@aws-sdk/client-fms 3.556.0 → 3.564.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/index.js +63 -1
- package/dist-es/models/models_0.js +16 -0
- package/dist-es/protocols/Aws_json1_1.js +43 -1
- package/dist-types/commands/GetAdminScopeCommand.d.ts +2 -2
- package/dist-types/commands/GetComplianceDetailCommand.d.ts +2 -23
- package/dist-types/commands/GetPolicyCommand.d.ts +41 -1
- package/dist-types/commands/GetProtectionStatusCommand.d.ts +1 -1
- package/dist-types/commands/GetViolationDetailsCommand.d.ts +147 -46
- package/dist-types/commands/ListPoliciesCommand.d.ts +1 -1
- package/dist-types/commands/PutAdminAccountCommand.d.ts +1 -1
- package/dist-types/commands/PutPolicyCommand.d.ts +93 -2
- package/dist-types/models/models_0.d.ts +426 -24
- package/dist-types/ts3.4/models/models_0.d.ts +97 -1
- package/package.json +2 -3
|
@@ -82,7 +82,7 @@ export interface AdminAccountSummary {
|
|
|
82
82
|
*/
|
|
83
83
|
DefaultAdmin?: boolean;
|
|
84
84
|
/**
|
|
85
|
-
* <p>The current status of the request to onboard a member account as an Firewall Manager
|
|
85
|
+
* <p>The current status of the request to onboard a member account as an Firewall Manager administrator.</p>
|
|
86
86
|
* <ul>
|
|
87
87
|
* <li>
|
|
88
88
|
* <p>
|
|
@@ -134,6 +134,7 @@ export interface OrganizationalUnitScope {
|
|
|
134
134
|
export declare const SecurityServiceType: {
|
|
135
135
|
readonly DNS_FIREWALL: "DNS_FIREWALL";
|
|
136
136
|
readonly IMPORT_NETWORK_FIREWALL: "IMPORT_NETWORK_FIREWALL";
|
|
137
|
+
readonly NETWORK_ACL_COMMON: "NETWORK_ACL_COMMON";
|
|
137
138
|
readonly NETWORK_FIREWALL: "NETWORK_FIREWALL";
|
|
138
139
|
readonly SECURITY_GROUPS_COMMON: "SECURITY_GROUPS_COMMON";
|
|
139
140
|
readonly SECURITY_GROUPS_CONTENT_AUDIT: "SECURITY_GROUPS_CONTENT_AUDIT";
|
|
@@ -712,7 +713,7 @@ export interface GetAdminAccountResponse {
|
|
|
712
713
|
*/
|
|
713
714
|
export interface GetAdminScopeRequest {
|
|
714
715
|
/**
|
|
715
|
-
* <p>The
|
|
716
|
+
* <p>The administrator account that you want to get the details for.</p>
|
|
716
717
|
* @public
|
|
717
718
|
*/
|
|
718
719
|
AdminAccount: string | undefined;
|
|
@@ -727,7 +728,7 @@ export interface GetAdminScopeResponse {
|
|
|
727
728
|
*/
|
|
728
729
|
AdminScope?: AdminScope;
|
|
729
730
|
/**
|
|
730
|
-
* <p>The current status of the request to onboard a member account as an Firewall Manager
|
|
731
|
+
* <p>The current status of the request to onboard a member account as an Firewall Manager administrator.</p>
|
|
731
732
|
* <ul>
|
|
732
733
|
* <li>
|
|
733
734
|
* <p>
|
|
@@ -823,6 +824,7 @@ export declare const ViolationReason: {
|
|
|
823
824
|
readonly FirewallSubnetMissingVPCEndpoint: "FIREWALL_SUBNET_MISSING_VPCE_ENDPOINT";
|
|
824
825
|
readonly InternetGatewayMissingExpectedRoute: "INTERNET_GATEWAY_MISSING_EXPECTED_ROUTE";
|
|
825
826
|
readonly InternetTrafficNotInspected: "INTERNET_TRAFFIC_NOT_INSPECTED";
|
|
827
|
+
readonly InvalidNetworkAclEntry: "INVALID_NETWORK_ACL_ENTRY";
|
|
826
828
|
readonly InvalidRouteConfiguration: "INVALID_ROUTE_CONFIGURATION";
|
|
827
829
|
readonly MissingExpectedRouteTable: "MISSING_EXPECTED_ROUTE_TABLE";
|
|
828
830
|
readonly MissingFirewall: "MISSING_FIREWALL";
|
|
@@ -1011,6 +1013,157 @@ export interface ResourceTag {
|
|
|
1011
1013
|
*/
|
|
1012
1014
|
Value?: string;
|
|
1013
1015
|
}
|
|
1016
|
+
/**
|
|
1017
|
+
* <p>ICMP protocol: The ICMP type and code.</p>
|
|
1018
|
+
* @public
|
|
1019
|
+
*/
|
|
1020
|
+
export interface NetworkAclIcmpTypeCode {
|
|
1021
|
+
/**
|
|
1022
|
+
* <p>ICMP code. </p>
|
|
1023
|
+
* @public
|
|
1024
|
+
*/
|
|
1025
|
+
Code?: number;
|
|
1026
|
+
/**
|
|
1027
|
+
* <p>ICMP type. </p>
|
|
1028
|
+
* @public
|
|
1029
|
+
*/
|
|
1030
|
+
Type?: number;
|
|
1031
|
+
}
|
|
1032
|
+
/**
|
|
1033
|
+
* <p>TCP or UDP protocols: The range of ports the rule applies to.</p>
|
|
1034
|
+
* @public
|
|
1035
|
+
*/
|
|
1036
|
+
export interface NetworkAclPortRange {
|
|
1037
|
+
/**
|
|
1038
|
+
* <p>The beginning port number of the range. </p>
|
|
1039
|
+
* @public
|
|
1040
|
+
*/
|
|
1041
|
+
From?: number;
