@aws-sdk/client-accessanalyzer 3.830.0 → 3.831.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (30) hide show
  1. package/README.md +1 -24
  2. package/dist-cjs/index.js +31 -0
  3. package/dist-es/models/models_0.js +22 -0
  4. package/dist-es/protocols/Aws_restJson1.js +5 -0
  5. package/dist-types/AccessAnalyzer.d.ts +1 -24
  6. package/dist-types/AccessAnalyzerClient.d.ts +1 -24
  7. package/dist-types/commands/ApplyArchiveRuleCommand.d.ts +1 -2
  8. package/dist-types/commands/CheckNoNewAccessCommand.d.ts +1 -6
  9. package/dist-types/commands/CheckNoPublicAccessCommand.d.ts +1 -2
  10. package/dist-types/commands/CreateAccessPreviewCommand.d.ts +1 -2
  11. package/dist-types/commands/CreateAnalyzerCommand.d.ts +17 -0
  12. package/dist-types/commands/CreateArchiveRuleCommand.d.ts +1 -3
  13. package/dist-types/commands/DeleteAnalyzerCommand.d.ts +1 -3
  14. package/dist-types/commands/GetAnalyzerCommand.d.ts +17 -0
  15. package/dist-types/commands/GetArchiveRuleCommand.d.ts +1 -2
  16. package/dist-types/commands/GetFindingCommand.d.ts +1 -4
  17. package/dist-types/commands/GetFindingV2Command.d.ts +29 -7
  18. package/dist-types/commands/GetFindingsStatisticsCommand.d.ts +13 -2
  19. package/dist-types/commands/GetGeneratedPolicyCommand.d.ts +1 -2
  20. package/dist-types/commands/ListAccessPreviewFindingsCommand.d.ts +1 -2
  21. package/dist-types/commands/ListAnalyzedResourcesCommand.d.ts +1 -2
  22. package/dist-types/commands/ListAnalyzersCommand.d.ts +17 -0
  23. package/dist-types/commands/ListFindingsCommand.d.ts +1 -5
  24. package/dist-types/commands/ListFindingsV2Command.d.ts +1 -5
  25. package/dist-types/commands/UpdateAnalyzerCommand.d.ts +34 -0
  26. package/dist-types/commands/ValidatePolicyCommand.d.ts +1 -3
  27. package/dist-types/index.d.ts +1 -24
  28. package/dist-types/models/models_0.d.ts +455 -899
  29. package/dist-types/ts3.4/models/models_0.d.ts +117 -18
  30. package/package.json +1 -1
@@ -1,22 +1,17 @@
1
1
  import { ExceptionOptionType as __ExceptionOptionType } from "@smithy/smithy-client";
2
2
  import { AccessAnalyzerServiceException as __BaseException } from "./AccessAnalyzerServiceException";
3
3
  /**
4
- * <p>Contains information about actions and resources that define permissions to check
5
- * against a policy.</p>
4
+ * <p>Contains information about actions and resources that define permissions to check against a policy.</p>
6
5
  * @public
7
6
  */
8
7
  export interface Access {
9
8
  /**
10
- * <p>A list of actions for the access permissions. Any strings that can be used as an action
11
- * in an IAM policy can be used in the list of actions to check.</p>
9
+ * <p>A list of actions for the access permissions. Any strings that can be used as an action in an IAM policy can be used in the list of actions to check.</p>
12
10
  * @public
13
11
  */
14
12
  actions?: string[] | undefined;
15
13
  /**
16
- * <p>A list of resources for the access permissions. Any strings that can be used as an
17
- * Amazon Resource Name (ARN) in an IAM policy can be used in the list of resources to
18
- * check. You can only use a wildcard in the portion of the ARN that specifies the resource
19
- * ID.</p>
14
+ * <p>A list of resources for the access permissions. Any strings that can be used as an Amazon Resource Name (ARN) in an IAM policy can be used in the list of resources to check. You can only use a wildcard in the portion of the ARN that specifies the resource ID.</p>
20
15
  * @public
21
16
  */
22
17
  resources?: string[] | undefined;
@@ -56,9 +51,7 @@ export declare class ConflictException extends __BaseException {
56
51
  constructor(opts: __ExceptionOptionType<ConflictException, __BaseException>);
57
52
  }
58
53
  /**
59
- * <p>The criteria to use in the filter that defines the archive rule. For more information on
60
- * available filter keys, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter
61
- * keys</a>.</p>
54
+ * <p>The criteria to use in the filter that defines the archive rule. For more information on available filter keys, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-filter-keys.html">IAM Access Analyzer filter keys</a>.</p>
62
55
  * @public
63
56
  */
64
57
  export interface Criterion {
@@ -282,8 +275,7 @@ export interface GetArchiveRuleRequest {
282
275
  ruleName: string | undefined;
283
276
  }
284
277
  /**
285
- * <p>Contains information about an archive rule. Archive rules automatically archive new
286
- * findings that meet the criteria you define when you create the rule.</p>
278
+ * <p>Contains information about an archive rule. Archive rules automatically archive new findings that meet the criteria you define when you create the rule.</p>
287
279
  * @public
288
280
  */
289
281
  export interface ArchiveRuleSummary {
@@ -314,8 +306,7 @@ export interface ArchiveRuleSummary {
314
306
  */
315
307
  export interface GetArchiveRuleResponse {
316
308
  /**
317
- * <p>Contains information about an archive rule. Archive rules automatically archive new
318
- * findings that meet the criteria you define when you create the rule.</p>
309
+ * <p>Contains information about an archive rule. Archive rules automatically archive new findings that meet the criteria you define when you create the rule.</p>
319
310
  * @public
320
311
  */
321
312
  archiveRule: ArchiveRuleSummary | undefined;
@@ -373,8 +364,7 @@ export interface UpdateArchiveRuleRequest {
373
364
  */
374
365
  ruleName: string | undefined;
375
366
  /**
376
- * <p>A filter to match for the rules to update. Only rules that match the filter are
377
- * updated.</p>
367
+ * <p>A filter to match for the rules to update. Only rules that match the filter are updated.</p>
378
368
  * @public
379
369
  */
380
370
  filter: Record<string, Criterion> | undefined;
@@ -385,8 +375,7 @@ export interface UpdateArchiveRuleRequest {
385
375
  clientToken?: string | undefined;
386
376
  }
387
377
  /**
388
- * <p>An criterion statement in an archive rule. Each archive rule may have multiple
389
- * criteria.</p>
378
+ * <p>An criterion statement in an archive rule. Each archive rule may have multiple criteria.</p>
390
379
  * @public
391
380
  */
392
381
  export interface InlineArchiveRule {
@@ -402,42 +391,75 @@ export interface InlineArchiveRule {
402
391
  filter: Record<string, Criterion> | undefined;
403
392
  }
404
393
  /**
405
- * <p>The criteria for an analysis rule for an analyzer. The criteria determine which entities
406
- * will generate findings.</p>
394
+ * @public
395
+ */
396
+ export type ResourceType = "AWS::DynamoDB::Stream" | "AWS::DynamoDB::Table" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::EFS::FileSystem" | "AWS::IAM::Role" | "AWS::IAM::User" | "AWS::KMS::Key" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::RDS::DBClusterSnapshot" | "AWS::RDS::DBSnapshot" | "AWS::S3::Bucket" | "AWS::S3Express::DirectoryBucket" | "AWS::SNS::Topic" | "AWS::SQS::Queue" | "AWS::SecretsManager::Secret";
397
+ /**
398
+ * <p>The criteria for an analysis rule for an internal access analyzer.</p>
399
+ * @public
400
+ */
401
+ export interface InternalAccessAnalysisRuleCriteria {
402
+ /**
403
+ * <p>A list of Amazon Web Services account IDs to apply to the internal access analysis rule criteria. Account IDs can only be applied to the analysis rule criteria for organization-level analyzers.</p>
404
+ * @public
405
+ */
406
+ accountIds?: string[] | undefined;
407
+ /**
408
+ * <p>A list of resource types to apply to the internal access analysis rule criteria. The analyzer will only generate findings for resources of these types. These resource types are currently supported for internal access analyzers:</p> <ul> <li> <p> <code>AWS::S3::Bucket</code> </p> </li> <li> <p> <code>AWS::RDS::DBSnapshot</code> </p> </li> <li> <p> <code>AWS::RDS::DBClusterSnapshot</code> </p> </li> <li> <p> <code>AWS::S3Express::DirectoryBucket</code> </p> </li> <li> <p> <code>AWS::DynamoDB::Table</code> </p> </li> <li> <p> <code>AWS::DynamoDB::Stream</code> </p> </li> </ul>
409
+ * @public
410
+ */
411
+ resourceTypes?: ResourceType[] | undefined;
412
+ /**
413
+ * <p>A list of resource ARNs to apply to the internal access analysis rule criteria. The analyzer will only generate findings for resources that match these ARNs.</p>
414
+ * @public
415
+ */
416
+ resourceArns?: string[] | undefined;
417
+ }
418
+ /**
419
+ * <p>Contains information about analysis rules for the internal access analyzer. Analysis rules determine which entities will generate findings based on the criteria you define when you create the rule.</p>
420
+ * @public
421
+ */
422
+ export interface InternalAccessAnalysisRule {
423
+ /**
424
+ * <p>A list of rules for the internal access analyzer containing criteria to include in analysis. Only resources that meet the rule criteria will generate findings.</p>
425
+ * @public
426
+ */
427
+ inclusions?: InternalAccessAnalysisRuleCriteria[] | undefined;
428
+ }
429
+ /**
430
+ * <p>Specifies the configuration of an internal access analyzer for an Amazon Web Services organization or account. This configuration determines how the analyzer evaluates internal access within your Amazon Web Services environment.</p>
431
+ * @public
432
+ */
433
+ export interface InternalAccessConfiguration {
434
+ /**
435
+ * <p>Contains information about analysis rules for the internal access analyzer. These rules determine which resources and access patterns will be analyzed.</p>
436
+ * @public
437
+ */
438
+ analysisRule?: InternalAccessAnalysisRule | undefined;
439
+ }
440
+ /**
441
+ * <p>The criteria for an analysis rule for an analyzer. The criteria determine which entities will generate findings.</p>
407
442
  * @public
408
443
  */
409
444
  export interface AnalysisRuleCriteria {
410
445
  /**
411
- * <p>A list of Amazon Web Services account IDs to apply to the analysis rule criteria. The accounts cannot
412
- * include the organization analyzer owner account. Account IDs can only be applied to the
413
- * analysis rule criteria for organization-level analyzers. The list cannot include more than
414
- * 2,000 account IDs.</p>
446
+ * <p>A list of Amazon Web Services account IDs to apply to the analysis rule criteria. The accounts cannot include the organization analyzer owner account. Account IDs can only be applied to the analysis rule criteria for organization-level analyzers. The list cannot include more than 2,000 account IDs.</p>
415
447
  * @public
416
448
  */
417
449
  accountIds?: string[] | undefined;
418
450
  /**
419
- * <p>An array of key-value pairs to match for your resources. You can use the set of Unicode
420
- * letters, digits, whitespace, <code>_</code>, <code>.</code>, <code>/</code>,
421
- * <code>=</code>, <code>+</code>, and <code>-</code>.</p>
422
- * <p>For the tag key, you can specify a value that is 1 to 128 characters in length and
423
- * cannot be prefixed with <code>aws:</code>.</p>
424
- * <p>For the tag value, you can specify a value that is 0 to 256 characters in length. If the
425
- * specified tag value is 0 characters, the rule is applied to all principals with the
426
- * specified tag key.</p>
451
+ * <p>An array of key-value pairs to match for your resources. You can use the set of Unicode letters, digits, whitespace, <code>_</code>, <code>.</code>, <code>/</code>, <code>=</code>, <code>+</code>, and <code>-</code>.</p> <p>For the tag key, you can specify a value that is 1 to 128 characters in length and cannot be prefixed with <code>aws:</code>.</p> <p>For the tag value, you can specify a value that is 0 to 256 characters in length. If the specified tag value is 0 characters, the rule is applied to all principals with the specified tag key.</p>
427
452
  * @public
428
453
  */
429
454
  resourceTags?: Record<string, string>[] | undefined;
430
455
  }
431
456
  /**
432
- * <p>Contains information about analysis rules for the analyzer. Analysis rules determine
433
- * which entities will generate findings based on the criteria you define when you create the
434
- * rule.</p>
457
+ * <p>Contains information about analysis rules for the analyzer. Analysis rules determine which entities will generate findings based on the criteria you define when you create the rule.</p>
435
458
  * @public
436
459
  */
437
460
  export interface AnalysisRule {
438
461
  /**
439
- * <p>A list of rules for the analyzer containing criteria to exclude from analysis. Entities
440
- * that meet the rule criteria will not generate findings.</p>
462
+ * <p>A list of rules for the analyzer containing criteria to exclude from analysis. Entities that meet the rule criteria will not generate findings.</p>
441
463
  * @public
442
464
  */
443
465
  exclusions?: AnalysisRuleCriteria[] | undefined;
@@ -448,39 +470,41 @@ export interface AnalysisRule {
448
470
  */
449
471
  export interface UnusedAccessConfiguration {
450
472
  /**
451
- * <p>The specified access age in days for which to generate findings for unused access. For
452
- * example, if you specify 90 days, the analyzer will generate findings for IAM entities
453
- * within the accounts of the selected organization for any access that hasn't been used in 90
454
- * or more days since the analyzer's last scan. You can choose a value between 1 and 365
455
- * days.</p>
473
+ * <p>The specified access age in days for which to generate findings for unused access. For example, if you specify 90 days, the analyzer will generate findings for IAM entities within the accounts of the selected organization for any access that hasn't been used in 90 or more days since the analyzer's last scan. You can choose a value between 1 and 365 days.</p>
456
474
  * @public
457
475
  */
458
476
  unusedAccessAge?: number | undefined;
459
477
  /**
460
- * <p>Contains information about analysis rules for the analyzer. Analysis rules determine
461
- * which entities will generate findings based on the criteria you define when you create the
462
- * rule.</p>
478
+ * <p>Contains information about analysis rules for the analyzer. Analysis rules determine which entities will generate findings based on the criteria you define when you create the rule.</p>
463
479
  * @public
464
480
  */
465
481
  analysisRule?: AnalysisRule | undefined;
466
482
  }
467
483
  /**
468
- * <p>Contains information about the configuration of an analyzer for an Amazon Web Services organization or
469
- * account.</p>
484
+ * <p>Contains information about the configuration of an analyzer for an Amazon Web Services organization or account.</p>
470
485
  * @public
471
486
  */
472
- export type AnalyzerConfiguration = AnalyzerConfiguration.UnusedAccessMember | AnalyzerConfiguration.$UnknownMember;
487
+ export type AnalyzerConfiguration = AnalyzerConfiguration.InternalAccessMember | AnalyzerConfiguration.UnusedAccessMember | AnalyzerConfiguration.$UnknownMember;
473
488
  /**
474
489
  * @public
475
490
  */
476
491
  export declare namespace AnalyzerConfiguration {
477
492
  /**
478
- * <p>Specifies the configuration of an unused access analyzer for an Amazon Web Services organization or
479
- * account.</p>
493
+ * <p>Specifies the configuration of an unused access analyzer for an Amazon Web Services organization or account.</p>
480
494
  * @public
481
495
  */
482
496
  interface UnusedAccessMember {
483
497
  unusedAccess: UnusedAccessConfiguration;
498
+ internalAccess?: never;
499
+ $unknown?: never;
500
+ }
501
+ /**
502
+ * <p>Specifies the configuration of an internal access analyzer for an Amazon Web Services organization or account. This configuration determines how the analyzer evaluates access within your Amazon Web Services environment.</p>
503
+ * @public
504
+ */
505
+ interface InternalAccessMember {
506
+ unusedAccess?: never;
507
+ internalAccess: InternalAccessConfiguration;
484
508
  $unknown?: never;
485
509
  }
486
510
  /**
@@ -488,10 +512,12 @@ export declare namespace AnalyzerConfiguration {
488
512
  */
489
513
  interface $UnknownMember {
490
514
  unusedAccess?: never;
515
+ internalAccess?: never;
491
516
  $unknown: [string, any];
492
517
  }
493
518
  interface Visitor<T> {
494
519
  unusedAccess: (value: UnusedAccessConfiguration) => T;
520
+ internalAccess: (value: InternalAccessConfiguration) => T;
495
521
  _: (name: string, value: any) => T;
496
522
  }
497
523
  const visit: <T>(value: AnalyzerConfiguration, visitor: Visitor<T>) => T;
@@ -499,7 +525,7 @@ export declare namespace AnalyzerConfiguration {
499
525
  /**
500
526
  * @public
501
527
  */
502
- export type Type = "ACCOUNT" | "ACCOUNT_UNUSED_ACCESS" | "ORGANIZATION" | "ORGANIZATION_UNUSED_ACCESS";
528
+ export type Type = "ACCOUNT" | "ACCOUNT_INTERNAL_ACCESS" | "ACCOUNT_UNUSED_ACCESS" | "ORGANIZATION" | "ORGANIZATION_INTERNAL_ACCESS" | "ORGANIZATION_UNUSED_ACCESS";
503
529
  /**
504
530
  * <p>Creates an analyzer.</p>
505
531
  * @public
@@ -511,26 +537,17 @@ export interface CreateAnalyzerRequest {
511
537
  */
512
538
  analyzerName: string | undefined;
513
539
  /**
514
- * <p>The type of analyzer to create. Only <code>ACCOUNT</code>, <code>ORGANIZATION</code>,
515
- * <code>ACCOUNT_UNUSED_ACCESS</code>, and <code>ORGANIZATION_UNUSED_ACCESS</code>
516
- * analyzers are supported. You can create only one analyzer per account per Region. You can
517
- * create up to 5 analyzers per organization per Region.</p>
540
+ * <p>The type of analyzer to create. You can create only one analyzer per account per Region. You can create up to 5 analyzers per organization per Region.</p>
518
541
  * @public
519
542
  */
520
543
  type: Type | undefined;
521
544
  /**
522
- * <p>Specifies the archive rules to add for the analyzer. Archive rules automatically archive
523
- * findings that meet the criteria you define for the rule.</p>
545
+ * <p>Specifies the archive rules to add for the analyzer. Archive rules automatically archive findings that meet the criteria you define for the rule.</p>
524
546
  * @public
525
547
  */
526
548
  archiveRules?: InlineArchiveRule[] | undefined;
527
549
  /**
528
- * <p>An array of key-value pairs to apply to the analyzer. You can use the set of Unicode
529
- * letters, digits, whitespace, <code>_</code>, <code>.</code>, <code>/</code>,
530
- * <code>=</code>, <code>+</code>, and <code>-</code>.</p>
531
- * <p>For the tag key, you can specify a value that is 1 to 128 characters in length and
532
- * cannot be prefixed with <code>aws:</code>.</p>
533
- * <p>For the tag value, you can specify a value that is 0 to 256 characters in length.</p>
550
+ * <p>An array of key-value pairs to apply to the analyzer. You can use the set of Unicode letters, digits, whitespace, <code>_</code>, <code>.</code>, <code>/</code>, <code>=</code>, <code>+</code>, and <code>-</code>.</p> <p>For the tag key, you can specify a value that is 1 to 128 characters in length and cannot be prefixed with <code>aws:</code>.</p> <p>For the tag value, you can specify a value that is 0 to 256 characters in length.</p>
534
551
  * @public
535
552
  */
536
553
  tags?: Record<string, string> | undefined;
@@ -540,8 +557,7 @@ export interface CreateAnalyzerRequest {
540
557
  */
541
558
  clientToken?: string | undefined;
542
559
  /**
543
- * <p>Specifies the configuration of the analyzer. If the analyzer is an unused access
544
- * analyzer, the specified scope of unused access is used for the configuration.</p>
560
+ * <p>Specifies the configuration of the analyzer. If the analyzer is an unused access analyzer, the specified scope of unused access is used for the configuration. If the analyzer is an internal access analyzer, the specified internal access analysis rules are used for the configuration.</p>
545
561
  * @public
546
562
  */
547
563
  configuration?: AnalyzerConfiguration | undefined;
@@ -593,10 +609,7 @@ export type AnalyzerStatus = "ACTIVE" | "CREATING" | "DISABLED" | "FAILED";
593
609
  */
594
610
  export type ReasonCode = "AWS_SERVICE_ACCESS_DISABLED" | "DELEGATED_ADMINISTRATOR_DEREGISTERED" | "ORGANIZATION_DELETED" | "SERVICE_LINKED_ROLE_CREATION_FAILED";
595
611
  /**
596
- * <p>Provides more details about the current status of the analyzer. For example, if the
597
- * creation for the analyzer fails, a <code>Failed</code> status is returned. For an analyzer
598
- * with organization as the type, this failure can be due to an issue with creating the
599
- * service-linked roles required in the member accounts of the Amazon Web Services organization.</p>
612
+ * <p>Provides more details about the current status of the analyzer. For example, if the creation for the analyzer fails, a <code>Failed</code> status is returned. For an analyzer with organization as the type, this failure can be due to an issue with creating the service-linked roles required in the member accounts of the Amazon Web Services organization.</p>
600
613
  * @public
601
614
  */
602
615
  export interface StatusReason {
@@ -622,8 +635,7 @@ export interface AnalyzerSummary {
622
635
  */
623
636
  name: string | undefined;
624
637
  /**
625
- * <p>The type of analyzer, which corresponds to the zone of trust chosen for the
626
- * analyzer.</p>
638
+ * <p>The type of analyzer, which corresponds to the zone of trust chosen for the analyzer.</p>
627
639
  * @public
628
640
  */
629
641
  type: Type | undefined;
@@ -648,26 +660,17 @@ export interface AnalyzerSummary {
648
660
  */
649
661
  tags?: Record<string, string> | undefined;
650
662
  /**
651
- * <p>The status of the analyzer. An <code>Active</code> analyzer successfully monitors
652
- * supported resources and generates new findings. The analyzer is <code>Disabled</code> when
653
- * a user action, such as removing trusted access for Identity and Access Management Access Analyzer from Organizations, causes
654
- * the analyzer to stop generating new findings. The status is <code>Creating</code> when the
655
- * analyzer creation is in progress and <code>Failed</code> when the analyzer creation has
656
- * failed. </p>
663
+ * <p>The status of the analyzer. An <code>Active</code> analyzer successfully monitors supported resources and generates new findings. The analyzer is <code>Disabled</code> when a user action, such as removing trusted access for Identity and Access Management Access Analyzer from Organizations, causes the analyzer to stop generating new findings. The status is <code>Creating</code> when the analyzer creation is in progress and <code>Failed</code> when the analyzer creation has failed. </p>
657
664
  * @public
658
665
  */
659
666
  status: AnalyzerStatus | undefined;
660
667
  /**
661
- * <p>The <code>statusReason</code> provides more details about the current status of the
662
- * analyzer. For example, if the creation for the analyzer fails, a <code>Failed</code> status
663
- * is returned. For an analyzer with organization as the type, this failure can be due to an
664
- * issue with creating the service-linked roles required in the member accounts of the Amazon Web Services
665
- * organization.</p>
668
+ * <p>The <code>statusReason</code> provides more details about the current status of the analyzer. For example, if the creation for the analyzer fails, a <code>Failed</code> status is returned. For an analyzer with organization as the type, this failure can be due to an issue with creating the service-linked roles required in the member accounts of the Amazon Web Services organization.</p>
666
669
  * @public
667
670
  */
668
671
  statusReason?: StatusReason | undefined;
669
672
  /**
670
- * <p>Specifies whether the analyzer is an external access or unused access analyzer.</p>
673
+ * <p>Specifies if the analyzer is an external access, unused access, or internal access analyzer.</p>
671
674
  * @public
672
675
  */
673
676
  configuration?: AnalyzerConfiguration | undefined;
@@ -678,8 +681,7 @@ export interface AnalyzerSummary {
678
681
  */
679
682
  export interface GetAnalyzerResponse {
680
683
  /**
681
- * <p>An <code>AnalyzerSummary</code> object that contains information about the
682
- * analyzer.</p>
684
+ * <p>An <code>AnalyzerSummary</code> object that contains information about the analyzer.</p>
683
685
  * @public
684
686
  */
685
687
  analyzer: AnalyzerSummary | undefined;
@@ -731,8 +733,7 @@ export interface UpdateAnalyzerRequest {
731
733
  */
732
734
  analyzerName: string | undefined;
733
735
  /**
734
- * <p>Contains information about the configuration of an analyzer for an Amazon Web Services organization or
735
- * account.</p>
736
+ * <p>Contains information about the configuration of an analyzer for an Amazon Web Services organization or account.</p>
736
737
  * @public
737
738
  */
738
739
  configuration?: AnalyzerConfiguration | undefined;
@@ -742,8 +743,7 @@ export interface UpdateAnalyzerRequest {
742
743
  */
743
744
  export interface UpdateAnalyzerResponse {
744
745
  /**
745
- * <p>Contains information about the configuration of an analyzer for an Amazon Web Services organization or
746
- * account.</p>
746
+ * <p>Contains information about the configuration of an analyzer for an Amazon Web Services organization or account.</p>
747
747
  * @public
748
748
  */
749
749
  configuration?: AnalyzerConfiguration | undefined;
@@ -774,10 +774,7 @@ export interface ApplyArchiveRuleRequest {
774
774
  */
775
775
  export interface CancelPolicyGenerationRequest {
776
776
  /**
777
- * <p>The <code>JobId</code> that is returned by the <code>StartPolicyGeneration</code>
778
- * operation. The <code>JobId</code> can be used with <code>GetGeneratedPolicy</code> to
779
- * retrieve the generated policies or used with <code>CancelPolicyGeneration</code> to cancel
780
- * the policy generation request.</p>
777
+ * <p>The <code>JobId</code> that is returned by the <code>StartPolicyGeneration</code> operation. The <code>JobId</code> can be used with <code>GetGeneratedPolicy</code> to retrieve the generated policies or used with <code>CancelPolicyGeneration</code> to cancel the policy generation request.</p>
781
778
  * @public
782
779
  */
783
780
  jobId: string | undefined;
@@ -809,20 +806,12 @@ export interface CheckAccessNotGrantedRequest {
809
806
  */
810
807
  policyDocument: string | undefined;
811
808
  /**
812
- * <p>An access object containing the permissions that shouldn't be granted by the specified
813
- * policy. If only actions are specified, IAM Access Analyzer checks for access to peform at least
814
- * one of the actions on any resource in the policy. If only resources are specified, then
815
- * IAM Access Analyzer checks for access to perform any action on at least one of the resources. If
816
- * both actions and resources are specified, IAM Access Analyzer checks for access to perform at
817
- * least one of the specified actions on at least one of the specified resources.</p>
809
+ * <p>An access object containing the permissions that shouldn't be granted by the specified policy. If only actions are specified, IAM Access Analyzer checks for access to peform at least one of the actions on any resource in the policy. If only resources are specified, then IAM Access Analyzer checks for access to perform any action on at least one of the resources. If both actions and resources are specified, IAM Access Analyzer checks for access to perform at least one of the specified actions on at least one of the specified resources.</p>
818
810
  * @public
819
811
  */
820
812
  access: Access[] | undefined;
821
813
  /**
822
- * <p>The type of policy. Identity policies grant permissions to IAM principals. Identity
823
- * policies include managed and inline policies for IAM roles, users, and groups.</p>
824
- * <p>Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust
825
- * policies for IAM roles and bucket policies for Amazon S3 buckets.</p>
814
+ * <p>The type of policy. Identity policies grant permissions to IAM principals. Identity policies include managed and inline policies for IAM roles, users, and groups.</p> <p>Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust policies for IAM roles and bucket policies for Amazon S3 buckets.</p>
826
815
  * @public
827
816
  */
828
817
  policyType: AccessCheckPolicyType | undefined;
@@ -865,10 +854,7 @@ export type CheckAccessNotGrantedResult = (typeof CheckAccessNotGrantedResult)[k
865
854
  */
866
855
  export interface CheckAccessNotGrantedResponse {
867
856
  /**
868
- * <p>The result of the check for whether the access is allowed. If the result is
869
- * <code>PASS</code>, the specified policy doesn't allow any of the specified permissions
870
- * in the access object. If the result is <code>FAIL</code>, the specified policy might allow
871
- * some or all of the permissions in the access object.</p>
857
+ * <p>The result of the check for whether the access is allowed. If the result is <code>PASS</code>, the specified policy doesn't allow any of the specified permissions in the access object. If the result is <code>FAIL</code>, the specified policy might allow some or all of the permissions in the access object.</p>
872
858
  * @public
873
859
  */
874
860
  result?: CheckAccessNotGrantedResult | undefined;
@@ -923,13 +909,7 @@ export interface CheckNoNewAccessRequest {
923
909
  */
924
910
  existingPolicyDocument: string | undefined;
925
911
  /**
926
- * <p>The type of policy to compare. Identity policies grant permissions to IAM principals.
