@aws-sdk/client-fms 3.556.0 → 3.564.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -82,7 +82,7 @@ export interface AdminAccountSummary {
82
82
  */
83
83
  DefaultAdmin?: boolean;
84
84
  /**
85
- * <p>The current status of the request to onboard a member account as an Firewall Manager administator.</p>
85
+ * <p>The current status of the request to onboard a member account as an Firewall Manager administrator.</p>
86
86
  * <ul>
87
87
  * <li>
88
88
  * <p>
@@ -134,6 +134,7 @@ export interface OrganizationalUnitScope {
134
134
  export declare const SecurityServiceType: {
135
135
  readonly DNS_FIREWALL: "DNS_FIREWALL";
136
136
  readonly IMPORT_NETWORK_FIREWALL: "IMPORT_NETWORK_FIREWALL";
137
+ readonly NETWORK_ACL_COMMON: "NETWORK_ACL_COMMON";
137
138
  readonly NETWORK_FIREWALL: "NETWORK_FIREWALL";
138
139
  readonly SECURITY_GROUPS_COMMON: "SECURITY_GROUPS_COMMON";
139
140
  readonly SECURITY_GROUPS_CONTENT_AUDIT: "SECURITY_GROUPS_CONTENT_AUDIT";
@@ -712,7 +713,7 @@ export interface GetAdminAccountResponse {
712
713
  */
713
714
  export interface GetAdminScopeRequest {
714
715
  /**
715
- * <p>The administator account that you want to get the details for.</p>
716
+ * <p>The administrator account that you want to get the details for.</p>
716
717
  * @public
717
718
  */
718
719
  AdminAccount: string | undefined;
@@ -727,7 +728,7 @@ export interface GetAdminScopeResponse {
727
728
  */
728
729
  AdminScope?: AdminScope;
729
730
  /**
730
- * <p>The current status of the request to onboard a member account as an Firewall Manager administator.</p>
731
+ * <p>The current status of the request to onboard a member account as an Firewall Manager administrator.</p>
731
732
  * <ul>
732
733
  * <li>
733
734
  * <p>
@@ -823,6 +824,7 @@ export declare const ViolationReason: {
823
824
  readonly FirewallSubnetMissingVPCEndpoint: "FIREWALL_SUBNET_MISSING_VPCE_ENDPOINT";
824
825
  readonly InternetGatewayMissingExpectedRoute: "INTERNET_GATEWAY_MISSING_EXPECTED_ROUTE";
825
826
  readonly InternetTrafficNotInspected: "INTERNET_TRAFFIC_NOT_INSPECTED";
827
+ readonly InvalidNetworkAclEntry: "INVALID_NETWORK_ACL_ENTRY";
826
828
  readonly InvalidRouteConfiguration: "INVALID_ROUTE_CONFIGURATION";
827
829
  readonly MissingExpectedRouteTable: "MISSING_EXPECTED_ROUTE_TABLE";
828
830
  readonly MissingFirewall: "MISSING_FIREWALL";
@@ -1011,6 +1013,157 @@ export interface ResourceTag {
1011
1013
  */
1012
1014
  Value?: string;
1013
1015
  }
1016
+ /**
1017
+ * <p>ICMP protocol: The ICMP type and code.</p>
1018
+ * @public
1019
+ */
1020
+ export interface NetworkAclIcmpTypeCode {
1021
+ /**
1022
+ * <p>ICMP code. </p>
1023
+ * @public
1024
+ */
1025
+ Code?: number;
1026
+ /**
1027
+ * <p>ICMP type. </p>
1028
+ * @public
1029
+ */
1030
+ Type?: number;
1031
+ }
1032
+ /**
1033
+ * <p>TCP or UDP protocols: The range of ports the rule applies to.</p>
1034
+ * @public
1035
+ */
1036
+ export interface NetworkAclPortRange {
1037
+ /**
1038
+ * <p>The beginning port number of the range. </p>
1039
+ * @public
1040
+ */
1041
+ From?: number;
1042
+ /**
1043
+ * <p>The ending port number of the range. </p>
1044
+ * @public
1045
+ */
1046
+ To?: number;
1047
+ }
1048
+ /**
1049
+ * @public
1050
+ * @enum
1051
+ */
1052
+ export declare const NetworkAclRuleAction: {
1053
+ readonly ALLOW: "allow";
1054
+ readonly DENY: "deny";
1055
+ };
1056
+ /**
1057
+ * @public
1058
+ */
1059
+ export type NetworkAclRuleAction = (typeof NetworkAclRuleAction)[keyof typeof NetworkAclRuleAction];