|
|
1042
|
+
/**
|
|
1043
|
+
* <p>The ending port number of the range. </p>
|
|
1044
|
+
* @public
|
|
1045
|
+
*/
|
|
1046
|
+
To?: number;
|
|
1047
|
+
}
|
|
1048
|
+
/**
|
|
1049
|
+
* @public
|
|
1050
|
+
* @enum
|
|
1051
|
+
*/
|
|
1052
|
+
export declare const NetworkAclRuleAction: {
|
|
1053
|
+
readonly ALLOW: "allow";
|
|
1054
|
+
readonly DENY: "deny";
|
|
1055
|
+
};
|
|
1056
|
+
/**
|
|
1057
|
+
* @public
|
|
1058
|
+
*/
|
|
1059
|
+
export type NetworkAclRuleAction = (typeof NetworkAclRuleAction)[keyof typeof NetworkAclRuleAction];
|
|
1060
|
+
/**
|
|
1061
|
+
* <p>Describes a rule in a network ACL.</p>
|
|
1062
|
+
* <p>Each network ACL has a set of numbered ingress rules and a separate set of numbered egress rules. When determining
|
|
1063
|
+
* whether a packet should be allowed in or out of a subnet associated with the network ACL, Amazon Web Services processes the
|
|
1064
|
+
* entries in the network ACL according to the rule numbers, in ascending order. </p>
|
|
1065
|
+
* <p>When you manage an individual network ACL, you explicitly specify the rule numbers. When you specify the network ACL rules in a Firewall Manager policy,
|
|
1066
|
+
* you provide the rules to run first, in the order that you want them to run, and the rules to run last, in the order
|
|
1067
|
+
* that you want them to run. Firewall Manager assigns the rule numbers for you when you save the network ACL policy specification.</p>
|
|
1068
|
+
* @public
|
|
1069
|
+
*/
|
|
1070
|
+
export interface NetworkAclEntry {
|
|
1071
|
+
/**
|
|
1072
|
+
* <p>ICMP protocol: The ICMP type and code.</p>
|
|
1073
|
+
* @public
|
|
1074
|
+
*/
|
|
1075
|
+
IcmpTypeCode?: NetworkAclIcmpTypeCode;
|
|
1076
|
+
/**
|
|
1077
|
+
* <p>The protocol number. A value of "-1" means all protocols. </p>
|
|
1078
|
+
* @public
|
|
1079
|
+
*/
|
|
1080
|
+
Protocol: string | undefined;
|
|
1081
|
+
/**
|
|
1082
|
+
* <p>TCP or UDP protocols: The range of ports the rule applies to.</p>
|
|
1083
|
+
* @public
|
|
1084
|
+
*/
|
|
1085
|
+
PortRange?: NetworkAclPortRange;
|
|
1086
|
+
/**
|
|
1087
|
+
* <p>The IPv4 network range to allow or deny, in CIDR notation.</p>
|
|
1088
|
+
* @public
|
|
1089
|
+
*/
|
|
1090
|
+
CidrBlock?: string;
|
|
1091
|
+
/**
|
|
1092
|
+
* <p>The IPv6 network range to allow or deny, in CIDR notation.</p>
|
|
1093
|
+
* @public
|
|
1094
|
+
*/
|
|
1095
|
+
Ipv6CidrBlock?: string;
|
|
1096
|
+
/**
|
|
1097
|
+
* <p>Indicates whether to allow or deny the traffic that matches the rule.</p>
|
|
1098
|
+
* @public
|
|
1099
|
+
*/
|
|
1100
|
+
RuleAction: NetworkAclRuleAction | undefined;
|
|
1101
|
+
/**
|
|
1102
|
+
* <p>Indicates whether the rule is an egress, or outbound, rule (applied to traffic leaving the subnet). If it's not
|
|
1103
|
+
* an egress rule, then it's an ingress, or inbound, rule.</p>
|
|
1104
|
+
* @public
|
|
1105
|
+
*/
|
|
1106
|
+
Egress: boolean | undefined;
|
|
1107
|
+
}
|
|
1108
|
+
/**
|
|
1109
|
+
* <p>The configuration of the first and last rules for the network ACL policy, and the remediation settings for each. </p>
|
|
1110
|
+
* @public
|
|
1111
|
+
*/
|
|
1112
|
+
export interface NetworkAclEntrySet {
|
|
1113
|
+
/**
|
|
1114
|
+
* <p>The rules that you want to run first in the Firewall Manager managed network ACLs. </p>
|
|
1115
|
+
* <note>
|
|
1116
|
+
* <p>Provide these in the order in which you want them to run. Firewall Manager will assign
|
|
1117
|
+
* the specific rule numbers for you, in the network ACLs that it creates. </p>
|
|
1118
|
+
* </note>
|
|
1119
|
+
* @public
|
|
1120
|
+
*/
|
|
1121
|
+
FirstEntries?: NetworkAclEntry[];
|
|
1122
|
+
/**
|
|
1123
|
+
* <p>Applies only when remediation is enabled for the policy as a whole. Firewall Manager uses this setting when it finds policy
|
|
1124
|
+
* violations that involve conflicts between the custom entries and the policy entries. </p>
|
|
1125
|
+
* <p>If forced remediation is disabled, Firewall Manager marks the network ACL as noncompliant and does not try to
|
|
1126
|
+
* remediate. For more information about the remediation behavior, see
|
|
