@aws-sdk/client-fms 3.58.0 → 3.60.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (58) hide show
  1. package/CHANGELOG.md +11 -0
  2. package/README.md +6 -6
  3. package/dist-cjs/FMS.js +60 -0
  4. package/dist-cjs/commands/AssociateThirdPartyFirewallCommand.js +36 -0
  5. package/dist-cjs/commands/DisassociateThirdPartyFirewallCommand.js +36 -0
  6. package/dist-cjs/commands/GetThirdPartyFirewallAssociationStatusCommand.js +36 -0
  7. package/dist-cjs/commands/ListThirdPartyFirewallFirewallPoliciesCommand.js +36 -0
  8. package/dist-cjs/commands/index.js +4 -0
  9. package/dist-cjs/models/models_0.js +108 -3
  10. package/dist-cjs/pagination/ListThirdPartyFirewallFirewallPoliciesPaginator.js +35 -0
  11. package/dist-cjs/pagination/index.js +1 -0
  12. package/dist-cjs/protocols/Aws_json1_1.js +356 -2
  13. package/dist-es/FMS.js +60 -0
  14. package/dist-es/commands/AssociateThirdPartyFirewallCommand.js +39 -0
  15. package/dist-es/commands/DisassociateThirdPartyFirewallCommand.js +39 -0
  16. package/dist-es/commands/GetThirdPartyFirewallAssociationStatusCommand.js +39 -0
  17. package/dist-es/commands/ListThirdPartyFirewallFirewallPoliciesCommand.js +39 -0
  18. package/dist-es/commands/index.js +4 -0
  19. package/dist-es/models/models_0.js +77 -0
  20. package/dist-es/pagination/ListThirdPartyFirewallFirewallPoliciesPaginator.js +74 -0
  21. package/dist-es/pagination/index.js +1 -0
  22. package/dist-es/protocols/Aws_json1_1.js +414 -1
  23. package/dist-types/FMS.d.ts +84 -59
  24. package/dist-types/FMSClient.d.ts +12 -8
  25. package/dist-types/commands/AssociateAdminAccountCommand.d.ts +4 -5
  26. package/dist-types/commands/AssociateThirdPartyFirewallCommand.d.ts +35 -0
  27. package/dist-types/commands/DeleteNotificationChannelCommand.d.ts +2 -2
  28. package/dist-types/commands/DisassociateAdminAccountCommand.d.ts +3 -3
  29. package/dist-types/commands/DisassociateThirdPartyFirewallCommand.d.ts +35 -0
  30. package/dist-types/commands/GetAdminAccountCommand.d.ts +2 -2
  31. package/dist-types/commands/GetComplianceDetailCommand.d.ts +13 -13
  32. package/dist-types/commands/GetNotificationChannelCommand.d.ts +2 -2
  33. package/dist-types/commands/GetProtectionStatusCommand.d.ts +1 -2
  34. package/dist-types/commands/GetThirdPartyFirewallAssociationStatusCommand.d.ts +35 -0
  35. package/dist-types/commands/GetViolationDetailsCommand.d.ts +1 -2
  36. package/dist-types/commands/ListComplianceStatusCommand.d.ts +2 -2
  37. package/dist-types/commands/ListMemberAccountsCommand.d.ts +2 -2
  38. package/dist-types/commands/ListTagsForResourceCommand.d.ts +1 -1
  39. package/dist-types/commands/ListThirdPartyFirewallFirewallPoliciesCommand.d.ts +35 -0
  40. package/dist-types/commands/PutNotificationChannelCommand.d.ts +5 -6
  41. package/dist-types/commands/PutPolicyCommand.d.ts +12 -11
  42. package/dist-types/commands/index.d.ts +4 -0
  43. package/dist-types/models/models_0.d.ts +808 -518
  44. package/dist-types/pagination/ListThirdPartyFirewallFirewallPoliciesPaginator.d.ts +4 -0
  45. package/dist-types/pagination/index.d.ts +1 -0
  46. package/dist-types/protocols/Aws_json1_1.d.ts +12 -0
  47. package/dist-types/ts3.4/FMS.d.ts +20 -0
  48. package/dist-types/ts3.4/FMSClient.d.ts +6 -2
  49. package/dist-types/ts3.4/commands/AssociateThirdPartyFirewallCommand.d.ts +17 -0
  50. package/dist-types/ts3.4/commands/DisassociateThirdPartyFirewallCommand.d.ts +17 -0
  51. package/dist-types/ts3.4/commands/GetThirdPartyFirewallAssociationStatusCommand.d.ts +17 -0
  52. package/dist-types/ts3.4/commands/ListThirdPartyFirewallFirewallPoliciesCommand.d.ts +17 -0
  53. package/dist-types/ts3.4/commands/index.d.ts +4 -0
  54. package/dist-types/ts3.4/models/models_0.d.ts +183 -1
  55. package/dist-types/ts3.4/pagination/ListThirdPartyFirewallFirewallPoliciesPaginator.d.ts +4 -0
  56. package/dist-types/ts3.4/pagination/index.d.ts +1 -0
  57. package/dist-types/ts3.4/protocols/Aws_json1_1.d.ts +12 -0
  58. package/package.json +1 -1
@@ -35,9 +35,7 @@ export interface App {
35
35
  */
36
36
  AppName: string | undefined;
37
37
  /**
38
- * <p>The IP protocol name or number. The name can be one of <code>tcp</code>,
39
- * <code>udp</code>, or <code>icmp</code>. For information on possible numbers, see <a href="https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml">Protocol
40
- * Numbers</a>.</p>
38
+ * <p>The IP protocol name or number. The name can be one of <code>tcp</code>, <code>udp</code>, or <code>icmp</code>. For information on possible numbers, see <a href="https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml">Protocol Numbers</a>.</p>
41
39
  */
42
40
  Protocol: string | undefined;
43
41
  /**
@@ -64,9 +62,9 @@ export interface AppsListData {
64
62
  */
65
63
  ListName: string | undefined;
66
64
  /**
67
- * <p>A unique identifier for each update to the list. When you update the list, the update
68
- * token must match the token of the current version of the application list. You can retrieve
69
- * the update token by getting the list. </p>
65
+ * <p>A unique identifier for each update to the list. When you update
66
+ * the list, the update token must match the token of the current version of the application list.
67
+ * You can retrieve the update token by getting the list. </p>
70
68
  */
71
69
  ListUpdateToken?: string;
72
70
  /**
@@ -82,8 +80,7 @@ export interface AppsListData {
82
80
  */
83
81
  AppsList: App[] | undefined;
84
82
  /**
85
- * <p>A map of previous version numbers to their corresponding <code>App</code> object
86
- * arrays.</p>
83
+ * <p>A map of previous version numbers to their corresponding <code>App</code> object arrays.</p>
87
84
  */
88
85
  PreviousAppsList?: {
89
86
  [key: string]: App[];
@@ -124,8 +121,10 @@ export declare namespace AppsListDataSummary {
124
121
  }
125
122
  export interface AssociateAdminAccountRequest {
126
123
  /**
127
- * <p>The Amazon Web Services account ID to associate with Firewall Manager as the Firewall Manager administrator account.
128
- * This must be an Organizations member account. For more information about Organizations, see <a href="https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts.html">Managing the Amazon Web Services Accounts in Your Organization</a>. </p>
124
+ * <p>The Amazon Web Services account ID to associate with Firewall Manager as the Firewall Manager
125
+ * administrator account. This must be an Organizations member account.
126
+ * For more information about Organizations, see
127
+ * <a href="https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts.html">Managing the Amazon Web Services Accounts in Your Organization</a>. </p>
129
128
  */
130
129
  AdminAccount: string | undefined;
131
130
  }
@@ -136,8 +135,8 @@ export declare namespace AssociateAdminAccountRequest {
136
135
  const filterSensitiveLog: (obj: AssociateAdminAccountRequest) => any;
137
136
  }
138
137
  /**
139
- * <p>The operation failed because of a system problem, even though the request was valid.
140
- * Retry your request.</p>
138
+ * <p>The operation failed because of a system problem, even though the request was valid. Retry
139
+ * your request.</p>
141
140
  */
142
141
  export declare class InternalErrorException extends __BaseException {
143
142
  readonly name: "InternalErrorException";
@@ -161,11 +160,11 @@ export declare class InvalidInputException extends __BaseException {
161
160
  constructor(opts: __ExceptionOptionType<InvalidInputException, __BaseException>);
162
161
  }
163
162
  /**
164
- * <p>The operation failed because there was nothing to do or the operation wasn't possible.
165
- * For example, you might have submitted an <code>AssociateAdminAccount</code> request for an
166
- * account ID that was already set as the Firewall Manager administrator. Or you might have tried to
167
- * access a Region that's disabled by default, and that you need to enable for the Firewall Manager
168
- * administrator account and for Organizations before you can access it.</p>
163
+ * <p>The operation failed because there was nothing to do or the operation wasn't possible. For example, you might have
164
+ * submitted an <code>AssociateAdminAccount</code> request for an account ID that
165
+ * was already set as the Firewall Manager administrator. Or you might have tried to access a Region
166
+ * that's disabled by default, and that you need to enable for the Firewall Manager
167
+ * administrator account and for Organizations before you can access it.</p>
169
168
  */
170
169
  export declare class InvalidOperationException extends __BaseException {
171
170
  readonly name: "InvalidOperationException";
@@ -178,9 +177,9 @@ export declare class InvalidOperationException extends __BaseException {
178
177
  }
179
178
  /**
180
179
  * <p>The operation exceeds a resource limit, for example, the maximum number of
181
- * <code>policy</code> objects that you can create for an Amazon Web Services account. For more
182
- * information, see <a href="https://docs.aws.amazon.com/waf/latest/developerguide/fms-limits.html">Firewall Manager Limits</a> in the
183
- * <i>WAF Developer Guide</i>.</p>
180
+ * <code>policy</code> objects that you can create for an Amazon Web Services account. For more information,
181
+ * see <a href="https://docs.aws.amazon.com/waf/latest/developerguide/fms-limits.html">Firewall
182
+ * Manager Limits</a> in the <i>WAF Developer Guide</i>.</p>
184
183
  */
185
184
  export declare class LimitExceededException extends __BaseException {
186
185
  readonly name: "LimitExceededException";
@@ -203,6 +202,62 @@ export declare class ResourceNotFoundException extends __BaseException {
203
202
  */
204
203
  constructor(opts: __ExceptionOptionType<ResourceNotFoundException, __BaseException>);
205
204
  }
205
+ export declare enum ThirdPartyFirewall {
206
+ PALO_ALTO_NETWORKS_CLOUD_NGFW = "PALO_ALTO_NETWORKS_CLOUD_NGFW"
207
+ }
208
+ export interface AssociateThirdPartyFirewallRequest {
209
+ /**
210
+ * <p>The name of the third-party firewall vendor.</p>
211
+ */
212
+ ThirdPartyFirewall: ThirdPartyFirewall | string | undefined;
213
+ }
214
+ export declare namespace AssociateThirdPartyFirewallRequest {
215
+ /**
216
+ * @internal
217
+ */
218
+ const filterSensitiveLog: (obj: AssociateThirdPartyFirewallRequest) => any;
219
+ }
220
+ export declare enum ThirdPartyFirewallAssociationStatus {
221
+ NOT_EXIST = "NOT_EXIST",
222
+ OFFBOARDING = "OFFBOARDING",
223
+ OFFBOARD_COMPLETE = "OFFBOARD_COMPLETE",
224
+ ONBOARDING = "ONBOARDING",
225
+ ONBOARD_COMPLETE = "ONBOARD_COMPLETE"
226
+ }
227
+ export interface AssociateThirdPartyFirewallResponse {
228
+ /**
229
+ * <p>The current status for setting a Firewall Manager policy administrator's account as an administrator of the third-party firewall tenant.</p>
230
+ * <ul>
231
+ * <li>
232
+ * <p>
233
+ * <code>ONBOARDING</code> - The Firewall Manager policy administrator is being designated as a tenant administrator.</p>
234
+ * </li>
235
+ * <li>
236
+ * <p>
237
+ * <code>ONBOARD_COMPLETE</code> - The Firewall Manager policy administrator is designated as a tenant administrator.</p>
238
+ * </li>
239
+ * <li>
240
+ * <p>
241
+ * <code>OFFBOARDING</code> - The Firewall Manager policy administrator is being removed as a tenant administrator.</p>
242
+ * </li>
243
+ * <li>
244
+ * <p>
245
+ * <code>OFFBOARD_COMPLETE</code> - The Firewall Manager policy administrator has been removed as a tenant administrator.</p>
246
+ * </li>
247
+ * <li>
248
+ * <p>
249
+ * <code>NOT_EXIST</code> - The Firewall Manager policy administrator doesn't exist as a tenant administrator.</p>
250
+ * </li>
251
+ * </ul>
252
+ */
253
+ ThirdPartyFirewallStatus?: ThirdPartyFirewallAssociationStatus | string;
254
+ }
255
+ export declare namespace AssociateThirdPartyFirewallResponse {
256
+ /**
257
+ * @internal
258
+ */
259
+ const filterSensitiveLog: (obj: AssociateThirdPartyFirewallResponse) => any;
260
+ }
206
261
  /**
207
262
  * <p>Violation detail for network interfaces associated with an EC2 instance.</p>
208
263
  */
@@ -212,8 +267,7 @@ export interface AwsEc2NetworkInterfaceViolation {
212
267
  */
213
268
  ViolationTarget?: string;
214
269
  /**
215
- * <p>List of security groups that violate the rules specified in the primary security group
216
- * of the Firewall Manager policy.</p>
270
+ * <p>List of security groups that violate the rules specified in the primary security group of the Firewall Manager policy.</p>
217
271
  */
218
272
  ViolatingSecurityGroups?: string[];
219
273
  }
@@ -245,8 +299,7 @@ export declare namespace AwsEc2InstanceViolation {
245
299
  export interface DeleteAppsListRequest {
246
300
  /**
247
301
  * <p>The ID of the applications list that you want to delete. You can retrieve this ID from
248
- * <code>PutAppsList</code>, <code>ListAppsLists</code>, and
249
- * <code>GetAppsList</code>.</p>
302
+ * <code>PutAppsList</code>, <code>ListAppsLists</code>, and <code>GetAppsList</code>.</p>
250
303
  */
251
304
  ListId: string | undefined;
252
305
  }
@@ -267,7 +320,7 @@ export declare namespace DeleteNotificationChannelRequest {
267
320
  export interface DeletePolicyRequest {
268
321
  /**
269
322
  * <p>The ID of the policy that you want to delete. You can retrieve this ID from
270
- * <code>PutPolicy</code> and <code>ListPolicies</code>.</p>
323
+ * <code>PutPolicy</code> and <code>ListPolicies</code>.</p>
271
324
  */
272
325
  PolicyId: string | undefined;
273
326
  /**
@@ -284,23 +337,23 @@ export interface DeletePolicyRequest {
284
337
  * <p>Deletes web ACLs that contain no rules or rule groups</p>
285
338
  * </li>
286
339
  * </ul>
287
- * <p>For security group policies, the cleanup does the following for each security group
288
- * in the policy:</p>
340
+ * <p>For security group policies, the cleanup does the following for each security group in
341
+ * the policy:</p>
289
342
  * <ul>
290
343
  * <li>
291
344
  * <p>Disassociates the security group from in-scope resources </p>
292
345
  * </li>
293
346
  * <li>
294
- * <p>Deletes the security group if it was created through Firewall Manager and if it's no
295
- * longer associated with any resources through another policy</p>
347
+ * <p>Deletes the security group if it was created through Firewall Manager and if it's
348
+ * no longer associated with any resources through another policy</p>
296
349
  * </li>
297
350
  * </ul>
298
- * <p>After the cleanup, in-scope resources are no longer protected by web ACLs in this
299
- * policy. Protection of out-of-scope resources remains unchanged. Scope is determined by tags
300
- * that you create and accounts that you associate with the policy. When creating the policy,
301
- * if you specify that only resources in specific accounts or with specific tags are in scope
302
- * of the policy, those accounts and resources are handled by the policy. All others are out
303
- * of scope. If you don't specify tags or accounts, all resources are in scope. </p>
351
+ * <p>After the cleanup, in-scope resources are no longer protected by web ACLs in this policy.