1060
+ /**
1061
+ * <p>Describes a rule in a network ACL.</p>
1062
+ * <p>Each network ACL has a set of numbered ingress rules and a separate set of numbered egress rules. When determining
1063
+ * whether a packet should be allowed in or out of a subnet associated with the network ACL, Amazon Web Services processes the
1064
+ * entries in the network ACL according to the rule numbers, in ascending order. </p>
1065
+ * <p>When you manage an individual network ACL, you explicitly specify the rule numbers. When you specify the network ACL rules in a Firewall Manager policy,
1066
+ * you provide the rules to run first, in the order that you want them to run, and the rules to run last, in the order
1067
+ * that you want them to run. Firewall Manager assigns the rule numbers for you when you save the network ACL policy specification.</p>
1068
+ * @public
1069
+ */
1070
+ export interface NetworkAclEntry {
1071
+ /**
1072
+ * <p>ICMP protocol: The ICMP type and code.</p>
1073
+ * @public
1074
+ */
1075
+ IcmpTypeCode?: NetworkAclIcmpTypeCode;
1076
+ /**
1077
+ * <p>The protocol number. A value of "-1" means all protocols. </p>
1078
+ * @public
1079
+ */
1080
+ Protocol: string | undefined;
1081
+ /**
1082
+ * <p>TCP or UDP protocols: The range of ports the rule applies to.</p>
1083
+ * @public
1084
+ */
1085
+ PortRange?: NetworkAclPortRange;
1086
+ /**
1087
+ * <p>The IPv4 network range to allow or deny, in CIDR notation.</p>
1088
+ * @public
1089
+ */
1090
+ CidrBlock?: string;
1091
+ /**
1092
+ * <p>The IPv6 network range to allow or deny, in CIDR notation.</p>
1093
+ * @public
1094
+ */
1095
+ Ipv6CidrBlock?: string;
1096
+ /**
1097
+ * <p>Indicates whether to allow or deny the traffic that matches the rule.</p>
1098
+ * @public
1099
+ */
1100
+ RuleAction: NetworkAclRuleAction | undefined;
1101
+ /**
1102
+ * <p>Indicates whether the rule is an egress, or outbound, rule (applied to traffic leaving the subnet). If it's not
1103
+ * an egress rule, then it's an ingress, or inbound, rule.</p>
1104
+ * @public
1105
+ */
1106
+ Egress: boolean | undefined;
1107
+ }
1108
+ /**
1109
+ * <p>The configuration of the first and last rules for the network ACL policy, and the remediation settings for each. </p>
1110
+ * @public
1111
+ */
1112
+ export interface NetworkAclEntrySet {
1113
+ /**
1114
+ * <p>The rules that you want to run first in the Firewall Manager managed network ACLs. </p>
1115
+ * <note>
1116
+ * <p>Provide these in the order in which you want them to run. Firewall Manager will assign
1117
+ * the specific rule numbers for you, in the network ACLs that it creates. </p>
1118
+ * </note>
1119
+ * @public
1120
+ */
1121
+ FirstEntries?: NetworkAclEntry[];
1122
+ /**
1123
+ * <p>Applies only when remediation is enabled for the policy as a whole. Firewall Manager uses this setting when it finds policy
1124
+ * violations that involve conflicts between the custom entries and the policy entries. </p>
1125
+ * <p>If forced remediation is disabled, Firewall Manager marks the network ACL as noncompliant and does not try to
1126
+ * remediate. For more information about the remediation behavior, see
1127
+ * <a href="https://docs.aws.amazon.com/waf/latest/developerguide/network-acl-policies.html">Network access control list (ACL) policies</a>
1128
+ * in the <i>Firewall Manager Developer Guide</i>.</p>
1129
+ * @public
1130
+ */
1131
+ ForceRemediateForFirstEntries: boolean | undefined;
1132
+ /**
1133
+ * <p>The rules that you want to run last in the Firewall Manager managed network ACLs. </p>
