@aws-sdk/client-accessanalyzer 3.830.0 → 3.831.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (30) hide show
  1. package/README.md +1 -24
  2. package/dist-cjs/index.js +31 -0
  3. package/dist-es/models/models_0.js +22 -0
  4. package/dist-es/protocols/Aws_restJson1.js +5 -0
  5. package/dist-types/AccessAnalyzer.d.ts +1 -24
  6. package/dist-types/AccessAnalyzerClient.d.ts +1 -24
  7. package/dist-types/commands/ApplyArchiveRuleCommand.d.ts +1 -2
  8. package/dist-types/commands/CheckNoNewAccessCommand.d.ts +1 -6
  9. package/dist-types/commands/CheckNoPublicAccessCommand.d.ts +1 -2
  10. package/dist-types/commands/CreateAccessPreviewCommand.d.ts +1 -2
  11. package/dist-types/commands/CreateAnalyzerCommand.d.ts +17 -0
  12. package/dist-types/commands/CreateArchiveRuleCommand.d.ts +1 -3
  13. package/dist-types/commands/DeleteAnalyzerCommand.d.ts +1 -3
  14. package/dist-types/commands/GetAnalyzerCommand.d.ts +17 -0
  15. package/dist-types/commands/GetArchiveRuleCommand.d.ts +1 -2
  16. package/dist-types/commands/GetFindingCommand.d.ts +1 -4
  17. package/dist-types/commands/GetFindingV2Command.d.ts +29 -7
  18. package/dist-types/commands/GetFindingsStatisticsCommand.d.ts +13 -2
  19. package/dist-types/commands/GetGeneratedPolicyCommand.d.ts +1 -2
  20. package/dist-types/commands/ListAccessPreviewFindingsCommand.d.ts +1 -2
  21. package/dist-types/commands/ListAnalyzedResourcesCommand.d.ts +1 -2
  22. package/dist-types/commands/ListAnalyzersCommand.d.ts +17 -0
  23. package/dist-types/commands/ListFindingsCommand.d.ts +1 -5
  24. package/dist-types/commands/ListFindingsV2Command.d.ts +1 -5
  25. package/dist-types/commands/UpdateAnalyzerCommand.d.ts +34 -0
  26. package/dist-types/commands/ValidatePolicyCommand.d.ts +1 -3
  27. package/dist-types/index.d.ts +1 -24
  28. package/dist-types/models/models_0.d.ts +455 -899
  29. package/dist-types/ts3.4/models/models_0.d.ts +117 -18
  30. package/package.json +1 -1
package/README.md CHANGED
@@ -6,30 +6,7 @@
6
6
 
7
7
  AWS SDK for JavaScript AccessAnalyzer Client for Node.js, Browser and React Native.
8
8
 
9
- <p>Identity and Access Management Access Analyzer helps you to set, verify, and refine your IAM policies by providing
10
- a suite of capabilities. Its features include findings for external and unused access,
11
- basic and custom policy checks for validating policies, and policy generation to generate
12
- fine-grained policies. To start using IAM Access Analyzer to identify external or unused access,
13
- you first need to create an analyzer.</p>
14
- <p>
15
- <b>External access analyzers</b> help identify potential risks
16
- of accessing resources by enabling you to identify any resource policies that grant access
17
- to an external principal. It does this by using logic-based reasoning to analyze
18
- resource-based policies in your Amazon Web Services environment. An external principal can be another
19
- Amazon Web Services account, a root user, an IAM user or role, a federated user, an Amazon Web Services service, or an
20
- anonymous user. You can also use IAM Access Analyzer to preview public and cross-account access
21
- to your resources before deploying permissions changes.</p>
22
- <p>
23
- <b>Unused access analyzers</b> help identify potential
24
- identity access risks by enabling you to identify unused IAM roles, unused access keys,
25
- unused console passwords, and IAM principals with unused service and action-level
26
- permissions.</p>
27
- <p>Beyond findings, IAM Access Analyzer provides basic and custom policy checks to validate IAM
28
- policies before deploying permissions changes. You can use policy generation to refine
29
- permissions by attaching a policy generated using access activity logged in CloudTrail logs. </p>
30
- <p>This guide describes the IAM Access Analyzer operations that you can call programmatically.