352
+ * Protection of out-of-scope resources remains unchanged. Scope is determined by tags that you
353
+ * create and accounts that you associate with the policy. When creating the policy, if you
354
+ * specify that only resources in specific accounts or with specific tags are in scope of the
355
+ * policy, those accounts and resources are handled by the policy. All others are out of scope.
356
+ * If you don't specify tags or accounts, all resources are in scope. </p>
304
357
  */
305
358
  DeleteAllPolicyResources?: boolean;
306
359
  }
@@ -313,8 +366,7 @@ export declare namespace DeletePolicyRequest {
313
366
  export interface DeleteProtocolsListRequest {
314
367
  /**
315
368
  * <p>The ID of the protocols list that you want to delete. You can retrieve this ID from
316
- * <code>PutProtocolsList</code>, <code>ListProtocolsLists</code>, and
317
- * <code>GetProtocolsLost</code>.</p>
369
+ * <code>PutProtocolsList</code>, <code>ListProtocolsLists</code>, and <code>GetProtocolsLost</code>.</p>
318
370
  */
319
371
  ListId: string | undefined;
320
372
  }
@@ -332,6 +384,30 @@ export declare namespace DisassociateAdminAccountRequest {
332
384
  */
333
385
  const filterSensitiveLog: (obj: DisassociateAdminAccountRequest) => any;
334
386
  }
387
+ export interface DisassociateThirdPartyFirewallRequest {
388
+ /**
389
+ * <p>The name of the third-party firewall vendor.</p>
390
+ */
391
+ ThirdPartyFirewall: ThirdPartyFirewall | string | undefined;
392
+ }
393
+ export declare namespace DisassociateThirdPartyFirewallRequest {
394
+ /**
395
+ * @internal
396
+ */
397
+ const filterSensitiveLog: (obj: DisassociateThirdPartyFirewallRequest) => any;
398
+ }
399
+ export interface DisassociateThirdPartyFirewallResponse {
400
+ /**
401
+ * <p>The current status for the disassociation of a Firewall Manager administrators account with a third-party firewall.</p>
402
+ */
403
+ ThirdPartyFirewallStatus?: ThirdPartyFirewallAssociationStatus | string;
404
+ }
405
+ export declare namespace DisassociateThirdPartyFirewallResponse {
406
+ /**
407
+ * @internal
408
+ */
409
+ const filterSensitiveLog: (obj: DisassociateThirdPartyFirewallResponse) => any;
410
+ }
335
411
  export interface GetAdminAccountRequest {
336
412
  }
337
413
  export declare namespace GetAdminAccountRequest {
@@ -346,7 +422,8 @@ export interface GetAdminAccountResponse {
346
422
  */
347
423
  AdminAccount?: string;
348
424
  /**
349
- * <p>The status of the Amazon Web Services account that you set as the Firewall Manager administrator.</p>
425
+ * <p>The status of the Amazon Web Services account that you set as the Firewall Manager
426
+ * administrator.</p>
350
427
  */
351
428
  RoleStatus?: AccountRoleStatus | string;
352
429
  }
@@ -391,7 +468,7 @@ export declare namespace GetAppsListResponse {
391
468
  export interface GetComplianceDetailRequest {
392
469
  /**
393
470
  * <p>The ID of the policy that you want to get the details for. <code>PolicyId</code> is
394
- * returned by <code>PutPolicy</code> and by <code>ListPolicies</code>.</p>
471
+ * returned by <code>PutPolicy</code> and by <code>ListPolicies</code>.</p>
395
472
  */
396
473
  PolicyId: string | undefined;
397
474
  /**
@@ -417,6 +494,7 @@ export declare enum ViolationReason {
417
494
  FMSCreatedSecurityGroupEdited = "FMS_CREATED_SECURITY_GROUP_EDITED",
418
495
  FirewallSubnetIsOutOfScope = "FIREWALL_SUBNET_IS_OUT_OF_SCOPE",
419
496
  FirewallSubnetMissingExpectedRoute = "FIREWALL_SUBNET_MISSING_EXPECTED_ROUTE",
497
+ FirewallSubnetMissingVPCEndpoint = "FIREWALL_SUBNET_MISSING_VPCE_ENDPOINT",
420
498
  InternetGatewayMissingExpectedRoute = "INTERNET_GATEWAY_MISSING_EXPECTED_ROUTE",
421
499
  InternetTrafficNotInspected = "INTERNET_TRAFFIC_NOT_INSPECTED",
422
500
  InvalidRouteConfiguration = "INVALID_ROUTE_CONFIGURATION",
@@ -453,11 +531,10 @@ export interface ComplianceViolator {
453
531
  */
454
532
  ViolationReason?: ViolationReason | string;
455
533
  /**
456
- * <p>The resource type. This is in the format shown in the <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-template-resource-type-ref.html">Amazon Web Services
457
- * Resource Types Reference</a>. For example:
458
- * <code>AWS::ElasticLoadBalancingV2::LoadBalancer</code>,
459
- * <code>AWS::CloudFront::Distribution</code>, or
460
- * <code>AWS::NetworkFirewall::FirewallPolicy</code>.</p>
534
+ * <p>The resource type. This is in the format shown in the <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-template-resource-type-ref.html">Amazon Web Services Resource Types Reference</a>. For example:
535
+ * <code>AWS::ElasticLoadBalancingV2::LoadBalancer</code>,
536
+ * <code>AWS::CloudFront::Distribution</code>, or
537
+ * <code>AWS::NetworkFirewall::FirewallPolicy</code>.</p>
461
538
  */
462
539
  ResourceType?: string;
463
540
  /**
@@ -475,9 +552,8 @@ export declare namespace ComplianceViolator {
475
552
  }
476
553
  /**
477
554
  * <p>Describes
478
- * the noncompliant resources in a member account for a specific Firewall Manager
479
- * policy. A maximum of 100 entries are displayed. If more than 100 resources are
480
- * noncompliant, <code>EvaluationLimitExceeded</code> is set to <code>True</code>.</p>
555
+ * the noncompliant resources in a member account for a specific Firewall Manager policy. A maximum of 100 entries are displayed. If more than 100 resources are
556
+ * noncompliant, <code>EvaluationLimitExceeded</code> is set to <code>True</code>.</p>
481
557
  */
482
558
  export interface PolicyComplianceDetail {
483
559
  /**
@@ -493,22 +569,23 @@ export interface PolicyComplianceDetail {
493
569
  */
494
570
  MemberAccount?: string;
495
571
  /**
496
- * <p>An array of resources that aren't protected by the WAF or Shield Advanced policy
497
- * or that aren't in compliance with the security group policy.</p>
572
+ * <p>An array of resources that aren't protected by the WAF or Shield Advanced policy or
573
+ * that aren't in compliance with the security group policy.</p>
498
574
  */
499
575
  Violators?: ComplianceViolator[];
500
576
  /**
501
- * <p>Indicates if over 100 resources are noncompliant with the Firewall Manager policy.</p>
577
+ * <p>Indicates if over 100 resources are noncompliant with the Firewall Manager
578
+ * policy.</p>
502
579
  */
503
580
  EvaluationLimitExceeded?: boolean;
504
581
  /**
505
582
  * <p>A timestamp that indicates when the returned information should be considered out of
506
- * date.</p>
583
+ * date.</p>
507
584
  */
508
585
  ExpiredAt?: Date;
509
586
  /**
510
- * <p>Details about problems with dependent services, such as WAF or Config, and the
511
- * error message received that indicates the problem with the service.</p>
587
+ * <p>Details about problems with dependent services, such as WAF or Config,
588
+ * and the error message received that indicates the problem with the service.</p>
512
589
  */
513
590
  IssueInfoMap?: {
514
591
  [key: string]: string;
@@ -523,7 +600,7 @@ export declare namespace PolicyComplianceDetail {
523
600
  export interface GetComplianceDetailResponse {
524
601
  /**
525
602
  * <p>Information about the resources and the policy that you specified in the
526
- * <code>GetComplianceDetail</code> request.</p>
603
+ * <code>GetComplianceDetail</code> request.</p>
527
604
  */
528
605
  PolicyComplianceDetail?: PolicyComplianceDetail;
529
606
  }
@@ -574,13 +651,13 @@ export declare enum CustomerPolicyScopeIdType {
574
651
  ORG_UNIT = "ORG_UNIT"
575
652
  }
576
653
  /**
577
- * <p>The resource tags that Firewall Manager uses to determine if a particular resource should be
578
- * included or excluded from the Firewall Manager policy. Tags enable you to categorize your Amazon Web Services
579
- * resources in different ways, for example, by purpose, owner, or environment. Each tag
580
- * consists of a key and an optional value. Firewall Manager combines the tags with "AND" so that, if you
581
- * add more than one tag to a policy scope, a resource must have all the specified tags to be
582
- * included or excluded. For more information, see <a href="https://docs.aws.amazon.com/awsconsolehelpdocs/latest/gsg/tag-editor.html">Working with Tag
583
- * Editor</a>.</p>
654
+ * <p>The resource tags that Firewall Manager uses to determine if a particular resource
655
+ * should be included or excluded from the Firewall Manager policy. Tags enable you to
656
+ * categorize your Amazon Web Services resources in different ways, for example, by purpose, owner, or
657
+ * environment. Each tag consists of a key and an optional value. Firewall Manager combines the
658
+ * tags with "AND" so that, if you add more than one tag to a policy scope, a resource must have
659
+ * all the specified tags to be included or excluded. For more information, see
660
+ * <a href="https://docs.aws.amazon.com/awsconsolehelpdocs/latest/gsg/tag-editor.html">Working with Tag Editor</a>.</p>
584
661
  */
585
662
  export interface ResourceTag {
586
663
  /**
@@ -599,7 +676,8 @@ export declare namespace ResourceTag {
599
676
  const filterSensitiveLog: (obj: ResourceTag) => any;
600
677
  }
601
678
  export declare enum FirewallDeploymentModel {
602
- CENTRALIZED = "CENTRALIZED"
679
+ CENTRALIZED = "CENTRALIZED",
680
+ DISTRIBUTED = "DISTRIBUTED"
603
681
  }
604
682
  /**
605
683
  * <p>Configures the firewall policy deployment model of Network Firewall. For information about
@@ -620,6 +698,21 @@ export declare namespace NetworkFirewallPolicy {
620
698
  */
621
699
  const filterSensitiveLog: (obj: NetworkFirewallPolicy) => any;
622
700
  }
701
+ /**
702
+ * <p>Configures the policy for the third-party firewall.</p>
703
+ */
704
+ export interface ThirdPartyFirewallPolicy {
705
+ /**
706
+ * <p>Defines the deployment model to use for the third-party firewall.</p>
707
+ */
708
+ FirewallDeploymentModel?: FirewallDeploymentModel | string;
709
+ }
710
+ export declare namespace ThirdPartyFirewallPolicy {
711
+ /**
712
+ * @internal
713
+ */
714
+ const filterSensitiveLog: (obj: ThirdPartyFirewallPolicy) => any;
715
+ }
623
716
  /**
624
717
  * <p>Contains the Network Firewall firewall policy options to configure a centralized deployment
625
718
  * model.</p>
@@ -629,6 +722,10 @@ export interface PolicyOption {
629
722
  * <p>Defines the deployment model to use for the firewall policy.</p>
630
723
  */
631
724
  NetworkFirewallPolicy?: NetworkFirewallPolicy;
725
+ /**
726
+ * <p>Defines the policy options for a third-party firewall policy.</p>
727
+ */
728
+ ThirdPartyFirewallPolicy?: ThirdPartyFirewallPolicy;
632
729
  }
633
730
  export declare namespace PolicyOption {
634
731
  /**
@@ -643,6 +740,7 @@ export declare enum SecurityServiceType {
643
740
  SECURITY_GROUPS_CONTENT_AUDIT = "SECURITY_GROUPS_CONTENT_AUDIT",
644
741
  SECURITY_GROUPS_USAGE_AUDIT = "SECURITY_GROUPS_USAGE_AUDIT",
645
742
  SHIELD_ADVANCED = "SHIELD_ADVANCED",
743
+ THIRD_PARTY_FIREWALL = "THIRD_PARTY_FIREWALL",
646
744
  WAF = "WAF",
647
745
  WAFV2 = "WAFV2"
648
746
  }
@@ -651,11 +749,11 @@ export declare enum SecurityServiceType {
651
749
  */
652
750
  export interface SecurityServicePolicyData {
653
751
  /**
654
- * <p>The service that the policy is using to protect the resources. This specifies the type
655
- * of policy that is created, either an WAF policy, a Shield Advanced policy, or a
656
- * security group policy. For security group policies, Firewall Manager supports one security group for
657
- * each common policy and for each content audit policy. This is an adjustable limit that you
658
- * can increase by contacting Amazon Web Services Support.</p>
752
+ * <p>The service that the policy is using to protect the resources. This specifies the type of
753
+ * policy that is created, either an WAF policy, a Shield Advanced policy, or a security
754
+ * group policy. For security group policies, Firewall Manager supports one security group for
755
+ * each common policy and for each content audit policy. This is an adjustable limit that you can
756
+ * increase by contacting Amazon Web Services Support.</p>
659