1134
+ * <note>
1135
+ * <p>Provide these in the order in which you want them to run. Firewall Manager will assign
1136
+ * the specific rule numbers for you, in the network ACLs that it creates. </p>
1137
+ * </note>
1138
+ * @public
1139
+ */
1140
+ LastEntries?: NetworkAclEntry[];
1141
+ /**
1142
+ * <p>Applies only when remediation is enabled for the policy as a whole. Firewall Manager uses this setting when it finds policy
1143
+ * violations that involve conflicts between the custom entries and the policy entries. </p>
1144
+ * <p>If forced remediation is disabled, Firewall Manager marks the network ACL as noncompliant and does not try to
1145
+ * remediate. For more information about the remediation behavior, see
1146
+ * <a href="https://docs.aws.amazon.com/waf/latest/developerguide/network-acl-policies.html">Network access control list (ACL) policies</a>
1147
+ * in the <i>Firewall Manager Developer Guide</i>.</p>
1148
+ * @public
1149
+ */
1150
+ ForceRemediateForLastEntries: boolean | undefined;
1151
+ }
1152
+ /**
1153
+ * <p>Defines a Firewall Manager network ACL policy. This is used in the <code>PolicyOption</code> of a <code>SecurityServicePolicyData</code> for a <code>Policy</code>, when
1154
+ * the <code>SecurityServicePolicyData</code> type is set to <code>NETWORK_ACL_COMMON</code>. </p>
1155
+ * <p>For information about network ACLs, see
1156
+ * <a href="https://docs.aws.amazon.com/vpc/latest/userguide/vpc-network-acls.html">Control traffic to subnets using network ACLs</a>
1157
+ * in the <i>Amazon Virtual Private Cloud User Guide</i>. </p>
1158
+ * @public
1159
+ */
1160
+ export interface NetworkAclCommonPolicy {
1161
+ /**
1162
+ * <p>The definition of the first and last rules for the network ACL policy. </p>
1163
+ * @public
1164
+ */
1165
+ NetworkAclEntrySet: NetworkAclEntrySet | undefined;
1166
+ }
1014
1167
  /**
1015
1168
  * @public
1016
1169
  * @enum
@@ -1050,7 +1203,7 @@ export interface ThirdPartyFirewallPolicy {
1050
1203
  FirewallDeploymentModel?: FirewallDeploymentModel;
1051
1204
  }
1052
1205
  /**
1053
- * <p>Contains the Network Firewall firewall policy options to configure the policy's deployment model and third-party firewall policy settings.</p>
1206
+ * <p>Contains the settings to configure a network ACL policy, a Network Firewall firewall policy deployment model, or a third-party firewall policy.</p>
1054
1207
  * @public
1055
1208
  */
1056
1209
  export interface PolicyOption {
@@ -1064,6 +1217,11 @@ export interface PolicyOption {
1064
1217
  * @public
1065
1218
  */
1066
1219
  ThirdPartyFirewallPolicy?: ThirdPartyFirewallPolicy;
1220
+ /**
1221
+ * <p>Defines a Firewall Manager network ACL policy. </p>
1222
+ * @public
1223
+ */
1224
+ NetworkAclCommonPolicy?: NetworkAclCommonPolicy;
1067
1225
  }
1068
1226
  /**
1069
1227
  * <p>Details about the security service that is being used to protect the resources.</p>
@@ -1182,7 +1340,7 @@ export interface SecurityServicePolicyData {
1182
1340
  * Firewall Manager automatically distributes tags from the primary group to the security groups created by this policy. To use security group tag distribution, you must also set <code>revertManualSecurityGroupChanges</code> to <code>true</code>, otherwise Firewall Manager won't be able to create the policy. When you enable <code>revertManualSecurityGroupChanges</code>, Firewall Manager identifies and reports when the security groups created by this policy become non-compliant.