927
- * Identity policies include managed and inline policies for IAM roles, users, and
928
- * groups.</p>
929
- * <p>Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust
930
- * policies for IAM roles and bucket policies for Amazon S3 buckets. You can provide a generic
931
- * input such as identity policy or resource policy or a specific input such as managed policy
932
- * or Amazon S3 bucket policy.</p>
912
+ * <p>The type of policy to compare. Identity policies grant permissions to IAM principals. Identity policies include managed and inline policies for IAM roles, users, and groups.</p> <p>Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust policies for IAM roles and bucket policies for Amazon S3 buckets. You can provide a generic input such as identity policy or resource policy or a specific input such as managed policy or Amazon S3 bucket policy.</p>
933
913
  * @public
934
914
  */
935
915
  policyType: AccessCheckPolicyType | undefined;
@@ -951,9 +931,7 @@ export type CheckNoNewAccessResult = (typeof CheckNoNewAccessResult)[keyof typeo
951
931
  */
952
932
  export interface CheckNoNewAccessResponse {
953
933
  /**
954
- * <p>The result of the check for new access. If the result is <code>PASS</code>, no new
955
- * access is allowed by the updated policy. If the result is <code>FAIL</code>, the updated
956
- * policy might allow new access.</p>
934
+ * <p>The result of the check for new access. If the result is <code>PASS</code>, no new access is allowed by the updated policy. If the result is <code>FAIL</code>, the updated policy might allow new access.</p>
957
935
  * @public
958
936
  */
959
937
  result?: CheckNoNewAccessResult | undefined;
@@ -1014,11 +992,7 @@ export interface CheckNoPublicAccessRequest {
1014
992
  */
1015
993
  policyDocument: string | undefined;
1016
994
  /**
1017
- * <p>The type of resource to evaluate for public access. For example, to check for public
1018
- * access to Amazon S3 buckets, you can choose <code>AWS::S3::Bucket</code> for the resource
1019
- * type.</p>
1020
- * <p>For resource types not supported as valid values, IAM Access Analyzer will return an
1021
- * error.</p>
995
+ * <p>The type of resource to evaluate for public access. For example, to check for public access to Amazon S3 buckets, you can choose <code>AWS::S3::Bucket</code> for the resource type.</p> <p>For resource types not supported as valid values, IAM Access Analyzer will return an error.</p>
1022
996
  * @public
1023
997
  */
1024
998
  resourceType: AccessCheckResourceType | undefined;
@@ -1040,45 +1014,23 @@ export type CheckNoPublicAccessResult = (typeof CheckNoPublicAccessResult)[keyof
1040
1014
  */
1041
1015
  export interface CheckNoPublicAccessResponse {
1042
1016
  /**
1043
- * <p>The result of the check for public access to the specified resource type. If the result
1044
- * is <code>PASS</code>, the policy doesn't allow public access to the specified resource
1045
- * type. If the result is <code>FAIL</code>, the policy might allow public access to the
1046
- * specified resource type.</p>
1017
+ * <p>The result of the check for public access to the specified resource type. If the result is <code>PASS</code>, the policy doesn't allow public access to the specified resource type. If the result is <code>FAIL</code>, the policy might allow public access to the specified resource type.</p>
1047
1018
  * @public
1048
1019
  */
1049
1020
  result?: CheckNoPublicAccessResult | undefined;
1050
1021
  /**
1051
- * <p>The message indicating whether the specified policy allows public access to
1052
- * resources.</p>
1022
+ * <p>The message indicating whether the specified policy allows public access to resources.</p>
1053
1023
  * @public
1054
1024
  */
1055
1025
  message?: string | undefined;
1056
1026
  /**
1057
- * <p>A list of reasons why the specified resource policy grants public access for the
1058
- * resource type.</p>
1027
+ * <p>A list of reasons why the specified resource policy grants public access for the resource type.</p>
1059
1028
  * @public
1060
1029
  */
1061
1030
  reasons?: ReasonSummary[] | undefined;
1062
1031
  }
1063
1032
  /**
1064
- * <p>The proposed access control configuration for a DynamoDB stream. You can propose a
1065
- * configuration for a new DynamoDB stream or an existing DynamoDB stream that you own by specifying
1066
- * the policy for the DynamoDB stream. For more information, see <a href="https://docs.aws.amazon.com/amazondynamodb/latest/APIReference/API_PutResourcePolicy.html">PutResourcePolicy</a>.</p>
1067
- * <ul>
1068
- * <li>
1069
- * <p>If the configuration is for an existing DynamoDB stream and you do not specify the
1070
- * DynamoDB policy, then the access preview uses the existing DynamoDB policy for the
1071
- * stream.</p>
1072
- * </li>
1073
- * <li>
1074
- * <p>If the access preview is for a new resource and you do not specify the policy,
1075
- * then the access preview assumes a DynamoDB stream without a policy.</p>
1076
- * </li>
1077
- * <li>
1078
- * <p>To propose deletion of an existing DynamoDB stream policy, you can specify an empty
1079
- * string for the DynamoDB policy.</p>
1080
- * </li>
1081
- * </ul>
1033
+ * <p>The proposed access control configuration for a DynamoDB stream. You can propose a configuration for a new DynamoDB stream or an existing DynamoDB stream that you own by specifying the policy for the DynamoDB stream. For more information, see <a href="https://docs.aws.amazon.com/amazondynamodb/latest/APIReference/API_PutResourcePolicy.html">PutResourcePolicy</a>.</p> <ul> <li> <p>If the configuration is for an existing DynamoDB stream and you do not specify the DynamoDB policy, then the access preview uses the existing DynamoDB policy for the stream.</p> </li> <li> <p>If the access preview is for a new resource and you do not specify the policy, then the access preview assumes a DynamoDB stream without a policy.</p> </li> <li> <p>To propose deletion of an existing DynamoDB stream policy, you can specify an empty string for the DynamoDB policy.</p> </li> </ul>
1082
1034
  * @public
1083
1035
  */
1084
1036
  export interface DynamodbStreamConfiguration {
@@ -1089,24 +1041,7 @@ export interface DynamodbStreamConfiguration {
1089
1041
  streamPolicy?: string | undefined;
1090
1042
  }
1091
1043
  /**
1092
- * <p>The proposed access control configuration for a DynamoDB table or index. You can propose a
1093
- * configuration for a new DynamoDB table or index or an existing DynamoDB table or index that you
1094
- * own by specifying the policy for the DynamoDB table or index. For more information, see <a href="https://docs.aws.amazon.com/amazondynamodb/latest/APIReference/API_PutResourcePolicy.html">PutResourcePolicy</a>.</p>
1095
- * <ul>
1096
- * <li>
1097
- * <p>If the configuration is for an existing DynamoDB table or index and you do not
1098
- * specify the DynamoDB policy, then the access preview uses the existing DynamoDB policy for
1099
- * the table or index.</p>
1100
- * </li>
1101
- * <li>
1102
- * <p>If the access preview is for a new resource and you do not specify the policy,
1103
- * then the access preview assumes a DynamoDB table without a policy.</p>
1104
- * </li>
1105
- * <li>
1106
- * <p>To propose deletion of an existing DynamoDB table or index policy, you can specify an
1107
- * empty string for the DynamoDB policy.</p>
1108
- * </li>
1109
- * </ul>
1044
+ * <p>The proposed access control configuration for a DynamoDB table or index. You can propose a configuration for a new DynamoDB table or index or an existing DynamoDB table or index that you own by specifying the policy for the DynamoDB table or index. For more information, see <a href="https://docs.aws.amazon.com/amazondynamodb/latest/APIReference/API_PutResourcePolicy.html">PutResourcePolicy</a>.</p> <ul> <li> <p>If the configuration is for an existing DynamoDB table or index and you do not specify the DynamoDB policy, then the access preview uses the existing DynamoDB policy for the table or index.</p> </li> <li> <p>If the access preview is for a new resource and you do not specify the policy, then the access preview assumes a DynamoDB table without a policy.</p> </li> <li> <p>To propose deletion of an existing DynamoDB table or index policy, you can specify an empty string for the DynamoDB policy.</p> </li> </ul>
1110
1045
  * @public
1111
1046
  */
1112
1047
  export interface DynamodbTableConfiguration {
@@ -1117,143 +1052,50 @@ export interface DynamodbTableConfiguration {
1117
1052
  tablePolicy?: string | undefined;
1118
1053
  }
1119
1054
  /**
1120
- * <p>The proposed access control configuration for an Amazon EBS volume snapshot. You can propose
1121
- * a configuration for a new Amazon EBS volume snapshot or an Amazon EBS volume snapshot that you own by
1122
- * specifying the user IDs, groups, and optional KMS encryption key. For more information,
1123
- * see <a href="https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_ModifySnapshotAttribute.html">ModifySnapshotAttribute</a>.</p>
1055
+ * <p>The proposed access control configuration for an Amazon EBS volume snapshot. You can propose a configuration for a new Amazon EBS volume snapshot or an Amazon EBS volume snapshot that you own by specifying the user IDs, groups, and optional KMS encryption key. For more information, see <a href="https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_ModifySnapshotAttribute.html">ModifySnapshotAttribute</a>.</p>
1124
1056
  * @public
1125
1057
  */
1126
1058
  export interface EbsSnapshotConfiguration {
1127
1059
  /**
1128
- * <p>The IDs of the Amazon Web Services accounts that have access to the Amazon EBS volume snapshot.</p>
1129
- * <ul>
1130
- * <li>
1131
- * <p>If the configuration is for an existing Amazon EBS volume snapshot and you do not
1132
- * specify the <code>userIds</code>, then the access preview uses the existing shared
1133
- * <code>userIds</code> for the snapshot.</p>
1134
- * </li>
1135
- * <li>
1136
- * <p>If the access preview is for a new resource and you do not specify the
1137
- * <code>userIds</code>, then the access preview considers the snapshot without any
1138
- * <code>userIds</code>.</p>
1139
- * </li>
1140
- * <li>
1141
- * <p>To propose deletion of existing shared <code>accountIds</code>, you can specify an
1142
- * empty list for <code>userIds</code>.</p>
1143
- * </li>
1144
- * </ul>
1060
+ * <p>The IDs of the Amazon Web Services accounts that have access to the Amazon EBS volume snapshot.</p> <ul> <li> <p>If the configuration is for an existing Amazon EBS volume snapshot and you do not specify the <code>userIds</code>, then the access preview uses the existing shared <code>userIds</code> for the snapshot.</p> </li> <li> <p>If the access preview is for a new resource and you do not specify the <code>userIds</code>, then the access preview considers the snapshot without any <code>userIds</code>.</p> </li> <li> <p>To propose deletion of existing shared <code>accountIds</code>, you can specify an empty list for <code>userIds</code>.</p> </li> </ul>
1145
1061
  * @public
1146
1062
  */
1147
1063
  userIds?: string[] | undefined;
1148
1064
  /**
1149
- * <p>The groups that have access to the Amazon EBS volume snapshot. If the value <code>all</code>
1150
- * is specified, then the Amazon EBS volume snapshot is public.</p>
1151
- * <ul>
1152
- * <li>
1153
- * <p>If the configuration is for an existing Amazon EBS volume snapshot and you do not
1154
- * specify the <code>groups</code>, then the access preview uses the existing shared
1155
- * <code>groups</code> for the snapshot.</p>
1156
- * </li>
1157
- * <li>
1158
- * <p>If the access preview is for a new resource and you do not specify the
1159
- * <code>groups</code>, then the access preview considers the snapshot without any
1160
- * <code>groups</code>.</p>
1161
- * </li>
1162
- * <li>
1163
- * <p>To propose deletion of existing shared <code>groups</code>, you can specify an
1164
- * empty list for <code>groups</code>.</p>
1165
- * </li>
1166
- * </ul>
1065
+ * <p>The groups that have access to the Amazon EBS volume snapshot. If the value <code>all</code> is specified, then the Amazon EBS volume snapshot is public.</p> <ul> <li> <p>If the configuration is for an existing Amazon EBS volume snapshot and you do not specify the <code>groups</code>, then the access preview uses the existing shared <code>groups</code> for the snapshot.</p> </li> <li> <p>If the access preview is for a new resource and you do not specify the <code>groups</code>, then the access preview considers the snapshot without any <code>groups</code>.</p> </li> <li> <p>To propose deletion of existing shared <code>groups</code>, you can specify an empty list for <code>groups</code>.</p> </li> </ul>
1167
1066
  * @public
1168
1067
  */
1169
1068
  groups?: string[] | undefined;
1170
1069
  /**
1171
- * <p>The KMS key identifier for an encrypted Amazon EBS volume snapshot. The KMS key
1172
- * identifier is the key ARN, key ID, alias ARN, or alias name for the KMS key.</p>
1173
- * <ul>
1174
- * <li>
1175
- * <p>If the configuration is for an existing Amazon EBS volume snapshot and you do not
1176
- * specify the <code>kmsKeyId</code>, or you specify an empty string, then the access
1177
- * preview uses the existing <code>kmsKeyId</code> of the snapshot.</p>
1178
- * </li>
1179
- * <li>
1180
- * <p>If the access preview is for a new resource and you do not specify the
1181
- * <code>kmsKeyId</code>, the access preview considers the snapshot as
1182
- * unencrypted.</p>
1183
- * </li>
1184
- * </ul>
1070
+ * <p>The KMS key identifier for an encrypted Amazon EBS volume snapshot. The KMS key identifier is the key ARN, key ID, alias ARN, or alias name for the KMS key.</p> <ul> <li> <p>If the configuration is for an existing Amazon EBS volume snapshot and you do not specify the <code>kmsKeyId</code>, or you specify an empty string, then the access preview uses the existing <code>kmsKeyId</code> of the snapshot.</p> </li> <li> <p>If the access preview is for a new resource and you do not specify the <code>kmsKeyId</code>, the access preview considers the snapshot as unencrypted.</p> </li> </ul>
1185
1071
  * @public
1186
1072
  */
1187
1073
  kmsKeyId?: string | undefined;
1188
1074
  }
1189
1075
  /**
1190
- * <p>The proposed access control configuration for an Amazon ECR repository. You can propose a
1191
- * configuration for a new Amazon ECR repository or an existing Amazon ECR repository that you own by
1192
- * specifying the Amazon ECR policy. For more information, see <a href="https://docs.aws.amazon.com/AmazonECR/latest/APIReference/API_Repository.html">Repository</a>.</p>
1193
- * <ul>
1194
- * <li>
1195
- * <p>If the configuration is for an existing Amazon ECR repository and you do not specify
1196
- * the Amazon ECR policy, then the access preview uses the existing Amazon ECR policy for the
1197
- * repository.</p>
1198
- * </li>
1199
- * <li>
1200
- * <p>If the access preview is for a new resource and you do not specify the policy,
1201
- * then the access preview assumes an Amazon ECR repository without a policy.</p>
1202
- * </li>
1203
- * <li>
1204
- * <p>To propose deletion of an existing Amazon ECR repository policy, you can specify an
1205
- * empty string for the Amazon ECR policy.</p>
1206
- * </li>
1207
- * </ul>
1076
+ * <p>The proposed access control configuration for an Amazon ECR repository. You can propose a configuration for a new Amazon ECR repository or an existing Amazon ECR repository that you own by specifying the Amazon ECR policy. For more information, see <a href="https://docs.aws.amazon.com/AmazonECR/latest/APIReference/API_Repository.html">Repository</a>.</p> <ul> <li> <p>If the configuration is for an existing Amazon ECR repository and you do not specify the Amazon ECR policy, then the access preview uses the existing Amazon ECR policy for the repository.</p> </li> <li> <p>If the access preview is for a new resource and you do not specify the policy, then the access preview assumes an Amazon ECR repository without a policy.</p> </li> <li> <p>To propose deletion of an existing Amazon ECR repository policy, you can specify an empty string for the Amazon ECR policy.</p> </li> </ul>
1208
1077
  * @public
1209
1078
  */
1210
1079
  export interface EcrRepositoryConfiguration {
1211
1080
  /**
1212
- * <p>The JSON repository policy text to apply to the Amazon ECR repository. For more information,
1213
- * see <a href="https://docs.aws.amazon.com/AmazonECR/latest/userguide/repository-policy-examples.html">Private repository
1214
- * policy examples</a> in the <i>Amazon ECR User Guide</i>.</p>
1081
+ * <p>The JSON repository policy text to apply to the Amazon ECR repository. For more information, see <a href="https://docs.aws.amazon.com/AmazonECR/latest/userguide/repository-policy-examples.html">Private repository policy examples</a> in the <i>Amazon ECR User Guide</i>.</p>
1215
1082
  * @public
1216
1083
  */
1217
1084
  repositoryPolicy?: string | undefined;
1218
1085
  }
1219
1086
  /**
1220
- * <p>The proposed access control configuration for an Amazon EFS file system. You can propose a
1221
- * configuration for a new Amazon EFS file system or an existing Amazon EFS file system that you own by
1222
- * specifying the Amazon EFS policy. For more information, see <a href="https://docs.aws.amazon.com/efs/latest/ug/using-fs.html">Using file systems in Amazon EFS</a>.</p>
1223
- * <ul>
1224
- * <li>
1225
- * <p>If the configuration is for an existing Amazon EFS file system and you do not specify
1226
- * the Amazon EFS policy, then the access preview uses the existing Amazon EFS policy for the file
1227
- * system.</p>
1228
- * </li>
1229
- * <li>
1230
- * <p>If the access preview is for a new resource and you do not specify the policy,
1231
- * then the access preview assumes an Amazon EFS file system without a policy.</p>
1232
- * </li>
1233
- * <li>
1234
- * <p>To propose deletion of an existing Amazon EFS file system policy, you can specify an
1235
- * empty string for the Amazon EFS policy.</p>
1236
- * </li>
1237
- * </ul>
1087
+ * <p>The proposed access control configuration for an Amazon EFS file system. You can propose a configuration for a new Amazon EFS file system or an existing Amazon EFS file system that you own by specifying the Amazon EFS policy. For more information, see <a href="https://docs.aws.amazon.com/efs/latest/ug/using-fs.html">Using file systems in Amazon EFS</a>.</p> <ul> <li> <p>If the configuration is for an existing Amazon EFS file system and you do not specify the Amazon EFS policy, then the access preview uses the existing Amazon EFS policy for the file system.</p> </li> <li> <p>If the access preview is for a new resource and you do not specify the policy, then the access preview assumes an Amazon EFS file system without a policy.</p> </li> <li> <p>To propose deletion of an existing Amazon EFS file system policy, you can specify an empty string for the Amazon EFS policy.</p> </li> </ul>
1238
1088
  * @public
1239
1089
  */
1240
1090
  export interface EfsFileSystemConfiguration {
1241
1091
  /**
1242
- * <p>The JSON policy definition to apply to the Amazon EFS file system. For more information on
1243
- * the elements that make up a file system policy, see <a href="https://docs.aws.amazon.com/efs/latest/ug/access-control-overview.html#access-control-manage-access-intro-resource-policies">Amazon EFS Resource-based policies</a>.</p>
1092
+ * <p>The JSON policy definition to apply to the Amazon EFS file system. For more information on the elements that make up a file system policy, see <a href="https://docs.aws.amazon.com/efs/latest/ug/access-control-overview.html#access-control-manage-access-intro-resource-policies">Amazon EFS Resource-based policies</a>.</p>
1244
1093
  * @public
1245
1094
  */
1246
1095
  fileSystemPolicy?: string | undefined;
1247
1096
  }
1248
1097
  /**
1249
- * <p>The proposed access control configuration for an IAM role. You can propose a
1250
- * configuration for a new IAM role or an existing IAM role that you own by specifying the
1251
- * trust policy. If the configuration is for a new IAM role, you must specify the trust
1252
- * policy. If the configuration is for an existing IAM role that you own and you do not
1253
- * propose the trust policy, the access preview uses the existing trust policy for the role.