757
  */
660
758
  Type: SecurityServiceType | string | undefined;
661
759
  /**
@@ -669,158 +767,166 @@ export interface SecurityServicePolicyData {
669
767
  * </p>
670
768
  * <note>
671
769
  * <p>Valid values for <code>preProcessRuleGroups</code> are between 1 and 99. Valid
672
- * values for <code>postProcessRuleGroups</code> are between 9901 and 10000.</p>
770
+ * values for <code>postProcessRuleGroups</code> are between 9901 and 10000.</p>
673
771
  * </note>
674
772
  * </li>
675
773
  * <li>
676
- * <p>Example: <code>NETWORK_FIREWALL</code> - Centralized deployment
677
- * model.</p>
774
+ * <p>Example: <code>DNS_FIREWALL</code>
775
+ * </p>
678
776
  * <p>
679
- * <code>"{\"type\":\"NETWORK_FIREWALL\",\"awsNetworkFirewallConfig\":{\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",\"priority\":1}],\"networkFirewallStatelessDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessFragmentDefaultActions\":[\"aws:forward_to_sfe\",\"customActionName\"],\"networkFirewallStatelessCustomActions\":[{\"actionName\":\"customActionName\",\"actionDefinition\":{\"publishMetricAction\":{\"dimensions\":[{\"value\":\"metricdimensionvalue\"}]}}}],\"networkFirewallStatefulRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\"}],\"networkFirewallLoggingConfiguration\":{\"logDestinationConfigs\":[{\"logDestinationType\":\"S3\",\"logType\":\"ALERT\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}},{\"logDestinationType\":\"S3\",\"logType\":\"FLOW\",\"logDestination\":{\"bucketName\":\"s3-bucket-name\"}}],\"overrideExistingConfig\":true}},\"firewallDeploymentModel\":{\"centralizedFirewallDeploymentModel\":{\"centralizedFirewallOrchestrationConfig\":{\"inspectionVpcIds\":[{\"resourceId\":\"vpc-1234\",\"accountId\":\"123456789011\"}],\"firewallCreationConfig\":{\"endpointLocation\":{\"availabilityZoneConfigList\":[{\"availabilityZoneId\":null,\"availabilityZoneName\":\"us-east-1a\",\"allowedIPV4CidrList\":[\"10.0.0.0/28\"]}]}},\"allowedIPV4CidrList\":[]}}}}"</code>
777
+ * <code>"{\"type\":\"DNS_FIREWALL\",\"preProcessRuleGroups\":[{\"ruleGroupId\":\"rslvr-frg-1\",\"priority\":10}],\"postProcessRuleGroups\":[{\"ruleGroupId\":\"rslvr-frg-2\",\"priority\":9911}]}"</code>
680
778
  * </p>
681
- * <p> To use the centralized deployment model, you must set <a href="https://docs.aws.amazon.com/fms/2018-01-01/APIReference/API_PolicyOption.html">PolicyOption</a> to
682
- * <code>CENTRALIZED</code>. </p>
779
+ * <note>
780
+ * <p>Valid values for <code>preProcessRuleGroups</code> are between 1 and 99. Valid
781
+ * values for <code>postProcessRuleGroups</code> are between 9901 and 10000.</p>
782
+ * </note>
683
783
  * </li>
684
784
  * <li>
685
785
  * <p>Example: <code>NETWORK_FIREWALL</code> - Distributed deployment model with
686
- * automatic Availability Zone configuration. With automatic Availbility Zone
687
- * configuration, Firewall Manager chooses which Availability Zones to create the endpoints in. </p>
786
+ * automatic Availability Zone configuration. With automatic Availbility Zone
787
+ * configuration, Firewall Manager chooses which Availability Zones to create the endpoints in. </p>
688
788
  * <p>
689
789
  * <code>"{ \"type\": \"NETWORK_FIREWALL\",
690
- * \"networkFirewallStatelessRuleGroupReferences\": [ { \"resourceARN\":
691
- * \"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",
692
- * \"priority\": 1 } ], \"networkFirewallStatelessDefaultActions\": [
693
- * \"aws:forward_to_sfe\", \"customActionName\" ],
694
- * \"networkFirewallStatelessFragmentDefaultActions\": [ \"aws:forward_to_sfe\",
695
- * \"customActionName\" ], \"networkFirewallStatelessCustomActions\": [ {
696
- * \"actionName\": \"customActionName\", \"actionDefinition\": {
697
- * \"publishMetricAction\": { \"dimensions\": [ { \"value\": \"metricdimensionvalue\"
698
- * } ] } } } ], \"networkFirewallStatefulRuleGroupReferences\": [ { \"resourceARN\":
699
- * \"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\" } ],
700
- * \"networkFirewallOrchestrationConfig\": { \"singleFirewallEndpointPerVPC\": false,
701
- * \"allowedIPV4CidrList\": [ \"10.0.0.0/28\", \"192.168.0.0/28\" ],
702
- * \"routeManagementAction\": \"OFF\" }, \"networkFirewallLoggingConfiguration\": {
703
- * \"logDestinationConfigs\": [ { \"logDestinationType\": \"S3\", \"logType\":
704
- * \"ALERT\", \"logDestination\": { \"bucketName\": \"s3-bucket-name\" } }, {
705
- * \"logDestinationType\": \"S3\", \"logType\": \"FLOW\", \"logDestination\": {
706
- * \"bucketName\": \"s3-bucket-name\" } } ], \"overrideExistingConfig\": true }
707
- * }"</code>
790
+ * \"networkFirewallStatelessRuleGroupReferences\": [ { \"resourceARN\":
791
+ * \"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",
792
+ * \"priority\": 1 } ], \"networkFirewallStatelessDefaultActions\": [
793
+ * \"aws:forward_to_sfe\", \"customActionName\" ],
794
+ * \"networkFirewallStatelessFragmentDefaultActions\": [ \"aws:forward_to_sfe\",
795
+ * \"customActionName\" ], \"networkFirewallStatelessCustomActions\": [ {
796
+ * \"actionName\": \"customActionName\", \"actionDefinition\": {
797
+ * \"publishMetricAction\": { \"dimensions\": [ { \"value\": \"metricdimensionvalue\"
798
+ * } ] } } } ], \"networkFirewallStatefulRuleGroupReferences\": [ { \"resourceARN\":
799
+ * \"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\" } ],
800
+ * \"networkFirewallOrchestrationConfig\": { \"singleFirewallEndpointPerVPC\": false,
801
+ * \"allowedIPV4CidrList\": [ \"10.0.0.0/28\", \"192.168.0.0/28\" ],
802
+ * \"routeManagementAction\": \"OFF\" }, \"networkFirewallLoggingConfiguration\": {
803
+ * \"logDestinationConfigs\": [ { \"logDestinationType\": \"S3\", \"logType\":
804
+ * \"ALERT\", \"logDestination\": { \"bucketName\": \"s3-bucket-name\" } }, {
805
+ * \"logDestinationType\": \"S3\", \"logType\": \"FLOW\", \"logDestination\": {
806
+ * \"bucketName\": \"s3-bucket-name\" } } ], \"overrideExistingConfig\": true }
807
+ * }"</code>
708
808
  * </p>
709
809
  * <p> To use the distributed deployment model, you must set <a href="https://docs.aws.amazon.com/fms/2018-01-01/APIReference/API_PolicyOption.html">PolicyOption</a> to
710
- * <code>NULL</code>. </p>
810
+ * <code>NULL</code>. </p>
711
811
  * </li>
712
812
  * <li>
713
813
  * <p>Example: <code>NETWORK_FIREWALL</code> - Distributed deployment model with
714
- * automatic Availability Zone configuration, and route management. </p>
814
+ * automatic Availability Zone configuration, and route management. </p>
715
815
  * <p>
716
816
  * <code>"{ \"type\": \"NETWORK_FIREWALL\",
717
- * \"networkFirewallStatelessRuleGroupReferences\": [ { \"resourceARN\":
718
- * \"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",
719
- * \"priority\": 1 } ], \"networkFirewallStatelessDefaultActions\": [
720
- * \"aws:forward_to_sfe\", \"customActionName\" ],
721
- * \"networkFirewallStatelessFragmentDefaultActions\": [ \"aws:forward_to_sfe\",
722
- * \"customActionName\" ], \"networkFirewallStatelessCustomActions\": [ {
723
- * \"actionName\": \"customActionName\", \"actionDefinition\": {
724
- * \"publishMetricAction\": { \"dimensions\": [ { \"value\": \"metricdimensionvalue\"
725
- * } ] } } } ], \"networkFirewallStatefulRuleGroupReferences\": [ { \"resourceARN\":
726
- * \"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\" } ],
727
- * \"networkFirewallOrchestrationConfig\": { \"singleFirewallEndpointPerVPC\": false,
728
- * \"allowedIPV4CidrList\": [ \"10.0.0.0/28\", \"192.168.0.0/28\" ],
729
- * \"routeManagementAction\": \"MONITOR\", \"routeManagementTargetTypes\": [
730
- * \"InternetGateway\" ] }, \"networkFirewallLoggingConfiguration\": {
731
- * \"logDestinationConfigs\": [ { \"logDestinationType\": \"S3\", \"logType\":
732
- * \"ALERT\", \"logDestination\": { \"bucketName\": \"s3-bucket-name\" } }, {
733
- * \"logDestinationType\": \"S3\", \"logType\": \"FLOW\", \"logDestination\": {
734
- * \"bucketName\": \"s3-bucket-name\" } } ], \"overrideExistingConfig\": true }
735
- * }"</code>
817
+ * \"networkFirewallStatelessRuleGroupReferences\": [ { \"resourceARN\":
818
+ * \"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",
819
+ * \"priority\": 1 } ], \"networkFirewallStatelessDefaultActions\": [
820
+ * \"aws:forward_to_sfe\", \"customActionName\" ],
821
+ * \"networkFirewallStatelessFragmentDefaultActions\": [ \"aws:forward_to_sfe\",
822
+ * \"customActionName\" ], \"networkFirewallStatelessCustomActions\": [ {
823
+ * \"actionName\": \"customActionName\", \"actionDefinition\": {
824
+ * \"publishMetricAction\": { \"dimensions\": [ { \"value\": \"metricdimensionvalue\"
825
+ * } ] } } } ], \"networkFirewallStatefulRuleGroupReferences\": [ { \"resourceARN\":
826
+ * \"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\" } ],
827
+ * \"networkFirewallOrchestrationConfig\": { \"singleFirewallEndpointPerVPC\": false,
828
+ * \"allowedIPV4CidrList\": [ \"10.0.0.0/28\", \"192.168.0.0/28\" ],
829
+ * \"routeManagementAction\": \"MONITOR\", \"routeManagementTargetTypes\": [
830
+ * \"InternetGateway\" ] }, \"networkFirewallLoggingConfiguration\": {
831
+ * \"logDestinationConfigs\": [ { \"logDestinationType\": \"S3\", \"logType\":
832
+ * \"ALERT\", \"logDestination\": { \"bucketName\": \"s3-bucket-name\" } }, {
833
+ * \"logDestinationType\": \"S3\", \"logType\": \"FLOW\", \"logDestination\": {
834
+ * \"bucketName\": \"s3-bucket-name\" } } ], \"overrideExistingConfig\": true }
835
+ * }"</code>
736
836
  * </p>
737
837
  * </li>
738
838
  * <li>
739
839
  * <p>Example: <code>NETWORK_FIREWALL</code> - Distributed deployment model with
740
- * custom Availability Zone configuration. With custom Availability Zone configuration,
741
- * you define which specific Availability Zones to create endpoints in by configuring
742
- * <code>firewallCreationConfig</code>. </p>
840
+ * custom Availability Zone configuration. With custom Availability Zone configuration,
841
+ * you define which specific Availability Zones to create endpoints in by configuring
842
+ * <code>firewallCreationConfig</code>. </p>
743
843
  * <p>
744
844
  * <code>"{
745
- * \"type\":\"NETWORK_FIREWALL\",\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",\"priority\":1}],
746
- * \"networkFirewallStatelessDefaultActions\":[ \"aws:forward_to_sfe\",
747
- * \"customActionName\" ], \"networkFirewallStatelessFragmentDefaultActions\":[
748
- * \"aws:forward_to_sfe\", \"fragmentcustomactionname\" ],
749
- * \"networkFirewallStatelessCustomActions\":[ { \"actionName\":\"customActionName\",
750
- * \"actionDefinition\":{ \"publishMetricAction\":{ \"dimensions\":[ {
751
- * \"value\":\"metricdimensionvalue\" } ] } } }, {
752
- * \"actionName\":\"fragmentcustomactionname\", \"actionDefinition\":{
753
- * \"publishMetricAction\":{ \"dimensions\":[ {
754
- * \"value\":\"fragmentmetricdimensionvalue\" } ] } } } ],
755
- * \"networkFirewallStatefulRuleGroupReferences\":[ {
756
- * \"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\"
757
- * } ], \"networkFirewallOrchestrationConfig\":{ \"firewallCreationConfig\":{
758
- * \"endpointLocation\":{ \"availabilityZoneConfigList\":[ {
759
- * \"availabilityZoneId\":null, \"availabilityZoneName\":\"us-east-1a\",
760
- * \"allowedIPV4CidrList\":[ \"10.0.0.0/28\" ] }, { ¯\"availabilityZoneId\":null,
761
- * \"availabilityZoneName\":\"us-east-1b\", \"allowedIPV4CidrList\":[ \"10.0.0.0/28\"
762
- * ] } ] } }, \"singleFirewallEndpointPerVPC\":false, \"allowedIPV4CidrList\":null,
763
- * \"routeManagementAction\":\"OFF\", \"networkFirewallLoggingConfiguration\":{
764
- * \"logDestinationConfigs\":[ { \"logDestinationType\":\"S3\",
765
- * \"logType\":\"ALERT\", \"logDestination\":{ \"bucketName\":\"s3-bucket-name\" } },
766
- * { \"logDestinationType\":\"S3\", \"logType\":\"FLOW\", \"logDestination\":{
767
- * \"bucketName\":\"s3-bucket-name\" } } ], \"overrideExistingConfig\":boolean }
768
- * }"</code>
845
+ * \"type\":\"NETWORK_FIREWALL\",\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",\"priority\":1}],
846
+ * \"networkFirewallStatelessDefaultActions\":[ \"aws:forward_to_sfe\",