1127
|
+
* <a href="https://docs.aws.amazon.com/waf/latest/developerguide/network-acl-policies.html">Network access control list (ACL) policies</a>
|
|
1128
|
+
* in the <i>Firewall Manager Developer Guide</i>.</p>
|
|
1129
|
+
* @public
|
|
1130
|
+
*/
|
|
1131
|
+
ForceRemediateForFirstEntries: boolean | undefined;
|
|
1132
|
+
/**
|
|
1133
|
+
* <p>The rules that you want to run last in the Firewall Manager managed network ACLs. </p>
|
|
1134
|
+
* <note>
|
|
1135
|
+
* <p>Provide these in the order in which you want them to run. Firewall Manager will assign
|
|
1136
|
+
* the specific rule numbers for you, in the network ACLs that it creates. </p>
|
|
1137
|
+
* </note>
|
|
1138
|
+
* @public
|
|
1139
|
+
*/
|
|
1140
|
+
LastEntries?: NetworkAclEntry[];
|
|
1141
|
+
/**
|
|
1142
|
+
* <p>Applies only when remediation is enabled for the policy as a whole. Firewall Manager uses this setting when it finds policy
|
|
1143
|
+
* violations that involve conflicts between the custom entries and the policy entries. </p>
|
|
1144
|
+
* <p>If forced remediation is disabled, Firewall Manager marks the network ACL as noncompliant and does not try to
|
|
1145
|
+
* remediate. For more information about the remediation behavior, see
|
|
1146
|
+
* <a href="https://docs.aws.amazon.com/waf/latest/developerguide/network-acl-policies.html">Network access control list (ACL) policies</a>
|
|
1147
|
+
* in the <i>Firewall Manager Developer Guide</i>.</p>
|
|
1148
|
+
* @public
|
|
1149
|
+
*/
|
|
1150
|
+
ForceRemediateForLastEntries: boolean | undefined;
|
|
1151
|
+
}
|
|
1152
|
+
/**
|
|
1153
|
+
* <p>Defines a Firewall Manager network ACL policy. This is used in the <code>PolicyOption</code> of a <code>SecurityServicePolicyData</code> for a <code>Policy</code>, when
|
|
1154
|
+
* the <code>SecurityServicePolicyData</code> type is set to <code>NETWORK_ACL_COMMON</code>. </p>
|
|
1155
|
+
* <p>For information about network ACLs, see
|
|
1156
|
+
* <a href="https://docs.aws.amazon.com/vpc/latest/userguide/vpc-network-acls.html">Control traffic to subnets using network ACLs</a>
|
|
1157
|
+
* in the <i>Amazon Virtual Private Cloud User Guide</i>. </p>
|
|
1158
|
+
* @public
|
|
1159
|
+
*/
|
|
1160
|
+
export interface NetworkAclCommonPolicy {
|
|
1161
|
+
/**
|
|
1162
|
+
* <p>The definition of the first and last rules for the network ACL policy. </p>
|
|
1163
|
+
* @public
|
|
1164
|
+
*/
|
|
1165
|
+
NetworkAclEntrySet: NetworkAclEntrySet | undefined;
|
|
1166
|
+
}
|
|
1014
1167
|
/**
|
|
1015
1168
|
* @public
|
|
1016
1169
|
* @enum
|
|
@@ -1050,7 +1203,7 @@ export interface ThirdPartyFirewallPolicy {
|
|
|
1050
1203
|
FirewallDeploymentModel?: FirewallDeploymentModel;
|
|
1051
1204
|
}
|
|
1052
1205
|
/**
|
|
1053
|
-
* <p>Contains the
|
|
1206
|
+
* <p>Contains the settings to configure a network ACL policy, a Network Firewall firewall policy deployment model, or a third-party firewall policy.</p>
|
|
1054
1207
|
* @public
|
|
1055
1208
|
*/
|
|
1056
1209
|
export interface PolicyOption {
|
|
@@ -1064,6 +1217,11 @@ export interface PolicyOption {
|
|
|
1064
1217
|
* @public
|
|
1065
1218
|
*/
|
|
1066
1219
|
ThirdPartyFirewallPolicy?: ThirdPartyFirewallPolicy;
|
|
1220
|
+
/**
|
|
1221
|
+
* <p>Defines a Firewall Manager network ACL policy. </p>
|
|
1222
|
+
* @public
|
|
1223
|
+
*/
|
|
1224
|
+
NetworkAclCommonPolicy?: NetworkAclCommonPolicy;
|
|
1067
1225
|
}
|
|
1068
1226
|
/**
|
|
1069
1227
|
* <p>Details about the security service that is being used to protect the resources.</p>
|
|
@@ -1182,7 +1340,7 @@ export interface SecurityServicePolicyData {
|
|
|
1182
1340
|
* Firewall Manager automatically distributes tags from the primary group to the security groups created by this policy. To use security group tag distribution, you must also set <code>revertManualSecurityGroupChanges</code> to <code>true</code>, otherwise Firewall Manager won't be able to create the policy. When you enable <code>revertManualSecurityGroupChanges</code>, Firewall Manager identifies and reports when the security groups created by this policy become non-compliant.