1254
- * The proposed trust policy cannot be an empty string. For more information about role trust
1255
- * policy limits, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html">IAM and STS
1256
- * quotas</a>.</p>
1098
+ * <p>The proposed access control configuration for an IAM role. You can propose a configuration for a new IAM role or an existing IAM role that you own by specifying the trust policy. If the configuration is for a new IAM role, you must specify the trust policy. If the configuration is for an existing IAM role that you own and you do not propose the trust policy, the access preview uses the existing trust policy for the role. The proposed trust policy cannot be an empty string. For more information about role trust policy limits, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-quotas.html">IAM and STS quotas</a>.</p>
1257
1099
  * @public
1258
1100
  */
1259
1101
  export interface IamRoleConfiguration {
@@ -1264,27 +1106,17 @@ export interface IamRoleConfiguration {
1264
1106
  trustPolicy?: string | undefined;
1265
1107
  }
1266
1108
  /**
1267
- * <p>Use this structure to propose allowing <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic
1268
- * operations</a> in the grant only when the operation request includes the specified
1269
- * <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#encrypt_context">encryption
1270
- * context</a>. You can specify only one type of encryption context. An empty map is
1271
- * treated as not specified. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/APIReference/API_GrantConstraints.html">GrantConstraints</a>.</p>
1109
+ * <p>Use this structure to propose allowing <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic operations</a> in the grant only when the operation request includes the specified <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#encrypt_context">encryption context</a>. You can specify only one type of encryption context. An empty map is treated as not specified. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/APIReference/API_GrantConstraints.html">GrantConstraints</a>.</p>
1272
1110
  * @public
1273
1111
  */
1274
1112
  export interface KmsGrantConstraints {
1275
1113
  /**
1276
- * <p>A list of key-value pairs that must match the encryption context in the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic
1277
- * operation</a> request. The grant allows the operation only when the encryption
1278
- * context in the request is the same as the encryption context specified in this
1279
- * constraint.</p>
1114
+ * <p>A list of key-value pairs that must match the encryption context in the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic operation</a> request. The grant allows the operation only when the encryption context in the request is the same as the encryption context specified in this constraint.</p>
1280
1115
  * @public
1281
1116
  */
1282
1117
  encryptionContextEquals?: Record<string, string> | undefined;
1283
1118
  /**
1284
- * <p>A list of key-value pairs that must be included in the encryption context of the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic
1285
- * operation</a> request. The grant allows the cryptographic operation only when the
1286
- * encryption context in the request includes the key-value pairs specified in this
1287
- * constraint, although it can include additional key-value pairs.</p>
1119
+ * <p>A list of key-value pairs that must be included in the encryption context of the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic operation</a> request. The grant allows the cryptographic operation only when the encryption context in the request includes the key-value pairs specified in this constraint, although it can include additional key-value pairs.</p>
1288
1120
  * @public
1289
1121
  */
1290
1122
  encryptionContextSubset?: Record<string, string> | undefined;
@@ -1324,8 +1156,7 @@ export interface KmsGrantConfiguration {
1324
1156
  */
1325
1157
  operations: KmsGrantOperation[] | undefined;
1326
1158
  /**
1327
- * <p>The principal that is given permission to perform the operations that the grant
1328
- * permits.</p>
1159
+ * <p>The principal that is given permission to perform the operations that the grant permits.</p>
1329
1160
  * @public
1330
1161
  */
1331
1162
  granteePrincipal: string | undefined;
@@ -1335,46 +1166,28 @@ export interface KmsGrantConfiguration {
1335
1166
  */
1336
1167
  retiringPrincipal?: string | undefined;
1337
1168
  /**
1338
- * <p>Use this structure to propose allowing <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic
1339
- * operations</a> in the grant only when the operation request includes the specified
1340
- * <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#encrypt_context">encryption
1341
- * context</a>.</p>
1169
+ * <p>Use this structure to propose allowing <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic operations</a> in the grant only when the operation request includes the specified <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#encrypt_context">encryption context</a>.</p>
1342
1170
  * @public
1343
1171
  */
1344
1172
  constraints?: KmsGrantConstraints | undefined;
1345
1173
  /**
1346
- * <p> The Amazon Web Services account under which the grant was issued. The account is used to propose
1347
- * KMS grants issued by accounts other than the owner of the key.</p>
1174
+ * <p> The Amazon Web Services account under which the grant was issued. The account is used to propose KMS grants issued by accounts other than the owner of the key.</p>
1348
1175
  * @public
1349
1176
  */
1350
1177
  issuingAccount: string | undefined;
1351
1178
  }
1352
1179
  /**
1353
- * <p>Proposed access control configuration for a KMS key. You can propose a configuration
1354
- * for a new KMS key or an existing KMS key that you own by specifying the key policy and
1355
- * KMS grant configuration. If the configuration is for an existing key and you do not
1356
- * specify the key policy, the access preview uses the existing policy for the key. If the
1357
- * access preview is for a new resource and you do not specify the key policy, then the access
1358
- * preview uses the default key policy. The proposed key policy cannot be an empty string. For
1359
- * more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key
1360
- * policy</a>. For more information about key policy limits, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/resource-limits.html">Resource
1361
- * quotas</a>.</p>
1362
- * <p/>
1180
+ * <p>Proposed access control configuration for a KMS key. You can propose a configuration for a new KMS key or an existing KMS key that you own by specifying the key policy and KMS grant configuration. If the configuration is for an existing key and you do not specify the key policy, the access preview uses the existing policy for the key. If the access preview is for a new resource and you do not specify the key policy, then the access preview uses the default key policy. The proposed key policy cannot be an empty string. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key policy</a>. For more information about key policy limits, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/resource-limits.html">Resource quotas</a>.</p> <p/>
1363
1181
  * @public
1364
1182
  */
1365
1183
  export interface KmsKeyConfiguration {
1366
1184
  /**
1367
- * <p>Resource policy configuration for the KMS key. The only valid value for the name of
1368
- * the key policy is <code>default</code>. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key
1369
- * policy</a>.</p>
1185
+ * <p>Resource policy configuration for the KMS key. The only valid value for the name of the key policy is <code>default</code>. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default key policy</a>.</p>
1370
1186
  * @public
1371
1187
  */
1372
1188
  keyPolicies?: Record<string, string> | undefined;
1373
1189
  /**
1374
- * <p>A list of proposed grant configurations for the KMS key. If the proposed grant
1375
- * configuration is for an existing key, the access preview uses the proposed list of grant
1376
- * configurations in place of the existing grants. Otherwise, the access preview uses the
1377
- * existing grants for the key.</p>
1190
+ * <p>A list of proposed grant configurations for the KMS key. If the proposed grant configuration is for an existing key, the access preview uses the proposed list of grant configurations in place of the existing grants. Otherwise, the access preview uses the existing grants for the key.</p>
1378
1191
  * @public
1379
1192
  */
1380
1193
  grants?: KmsGrantConfiguration[] | undefined;
@@ -1389,27 +1202,7 @@ export type RdsDbClusterSnapshotAttributeValue = RdsDbClusterSnapshotAttributeVa
1389
1202
  */
1390
1203
  export declare namespace RdsDbClusterSnapshotAttributeValue {
1391
1204
  /**
1392
- * <p>The Amazon Web Services account IDs that have access to the manual Amazon RDS DB cluster snapshot. If the
1393
- * value <code>all</code> is specified, then the Amazon RDS DB cluster snapshot is public and can
1394
- * be copied or restored by all Amazon Web Services accounts.</p>
1395
- * <ul>
1396
- * <li>
1397
- * <p>If the configuration is for an existing Amazon RDS DB cluster snapshot and you do not
1398
- * specify the <code>accountIds</code> in
1399
- * <code>RdsDbClusterSnapshotAttributeValue</code>, then the access preview uses the
1400
- * existing shared <code>accountIds</code> for the snapshot.</p>
1401
- * </li>
1402
- * <li>
1403
- * <p>If the access preview is for a new resource and you do not specify the specify the
1404
- * <code>accountIds</code> in <code>RdsDbClusterSnapshotAttributeValue</code>, then
1405
- * the access preview considers the snapshot without any attributes.</p>
1406
- * </li>
1407
- * <li>
1408
- * <p>To propose deletion of existing shared <code>accountIds</code>, you can specify an
1409
- * empty list for <code>accountIds</code> in the
1410
- * <code>RdsDbClusterSnapshotAttributeValue</code>.</p>
1411
- * </li>
1412
- * </ul>
1205
+ * <p>The Amazon Web Services account IDs that have access to the manual Amazon RDS DB cluster snapshot. If the value <code>all</code> is specified, then the Amazon RDS DB cluster snapshot is public and can be copied or restored by all Amazon Web Services accounts.</p> <ul> <li> <p>If the configuration is for an existing Amazon RDS DB cluster snapshot and you do not specify the <code>accountIds</code> in <code>RdsDbClusterSnapshotAttributeValue</code>, then the access preview uses the existing shared <code>accountIds</code> for the snapshot.</p> </li> <li> <p>If the access preview is for a new resource and you do not specify the specify the <code>accountIds</code> in <code>RdsDbClusterSnapshotAttributeValue</code>, then the access preview considers the snapshot without any attributes.</p> </li> <li> <p>To propose deletion of existing shared <code>accountIds</code>, you can specify an empty list for <code>accountIds</code> in the <code>RdsDbClusterSnapshotAttributeValue</code>.</p> </li> </ul>
1413
1206
  * @public
1414
1207
  */
1415
1208
  interface AccountIdsMember {
@@ -1430,45 +1223,23 @@ export declare namespace RdsDbClusterSnapshotAttributeValue {
1430
1223
  const visit: <T>(value: RdsDbClusterSnapshotAttributeValue, visitor: Visitor<T>) => T;
1431
1224
  }
1432
1225
  /**
1433
- * <p>The proposed access control configuration for an Amazon RDS DB cluster snapshot. You can
1434
- * propose a configuration for a new Amazon RDS DB cluster snapshot or an Amazon RDS DB cluster snapshot
1435
- * that you own by specifying the <code>RdsDbClusterSnapshotAttributeValue</code> and optional
1436
- * KMS encryption key. For more information, see <a href="https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_ModifyDBClusterSnapshotAttribute.html">ModifyDBClusterSnapshotAttribute</a>.</p>
1226
+ * <p>The proposed access control configuration for an Amazon RDS DB cluster snapshot. You can propose a configuration for a new Amazon RDS DB cluster snapshot or an Amazon RDS DB cluster snapshot that you own by specifying the <code>RdsDbClusterSnapshotAttributeValue</code> and optional KMS encryption key. For more information, see <a href="https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_ModifyDBClusterSnapshotAttribute.html">ModifyDBClusterSnapshotAttribute</a>.</p>
1437
1227
  * @public
1438
1228
  */
1439
1229
  export interface RdsDbClusterSnapshotConfiguration {
1440
1230
  /**
1441
- * <p>The names and values of manual DB cluster snapshot attributes. Manual DB cluster
1442
- * snapshot attributes are used to authorize other Amazon Web Services accounts to restore a manual DB
1443
- * cluster snapshot. The only valid value for <code>AttributeName</code> for the attribute map
1444
- * is <code>restore</code>
1445
- * </p>
1231
+ * <p>The names and values of manual DB cluster snapshot attributes. Manual DB cluster snapshot attributes are used to authorize other Amazon Web Services accounts to restore a manual DB cluster snapshot. The only valid value for <code>AttributeName</code> for the attribute map is <code>restore</code> </p>
1446
1232
  * @public
1447
1233
  */
1448
1234
  attributes?: Record<string, RdsDbClusterSnapshotAttributeValue> | undefined;
1449
1235
  /**
1450
- * <p>The KMS key identifier for an encrypted Amazon RDS DB cluster snapshot. The KMS key
1451
- * identifier is the key ARN, key ID, alias ARN, or alias name for the KMS key.</p>
1452
- * <ul>
1453
- * <li>
1454
- * <p>If the configuration is for an existing Amazon RDS DB cluster snapshot and you do not
1455
- * specify the <code>kmsKeyId</code>, or you specify an empty string, then the access
1456
- * preview uses the existing <code>kmsKeyId</code> of the snapshot.</p>
1457
- * </li>
1458
- * <li>
1459
- * <p>If the access preview is for a new resource and you do not specify the specify the
1460
- * <code>kmsKeyId</code>, then the access preview considers the snapshot as
1461
- * unencrypted.</p>
1462
- * </li>
1463
- * </ul>
1236
+ * <p>The KMS key identifier for an encrypted Amazon RDS DB cluster snapshot. The KMS key identifier is the key ARN, key ID, alias ARN, or alias name for the KMS key.</p> <ul> <li> <p>If the configuration is for an existing Amazon RDS DB cluster snapshot and you do not specify the <code>kmsKeyId</code>, or you specify an empty string, then the access preview uses the existing <code>kmsKeyId</code> of the snapshot.</p> </li> <li> <p>If the access preview is for a new resource and you do not specify the specify the <code>kmsKeyId</code>, then the access preview considers the snapshot as unencrypted.</p> </li> </ul>
1464
1237
  * @public
1465
1238
  */
1466
1239
  kmsKeyId?: string | undefined;
1467
1240
  }
1468
1241
  /**
1469
- * <p>The name and values of a manual Amazon RDS DB snapshot attribute. Manual DB snapshot
1470
- * attributes are used to authorize other Amazon Web Services accounts to restore a manual DB
1471
- * snapshot.</p>
1242
+ * <p>The name and values of a manual Amazon RDS DB snapshot attribute. Manual DB snapshot attributes are used to authorize other Amazon Web Services accounts to restore a manual DB snapshot.</p>
1472
1243
  * @public
1473
1244
  */
1474
1245
  export type RdsDbSnapshotAttributeValue = RdsDbSnapshotAttributeValue.AccountIdsMember | RdsDbSnapshotAttributeValue.$UnknownMember;
@@ -1477,27 +1248,7 @@ export type RdsDbSnapshotAttributeValue = RdsDbSnapshotAttributeValue.AccountIds
1477
1248
  */
1478
1249
  export declare namespace RdsDbSnapshotAttributeValue {
1479
1250
  /**
1480
- * <p>The Amazon Web Services account IDs that have access to the manual Amazon RDS DB snapshot. If the value
1481
- * <code>all</code> is specified, then the Amazon RDS DB snapshot is public and can be copied or
1482
- * restored by all Amazon Web Services accounts.</p>
1483
- * <ul>
1484
- * <li>
1485
- * <p>If the configuration is for an existing Amazon RDS DB snapshot and you do not specify
1486
- * the <code>accountIds</code> in <code>RdsDbSnapshotAttributeValue</code>, then the
1487
- * access preview uses the existing shared <code>accountIds</code> for the
1488
- * snapshot.</p>
1489
- * </li>
1490
- * <li>
1491
- * <p>If the access preview is for a new resource and you do not specify the specify the
1492
- * <code>accountIds</code> in <code>RdsDbSnapshotAttributeValue</code>, then the
1493
- * access preview considers the snapshot without any attributes.</p>
1494
- * </li>
1495
- * <li>
1496
- * <p>To propose deletion of an existing shared <code>accountIds</code>, you can specify
1497
- * an empty list for <code>accountIds</code> in the
1498
- * <code>RdsDbSnapshotAttributeValue</code>.</p>
1499
- * </li>
1500
- * </ul>
1251
+ * <p>The Amazon Web Services account IDs that have access to the manual Amazon RDS DB snapshot. If the value <code>all</code> is specified, then the Amazon RDS DB snapshot is public and can be copied or restored by all Amazon Web Services accounts.</p> <ul> <li> <p>If the configuration is for an existing Amazon RDS DB snapshot and you do not specify the <code>accountIds</code> in <code>RdsDbSnapshotAttributeValue</code>, then the access preview uses the existing shared <code>accountIds</code> for the snapshot.</p> </li> <li> <p>If the access preview is for a new resource and you do not specify the specify the <code>accountIds</code> in <code>RdsDbSnapshotAttributeValue</code>, then the access preview considers the snapshot without any attributes.</p> </li> <li> <p>To propose deletion of an existing shared <code>accountIds</code>, you can specify an empty list for <code>accountIds</code> in the <code>RdsDbSnapshotAttributeValue</code>.</p> </li> </ul>
1501
1252
  * @public
1502
1253
  */
1503
1254
  interface AccountIdsMember {
@@ -1518,67 +1269,40 @@ export declare namespace RdsDbSnapshotAttributeValue {
1518
1269
  const visit: <T>(value: RdsDbSnapshotAttributeValue, visitor: Visitor<T>) => T;
1519
1270
  }
1520
1271
  /**
1521
- * <p>The proposed access control configuration for an Amazon RDS DB snapshot. You can propose a
1522
- * configuration for a new Amazon RDS DB snapshot or an Amazon RDS DB snapshot that you own by
1523
- * specifying the <code>RdsDbSnapshotAttributeValue</code> and optional KMS encryption key.