847
+ * \"customActionName\" ], \"networkFirewallStatelessFragmentDefaultActions\":[
848
+ * \"aws:forward_to_sfe\", \"fragmentcustomactionname\" ],
849
+ * \"networkFirewallStatelessCustomActions\":[ { \"actionName\":\"customActionName\",
850
+ * \"actionDefinition\":{ \"publishMetricAction\":{ \"dimensions\":[ {
851
+ * \"value\":\"metricdimensionvalue\" } ] } } }, {
852
+ * \"actionName\":\"fragmentcustomactionname\", \"actionDefinition\":{
853
+ * \"publishMetricAction\":{ \"dimensions\":[ {
854
+ * \"value\":\"fragmentmetricdimensionvalue\" } ] } } } ],
855
+ * \"networkFirewallStatefulRuleGroupReferences\":[ {
856
+ * \"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\"
857
+ * } ], \"networkFirewallOrchestrationConfig\":{ \"firewallCreationConfig\":{
858
+ * \"endpointLocation\":{ \"availabilityZoneConfigList\":[ {
859
+ * \"availabilityZoneId\":null, \"availabilityZoneName\":\"us-east-1a\",
860
+ * \"allowedIPV4CidrList\":[ \"10.0.0.0/28\" ] }, { ¯\"availabilityZoneId\":null,
861
+ * \"availabilityZoneName\":\"us-east-1b\", \"allowedIPV4CidrList\":[ \"10.0.0.0/28\"
862
+ * ] } ] } }, \"singleFirewallEndpointPerVPC\":false, \"allowedIPV4CidrList\":null,
863
+ * \"routeManagementAction\":\"OFF\", \"networkFirewallLoggingConfiguration\":{
864
+ * \"logDestinationConfigs\":[ { \"logDestinationType\":\"S3\",
865
+ * \"logType\":\"ALERT\", \"logDestination\":{ \"bucketName\":\"s3-bucket-name\" } },
866
+ * { \"logDestinationType\":\"S3\", \"logType\":\"FLOW\", \"logDestination\":{
867
+ * \"bucketName\":\"s3-bucket-name\" } } ], \"overrideExistingConfig\":boolean }
868
+ * }"</code>
769
869
  * </p>
770
870
  * </li>
771
871
  * <li>
772
872
  * <p>Example: <code>NETWORK_FIREWALL</code> - Distributed deployment model with
773
- * custom Availability Zone configuration, and route management. </p>
873
+ * custom Availability Zone configuration, and route management. </p>
774
874
  * <p>
775
875
  * <code>"{
776
- * \"type\":\"NETWORK_FIREWALL\",\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",\"priority\":1}],
777
- * \"networkFirewallStatelessDefaultActions\":[ \"aws:forward_to_sfe\",
778
- * \"customActionName\" ], \"networkFirewallStatelessFragmentDefaultActions\":[
779
- * \"aws:forward_to_sfe\", \"fragmentcustomactionname\" ],
780
- * \"networkFirewallStatelessCustomActions\":[ { \"actionName\":\"customActionName\",
781
- * \"actionDefinition\":{ \"publishMetricAction\":{ \"dimensions\":[ {
782
- * \"value\":\"metricdimensionvalue\" } ] } } }, {
783
- * \"actionName\":\"fragmentcustomactionname\", \"actionDefinition\":{
784
- * \"publishMetricAction\":{ \"dimensions\":[ {
785
- * \"value\":\"fragmentmetricdimensionvalue\" } ] } } } ],
786
- * \"networkFirewallStatefulRuleGroupReferences\":[ {
787
- * \"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\"
788
- * } ], \"networkFirewallOrchestrationConfig\":{ \"firewallCreationConfig\":{
789
- * \"endpointLocation\":{ \"availabilityZoneConfigList\":[ {
790
- * \"availabilityZoneId\":null, \"availabilityZoneName\":\"us-east-1a\",
791
- * \"allowedIPV4CidrList\":[ \"10.0.0.0/28\" ] }, { ¯\"availabilityZoneId\":null,
792
- * \"availabilityZoneName\":\"us-east-1b\", \"allowedIPV4CidrList\":[ \"10.0.0.0/28\"
793
- * ] } ] } }, \"singleFirewallEndpointPerVPC\":false, \"allowedIPV4CidrList\":null,
794
- * \"routeManagementAction\":\"MONITOR\", \"routeManagementTargetTypes\":[
795
- * \"InternetGateway\" ], \"routeManagementConfig\":{
796
- * \"allowCrossAZTrafficIfNoEndpoint\":true } },
797
- * \"networkFirewallLoggingConfiguration\":{ \"logDestinationConfigs\":[ {
798
- * \"logDestinationType\":\"S3\", \"logType\":\"ALERT\", \"logDestination\":{
799
- * \"bucketName\":\"s3-bucket-name\" } }, { \"logDestinationType\":\"S3\",
800
- * \"logType\":\"FLOW\", \"logDestination\":{ \"bucketName\":\"s3-bucket-name\" } }
801
- * ], \"overrideExistingConfig\":boolean } }"</code>
876
+ * \"type\":\"NETWORK_FIREWALL\",\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",\"priority\":1}],
877
+ * \"networkFirewallStatelessDefaultActions\":[ \"aws:forward_to_sfe\",
878
+ * \"customActionName\" ], \"networkFirewallStatelessFragmentDefaultActions\":[
879
+ * \"aws:forward_to_sfe\", \"fragmentcustomactionname\" ],
880
+ * \"networkFirewallStatelessCustomActions\":[ { \"actionName\":\"customActionName\",
881
+ * \"actionDefinition\":{ \"publishMetricAction\":{ \"dimensions\":[ {
882
+ * \"value\":\"metricdimensionvalue\" } ] } } }, {
883
+ * \"actionName\":\"fragmentcustomactionname\", \"actionDefinition\":{
884
+ * \"publishMetricAction\":{ \"dimensions\":[ {
885
+ * \"value\":\"fragmentmetricdimensionvalue\" } ] } } } ],
886
+ * \"networkFirewallStatefulRuleGroupReferences\":[ {
887
+ * \"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\"
888
+ * } ], \"networkFirewallOrchestrationConfig\":{ \"firewallCreationConfig\":{
889
+ * \"endpointLocation\":{ \"availabilityZoneConfigList\":[ {
890
+ * \"availabilityZoneId\":null, \"availabilityZoneName\":\"us-east-1a\",
891
+ * \"allowedIPV4CidrList\":[ \"10.0.0.0/28\" ] }, { ¯\"availabilityZoneId\":null,
892
+ * \"availabilityZoneName\":\"us-east-1b\", \"allowedIPV4CidrList\":[ \"10.0.0.0/28\"
893
+ * ] } ] } }, \"singleFirewallEndpointPerVPC\":false, \"allowedIPV4CidrList\":null,
894
+ * \"routeManagementAction\":\"MONITOR\", \"routeManagementTargetTypes\":[
895
+ * \"InternetGateway\" ], \"routeManagementConfig\":{
896
+ * \"allowCrossAZTrafficIfNoEndpoint\":true } },
897
+ * \"networkFirewallLoggingConfiguration\":{ \"logDestinationConfigs\":[ {
898
+ * \"logDestinationType\":\"S3\", \"logType\":\"ALERT\", \"logDestination\":{
899
+ * \"bucketName\":\"s3-bucket-name\" } }, { \"logDestinationType\":\"S3\",
900
+ * \"logType\":\"FLOW\", \"logDestination\":{ \"bucketName\":\"s3-bucket-name\" } }
901
+ * ], \"overrideExistingConfig\":boolean } }"</code>
902
+ * </p>
903
+ * </li>
904
+ * <li>
905
+ * <p>Example: <code>PARTNER_FIREWALL</code> for Firewall Manager</p>
906
+ * <p>
907
+ * <code>"{\"type\":\"THIRD_PARTY_FIREWALL\",\"thirdPartyrFirewall\":\"PALO_ALTO_NETWORKS_CLOUD_NGFW\",\"thirdPartyFirewallConfig\":{\"thirdPartyFirewallPolicyList\":[\"global-123456789012-1\"],\"networkFirewallLoggingConfiguration\":null},\"firewallDeploymentModel\":{\"distributedFirewallDeploymentModel\":{\"distributedFirewallOrchestrationConfig\":{\"firewallCreationConfig\":{\"endpointLocation\":{\"availabilityZoneConfigList\":[{\"availabilityZoneId\":null,\"availabilityZoneName\":\"us-east-1a\",\"allowedIPV4CidrList\":[\"10.0.1.0/28\"]}]}},\"allowedIPV4CidrList\":null},\"distributedRouteManagementConfig\":null},\"centralizedFirewallDeploymentModel\":null}}""</code>
802
908
  * </p>
803
909
  * </li>
804
910
  * <li>
805
911
  * <p>Specification for <code>SHIELD_ADVANCED</code> for Amazon CloudFront distributions </p>
806
912
  * <p>
807
913
  * <code>"{\"type\":\"SHIELD_ADVANCED\",\"automaticResponseConfiguration\":
808
- * {\"automaticResponseStatus\":\"ENABLED|IGNORED|DISABLED\",
809
- * \"automaticResponseAction\":\"BLOCK|COUNT\"},
810
- * \"overrideCustomerWebaclClassic\":true|false}"</code>
914
+ * {\"automaticResponseStatus\":\"ENABLED|IGNORED|DISABLED\",
915
+ * \"automaticResponseAction\":\"BLOCK|COUNT\"},
916
+ * \"overrideCustomerWebaclClassic\":true|false}"</code>
811
917
  * </p>
812
918
  * <p>For example:
813
- * <code>"{\"type\":\"SHIELD_ADVANCED\",\"automaticResponseConfiguration\":
814
- * {\"automaticResponseStatus\":\"ENABLED\",
815
- * \"automaticResponseAction\":\"COUNT\"}}"</code>
919
+ * <code>"{\"type\":\"SHIELD_ADVANCED\",\"automaticResponseConfiguration\":
920
+ * {\"automaticResponseStatus\":\"ENABLED\",
921
+ * \"automaticResponseAction\":\"COUNT\"}}"</code>
816
922
  * </p>
817
923
  * <p>The default value for <code>automaticResponseStatus</code> is
818
- * <code>IGNORED</code>. The value for <code>automaticResponseAction</code> is only
819
- * required when <code>automaticResponseStatus</code> is set to <code>ENABLED</code>.
820
- * The default value for <code>overrideCustomerWebaclClassic</code> is
821
- * <code>false</code>.</p>
924
+ * <code>IGNORED</code>. The value for <code>automaticResponseAction</code> is only
925
+ * required when <code>automaticResponseStatus</code> is set to <code>ENABLED</code>.
926
+ * The default value for <code>overrideCustomerWebaclClassic</code> is
927
+ * <code>false</code>.</p>
822
928
  * <p>For other resource types that you can protect with a Shield Advanced policy, this
823
- * <code>ManagedServiceData</code> configuration is an empty string.</p>
929
+ * <code>ManagedServiceData</code> configuration is an empty string.</p>
824
930
  * </li>
825
931
  * <li>
826
932
  * <p>Example: <code>WAFV2</code>
@@ -829,36 +935,46 @@ export interface SecurityServicePolicyData {
829
935
  * <code>"{\"type\":\"WAFV2\",\"preProcessRuleGroups\":[{\"ruleGroupArn\":null,\"overrideAction\":{\"type\":\"NONE\"},\"managedRuleGroupIdentifier\":{\"version\":null,\"vendorName\":\"AWS\",\"managedRuleGroupName\":\"AWSManagedRulesAmazonIpReputationList\"},\"ruleGroupType\":\"ManagedRuleGroup\",\"excludeRules\":[{\"name\":\"NoUserAgent_HEADER\"}]}],\"postProcessRuleGroups\":[],\"defaultAction\":{\"type\":\"ALLOW\"},\"overrideCustomerWebACLAssociation\":false,\"loggingConfiguration\":{\"logDestinationConfigs\":[\"arn:aws:firehose:us-west-2:12345678912:deliverystream/aws-waf-logs-fms-admin-destination\"],\"redactedFields\":[{\"redactedFieldType\":\"SingleHeader\",\"redactedFieldValue\":\"Cookies\"},{\"redactedFieldType\":\"Method\"}]}}"</code>
830
936
  * </p>
831
937
  * <p>In the <code>loggingConfiguration</code>, you can specify one
832
- * <code>logDestinationConfigs</code>, you can optionally provide up to 20
833
- * <code>redactedFields</code>, and the <code>RedactedFieldType</code> must be one of
834
- * <code>URI</code>, <code>QUERY_STRING</code>, <code>HEADER</code>, or
835
- * <code>METHOD</code>.</p>
938
+ * <code>logDestinationConfigs</code>, you can optionally provide up to 20
939
+ * <code>redactedFields</code>, and the <code>RedactedFieldType</code> must be one of
940
+ * <code>URI</code>, <code>QUERY_STRING</code>, <code>HEADER</code>, or
941
+ * <code>METHOD</code>.</p>
836
942
  * </li>
837
943
  * <li>
838
944
  * <p>Example: <code>WAF Classic</code>
839
945
  * </p>
840
946
  * <p>
841
947
  * <code>"{\"type\": \"WAF\", \"ruleGroups\":
842
- * [{\"id\":\"12345678-1bcd-9012-efga-0987654321ab\", \"overrideAction\" : {\"type\":
843
- * \"COUNT\"}}], \"defaultAction\": {\"type\": \"BLOCK\"}}"</code>
948
+ * [{\"id\":\"12345678-1bcd-9012-efga-0987654321ab\", \"overrideAction\" : {\"type\":
949
+ * \"COUNT\"}}], \"defaultAction\": {\"type\": \"BLOCK\"}}"</code>
950
+ * </p>
951
+ * </li>
952
+ * <li>
953
+ * <p>Example: <code>WAFV2</code> - Firewall Manager support for WAF managed rule group versioning
954
+ * </p>
955
+ * <p>
956
+ * <code>"{\"type\":\"WAFV2\",\"preProcessRuleGroups\":[{\"ruleGroupArn\":null,\"overrideAction\":{\"type\":\"NONE\"},\"managedRuleGroupIdentifier\":{\"versionEnabled\":true,\"version\":\"Version_2.0\",\"vendorName\":\"AWS\",\"managedRuleGroupName\":\"AWSManagedRulesCommonRuleSet\"},\"ruleGroupType\":\"ManagedRuleGroup\",\"excludeRules\":[{\"name\":\"NoUserAgent_HEADER\"}]}],\"postProcessRuleGroups\":[],\"defaultAction\":{\"type\":\"ALLOW\"},\"overrideCustomerWebACLAssociation\":false,\"loggingConfiguration\":{\"logDestinationConfigs\":[\"arn:aws:firehose:us-west-2:12345678912:deliverystream/aws-waf-logs-fms-admin-destination\"],\"redactedFields\":[{\"redactedFieldType\":\"SingleHeader\",\"redactedFieldValue\":\"Cookies\"},{\"redactedFieldType\":\"Method\"}]}}"</code>
844
957
  * </p>
958
+ * <p>
959
+ * To use a specific version of a WAF managed rule group in your Firewall Manager policy, you must set <code>versionEnabled</code> to <code>true</code>, and set <code>version</code> to the version you'd like to use. If you don't set <code>versionEnabled</code> to <code>true</code>, or if you omit <code>versionEnabled</code>, then Firewall Manager uses the default version of the WAF managed rule group.