31
- For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the
32
- <b>IAM User Guide</b>.</p>
9
+ <p>Identity and Access Management Access Analyzer helps you to set, verify, and refine your IAM policies by providing a suite of capabilities. Its features include findings for external and unused access, basic and custom policy checks for validating policies, and policy generation to generate fine-grained policies. To start using IAM Access Analyzer to identify external or unused access, you first need to create an analyzer.</p> <p> <b>External access analyzers</b> help identify potential risks of accessing resources by enabling you to identify any resource policies that grant access to an external principal. It does this by using logic-based reasoning to analyze resource-based policies in your Amazon Web Services environment. An external principal can be another Amazon Web Services account, a root user, an IAM user or role, a federated user, an Amazon Web Services service, or an anonymous user. You can also use IAM Access Analyzer to preview public and cross-account access to your resources before deploying permissions changes.</p> <p> <b>Unused access analyzers</b> help identify potential identity access risks by enabling you to identify unused IAM roles, unused access keys, unused console passwords, and IAM principals with unused service and action-level permissions.</p> <p>Beyond findings, IAM Access Analyzer provides basic and custom policy checks to validate IAM policies before deploying permissions changes. You can use policy generation to refine permissions by attaching a policy generated using access activity logged in CloudTrail logs. </p> <p>This guide describes the IAM Access Analyzer operations that you can call programmatically. For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
33
10
 
34
11
  ## Installing
35
12
 
package/dist-cjs/index.js CHANGED
@@ -64,6 +64,7 @@ __export(index_exports, {
64
64
  GetFindingV2Command: () => GetFindingV2Command,
65
65
  GetFindingsStatisticsCommand: () => GetFindingsStatisticsCommand,
66
66
  GetGeneratedPolicyCommand: () => GetGeneratedPolicyCommand,
67
+ InternalAccessType: () => InternalAccessType,
67
68
  InternalServerException: () => InternalServerException,
68
69
  InvalidParameterException: () => InvalidParameterException,
69
70
  JobErrorCode: () => JobErrorCode,
@@ -82,6 +83,7 @@ __export(index_exports, {
82
83
  NetworkOriginConfiguration: () => NetworkOriginConfiguration,
83
84
  PathElement: () => PathElement,
84
85
  PolicyType: () => PolicyType,
86
+ PrincipalType: () => PrincipalType,
85
87
  RdsDbClusterSnapshotAttributeValue: () => RdsDbClusterSnapshotAttributeValue,
86
88
  RdsDbSnapshotAttributeValue: () => RdsDbSnapshotAttributeValue,
87
89
  RecommendationType: () => RecommendationType,
@@ -89,6 +91,7 @@ __export(index_exports, {
89
91
  RecommendedStep: () => RecommendedStep,
90
92
  ResourceControlPolicyRestriction: () => ResourceControlPolicyRestriction,
91
93
  ResourceNotFoundException: () => ResourceNotFoundException,
94
+ ServiceControlPolicyRestriction: () => ServiceControlPolicyRestriction,
92
95
  ServiceQuotaExceededException: () => ServiceQuotaExceededException,
93
96
  StartPolicyGenerationCommand: () => StartPolicyGenerationCommand,
94
97
  StartResourceScanCommand: () => StartResourceScanCommand,
@@ -493,6 +496,7 @@ var AnalyzerConfiguration;
493
496
  ((AnalyzerConfiguration3) => {
494
497
  AnalyzerConfiguration3.visit = /* @__PURE__ */ __name((value, visitor) => {
495
498
  if (value.unusedAccess !== void 0) return visitor.unusedAccess(value.unusedAccess);
499
+ if (value.internalAccess !== void 0) return visitor.internalAccess(value.internalAccess);
496
500
  return visitor._(value.$unknown[0], value.$unknown[1]);
497
501
  }, "visit");
498
502
  })(AnalyzerConfiguration || (AnalyzerConfiguration = {}));
@@ -662,6 +666,7 @@ var AccessPreviewStatusReasonCode = {
662
666
  };
663
667
  var ResourceControlPolicyRestriction = {
664
668
  APPLICABLE: "APPLICABLE",
669
+ APPLIED: "APPLIED",
665
670
  FAILED_TO_EVALUATE_RCP: "FAILED_TO_EVALUATE_RCP",
666
671
  NOT_APPLICABLE: "NOT_APPLICABLE"
667
672
  };