1524
- * For more information, see <a href="https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_ModifyDBSnapshotAttribute.html">ModifyDBSnapshotAttribute</a>.</p>
1272
+ * <p>The proposed access control configuration for an Amazon RDS DB snapshot. You can propose a configuration for a new Amazon RDS DB snapshot or an Amazon RDS DB snapshot that you own by specifying the <code>RdsDbSnapshotAttributeValue</code> and optional KMS encryption key. For more information, see <a href="https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_ModifyDBSnapshotAttribute.html">ModifyDBSnapshotAttribute</a>.</p>
1525
1273
  * @public
1526
1274
  */
1527
1275
  export interface RdsDbSnapshotConfiguration {
1528
1276
  /**
1529
- * <p>The names and values of manual DB snapshot attributes. Manual DB snapshot attributes are
1530
- * used to authorize other Amazon Web Services accounts to restore a manual DB snapshot. The only valid
1531
- * value for <code>attributeName</code> for the attribute map is restore.</p>
1277
+ * <p>The names and values of manual DB snapshot attributes. Manual DB snapshot attributes are used to authorize other Amazon Web Services accounts to restore a manual DB snapshot. The only valid value for <code>attributeName</code> for the attribute map is restore.</p>
1532
1278
  * @public
1533
1279
  */
1534
1280
  attributes?: Record<string, RdsDbSnapshotAttributeValue> | undefined;
1535
1281
  /**
1536
- * <p>The KMS key identifier for an encrypted Amazon RDS DB snapshot. The KMS key identifier is
1537
- * the key ARN, key ID, alias ARN, or alias name for the KMS key.</p>
1538
- * <ul>
1539
- * <li>
1540
- * <p>If the configuration is for an existing Amazon RDS DB snapshot and you do not specify
1541
- * the <code>kmsKeyId</code>, or you specify an empty string, then the access preview
1542
- * uses the existing <code>kmsKeyId</code> of the snapshot.</p>
1543
- * </li>
1544
- * <li>
1545
- * <p>If the access preview is for a new resource and you do not specify the specify the
1546
- * <code>kmsKeyId</code>, then the access preview considers the snapshot as
1547
- * unencrypted.</p>
1548
- * </li>
1549
- * </ul>
1282
+ * <p>The KMS key identifier for an encrypted Amazon RDS DB snapshot. The KMS key identifier is the key ARN, key ID, alias ARN, or alias name for the KMS key.</p> <ul> <li> <p>If the configuration is for an existing Amazon RDS DB snapshot and you do not specify the <code>kmsKeyId</code>, or you specify an empty string, then the access preview uses the existing <code>kmsKeyId</code> of the snapshot.</p> </li> <li> <p>If the access preview is for a new resource and you do not specify the specify the <code>kmsKeyId</code>, then the access preview considers the snapshot as unencrypted.</p> </li> </ul>
1550
1283
  * @public
1551
1284
  */
1552
1285
  kmsKeyId?: string | undefined;
1553
1286
  }
1554
1287
  /**
1555
- * <p>This configuration sets the network origin for the Amazon S3 access point or multi-region
1556
- * access point to <code>Internet</code>.</p>
1288
+ * <p>This configuration sets the network origin for the Amazon S3 access point or multi-region access point to <code>Internet</code>.</p>
1557
1289
  * @public
1558
1290
  */
1559
1291
  export interface InternetConfiguration {
1560
1292
  }
1561
1293
  /**
1562
- * <p>The proposed virtual private cloud (VPC) configuration for the Amazon S3 access point. VPC
1563
- * configuration does not apply to multi-region access points. For more information, see
1564
- * <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_control_VpcConfiguration.html">VpcConfiguration</a>. </p>
1294
+ * <p>The proposed virtual private cloud (VPC) configuration for the Amazon S3 access point. VPC configuration does not apply to multi-region access points. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_control_VpcConfiguration.html">VpcConfiguration</a>. </p>
1565
1295
  * @public
1566
1296
  */
1567
1297
  export interface VpcConfiguration {
1568
1298
  /**
1569
- * <p> If this field is specified, this access point will only allow connections from the
1570
- * specified VPC ID. </p>
1299
+ * <p> If this field is specified, this access point will only allow connections from the specified VPC ID. </p>
1571
1300
  * @public
1572
1301
  */
1573
1302
  vpcId: string | undefined;
1574
1303
  }
1575
1304
  /**
1576
- * <p>The proposed <code>InternetConfiguration</code> or <code>VpcConfiguration</code> to
1577
- * apply to the Amazon S3 access point. You can make the access point accessible from the internet,
1578
- * or you can specify that all requests made through that access point must originate from a
1579
- * specific virtual private cloud (VPC). You can specify only one type of network
1580
- * configuration. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html">Creating access
1581
- * points</a>.</p>
1305
+ * <p>The proposed <code>InternetConfiguration</code> or <code>VpcConfiguration</code> to apply to the Amazon S3 access point. You can make the access point accessible from the internet, or you can specify that all requests made through that access point must originate from a specific virtual private cloud (VPC). You can specify only one type of network configuration. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html">Creating access points</a>.</p>
1582
1306
  * @public
1583
1307
  */
1584
1308
  export type NetworkOriginConfiguration = NetworkOriginConfiguration.InternetConfigurationMember | NetworkOriginConfiguration.VpcConfigurationMember | NetworkOriginConfiguration.$UnknownMember;
@@ -1587,9 +1311,7 @@ export type NetworkOriginConfiguration = NetworkOriginConfiguration.InternetConf
1587
1311
  */
1588
1312
  export declare namespace NetworkOriginConfiguration {
1589
1313
  /**
1590
- * <p>The proposed virtual private cloud (VPC) configuration for the Amazon S3 access point. VPC
1591
- * configuration does not apply to multi-region access points. For more information, see
1592
- * <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_control_VpcConfiguration.html">VpcConfiguration</a>. </p>
1314
+ * <p>The proposed virtual private cloud (VPC) configuration for the Amazon S3 access point. VPC configuration does not apply to multi-region access points. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_control_VpcConfiguration.html">VpcConfiguration</a>. </p>
1593
1315
  * @public
1594
1316
  */
1595
1317
  interface VpcConfigurationMember {
@@ -1598,8 +1320,7 @@ export declare namespace NetworkOriginConfiguration {
1598
1320
  $unknown?: never;
1599
1321
  }
1600
1322
  /**
1601
- * <p>The configuration for the Amazon S3 access point or multi-region access point with an
1602
- * <code>Internet</code> origin.</p>
1323
+ * <p>The configuration for the Amazon S3 access point or multi-region access point with an <code>Internet</code> origin.</p>
1603
1324
  * @public
1604
1325
  */
1605
1326
  interface InternetConfigurationMember {
@@ -1623,19 +1344,12 @@ export declare namespace NetworkOriginConfiguration {
1623
1344
  const visit: <T>(value: NetworkOriginConfiguration, visitor: Visitor<T>) => T;
1624
1345
  }
1625
1346
  /**
1626
- * <p>The <code>PublicAccessBlock</code> configuration to apply to this Amazon S3 bucket. If the
1627
- * proposed configuration is for an existing Amazon S3 bucket and the configuration is not
1628
- * specified, the access preview uses the existing setting. If the proposed configuration is
1629
- * for a new bucket and the configuration is not specified, the access preview uses
1630
- * <code>false</code>. If the proposed configuration is for a new access point or
1631
- * multi-region access point and the access point BPA configuration is not specified, the
1632
- * access preview uses <code>true</code>. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-s3-bucket-publicaccessblockconfiguration.html">PublicAccessBlockConfiguration</a>. </p>
1347
+ * <p>The <code>PublicAccessBlock</code> configuration to apply to this Amazon S3 bucket. If the proposed configuration is for an existing Amazon S3 bucket and the configuration is not specified, the access preview uses the existing setting. If the proposed configuration is for a new bucket and the configuration is not specified, the access preview uses <code>false</code>. If the proposed configuration is for a new access point or multi-region access point and the access point BPA configuration is not specified, the access preview uses <code>true</code>. For more information, see <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-s3-bucket-publicaccessblockconfiguration.html">PublicAccessBlockConfiguration</a>. </p>
1633
1348
  * @public
1634
1349
  */
1635
1350
  export interface S3PublicAccessBlockConfiguration {
1636
1351
  /**
1637
- * <p> Specifies whether Amazon S3 should ignore public ACLs for this bucket and objects in this
1638
- * bucket. </p>
1352
+ * <p> Specifies whether Amazon S3 should ignore public ACLs for this bucket and objects in this bucket. </p>
1639
1353
  * @public
1640
1354
  */
1641
1355
  ignorePublicAcls: boolean | undefined;
@@ -1646,14 +1360,7 @@ export interface S3PublicAccessBlockConfiguration {
1646
1360
  restrictPublicBuckets: boolean | undefined;
1647
1361
  }
1648
1362
  /**
1649
- * <p>The configuration for an Amazon S3 access point or multi-region access point for the bucket.
1650
- * You can propose up to 10 access points or multi-region access points per bucket. If the
1651
- * proposed Amazon S3 access point configuration is for an existing bucket, the access preview uses
1652
- * the proposed access point configuration in place of the existing access points. To propose
1653
- * an access point without a policy, you can provide an empty string as the access point
1654
- * policy. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html">Creating access points</a>.
1655
- * For more information about access point policy limits, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/access-points-restrictions-limitations.html">Access points
1656
- * restrictions and limitations</a>.</p>
1363
+ * <p>The configuration for an Amazon S3 access point or multi-region access point for the bucket. You can propose up to 10 access points or multi-region access points per bucket. If the proposed Amazon S3 access point configuration is for an existing bucket, the access preview uses the proposed access point configuration in place of the existing access points. To propose an access point without a policy, you can provide an empty string as the access point policy. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html">Creating access points</a>. For more information about access point policy limits, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/access-points-restrictions-limitations.html">Access points restrictions and limitations</a>.</p>
1657
1364
  * @public
1658
1365
  */
1659
1366
  export interface S3AccessPointConfiguration {
@@ -1663,25 +1370,18 @@ export interface S3AccessPointConfiguration {
1663
1370
  */
1664
1371
  accessPointPolicy?: string | undefined;
1665
1372
  /**
1666
- * <p>The proposed <code>S3PublicAccessBlock</code> configuration to apply to this Amazon S3 access
1667
- * point or multi-region access point.</p>
1373
+ * <p>The proposed <code>S3PublicAccessBlock</code> configuration to apply to this Amazon S3 access point or multi-region access point.</p>
1668
1374
  * @public
1669
1375
  */
1670
1376
  publicAccessBlock?: S3PublicAccessBlockConfiguration | undefined;
1671
1377
  /**
1672
- * <p>The proposed <code>Internet</code> and <code>VpcConfiguration</code> to apply to this
1673
- * Amazon S3 access point. <code>VpcConfiguration</code> does not apply to multi-region access
1674
- * points. If the access preview is for a new resource and neither is specified, the access
1675
- * preview uses <code>Internet</code> for the network origin. If the access preview is for an
1676
- * existing resource and neither is specified, the access preview uses the existing network
1677
- * origin.</p>
1378
+ * <p>The proposed <code>Internet</code> and <code>VpcConfiguration</code> to apply to this Amazon S3 access point. <code>VpcConfiguration</code> does not apply to multi-region access points. If the access preview is for a new resource and neither is specified, the access preview uses <code>Internet</code> for the network origin. If the access preview is for an existing resource and neither is specified, the access preview uses the existing network origin.</p>
1678
1379
  * @public
1679
1380
  */
1680
1381
  networkOrigin?: NetworkOriginConfiguration | undefined;
1681
1382
  }
1682
1383
  /**
1683
- * <p>You specify each grantee as a type-value pair using one of these types. You can specify
1684
- * only one type of grantee. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketAcl.html">PutBucketAcl</a>.</p>
1384
+ * <p>You specify each grantee as a type-value pair using one of these types. You can specify only one type of grantee. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketAcl.html">PutBucketAcl</a>.</p>
1685
1385
  * @public
1686
1386
  */
1687
1387
  export type AclGrantee = AclGrantee.IdMember | AclGrantee.UriMember | AclGrantee.$UnknownMember;
@@ -1738,9 +1438,7 @@ export declare const AclPermission: {
1738
1438
  */
1739
1439
  export type AclPermission = (typeof AclPermission)[keyof typeof AclPermission];
1740
1440
  /**
1741
- * <p>A proposed access control list grant configuration for an Amazon S3 bucket. For more
1742
- * information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html#setting-acls">How to Specify an
1743
- * ACL</a>.</p>
1441
+ * <p>A proposed access control list grant configuration for an Amazon S3 bucket. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html#setting-acls">How to Specify an ACL</a>.</p>
1744
1442
  * @public
1745
1443
  */
1746
1444
  export interface S3BucketAclGrantConfiguration {
@@ -1756,16 +1454,7 @@ export interface S3BucketAclGrantConfiguration {
1756
1454
  grantee: AclGrantee | undefined;
1757
1455
  }
1758
1456
  /**
1759
- * <p>Proposed access control configuration for an Amazon S3 bucket. You can propose a
1760
- * configuration for a new Amazon S3 bucket or an existing Amazon S3 bucket that you own by specifying
1761
- * the Amazon S3 bucket policy, bucket ACLs, bucket BPA settings, Amazon S3 access points, and
1762
- * multi-region access points attached to the bucket. If the configuration is for an existing
1763
- * Amazon S3 bucket and you do not specify the Amazon S3 bucket policy, the access preview uses the
1764
- * existing policy attached to the bucket. If the access preview is for a new resource and you
1765
- * do not specify the Amazon S3 bucket policy, the access preview assumes a bucket without a
1766
- * policy. To propose deletion of an existing bucket policy, you can specify an empty string.
1767
- * For more information about bucket policy limits, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/example-bucket-policies.html">Bucket Policy
1768
- * Examples</a>.</p>
1457
+ * <p>Proposed access control configuration for an Amazon S3 bucket. You can propose a configuration for a new Amazon S3 bucket or an existing Amazon S3 bucket that you own by specifying the Amazon S3 bucket policy, bucket ACLs, bucket BPA settings, Amazon S3 access points, and multi-region access points attached to the bucket. If the configuration is for an existing Amazon S3 bucket and you do not specify the Amazon S3 bucket policy, the access preview uses the existing policy attached to the bucket. If the access preview is for a new resource and you do not specify the Amazon S3 bucket policy, the access preview assumes a bucket without a policy. To propose deletion of an existing bucket policy, you can specify an empty string. For more information about bucket policy limits, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/example-bucket-policies.html">Bucket Policy Examples</a>.</p>
1769
1458
  * @public
1770
1459
  */
1771
1460
  export interface S3BucketConfiguration {
@@ -1775,10 +1464,7 @@ export interface S3BucketConfiguration {
1775
1464
  */
1776
1465
  bucketPolicy?: string | undefined;
1777
1466
  /**
1778
- * <p>The proposed list of ACL grants for the Amazon S3 bucket. You can propose up to 100 ACL
1779
- * grants per bucket. If the proposed grant configuration is for an existing bucket, the
1780
- * access preview uses the proposed list of grant configurations in place of the existing
1781
- * grants. Otherwise, the access preview uses the existing grants for the bucket.</p>
1467
+ * <p>The proposed list of ACL grants for the Amazon S3 bucket. You can propose up to 100 ACL grants per bucket. If the proposed grant configuration is for an existing bucket, the access preview uses the proposed list of grant configurations in place of the existing grants. Otherwise, the access preview uses the existing grants for the bucket.</p>
1782
1468
  * @public
1783
1469
  */
1784
1470
  bucketAclGrants?: S3BucketAclGrantConfiguration[] | undefined;
@@ -1788,20 +1474,13 @@ export interface S3BucketConfiguration {
1788
1474
  */
1789
1475
  bucketPublicAccessBlock?: S3PublicAccessBlockConfiguration | undefined;
1790
1476
  /**
1791
- * <p>The configuration of Amazon S3 access points or multi-region access points for the bucket.
1792
- * You can propose up to 10 new access points per bucket.</p>
1477
+ * <p>The configuration of Amazon S3 access points or multi-region access points for the bucket. You can propose up to 10 new access points per bucket.</p>
1793
1478
  * @public
1794
1479
  */
1795
1480
  accessPoints?: Record<string, S3AccessPointConfiguration> | undefined;
1796
1481
  }
1797
1482
  /**
1798
- * <p>Proposed configuration for an access point attached to an Amazon S3 directory bucket. You can
1799
- * propose up to 10 access points per bucket. If the proposed access point configuration is
1800
- * for an existing Amazon S3 directory bucket, the access preview uses the proposed access point
1801
- * configuration in place of the existing access points. To propose an access point without a
1802
- * policy, you can provide an empty string as the access point policy. For more information
1803
- * about access points for Amazon S3 directory buckets, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-points-directory-buckets.html">Managing access to
1804
- * directory buckets with access points</a> in the Amazon Simple Storage Service User Guide.</p>
1483
+ * <p>Proposed configuration for an access point attached to an Amazon S3 directory bucket. You can propose up to 10 access points per bucket. If the proposed access point configuration is for an existing Amazon S3 directory bucket, the access preview uses the proposed access point configuration in place of the existing access points. To propose an access point without a policy, you can provide an empty string as the access point policy. For more information about access points for Amazon S3 directory buckets, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-points-directory-buckets.html">Managing access to directory buckets with access points</a> in the Amazon Simple Storage Service User Guide.</p>
1805
1484
  * @public
1806
1485
  */
1807
1486
  export interface S3ExpressDirectoryAccessPointConfiguration {
@@ -1811,27 +1490,13 @@ export interface S3ExpressDirectoryAccessPointConfiguration {
1811
1490
  */
1812
1491
  accessPointPolicy?: string | undefined;
1813
1492
  /**
1814
- * <p>The proposed <code>InternetConfiguration</code> or <code>VpcConfiguration</code> to
1815
- * apply to the Amazon S3 access point. You can make the access point accessible from the internet,
1816
- * or you can specify that all requests made through that access point must originate from a
1817
- * specific virtual private cloud (VPC). You can specify only one type of network
1818
- * configuration. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html">Creating access
1819
- * points</a>.</p>
1493
+ * <p>The proposed <code>InternetConfiguration</code> or <code>VpcConfiguration</code> to apply to the Amazon S3 access point. You can make the access point accessible from the internet, or you can specify that all requests made through that access point must originate from a specific virtual private cloud (VPC). You can specify only one type of network configuration. For more information, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/creating-access-points.html">Creating access points</a>.</p>
1820
1494
  * @public
1821
1495
  */
1822
1496
  networkOrigin?: NetworkOriginConfiguration | undefined;
1823
1497
  }
1824
1498
  /**
1825
- * <p>Proposed access control configuration for an Amazon S3 directory bucket. You can propose a
1826
- * configuration for a new Amazon S3 directory bucket or an existing Amazon S3 directory bucket that you
1827
- * own by specifying the Amazon S3 bucket policy. If the configuration is for an existing Amazon S3
1828
- * directory bucket and you do not specify the Amazon S3 bucket policy, the access preview uses the
1829
- * existing policy attached to the directory bucket. If the access preview is for a new
1830
- * resource and you do not specify the Amazon S3 bucket policy, the access preview assumes an
1831
- * directory bucket without a policy. To propose deletion of an existing bucket policy, you
1832
- * can specify an empty string. For more information about Amazon S3 directory bucket policies, see
1833
- * <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-security-iam-example-bucket-policies.html">Example bucket policies for directory buckets</a> in the Amazon Simple Storage Service User
1834
- * Guide.</p>
1499
+ * <p>Proposed access control configuration for an Amazon S3 directory bucket. You can propose a configuration for a new Amazon S3 directory bucket or an existing Amazon S3 directory bucket that you own by specifying the Amazon S3 bucket policy. If the configuration is for an existing Amazon S3 directory bucket and you do not specify the Amazon S3 bucket policy, the access preview uses the existing policy attached to the directory bucket. If the access preview is for a new resource and you do not specify the Amazon S3 bucket policy, the access preview assumes an directory bucket without a policy. To propose deletion of an existing bucket policy, you can specify an empty string. For more information about Amazon S3 directory bucket policies, see <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-express-security-iam-example-bucket-policies.html">Example bucket policies for directory buckets</a> in the Amazon Simple Storage Service User Guide.</p>
1835
1500
  * @public
1836
1501
  */
1837
1502
  export interface S3ExpressDirectoryBucketConfiguration {
@@ -1847,18 +1512,7 @@ export interface S3ExpressDirectoryBucketConfiguration {
1847
1512
  accessPoints?: Record<string, S3ExpressDirectoryAccessPointConfiguration> | undefined;
1848
1513
  }
1849
1514
  /**
1850
- * <p>The configuration for a Secrets Manager secret. For more information, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_CreateSecret.html">CreateSecret</a>.</p>
1851
- * <p>You can propose a configuration for a new secret or an existing secret that you own by
1852
- * specifying the secret policy and optional KMS encryption key. If the configuration is for
1853
- * an existing secret and you do not specify the secret policy, the access preview uses the
1854
- * existing policy for the secret. If the access preview is for a new resource and you do not
1855
- * specify the policy, the access preview assumes a secret without a policy. To propose
1856
- * deletion of an existing policy, you can specify an empty string. If the proposed
1857
- * configuration is for a new secret and you do not specify the KMS key ID, the access
1858
- * preview uses the Amazon Web Services managed key <code>aws/secretsmanager</code>. If you specify an empty
1859
- * string for the KMS key ID, the access preview uses the Amazon Web Services managed key of the
1860
- * Amazon Web Services account. For more information about secret policy limits, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_limits.html">Quotas
1861
- * for Secrets Manager.</a>.</p>
1515
+ * <p>The configuration for a Secrets Manager secret. For more information, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_CreateSecret.html">CreateSecret</a>.</p> <p>You can propose a configuration for a new secret or an existing secret that you own by specifying the secret policy and optional KMS encryption key. If the configuration is for an existing secret and you do not specify the secret policy, the access preview uses the existing policy for the secret. If the access preview is for a new resource and you do not specify the policy, the access preview assumes a secret without a policy. To propose deletion of an existing policy, you can specify an empty string. If the proposed configuration is for a new secret and you do not specify the KMS key ID, the access preview uses the Amazon Web Services managed key <code>aws/secretsmanager</code>. If you specify an empty string for the KMS key ID, the access preview uses the Amazon Web Services managed key of the Amazon Web Services account. For more information about secret policy limits, see <a href="https://docs.aws.amazon.com/secretsmanager/latest/userguide/reference_limits.html">Quotas for Secrets Manager.</a>.</p>
1862
1516
  * @public
1863
1517
  */
1864
1518
  export interface SecretsManagerSecretConfiguration {
@@ -1874,35 +1528,18 @@ export interface SecretsManagerSecretConfiguration {
1874
1528
  secretPolicy?: string | undefined;
1875
1529
  }
1876
1530
  /**
1877
- * <p>The proposed access control configuration for an Amazon SNS topic. You can propose a
1878
- * configuration for a new Amazon SNS topic or an existing Amazon SNS topic that you own by specifying
1879
- * the policy. If the configuration is for an existing Amazon SNS topic and you do not specify the
1880
- * Amazon SNS policy, then the access preview uses the existing Amazon SNS policy for the topic. If the
1881
- * access preview is for a new resource and you do not specify the policy, then the access
1882
- * preview assumes an Amazon SNS topic without a policy. To propose deletion of an existing Amazon SNS
1883
- * topic policy, you can specify an empty string for the Amazon SNS policy. For more information,
1884
- * see <a href="https://docs.aws.amazon.com/sns/latest/api/API_Topic.html">Topic</a>.</p>
1531
+ * <p>The proposed access control configuration for an Amazon SNS topic. You can propose a configuration for a new Amazon SNS topic or an existing Amazon SNS topic that you own by specifying the policy. If the configuration is for an existing Amazon SNS topic and you do not specify the Amazon SNS policy, then the access preview uses the existing Amazon SNS policy for the topic. If the access preview is for a new resource and you do not specify the policy, then the access preview assumes an Amazon SNS topic without a policy. To propose deletion of an existing Amazon SNS topic policy, you can specify an empty string for the Amazon SNS policy. For more information, see <a href="https://docs.aws.amazon.com/sns/latest/api/API_Topic.html">Topic</a>.</p>
1885
1532
  * @public
1886
1533
  */
1887
1534
  export interface SnsTopicConfiguration {
1888
1535
  /**
1889
- * <p>The JSON policy text that defines who can access an Amazon SNS topic. For more information,
1890
- * see <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-access-policy-use-cases.html">Example cases for Amazon SNS access control</a> in the <i>Amazon SNS Developer
1891
- * Guide</i>.</p>
1536
+ * <p>The JSON policy text that defines who can access an Amazon SNS topic. For more information, see <a href="https://docs.aws.amazon.com/sns/latest/dg/sns-access-policy-use-cases.html">Example cases for Amazon SNS access control</a> in the <i>Amazon SNS Developer Guide</i>.</p>
1892
1537
  * @public
1893
1538
  */
1894
1539
  topicPolicy?: string | undefined;
1895
1540
  }
1896
1541
  /**
1897
- * <p>The proposed access control configuration for an Amazon SQS queue. You can propose a
1898
- * configuration for a new Amazon SQS queue or an existing Amazon SQS queue that you own by specifying
1899
- * the Amazon SQS policy. If the configuration is for an existing Amazon SQS queue and you do not
1900
- * specify the Amazon SQS policy, the access preview uses the existing Amazon SQS policy for the queue.