960
+ * </p>
845
961
  * </li>
846
962
  * <li>
847
963
  * <p>Example: <code>SECURITY_GROUPS_COMMON</code>
848
964
  * </p>
849
965
  * <p>
850
966
  * <code>"{\"type\":\"SECURITY_GROUPS_COMMON\",\"revertManualSecurityGroupChanges\":false,\"exclusiveResourceSecurityGroupManagement\":false,
851
- * \"applyToAllEC2InstanceENIs\":false,\"securityGroups\":[{\"id\":\"
852
- * sg-000e55995d61a06bd\"}]}"</code>
967
+ * \"applyToAllEC2InstanceENIs\":false,\"securityGroups\":[{\"id\":\"
968
+ * sg-000e55995d61a06bd\"}]}"</code>
853
969
  * </p>
854
970
  * </li>
855
971
  * <li>
856
972
  * <p>Example: Shared VPCs. Apply the preceding policy to resources in shared VPCs as
857
- * well as to those in VPCs that the account owns </p>
973
+ * well as to those in VPCs that the account owns </p>
858
974
  * <p>
859
975
  * <code>"{\"type\":\"SECURITY_GROUPS_COMMON\",\"revertManualSecurityGroupChanges\":false,\"exclusiveResourceSecurityGroupManagement\":false,
860
- * \"applyToAllEC2InstanceENIs\":false,\"includeSharedVPC\":true,\"securityGroups\":[{\"id\":\"
861
- * sg-000e55995d61a06bd\"}]}"</code>
976
+ * \"applyToAllEC2InstanceENIs\":false,\"includeSharedVPC\":true,\"securityGroups\":[{\"id\":\"
977
+ * sg-000e55995d61a06bd\"}]}"</code>
862
978
  * </p>
863
979
  * </li>
864
980
  * <li>
@@ -868,10 +984,10 @@ export interface SecurityServicePolicyData {
868
984
  * <code>"{\"type\":\"SECURITY_GROUPS_CONTENT_AUDIT\",\"securityGroups\":[{\"id\":\"sg-000e55995d61a06bd\"}],\"securityGroupAction\":{\"type\":\"ALLOW\"}}"</code>
869
985
  * </p>
870
986
  * <p>The security group action for content audit can be <code>ALLOW</code> or
871
- * <code>DENY</code>. For <code>ALLOW</code>, all in-scope security group rules must
872
- * be within the allowed range of the policy's security group rules. For
873
- * <code>DENY</code>, all in-scope security group rules must not contain a value or a
874
- * range that matches a rule value or range in the policy security group.</p>
987
+ * <code>DENY</code>. For <code>ALLOW</code>, all in-scope security group rules must
988
+ * be within the allowed range of the policy's security group rules. For
989
+ * <code>DENY</code>, all in-scope security group rules must not contain a value or a
990
+ * range that matches a rule value or range in the policy security group.</p>
875
991
  * </li>
876
992
  * <li>
877
993
  * <p>Example: <code>SECURITY_GROUPS_USAGE_AUDIT</code>
@@ -909,10 +1025,10 @@ export interface Policy {
909
1025
  PolicyName: string | undefined;
910
1026
  /**
911
1027
  * <p>A unique identifier for each update to the policy. When issuing a <code>PutPolicy</code>
912
- * request, the <code>PolicyUpdateToken</code> in the request must match the
913
- * <code>PolicyUpdateToken</code> of the current policy version. To get the
914
- * <code>PolicyUpdateToken</code> of the current policy version, use a
915
- * <code>GetPolicy</code> request.</p>
1028
+ * request, the <code>PolicyUpdateToken</code> in the request must match the
1029
+ * <code>PolicyUpdateToken</code> of the current policy version. To get the
1030
+ * <code>PolicyUpdateToken</code> of the current policy version, use a <code>GetPolicy</code>
1031
+ * request.</p>
916
1032
  */
917
1033
  PolicyUpdateToken?: string;
918
1034
  /**
@@ -921,25 +1037,20 @@ export interface Policy {
921
1037
  SecurityServicePolicyData: SecurityServicePolicyData | undefined;
922
1038
  /**
923
1039
  * <p>The type of resource protected by or in scope of the policy. This is in the format shown
924
- * in the <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-template-resource-type-ref.html">Amazon Web Services
925
- * Resource Types Reference</a>. To apply this policy to multiple resource types,
926
- * specify a resource type of <code>ResourceTypeList</code> and then specify the resource
927
- * types in a <code>ResourceTypeList</code>.</p>
928
- * <p>For WAF and Shield Advanced, resource types include
929
- * <code>AWS::ElasticLoadBalancingV2::LoadBalancer</code>,
930
- * <code>AWS::ElasticLoadBalancing::LoadBalancer</code>, <code>AWS::EC2::EIP</code>, and
931
- * <code>AWS::CloudFront::Distribution</code>. For a security group common policy, valid
932
- * values are <code>AWS::EC2::NetworkInterface</code> and <code>AWS::EC2::Instance</code>. For
933
- * a security group content audit policy, valid values are
934
- * <code>AWS::EC2::SecurityGroup</code>, <code>AWS::EC2::NetworkInterface</code>, and
935
- * <code>AWS::EC2::Instance</code>. For a security group usage audit policy, the value is
936
- * <code>AWS::EC2::SecurityGroup</code>. For an Network Firewall policy or DNS Firewall policy,
937
- * the value is <code>AWS::EC2::VPC</code>.</p>
1040
+ * in the <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-template-resource-type-ref.html">Amazon Web Services Resource Types Reference</a>.
1041
+ * To apply this policy to multiple resource types, specify a resource type of <code>ResourceTypeList</code> and then specify the resource types in a <code>ResourceTypeList</code>.</p>
1042
+ * <p>For WAF and Shield Advanced, resource types include
1043
+ * <code>AWS::ElasticLoadBalancingV2::LoadBalancer</code>, <code>AWS::ElasticLoadBalancing::LoadBalancer</code>, <code>AWS::EC2::EIP</code>, and
1044
+ * <code>AWS::CloudFront::Distribution</code>. For a security group common policy, valid values
1045
+ * are <code>AWS::EC2::NetworkInterface</code> and <code>AWS::EC2::Instance</code>. For a
1046
+ * security group content audit policy, valid values are <code>AWS::EC2::SecurityGroup</code>,
1047
+ * <code>AWS::EC2::NetworkInterface</code>, and <code>AWS::EC2::Instance</code>. For a security
1048
+ * group usage audit policy, the value is <code>AWS::EC2::SecurityGroup</code>. For an Network Firewall policy or DNS Firewall policy,
1049
+ * the value is <code>AWS::EC2::VPC</code>.</p>
938
1050
  */
939
1051
  ResourceType: string | undefined;
940
1052
  /**
941
- * <p>An array of <code>ResourceType</code> objects. Use this only to specify multiple
942
- * resource types. To specify a single resource type, use <code>ResourceType</code>.</p>
1053
+ * <p>An array of <code>ResourceType</code> objects. Use this only to specify multiple resource types. To specify a single resource type, use <code>ResourceType</code>.</p>
943
1054
  */
944
1055
  ResourceTypeList?: string[];
945
1056
  /**
@@ -948,11 +1059,9 @@ export interface Policy {
948
1059
  ResourceTags?: ResourceTag[];
949
1060
  /**
950
1061
  * <p>If set to <code>True</code>, resources with the tags that are specified in the
951
- * <code>ResourceTag</code> array are not in scope of the policy. If set to
952
- * <code>False</code>, and the <code>ResourceTag</code> array is not null, only resources
953
- * with the specified tags are in scope of the policy.</p>
954
- * <p> This option isn't available for the centralized deployment model when creating policies
955
- * to configure Network Firewall. </p>
1062
+ * <code>ResourceTag</code> array are not in scope of the policy. If set to <code>False</code>,
1063
+ * and the <code>ResourceTag</code> array is not null, only resources with the specified tags are
1064
+ * in scope of the policy.</p>
956
1065
  */
957
1066
  ExcludeResourceTags: boolean | undefined;
958
1067
  /**
@@ -968,67 +1077,53 @@ export interface Policy {
968
1077
  */
969
1078
  DeleteUnusedFMManagedResources?: boolean;
970
1079
  /**
971
- * <p>Specifies the Amazon Web Services account IDs and Organizations organizational units (OUs) to include in
972
- * the policy. Specifying an OU is the equivalent of specifying all accounts in the OU and in
973
- * any of its child OUs, including any child OUs and accounts that are added at a later
974
- * time.</p>
975
- * <p>You can specify inclusions or exclusions, but not both. If you specify an
976
- * <code>IncludeMap</code>, Firewall Manager applies the policy to all accounts specified by the
977
- * <code>IncludeMap</code>, and does not evaluate any <code>ExcludeMap</code>
978
- * specifications. If you do not specify an <code>IncludeMap</code>, then Firewall Manager applies the
979
- * policy to all accounts except for those specified by the <code>ExcludeMap</code>.</p>
1080
+ * <p>Specifies the Amazon Web Services account IDs and Organizations organizational units (OUs) to include in the policy.
1081
+ * Specifying an OU is the equivalent of specifying all accounts in the OU and in any of its child OUs, including any child OUs and accounts that are added at a later time.</p>
1082
+ * <p>You can specify inclusions or exclusions, but not both. If you specify an <code>IncludeMap</code>, Firewall Manager
1083
+ * applies the policy to all accounts specified by the <code>IncludeMap</code>, and
1084
+ * does not evaluate any <code>ExcludeMap</code> specifications. If you do not specify an <code>IncludeMap</code>, then Firewall Manager
1085
+ * applies the policy to all accounts except for those specified by the <code>ExcludeMap</code>.</p>
980
1086
  * <p>You can specify account IDs, OUs, or a combination: </p>
981
1087
  * <ul>
982
1088
  * <li>
983
- * <p>Specify account IDs by setting the key to <code>ACCOUNT</code>. For example, the
984
- * following is a valid map: <code>{“ACCOUNT” : [“accountID1”,
985
- * “accountID2”]}</code>.</p>
1089
+ * <p>Specify account IDs by setting the key to <code>ACCOUNT</code>. For example, the following is a valid map:
1090
+ * <code>{“ACCOUNT” : [“accountID1”, “accountID2”]}</code>.</p>
986
1091
  * </li>
987
1092
  * <li>
988
- * <p>Specify OUs by setting the key to <code>ORG_UNIT</code>. For example, the
989
- * following is a valid map: <code>{“ORG_UNIT” : [“ouid111”, “ouid112”]}</code>.</p>
1093
+ * <p>Specify OUs by setting the key to <code>ORG_UNIT</code>. For example, the following is a valid map:
1094
+ * <code>{“ORG_UNIT” : [“ouid111”, “ouid112”]}</code>.</p>
990
1095
  * </li>
991
1096
  * <li>
992
- * <p>Specify accounts and OUs together in a single map, separated with a comma. For
993
- * example, the following is a valid map: <code>{“ACCOUNT” : [“accountID1”,
994
- * “accountID2”], “ORG_UNIT” : [“ouid111”, “ouid112”]}</code>.</p>
1097
+ * <p>Specify accounts and OUs together in a single map, separated with a comma. For example, the following is a valid map:
1098
+ * <code>{“ACCOUNT” : [“accountID1”, “accountID2”], “ORG_UNIT” : [“ouid111”, “ouid112”]}</code>.</p>
995
1099
  * </li>
996
1100
  * </ul>
997
- * <p> This option isn't available for the centralized deployment model when creating policies
998
- * to configure Network Firewall. </p>
999
1101
  */
1000
1102
  IncludeMap?: {
1001
1103
  [key: string]: string[];
1002
1104
  };
1003
1105
  /**
1004
- * <p>Specifies the Amazon Web Services account IDs and Organizations organizational units (OUs) to exclude from
1005
- * the policy. Specifying an OU is the equivalent of specifying all accounts in the OU and in
1006
- * any of its child OUs, including any child OUs and accounts that are added at a later
1007
- * time.</p>
1008
- * <p>You can specify inclusions or exclusions, but not both. If you specify an
1009
- * <code>IncludeMap</code>, Firewall Manager applies the policy to all accounts specified by the
1010
- * <code>IncludeMap</code>, and does not evaluate any <code>ExcludeMap</code>
1011
- * specifications. If you do not specify an <code>IncludeMap</code>, then Firewall Manager applies the
1012
- * policy to all accounts except for those specified by the <code>ExcludeMap</code>.</p>
1106
+ * <p>Specifies the Amazon Web Services account IDs and Organizations organizational units (OUs) to exclude from the policy.