@@ -690,14 +695,31 @@ var FindingsStatistics;
690
695
  FindingsStatistics2.visit = /* @__PURE__ */ __name((value, visitor) => {
691
696
  if (value.externalAccessFindingsStatistics !== void 0)
692
697
  return visitor.externalAccessFindingsStatistics(value.externalAccessFindingsStatistics);
698
+ if (value.internalAccessFindingsStatistics !== void 0)
699
+ return visitor.internalAccessFindingsStatistics(value.internalAccessFindingsStatistics);
693
700
  if (value.unusedAccessFindingsStatistics !== void 0)
694
701
  return visitor.unusedAccessFindingsStatistics(value.unusedAccessFindingsStatistics);
695
702
  return visitor._(value.$unknown[0], value.$unknown[1]);
696
703
  }, "visit");
697
704
  })(FindingsStatistics || (FindingsStatistics = {}));
705
+ var InternalAccessType = {
706
+ INTRA_ACCOUNT: "INTRA_ACCOUNT",
707
+ INTRA_ORG: "INTRA_ORG"
708
+ };
709
+ var PrincipalType = {
710
+ IAM_ROLE: "IAM_ROLE",
711
+ IAM_USER: "IAM_USER"
712
+ };
713
+ var ServiceControlPolicyRestriction = {
714
+ APPLICABLE: "APPLICABLE",
715
+ APPLIED: "APPLIED",
716
+ FAILED_TO_EVALUATE_SCP: "FAILED_TO_EVALUATE_SCP",
717
+ NOT_APPLICABLE: "NOT_APPLICABLE"
718
+ };
698
719
  var FindingDetails;
699
720
  ((FindingDetails3) => {
700
721
  FindingDetails3.visit = /* @__PURE__ */ __name((value, visitor) => {
722
+ if (value.internalAccessDetails !== void 0) return visitor.internalAccessDetails(value.internalAccessDetails);
701
723
  if (value.externalAccessDetails !== void 0) return visitor.externalAccessDetails(value.externalAccessDetails);
702
724
  if (value.unusedPermissionDetails !== void 0)
703
725
  return visitor.unusedPermissionDetails(value.unusedPermissionDetails);
@@ -711,6 +733,7 @@ var FindingDetails;
711
733
  })(FindingDetails || (FindingDetails = {}));
712
734
  var FindingType = {
713
735
  EXTERNAL_ACCESS: "ExternalAccess",
736
+ INTERNAL_ACCESS: "InternalAccess",
714
737
  UNUSED_IAM_ROLE: "UnusedIAMRole",
715
738
  UNUSED_IAM_USER_ACCESS_KEY: "UnusedIAMUserAccessKey",
716
739
  UNUSED_IAM_USER_PASSWORD: "UnusedIAMUserPassword",
@@ -2164,6 +2187,11 @@ var de_FindingDetails = /* @__PURE__ */ __name((output, context) => {
2164
2187
  externalAccessDetails: (0, import_smithy_client._json)(output.externalAccessDetails)
2165
2188
  };
2166
2189
  }
2190
+ if (output.internalAccessDetails != null) {
2191
+ return {
2192
+ internalAccessDetails: (0, import_smithy_client._json)(output.internalAccessDetails)
2193
+ };
2194
+ }
2167
2195
  if (output.unusedIamRoleDetails != null) {
2168
2196
  return {
2169
2197
  unusedIamRoleDetails: de_UnusedIamRoleDetails(output.unusedIamRoleDetails, context)
@@ -3082,6 +3110,9 @@ var paginateValidatePolicy = (0, import_core.createPaginator)(AccessAnalyzerClie
3082
3110
  RecommendedStep,
3083
3111
  Status,
3084
3112
  FindingsStatistics,
3113
+ InternalAccessType,
3114
+ PrincipalType,
3115
+ ServiceControlPolicyRestriction,
3085
3116
  FindingDetails,
3086
3117
  FindingType,
3087
3118
  JobErrorCode,
@@ -120,6 +120,8 @@ export var AnalyzerConfiguration;
120
120
  AnalyzerConfiguration.visit = (value, visitor) => {
121
121
  if (value.unusedAccess !== undefined)
122
122
  return visitor.unusedAccess(value.unusedAccess);
123
+ if (value.internalAccess !== undefined)
124
+ return visitor.internalAccess(value.internalAccess);
123
125
  return visitor._(value.$unknown[0], value.$unknown[1]);
124
126
  };
125
127
  })(AnalyzerConfiguration || (AnalyzerConfiguration = {}));
@@ -296,6 +298,7 @@ export const AccessPreviewStatusReasonCode = {
296
298
  };
297
299
  export const ResourceControlPolicyRestriction = {
298
300
  APPLICABLE: "APPLICABLE",
301
+ APPLIED: "APPLIED",
299
302
  FAILED_TO_EVALUATE_RCP: "FAILED_TO_EVALUATE_RCP",
300
303
  NOT_APPLICABLE: "NOT_APPLICABLE",
301
304
  };
@@ -324,14 +327,32 @@ export var FindingsStatistics;
324
327
  FindingsStatistics.visit = (value, visitor) => {
325
328
  if (value.externalAccessFindingsStatistics !== undefined)
326
329
  return visitor.externalAccessFindingsStatistics(value.externalAccessFindingsStatistics);
330
+ if (value.internalAccessFindingsStatistics !== undefined)
331
+ return visitor.internalAccessFindingsStatistics(value.internalAccessFindingsStatistics);