|
|
1183
1341
|
* </p>
|
|
1184
1342
|
* <p>
|
|
1185
|
-
* Firewall Manager won't
|
|
1343
|
+
* Firewall Manager won't distribute system tags added by Amazon Web Services services into the replica security groups. System tags begin with the <code>aws:</code> prefix.
|
|
1186
1344
|
* </p>
|
|
1187
1345
|
* </li>
|
|
1188
1346
|
* <li>
|
|
@@ -1349,8 +1507,7 @@ export interface SecurityServicePolicyData {
|
|
|
1349
1507
|
*/
|
|
1350
1508
|
ManagedServiceData?: string;
|
|
1351
1509
|
/**
|
|
1352
|
-
* <p>Contains the Network Firewall firewall policy
|
|
1353
|
-
* model.</p>
|
|
1510
|
+
* <p>Contains the settings to configure a network ACL policy, a Network Firewall firewall policy deployment model, or a third-party firewall policy.</p>
|
|
1354
1511
|
* @public
|
|
1355
1512
|
*/
|
|
1356
1513
|
PolicyOption?: PolicyOption;
|
|
@@ -1397,16 +1554,19 @@ export interface Policy {
|
|
|
1397
1554
|
* <p>WAF - <code>AWS::ApiGateway::Stage</code>, <code>AWS::ElasticLoadBalancingV2::LoadBalancer</code>, and <code>AWS::CloudFront::Distribution</code>.</p>
|
|
1398
1555
|
* </li>
|
|
1399
1556
|
* <li>
|
|
1400
|
-
* <p>
|
|
1557
|
+
* <p>Shield Advanced - <code>AWS::ElasticLoadBalancingV2::LoadBalancer</code>, <code>AWS::ElasticLoadBalancing::LoadBalancer</code>, <code>AWS::EC2::EIP</code>, and <code>AWS::CloudFront::Distribution</code>.</p>
|
|
1401
1558
|
* </li>
|
|
1402
1559
|
* <li>
|
|
1403
|
-
* <p>
|
|
1560
|
+
* <p>Network ACL - <code>AWS::EC2::Subnet</code>.</p>
|
|
1561
|
+
* </li>
|
|
1562
|
+
* <li>
|
|
1563
|
+
* <p>Security group usage audit - <code>AWS::EC2::SecurityGroup</code>.</p>
|
|
1404
1564
|
* </li>
|
|
1405
1565
|
* <li>
|
|
1406
1566
|
* <p>Security group content audit - <code>AWS::EC2::SecurityGroup</code>, <code>AWS::EC2::NetworkInterface</code>, and <code>AWS::EC2::Instance</code>.</p>
|
|
1407
1567
|
* </li>
|
|
1408
1568
|
* <li>
|
|
1409
|
-
* <p>
|
|
1569
|
+
* <p>DNS Firewall, Network Firewall, and third-party firewall - <code>AWS::EC2::VPC</code>.</p>
|
|
1410
1570
|
* </li>
|
|
1411
1571
|
* </ul>
|
|
1412
1572
|
* @public
|
|
@@ -1904,6 +2064,9 @@ export interface GetViolationDetailsRequest {
|
|
|
1904
2064
|
* <p>Security group content audit</p>
|
|
1905
2065
|
* </li>
|
|
1906
2066
|
* <li>
|
|
2067
|
+
* <p>Network ACL</p>
|
|
2068
|
+
* </li>
|
|
2069
|
+
* <li>
|
|
1907
2070
|
* <p>Third-party firewall</p>
|
|
1908
2071
|
* </li>
|
|
1909
2072
|
* </ul>
|
|
@@ -2194,6 +2357,129 @@ export interface FirewallSubnetMissingVPCEndpointViolation {
|
|
|
2194
2357
|
*/
|
|
2195
2358
|
SubnetAvailabilityZoneId?: string;
|
|
2196
2359
|
}
|
|
2360
|
+
/**
|
|
2361
|
+
* @public
|
|
2362
|
+
* @enum
|
|
2363
|
+
*/
|
|
2364
|
+
export declare const EntryType: {
|
|
2365
|
+
readonly CustomEntry: "CUSTOM_ENTRY";
|
|
2366
|
+
readonly FMSManagedFirstEntry: "FMS_MANAGED_FIRST_ENTRY";
|
|
2367
|
+
readonly FMSManagedLastEntry: "FMS_MANAGED_LAST_ENTRY";
|
|
2368
|
+
};
|
|
2369
|
+
/**
|
|
2370
|
+
* @public
|
|
2371
|
+
*/
|
|
2372
|
+
export type EntryType = (typeof EntryType)[keyof typeof EntryType];
|
|
2373
|
+
/**
|
|
2374
|
+
* <p>Describes a single rule in a network ACL.</p>
|
|
2375
|
+
* @public
|
|
2376
|
+
*/
|
|
2377
|
+
export interface EntryDescription {
|
|
2378
|
+
/**
|
|
2379
|
+
* <p>Describes a rule in a network ACL.</p>
|
|
2380
|
+
* <p>Each network ACL has a set of numbered ingress rules and a separate set of numbered egress rules. When determining
|
|
2381
|
+
* whether a packet should be allowed in or out of a subnet associated with the network ACL, Amazon Web Services processes the