1183
1341
  * </p>
1184
1342
  * <p>
1185
- * Firewall Manager won't distrubute system tags added by Amazon Web Services services into the replica security groups. System tags begin with the <code>aws:</code> prefix.
1343
+ * Firewall Manager won't distribute system tags added by Amazon Web Services services into the replica security groups. System tags begin with the <code>aws:</code> prefix.
1186
1344
  * </p>
1187
1345
  * </li>
1188
1346
  * <li>
@@ -1349,8 +1507,7 @@ export interface SecurityServicePolicyData {
1349
1507
  */
1350
1508
  ManagedServiceData?: string;
1351
1509
  /**
1352
- * <p>Contains the Network Firewall firewall policy options to configure a centralized deployment
1353
- * model.</p>
1510
+ * <p>Contains the settings to configure a network ACL policy, a Network Firewall firewall policy deployment model, or a third-party firewall policy.</p>
1354
1511
  * @public
1355
1512
  */
1356
1513
  PolicyOption?: PolicyOption;
@@ -1397,16 +1554,19 @@ export interface Policy {
1397
1554
  * <p>WAF - <code>AWS::ApiGateway::Stage</code>, <code>AWS::ElasticLoadBalancingV2::LoadBalancer</code>, and <code>AWS::CloudFront::Distribution</code>.</p>
1398
1555
  * </li>
1399
1556
  * <li>
1400
- * <p> DNS Firewall, Network Firewall, and third-party firewall - <code>AWS::EC2::VPC</code>.</p>
1557
+ * <p>Shield Advanced - <code>AWS::ElasticLoadBalancingV2::LoadBalancer</code>, <code>AWS::ElasticLoadBalancing::LoadBalancer</code>, <code>AWS::EC2::EIP</code>, and <code>AWS::CloudFront::Distribution</code>.</p>
1401
1558
  * </li>
1402
1559
  * <li>
1403
- * <p>Shield Advanced - <code>AWS::ElasticLoadBalancingV2::LoadBalancer</code>, <code>AWS::ElasticLoadBalancing::LoadBalancer</code>, <code>AWS::EC2::EIP</code>, and <code>AWS::CloudFront::Distribution</code>.</p>
1560
+ * <p>Network ACL - <code>AWS::EC2::Subnet</code>.</p>
1561
+ * </li>
1562
+ * <li>
1563
+ * <p>Security group usage audit - <code>AWS::EC2::SecurityGroup</code>.</p>
1404
1564
  * </li>
1405
1565
  * <li>
1406
1566
  * <p>Security group content audit - <code>AWS::EC2::SecurityGroup</code>, <code>AWS::EC2::NetworkInterface</code>, and <code>AWS::EC2::Instance</code>.</p>
1407
1567
  * </li>
1408
1568
  * <li>
1409
- * <p>Security group usage audit - <code>AWS::EC2::SecurityGroup</code>.</p>
1569
+ * <p>DNS Firewall, Network Firewall, and third-party firewall - <code>AWS::EC2::VPC</code>.</p>
1410
1570
  * </li>
1411
1571
  * </ul>
1412
1572
  * @public
@@ -1904,6 +2064,9 @@ export interface GetViolationDetailsRequest {
1904
2064
  * <p>Security group content audit</p>
1905
2065
  * </li>
1906
2066
  * <li>
2067
+ * <p>Network ACL</p>
2068
+ * </li>
2069
+ * <li>
1907
2070
  * <p>Third-party firewall</p>
1908
2071
  * </li>
1909
2072
  * </ul>
@@ -2194,6 +2357,129 @@ export interface FirewallSubnetMissingVPCEndpointViolation {
2194
2357
  */
2195
2358
  SubnetAvailabilityZoneId?: string;
2196
2359
  }
2360
+ /**
2361
+ * @public
2362
+ * @enum
2363
+ */
2364
+ export declare const EntryType: {
2365
+ readonly CustomEntry: "CUSTOM_ENTRY";
2366
+ readonly FMSManagedFirstEntry: "FMS_MANAGED_FIRST_ENTRY";
2367
+ readonly FMSManagedLastEntry: "FMS_MANAGED_LAST_ENTRY";
2368
+ };
2369
+ /**
2370
+ * @public
2371
+ */
2372