327
332
  if (value.unusedAccessFindingsStatistics !== undefined)
328
333
  return visitor.unusedAccessFindingsStatistics(value.unusedAccessFindingsStatistics);
329
334
  return visitor._(value.$unknown[0], value.$unknown[1]);
330
335
  };
331
336
  })(FindingsStatistics || (FindingsStatistics = {}));
337
+ export const InternalAccessType = {
338
+ INTRA_ACCOUNT: "INTRA_ACCOUNT",
339
+ INTRA_ORG: "INTRA_ORG",
340
+ };
341
+ export const PrincipalType = {
342
+ IAM_ROLE: "IAM_ROLE",
343
+ IAM_USER: "IAM_USER",
344
+ };
345
+ export const ServiceControlPolicyRestriction = {
346
+ APPLICABLE: "APPLICABLE",
347
+ APPLIED: "APPLIED",
348
+ FAILED_TO_EVALUATE_SCP: "FAILED_TO_EVALUATE_SCP",
349
+ NOT_APPLICABLE: "NOT_APPLICABLE",
350
+ };
332
351
  export var FindingDetails;
333
352
  (function (FindingDetails) {
334
353
  FindingDetails.visit = (value, visitor) => {
354
+ if (value.internalAccessDetails !== undefined)
355
+ return visitor.internalAccessDetails(value.internalAccessDetails);
335
356
  if (value.externalAccessDetails !== undefined)
336
357
  return visitor.externalAccessDetails(value.externalAccessDetails);
337
358
  if (value.unusedPermissionDetails !== undefined)
@@ -347,6 +368,7 @@ export var FindingDetails;
347
368
  })(FindingDetails || (FindingDetails = {}));
348
369
  export const FindingType = {
349
370
  EXTERNAL_ACCESS: "ExternalAccess",
371
+ INTERNAL_ACCESS: "InternalAccess",
350
372
  UNUSED_IAM_ROLE: "UnusedIAMRole",
351
373
  UNUSED_IAM_USER_ACCESS_KEY: "UnusedIAMUserAccessKey",
352
374
  UNUSED_IAM_USER_PASSWORD: "UnusedIAMUserPassword",
@@ -1348,6 +1348,11 @@ const de_FindingDetails = (output, context) => {
1348
1348
  externalAccessDetails: _json(output.externalAccessDetails),
1349
1349
  };
1350
1350
  }
1351
+ if (output.internalAccessDetails != null) {
1352
+ return {
1353
+ internalAccessDetails: _json(output.internalAccessDetails),
1354
+ };
1355
+ }
1351
1356
  if (output.unusedIamRoleDetails != null) {
1352
1357
  return {
1353
1358
  unusedIamRoleDetails: de_UnusedIamRoleDetails(output.unusedIamRoleDetails, context),
@@ -264,30 +264,7 @@ export interface AccessAnalyzer {
264
264
  validatePolicy(args: ValidatePolicyCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: ValidatePolicyCommandOutput) => void): void;
265
265
  }
266
266
  /**
267
- * <p>Identity and Access Management Access Analyzer helps you to set, verify, and refine your IAM policies by providing
268
- * a suite of capabilities. Its features include findings for external and unused access,
269
- * basic and custom policy checks for validating policies, and policy generation to generate
270
- * fine-grained policies. To start using IAM Access Analyzer to identify external or unused access,
271
- * you first need to create an analyzer.</p>
272
- * <p>
273
- * <b>External access analyzers</b> help identify potential risks
274
- * of accessing resources by enabling you to identify any resource policies that grant access
275
- * to an external principal. It does this by using logic-based reasoning to analyze
276
- * resource-based policies in your Amazon Web Services environment. An external principal can be another
277
- * Amazon Web Services account, a root user, an IAM user or role, a federated user, an Amazon Web Services service, or an
278
- * anonymous user. You can also use IAM Access Analyzer to preview public and cross-account access
279
- * to your resources before deploying permissions changes.</p>
280
- * <p>
281
- * <b>Unused access analyzers</b> help identify potential
282
- * identity access risks by enabling you to identify unused IAM roles, unused access keys,
283
- * unused console passwords, and IAM principals with unused service and action-level
284
- * permissions.</p>
285
- * <p>Beyond findings, IAM Access Analyzer provides basic and custom policy checks to validate IAM
286
- * policies before deploying permissions changes. You can use policy generation to refine
287
- * permissions by attaching a policy generated using access activity logged in CloudTrail logs. </p>
288
- * <p>This guide describes the IAM Access Analyzer operations that you can call programmatically.