|
|
2382
|
+
* entries in the network ACL according to the rule numbers, in ascending order. </p>
|
|
2383
|
+
* <p>When you manage an individual network ACL, you explicitly specify the rule numbers. When you specify the network ACL rules in a Firewall Manager policy,
|
|
2384
|
+
* you provide the rules to run first, in the order that you want them to run, and the rules to run last, in the order
|
|
2385
|
+
* that you want them to run. Firewall Manager assigns the rule numbers for you when you save the network ACL policy specification.</p>
|
|
2386
|
+
* @public
|
|
2387
|
+
*/
|
|
2388
|
+
EntryDetail?: NetworkAclEntry;
|
|
2389
|
+
/**
|
|
2390
|
+
* <p>The rule number for the entry. ACL entries are processed in ascending order by rule number. In a Firewall Manager network ACL policy, Firewall Manager
|
|
2391
|
+
* assigns rule numbers. </p>
|
|
2392
|
+
* @public
|
|
2393
|
+
*/
|
|
2394
|
+
EntryRuleNumber?: number;
|
|
2395
|
+
/**
|
|
2396
|
+
* <p>Specifies whether the entry is managed by Firewall Manager or by a user, and, for Firewall Manager-managed entries, specifies whether the entry
|
|
2397
|
+
* is among those that run first in the network ACL or those that run last. </p>
|
|
2398
|
+
* @public
|
|
2399
|
+
*/
|
|
2400
|
+
EntryType?: EntryType;
|
|
2401
|
+
}
|
|
2402
|
+
/**
|
|
2403
|
+
* @public
|
|
2404
|
+
* @enum
|
|
2405
|
+
*/
|
|
2406
|
+
export declare const EntryViolationReason: {
|
|
2407
|
+
readonly EntryConflict: "ENTRY_CONFLICT";
|
|
2408
|
+
readonly IncorrectEntryOrder: "INCORRECT_ENTRY_ORDER";
|
|
2409
|
+
readonly MissingExpectedEntry: "MISSING_EXPECTED_ENTRY";
|
|
2410
|
+
};
|
|
2411
|
+
/**
|
|
2412
|
+
* @public
|
|
2413
|
+
*/
|
|
2414
|
+
export type EntryViolationReason = (typeof EntryViolationReason)[keyof typeof EntryViolationReason];
|
|
2415
|
+
/**
|
|
2416
|
+
* <p>Detailed information about an entry violation in a network ACL. The violation is against the network ACL specification inside the
|
|
2417
|
+
* Firewall Manager network ACL policy. This data object is part of <code>InvalidNetworkAclEntriesViolation</code>.</p>
|
|
2418
|
+
* @public
|
|
2419
|
+
*/
|
|
2420
|
+
export interface EntryViolation {
|
|
2421
|
+
/**
|
|
2422
|
+
* <p>The Firewall Manager-managed network ACL entry that is involved in the entry violation. </p>
|
|
2423
|
+
* @public
|
|
2424
|
+
*/
|
|
2425
|
+
ExpectedEntry?: EntryDescription;
|
|
2426
|
+
/**
|
|
2427
|
+
* <p>The evaluation location within the ordered list of entries where the <code>ExpectedEntry</code> should be, according to the network ACL policy specifications. </p>
|
|
2428
|
+
* @public
|
|
2429
|
+
*/
|
|
2430
|
+
ExpectedEvaluationOrder?: string;
|
|
2431
|
+
/**
|
|
2432
|
+
* <p>The evaluation location within the ordered list of entries where the <code>ExpectedEntry</code> is currently located. </p>
|
|
2433
|
+
* @public
|
|
2434
|
+
*/
|
|
2435
|
+
ActualEvaluationOrder?: string;
|
|
2436
|
+
/**
|
|
2437
|
+
* <p>The entry that's currently in the <code>ExpectedEvaluationOrder</code> location, in place of the expected entry. </p>
|
|
2438
|
+
* @public
|
|
2439
|
+
*/
|
|
2440
|
+
EntryAtExpectedEvaluationOrder?: EntryDescription;
|
|
2441
|
+
/**
|
|
2442
|
+
* <p>The list of entries that are in conflict with <code>ExpectedEntry</code>. </p>
|
|
2443
|
+
* @public
|
|
2444
|
+
*/
|
|
2445
|
+
EntriesWithConflicts?: EntryDescription[];
|
|
2446
|
+
/**
|
|
2447
|
+
* <p>Descriptions of the violations that Firewall Manager found for these entries. </p>