+ export type EntryType = (typeof EntryType)[keyof typeof EntryType];
2373
+ /**
2374
+ * <p>Describes a single rule in a network ACL.</p>
2375
+ * @public
2376
+ */
2377
+ export interface EntryDescription {
2378
+ /**
2379
+ * <p>Describes a rule in a network ACL.</p>
2380
+ * <p>Each network ACL has a set of numbered ingress rules and a separate set of numbered egress rules. When determining
2381
+ * whether a packet should be allowed in or out of a subnet associated with the network ACL, Amazon Web Services processes the
2382
+ * entries in the network ACL according to the rule numbers, in ascending order. </p>
2383
+ * <p>When you manage an individual network ACL, you explicitly specify the rule numbers. When you specify the network ACL rules in a Firewall Manager policy,
2384
+ * you provide the rules to run first, in the order that you want them to run, and the rules to run last, in the order
2385
+ * that you want them to run. Firewall Manager assigns the rule numbers for you when you save the network ACL policy specification.</p>
2386
+ * @public
2387
+ */
2388
+ EntryDetail?: NetworkAclEntry;
2389
+ /**
2390
+ * <p>The rule number for the entry. ACL entries are processed in ascending order by rule number. In a Firewall Manager network ACL policy, Firewall Manager
2391
+ * assigns rule numbers. </p>
2392
+ * @public
2393
+ */
2394
+ EntryRuleNumber?: number;
2395
+ /**
2396
+ * <p>Specifies whether the entry is managed by Firewall Manager or by a user, and, for Firewall Manager-managed entries, specifies whether the entry
2397
+ * is among those that run first in the network ACL or those that run last. </p>
2398
+ * @public
2399
+ */
2400
+ EntryType?: EntryType;
2401
+ }
2402
+ /**
2403
+ * @public
2404
+ * @enum
2405
+ */
2406
+ export declare const EntryViolationReason: {
2407
+ readonly EntryConflict: "ENTRY_CONFLICT";
2408
+ readonly IncorrectEntryOrder: "INCORRECT_ENTRY_ORDER";
2409
+ readonly MissingExpectedEntry: "MISSING_EXPECTED_ENTRY";
2410
+ };
2411
+ /**
2412
+ * @public
2413
+ */
2414
+ export type EntryViolationReason = (typeof EntryViolationReason)[keyof typeof EntryViolationReason];
2415
+ /**
2416
+ * <p>Detailed information about an entry violation in a network ACL. The violation is against the network ACL specification inside the
2417
+ * Firewall Manager network ACL policy. This data object is part of <code>InvalidNetworkAclEntriesViolation</code>.</p>
2418
+ * @public
2419
+ */
2420
+ export interface EntryViolation {
2421
+ /**
2422
+ * <p>The Firewall Manager-managed network ACL entry that is involved in the entry violation. </p>
2423
+ * @public
2424
+ */
2425
+ ExpectedEntry?: EntryDescription;
2426
+ /**
2427
+ * <p>The evaluation location within the ordered list of entries where the <code>ExpectedEntry</code> should be, according to the network ACL policy specifications. </p>
2428
+ * @public
2429
+ */
2430
+ ExpectedEvaluationOrder?: string;
2431
+ /**
2432
+ * <p>The evaluation location within the ordered list of entries where the <code>ExpectedEntry</code> is currently located. </p>
2433
+ * @public
2434
+ */
2435
+ ActualEvaluationOrder?: string;
2436
+ /**
2437
+ * <p>The entry that's currently in the <code>ExpectedEvaluationOrder</code> location, in place of the expected entry. </p>