289
- * For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the
290
- * <b>IAM User Guide</b>.</p>
267
+ * <p>Identity and Access Management Access Analyzer helps you to set, verify, and refine your IAM policies by providing a suite of capabilities. Its features include findings for external and unused access, basic and custom policy checks for validating policies, and policy generation to generate fine-grained policies. To start using IAM Access Analyzer to identify external or unused access, you first need to create an analyzer.</p> <p> <b>External access analyzers</b> help identify potential risks of accessing resources by enabling you to identify any resource policies that grant access to an external principal. It does this by using logic-based reasoning to analyze resource-based policies in your Amazon Web Services environment. An external principal can be another Amazon Web Services account, a root user, an IAM user or role, a federated user, an Amazon Web Services service, or an anonymous user. You can also use IAM Access Analyzer to preview public and cross-account access to your resources before deploying permissions changes.</p> <p> <b>Unused access analyzers</b> help identify potential identity access risks by enabling you to identify unused IAM roles, unused access keys, unused console passwords, and IAM principals with unused service and action-level permissions.</p> <p>Beyond findings, IAM Access Analyzer provides basic and custom policy checks to validate IAM policies before deploying permissions changes. You can use policy generation to refine permissions by attaching a policy generated using access activity logged in CloudTrail logs. </p> <p>This guide describes the IAM Access Analyzer operations that you can call programmatically. For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
291
268
  * @public
292
269
  */
293
270
  export declare class AccessAnalyzer extends AccessAnalyzerClient implements AccessAnalyzer {
@@ -206,30 +206,7 @@ export type AccessAnalyzerClientResolvedConfigType = __SmithyResolvedConfigurati
206
206
  export interface AccessAnalyzerClientResolvedConfig extends AccessAnalyzerClientResolvedConfigType {
207
207
  }
208
208
  /**
209
- * <p>Identity and Access Management Access Analyzer helps you to set, verify, and refine your IAM policies by providing
210
- * a suite of capabilities. Its features include findings for external and unused access,
211
- * basic and custom policy checks for validating policies, and policy generation to generate
212
- * fine-grained policies. To start using IAM Access Analyzer to identify external or unused access,
213
- * you first need to create an analyzer.</p>
214
- * <p>
215
- * <b>External access analyzers</b> help identify potential risks
216
- * of accessing resources by enabling you to identify any resource policies that grant access
217
- * to an external principal. It does this by using logic-based reasoning to analyze
218
- * resource-based policies in your Amazon Web Services environment. An external principal can be another
219
- * Amazon Web Services account, a root user, an IAM user or role, a federated user, an Amazon Web Services service, or an
220
- * anonymous user. You can also use IAM Access Analyzer to preview public and cross-account access
221
- * to your resources before deploying permissions changes.</p>
222
- * <p>
223
- * <b>Unused access analyzers</b> help identify potential
224
- * identity access risks by enabling you to identify unused IAM roles, unused access keys,
225
- * unused console passwords, and IAM principals with unused service and action-level
226
- * permissions.</p>
227
- * <p>Beyond findings, IAM Access Analyzer provides basic and custom policy checks to validate IAM
228
- * policies before deploying permissions changes. You can use policy generation to refine
229
- * permissions by attaching a policy generated using access activity logged in CloudTrail logs. </p>
230
- * <p>This guide describes the IAM Access Analyzer operations that you can call programmatically.
231
- * For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the
232
- * <b>IAM User Guide</b>.</p>
209
+ * <p>Identity and Access Management Access Analyzer helps you to set, verify, and refine your IAM policies by providing a suite of capabilities. Its features include findings for external and unused access, basic and custom policy checks for validating policies, and policy generation to generate fine-grained policies. To start using IAM Access Analyzer to identify external or unused access, you first need to create an analyzer.</p> <p> <b>External access analyzers</b> help identify potential risks of accessing resources by enabling you to identify any resource policies that grant access to an external principal. It does this by using logic-based reasoning to analyze resource-based policies in your Amazon Web Services environment. An external principal can be another Amazon Web Services account, a root user, an IAM user or role, a federated user, an Amazon Web Services service, or an anonymous user. You can also use IAM Access Analyzer to preview public and cross-account access to your resources before deploying permissions changes.</p> <p> <b>Unused access analyzers</b> help identify potential identity access risks by enabling you to identify unused IAM roles, unused access keys, unused console passwords, and IAM principals with unused service and action-level permissions.</p> <p>Beyond findings, IAM Access Analyzer provides basic and custom policy checks to validate IAM policies before deploying permissions changes. You can use policy generation to refine permissions by attaching a policy generated using access activity logged in CloudTrail logs. </p> <p>This guide describes the IAM Access Analyzer operations that you can call programmatically. For general information about IAM Access Analyzer, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html">Identity and Access Management Access Analyzer</a> in the <b>IAM User Guide</b>.</p>
233
210
  * @public
234
211
  */
235
212
  export declare class AccessAnalyzerClient extends __Client<__HttpHandlerOptions, ServiceInputTypes, ServiceOutputTypes, AccessAnalyzerClientResolvedConfig> {
@@ -27,8 +27,7 @@ declare const ApplyArchiveRuleCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Retroactively applies the archive rule to existing findings that meet the archive rule
31
- * criteria.</p>
30
+ * <p>Retroactively applies the archive rule to existing findings that meet the archive rule criteria.</p>
32
31
  * @example
33
32
  * Use a bare-bones client and the command you need to make an API call.