1901
- * If the access preview is for a new resource and you do not specify the policy, the access
1902
- * preview assumes an Amazon SQS queue without a policy. To propose deletion of an existing Amazon SQS
1903
- * queue policy, you can specify an empty string for the Amazon SQS policy. For more information
1904
- * about Amazon SQS policy limits, see <a href="https://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/quotas-policies.html">Quotas related
1905
- * to policies</a>.</p>
1542
+ * <p>The proposed access control configuration for an Amazon SQS queue. You can propose a configuration for a new Amazon SQS queue or an existing Amazon SQS queue that you own by specifying the Amazon SQS policy. If the configuration is for an existing Amazon SQS queue and you do not specify the Amazon SQS policy, the access preview uses the existing Amazon SQS policy for the queue. If the access preview is for a new resource and you do not specify the policy, the access preview assumes an Amazon SQS queue without a policy. To propose deletion of an existing Amazon SQS queue policy, you can specify an empty string for the Amazon SQS policy. For more information about Amazon SQS policy limits, see <a href="https://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/quotas-policies.html">Quotas related to policies</a>.</p>
1906
1543
  * @public
1907
1544
  */
1908
1545
  export interface SqsQueueConfiguration {
@@ -1913,8 +1550,7 @@ export interface SqsQueueConfiguration {
1913
1550
  queuePolicy?: string | undefined;
1914
1551
  }
1915
1552
  /**
1916
- * <p>Access control configuration structures for your resource. You specify the configuration
1917
- * as a type-value pair. You can specify only one type of access control configuration.</p>
1553
+ * <p>Access control configuration structures for your resource. You specify the configuration as a type-value pair. You can specify only one type of access control configuration.</p>
1918
1554
  * @public
1919
1555
  */
1920
1556
  export type Configuration = Configuration.DynamodbStreamMember | Configuration.DynamodbTableMember | Configuration.EbsSnapshotMember | Configuration.EcrRepositoryMember | Configuration.EfsFileSystemMember | Configuration.IamRoleMember | Configuration.KmsKeyMember | Configuration.RdsDbClusterSnapshotMember | Configuration.RdsDbSnapshotMember | Configuration.S3BucketMember | Configuration.S3ExpressDirectoryBucketMember | Configuration.SecretsManagerSecretMember | Configuration.SnsTopicMember | Configuration.SqsQueueMember | Configuration.$UnknownMember;
@@ -2260,18 +1896,12 @@ export declare namespace Configuration {
2260
1896
  */
2261
1897
  export interface CreateAccessPreviewRequest {
2262
1898
  /**
2263
- * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
2264
- * the account analyzer</a> used to generate the access preview. You can only create an
2265
- * access preview for analyzers with an <code>Account</code> type and <code>Active</code>
2266
- * status.</p>
1899
+ * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the account analyzer</a> used to generate the access preview. You can only create an access preview for analyzers with an <code>Account</code> type and <code>Active</code> status.</p>
2267
1900
  * @public
2268
1901
  */
2269
1902
  analyzerArn: string | undefined;
2270
1903
  /**
2271
- * <p>Access control configuration for your resource that is used to generate the access
2272
- * preview. The access preview includes findings for external access allowed to the resource
2273
- * with the proposed access control configuration. The configuration must contain exactly one
2274
- * element.</p>
1904
+ * <p>Access control configuration for your resource that is used to generate the access preview. The access preview includes findings for external access allowed to the resource with the proposed access control configuration. The configuration must contain exactly one element.</p>
2275
1905
  * @public
2276
1906
  */
2277
1907
  configurations: Record<string, Configuration> | undefined;
@@ -2296,8 +1926,7 @@ export interface CreateAccessPreviewResponse {
2296
1926
  */
2297
1927
  export interface GenerateFindingRecommendationRequest {
2298
1928
  /**
2299
- * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
2300
- * the analyzer</a> used to generate the finding recommendation.</p>
1929
+ * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> used to generate the finding recommendation.</p>
2301
1930
  * @public
2302
1931
  */
2303
1932
  analyzerArn: string | undefined;
@@ -2317,8 +1946,7 @@ export interface GetAccessPreviewRequest {
2317
1946
  */
2318
1947
  accessPreviewId: string | undefined;
2319
1948
  /**
2320
- * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
2321
- * the analyzer</a> used to generate the access preview.</p>
1949
+ * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> used to generate the access preview.</p>
2322
1950
  * @public
2323
1951
  */
2324
1952
  analyzerArn: string | undefined;
@@ -2349,10 +1977,7 @@ export declare const AccessPreviewStatusReasonCode: {
2349
1977
  */
2350
1978
  export type AccessPreviewStatusReasonCode = (typeof AccessPreviewStatusReasonCode)[keyof typeof AccessPreviewStatusReasonCode];
2351
1979
  /**
2352
- * <p>Provides more details about the current status of the access preview. For example, if
2353
- * the creation of the access preview fails, a <code>Failed</code> status is returned. This
2354
- * failure can be due to an internal issue with the analysis or due to an invalid proposed
2355
- * resource configuration.</p>
1980
+ * <p>Provides more details about the current status of the access preview. For example, if the creation of the access preview fails, a <code>Failed</code> status is returned. This failure can be due to an internal issue with the analysis or due to an invalid proposed resource configuration.</p>
2356
1981
  * @public
2357
1982
  */
2358
1983
  export interface AccessPreviewStatusReason {
@@ -2388,30 +2013,12 @@ export interface AccessPreview {
2388
2013
  */
2389
2014
  createdAt: Date | undefined;
2390
2015
  /**
2391
- * <p>The status of the access preview.</p>
2392
- * <ul>
2393
- * <li>
2394
- * <p>
2395
- * <code>Creating</code> - The access preview creation is in progress.</p>
2396
- * </li>
2397
- * <li>
2398
- * <p>
2399
- * <code>Completed</code> - The access preview is complete. You can preview findings
2400
- * for external access to the resource.</p>
2401
- * </li>
2402
- * <li>
2403
- * <p>
2404
- * <code>Failed</code> - The access preview creation has failed.</p>
2405
- * </li>
2406
- * </ul>
2016
+ * <p>The status of the access preview.</p> <ul> <li> <p> <code>Creating</code> - The access preview creation is in progress.</p> </li> <li> <p> <code>Completed</code> - The access preview is complete. You can preview findings for external access to the resource.</p> </li> <li> <p> <code>Failed</code> - The access preview creation has failed.</p> </li> </ul>
2407
2017
  * @public
2408
2018
  */
2409
2019
  status: AccessPreviewStatus | undefined;
2410
2020
  /**
2411
- * <p>Provides more details about the current status of the access preview.</p>
2412
- * <p>For example, if the creation of the access preview fails, a <code>Failed</code> status
2413
- * is returned. This failure can be due to an internal issue with the analysis or due to an
2414
- * invalid resource configuration.</p>
2021
+ * <p>Provides more details about the current status of the access preview.</p> <p>For example, if the creation of the access preview fails, a <code>Failed</code> status is returned. This failure can be due to an internal issue with the analysis or due to an invalid resource configuration.</p>
2415
2022
  * @public
2416
2023
  */
2417
2024
  statusReason?: AccessPreviewStatusReason | undefined;
@@ -2432,8 +2039,7 @@ export interface GetAccessPreviewResponse {
2432
2039
  */
2433
2040
  export interface GetAnalyzedResourceRequest {
2434
2041
  /**
2435
- * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
2436
- * the analyzer</a> to retrieve information from.</p>
2042
+ * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> to retrieve information from.</p>
2437
2043
  * @public
2438
2044
  */
2439
2045
  analyzerArn: string | undefined;
@@ -2443,10 +2049,6 @@ export interface GetAnalyzedResourceRequest {
2443
2049
  */
2444
2050
  resourceArn: string | undefined;
2445
2051
  }
2446
- /**
2447
- * @public
2448
- */
2449
- export type ResourceType = "AWS::DynamoDB::Stream" | "AWS::DynamoDB::Table" | "AWS::EC2::Snapshot" | "AWS::ECR::Repository" | "AWS::EFS::FileSystem" | "AWS::IAM::Role" | "AWS::IAM::User" | "AWS::KMS::Key" | "AWS::Lambda::Function" | "AWS::Lambda::LayerVersion" | "AWS::RDS::DBClusterSnapshot" | "AWS::RDS::DBSnapshot" | "AWS::S3::Bucket" | "AWS::S3Express::DirectoryBucket" | "AWS::SNS::Topic" | "AWS::SQS::Queue" | "AWS::SecretsManager::Secret";
2450
2052
  /**
2451
2053
  * @public
2452
2054
  */
@@ -2482,20 +2084,17 @@ export interface AnalyzedResource {
2482
2084
  */
2483
2085
  updatedAt: Date | undefined;
2484
2086
  /**
2485
- * <p>Indicates whether the policy that generated the finding grants public access to the
2486
- * resource.</p>
2087
+ * <p>Indicates whether the policy that generated the finding grants public access to the resource.</p>
2487
2088
  * @public
2488
2089
  */
2489
2090
  isPublic: boolean | undefined;
2490
2091
  /**
2491
- * <p>The actions that an external principal is granted permission to use by the policy that
2492
- * generated the finding.</p>
2092
+ * <p>The actions that an external principal is granted permission to use by the policy that generated the finding.</p>
2493
2093
  * @public
2494
2094
  */
2495
2095
  actions?: string[] | undefined;
2496
2096
  /**
2497
- * <p>Indicates how the access that generated the finding is granted. This is populated for
2498
- * Amazon S3 bucket findings.</p>
2097
+ * <p>Indicates how the access that generated the finding is granted. This is populated for Amazon S3 bucket findings.</p>
2499
2098
  * @public
2500
2099
  */
2501
2100
  sharedVia?: string[] | undefined;
@@ -2521,8 +2120,7 @@ export interface AnalyzedResource {
2521
2120
  */
2522
2121
  export interface GetAnalyzedResourceResponse {
2523
2122
  /**
2524
- * <p>An <code>AnalyzedResource</code> object that contains information that IAM Access Analyzer
2525
- * found when it analyzed the resource.</p>
2123
+ * <p>An <code>AnalyzedResource</code> object that contains information that IAM Access Analyzer found when it analyzed the resource.</p>
2526
2124
  * @public
2527
2125
  */
2528
2126
  resource?: AnalyzedResource | undefined;
@@ -2533,8 +2131,7 @@ export interface GetAnalyzedResourceResponse {
2533
2131
  */
2534
2132
  export interface GetFindingRequest {
2535
2133
  /**
2536
- * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
2537
- * the analyzer</a> that generated the finding.</p>
2134
+ * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> that generated the finding.</p>
2538
2135
  * @public
2539
2136
  */
2540
2137
  analyzerArn: string | undefined;
@@ -2550,6 +2147,7 @@ export interface GetFindingRequest {
2550
2147
  */
2551
2148
  export declare const ResourceControlPolicyRestriction: {
2552
2149
  readonly APPLICABLE: "APPLICABLE";
2150
+ readonly APPLIED: "APPLIED";
2553
2151
  readonly FAILED_TO_EVALUATE_RCP: "FAILED_TO_EVALUATE_RCP";
2554
2152
  readonly NOT_APPLICABLE: "NOT_APPLICABLE";
2555
2153
  };
@@ -2558,14 +2156,12 @@ export declare const ResourceControlPolicyRestriction: {
2558
2156
  */
2559
2157
  export type ResourceControlPolicyRestriction = (typeof ResourceControlPolicyRestriction)[keyof typeof ResourceControlPolicyRestriction];
2560
2158
  /**
2561
- * <p>Includes details about how the access that generated the finding is granted. This is
2562
- * populated for Amazon S3 bucket findings.</p>
2159
+ * <p>Includes details about how the access that generated the finding is granted. This is populated for Amazon S3 bucket findings.</p>
2563
2160
  * @public
2564
2161
  */
2565
2162
  export interface FindingSourceDetail {
2566
2163
  /**
2567
- * <p>The ARN of the access point that generated the finding. The ARN format depends on
2568
- * whether the ARN represents an access point or a multi-region access point.</p>
2164
+ * <p>The ARN of the access point that generated the finding. The ARN format depends on whether the ARN represents an access point or a multi-region access point.</p>
2569
2165
  * @public
2570
2166
  */
2571
2167
  accessPointArn?: string | undefined;
@@ -2580,8 +2176,7 @@ export interface FindingSourceDetail {
2580
2176
  */
2581
2177
  export type FindingSourceType = "BUCKET_ACL" | "POLICY" | "S3_ACCESS_POINT" | "S3_ACCESS_POINT_ACCOUNT";
2582
2178
  /**
2583
- * <p>The source of the finding. This indicates how the access that generated the finding is
2584
- * granted. It is populated for Amazon S3 bucket findings.</p>
2179
+ * <p>The source of the finding. This indicates how the access that generated the finding is granted. It is populated for Amazon S3 bucket findings.</p>
2585
2180
  * @public
2586
2181
  */
2587
2182
  export interface FindingSource {
@@ -2591,8 +2186,7 @@ export interface FindingSource {
2591
2186
  */
2592
2187
  type: FindingSourceType | undefined;
2593
2188
  /**
2594
- * <p>Includes details about how the access that generated the finding is granted. This is
2595
- * populated for Amazon S3 bucket findings.</p>
2189
+ * <p>Includes details about how the access that generated the finding is granted. This is populated for Amazon S3 bucket findings.</p>
2596
2190
  * @public
2597
2191
  */
2598
2192
  detail?: FindingSourceDetail | undefined;
@@ -2613,8 +2207,7 @@ export interface Finding {
2613
2207
  */
2614
2208
  principal?: Record<string, string> | undefined;
2615
2209
  /**
2616
- * <p>The action in the analyzed policy statement that an external principal has permission to
2617
- * use.</p>
2210
+ * <p>The action in the analyzed policy statement that an external principal has permission to use.</p>
2618
2211
  * @public
2619
2212
  */
2620
2213
  action?: string[] | undefined;
@@ -2624,8 +2217,7 @@ export interface Finding {
2624
2217
  */
2625
2218
  resource?: string | undefined;
2626
2219
  /**
2627
- * <p>Indicates whether the policy that generated the finding allows public access to the
2628
- * resource.</p>
2220
+ * <p>Indicates whether the policy that generated the finding allows public access to the resource.</p>
2629
2221
  * @public
2630
2222
  */
2631
2223
  isPublic?: boolean | undefined;
@@ -2670,14 +2262,12 @@ export interface Finding {
2670
2262
  */
2671
2263
  error?: string | undefined;
2672
2264
  /**
2673
- * <p>The sources of the finding. This indicates how the access that generated the finding is
2674
- * granted. It is populated for Amazon S3 bucket findings.</p>
2265
+ * <p>The sources of the finding. This indicates how the access that generated the finding is granted. It is populated for Amazon S3 bucket findings.</p>
2675
2266
  * @public
2676
2267
  */
2677
2268
  sources?: FindingSource[] | undefined;
2678
2269
  /**
2679
- * <p>The type of restriction applied to the finding by the resource owner with an Organizations
2680
- * resource control policy (RCP).</p>
2270
+ * <p>The type of restriction applied to the finding by the resource owner with an Organizations resource control policy (RCP).</p>
2681
2271
  * @public
2682
2272
  */
2683
2273
  resourceControlPolicyRestriction?: ResourceControlPolicyRestriction | undefined;
@@ -2698,8 +2288,7 @@ export interface GetFindingResponse {
2698
2288
  */
2699
2289
  export interface GetFindingRecommendationRequest {
2700
2290
  /**
2701
- * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
2702
- * the analyzer</a> used to generate the finding recommendation.</p>
2291
+ * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> used to generate the finding recommendation.</p>
2703
2292
  * @public
2704
2293
  */
2705
2294
  analyzerArn: string | undefined;
@@ -2720,8 +2309,7 @@ export interface GetFindingRecommendationRequest {
2720
2309
  nextToken?: string | undefined;
2721
2310
  }
2722
2311
  /**
2723
- * <p>Contains information about the reason that the retrieval of a recommendation for a
2724
- * finding failed.</p>
2312
+ * <p>Contains information about the reason that the retrieval of a recommendation for a finding failed.</p>
2725
2313
  * @public
2726
2314
  */
2727
2315
  export interface RecommendationError {
@@ -2760,40 +2348,33 @@ export declare const RecommendedRemediationAction: {
2760
2348
  */
2761
2349
  export type RecommendedRemediationAction = (typeof RecommendedRemediationAction)[keyof typeof RecommendedRemediationAction];
2762
2350
  /**
2763
- * <p>Contains information about the action to take for a policy in an unused permissions
2764
- * finding.</p>
2351
+ * <p>Contains information about the action to take for a policy in an unused permissions finding.</p>
2765
2352
  * @public
2766
2353
  */
2767
2354
  export interface UnusedPermissionsRecommendedStep {
2768
2355
  /**
2769
- * <p>The time at which the existing policy for the unused permissions finding was last
2770
- * updated.</p>
2356
+ * <p>The time at which the existing policy for the unused permissions finding was last updated.</p>
2771
2357
  * @public
2772
2358
  */
2773
2359
  policyUpdatedAt?: Date | undefined;
2774
2360
  /**
2775
- * <p>A recommendation of whether to create or detach a policy for an unused permissions
2776
- * finding.</p>
2361
+ * <p>A recommendation of whether to create or detach a policy for an unused permissions finding.</p>
2777
2362
  * @public
2778
2363
  */
2779
2364
  recommendedAction: RecommendedRemediationAction | undefined;
2780
2365
  /**
2781
- * <p>If the recommended action for the unused permissions finding is to replace the existing
2782
- * policy, the contents of the recommended policy to replace the policy specified in the
2783
- * <code>existingPolicyId</code> field.</p>
2366
+ * <p>If the recommended action for the unused permissions finding is to replace the existing policy, the contents of the recommended policy to replace the policy specified in the <code>existingPolicyId</code> field.</p>
2784
2367
  * @public
2785
2368
  */
2786
2369
  recommendedPolicy?: string | undefined;
2787
2370
  /**
2788
- * <p>If the recommended action for the unused permissions finding is to detach a policy, the
2789
- * ID of an existing policy to be detached.</p>
2371
+ * <p>If the recommended action for the unused permissions finding is to detach a policy, the ID of an existing policy to be detached.</p>
2790
2372
  * @public
2791
2373
  */
2792
2374
  existingPolicyId?: string | undefined;
2793
2375
  }
2794
2376
  /**
2795
- * <p>Contains information about a recommended step for an unused access analyzer
2796
- * finding.</p>
2377
+ * <p>Contains information about a recommended step for an unused access analyzer finding.</p>
2797
2378
  * @public
2798
2379
  */
2799
2380
  export type RecommendedStep = RecommendedStep.UnusedPermissionsRecommendedStepMember | RecommendedStep.$UnknownMember;
@@ -2855,8 +2436,7 @@ export interface GetFindingRecommendationResponse {
2855
2436
  */
2856
2437
  nextToken?: string | undefined;
2857
2438
  /**
2858
- * <p>Detailed information about the reason that the retrieval of a recommendation for the
2859
- * finding failed.</p>
2439
+ * <p>Detailed information about the reason that the retrieval of a recommendation for the finding failed.</p>
2860
2440
  * @public
2861
2441
  */
2862
2442
  error?: RecommendationError | undefined;
@@ -2886,15 +2466,13 @@ export interface GetFindingRecommendationResponse {
2886
2466
  */
2887
2467
  export interface GetFindingsStatisticsRequest {
2888
2468
  /**
2889
- * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
2890
- * the analyzer</a> used to generate the statistics.</p>
2469
+ * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> used to generate the statistics.</p>
2891
2470
  * @public
2892
2471
  */
2893
2472
  analyzerArn: string | undefined;
2894
2473
  }
2895
2474
  /**
2896
- * <p>Contains information about the total number of active cross-account and public findings
2897
- * for a resource type of an external access analyzer.</p>
2475
+ * <p>Contains information about the total number of active cross-account and public findings for a resource type of an external access analyzer.</p>
2898
2476
  * @public
2899
2477
  */
2900
2478
  export interface ResourceTypeDetails {
@@ -2910,14 +2488,12 @@ export interface ResourceTypeDetails {
2910
2488
  totalActiveCrossAccount?: number | undefined;
2911
2489
  }
2912
2490
  /**
2913
- * <p>Provides aggregate statistics about the findings for the specified external access
2914
- * analyzer.</p>
2491