2438
+ * @public
2439
+ */
2440
+ EntryAtExpectedEvaluationOrder?: EntryDescription;
2441
+ /**
2442
+ * <p>The list of entries that are in conflict with <code>ExpectedEntry</code>. </p>
2443
+ * @public
2444
+ */
2445
+ EntriesWithConflicts?: EntryDescription[];
2446
+ /**
2447
+ * <p>Descriptions of the violations that Firewall Manager found for these entries. </p>
2448
+ * @public
2449
+ */
2450
+ EntryViolationReasons?: EntryViolationReason[];
2451
+ }
2452
+ /**
2453
+ * <p>Violation detail for the entries in a network ACL resource.</p>
2454
+ * @public
2455
+ */
2456
+ export interface InvalidNetworkAclEntriesViolation {
2457
+ /**
2458
+ * <p>The VPC where the violation was found. </p>
2459
+ * @public
2460
+ */
2461
+ Vpc?: string;
2462
+ /**
2463
+ * <p>The subnet that's associated with the network ACL.</p>
2464
+ * @public
2465
+ */
2466
+ Subnet?: string;
2467
+ /**
2468
+ * <p>The Availability Zone where the network ACL is in use. </p>
2469
+ * @public
2470
+ */
2471
+ SubnetAvailabilityZone?: string;
2472
+ /**
2473
+ * <p>The network ACL containing the entry violations. </p>
2474
+ * @public
2475
+ */
2476
+ CurrentAssociatedNetworkAcl?: string;
2477
+ /**
2478
+ * <p>Detailed information about the entry violations in the network ACL. </p>
2479
+ * @public
2480
+ */
2481
+ EntryViolations?: EntryViolation[];
2482
+ }
2197
2483
  /**
2198
2484
  * @public
2199
2485
  * @enum
@@ -2835,6 +3121,79 @@ export interface NetworkFirewallUnexpectedGatewayRoutesViolation {
2835
3121
  */
2836
3122
  VpcId?: string;
2837
3123
  }
3124
+ /**
3125
+ * <p>Information about the <code>CreateNetworkAcl</code> action in Amazon EC2. This is a remediation option in <code>RemediationAction</code>.</p>
3126
+ * @public
3127
+ */
3128
+ export interface CreateNetworkAclAction {
3129
+ /**
3130
+ * <p>Brief description of this remediation action. </p>
3131
+ * @public
3132
+ */
3133
+ Description?: string;
3134
+ /**
3135
+ * <p>The VPC that's associated with the remediation action.</p>
3136
+ * @public
3137
+ */
3138
+ Vpc?: ActionTarget;
3139
+ /**
3140
+ * <p>Indicates whether it is possible for Firewall Manager to perform this remediation action. A false value indicates that auto remediation is disabled or Firewall Manager is unable to perform the action due to a conflict of some kind.</p>
3141
+ * @public
3142
+ */
3143
+ FMSCanRemediate?: boolean;
3144
+ }
3145
+ /**
3146
+ * <p>Information about the <code>CreateNetworkAclEntries</code> action in Amazon EC2. This is a remediation option in <code>RemediationAction</code>.</p>
3147
+ * @public
3148
+ */
3149
+ export interface CreateNetworkAclEntriesAction {
3150
+ /**
3151
+ * <p>Brief description of this remediation action. </p>
3152
+ * @public
3153
+ */
3154
+ Description?: string;
3155
+ /**
3156
+ * <p>The network ACL that's associated with the remediation action.</p>
3157
+ * @public
3158
+ */
3159
+ NetworkAclId?: ActionTarget;
3160
+ /**
3161
+ * <p>Lists the entries that the remediation action would create.</p>
3162
+ * @public
3163
+ */
3164
+ NetworkAclEntriesToBeCreated?: EntryDescription[];
3165
+ /**
3166