34
33
  * ```javascript
@@ -27,12 +27,7 @@ declare const CheckNoNewAccessCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Checks whether new access is allowed for an updated policy when compared to the existing
31
- * policy.</p>
32
- * <p>You can find examples for reference policies and learn how to set up and run a custom
33
- * policy check for new access in the <a href="https://github.com/aws-samples/iam-access-analyzer-custom-policy-check-samples">IAM Access Analyzer custom policy checks samples</a> repository on GitHub. The reference
34
- * policies in this repository are meant to be passed to the
35
- * <code>existingPolicyDocument</code> request parameter.</p>
30
+ * <p>Checks whether new access is allowed for an updated policy when compared to the existing policy.</p> <p>You can find examples for reference policies and learn how to set up and run a custom policy check for new access in the <a href="https://github.com/aws-samples/iam-access-analyzer-custom-policy-check-samples">IAM Access Analyzer custom policy checks samples</a> repository on GitHub. The reference policies in this repository are meant to be passed to the <code>existingPolicyDocument</code> request parameter.</p>
36
31
  * @example
37
32
  * Use a bare-bones client and the command you need to make an API call.
38
33
  * ```javascript
@@ -27,8 +27,7 @@ declare const CheckNoPublicAccessCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Checks whether a resource policy can grant public access to the specified resource
31
- * type.</p>
30
+ * <p>Checks whether a resource policy can grant public access to the specified resource type.</p>
32
31
  * @example
33
32
  * Use a bare-bones client and the command you need to make an API call.
34
33
  * ```javascript
@@ -27,8 +27,7 @@ declare const CreateAccessPreviewCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Creates an access preview that allows you to preview IAM Access Analyzer findings for your
31
- * resource before deploying resource permissions.</p>
30
+ * <p>Creates an access preview that allows you to preview IAM Access Analyzer findings for your resource before deploying resource permissions.</p>
32
31
  * @example
33
32
  * Use a bare-bones client and the command you need to make an API call.
34
33
  * ```javascript
@@ -78,6 +78,23 @@ declare const CreateAnalyzerCommand_base: {
78
78
  * ],
79
79
  * },
80
80
  * },
81
+ * internalAccess: { // InternalAccessConfiguration
82
+ * analysisRule: { // InternalAccessAnalysisRule
83
+ * inclusions: [ // InternalAccessAnalysisRuleCriteriaList
84
+ * { // InternalAccessAnalysisRuleCriteria
85
+ * accountIds: [
86
+ * "STRING_VALUE",
87
+ * ],
88
+ * resourceTypes: [ // ResourceTypeList
89
+ * "STRING_VALUE",
90
+ * ],
91
+ * resourceArns: [ // ResourceArnsList
92
+ * "STRING_VALUE",
93
+ * ],
94
+ * },
95
+ * ],
96
+ * },
97
+ * },
81
98
  * },
82
99
  * };
83
100
  * const command = new CreateAnalyzerCommand(input);
@@ -27,9 +27,7 @@ declare const CreateArchiveRuleCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Creates an archive rule for the specified analyzer. Archive rules automatically archive
31
- * new findings that meet the criteria you define when you create the rule.</p>
32
- * <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
30
+ * <p>Creates an archive rule for the specified analyzer. Archive rules automatically archive new findings that meet the criteria you define when you create the rule.</p> <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
33
31
  * @example
34
32
  * Use a bare-bones client and the command you need to make an API call.
35
33
  * ```javascript
@@ -27,9 +27,7 @@ declare const DeleteAnalyzerCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Deletes the specified analyzer. When you delete an analyzer, IAM Access Analyzer is disabled
31
- * for the account or organization in the current or specific Region. All findings that were
32
- * generated by the analyzer are deleted. You cannot undo this action.</p>
30
+ * <p>Deletes the specified analyzer. When you delete an analyzer, IAM Access Analyzer is disabled for the account or organization in the current or specific Region. All findings that were generated by the analyzer are deleted. You cannot undo this action.</p>
33
31
  * @example
34
32
  * Use a bare-bones client and the command you need to make an API call.
35
33
  * ```javascript
@@ -72,6 +72,23 @@ declare const GetAnalyzerCommand_base: {
72
72
  * // ],
73
73
  * // },
74
74
  * // },
75
+ * // internalAccess: { // InternalAccessConfiguration
76
+ * // analysisRule: { // InternalAccessAnalysisRule
77
+ * // inclusions: [ // InternalAccessAnalysisRuleCriteriaList
78
+ * // { // InternalAccessAnalysisRuleCriteria
79
+ * // accountIds: [
80
+ * // "STRING_VALUE",
81
+ * // ],
82
+ * // resourceTypes: [ // ResourceTypeList
83
+ * // "STRING_VALUE",
84
+ * // ],
85
+ * // resourceArns: [ // ResourceArnsList
86
+ * // "STRING_VALUE",
87
+ * // ],
88
+ * // },
89
+ * // ],
90
+ * // },
91
+ * // },
75
92
  * // },
76
93
  * // },
77
94
  * // };
@@ -27,8 +27,7 @@ declare const GetArchiveRuleCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Retrieves information about an archive rule.</p>
31
- * <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
30
+ * <p>Retrieves information about an archive rule.</p> <p>To learn about filter keys that you can use to create an archive rule, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
32
31
  * @example
33
32
  * Use a bare-bones client and the command you need to make an API call.