+ * <p>Provides aggregate statistics about the findings for the specified external access analyzer.</p>
2915
2492
  * @public
2916
2493
  */
2917
2494
  export interface ExternalAccessFindingsStatistics {
2918
2495
  /**
2919
- * <p>The total number of active cross-account and public findings for each resource type of
2920
- * the specified external access analyzer.</p>
2496
+ * <p>The total number of active cross-account and public findings for each resource type of the specified external access analyzer.</p>
2921
2497
  * @public
2922
2498
  */
2923
2499
  resourceTypeStatistics?: Partial<Record<ResourceType, ResourceTypeDetails>> | undefined;
@@ -2938,8 +2514,54 @@ export interface ExternalAccessFindingsStatistics {
2938
2514
  totalResolvedFindings?: number | undefined;
2939
2515
  }
2940
2516
  /**
2941
- * <p>Contains information about the findings for an Amazon Web Services account in an organization unused
2942
- * access analyzer.</p>
2517
+ * <p>Contains information about the total number of active, archived, and resolved findings for a resource type of an internal access analyzer.</p>
2518
+ * @public
2519
+ */
2520
+ export interface InternalAccessResourceTypeDetails {
2521
+ /**
2522
+ * <p>The total number of active findings for the resource type in the internal access analyzer.</p>
2523
+ * @public
2524
+ */
2525
+ totalActiveFindings?: number | undefined;
2526
+ /**
2527
+ * <p>The total number of resolved findings for the resource type in the internal access analyzer.</p>
2528
+ * @public
2529
+ */
2530
+ totalResolvedFindings?: number | undefined;
2531
+ /**
2532
+ * <p>The total number of archived findings for the resource type in the internal access analyzer.</p>
2533
+ * @public
2534
+ */
2535
+ totalArchivedFindings?: number | undefined;
2536
+ }
2537
+ /**
2538
+ * <p>Provides aggregate statistics about the findings for the specified internal access analyzer. This includes counts of active, archived, and resolved findings.</p>
2539
+ * @public
2540
+ */
2541
+ export interface InternalAccessFindingsStatistics {
2542
+ /**
2543
+ * <p>The total number of active findings for each resource type of the specified internal access analyzer.</p>
2544
+ * @public
2545
+ */
2546
+ resourceTypeStatistics?: Partial<Record<ResourceType, InternalAccessResourceTypeDetails>> | undefined;
2547
+ /**
2548
+ * <p>The number of active findings for the specified internal access analyzer.</p>
2549
+ * @public
2550
+ */
2551
+ totalActiveFindings?: number | undefined;
2552
+ /**
2553
+ * <p>The number of archived findings for the specified internal access analyzer.</p>
2554
+ * @public
2555
+ */
2556
+ totalArchivedFindings?: number | undefined;
2557
+ /**
2558
+ * <p>The number of resolved findings for the specified internal access analyzer.</p>
2559
+ * @public
2560
+ */
2561
+ totalResolvedFindings?: number | undefined;
2562
+ }
2563
+ /**
2564
+ * <p>Contains information about the findings for an Amazon Web Services account in an organization unused access analyzer.</p>
2943
2565
  * @public
2944
2566
  */
2945
2567
  export interface FindingAggregationAccountDetails {
@@ -2954,15 +2576,13 @@ export interface FindingAggregationAccountDetails {
2954
2576
  */
2955
2577
  numberOfActiveFindings?: number | undefined;
2956
2578
  /**
2957
- * <p>Provides the number of active findings for each type of unused access for the specified
2958
- * Amazon Web Services account.</p>
2579
+ * <p>Provides the number of active findings for each type of unused access for the specified Amazon Web Services account.</p>
2959
2580
  * @public
2960
2581
  */
2961
2582
  details?: Record<string, number> | undefined;
2962
2583
  }
2963
2584
  /**
2964
- * <p>Contains information about the total number of findings for a type of unused
2965
- * access.</p>
2585
+ * <p>Contains information about the total number of findings for a type of unused access.</p>
2966
2586
  * @public
2967
2587
  */
2968
2588
  export interface UnusedAccessTypeStatistics {
@@ -2978,20 +2598,17 @@ export interface UnusedAccessTypeStatistics {
2978
2598
  total?: number | undefined;
2979
2599
  }
2980
2600
  /**
2981
- * <p>Provides aggregate statistics about the findings for the specified unused access
2982
- * analyzer.</p>
2601
+ * <p>Provides aggregate statistics about the findings for the specified unused access analyzer.</p>
2983
2602
  * @public
2984
2603
  */
2985
2604
  export interface UnusedAccessFindingsStatistics {
2986
2605
  /**
2987
- * <p>A list of details about the total number of findings for each type of unused access for
2988
- * the analyzer. </p>
2606
+ * <p>A list of details about the total number of findings for each type of unused access for the analyzer. </p>
2989
2607
  * @public
2990
2608
  */
2991
2609
  unusedAccessTypeStatistics?: UnusedAccessTypeStatistics[] | undefined;
2992
2610
  /**
2993
- * <p>A list of one to ten Amazon Web Services accounts that have the most active findings for the unused
2994
- * access analyzer.</p>
2611
+ * <p>A list of one to ten Amazon Web Services accounts that have the most active findings for the unused access analyzer.</p>
2995
2612
  * @public
2996
2613
  */
2997
2614
  topAccounts?: FindingAggregationAccountDetails[] | undefined;
@@ -3012,12 +2629,10 @@ export interface UnusedAccessFindingsStatistics {
3012
2629
  totalResolvedFindings?: number | undefined;
3013
2630
  }
3014
2631
  /**
3015
- * <p>Contains information about the aggregate statistics for an external or unused access
3016
- * analyzer. Only one parameter can be used in a <code>FindingsStatistics</code>
3017
- * object.</p>
2632
+ * <p>Contains information about the aggregate statistics for an external or unused access analyzer. Only one parameter can be used in a <code>FindingsStatistics</code> object.</p>
3018
2633
  * @public
3019
2634
  */
3020
- export type FindingsStatistics = FindingsStatistics.ExternalAccessFindingsStatisticsMember | FindingsStatistics.UnusedAccessFindingsStatisticsMember | FindingsStatistics.$UnknownMember;
2635
+ export type FindingsStatistics = FindingsStatistics.ExternalAccessFindingsStatisticsMember | FindingsStatistics.InternalAccessFindingsStatisticsMember | FindingsStatistics.UnusedAccessFindingsStatisticsMember | FindingsStatistics.$UnknownMember;
3021
2636
  /**
3022
2637
  * @public
3023
2638
  */
@@ -3028,6 +2643,17 @@ export declare namespace FindingsStatistics {
3028
2643
  */
3029
2644
  interface ExternalAccessFindingsStatisticsMember {
3030
2645
  externalAccessFindingsStatistics: ExternalAccessFindingsStatistics;
2646
+ internalAccessFindingsStatistics?: never;
2647
+ unusedAccessFindingsStatistics?: never;
2648
+ $unknown?: never;
2649
+ }
2650
+ /**
2651
+ * <p>The aggregate statistics for an internal access analyzer. This includes information about active, archived, and resolved findings related to internal access within your Amazon Web Services organization or account.</p>
2652
+ * @public
2653
+ */
2654
+ interface InternalAccessFindingsStatisticsMember {
2655
+ externalAccessFindingsStatistics?: never;
2656
+ internalAccessFindingsStatistics: InternalAccessFindingsStatistics;
3031
2657
  unusedAccessFindingsStatistics?: never;
3032
2658
  $unknown?: never;
3033
2659
  }
@@ -3037,6 +2663,7 @@ export declare namespace FindingsStatistics {
3037
2663
  */
3038
2664
  interface UnusedAccessFindingsStatisticsMember {
3039
2665
  externalAccessFindingsStatistics?: never;
2666
+ internalAccessFindingsStatistics?: never;
3040
2667
  unusedAccessFindingsStatistics: UnusedAccessFindingsStatistics;
3041
2668
  $unknown?: never;
3042
2669
  }
@@ -3045,11 +2672,13 @@ export declare namespace FindingsStatistics {
3045
2672
  */
3046
2673
  interface $UnknownMember {
3047
2674
  externalAccessFindingsStatistics?: never;
2675
+ internalAccessFindingsStatistics?: never;
3048
2676
  unusedAccessFindingsStatistics?: never;
3049
2677
  $unknown: [string, any];
3050
2678
  }
3051
2679
  interface Visitor<T> {
3052
2680
  externalAccessFindingsStatistics: (value: ExternalAccessFindingsStatistics) => T;
2681
+ internalAccessFindingsStatistics: (value: InternalAccessFindingsStatistics) => T;
3053
2682
  unusedAccessFindingsStatistics: (value: UnusedAccessFindingsStatistics) => T;
3054
2683
  _: (name: string, value: any) => T;
3055
2684
  }
@@ -3065,9 +2694,7 @@ export interface GetFindingsStatisticsResponse {
3065
2694
  */
3066
2695
  findingsStatistics?: FindingsStatistics[] | undefined;
3067
2696
  /**
3068
- * <p>The time at which the retrieval of the findings statistics was last updated. If the
3069
- * findings statistics have not been previously retrieved for the specified analyzer, this
3070
- * field will not be populated.</p>
2697
+ * <p>The time at which the retrieval of the findings statistics was last updated. If the findings statistics have not been previously retrieved for the specified analyzer, this field will not be populated.</p>
3071
2698
  * @public
3072
2699
  */
3073
2700
  lastUpdatedAt?: Date | undefined;
@@ -3077,8 +2704,7 @@ export interface GetFindingsStatisticsResponse {
3077
2704
  */
3078
2705
  export interface GetFindingV2Request {
3079
2706
  /**
3080
- * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
3081
- * the analyzer</a> that generated the finding.</p>
2707
+ * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> that generated the finding.</p>
3082
2708
  * @public
3083
2709
  */
3084
2710
  analyzerArn: string | undefined;
@@ -3104,14 +2730,12 @@ export interface GetFindingV2Request {
3104
2730
  */
3105
2731
  export interface ExternalAccessDetails {
3106
2732
  /**
3107
- * <p>The action in the analyzed policy statement that an external principal has permission to
3108
- * use.</p>
2733
+ * <p>The action in the analyzed policy statement that an external principal has permission to use.</p>
3109
2734
  * @public
3110
2735
  */
3111
2736
  action?: string[] | undefined;
3112
2737
  /**
3113
- * <p>The condition in the analyzed policy statement that resulted in an external access
3114
- * finding.</p>
2738
+ * <p>The condition in the analyzed policy statement that resulted in an external access finding.</p>
3115
2739
  * @public
3116
2740
  */
3117
2741
  condition: Record<string, string> | undefined;
@@ -3126,23 +2750,107 @@ export interface ExternalAccessDetails {
3126
2750
  */
3127
2751
  principal?: Record<string, string> | undefined;
3128
2752
  /**
3129
- * <p>The sources of the external access finding. This indicates how the access that generated
3130
- * the finding is granted. It is populated for Amazon S3 bucket findings.</p>
2753
+ * <p>The sources of the external access finding. This indicates how the access that generated the finding is granted. It is populated for Amazon S3 bucket findings.</p>
2754
+ * @public
2755
+ */
2756
+ sources?: FindingSource[] | undefined;
2757
+ /**
2758
+ * <p>The type of restriction applied to the finding by the resource owner with an Organizations resource control policy (RCP).</p> <ul> <li> <p> <code>APPLICABLE</code>: There is an RCP present in the organization but IAM Access Analyzer does not include it in the evaluation of effective permissions. For example, if <code>s3:DeleteObject</code> is blocked by the RCP and the restriction is <code>APPLICABLE</code>, then <code>s3:DeleteObject</code> would still be included in the list of actions for the finding.</p> </li> <li> <p> <code>FAILED_TO_EVALUATE_RCP</code>: There was an error evaluating the RCP.</p> </li> <li> <p> <code>NOT_APPLICABLE</code>: There was no RCP present in the organization, or there was no RCP applicable to the resource. For example, the resource being analyzed is an Amazon RDS snapshot and there is an RCP in the organization, but the RCP only impacts Amazon S3 buckets.</p> </li> <li> <p> <code>APPLIED</code>: This restriction is not currently available for external access findings. </p> </li> </ul>
2759
+ * @public
2760
+ */
2761
+ resourceControlPolicyRestriction?: ResourceControlPolicyRestriction | undefined;
2762
+ }
2763
+ /**
2764
+ * @public
2765
+ * @enum
2766
+ */
2767
+ export declare const InternalAccessType: {
2768
+ readonly INTRA_ACCOUNT: "INTRA_ACCOUNT";
2769
+ readonly INTRA_ORG: "INTRA_ORG";
2770
+ };
2771
+ /**
2772
+ * @public
2773
+ */
2774
+ export type InternalAccessType = (typeof InternalAccessType)[keyof typeof InternalAccessType];
2775
+ /**
2776
+ * @public
2777
+ * @enum
2778
+ */
2779
+ export declare const PrincipalType: {
2780
+ readonly IAM_ROLE: "IAM_ROLE";
2781
+ readonly IAM_USER: "IAM_USER";
2782
+ };
2783
+ /**
2784
+ * @public
2785
+ */
2786
+ export type PrincipalType = (typeof PrincipalType)[keyof typeof PrincipalType];
2787
+ /**
2788
+ * @public
2789
+ * @enum
2790
+ */
2791
+ export declare const ServiceControlPolicyRestriction: {
2792
+ readonly APPLICABLE: "APPLICABLE";
2793
+ readonly APPLIED: "APPLIED";
2794
+ readonly FAILED_TO_EVALUATE_SCP: "FAILED_TO_EVALUATE_SCP";
2795
+ readonly NOT_APPLICABLE: "NOT_APPLICABLE";
2796
+ };
2797
+ /**
2798
+ * @public
2799
+ */
2800
+ export type ServiceControlPolicyRestriction = (typeof ServiceControlPolicyRestriction)[keyof typeof ServiceControlPolicyRestriction];
2801
+ /**
2802
+ * <p>Contains information about an internal access finding. This includes details about the access that was identified within your Amazon Web Services organization or account.</p>
2803
+ * @public
2804
+ */
2805
+ export interface InternalAccessDetails {
2806
+ /**
2807
+ * <p>The action in the analyzed policy statement that has internal access permission to use.</p>
2808
+ * @public
2809
+ */
2810
+ action?: string[] | undefined;
2811
+ /**
2812
+ * <p>The condition in the analyzed policy statement that resulted in an internal access finding.</p>
2813
+ * @public
2814
+ */
2815
+ condition?: Record<string, string> | undefined;
2816
+ /**
2817
+ * <p>The principal that has access to a resource within the internal environment.</p>
2818
+ * @public
2819
+ */
2820
+ principal?: Record<string, string> | undefined;
2821
+ /**
2822
+ * <p>The Amazon Web Services account ID that owns the principal identified in the internal access finding.</p>
2823
+ * @public
2824
+ */
2825
+ principalOwnerAccount?: string | undefined;
2826
+ /**
2827
+ * <p>The type of internal access identified in the finding. This indicates how the access is granted within your Amazon Web Services environment.</p>
2828
+ * @public
2829
+ */
2830
+ accessType?: InternalAccessType | undefined;
2831
+ /**
2832
+ * <p>The type of principal identified in the internal access finding, such as IAM role or IAM user.</p>
2833
+ * @public
2834
+ */
2835
+ principalType?: PrincipalType | undefined;
2836
+ /**
2837
+ * <p>The sources of the internal access finding. This indicates how the access that generated the finding is granted within your Amazon Web Services environment.</p>
3131
2838
  * @public
3132
2839
  */
3133
2840
  sources?: FindingSource[] | undefined;
3134
2841
  /**
3135
- * <p>The type of restriction applied to the finding by the resource owner with an Organizations
3136
- * resource control policy (RCP).</p>
2842
+ * <p>The type of restriction applied to the finding by the resource owner with an Organizations resource control policy (RCP).</p> <ul> <li> <p> <code>APPLICABLE</code>: There is an RCP present in the organization but IAM Access Analyzer does not include it in the evaluation of effective permissions. For example, if <code>s3:DeleteObject</code> is blocked by the RCP and the restriction is <code>APPLICABLE</code>, then <code>s3:DeleteObject</code> would still be included in the list of actions for the finding. Only applicable to internal access findings with the account as the zone of trust. </p> </li> <li> <p> <code>FAILED_TO_EVALUATE_RCP</code>: There was an error evaluating the RCP.</p> </li> <li> <p> <code>NOT_APPLICABLE</code>: There was no RCP present in the organization. For internal access findings with the account as the zone of trust, <code>NOT_APPLICABLE</code> could also indicate that there was no RCP applicable to the resource.</p> </li> <li> <p> <code>APPLIED</code>: An RCP is present in the organization and IAM Access Analyzer included it in the evaluation of effective permissions. For example, if <code>s3:DeleteObject</code> is blocked by the RCP and the restriction is <code>APPLIED</code>, then <code>s3:DeleteObject</code> would not be included in the list of actions for the finding. Only applicable to internal access findings with the organization as the zone of trust. </p> </li> </ul>
3137
2843
  * @public
3138
2844
  */
3139
2845
  resourceControlPolicyRestriction?: ResourceControlPolicyRestriction | undefined;
2846
+ /**
2847
+ * <p>The type of restriction applied to the finding by an Organizations service control policy (SCP).</p> <ul> <li> <p> <code>APPLICABLE</code>: There is an SCP present in the organization but IAM Access Analyzer does not include it in the evaluation of effective permissions. Only applicable to internal access findings with the account as the zone of trust. </p> </li> <li> <p> <code>FAILED_TO_EVALUATE_SCP</code>: There was an error evaluating the SCP.</p> </li> <li> <p> <code>NOT_APPLICABLE</code>: There was no SCP present in the organization. For internal access findings with the account as the zone of trust, <code>NOT_APPLICABLE</code> could also indicate that there was no SCP applicable to the principal.</p> </li> <li> <p> <code>APPLIED</code>: An SCP is present in the organization and IAM Access Analyzer included it in the evaluation of effective permissions. Only applicable to internal access findings with the organization as the zone of trust. </p> </li> </ul>
2848
+ * @public
2849
+ */
2850
+ serviceControlPolicyRestriction?: ServiceControlPolicyRestriction | undefined;
3140
2851
  }
3141
2852
  /**
3142
- * <p>Contains information about an unused access finding for an IAM role. IAM Access Analyzer
3143
- * charges for unused access analysis based on the number of IAM roles and users analyzed
3144
- * per month. For more details on pricing, see <a href="https://aws.amazon.com/iam/access-analyzer/pricing">IAM Access Analyzer
3145
- * pricing</a>.</p>
2853
+ * <p>Contains information about an unused access finding for an IAM role. IAM Access Analyzer charges for unused access analysis based on the number of IAM roles and users analyzed per month. For more details on pricing, see <a href="https://aws.amazon.com/iam/access-analyzer/pricing">IAM Access Analyzer pricing</a>.</p>
3146
2854
  * @public
3147
2855
  */
3148
2856
  export interface UnusedIamRoleDetails {
@@ -3153,10 +2861,7 @@ export interface UnusedIamRoleDetails {
3153
2861
  lastAccessed?: Date | undefined;
3154
2862
  }
3155
2863
  /**
3156
- * <p>Contains information about an unused access finding for an IAM user access key.
3157
- * IAM Access Analyzer charges for unused access analysis based on the number of IAM roles and
3158
- * users analyzed per month. For more details on pricing, see <a href="https://aws.amazon.com/iam/access-analyzer/pricing">IAM Access Analyzer
3159
- * pricing</a>.</p>
2864
+ * <p>Contains information about an unused access finding for an IAM user access key. IAM Access Analyzer charges for unused access analysis based on the number of IAM roles and users analyzed per month. For more details on pricing, see <a href="https://aws.amazon.com/iam/access-analyzer/pricing">IAM Access Analyzer pricing</a>.</p>
3160
2865
  * @public
3161
2866
  */
3162
2867
  export interface UnusedIamUserAccessKeyDetails {
@@ -3172,10 +2877,7 @@ export interface UnusedIamUserAccessKeyDetails {
3172
2877
  lastAccessed?: Date | undefined;
3173
2878
  }
3174
2879
  /**
3175
- * <p>Contains information about an unused access finding for an IAM user password.
3176
- * IAM Access Analyzer charges for unused access analysis based on the number of IAM roles and
3177
- * users analyzed per month. For more details on pricing, see <a href="https://aws.amazon.com/iam/access-analyzer/pricing">IAM Access Analyzer
3178
- * pricing</a>.</p>
2880
+ * <p>Contains information about an unused access finding for an IAM user password. IAM Access Analyzer charges for unused access analysis based on the number of IAM roles and users analyzed per month. For more details on pricing, see <a href="https://aws.amazon.com/iam/access-analyzer/pricing">IAM Access Analyzer pricing</a>.</p>
3179
2881
  * @public
3180
2882
  */
3181
2883
  export interface UnusedIamUserPasswordDetails {
@@ -3186,10 +2888,7 @@ export interface UnusedIamUserPasswordDetails {
3186
2888
  lastAccessed?: Date | undefined;
3187
2889
  }
3188
2890
  /**
3189
- * <p>Contains information about an unused access finding for an action. IAM Access Analyzer charges
3190
- * for unused access analysis based on the number of IAM roles and users analyzed per month.