|
|
2448
|
+
* @public
|
|
2449
|
+
*/
|
|
2450
|
+
EntryViolationReasons?: EntryViolationReason[];
|
|
2451
|
+
}
|
|
2452
|
+
/**
|
|
2453
|
+
* <p>Violation detail for the entries in a network ACL resource.</p>
|
|
2454
|
+
* @public
|
|
2455
|
+
*/
|
|
2456
|
+
export interface InvalidNetworkAclEntriesViolation {
|
|
2457
|
+
/**
|
|
2458
|
+
* <p>The VPC where the violation was found. </p>
|
|
2459
|
+
* @public
|
|
2460
|
+
*/
|
|
2461
|
+
Vpc?: string;
|
|
2462
|
+
/**
|
|
2463
|
+
* <p>The subnet that's associated with the network ACL.</p>
|
|
2464
|
+
* @public
|
|
2465
|
+
*/
|
|
2466
|
+
Subnet?: string;
|
|
2467
|
+
/**
|
|
2468
|
+
* <p>The Availability Zone where the network ACL is in use. </p>
|
|
2469
|
+
* @public
|
|
2470
|
+
*/
|
|
2471
|
+
SubnetAvailabilityZone?: string;
|
|
2472
|
+
/**
|
|
2473
|
+
* <p>The network ACL containing the entry violations. </p>
|
|
2474
|
+
* @public
|
|
2475
|
+
*/
|
|
2476
|
+
CurrentAssociatedNetworkAcl?: string;
|
|
2477
|
+
/**
|
|
2478
|
+
* <p>Detailed information about the entry violations in the network ACL. </p>
|
|
2479
|
+
* @public
|
|
2480
|
+
*/
|
|
2481
|
+
EntryViolations?: EntryViolation[];
|
|
2482
|
+
}
|
|
2197
2483
|
/**
|
|
2198
2484
|
* @public
|
|
2199
2485
|
* @enum
|
|
@@ -2835,6 +3121,79 @@ export interface NetworkFirewallUnexpectedGatewayRoutesViolation {
|
|
|
2835
3121
|
*/
|
|
2836
3122
|
VpcId?: string;
|
|
2837
3123
|
}
|
|
3124
|
+
/**
|
|
3125
|
+
* <p>Information about the <code>CreateNetworkAcl</code> action in Amazon EC2. This is a remediation option in <code>RemediationAction</code>.</p>
|
|
3126
|
+
* @public
|
|
3127
|
+
*/
|
|
3128
|
+
export interface CreateNetworkAclAction {
|
|
3129
|
+
/**
|
|
3130
|
+
* <p>Brief description of this remediation action. </p>
|
|
3131
|
+
* @public
|
|
3132
|
+
*/
|
|
3133
|
+
Description?: string;
|
|
3134
|
+
/**
|
|
3135
|
+
* <p>The VPC that's associated with the remediation action.</p>
|
|
3136
|
+
* @public
|
|
3137
|
+
*/
|
|
3138
|
+
Vpc?: ActionTarget;
|
|
3139
|
+
/**
|
|
3140
|
+
* <p>Indicates whether it is possible for Firewall Manager to perform this remediation action. A false value indicates that auto remediation is disabled or Firewall Manager is unable to perform the action due to a conflict of some kind.</p>
|
|
3141
|
+
* @public
|
|
3142
|
+
*/
|
|
3143
|
+
FMSCanRemediate?: boolean;
|
|
3144
|
+
}
|
|
3145
|
+
/**
|
|
3146
|
+
* <p>Information about the <code>CreateNetworkAclEntries</code> action in Amazon EC2. This is a remediation option in <code>RemediationAction</code>.</p>
|
|
3147
|
+
* @public
|
|
3148
|
+
*/
|
|
3149
|
+
export interface CreateNetworkAclEntriesAction {
|
|
3150
|
+
/**
|
|
3151
|
+
* <p>Brief description of this remediation action. </p>
|
|
3152
|
+
* @public
|
|
3153
|
+
*/
|
|
3154
|
+
Description?: string;
|
|
3155
|
+
/**
|
|
3156
|
+
* <p>The network ACL that's associated with the remediation action.</p>
|
|
3157
|
+
* @public
|
|
3158
|
+
*/
|
|
3159
|
+
NetworkAclId?: ActionTarget;
|
|
3160
|
+
/**
|
|
3161
|
+
* <p>Lists the entries that the remediation action would create.</p>
|
|
3162
|
+
* @public
|
|
3163
|
+
*/
|
|
3164
|
+
NetworkAclEntriesToBeCreated?: EntryDescription[];
|
|
3165
|
+
/**
|
|
3166
|
+
* <p>Indicates whether it is possible for Firewall Manager to perform this remediation action. A false value indicates that auto remediation is disabled or Firewall Manager is unable to perform the action due to a conflict of some kind.</p>
|
|
3167
|
+
* @public
|
|
3168
|
+
*/
|
|
3169