34
33
  * ```javascript
@@ -27,10 +27,7 @@ declare const GetFindingCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Retrieves information about the specified finding. GetFinding and GetFindingV2 both use
31
- * <code>access-analyzer:GetFinding</code> in the <code>Action</code> element of an IAM
32
- * policy statement. You must have permission to perform the
33
- * <code>access-analyzer:GetFinding</code> action.</p>
30
+ * <p>Retrieves information about the specified finding. GetFinding and GetFindingV2 both use <code>access-analyzer:GetFinding</code> in the <code>Action</code> element of an IAM policy statement. You must have permission to perform the <code>access-analyzer:GetFinding</code> action.</p>
34
31
  * @example
35
32
  * Use a bare-bones client and the command you need to make an API call.
36
33
  * ```javascript
@@ -27,10 +27,7 @@ declare const GetFindingV2Command_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Retrieves information about the specified finding. GetFinding and GetFindingV2 both use
31
- * <code>access-analyzer:GetFinding</code> in the <code>Action</code> element of an IAM
32
- * policy statement. You must have permission to perform the
33
- * <code>access-analyzer:GetFinding</code> action.</p>
30
+ * <p>Retrieves information about the specified finding. GetFinding and GetFindingV2 both use <code>access-analyzer:GetFinding</code> in the <code>Action</code> element of an IAM policy statement. You must have permission to perform the <code>access-analyzer:GetFinding</code> action.</p>
34
31
  * @example
35
32
  * Use a bare-bones client and the command you need to make an API call.
36
33
  * ```javascript
@@ -58,17 +55,19 @@ declare const GetFindingV2Command_base: {
58
55
  * // updatedAt: new Date("TIMESTAMP"), // required
59
56
  * // findingDetails: [ // FindingDetailsList // required
60
57
  * // { // FindingDetails Union: only one key present
61
- * // externalAccessDetails: { // ExternalAccessDetails
58
+ * // internalAccessDetails: { // InternalAccessDetails
62
59
  * // action: [ // ActionList
63
60
  * // "STRING_VALUE",
64
61
  * // ],
65
- * // condition: { // ConditionKeyMap // required
62
+ * // condition: { // ConditionKeyMap
66
63
  * // "<keys>": "STRING_VALUE",
67
64
  * // },
68
- * // isPublic: true || false,
69
65
  * // principal: { // PrincipalMap
70
66
  * // "<keys>": "STRING_VALUE",
71
67
  * // },
68
+ * // principalOwnerAccount: "STRING_VALUE",
69
+ * // accessType: "STRING_VALUE",
70
+ * // principalType: "STRING_VALUE",
72
71
  * // sources: [ // FindingSourceList
73
72
  * // { // FindingSource
74
73
  * // type: "STRING_VALUE", // required
@@ -79,6 +78,29 @@ declare const GetFindingV2Command_base: {
79
78
  * // },
80
79
  * // ],
81
80
  * // resourceControlPolicyRestriction: "STRING_VALUE",
81
+ * // serviceControlPolicyRestriction: "STRING_VALUE",
82
+ * // },
83
+ * // externalAccessDetails: { // ExternalAccessDetails
84
+ * // action: [
85
+ * // "STRING_VALUE",
86
+ * // ],
87
+ * // condition: { // required
88
+ * // "<keys>": "STRING_VALUE",
89
+ * // },
90
+ * // isPublic: true || false,
91
+ * // principal: {
92
+ * // "<keys>": "STRING_VALUE",
93
+ * // },
94
+ * // sources: [
95
+ * // {
96
+ * // type: "STRING_VALUE", // required
97
+ * // detail: {
98
+ * // accessPointArn: "STRING_VALUE",
99
+ * // accessPointAccount: "STRING_VALUE",
100
+ * // },
101
+ * // },
102
+ * // ],
103
+ * // resourceControlPolicyRestriction: "STRING_VALUE",
82
104
  * // },
83
105
  * // unusedPermissionDetails: { // UnusedPermissionDetails
84
106
  * // actions: [ // UnusedActionList
@@ -27,8 +27,7 @@ declare const GetFindingsStatisticsCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Retrieves a list of aggregated finding statistics for an external access or unused
31
- * access analyzer.</p>
30
+ * <p>Retrieves a list of aggregated finding statistics for an external access or unused access analyzer.</p>
32
31
  * @example
33
32
  * Use a bare-bones client and the command you need to make an API call.
