ``LOW``
558
+ + 40–69 - ``MEDIUM``
559
+ + 70–89 - ``HIGH``
560
+ + 90–100 - ``CRITICAL``
561
+ * @min `0`
562
+ * @max `100`
563
+ */
369
564
  Normalized?: number;
565
+ /**
566
+ * The native severity as defined by the AWS service or integrated partner product that generated the finding.
567
+ */
370
568
  Product?: number;
371
569
  };
372
570
  /**
373
571
  * Type definition for `AWS::SecurityHub::AutomationRule.StringFilter`.
572
+ * A string filter for filtering ASHlong findings.
374
573
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-securityhub-automationrule-stringfilter.html}
375
574
  */
376
575
  export type StringFilter = {
377
576
  /**
378
- * The condition to apply to a string value when filtering Security Hub findings.
379
- */
577
+ * The condition to apply to a string value when filtering Security Hub findings.
578
+ To search for values that have the filter value, use one of the following comparison operators:
579
+ + To search for values that include the filter value, use ``CONTAINS``. For example, the filter ``Title CONTAINS CloudFront`` matches findings that have a ``Title`` that includes the string CloudFront.
580
+ + To search for values that exactly match the filter value, use ``EQUALS``. For example, the filter ``AwsAccountId EQUALS 123456789012`` only matches findings that have an account ID of ``123456789012``.
581
+ + To search for values that start with the filter value, use ``PREFIX``. For example, the filter ``ResourceRegion PREFIX us`` matches findings that have a ``ResourceRegion`` that starts with ``us``. A ``ResourceRegion`` that starts with a different value, such as ``af``, ``ap``, or ``ca``, doesn't match.
582
+
583
+ ``CONTAINS``, ``EQUALS``, and ``PREFIX`` filters on the same field are joined by ``OR``. A finding matches if it matches any one of those filters. For example, the filters ``Title CONTAINS CloudFront OR Title CONTAINS CloudWatch`` match a finding that includes either ``CloudFront``, ``CloudWatch``, or both strings in the title.
584
+ To search for values that don’t have the filter value, use one of the following comparison operators:
585
+ + To search for values that exclude the filter value, use ``NOT_CONTAINS``. For example, the filter ``Title NOT_CONTAINS CloudFront`` matches findings that have a ``Title`` that excludes the string CloudFront.
586
+ + To search for values other than the filter value, use ``NOT_EQUALS``. For example, the filter ``AwsAccountId NOT_EQUALS 123456789012`` only matches findings that have an account ID other than ``123456789012``.
587
+ + To search for values that don't start with the filter value, use ``PREFIX_NOT_EQUALS``. For example, the filter ``ResourceRegion PREFIX_NOT_EQUALS us`` matches findings with a ``ResourceRegion`` that starts with a value other than ``us``.
588
+
589
+ ``NOT_CONTAINS``, ``NOT_EQUALS``, and ``PREFIX_NOT_EQUALS`` filters on the same field are joined by ``AND``. A finding matches only if it matches all of those filters. For example, the filters ``Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch`` match a finding that excludes both ``CloudFront`` and ``CloudWatch`` in the title.
590
+ You can’t have both a ``CONTAINS`` filter and a ``NOT_CONTAINS`` filter on the same field. Similarly, you can't provide both an ``EQUALS`` filter and a ``NOT_EQUALS`` or ``PREFIX_NOT_EQUALS`` filter on the same field. Combining filters in this way returns an error. ``CONTAINS`` filters can only be used with other ``CONTAINS`` filters. ``NOT_CONTAINS`` filters can only be used with other ``NOT_CONTAINS`` filters.
591
+ You can combine ``PREFIX`` filters with ``NOT_EQUALS`` or ``PREFIX_NOT_EQUALS`` filters for the same field. Security Hub first processes the ``PREFIX`` filters, and then the ``NOT_EQUALS`` or ``PREFIX_NOT_EQUALS`` filters.
592
+ For example, for the following filters, Security Hub first identifies findings that have resource types that start with either ``AwsIam`` or ``AwsEc2``. It then excludes findings that have a resource type of ``AwsIamPolicy`` and findings that have a resource type of ``AwsEc2NetworkInterface``.
593
+ + ``ResourceType PREFIX AwsIam``
594
+ + ``ResourceType PREFIX AwsEc2``
595
+ + ``ResourceType NOT_EQUALS AwsIamPolicy``
596
+ + ``ResourceType NOT_EQUALS AwsEc2NetworkInterface``
597
+
598
+ ``CONTAINS`` and ``NOT_CONTAINS`` operators can be used only with automation rules. For more information, see [Automation rules](https://docs.aws.amazon.com/securityhub/latest/userguide/automation-rules.html) in the *User Guide*.
599
+ */
380
600
  Comparison: StringFilterComparison;
601
+ /**
602
+ * The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is ``Security Hub``. If you provide ``security hub`` as the filter value, there's no match.
603
+ */
381
604
  Value: string;
382
605
  };
383
606
  /**
@@ -394,9 +617,22 @@ export type StringFilterComparison = "EQUALS" | "PREFIX" | "NOT_EQUALS" | "PREFI
394
617
  export type Tags = Record<string, string>;
395
618
  /**
396
619
  * Type definition for `AWS::SecurityHub::AutomationRule.WorkflowUpdate`.
620
+ * Used to update information about the investigation into the finding.
397
621
  * @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-securityhub-automationrule-workflowupdate.html}
398
622
  */
399
623
  export type WorkflowUpdate = {
624
+ /**
625
+ * The status of the investigation into the finding. The workflow status is specific to an individual finding. It does not affect the generation of new findings. For example, setting the workflow status to ``SUPPRESSED`` or ``RESOLVED`` does not prevent a new finding for the same issue.
626
+ The allowed values are the following.
627
+ + ``NEW`` - The initial state of a finding, before it is reviewed.
628
+ Security Hub also resets ``WorkFlowStatus`` from ``NOTIFIED`` or ``RESOLVED`` to ``NEW`` in the following cases:
629
+ + The record state changes from ``ARCHIVED`` to ``ACTIVE``.
630
+ + The compliance status changes from ``PASSED`` to either ``WARNING``, ``FAILED``, or ``NOT_AVAILABLE``.
631
+
632
+ + ``NOTIFIED`` - Indicates that you notified the resource owner about the security issue. Used when the initial reviewer is not the resource owner, and needs intervention from the resource owner.
633
+ + ``RESOLVED`` - The finding was reviewed and remediated and is now considered resolved.
634
+ + ``SUPPRESSED`` - Indicates that you reviewed the finding and do not believe that any action is needed. The finding is no longer updated.
635
+ */
400
636
  Status: "NEW" | "NOTIFIED" | "RESOLVED" | "SUPPRESSED";
401
637
  };
402
638
  /**