1107
+ * Specifying an OU is the equivalent of specifying all accounts in the OU and in any of its child OUs, including any child OUs and accounts that are added at a later time.</p>
1108
+ * <p>You can specify inclusions or exclusions, but not both. If you specify an <code>IncludeMap</code>, Firewall Manager
1109
+ * applies the policy to all accounts specified by the <code>IncludeMap</code>, and
1110
+ * does not evaluate any <code>ExcludeMap</code> specifications. If you do not specify an <code>IncludeMap</code>, then Firewall Manager
1111
+ * applies the policy to all accounts except for those specified by the <code>ExcludeMap</code>.</p>
1013
1112
  * <p>You can specify account IDs, OUs, or a combination: </p>
1014
1113
  * <ul>
1015
1114
  * <li>
1016
- * <p>Specify account IDs by setting the key to <code>ACCOUNT</code>. For example, the
1017
- * following is a valid map: <code>{“ACCOUNT” : [“accountID1”,
1018
- * “accountID2”]}</code>.</p>
1115
+ * <p>Specify account IDs by setting the key to <code>ACCOUNT</code>. For example, the following is a valid map:
1116
+ * <code>{“ACCOUNT” : [“accountID1”, “accountID2”]}</code>.</p>
1019
1117
  * </li>
1020
1118
  * <li>
1021
- * <p>Specify OUs by setting the key to <code>ORG_UNIT</code>. For example, the
1022
- * following is a valid map: <code>{“ORG_UNIT” : [“ouid111”, “ouid112”]}</code>.</p>
1119
+ * <p>Specify OUs by setting the key to <code>ORG_UNIT</code>. For example, the following is a valid map:
1120
+ * <code>{“ORG_UNIT” : [“ouid111”, “ouid112”]}</code>.</p>
1023
1121
  * </li>
1024
1122
  * <li>
1025
- * <p>Specify accounts and OUs together in a single map, separated with a comma. For
1026
- * example, the following is a valid map: <code>{“ACCOUNT” : [“accountID1”,
1027
- * “accountID2”], “ORG_UNIT” : [“ouid111”, “ouid112”]}</code>.</p>
1123
+ * <p>Specify accounts and OUs together in a single map, separated with a comma. For example, the following is a valid map:
1124
+ * <code>{“ACCOUNT” : [“accountID1”, “accountID2”], “ORG_UNIT” : [“ouid111”, “ouid112”]}</code>.</p>
1028
1125
  * </li>
1029
1126
  * </ul>
1030
- * <p> This option isn't available for the centralized deployment model when creating policies
1031
- * to configure Network Firewall. </p>
1032
1127
  */
1033
1128
  ExcludeMap?: {
1034
1129
  [key: string]: string[];
@@ -1079,33 +1174,28 @@ export interface GetProtectionStatusRequest {
1079
1174
  */
1080
1175
  MemberAccountId?: string;
1081
1176
  /**
1082
- * <p>The start of the time period to query for the attacks. This is a <code>timestamp</code>
1083
- * type. The request syntax listing indicates a <code>number</code> type because the default
1084
- * used by Firewall Manager is Unix time in seconds. However, any valid <code>timestamp</code> format
1085
- * is allowed.</p>
1177
+ * <p>The start of the time period to query for the attacks. This is a <code>timestamp</code> type. The
1178
+ * request syntax listing indicates a <code>number</code> type because the default used by Firewall Manager is Unix time in seconds. However, any valid <code>timestamp</code> format is
1179
+ * allowed.</p>
1086
1180
  */
1087
1181
  StartTime?: Date;
1088
1182
  /**
1089
- * <p>The end of the time period to query for the attacks. This is a <code>timestamp</code>
1090
- * type. The request syntax listing indicates a <code>number</code> type because the default
1091
- * used by Firewall Manager is Unix time in seconds. However, any valid <code>timestamp</code> format
1092
- * is allowed.</p>
1183
+ * <p>The end of the time period to query for the attacks. This is a <code>timestamp</code> type. The
1184
+ * request syntax listing indicates a <code>number</code> type because the default used by Firewall Manager is Unix time in seconds. However, any valid <code>timestamp</code> format is
1185
+ * allowed.</p>
1093
1186
  */
1094
1187
  EndTime?: Date;
1095
1188
  /**
1096
- * <p>If you specify a value for <code>MaxResults</code> and you have more objects than the
1097
- * number that you specify for <code>MaxResults</code>, Firewall Manager returns a
1098
- * <code>NextToken</code> value in the response, which you can use to retrieve another
1099
- * group of objects. For the second and subsequent <code>GetProtectionStatus</code> requests,
1100
- * specify the value of <code>NextToken</code> from the previous response to get information
1101
- * about another batch of objects.</p>
1189
+ * <p>If you specify a value for <code>MaxResults</code> and you have more objects than the number that you specify
1190
+ * for <code>MaxResults</code>, Firewall Manager returns a <code>NextToken</code> value in the response, which you can use to retrieve another group of
1191
+ * objects. For the second and subsequent <code>GetProtectionStatus</code> requests, specify the value of <code>NextToken</code>
1192
+ * from the previous response to get information about another batch of objects.</p>
1102
1193
  */
1103
1194
  NextToken?: string;
1104
1195
  /**
1105
- * <p>Specifies the number of objects that you want Firewall Manager to return for this request. If
1106
- * you have more objects than the number that you specify for <code>MaxResults</code>, the
1107
- * response includes a <code>NextToken</code> value that you can use to get another batch of
1108
- * objects.</p>
1196
+ * <p>Specifies the number of objects that you want Firewall Manager to return for this request. If you have more
1197
+ * objects than the number that you specify for <code>MaxResults</code>, the response includes a
1198
+ * <code>NextToken</code> value that you can use to get another batch of objects.</p>
1109
1199
  */
1110
1200
  MaxResults?: number;
1111
1201
  }
@@ -1148,14 +1238,13 @@ export interface GetProtectionStatusResponse {
1148
1238
  */
1149
1239
  Data?: string;
1150
1240
  /**
1151
- * <p>If you have more objects than the number that you specified for <code>MaxResults</code>
1152
- * in the request, the response includes a <code>NextToken</code> value. To list more objects,
1153
- * submit another <code>GetProtectionStatus</code> request, and specify the
1154
- * <code>NextToken</code> value from the response in the <code>NextToken</code> value in
1155
- * the next request.</p>
1156
- * <p>Amazon Web Services SDKs provide auto-pagination that identify <code>NextToken</code> in a response
1157
- * and make subsequent request calls automatically on your behalf. However, this feature is
1158
- * not supported by <code>GetProtectionStatus</code>. You must submit subsequent requests with
1241
+ * <p>If you have more objects than the number that you specified for <code>MaxResults</code> in the request,
1242
+ * the response includes a <code>NextToken</code> value. To list more objects, submit another
1243
+ * <code>GetProtectionStatus</code> request, and specify the <code>NextToken</code> value from the response in the
1244
+ * <code>NextToken</code> value in the next request.</p>
1245
+ * <p>Amazon Web Services SDKs provide auto-pagination that identify <code>NextToken</code> in a response and
1246
+ * make subsequent request calls automatically on your behalf. However, this feature is not
1247
+ * supported by <code>GetProtectionStatus</code>. You must submit subsequent requests with
1159
1248
  * <code>NextToken</code> using your own processes. </p>
1160
1249
  */
1161
1250
  NextToken?: string;
@@ -1195,9 +1284,9 @@ export interface ProtocolsListData {
1195
1284
  */
1196
1285
  ListName: string | undefined;
1197
1286
  /**
1198
- * <p>A unique identifier for each update to the list. When you update the list, the update
1199
- * token must match the token of the current version of the application list. You can retrieve
1200
- * the update token by getting the list. </p>
1287
+ * <p>A unique identifier for each update to the list. When you update
1288
+ * the list, the update token must match the token of the current version of the application list.
1289
+ * You can retrieve the update token by getting the list. </p>
1201
1290
  */
1202
1291
  ListUpdateToken?: string;
1203
1292
  /**
@@ -1241,10 +1330,78 @@ export declare namespace GetProtocolsListResponse {
1241
1330
  */
1242
1331
  const filterSensitiveLog: (obj: GetProtocolsListResponse) => any;
1243
1332
  }
1333
+ export interface GetThirdPartyFirewallAssociationStatusRequest {
1334
+ /**
1335
+ * <p>The name of the third-party firewall vendor.</p>
1336
+ */
1337
+ ThirdPartyFirewall: ThirdPartyFirewall | string | undefined;
1338
+ }
1339
+ export declare namespace GetThirdPartyFirewallAssociationStatusRequest {
1340
+ /**
1341
+ * @internal
1342
+ */
1343
+ const filterSensitiveLog: (obj: GetThirdPartyFirewallAssociationStatusRequest) => any;
1344
+ }
1345
+ export declare enum MarketplaceSubscriptionOnboardingStatus {
1346
+ COMPLETE = "COMPLETE",
1347
+ NOT_COMPLETE = "NOT_COMPLETE",
1348
+ NO_SUBSCRIPTION = "NO_SUBSCRIPTION"
1349
+ }
1350
+ export interface GetThirdPartyFirewallAssociationStatusResponse {
1351
+ /**
1352
+ * <p>The current status for setting a Firewall Manager policy administrators account as an administrator of the third-party firewall tenant.</p>
1353
+ * <ul>
1354
+ * <li>
1355
+ * <p>
1356
+ * <code>ONBOARDING</code> - The Firewall Manager policy administrator is being designated as a tenant administrator.</p>
1357
+ * </li>
1358
+ * <li>
1359
+ * <p>
1360
+ * <code>ONBOARD_COMPLETE</code> - The Firewall Manager policy administrator is designated as a tenant administrator.</p>
1361
+ * </li>
1362
+ * <li>
1363
+ * <p>
1364
+ * <code>OFFBOARDING</code> - The Firewall Manager policy administrator is being removed as a tenant administrator.</p>
1365
+ * </li>
1366
+ * <li>
1367
+ * <p>
1368
+ * <code>OFFBOARD_COMPLETE</code> - The Firewall Manager policy administrator has been removed as a tenant administrator.</p>
1369
+ * </li>
1370
+ * <li>
1371
+ * <p>
1372
+ * <code>NOT_EXIST</code> - The Firewall Manager policy administrator doesn't exist as a tenant administrator.</p>
1373
+ * </li>
1374
+ * </ul>
1375
+ */
1376
+ ThirdPartyFirewallStatus?: ThirdPartyFirewallAssociationStatus | string;
1377
+ /**
1378
+ * <p>The status for subscribing to the third-party firewall vendor in the AWS Marketplace.</p>
1379
+ * <ul>
1380
+ * <li>
1381
+ * <p>
1382
+ * <code>NO_SUBSCRIPTION</code> - The Firewall Manager policy administrator isn't subscribed to the third-party firewall service in the AWS Marketplace.</p>
1383
+ * </li>
1384
+ * <li>
1385
+ * <p>
1386
+ * <code>NOT_COMPLETE</code> - The Firewall Manager policy administrator is in the process of subscribing to the third-party firewall service in the Amazon Web Services Marketplace, but doesn't yet have an active subscription.</p>
1387
+ * </li>
1388
+ * <li>
1389
+ * <p>
1390
+ * <code>COMPLETE</code> - The Firewall Manager policy administrator has an active subscription to the third-party firewall service in the Amazon Web Services Marketplace.</p>
1391
+ * </li>
1392
+ * </ul>
1393
+ */
1394
+ MarketplaceOnboardingStatus?: MarketplaceSubscriptionOnboardingStatus | string;
1395
+ }
1396
+ export declare namespace GetThirdPartyFirewallAssociationStatusResponse {
1397
+ /**
1398
+ * @internal
1399
+ */
1400
+ const filterSensitiveLog: (obj: GetThirdPartyFirewallAssociationStatusResponse) => any;
1401
+ }
1244
1402
  export interface GetViolationDetailsRequest {
1245
1403
  /**
1246
- * <p>The ID of the Firewall Manager policy that you want the details for. This currently only
1247
- * supports security group content audit policies.</p>
1404
+ * <p>The ID of the Firewall Manager policy that you want the details for. This currently only supports security group content audit policies.</p>
1248
1405
  */
1249
1406
  PolicyId: string | undefined;
1250
1407
  /**
@@ -1256,11 +1413,14 @@ export interface GetViolationDetailsRequest {
1256
1413
  */
1257
1414
  ResourceId: string | undefined;
1258
1415
  /**
1259
- * <p>The resource type. This is in the format shown in the <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-template-resource-type-ref.html">Amazon Web Services
1260
- * Resource Types Reference</a>. Supported resource types are:
1261
- * <code>AWS::EC2::Instance</code>, <code>AWS::EC2::NetworkInterface</code>,
1262
- * <code>AWS::EC2::SecurityGroup</code>, <code>AWS::NetworkFirewall::FirewallPolicy</code>,
1263
- * and <code>AWS::EC2::Subnet</code>. </p>
1416
+ * <p>The resource type. This is in the format shown in the <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-template-resource-type-ref.html">Amazon Web Services Resource Types Reference</a>.
1417
+ * Supported resource types are:
1418
+ * <code>AWS::EC2::Instance</code>,
1419
+ * <code>AWS::EC2::NetworkInterface</code>,
1420
+ * <code>AWS::EC2::SecurityGroup</code>,
1421
+ * <code>AWS::NetworkFirewall::FirewallPolicy</code>, and
1422
+ * <code>AWS::EC2::Subnet</code>.
1423
+ * </p>
1264
1424
  */
1265
1425
  ResourceType: string | undefined;
1266
1426
  }
@@ -1271,22 +1431,15 @@ export declare namespace GetViolationDetailsRequest {
1271
1431
  const filterSensitiveLog: (obj: GetViolationDetailsRequest) => any;
1272
1432
  }
1273
1433
  /**
1274
- * <p>A collection of key:value pairs associated with an Amazon Web Services resource. The key:value pair
1275
- * can be anything you define. Typically, the tag key represents a category (such as
1276
- * "environment") and the tag value represents a specific value within that category (such as
1277
- * "test," "development," or "production"). You can add up to 50 tags to each Amazon Web Services resource.