3191
- * For more details on pricing, see <a href="https://aws.amazon.com/iam/access-analyzer/pricing">IAM Access Analyzer
3192
- * pricing</a>.</p>
2891
+ * <p>Contains information about an unused access finding for an action. IAM Access Analyzer charges for unused access analysis based on the number of IAM roles and users analyzed per month. For more details on pricing, see <a href="https://aws.amazon.com/iam/access-analyzer/pricing">IAM Access Analyzer pricing</a>.</p>
3193
2892
  * @public
3194
2893
  */
3195
2894
  export interface UnusedAction {
@@ -3205,10 +2904,7 @@ export interface UnusedAction {
3205
2904
  lastAccessed?: Date | undefined;
3206
2905
  }
3207
2906
  /**
3208
- * <p>Contains information about an unused access finding for a permission. IAM Access Analyzer
3209
- * charges for unused access analysis based on the number of IAM roles and users analyzed
3210
- * per month. For more details on pricing, see <a href="https://aws.amazon.com/iam/access-analyzer/pricing">IAM Access Analyzer
3211
- * pricing</a>.</p>
2907
+ * <p>Contains information about an unused access finding for a permission. IAM Access Analyzer charges for unused access analysis based on the number of IAM roles and users analyzed per month. For more details on pricing, see <a href="https://aws.amazon.com/iam/access-analyzer/pricing">IAM Access Analyzer pricing</a>.</p>
3212
2908
  * @public
3213
2909
  */
3214
2910
  export interface UnusedPermissionDetails {
@@ -3229,20 +2925,33 @@ export interface UnusedPermissionDetails {
3229
2925
  lastAccessed?: Date | undefined;
3230
2926
  }
3231
2927
  /**
3232
- * <p>Contains information about an external access or unused access finding. Only one
3233
- * parameter can be used in a <code>FindingDetails</code> object.</p>
2928
+ * <p>Contains information about an external access or unused access finding. Only one parameter can be used in a <code>FindingDetails</code> object.</p>
3234
2929
  * @public
3235
2930
  */
3236
- export type FindingDetails = FindingDetails.ExternalAccessDetailsMember | FindingDetails.UnusedIamRoleDetailsMember | FindingDetails.UnusedIamUserAccessKeyDetailsMember | FindingDetails.UnusedIamUserPasswordDetailsMember | FindingDetails.UnusedPermissionDetailsMember | FindingDetails.$UnknownMember;
2931
+ export type FindingDetails = FindingDetails.ExternalAccessDetailsMember | FindingDetails.InternalAccessDetailsMember | FindingDetails.UnusedIamRoleDetailsMember | FindingDetails.UnusedIamUserAccessKeyDetailsMember | FindingDetails.UnusedIamUserPasswordDetailsMember | FindingDetails.UnusedPermissionDetailsMember | FindingDetails.$UnknownMember;
3237
2932
  /**
3238
2933
  * @public
3239
2934
  */
3240
2935
  export declare namespace FindingDetails {
2936
+ /**
2937
+ * <p>The details for an internal access analyzer finding. This contains information about access patterns identified within your Amazon Web Services organization or account.</p>
2938
+ * @public
2939
+ */
2940
+ interface InternalAccessDetailsMember {
2941
+ internalAccessDetails: InternalAccessDetails;
2942
+ externalAccessDetails?: never;
2943
+ unusedPermissionDetails?: never;
2944
+ unusedIamUserAccessKeyDetails?: never;
2945
+ unusedIamRoleDetails?: never;
2946
+ unusedIamUserPasswordDetails?: never;
2947
+ $unknown?: never;
2948
+ }
3241
2949
  /**
3242
2950
  * <p>The details for an external access analyzer finding.</p>
3243
2951
  * @public
3244
2952
  */
3245
2953
  interface ExternalAccessDetailsMember {
2954
+ internalAccessDetails?: never;
3246
2955
  externalAccessDetails: ExternalAccessDetails;
3247
2956
  unusedPermissionDetails?: never;
3248
2957
  unusedIamUserAccessKeyDetails?: never;
@@ -3251,11 +2960,11 @@ export declare namespace FindingDetails {
3251
2960
  $unknown?: never;
3252
2961
  }
3253
2962
  /**
3254
- * <p>The details for an unused access analyzer finding with an unused permission finding
3255
- * type.</p>
2963
+ * <p>The details for an unused access analyzer finding with an unused permission finding type.</p>
3256
2964
  * @public
3257
2965
  */
3258
2966
  interface UnusedPermissionDetailsMember {
2967
+ internalAccessDetails?: never;
3259
2968
  externalAccessDetails?: never;
3260
2969
  unusedPermissionDetails: UnusedPermissionDetails;
3261
2970
  unusedIamUserAccessKeyDetails?: never;
@@ -3264,11 +2973,11 @@ export declare namespace FindingDetails {
3264
2973
  $unknown?: never;
3265
2974
  }
3266
2975
  /**
3267
- * <p>The details for an unused access analyzer finding with an unused IAM user access key
3268
- * finding type.</p>
2976
+ * <p>The details for an unused access analyzer finding with an unused IAM user access key finding type.</p>
3269
2977
  * @public
3270
2978
  */
3271
2979
  interface UnusedIamUserAccessKeyDetailsMember {
2980
+ internalAccessDetails?: never;
3272
2981
  externalAccessDetails?: never;
3273
2982
  unusedPermissionDetails?: never;
3274
2983
  unusedIamUserAccessKeyDetails: UnusedIamUserAccessKeyDetails;
@@ -3277,11 +2986,11 @@ export declare namespace FindingDetails {
3277
2986
  $unknown?: never;
3278
2987
  }
3279
2988
  /**
3280
- * <p>The details for an unused access analyzer finding with an unused IAM role finding
3281
- * type.</p>
2989
+ * <p>The details for an unused access analyzer finding with an unused IAM role finding type.</p>
3282
2990
  * @public
3283
2991
  */
3284
2992
  interface UnusedIamRoleDetailsMember {
2993
+ internalAccessDetails?: never;
3285
2994
  externalAccessDetails?: never;
3286
2995
  unusedPermissionDetails?: never;
3287
2996
  unusedIamUserAccessKeyDetails?: never;
@@ -3290,11 +2999,11 @@ export declare namespace FindingDetails {
3290
2999
  $unknown?: never;
3291
3000
  }
3292
3001
  /**
3293
- * <p>The details for an unused access analyzer finding with an unused IAM user password
3294
- * finding type.</p>
3002
+ * <p>The details for an unused access analyzer finding with an unused IAM user password finding type.</p>
3295
3003
  * @public
3296
3004
  */
3297
3005
  interface UnusedIamUserPasswordDetailsMember {
3006
+ internalAccessDetails?: never;
3298
3007
  externalAccessDetails?: never;
3299
3008
  unusedPermissionDetails?: never;
3300
3009
  unusedIamUserAccessKeyDetails?: never;
@@ -3306,6 +3015,7 @@ export declare namespace FindingDetails {
3306
3015
  * @public
3307
3016
  */
3308
3017
  interface $UnknownMember {
3018
+ internalAccessDetails?: never;
3309
3019
  externalAccessDetails?: never;
3310
3020
  unusedPermissionDetails?: never;
3311
3021
  unusedIamUserAccessKeyDetails?: never;
@@ -3314,6 +3024,7 @@ export declare namespace FindingDetails {
3314
3024
  $unknown: [string, any];
3315
3025
  }
3316
3026
  interface Visitor<T> {
3027
+ internalAccessDetails: (value: InternalAccessDetails) => T;
3317
3028
  externalAccessDetails: (value: ExternalAccessDetails) => T;
3318
3029
  unusedPermissionDetails: (value: UnusedPermissionDetails) => T;
3319
3030
  unusedIamUserAccessKeyDetails: (value: UnusedIamUserAccessKeyDetails) => T;
@@ -3329,6 +3040,7 @@ export declare namespace FindingDetails {
3329
3040
  */
3330
3041
  export declare const FindingType: {
3331
3042
  readonly EXTERNAL_ACCESS: "ExternalAccess";
3043
+ readonly INTERNAL_ACCESS: "InternalAccess";
3332
3044
  readonly UNUSED_IAM_ROLE: "UnusedIAMRole";
3333
3045
  readonly UNUSED_IAM_USER_ACCESS_KEY: "UnusedIAMUserAccessKey";
3334
3046
  readonly UNUSED_IAM_USER_PASSWORD: "UnusedIAMUserPassword";
@@ -3343,8 +3055,7 @@ export type FindingType = (typeof FindingType)[keyof typeof FindingType];
3343
3055
  */
3344
3056
  export interface GetFindingV2Response {
3345
3057
  /**
3346
- * <p>The time at which the resource-based policy or IAM entity that generated the finding
3347
- * was analyzed.</p>
3058
+ * <p>The time at which the resource-based policy or IAM entity that generated the finding was analyzed.</p>
3348
3059
  * @public
3349
3060
  */
3350
3061
  analyzedAt: Date | undefined;
@@ -3394,16 +3105,12 @@ export interface GetFindingV2Response {
3394
3105
  */
3395
3106
  updatedAt: Date | undefined;
3396
3107
  /**
3397
- * <p>A localized message that explains the finding and provides guidance on how to address
3398
- * it.</p>
3108
+ * <p>A localized message that explains the finding and provides guidance on how to address it.</p>
3399
3109
  * @public
3400
3110
  */
3401
3111
  findingDetails: FindingDetails[] | undefined;
3402
3112
  /**
3403
- * <p>The type of the finding. For external access analyzers, the type is
3404
- * <code>ExternalAccess</code>. For unused access analyzers, the type can be
3405
- * <code>UnusedIAMRole</code>, <code>UnusedIAMUserAccessKey</code>,
3406
- * <code>UnusedIAMUserPassword</code>, or <code>UnusedPermission</code>.</p>
3113
+ * <p>The type of the finding. For external access analyzers, the type is <code>ExternalAccess</code>. For unused access analyzers, the type can be <code>UnusedIAMRole</code>, <code>UnusedIAMUserAccessKey</code>, <code>UnusedIAMUserPassword</code>, or <code>UnusedPermission</code>. For internal access analyzers, the type is <code>InternalAccess</code>.</p>
3407
3114
  * @public
3408
3115
  */
3409
3116
  findingType?: FindingType | undefined;
@@ -3413,27 +3120,17 @@ export interface GetFindingV2Response {
3413
3120
  */
3414
3121
  export interface GetGeneratedPolicyRequest {
3415
3122
  /**
3416
- * <p>The <code>JobId</code> that is returned by the <code>StartPolicyGeneration</code>
3417
- * operation. The <code>JobId</code> can be used with <code>GetGeneratedPolicy</code> to
3418
- * retrieve the generated policies or used with <code>CancelPolicyGeneration</code> to cancel
3419
- * the policy generation request.</p>
3123
+ * <p>The <code>JobId</code> that is returned by the <code>StartPolicyGeneration</code> operation. The <code>JobId</code> can be used with <code>GetGeneratedPolicy</code> to retrieve the generated policies or used with <code>CancelPolicyGeneration</code> to cancel the policy generation request.</p>
3420
3124
  * @public
3421
3125
  */
3422
3126
  jobId: string | undefined;
3423
3127
  /**
3424
- * <p>The level of detail that you want to generate. You can specify whether to generate
3425
- * policies with placeholders for resource ARNs for actions that support resource level
3426
- * granularity in policies.</p>
3427
- * <p>For example, in the resource section of a policy, you can receive a placeholder such as
3428
- * <code>"Resource":"arn:aws:s3:::$\{BucketName\}"</code> instead of <code>"*"</code>.</p>
3128
+ * <p>The level of detail that you want to generate. You can specify whether to generate policies with placeholders for resource ARNs for actions that support resource level granularity in policies.</p> <p>For example, in the resource section of a policy, you can receive a placeholder such as <code>"Resource":"arn:aws:s3:::$\{BucketName\}"</code> instead of <code>"*"</code>.</p>
3429
3129
  * @public
3430
3130
  */
3431
3131
  includeResourcePlaceholders?: boolean | undefined;
3432
3132
  /**
3433
- * <p>The level of detail that you want to generate. You can specify whether to generate
3434
- * service-level policies. </p>
3435
- * <p>IAM Access Analyzer uses <code>iam:servicelastaccessed</code> to identify services that have
3436
- * been used recently to create this service-level template.</p>
3133
+ * <p>The level of detail that you want to generate. You can specify whether to generate service-level policies. </p> <p>IAM Access Analyzer uses <code>iam:servicelastaccessed</code> to identify services that have been used recently to create this service-level template.</p>
3437
3134
  * @public
3438
3135
  */
3439
3136
  includeServiceLevelTemplate?: boolean | undefined;
@@ -3444,8 +3141,7 @@ export interface GetGeneratedPolicyRequest {
3444
3141
  */
3445
3142
  export interface GeneratedPolicy {
3446
3143
  /**
3447
- * <p>The text to use as the content for the new policy. The policy is created using the
3448
- * <a href="https://docs.aws.amazon.com/IAM/latest/APIReference/API_CreatePolicy.html">CreatePolicy</a> action.</p>
3144
+ * <p>The text to use as the content for the new policy. The policy is created using the <a href="https://docs.aws.amazon.com/IAM/latest/APIReference/API_CreatePolicy.html">CreatePolicy</a> action.</p>
3449
3145
  * @public
3450
3146
  */
3451
3147
  policy: string | undefined;
@@ -3456,8 +3152,7 @@ export interface GeneratedPolicy {
3456
3152
  */
3457
3153
  export interface TrailProperties {
3458
3154
  /**
3459
- * <p>Specifies the ARN of the trail. The format of a trail ARN is
3460
- * <code>arn:aws:cloudtrail:us-east-2:123456789012:trail/MyTrail</code>.</p>
3155
+ * <p>Specifies the ARN of the trail. The format of a trail ARN is <code>arn:aws:cloudtrail:us-east-2:123456789012:trail/MyTrail</code>.</p>
3461
3156
  * @public
3462
3157
  */
3463
3158
  cloudTrailArn: string | undefined;
@@ -3467,9 +3162,7 @@ export interface TrailProperties {
3467
3162
  */
3468
3163
  regions?: string[] | undefined;
3469
3164
  /**
3470
- * <p>Possible values are <code>true</code> or <code>false</code>. If set to
3471
- * <code>true</code>, IAM Access Analyzer retrieves CloudTrail data from all regions to analyze and
3472
- * generate a policy.</p>
3165
+ * <p>Possible values are <code>true</code> or <code>false</code>. If set to <code>true</code>, IAM Access Analyzer retrieves CloudTrail data from all regions to analyze and generate a policy.</p>
3473
3166
  * @public
3474
3167
  */
3475
3168
  allRegions?: boolean | undefined;
@@ -3480,21 +3173,17 @@ export interface TrailProperties {
3480
3173
  */
3481
3174
  export interface CloudTrailProperties {
3482
3175
  /**
3483
- * <p>A <code>TrailProperties</code> object that contains settings for trail
3484
- * properties.</p>
3176
+ * <p>A <code>TrailProperties</code> object that contains settings for trail properties.</p>
3485
3177
  * @public
3486
3178
  */
3487
3179
  trailProperties: TrailProperties[] | undefined;
3488
3180
  /**
3489
- * <p>The start of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events
3490
- * with a timestamp before this time are not considered to generate a policy.</p>
3181
+ * <p>The start of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events with a timestamp before this time are not considered to generate a policy.</p>
3491
3182
  * @public
3492
3183
  */
3493
3184
  startTime: Date | undefined;
3494
3185
  /**
3495
- * <p>The end of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events with
3496
- * a timestamp after this time are not considered to generate a policy. If this is not
3497
- * included in the request, the default value is the current time.</p>
3186
+ * <p>The end of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events with a timestamp after this time are not considered to generate a policy. If this is not included in the request, the default value is the current time.</p>
3498
3187
  * @public
3499
3188
  */
3500
3189
  endTime: Date | undefined;
@@ -3505,9 +3194,7 @@ export interface CloudTrailProperties {
3505
3194
  */
3506
3195
  export interface GeneratedPolicyProperties {
3507
3196
  /**
3508
- * <p>This value is set to <code>true</code> if the generated policy contains all possible
3509
- * actions for a service that IAM Access Analyzer identified from the CloudTrail trail that you specified,
3510
- * and <code>false</code> otherwise.</p>
3197
+ * <p>This value is set to <code>true</code> if the generated policy contains all possible actions for a service that IAM Access Analyzer identified from the CloudTrail trail that you specified, and <code>false</code> otherwise.</p>
3511
3198
  * @public
3512
3199
  */
3513
3200
  isComplete?: boolean | undefined;
@@ -3528,14 +3215,12 @@ export interface GeneratedPolicyProperties {
3528
3215
  */
3529
3216
  export interface GeneratedPolicyResult {
3530
3217
  /**
3531
- * <p>A <code>GeneratedPolicyProperties</code> object that contains properties of the
3532
- * generated policy.</p>
3218
+ * <p>A <code>GeneratedPolicyProperties</code> object that contains properties of the generated policy.</p>
3533
3219
  * @public
3534
3220
  */
3535
3221
  properties: GeneratedPolicyProperties | undefined;
3536
3222
  /**
3537
- * <p>The text to use as the content for the new policy. The policy is created using the
3538
- * <a href="https://docs.aws.amazon.com/IAM/latest/APIReference/API_CreatePolicy.html">CreatePolicy</a> action.</p>
3223
+ * <p>The text to use as the content for the new policy. The policy is created using the <a href="https://docs.aws.amazon.com/IAM/latest/APIReference/API_CreatePolicy.html">CreatePolicy</a> action.</p>
3539
3224
  * @public
3540
3225
  */
3541
3226
  generatedPolicies?: GeneratedPolicy[] | undefined;
@@ -3565,8 +3250,7 @@ export interface JobError {
3565
3250
  */
3566
3251
  code: JobErrorCode | undefined;
3567
3252
  /**
3568
- * <p>Specific information about the error. For example, which service quota was exceeded or
3569
- * which resource was not found.</p>
3253
+ * <p>Specific information about the error. For example, which service quota was exceeded or which resource was not found.</p>
3570
3254
  * @public
3571
3255
  */
3572
3256
  message: string | undefined;
@@ -3591,10 +3275,7 @@ export type JobStatus = (typeof JobStatus)[keyof typeof JobStatus];
3591
3275
  */
3592
3276
  export interface JobDetails {
3593
3277
  /**
3594
- * <p>The <code>JobId</code> that is returned by the <code>StartPolicyGeneration</code>
3595
- * operation. The <code>JobId</code> can be used with <code>GetGeneratedPolicy</code> to
3596
- * retrieve the generated policies or used with <code>CancelPolicyGeneration</code> to cancel
3597
- * the policy generation request.</p>
3278
+ * <p>The <code>JobId</code> that is returned by the <code>StartPolicyGeneration</code> operation. The <code>JobId</code> can be used with <code>GetGeneratedPolicy</code> to retrieve the generated policies or used with <code>CancelPolicyGeneration</code> to cancel the policy generation request.</p>
3598
3279
  * @public
3599
3280
  */
3600
3281
  jobId: string | undefined;
@@ -3624,14 +3305,12 @@ export interface JobDetails {
3624
3305
  */
3625
3306
  export interface GetGeneratedPolicyResponse {
3626
3307
  /**
3627
- * <p>A <code>GeneratedPolicyDetails</code> object that contains details about the generated
3628
- * policy.</p>
3308
+ * <p>A <code>GeneratedPolicyDetails</code> object that contains details about the generated policy.</p>
3629
3309
  * @public
3630
3310
  */
3631
3311
  jobDetails: JobDetails | undefined;
3632
3312
  /**
3633
- * <p>A <code>GeneratedPolicyResult</code> object that contains the generated policies and
3634
- * associated details.</p>
3313
+ * <p>A <code>GeneratedPolicyResult</code> object that contains the generated policies and associated details.</p>
3635
3314
  * @public
3636
3315
  */
3637
3316
  generatedPolicyResult: GeneratedPolicyResult | undefined;
@@ -3646,8 +3325,7 @@ export interface ListAccessPreviewFindingsRequest {
3646
3325
  */
3647
3326
  accessPreviewId: string | undefined;
3648
3327
  /**
3649
- * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
3650
- * the analyzer</a> used to generate the access.</p>
3328
+ * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> used to generate the access.</p>
3651
3329
  * @public
3652
3330
  */
3653
3331
  analyzerArn: string | undefined;
@@ -3686,15 +3364,12 @@ export type FindingChangeType = (typeof FindingChangeType)[keyof typeof FindingC
3686
3364
  */
3687
3365
  export interface AccessPreviewFinding {
3688
3366
  /**
3689
- * <p>The ID of the access preview finding. This ID uniquely identifies the element in the
3690
- * list of access preview findings and is not related to the finding ID in Access
3691
- * Analyzer.</p>
3367
+ * <p>The ID of the access preview finding. This ID uniquely identifies the element in the list of access preview findings and is not related to the finding ID in Access Analyzer.</p>
3692
3368
  * @public
3693
3369
  */
3694
3370
  id: string | undefined;
3695
3371
  /**
3696
- * <p>The existing ID of the finding in IAM Access Analyzer, provided only for existing
3697
- * findings.</p>
3372
+ * <p>The existing ID of the finding in IAM Access Analyzer, provided only for existing findings.</p>
3698
3373
  * @public
3699
3374
  */
3700
3375
  existingFindingId?: string | undefined;
@@ -3709,8 +3384,7 @@ export interface AccessPreviewFinding {
3709
3384
  */
3710
3385
  principal?: Record<string, string> | undefined;
3711
3386
  /**
3712
- * <p>The action in the analyzed policy statement that an external principal has permission to
3713
- * perform.</p>
3387
+ * <p>The action in the analyzed policy statement that an external principal has permission to perform.</p>
3714
3388
  * @public
3715
3389
  */
3716
3390
  action?: string[] | undefined;
@@ -3720,14 +3394,12 @@ export interface AccessPreviewFinding {
3720
3394
  */
3721
3395
  condition?: Record<string, string> | undefined;
3722
3396
  /**
3723
- * <p>The resource that an external principal has access to. This is the resource associated
3724
- * with the access preview.</p>
3397
+ * <p>The resource that an external principal has access to. This is the resource associated with the access preview.</p>
3725
3398
  * @public
3726
3399
  */
3727
3400
  resource?: string | undefined;
3728
3401
  /**
3729
- * <p>Indicates whether the policy that generated the finding allows public access to the
3730
- * resource.</p>
3402
+ * <p>Indicates whether the policy that generated the finding allows public access to the resource.</p>
3731
3403
  * @public
3732
3404
  */
3733
3405
  isPublic?: boolean | undefined;
@@ -3742,42 +3414,17 @@ export interface AccessPreviewFinding {
3742
3414
  */
3743
3415
  createdAt: Date | undefined;
3744
3416
  /**
3745
- * <p>Provides context on how the access preview finding compares to existing access
3746
- * identified in IAM Access Analyzer.</p>
3747
- * <ul>
3748
- * <li>
3749
- * <p>
3750
- * <code>New</code> - The finding is for newly-introduced access.</p>
3751
- * </li>
3752
- * <li>
3753
- * <p>
3754
- * <code>Unchanged</code> - The preview finding is an existing finding that would
3755
- * remain unchanged.</p>
3756
- * </li>
3757
- * <li>
3758
- * <p>
3759
- * <code>Changed</code> - The preview finding is an existing finding with a change in
3760
- * status.</p>
3761
- * </li>
3762
- * </ul>
3763
- * <p>For example, a <code>Changed</code> finding with preview status <code>Resolved</code>
3764
- * and existing status <code>Active</code> indicates the existing <code>Active</code> finding
3765
- * would become <code>Resolved</code> as a result of the proposed permissions change.</p>
3417
+ * <p>Provides context on how the access preview finding compares to existing access identified in IAM Access Analyzer.</p> <ul> <li> <p> <code>New</code> - The finding is for newly-introduced access.</p> </li> <li> <p> <code>Unchanged</code> - The preview finding is an existing finding that would remain unchanged.</p> </li> <li> <p> <code>Changed</code> - The preview finding is an existing finding with a change in status.</p> </li> </ul> <p>For example, a <code>Changed</code> finding with preview status <code>Resolved</code> and existing status <code>Active</code> indicates the existing <code>Active</code> finding would become <code>Resolved</code> as a result of the proposed permissions change.</p>
3766
3418
  * @public
3767
3419
  */
3768
3420
  changeType: FindingChangeType | undefined;
3769
3421
  /**
3770
- * <p>The preview status of the finding. This is what the status of the finding would be after
3771
- * permissions deployment. For example, a <code>Changed</code> finding with preview status
3772
- * <code>Resolved</code> and existing status <code>Active</code> indicates the existing
3773
- * <code>Active</code> finding would become <code>Resolved</code> as a result of the
3774
- * proposed permissions change.</p>
3422
+ * <p>The preview status of the finding. This is what the status of the finding would be after permissions deployment. For example, a <code>Changed</code> finding with preview status <code>Resolved</code> and existing status <code>Active</code> indicates the existing <code>Active</code> finding would become <code>Resolved</code> as a result of the proposed permissions change.</p>
3775
3423
  * @public
3776
3424
  */
3777
3425
  status: FindingStatus | undefined;
3778
3426
  /**
3779
- * <p>The Amazon Web Services account ID that owns the resource. For most Amazon Web Services resources, the owning
3780
- * account is the account in which the resource was created.</p>
3427
+ * <p>The Amazon Web Services account ID that owns the resource. For most Amazon Web Services resources, the owning account is the account in which the resource was created.</p>
3781
3428
  * @public
3782
3429
  */
3783
3430
  resourceOwnerAccount: string | undefined;
@@ -3787,14 +3434,12 @@ export interface AccessPreviewFinding {
3787
3434
  */
3788
3435
  error?: string | undefined;
3789
3436
  /**
3790
- * <p>The sources of the finding. This indicates how the access that generated the finding is
3791
- * granted. It is populated for Amazon S3 bucket findings.</p>
3437
+ * <p>The sources of the finding. This indicates how the access that generated the finding is granted. It is populated for Amazon S3 bucket findings.</p>
3792
3438
  * @public
3793
3439
  */
3794
3440
  sources?: FindingSource[] | undefined;
3795
3441
  /**
3796
- * <p>The type of restriction applied to the finding by the resource owner with an Organizations
3797
- * resource control policy (RCP).</p>