|
+
FMSCanRemediate?: boolean;
|
|
3170
|
+
}
|
|
3171
|
+
/**
|
|
3172
|
+
* <p>Information about the <code>DeleteNetworkAclEntries</code> action in Amazon EC2. This is a remediation option in <code>RemediationAction</code>. </p>
|
|
3173
|
+
* @public
|
|
3174
|
+
*/
|
|
3175
|
+
export interface DeleteNetworkAclEntriesAction {
|
|
3176
|
+
/**
|
|
3177
|
+
* <p>Brief description of this remediation action. </p>
|
|
3178
|
+
* @public
|
|
3179
|
+
*/
|
|
3180
|
+
Description?: string;
|
|
3181
|
+
/**
|
|
3182
|
+
* <p>The network ACL that's associated with the remediation action.</p>
|
|
3183
|
+
* @public
|
|
3184
|
+
*/
|
|
3185
|
+
NetworkAclId?: ActionTarget;
|
|
3186
|
+
/**
|
|
3187
|
+
* <p>Lists the entries that the remediation action would delete.</p>
|
|
3188
|
+
* @public
|
|
3189
|
+
*/
|
|
3190
|
+
NetworkAclEntriesToBeDeleted?: EntryDescription[];
|
|
3191
|
+
/**
|
|
3192
|
+
* <p>Indicates whether it is possible for Firewall Manager to perform this remediation action. A false value indicates that auto remediation is disabled or Firewall Manager is unable to perform the action due to a conflict of some kind.</p>
|
|
3193
|
+
* @public
|
|
3194
|
+
*/
|
|
3195
|
+
FMSCanRemediate?: boolean;
|
|
3196
|
+
}
|
|
2838
3197
|
/**
|
|
2839
3198
|
* <p>The action of associating an EC2 resource, such as a subnet or internet gateway, with a route table.</p>
|
|
2840
3199
|
* @public
|
|
@@ -3047,6 +3406,32 @@ export interface FMSPolicyUpdateFirewallCreationConfigAction {
|
|
|
3047
3406
|
*/
|
|
3048
3407
|
FirewallCreationConfig?: string;
|
|
3049
3408
|
}
|
|
3409
|
+
/**
|
|
3410
|
+
* <p>Information about the <code>ReplaceNetworkAclAssociation</code> action in Amazon EC2. This is a remediation option in <code>RemediationAction</code>.</p>
|
|
3411
|
+
* @public
|
|
3412
|
+
*/
|
|
3413
|
+
export interface ReplaceNetworkAclAssociationAction {
|
|
3414
|
+
/**
|
|
3415
|
+
* <p>Brief description of this remediation action. </p>
|
|
3416
|
+
* @public
|
|
3417
|
+
*/
|
|
3418
|
+
Description?: string;
|
|
3419
|
+
/**
|
|
3420
|
+
* <p>Describes a remediation action target.</p>
|
|
3421
|
+
* @public
|
|
3422
|
+
*/
|
|
3423
|
+
AssociationId?: ActionTarget;
|
|
3424
|
+
/**
|
|
3425
|
+
* <p>The network ACL that's associated with the remediation action.</p>
|
|
3426
|
+
* @public
|
|
3427
|
+
*/
|
|
3428
|
+
NetworkAclId?: ActionTarget;
|
|
3429
|
+
/**
|
|
3430
|
+
* <p>Indicates whether it is possible for Firewall Manager to perform this remediation action. A false value indicates that auto remediation is disabled or Firewall Manager is unable to perform the action due to a conflict of some kind.</p>
|
|
3431
|
+
* @public
|
|
3432
|
+
*/
|
|
3433
|
+
FMSCanRemediate?: boolean;
|
|
3434
|
+
}
|
|
3050
3435
|
/**
|
|
3051
3436
|
* <p>Information about an individual action you can take to remediate a violation.</p>
|
|
3052
3437
|
* @public
|
|
@@ -3097,6 +3482,26 @@ export interface RemediationAction {
|
|
|
3097
3482
|
* @public
|
|
3098
3483
|
*/
|
|
3099
3484
|
FMSPolicyUpdateFirewallCreationConfigAction?: FMSPolicyUpdateFirewallCreationConfigAction;
|
|
3485
|
+
/**
|
|
3486
|
+
* <p>Information about the <code>CreateNetworkAcl</code> action in Amazon EC2.</p>
|
|
3487
|
+
* @public
|
|
3488
|
+
*/
|
|
3489
|
+
CreateNetworkAclAction?: CreateNetworkAclAction;
|
|
3490
|
+
/**
|
|
3491
|
+
* <p>Information about the <code>ReplaceNetworkAclAssociation</code> action in Amazon EC2. </p>
|
|
3492
|
+
* @public
|
|
3493
|
+
*/
|
|
3494
|
+
ReplaceNetworkAclAssociationAction?: ReplaceNetworkAclAssociationAction;