+ * <p>Indicates whether it is possible for Firewall Manager to perform this remediation action. A false value indicates that auto remediation is disabled or Firewall Manager is unable to perform the action due to a conflict of some kind.</p>
3167
+ * @public
3168
+ */
3169
+ FMSCanRemediate?: boolean;
3170
+ }
3171
+ /**
3172
+ * <p>Information about the <code>DeleteNetworkAclEntries</code> action in Amazon EC2. This is a remediation option in <code>RemediationAction</code>. </p>
3173
+ * @public
3174
+ */
3175
+ export interface DeleteNetworkAclEntriesAction {
3176
+ /**
3177
+ * <p>Brief description of this remediation action. </p>
3178
+ * @public
3179
+ */
3180
+ Description?: string;
3181
+ /**
3182
+ * <p>The network ACL that's associated with the remediation action.</p>
3183
+ * @public
3184
+ */
3185
+ NetworkAclId?: ActionTarget;
3186
+ /**
3187
+ * <p>Lists the entries that the remediation action would delete.</p>
3188
+ * @public
3189
+ */
3190
+ NetworkAclEntriesToBeDeleted?: EntryDescription[];
3191
+ /**
3192
+ * <p>Indicates whether it is possible for Firewall Manager to perform this remediation action. A false value indicates that auto remediation is disabled or Firewall Manager is unable to perform the action due to a conflict of some kind.</p>
3193
+ * @public
3194
+ */
3195
+ FMSCanRemediate?: boolean;
3196
+ }
2838
3197
  /**
2839
3198
  * <p>The action of associating an EC2 resource, such as a subnet or internet gateway, with a route table.</p>
2840
3199
  * @public
@@ -3047,6 +3406,32 @@ export interface FMSPolicyUpdateFirewallCreationConfigAction {
3047
3406
  */
3048
3407
  FirewallCreationConfig?: string;
3049
3408
  }
3409
+ /**
3410
+ * <p>Information about the <code>ReplaceNetworkAclAssociation</code> action in Amazon EC2. This is a remediation option in <code>RemediationAction</code>.</p>
3411
+ * @public
3412
+ */
3413
+ export interface ReplaceNetworkAclAssociationAction {
3414
+ /**
3415
+ * <p>Brief description of this remediation action. </p>
3416
+ * @public
3417
+ */
3418
+ Description?: string;
3419
+ /**
3420
+ * <p>Describes a remediation action target.</p>
3421
+ * @public
3422
+ */
3423
+ AssociationId?: ActionTarget;
3424
+ /**
3425
+ * <p>The network ACL that's associated with the remediation action.</p>
3426
+ * @public
3427
+ */
3428
+ NetworkAclId?: ActionTarget;
3429
+ /**
3430
+ * <p>Indicates whether it is possible for Firewall Manager to perform this remediation action. A false value indicates that auto remediation is disabled or Firewall Manager is unable to perform the action due to a conflict of some kind.</p>
3431
+ * @public
3432
+ */
3433
+ FMSCanRemediate?: boolean;
3434
+ }
3050
3435
  /**
3051
3436
  * <p>Information about an individual action you can take to remediate a violation.</p>
3052
3437
  * @public
@@ -3097,6 +3482,26 @@ export interface RemediationAction {
3097
3482
  * @public
3098
3483
  */
3099
3484
  FMSPolicyUpdateFirewallCreationConfigAction?: FMSPolicyUpdateFirewallCreationConfigAction;
3485
+ /**
3486
+ * <p>Information about the <code>CreateNetworkAcl</code> action in Amazon EC2.</p>
3487
+ * @public
3488
+ */
3489
+ CreateNetworkAclAction?: CreateNetworkAclAction;
3490
+ /**
3491
+ * <p>Information about the <code>ReplaceNetworkAclAssociation</code> action in Amazon EC2. </p>
3492
+ * @public
3493
+ */
3494