1278
- * </p>
1434
+ * <p>A collection of key:value pairs associated with an Amazon Web Services resource. The key:value pair can be anything you define. Typically, the tag key represents a category (such as "environment") and the tag value represents a specific value within that category (such as "test," "development," or "production"). You can add up to 50 tags to each Amazon Web Services resource. </p>
1279
1435
  */
1280
1436
  export interface Tag {
1281
1437
  /**
1282
- * <p>Part of the key:value pair that defines a tag. You can use a tag key to describe a
1283
- * category of information, such as "customer." Tag keys are case-sensitive.</p>
1438
+ * <p>Part of the key:value pair that defines a tag. You can use a tag key to describe a category of information, such as "customer." Tag keys are case-sensitive.</p>
1284
1439
  */
1285
1440
  Key: string | undefined;
1286
1441
  /**
1287
- * <p>Part of the key:value pair that defines a tag. You can use a tag value to describe a
1288
- * specific value within a category, such as "companyA" or "companyB." Tag values are
1289
- * case-sensitive. </p>
1442
+ * <p>Part of the key:value pair that defines a tag. You can use a tag value to describe a specific value within a category, such as "companyA" or "companyB." Tag values are case-sensitive. </p>
1290
1443
  */
1291
1444
  Value: string | undefined;
1292
1445
  }
@@ -1297,8 +1450,7 @@ export declare namespace Tag {
1297
1450
  const filterSensitiveLog: (obj: Tag) => any;
1298
1451
  }
1299
1452
  /**
1300
- * <p>The reference rule that partially matches the <code>ViolationTarget</code> rule and
1301
- * violation reason.</p>
1453
+ * <p>The reference rule that partially matches the <code>ViolationTarget</code> rule and violation reason.</p>
1302
1454
  */
1303
1455
  export interface PartialMatch {
1304
1456
  /**
@@ -1337,18 +1489,15 @@ export interface SecurityGroupRuleDescription {
1337
1489
  */
1338
1490
  PrefixListId?: string;
1339
1491
  /**
1340
- * <p>The IP protocol name (<code>tcp</code>, <code>udp</code>, <code>icmp</code>,
1341
- * <code>icmpv6</code>) or number.</p>
1492
+ * <p>The IP protocol name (<code>tcp</code>, <code>udp</code>, <code>icmp</code>, <code>icmpv6</code>) or number.</p>
1342
1493
  */
1343
1494
  Protocol?: string;
1344
1495
  /**
1345
- * <p>The start of the port range for the TCP and UDP protocols, or an ICMP/ICMPv6 type
1346
- * number. A value of <code>-1</code> indicates all ICMP/ICMPv6 types.</p>
1496
+ * <p>The start of the port range for the TCP and UDP protocols, or an ICMP/ICMPv6 type number. A value of <code>-1</code> indicates all ICMP/ICMPv6 types.</p>
1347
1497
  */
1348
1498
  FromPort?: number;
1349
1499
  /**
1350
- * <p>The end of the port range for the TCP and UDP protocols, or an ICMP/ICMPv6 code. A value
1351
- * of <code>-1</code> indicates all ICMP/ICMPv6 codes.</p>
1500
+ * <p>The end of the port range for the TCP and UDP protocols, or an ICMP/ICMPv6 code. A value of <code>-1</code> indicates all ICMP/ICMPv6 codes.</p>
1352
1501
  */
1353
1502
  ToPort?: number;
1354
1503
  }
@@ -1371,8 +1520,7 @@ export interface SecurityGroupRemediationAction {
1371
1520
  */
1372
1521
  Description?: string;
1373
1522
  /**
1374
- * <p>The final state of the rule specified in the <code>ViolationTarget</code> after it is
1375
- * remediated.</p>
1523
+ * <p>The final state of the rule specified in the <code>ViolationTarget</code> after it is remediated.</p>
1376
1524
  */
1377
1525
  RemediationResult?: SecurityGroupRuleDescription;
1378
1526
  /**
@@ -1387,8 +1535,7 @@ export declare namespace SecurityGroupRemediationAction {
1387
1535
  const filterSensitiveLog: (obj: SecurityGroupRemediationAction) => any;
1388
1536
  }
1389
1537
  /**
1390
- * <p>Violation detail for the rule violation in a security group when compared to the primary
1391
- * security group of the Firewall Manager policy.</p>
1538
+ * <p>Violation detail for the rule violation in a security group when compared to the primary security group of the Firewall Manager policy.</p>
1392
1539
  */
1393
1540
  export interface AwsVPCSecurityGroupViolation {
1394
1541
  /**
@@ -1400,8 +1547,7 @@ export interface AwsVPCSecurityGroupViolation {
1400
1547
  */
1401
1548
  ViolationTargetDescription?: string;
1402
1549
  /**
1403
- * <p>List of rules specified in the security group of the Firewall Manager policy that partially
1404
- * match the <code>ViolationTarget</code> rule.</p>
1550
+ * <p>List of rules specified in the security group of the Firewall Manager policy that partially match the <code>ViolationTarget</code> rule.</p>
1405
1551
  */
1406
1552
  PartialMatches?: PartialMatch[];
1407
1553
  /**
@@ -1416,8 +1562,8 @@ export declare namespace AwsVPCSecurityGroupViolation {
1416
1562
  const filterSensitiveLog: (obj: AwsVPCSecurityGroupViolation) => any;
1417
1563
  }
1418
1564
  /**
1419
- * <p>A DNS Firewall rule group that Firewall Manager tried to associate with a VPC is already associated
1420
- * with the VPC and can't be associated again. </p>
1565
+ * <p>A DNS Firewall rule group that Firewall Manager
1566
+ * tried to associate with a VPC is already associated with the VPC and can't be associated again. </p>
1421
1567
  */
1422
1568
  export interface DnsDuplicateRuleGroupViolation {
1423
1569
  /**
@@ -1436,9 +1582,7 @@ export declare namespace DnsDuplicateRuleGroupViolation {
1436
1582
  const filterSensitiveLog: (obj: DnsDuplicateRuleGroupViolation) => any;
1437
1583
  }
1438
1584
  /**
1439
- * <p>The VPC that Firewall Manager was applying a DNS Fireall policy to reached the limit for associated
1440
- * DNS Firewall rule groups. Firewall Manager tried to associate another rule group with the VPC and
1441
- * failed due to the limit. </p>
1585
+ * <p>The VPC that Firewall Manager was applying a DNS Fireall policy to reached the limit for associated DNS Firewall rule groups. Firewall Manager tried to associate another rule group with the VPC and failed due to the limit. </p>
1442
1586
  */
1443
1587
  export interface DnsRuleGroupLimitExceededViolation {
1444
1588
  /**
@@ -1450,7 +1594,7 @@ export interface DnsRuleGroupLimitExceededViolation {
1450
1594
  */
1451
1595
  ViolationTargetDescription?: string;
1452
1596
  /**
1453
- * <p>The number of rule groups currently associated with the VPC. </p>
1597
+ * <p>The number of rule groups currently associated with the VPC. </p>
1454
1598
  */
1455
1599
  NumberOfRuleGroupsAlreadyAssociated?: number;
1456
1600
  }
@@ -1461,8 +1605,8 @@ export declare namespace DnsRuleGroupLimitExceededViolation {
1461
1605
  const filterSensitiveLog: (obj: DnsRuleGroupLimitExceededViolation) => any;
1462
1606
  }
1463
1607
  /**
1464
- * <p>A rule group that Firewall Manager tried to associate with a VPC has the same priority as a rule
1465
- * group that's already associated. </p>
1608
+ * <p>A rule group that Firewall Manager
1609
+ * tried to associate with a VPC has the same priority as a rule group that's already associated. </p>
1466
1610
  */
1467
1611
  export interface DnsRuleGroupPriorityConflictViolation {
1468
1612
  /**
@@ -1470,8 +1614,7 @@ export interface DnsRuleGroupPriorityConflictViolation {
1470
1614
  */
1471
1615
  ViolationTarget?: string;
1472
1616
  /**
1473
- * <p>A description of the violation that specifies the VPC and the rule group that's already
1474
- * associated with it.</p>
1617
+ * <p>A description of the violation that specifies the VPC and the rule group that's already associated with it.</p>
1475
1618
  */
1476
1619
  ViolationTargetDescription?: string;
1477
1620
  /**
@@ -1479,14 +1622,13 @@ export interface DnsRuleGroupPriorityConflictViolation {
1479
1622
  */
1480
1623
  ConflictingPriority?: number;
1481
1624
  /**
1482
- * <p>The ID of the Firewall Manager DNS Firewall policy that was already applied to the VPC. This policy
1483
- * contains the rule group that's already associated with the VPC. </p>
1625
+ * <p>The ID of the Firewall Manager DNS Firewall policy that was already applied to the VPC.
1626
+ * This policy contains the rule group that's already associated with the VPC. </p>
1484
1627
  */
1485
1628
  ConflictingPolicyId?: string;
1486
1629
  /**
1487
- * <p>The priorities of rule groups that are already associated with the VPC. To retry your
1488
- * operation, choose priority settings that aren't in this list for the rule groups in your
1489
- * new DNS Firewall policy. </p>
1630
+ * <p>The priorities of rule groups that are already associated with the VPC. To retry your operation,
1631
+ * choose priority settings that aren't in this list for the rule groups in your new DNS Firewall policy. </p>
1490
1632
  */
1491
1633
  UnavailablePriorities?: number[];
1492
1634
  }
@@ -1527,6 +1669,33 @@ export declare namespace FirewallSubnetIsOutOfScopeViolation {
1527
1669
  */
1528
1670
  const filterSensitiveLog: (obj: FirewallSubnetIsOutOfScopeViolation) => any;
1529
1671
  }
1672
+ /**
1673
+ * <p>The violation details for a firewall subnet's VPC endpoint that's deleted or missing.</p>
1674
+ */
1675
+ export interface FirewallSubnetMissingVPCEndpointViolation {
1676
+ /**
1677
+ * <p>The ID of the firewall that this VPC endpoint is associated with.</p>
1678
+ */
1679
+ FirewallSubnetId?: string;
1680
+ /**
1681
+ * <p>The resource ID of the VPC associated with the deleted VPC subnet.</p>
1682
+ */
1683
+ VpcId?: string;
1684
+ /**
1685
+ * <p>The name of the Availability Zone of the deleted VPC subnet.</p>
1686
+ */
1687
+ SubnetAvailabilityZone?: string;
1688
+ /**
1689
+ * <p>The ID of the Availability Zone of the deleted VPC subnet.</p>
1690
+ */
1691
+ SubnetAvailabilityZoneId?: string;
1692
+ }
1693
+ export declare namespace FirewallSubnetMissingVPCEndpointViolation {
1694
+ /**
1695
+ * @internal
1696
+ */
1697
+ const filterSensitiveLog: (obj: FirewallSubnetMissingVPCEndpointViolation) => any;
1698
+ }
1530
1699
  export declare enum DestinationType {
1531
1700
  IPV4 = "IPV4",
1532
1701
  IPV6 = "IPV6",
@@ -1572,8 +1741,7 @@ export declare namespace Route {
1572
1741
  const filterSensitiveLog: (obj: Route) => any;
1573
1742
  }
1574
1743
  /**
1575
- * <p>Violation detail for an internet gateway route with an inactive state in the customer
1576
- * subnet route table or Network Firewall subnet route table.</p>
1744
+ * <p>Violation detail for an internet gateway route with an inactive state in the customer subnet route table or Network Firewall subnet route table.</p>
1577
1745
  */
1578
1746
  export interface NetworkFirewallBlackHoleRouteDetectedViolation {
1579
1747
  /**
@@ -1635,8 +1803,7 @@ export declare namespace ExpectedRoute {
1635
1803
  const filterSensitiveLog: (obj: ExpectedRoute) => any;
1636
1804
  }
1637
1805
  /**
1638
- * <p>Violation detail for the subnet for which internet traffic that hasn't been
1639
- * inspected.</p>
1806
+ * <p>Violation detail for the subnet for which internet traffic that hasn't been inspected.</p>
1640
1807
  */
1641
1808
  export interface NetworkFirewallInternetTrafficNotInspectedViolation {
1642
1809
  /**
@@ -1707,9 +1874,8 @@ export declare namespace NetworkFirewallInternetTrafficNotInspectedViolation {
1707
1874
  const filterSensitiveLog: (obj: NetworkFirewallInternetTrafficNotInspectedViolation) => any;
1708
1875
  }
1709
1876
  /**
1710
- * <p>Violation detail for the improperly configured subnet route. It's possible there is a
1711
- * missing route table route, or a configuration that causes traffic to cross an Availability
1712
- * Zone boundary.</p>
1877
+ * <p>Violation detail for the improperly configured subnet route. It's possible there is a missing route table route,
1878
+ * or a configuration that causes traffic to cross an Availability Zone boundary.</p>
1713
1879
  */
1714
1880
  export interface NetworkFirewallInvalidRouteConfigurationViolation {
1715
1881
  /**
@@ -1807,8 +1973,8 @@ export declare namespace NetworkFirewallMissingExpectedRoutesViolation {
1807
1973
  const filterSensitiveLog: (obj: NetworkFirewallMissingExpectedRoutesViolation) => any;
1808
1974
  }
1809
1975
  /**
1810
- * <p>Violation detail for Network Firewall for a subnet that's not associated to the expected Firewall Manager
1811
- * managed route table.</p>
1976
+ * <p>Violation detail for Network Firewall for a subnet that's not associated to the expected
1977
+ * Firewall Manager managed route table.</p>
1812
1978
  */
1813
1979
  export interface NetworkFirewallMissingExpectedRTViolation {
1814
1980
  /**
@@ -1824,8 +1990,7 @@ export interface NetworkFirewallMissingExpectedRTViolation {
1824
1990
  */
1825
1991
  AvailabilityZone?: string;
1826
1992
  /**
1827
- * <p>The resource ID of the current route table that's associated with the subnet, if one is
1828
- * available.</p>
1993
+ * <p>The resource ID of the current route table that's associated with the subnet, if one is available.</p>
1829
1994
  */
1830
1995
  CurrentRouteTable?: string;
1831
1996
  /**
@@ -1840,8 +2005,8 @@ export declare namespace NetworkFirewallMissingExpectedRTViolation {
1840
2005
  const filterSensitiveLog: (obj: NetworkFirewallMissingExpectedRTViolation) => any;
1841
2006
  }
1842
2007
  /**
1843
- * <p>Violation detail for Network Firewall for a subnet that doesn't have a Firewall Manager managed firewall
1844
- * in its VPC. </p>
2008
+ * <p>Violation detail for Network Firewall for a subnet that doesn't have a
2009
+ * Firewall Manager managed firewall in its VPC. </p>
1845
2010
  */
1846
2011
  export interface NetworkFirewallMissingFirewallViolation {
1847
2012
  /**
@@ -1868,8 +2033,8 @@ export declare namespace NetworkFirewallMissingFirewallViolation {
1868
2033
  const filterSensitiveLog: (obj: NetworkFirewallMissingFirewallViolation) => any;
1869
2034
  }
1870
2035
  /**
1871
- * <p>Violation detail for Network Firewall for an Availability Zone that's missing the expected
1872
- * Firewall Manager managed subnet.</p>
2036
+ * <p>Violation detail for Network Firewall for an Availability Zone that's
2037
+ * missing the expected Firewall Manager managed subnet.</p>
1873
2038
  */
1874
2039
  export interface NetworkFirewallMissingSubnetViolation {
1875
2040
  /**
@@ -1927,8 +2092,7 @@ export interface StatelessRuleGroup {
1927
2092
  */
1928
2093
  ResourceId?: string;
1929
2094
  /**
1930
- * <p>The priority of the rule group. Network Firewall evaluates the stateless rule groups in a
1931
- * firewall policy starting from the lowest priority setting. </p>
2095
+ * <p>The priority of the rule group. Network Firewall evaluates the stateless rule groups in a firewall policy starting from the lowest priority setting. </p>
1932
2096
  */
1933
2097
  Priority?: number;
1934
2098
  }
@@ -1947,18 +2111,15 @@ export interface NetworkFirewallPolicyDescription {
1947
2111
  */
1948
2112
  StatelessRuleGroups?: StatelessRuleGroup[];
1949
2113
  /**
1950
- * <p>The actions to take on packets that don't match any of the stateless rule groups.
1951
- * </p>
2114
+ * <p>The actions to take on packets that don't match any of the stateless rule groups. </p>
1952
2115
  */
1953
2116
  StatelessDefaultActions?: string[];
1954
2117
  /**
1955
- * <p>The actions to take on packet fragments that don't match any of the stateless rule
1956
- * groups. </p>
2118
+ * <p>The actions to take on packet fragments that don't match any of the stateless rule groups. </p>
1957
2119
  */
1958
2120
  StatelessFragmentDefaultActions?: string[];
1959
2121
  /**
1960
- * <p>Names of custom actions that are available for use in the stateless default actions
1961
- * settings.</p>
2122
+ * <p>Names of custom actions that are available for use in the stateless default actions settings.</p>
1962
2123
  */
1963
2124
  StatelessCustomActions?: string[];
1964
2125
  /**
@@ -1973,8 +2134,8 @@ export declare namespace NetworkFirewallPolicyDescription {
1973
2134
  const filterSensitiveLog: (obj: NetworkFirewallPolicyDescription) => any;
1974
2135
  }
1975
2136
  /**
1976
- * <p>Violation detail for Network Firewall for a firewall policy that has a different <a>NetworkFirewallPolicyDescription</a> than is required by the Firewall Manager policy.
1977
- * </p>
2137
+ * <p>Violation detail for Network Firewall for a firewall policy that has a different
2138
+ * <a>NetworkFirewallPolicyDescription</a> than is required by the Firewall Manager policy. </p>
1978
2139
  */
1979
2140
  export interface NetworkFirewallPolicyModifiedViolation {
1980
2141
  /**
@@ -1986,8 +2147,7 @@ export interface NetworkFirewallPolicyModifiedViolation {
1986
2147
  */
1987
2148
  CurrentPolicyDescription?: NetworkFirewallPolicyDescription;
1988
2149
  /**
1989
- * <p>The policy that should be in use in the individual account in order to be compliant.