|
|
3495
|
+
/**
|
|
3496
|
+
* <p>Information about the <code>CreateNetworkAclEntries</code> action in Amazon EC2.</p>
|
|
3497
|
+
* @public
|
|
3498
|
+
*/
|
|
3499
|
+
CreateNetworkAclEntriesAction?: CreateNetworkAclEntriesAction;
|
|
3500
|
+
/**
|
|
3501
|
+
* <p>Information about the <code>DeleteNetworkAclEntries</code> action in Amazon EC2.</p>
|
|
3502
|
+
* @public
|
|
3503
|
+
*/
|
|
3504
|
+
DeleteNetworkAclEntriesAction?: DeleteNetworkAclEntriesAction;
|
|
3100
3505
|
}
|
|
3101
3506
|
/**
|
|
3102
3507
|
* <p>An ordered list of actions you can take to remediate a violation.</p>
|
|
@@ -3393,11 +3798,6 @@ export interface ResourceViolation {
|
|
|
3393
3798
|
* @public
|
|
3394
3799
|
*/
|
|
3395
3800
|
DnsRuleGroupLimitExceededViolation?: DnsRuleGroupLimitExceededViolation;
|
|
3396
|
-
/**
|
|
3397
|
-
* <p>A list of possible remediation action lists. Each individual possible remediation action is a list of individual remediation actions.</p>
|
|
3398
|
-
* @public
|
|
3399
|
-
*/
|
|
3400
|
-
PossibleRemediationActions?: PossibleRemediationActions;
|
|
3401
3801
|
/**
|
|
3402
3802
|
* <p>Contains details about the firewall subnet that violates the policy scope.</p>
|
|
3403
3803
|
* @public
|
|
@@ -3428,6 +3828,16 @@ export interface ResourceViolation {
|
|
|
3428
3828
|
* @public
|
|
3429
3829
|
*/
|
|
3430
3830
|
FirewallSubnetMissingVPCEndpointViolation?: FirewallSubnetMissingVPCEndpointViolation;
|
|
3831
|
+
/**
|
|
3832
|
+
* <p>Violation detail for the entries in a network ACL resource.</p>
|
|
3833
|
+
* @public
|
|
3834
|
+
*/
|
|
3835
|
+
InvalidNetworkAclEntriesViolation?: InvalidNetworkAclEntriesViolation;
|
|
3836
|
+
/**
|
|
3837
|
+
* <p>A list of possible remediation action lists. Each individual possible remediation action is a list of individual remediation actions.</p>
|
|
3838
|
+
* @public
|
|
3839
|
+
*/
|
|
3840
|
+
PossibleRemediationActions?: PossibleRemediationActions;
|
|
3431
3841
|
}
|
|
3432
3842
|
/**
|
|
3433
3843
|
* <p>Violations for a resource based on the specified Firewall Manager policy and Amazon Web Services account.</p>
|
|
@@ -3887,15 +4297,7 @@ export interface PolicySummary {
|
|
|
3887
4297
|
PolicyName?: string;
|
|
3888
4298
|
/**
|
|
3889
4299
|
* <p>The type of resource protected by or in scope of the policy. This is in the format shown
|
|
3890
|
-
* in the <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-template-resource-type-ref.html">Amazon Web Services Resource Types Reference</a>.
|
|
3891
|
-
* For WAF and Shield Advanced, examples include
|
|
3892
|
-
* <code>AWS::ElasticLoadBalancingV2::LoadBalancer</code> and
|
|
3893
|
-
* <code>AWS::CloudFront::Distribution</code>. For a security group common policy, valid values
|
|
3894
|
-
* are <code>AWS::EC2::NetworkInterface</code> and <code>AWS::EC2::Instance</code>. For a
|
|
3895
|
-
* security group content audit policy, valid values are <code>AWS::EC2::SecurityGroup</code>,
|
|
3896
|
-
* <code>AWS::EC2::NetworkInterface</code>, and <code>AWS::EC2::Instance</code>. For a security
|
|
3897
|
-
* group usage audit policy, the value is <code>AWS::EC2::SecurityGroup</code>. For an Network Firewall policy or DNS Firewall policy,
|
|
3898
|
-
* the value is <code>AWS::EC2::VPC</code>.</p>
|
|
4300
|
+
* in the <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-template-resource-type-ref.html">Amazon Web Services Resource Types Reference</a>. </p>
|
|
3899
4301
|
* @public
|
|
3900
4302
|
*/
|
|
3901
4303
|
ResourceType?: string;
|