34
33
  * ```javascript
@@ -54,6 +53,18 @@ declare const GetFindingsStatisticsCommand_base: {
54
53
  * // totalArchivedFindings: Number("int"),
55
54
  * // totalResolvedFindings: Number("int"),
56
55
  * // },
56
+ * // internalAccessFindingsStatistics: { // InternalAccessFindingsStatistics
57
+ * // resourceTypeStatistics: { // InternalAccessResourceTypeStatisticsMap
58
+ * // "<keys>": { // InternalAccessResourceTypeDetails
59
+ * // totalActiveFindings: Number("int"),
60
+ * // totalResolvedFindings: Number("int"),
61
+ * // totalArchivedFindings: Number("int"),
62
+ * // },
63
+ * // },
64
+ * // totalActiveFindings: Number("int"),
65
+ * // totalArchivedFindings: Number("int"),
66
+ * // totalResolvedFindings: Number("int"),
67
+ * // },
57
68
  * // unusedAccessFindingsStatistics: { // UnusedAccessFindingsStatistics
58
69
  * // unusedAccessTypeStatistics: [ // UnusedAccessTypeStatisticsList
59
70
  * // { // UnusedAccessTypeStatistics
@@ -27,8 +27,7 @@ declare const GetGeneratedPolicyCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Retrieves the policy that was generated using <code>StartPolicyGeneration</code>.
31
- * </p>
30
+ * <p>Retrieves the policy that was generated using <code>StartPolicyGeneration</code>. </p>
32
31
  * @example
33
32
  * Use a bare-bones client and the command you need to make an API call.
34
33
  * ```javascript
@@ -27,8 +27,7 @@ declare const ListAccessPreviewFindingsCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Retrieves a list of access preview findings generated by the specified access
31
- * preview.</p>
30
+ * <p>Retrieves a list of access preview findings generated by the specified access preview.</p>
32
31
  * @example
33
32
  * Use a bare-bones client and the command you need to make an API call.
34
33
  * ```javascript
@@ -27,8 +27,7 @@ declare const ListAnalyzedResourcesCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Retrieves a list of resources of the specified type that have been analyzed by the
31
- * specified analyzer.</p>
30
+ * <p>Retrieves a list of resources of the specified type that have been analyzed by the specified analyzer.</p>
32
31
  * @example
33
32
  * Use a bare-bones client and the command you need to make an API call.
34
33
  * ```javascript
@@ -75,6 +75,23 @@ declare const ListAnalyzersCommand_base: {
75
75
  * // ],
76
76
  * // },
77
77
  * // },
78
+ * // internalAccess: { // InternalAccessConfiguration
79
+ * // analysisRule: { // InternalAccessAnalysisRule
80
+ * // inclusions: [ // InternalAccessAnalysisRuleCriteriaList
81
+ * // { // InternalAccessAnalysisRuleCriteria
82
+ * // accountIds: [
83
+ * // "STRING_VALUE",
84
+ * // ],
85
+ * // resourceTypes: [ // ResourceTypeList
86
+ * // "STRING_VALUE",
87
+ * // ],
88
+ * // resourceArns: [ // ResourceArnsList
89
+ * // "STRING_VALUE",
90
+ * // ],
91
+ * // },
92
+ * // ],
93
+ * // },
94
+ * // },
78
95
  * // },
79
96
  * // },
80
97
  * // ],
@@ -27,11 +27,7 @@ declare const ListFindingsCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Retrieves a list of findings generated by the specified analyzer. ListFindings and
31
- * ListFindingsV2 both use <code>access-analyzer:ListFindings</code> in the
32
- * <code>Action</code> element of an IAM policy statement. You must have permission to
33
- * perform the <code>access-analyzer:ListFindings</code> action.</p>
34
- * <p>To learn about filter keys that you can use to retrieve a list of findings, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
30
+ * <p>Retrieves a list of findings generated by the specified analyzer. ListFindings and ListFindingsV2 both use <code>access-analyzer:ListFindings</code> in the <code>Action</code> element of an IAM policy statement. You must have permission to perform the <code>access-analyzer:ListFindings</code> action.</p> <p>To learn about filter keys that you can use to retrieve a list of findings, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
35
31
  * @example
36
32
  * Use a bare-bones client and the command you need to make an API call.
37
33
  * ```javascript
@@ -27,11 +27,7 @@ declare const ListFindingsV2Command_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Retrieves a list of findings generated by the specified analyzer. ListFindings and
31
- * ListFindingsV2 both use <code>access-analyzer:ListFindings</code> in the
32
- * <code>Action</code> element of an IAM policy statement. You must have permission to
33
- * perform the <code>access-analyzer:ListFindings</code> action.</p>
34
- * <p>To learn about filter keys that you can use to retrieve a list of findings, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
30
+ * <p>Retrieves a list of findings generated by the specified analyzer. ListFindings and ListFindingsV2 both use <code>access-analyzer:ListFindings</code> in the <code>Action</code> element of an IAM policy statement. You must have permission to perform the <code>access-analyzer:ListFindings</code> action.</p> <p>To learn about filter keys that you can use to retrieve a list of findings, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a> in the <b>IAM User Guide</b>.</p>
35
31
  * @example
36
32
  * Use a bare-bones client and the command you need to make an API call.
37
33
  * ```javascript