+ ReplaceNetworkAclAssociationAction?: ReplaceNetworkAclAssociationAction;
3495
+ /**
3496
+ * <p>Information about the <code>CreateNetworkAclEntries</code> action in Amazon EC2.</p>
3497
+ * @public
3498
+ */
3499
+ CreateNetworkAclEntriesAction?: CreateNetworkAclEntriesAction;
3500
+ /**
3501
+ * <p>Information about the <code>DeleteNetworkAclEntries</code> action in Amazon EC2.</p>
3502
+ * @public
3503
+ */
3504
+ DeleteNetworkAclEntriesAction?: DeleteNetworkAclEntriesAction;
3100
3505
  }
3101
3506
  /**
3102
3507
  * <p>An ordered list of actions you can take to remediate a violation.</p>
@@ -3393,11 +3798,6 @@ export interface ResourceViolation {
3393
3798
  * @public
3394
3799
  */
3395
3800
  DnsRuleGroupLimitExceededViolation?: DnsRuleGroupLimitExceededViolation;
3396
- /**
3397
- * <p>A list of possible remediation action lists. Each individual possible remediation action is a list of individual remediation actions.</p>
3398
- * @public
3399
- */
3400
- PossibleRemediationActions?: PossibleRemediationActions;
3401
3801
  /**
3402
3802
  * <p>Contains details about the firewall subnet that violates the policy scope.</p>
3403
3803
  * @public
@@ -3428,6 +3828,16 @@ export interface ResourceViolation {
3428
3828
  * @public
3429
3829
  */
3430
3830
  FirewallSubnetMissingVPCEndpointViolation?: FirewallSubnetMissingVPCEndpointViolation;
3831
+ /**
3832
+ * <p>Violation detail for the entries in a network ACL resource.</p>
3833
+ * @public
3834
+ */
3835
+ InvalidNetworkAclEntriesViolation?: InvalidNetworkAclEntriesViolation;
3836
+ /**
3837
+ * <p>A list of possible remediation action lists. Each individual possible remediation action is a list of individual remediation actions.</p>
3838
+ * @public
3839
+ */
3840
+ PossibleRemediationActions?: PossibleRemediationActions;
3431
3841
  }
3432
3842
  /**
3433
3843
  * <p>Violations for a resource based on the specified Firewall Manager policy and Amazon Web Services account.</p>
@@ -3887,15 +4297,7 @@ export interface PolicySummary {
3887
4297
  PolicyName?: string;
3888
4298
  /**
3889
4299
  * <p>The type of resource protected by or in scope of the policy. This is in the format shown
3890
- * in the <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-template-resource-type-ref.html">Amazon Web Services Resource Types Reference</a>.
3891
- * For WAF and Shield Advanced, examples include
3892
- * <code>AWS::ElasticLoadBalancingV2::LoadBalancer</code> and
3893
- * <code>AWS::CloudFront::Distribution</code>. For a security group common policy, valid values
3894
- * are <code>AWS::EC2::NetworkInterface</code> and <code>AWS::EC2::Instance</code>. For a
3895
- * security group content audit policy, valid values are <code>AWS::EC2::SecurityGroup</code>,
3896
- * <code>AWS::EC2::NetworkInterface</code>, and <code>AWS::EC2::Instance</code>. For a security
3897
- * group usage audit policy, the value is <code>AWS::EC2::SecurityGroup</code>. For an Network Firewall policy or DNS Firewall policy,
3898
- * the value is <code>AWS::EC2::VPC</code>.</p>
4300
+ * in the <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-template-resource-type-ref.html">Amazon Web Services Resource Types Reference</a>. </p>
3899
4301
  * @public
3900
4302
  */
3901
4303
  ResourceType?: string;