3442
+ * <p>The type of restriction applied to the finding by the resource owner with an Organizations resource control policy (RCP).</p>
3798
3443
  * @public
3799
3444
  */
3800
3445
  resourceControlPolicyRestriction?: ResourceControlPolicyRestriction | undefined;
@@ -3819,8 +3464,7 @@ export interface ListAccessPreviewFindingsResponse {
3819
3464
  */
3820
3465
  export interface ListAccessPreviewsRequest {
3821
3466
  /**
3822
- * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
3823
- * the analyzer</a> used to generate the access preview.</p>
3467
+ * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> used to generate the access preview.</p>
3824
3468
  * @public
3825
3469
  */
3826
3470
  analyzerArn: string | undefined;
@@ -3856,30 +3500,12 @@ export interface AccessPreviewSummary {
3856
3500
  */
3857
3501
  createdAt: Date | undefined;
3858
3502
  /**
3859
- * <p>The status of the access preview.</p>
3860
- * <ul>
3861
- * <li>
3862
- * <p>
3863
- * <code>Creating</code> - The access preview creation is in progress.</p>
3864
- * </li>
3865
- * <li>
3866
- * <p>
3867
- * <code>Completed</code> - The access preview is complete and previews the findings
3868
- * for external access to the resource.</p>
3869
- * </li>
3870
- * <li>
3871
- * <p>
3872
- * <code>Failed</code> - The access preview creation has failed.</p>
3873
- * </li>
3874
- * </ul>
3503
+ * <p>The status of the access preview.</p> <ul> <li> <p> <code>Creating</code> - The access preview creation is in progress.</p> </li> <li> <p> <code>Completed</code> - The access preview is complete and previews the findings for external access to the resource.</p> </li> <li> <p> <code>Failed</code> - The access preview creation has failed.</p> </li> </ul>
3875
3504
  * @public
3876
3505
  */
3877
3506
  status: AccessPreviewStatus | undefined;
3878
3507
  /**
3879
- * <p>Provides more details about the current status of the access preview. For example, if
3880
- * the creation of the access preview fails, a <code>Failed</code> status is returned. This
3881
- * failure can be due to an internal issue with the analysis or due to an invalid proposed
3882
- * resource configuration.</p>
3508
+ * <p>Provides more details about the current status of the access preview. For example, if the creation of the access preview fails, a <code>Failed</code> status is returned. This failure can be due to an internal issue with the analysis or due to an invalid proposed resource configuration.</p>
3883
3509
  * @public
3884
3510
  */
3885
3511
  statusReason?: AccessPreviewStatusReason | undefined;
@@ -3905,8 +3531,7 @@ export interface ListAccessPreviewsResponse {
3905
3531
  */
3906
3532
  export interface ListAnalyzedResourcesRequest {
3907
3533
  /**
3908
- * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
3909
- * the analyzer</a> to retrieve a list of analyzed resources from.</p>
3534
+ * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> to retrieve a list of analyzed resources from.</p>
3910
3535
  * @public
3911
3536
  */
3912
3537
  analyzerArn: string | undefined;
@@ -3989,8 +3614,7 @@ export interface SortCriteria {
3989
3614
  */
3990
3615
  export interface ListFindingsRequest {
3991
3616
  /**
3992
- * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
3993
- * the analyzer</a> to retrieve findings from.</p>
3617
+ * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> to retrieve findings from.</p>
3994
3618
  * @public
3995
3619
  */
3996
3620
  analyzerArn: string | undefined;
@@ -4031,8 +3655,7 @@ export interface FindingSummary {
4031
3655
  */
4032
3656
  principal?: Record<string, string> | undefined;
4033
3657
  /**
4034
- * <p>The action in the analyzed policy statement that an external principal has permission to
4035
- * use.</p>
3658
+ * <p>The action in the analyzed policy statement that an external principal has permission to use.</p>
4036
3659
  * @public
4037
3660
  */
4038
3661
  action?: string[] | undefined;
@@ -4042,8 +3665,7 @@ export interface FindingSummary {
4042
3665
  */
4043
3666
  resource?: string | undefined;
4044
3667
  /**
4045
- * <p>Indicates whether the finding reports a resource that has a policy that allows public
4046
- * access.</p>
3668
+ * <p>Indicates whether the finding reports a resource that has a policy that allows public access.</p>
4047
3669
  * @public
4048
3670
  */
4049
3671
  isPublic?: boolean | undefined;
@@ -4063,8 +3685,7 @@ export interface FindingSummary {
4063
3685
  */
4064
3686
  createdAt: Date | undefined;
4065
3687
  /**
4066
- * <p>The time at which the resource-based policy that generated the finding was
4067
- * analyzed.</p>
3688
+ * <p>The time at which the resource-based policy that generated the finding was analyzed.</p>
4068
3689
  * @public
4069
3690
  */
4070
3691
  analyzedAt: Date | undefined;
@@ -4089,14 +3710,12 @@ export interface FindingSummary {
4089
3710
  */
4090
3711
  error?: string | undefined;
4091
3712
  /**
4092
- * <p>The sources of the finding. This indicates how the access that generated the finding is
4093
- * granted. It is populated for Amazon S3 bucket findings.</p>
3713
+ * <p>The sources of the finding. This indicates how the access that generated the finding is granted. It is populated for Amazon S3 bucket findings.</p>
4094
3714
  * @public
4095
3715
  */
4096
3716
  sources?: FindingSource[] | undefined;
4097
3717
  /**
4098
- * <p>The type of restriction applied to the finding by the resource owner with an Organizations
4099
- * resource control policy (RCP).</p>
3718
+ * <p>The type of restriction applied to the finding by the resource owner with an Organizations resource control policy (RCP).</p>
4100
3719
  * @public
4101
3720
  */
4102
3721
  resourceControlPolicyRestriction?: ResourceControlPolicyRestriction | undefined;
@@ -4107,8 +3726,7 @@ export interface FindingSummary {
4107
3726
  */
4108
3727
  export interface ListFindingsResponse {
4109
3728
  /**
4110
- * <p>A list of findings retrieved from the analyzer that match the filter criteria specified,
4111
- * if any.</p>
3729
+ * <p>A list of findings retrieved from the analyzer that match the filter criteria specified, if any.</p>
4112
3730
  * @public
4113
3731
  */
4114
3732
  findings: FindingSummary[] | undefined;
@@ -4123,8 +3741,7 @@ export interface ListFindingsResponse {
4123
3741
  */
4124
3742
  export interface ListFindingsV2Request {
4125
3743
  /**
4126
- * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
4127
- * the analyzer</a> to retrieve findings from.</p>
3744
+ * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> to retrieve findings from.</p>
4128
3745
  * @public
4129
3746
  */
4130
3747
  analyzerArn: string | undefined;
@@ -4155,8 +3772,7 @@ export interface ListFindingsV2Request {
4155
3772
  */
4156
3773
  export interface FindingSummaryV2 {
4157
3774
  /**
4158
- * <p>The time at which the resource-based policy or IAM entity that generated the finding
4159
- * was analyzed.</p>
3775
+ * <p>The time at which the resource-based policy or IAM entity that generated the finding was analyzed.</p>
4160
3776
  * @public
4161
3777
  */
4162
3778
  analyzedAt: Date | undefined;
@@ -4201,7 +3817,7 @@ export interface FindingSummaryV2 {
4201
3817
  */
4202
3818
  updatedAt: Date | undefined;
4203
3819
  /**
4204
- * <p>The type of the external access or unused access finding.</p>
3820
+ * <p>The type of the access finding. For external access analyzers, the type is <code>ExternalAccess</code>. For unused access analyzers, the type can be <code>UnusedIAMRole</code>, <code>UnusedIAMUserAccessKey</code>, <code>UnusedIAMUserPassword</code>, or <code>UnusedPermission</code>. For internal access analyzers, the type is <code>InternalAccess</code>.</p>
4205
3821
  * @public
4206
3822
  */
4207
3823
  findingType?: FindingType | undefined;
@@ -4211,8 +3827,7 @@ export interface FindingSummaryV2 {
4211
3827
  */
4212
3828
  export interface ListFindingsV2Response {
4213
3829
  /**
4214
- * <p>A list of findings retrieved from the analyzer that match the filter criteria specified,
4215
- * if any.</p>
3830
+ * <p>A list of findings retrieved from the analyzer that match the filter criteria specified, if any.</p>
4216
3831
  * @public
4217
3832
  */
4218
3833
  findings: FindingSummaryV2[] | undefined;
@@ -4227,9 +3842,7 @@ export interface ListFindingsV2Response {
4227
3842
  */
4228
3843
  export interface ListPolicyGenerationsRequest {
4229
3844
  /**
4230
- * <p>The ARN of the IAM entity (user or role) for which you are generating a policy. Use
4231
- * this with <code>ListGeneratedPolicies</code> to filter the results to only include results
4232
- * for a specific principal.</p>
3845
+ * <p>The ARN of the IAM entity (user or role) for which you are generating a policy. Use this with <code>ListGeneratedPolicies</code> to filter the results to only include results for a specific principal.</p>
4233
3846
  * @public
4234
3847
  */
4235
3848
  principalArn?: string | undefined;
@@ -4250,10 +3863,7 @@ export interface ListPolicyGenerationsRequest {
4250
3863
  */
4251
3864
  export interface PolicyGeneration {
4252
3865
  /**
4253
- * <p>The <code>JobId</code> that is returned by the <code>StartPolicyGeneration</code>
4254
- * operation. The <code>JobId</code> can be used with <code>GetGeneratedPolicy</code> to
4255
- * retrieve the generated policies or used with <code>CancelPolicyGeneration</code> to cancel
4256
- * the policy generation request.</p>
3866
+ * <p>The <code>JobId</code> that is returned by the <code>StartPolicyGeneration</code> operation. The <code>JobId</code> can be used with <code>GetGeneratedPolicy</code> to retrieve the generated policies or used with <code>CancelPolicyGeneration</code> to cancel the policy generation request.</p>
4257
3867
  * @public
4258
3868
  */
4259
3869
  jobId: string | undefined;
@@ -4283,8 +3893,7 @@ export interface PolicyGeneration {
4283
3893
  */
4284
3894
  export interface ListPolicyGenerationsResponse {
4285
3895
  /**
4286
- * <p>A <code>PolicyGeneration</code> object that contains details about the generated
4287
- * policy.</p>
3896
+ * <p>A <code>PolicyGeneration</code> object that contains details about the generated policy.</p>
4288
3897
  * @public
4289
3898
  */
4290
3899
  policyGenerations: PolicyGeneration[] | undefined;
@@ -4322,8 +3931,7 @@ export interface ListTagsForResourceResponse {
4322
3931
  */
4323
3932
  export interface Trail {
4324
3933
  /**
4325
- * <p>Specifies the ARN of the trail. The format of a trail ARN is
4326
- * <code>arn:aws:cloudtrail:us-east-2:123456789012:trail/MyTrail</code>.</p>
3934
+ * <p>Specifies the ARN of the trail. The format of a trail ARN is <code>arn:aws:cloudtrail:us-east-2:123456789012:trail/MyTrail</code>.</p>
4327
3935
  * @public
4328
3936
  */
4329
3937
  cloudTrailArn: string | undefined;
@@ -4333,9 +3941,7 @@ export interface Trail {
4333
3941
  */
4334
3942
  regions?: string[] | undefined;
4335
3943
  /**
4336
- * <p>Possible values are <code>true</code> or <code>false</code>. If set to
4337
- * <code>true</code>, IAM Access Analyzer retrieves CloudTrail data from all regions to analyze and
4338
- * generate a policy.</p>
3944
+ * <p>Possible values are <code>true</code> or <code>false</code>. If set to <code>true</code>, IAM Access Analyzer retrieves CloudTrail data from all regions to analyze and generate a policy.</p>
4339
3945
  * @public
4340
3946
  */
4341
3947
  allRegions?: boolean | undefined;
@@ -4351,28 +3957,23 @@ export interface CloudTrailDetails {
4351
3957
  */
4352
3958
  trails: Trail[] | undefined;
4353
3959
  /**
4354
- * <p>The ARN of the service role that IAM Access Analyzer uses to access your CloudTrail trail and
4355
- * service last accessed information.</p>
3960
+ * <p>The ARN of the service role that IAM Access Analyzer uses to access your CloudTrail trail and service last accessed information.</p>
4356
3961
  * @public
4357
3962
  */
4358
3963
  accessRole: string | undefined;
4359
3964
  /**
4360
- * <p>The start of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events
4361
- * with a timestamp before this time are not considered to generate a policy.</p>
3965
+ * <p>The start of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events with a timestamp before this time are not considered to generate a policy.</p>
4362
3966
  * @public
4363
3967
  */
4364
3968
  startTime: Date | undefined;
4365
3969
  /**
4366
- * <p>The end of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events with
4367
- * a timestamp after this time are not considered to generate a policy. If this is not
4368
- * included in the request, the default value is the current time.</p>
3970
+ * <p>The end of the time range for which IAM Access Analyzer reviews your CloudTrail events. Events with a timestamp after this time are not considered to generate a policy. If this is not included in the request, the default value is the current time.</p>
4369
3971
  * @public
4370
3972
  */
4371
3973
  endTime?: Date | undefined;
4372
3974
  }
4373
3975
  /**
4374
- * <p>Contains the ARN details about the IAM entity for which the policy is
4375
- * generated.</p>
3976
+ * <p>Contains the ARN details about the IAM entity for which the policy is generated.</p>
4376
3977
  * @public
4377
3978
  */
4378
3979
  export interface PolicyGenerationDetails {
@@ -4387,25 +3988,17 @@ export interface PolicyGenerationDetails {
4387
3988
  */
4388
3989
  export interface StartPolicyGenerationRequest {
4389
3990
  /**
4390
- * <p>Contains the ARN of the IAM entity (user or role) for which you are generating a
4391
- * policy.</p>
3991
+ * <p>Contains the ARN of the IAM entity (user or role) for which you are generating a policy.</p>
4392
3992
  * @public
4393
3993
  */
4394
3994
  policyGenerationDetails: PolicyGenerationDetails | undefined;
4395
3995
  /**
4396
- * <p>A <code>CloudTrailDetails</code> object that contains details about a <code>Trail</code>
4397
- * that you want to analyze to generate policies.</p>
3996
+ * <p>A <code>CloudTrailDetails</code> object that contains details about a <code>Trail</code> that you want to analyze to generate policies.</p>
4398
3997
  * @public
4399
3998
  */
4400
3999
  cloudTrailDetails?: CloudTrailDetails | undefined;
4401
4000
  /**
4402
- * <p>A unique, case-sensitive identifier that you provide to ensure the idempotency of the
4403
- * request. Idempotency ensures that an API request completes only once. With an idempotent
4404
- * request, if the original request completes successfully, the subsequent retries with the
4405
- * same client token return the result from the original successful request and they have no
4406
- * additional effect.</p>
4407
- * <p>If you do not specify a client token, one is automatically generated by the Amazon Web Services
4408
- * SDK.</p>
4001
+ * <p>A unique, case-sensitive identifier that you provide to ensure the idempotency of the request. Idempotency ensures that an API request completes only once. With an idempotent request, if the original request completes successfully, the subsequent retries with the same client token return the result from the original successful request and they have no additional effect.</p> <p>If you do not specify a client token, one is automatically generated by the Amazon Web Services SDK.</p>
4409
4002
  * @public
4410
4003
  */
4411
4004
  clientToken?: string | undefined;
@@ -4415,10 +4008,7 @@ export interface StartPolicyGenerationRequest {
4415
4008
  */
4416
4009
  export interface StartPolicyGenerationResponse {
4417
4010
  /**
4418
- * <p>The <code>JobId</code> that is returned by the <code>StartPolicyGeneration</code>
4419
- * operation. The <code>JobId</code> can be used with <code>GetGeneratedPolicy</code> to
4420
- * retrieve the generated policies or used with <code>CancelPolicyGeneration</code> to cancel
4421
- * the policy generation request.</p>
4011
+ * <p>The <code>JobId</code> that is returned by the <code>StartPolicyGeneration</code> operation. The <code>JobId</code> can be used with <code>GetGeneratedPolicy</code> to retrieve the generated policies or used with <code>CancelPolicyGeneration</code> to cancel the policy generation request.</p>
4422
4012
  * @public
4423
4013
  */
4424
4014
  jobId: string | undefined;
@@ -4429,9 +4019,7 @@ export interface StartPolicyGenerationResponse {
4429
4019
  */
4430
4020
  export interface StartResourceScanRequest {
4431
4021
  /**
4432
- * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
4433
- * the analyzer</a> to use to scan the policies applied to the specified
4434
- * resource.</p>
4022
+ * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> to use to scan the policies applied to the specified resource.</p>
4435
4023
  * @public
4436
4024
  */
4437
4025
  analyzerArn: string | undefined;
@@ -4441,8 +4029,7 @@ export interface StartResourceScanRequest {
4441
4029
  */
4442
4030
  resourceArn: string | undefined;
4443
4031
  /**
4444
- * <p>The Amazon Web Services account ID that owns the resource. For most Amazon Web Services resources, the owning
4445
- * account is the account in which the resource was created.</p>
4032
+ * <p>The Amazon Web Services account ID that owns the resource. For most Amazon Web Services resources, the owning account is the account in which the resource was created.</p>
4446
4033
  * @public
4447
4034
  */
4448
4035
  resourceOwnerAccount?: string | undefined;
@@ -4501,15 +4088,12 @@ export type FindingStatusUpdate = "ACTIVE" | "ARCHIVED";
4501
4088
  */
4502
4089
  export interface UpdateFindingsRequest {
4503
4090
  /**
4504
- * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of
4505
- * the analyzer</a> that generated the findings to update.</p>
4091
+ * <p>The <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-getting-started.html#permission-resources">ARN of the analyzer</a> that generated the findings to update.</p>
4506
4092
  * @public
4507
4093
  */
4508
4094
  analyzerArn: string | undefined;
4509
4095
  /**
4510
- * <p>The state represents the action to take to update the finding Status. Use
4511
- * <code>ARCHIVE</code> to change an Active finding to an Archived finding. Use
4512
- * <code>ACTIVE</code> to change an Archived finding to an Active finding.</p>
4096
+ * <p>The state represents the action to take to update the finding Status. Use <code>ARCHIVE</code> to change an Active finding to an Archived finding. Use <code>ACTIVE</code> to change an Archived finding to an Active finding.</p>
4513
4097
  * @public
4514
4098
  */
4515
4099
  status: FindingStatusUpdate | undefined;
@@ -4604,27 +4188,12 @@ export interface ValidatePolicyRequest {
4604
4188
  */
4605
4189
  policyDocument: string | undefined;
4606
4190
  /**
4607
- * <p>The type of policy to validate. Identity policies grant permissions to IAM principals.
4608
- * Identity policies include managed and inline policies for IAM roles, users, and
4609
- * groups.</p>
4610
- * <p>Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust
4611
- * policies for IAM roles and bucket policies for Amazon S3 buckets. You can provide a generic
4612
- * input such as identity policy or resource policy or a specific input such as managed policy
4613
- * or Amazon S3 bucket policy. </p>
4614
- * <p>Service control policies (SCPs) are a type of organization policy attached to an Amazon Web Services
4615
- * organization, organizational unit (OU), or an account.</p>
4191
+ * <p>The type of policy to validate. Identity policies grant permissions to IAM principals. Identity policies include managed and inline policies for IAM roles, users, and groups.</p> <p>Resource policies grant permissions on Amazon Web Services resources. Resource policies include trust policies for IAM roles and bucket policies for Amazon S3 buckets. You can provide a generic input such as identity policy or resource policy or a specific input such as managed policy or Amazon S3 bucket policy. </p> <p>Service control policies (SCPs) are a type of organization policy attached to an Amazon Web Services organization, organizational unit (OU), or an account.</p>
4616
4192
  * @public
4617
4193
  */
4618
4194
  policyType: PolicyType | undefined;
4619
4195
  /**
4620
- * <p>The type of resource to attach to your resource policy. Specify a value for the policy
4621
- * validation resource type only if the policy type is <code>RESOURCE_POLICY</code>. For
4622
- * example, to validate a resource policy to attach to an Amazon S3 bucket, you can choose
4623
- * <code>AWS::S3::Bucket</code> for the policy validation resource type.</p>
4624
- * <p>For resource types not supported as valid values, IAM Access Analyzer runs policy checks that
4625
- * apply to all resource policies. For example, to validate a resource policy to attach to a
4626
- * KMS key, do not specify a value for the policy validation resource type and IAM Access Analyzer
4627
- * will run policy checks that apply to all resource policies.</p>
4196
+ * <p>The type of resource to attach to your resource policy. Specify a value for the policy validation resource type only if the policy type is <code>RESOURCE_POLICY</code>. For example, to validate a resource policy to attach to an Amazon S3 bucket, you can choose <code>AWS::S3::Bucket</code> for the policy validation resource type.</p> <p>For resource types not supported as valid values, IAM Access Analyzer runs policy checks that apply to all resource policies. For example, to validate a resource policy to attach to a KMS key, do not specify a value for the policy validation resource type and IAM Access Analyzer will run policy checks that apply to all resource policies.</p>
4628
4197
  * @public
4629
4198
  */
4630
4199
  validatePolicyResourceType?: ValidatePolicyResourceType | undefined;
@@ -4753,8 +4322,7 @@ export interface Position {
4753
4322
  offset: number | undefined;
4754
4323
  }
4755
4324
  /**
4756
- * <p>A span in a policy. The span consists of a start position (inclusive) and end position
4757
- * (exclusive).</p>
4325
+ * <p>A span in a policy. The span consists of a start position (inclusive) and end position (exclusive).</p>
4758
4326
  * @public
4759
4327
  */
4760
4328
  export interface Span {
@@ -4770,8 +4338,7 @@ export interface Span {
4770
4338
  end: Position | undefined;
4771
4339
  }
4772
4340
  /**
4773
- * <p>A location in a policy that is represented as a path through the JSON representation and
4774
- * a corresponding span.</p>
4341
+ * <p>A location in a policy that is represented as a path through the JSON representation and a corresponding span.</p>
4775
4342
  * @public
4776
4343
  */
4777
4344
  export interface Location {
@@ -4787,26 +4354,17 @@ export interface Location {
4787
4354
  span: Span | undefined;
4788
4355
  }
4789
4356
  /**
4790
- * <p>A finding in a policy. Each finding is an actionable recommendation that can be used to
4791
- * improve the policy.</p>
4357
+ * <p>A finding in a policy. Each finding is an actionable recommendation that can be used to improve the policy.</p>
4792
4358
  * @public
4793
4359
  */
4794
4360
  export interface ValidatePolicyFinding {
4795
4361
  /**
4796
- * <p>A localized message that explains the finding and provides guidance on how to address
4797
- * it.</p>
4362
+ * <p>A localized message that explains the finding and provides guidance on how to address it.</p>
4798
4363
  * @public
4799
4364
  */
4800
4365
  findingDetails: string | undefined;
4801
4366
  /**
4802
- * <p>The impact of the finding.</p>
4803
- * <p>Security warnings report when the policy allows access that we consider overly
4804
- * permissive.</p>
4805
- * <p>Errors report when a part of the policy is not functional.</p>
4806
- * <p>Warnings report non-security issues when a policy does not conform to policy writing
4807
- * best practices.</p>
4808
- * <p>Suggestions recommend stylistic improvements in the policy that do not impact
4809
- * access.</p>
4367
+ * <p>The impact of the finding.</p> <p>Security warnings report when the policy allows access that we consider overly permissive.</p> <p>Errors report when a part of the policy is not functional.</p> <p>Warnings report non-security issues when a policy does not conform to policy writing best practices.</p> <p>Suggestions recommend stylistic improvements in the policy that do not impact access.</p>
4810
4368
  * @public
4811
4369
  */
4812
4370
  findingType: ValidatePolicyFindingType | undefined;
@@ -4821,8 +4379,7 @@ export interface ValidatePolicyFinding {
4821
4379
  */
4822
4380
  learnMoreLink: string | undefined;
4823
4381
  /**
4824
- * <p>The list of locations in the policy document that are related to the finding. The issue
4825
- * code provides a summary of an issue identified by the finding.</p>
4382
+ * <p>The list of locations in the policy document that are related to the finding. The issue code provides a summary of an issue identified by the finding.</p>
4826
4383
  * @public
4827
4384
  */
4828
4385
  locations: Location[] | undefined;
@@ -4832,8 +4389,7 @@ export interface ValidatePolicyFinding {
4832
4389
  */
4833
4390
  export interface ValidatePolicyResponse {
4834
4391
  /**
4835
- * <p>The list of findings in a policy returned by IAM Access Analyzer based on its suite of policy
4836
- * checks.</p>
4392
+ * <p>The list of findings in a policy returned by IAM Access Analyzer based on its suite of policy checks.</p>
4837
4393
  * @public
4838
4394
  */
4839
4395
  findings: ValidatePolicyFinding[] | undefined;