1990
- * </p>
2150
+ * <p>The policy that should be in use in the individual account in order to be compliant. </p>
1991
2151
  */
1992
2152
  ExpectedPolicyDescription?: NetworkFirewallPolicyDescription;
1993
2153
  }
@@ -2041,7 +2201,7 @@ export interface NetworkFirewallUnexpectedGatewayRoutesViolation {
2041
2201
  */
2042
2202
  ViolatingRoutes?: Route[];
2043
2203
  /**
2044
- * <p>Information about the route table.</p>
2204
+ * <p>Information about the route table.</p>
2045
2205
  */
2046
2206
  RouteTableId?: string;
2047
2207
  /**
@@ -2056,13 +2216,11 @@ export declare namespace NetworkFirewallUnexpectedGatewayRoutesViolation {
2056
2216
  const filterSensitiveLog: (obj: NetworkFirewallUnexpectedGatewayRoutesViolation) => any;
2057
2217
  }
2058
2218
  /**
2059
- * <p>The action of associating an EC2 resource, such as a subnet or internet gateway, with a
2060
- * route table.</p>
2219
+ * <p>The action of associating an EC2 resource, such as a subnet or internet gateway, with a route table.</p>
2061
2220
  */
2062
2221
  export interface EC2AssociateRouteTableAction {
2063
2222
  /**
2064
- * <p>A description of the EC2 route table that is associated with the remediation
2065
- * action.</p>
2223
+ * <p>A description of the EC2 route table that is associated with the remediation action.</p>
2066
2224
  */
2067
2225
  Description?: string;
2068
2226
  /**
@@ -2070,13 +2228,11 @@ export interface EC2AssociateRouteTableAction {
2070
2228
  */
2071
2229
  RouteTableId: ActionTarget | undefined;
2072
2230
  /**
2073
- * <p>The ID of the subnet for the EC2 route table that is associated with the remediation
2074
- * action.</p>
2231
+ * <p>The ID of the subnet for the EC2 route table that is associated with the remediation action.</p>
2075
2232
  */
2076
2233
  SubnetId?: ActionTarget;
2077
2234
  /**
2078
- * <p>The ID of the gateway to be used with the EC2 route table that is associated with the
2079
- * remediation action.</p>
2235
+ * <p>The ID of the gateway to be used with the EC2 route table that is associated with the remediation action.</p>
2080
2236
  */
2081
2237
  GatewayId?: ActionTarget;
2082
2238
  }
@@ -2091,18 +2247,15 @@ export declare namespace EC2AssociateRouteTableAction {
2091
2247
  */
2092
2248
  export interface EC2CopyRouteTableAction {
2093
2249
  /**
2094
- * <p>A description of the copied EC2 route table that is associated with the remediation
2095
- * action.</p>
2250
+ * <p>A description of the copied EC2 route table that is associated with the remediation action.</p>
2096
2251
  */
2097
2252
  Description?: string;
2098
2253
  /**
2099
- * <p>The VPC ID of the copied EC2 route table that is associated with the remediation
2100
- * action.</p>
2254
+ * <p>The VPC ID of the copied EC2 route table that is associated with the remediation action.</p>
2101
2255
  */
2102
2256
  VpcId: ActionTarget | undefined;
2103
2257
  /**
2104
- * <p>The ID of the copied EC2 route table that is associated with the remediation
2105
- * action.</p>
2258
+ * <p>The ID of the copied EC2 route table that is associated with the remediation action.</p>
2106
2259
  */
2107
2260
  RouteTableId: ActionTarget | undefined;
2108
2261
  }
@@ -2133,13 +2286,11 @@ export interface EC2CreateRouteAction {
2133
2286
  */
2134
2287
  DestinationIpv6CidrBlock?: string;
2135
2288
  /**
2136
- * <p>Information about the ID of a VPC endpoint. Supported for Gateway Load Balancer
2137
- * endpoints only.</p>
2289
+ * <p>Information about the ID of a VPC endpoint. Supported for Gateway Load Balancer endpoints only.</p>
2138
2290
  */
2139
2291
  VpcEndpointId?: ActionTarget;
2140
2292
  /**
2141
- * <p>Information about the ID of an internet gateway or virtual private gateway attached to
2142
- * your VPC.</p>
2293
+ * <p>Information about the ID of an internet gateway or virtual private gateway attached to your VPC.</p>
2143
2294
  */
2144
2295
  GatewayId?: ActionTarget;
2145
2296
  /**
@@ -2181,8 +2332,7 @@ export interface EC2DeleteRouteAction {
2181
2332
  */
2182
2333
  Description?: string;
2183
2334
  /**
2184
- * <p>Information about the IPv4 CIDR range for the route. The value you specify must match
2185
- * the CIDR for the route exactly.</p>
2335
+ * <p>Information about the IPv4 CIDR range for the route. The value you specify must match the CIDR for the route exactly.</p>
2186
2336
  */
2187
2337
  DestinationCidrBlock?: string;
2188
2338
  /**
@@ -2190,8 +2340,7 @@ export interface EC2DeleteRouteAction {
2190
2340
  */
2191
2341
  DestinationPrefixListId?: string;
2192
2342
  /**
2193
- * <p>Information about the IPv6 CIDR range for the route. The value you specify must match
2194
- * the CIDR for the route exactly.</p>
2343
+ * <p>Information about the IPv6 CIDR range for the route. The value you specify must match the CIDR for the route exactly.</p>
2195
2344
  */
2196
2345
  DestinationIpv6CidrBlock?: string;
2197
2346
  /**
@@ -2214,8 +2363,7 @@ export interface EC2ReplaceRouteAction {
2214
2363
  */
2215
2364
  Description?: string;
2216
2365
  /**
2217
- * <p>Information about the IPv4 CIDR address block used for the destination match. The value
2218
- * that you provide must match the CIDR of an existing route in the table.</p>
2366
+ * <p>Information about the IPv4 CIDR address block used for the destination match. The value that you provide must match the CIDR of an existing route in the table.</p>
2219
2367
  */
2220
2368
  DestinationCidrBlock?: string;
2221
2369
  /**
@@ -2223,8 +2371,7 @@ export interface EC2ReplaceRouteAction {
2223
2371
  */
2224
2372
  DestinationPrefixListId?: string;
2225
2373
  /**
2226
- * <p>Information about the IPv6 CIDR address block used for the destination match. The value
2227
- * that you provide must match the CIDR of an existing route in the table.</p>
2374
+ * <p>Information about the IPv6 CIDR address block used for the destination match. The value that you provide must match the CIDR of an existing route in the table.</p>
2228
2375
  */
2229
2376
  DestinationIpv6CidrBlock?: string;
2230
2377
  /**
@@ -2313,8 +2460,7 @@ export interface RemediationAction {
2313
2460
  */
2314
2461
  EC2CopyRouteTableAction?: EC2CopyRouteTableAction;
2315
2462
  /**
2316
- * <p>Information about the ReplaceRouteTableAssociation action in the Amazon EC2
2317
- * API.</p>
2463
+ * <p>Information about the ReplaceRouteTableAssociation action in the Amazon EC2 API.</p>
2318
2464
  */
2319
2465
  EC2ReplaceRouteTableAssociationAction?: EC2ReplaceRouteTableAssociationAction;
2320
2466
  /**
@@ -2379,8 +2525,7 @@ export declare namespace PossibleRemediationAction {
2379
2525
  const filterSensitiveLog: (obj: PossibleRemediationAction) => any;
2380
2526
  }
2381
2527
  /**
2382
- * <p>A list of possible remediation action lists. Each individual possible remediation action
2383
- * is a list of individual remediation actions.</p>
2528
+ * <p>A list of possible remediation action lists. Each individual possible remediation action is a list of individual remediation actions.</p>
2384
2529
  */
2385
2530
  export interface PossibleRemediationActions {
2386
2531
  /**
@@ -2457,6 +2602,91 @@ export declare namespace RouteHasOutOfScopeEndpointViolation {
2457
2602
  */
2458
2603
  const filterSensitiveLog: (obj: RouteHasOutOfScopeEndpointViolation) => any;
2459
2604
  }
2605
+ /**
2606
+ * <p>The violation details for a third-party firewall that's not associated with an Firewall Manager managed route table.</p>
2607
+ */
2608
+ export interface ThirdPartyFirewallMissingExpectedRouteTableViolation {
2609
+ /**
2610
+ * <p>The ID of the third-party firewall or VPC resource that's causing the violation.</p>
2611
+ */
2612
+ ViolationTarget?: string;
2613
+ /**
2614
+ * <p>The resource ID of the VPC associated with a fireawll subnet that's causing the violation.</p>
2615
+ */
2616
+ VPC?: string;
2617
+ /**
2618
+ * <p>The Availability Zone of the firewall subnet that's causing the violation.</p>
2619
+ */
2620
+ AvailabilityZone?: string;
2621
+ /**
2622
+ * <p>The resource ID of the current route table that's associated with the subnet, if one is available.</p>
2623
+ */
2624
+ CurrentRouteTable?: string;
2625
+ /**
2626
+ * <p>The resource ID of the route table that should be associated with the subnet.</p>
2627
+ */
2628
+ ExpectedRouteTable?: string;
2629
+ }
2630
+ export declare namespace ThirdPartyFirewallMissingExpectedRouteTableViolation {
2631
+ /**
2632
+ * @internal
2633
+ */
2634
+ const filterSensitiveLog: (obj: ThirdPartyFirewallMissingExpectedRouteTableViolation) => any;
2635
+ }
2636
+ /**
2637
+ * <p>The violation details about a third-party firewall's subnet that doesn't have a Firewall Manager managed firewall in its VPC.</p>
2638
+ */
2639
+ export interface ThirdPartyFirewallMissingFirewallViolation {
2640
+ /**
2641
+ * <p>The ID of the third-party firewall that's causing the violation.</p>
2642
+ */
2643
+ ViolationTarget?: string;
2644
+ /**
2645
+ * <p>The resource ID of the VPC associated with a third-party firewall.</p>
2646
+ */
2647
+ VPC?: string;
2648
+ /**
2649
+ * <p>The Availability Zone of the third-party firewall that's causing the violation.</p>
2650
+ */
2651
+ AvailabilityZone?: string;
2652
+ /**
2653
+ * <p>The reason the resource is causing this violation, if a reason is available.</p>
2654
+ */
2655
+ TargetViolationReason?: string;
2656
+ }
2657
+ export declare namespace ThirdPartyFirewallMissingFirewallViolation {
2658
+ /**
2659
+ * @internal
2660
+ */
2661
+ const filterSensitiveLog: (obj: ThirdPartyFirewallMissingFirewallViolation) => any;
2662
+ }
2663
+ /**
2664
+ * <p>The violation details for a third-party firewall for an Availability Zone that's missing the Firewall Manager managed subnet.</p>
2665
+ */
2666
+ export interface ThirdPartyFirewallMissingSubnetViolation {
2667
+ /**
2668
+ * <p>The ID of the third-party firewall or VPC resource that's causing the violation.</p>
2669
+ */
2670
+ ViolationTarget?: string;
2671
+ /**
2672
+ * <p>The resource ID of the VPC associated with a subnet that's causing the violation.</p>
2673
+ */
2674
+ VPC?: string;
2675
+ /**
2676
+ * <p>The Availability Zone of a subnet that's causing the violation.</p>
2677
+ */
2678
+ AvailabilityZone?: string;
2679
+ /**
2680
+ * <p>The reason the resource is causing the violation, if a reason is available.</p>
2681
+ */
2682
+ TargetViolationReason?: string;
2683
+ }
2684
+ export declare namespace ThirdPartyFirewallMissingSubnetViolation {
2685
+ /**
2686
+ * @internal
2687
+ */
2688
+ const filterSensitiveLog: (obj: ThirdPartyFirewallMissingSubnetViolation) => any;
2689
+ }
2460
2690
  /**
2461
2691
  * <p>Violation detail based on resource type.</p>
2462
2692
  */
@@ -2474,25 +2704,25 @@ export interface ResourceViolation {
2474
2704
  */
2475
2705
  AwsEc2InstanceViolation?: AwsEc2InstanceViolation;
2476
2706
  /**
2477
- * <p>Violation detail for an Network Firewall policy that indicates that a subnet has no Firewall Manager managed
2478
- * firewall in its VPC. </p>
2707
+ * <p>Violation detail for an Network Firewall policy that indicates that a subnet has no Firewall Manager
2708
+ * managed firewall in its VPC. </p>
2479
2709
  */
2480
2710
  NetworkFirewallMissingFirewallViolation?: NetworkFirewallMissingFirewallViolation;
2481
2711
  /**
2482
2712
  * <p>Violation detail for an Network Firewall policy that indicates that an Availability Zone is
2483
- * missing the expected Firewall Manager managed subnet.</p>
2713
+ * missing the expected Firewall Manager managed subnet.</p>
2484
2714
  */
2485
2715
  NetworkFirewallMissingSubnetViolation?: NetworkFirewallMissingSubnetViolation;
2486
2716
  /**
2487
- * <p>Violation detail for an Network Firewall policy that indicates that a subnet is not associated
2488
- * with the expected Firewall Manager managed route table. </p>
2717
+ * <p>Violation detail for an Network Firewall policy that indicates that a subnet
2718
+ * is not associated with the expected Firewall Manager managed route table. </p>
2489
2719
  */
2490
2720
  NetworkFirewallMissingExpectedRTViolation?: NetworkFirewallMissingExpectedRTViolation;
2491
2721
  /**
2492
- * <p>Violation detail for an Network Firewall policy that indicates that a firewall policy in an
2493
- * individual account has been modified in a way that makes it noncompliant. For example, the
2494
- * individual account owner might have deleted a rule group, changed the priority of a
2495
- * stateless rule group, or changed a policy default action.</p>
2722
+ * <p>Violation detail for an Network Firewall policy that indicates that a firewall policy
2723
+ * in an individual account has been modified in a way that makes it noncompliant.
2724
+ * For example, the individual account owner might have deleted a rule group,
2725
+ * changed the priority of a stateless rule group, or changed a policy default action.</p>
2496
2726
  */
2497
2727
  NetworkFirewallPolicyModifiedViolation?: NetworkFirewallPolicyModifiedViolation;
2498
2728
  /**
@@ -2504,8 +2734,7 @@ export interface ResourceViolation {
2504
2734
  */
2505
2735
  NetworkFirewallInvalidRouteConfigurationViolation?: NetworkFirewallInvalidRouteConfigurationViolation;
2506
2736
  /**
2507
- * <p>Violation detail for an internet gateway route with an inactive state in the customer
2508
- * subnet route table or Network Firewall subnet route table.</p>
2737
+ * <p>Violation detail for an internet gateway route with an inactive state in the customer subnet route table or Network Firewall subnet route table.</p>
2509
2738
  */
2510
2739
  NetworkFirewallBlackHoleRouteDetectedViolation?: NetworkFirewallBlackHoleRouteDetectedViolation;
2511
2740
  /**
@@ -2522,25 +2751,20 @@ export interface ResourceViolation {
2522
2751
  NetworkFirewallMissingExpectedRoutesViolation?: NetworkFirewallMissingExpectedRoutesViolation;
2523
2752
  /**
2524
2753
  * <p>Violation detail for a DNS Firewall policy that indicates that a rule group that Firewall Manager
2525
- * tried to associate with a VPC has the same priority as a rule group that's already
2526
- * associated. </p>
2754
+ * tried to associate with a VPC has the same priority as a rule group that's already associated. </p>
2527
2755
  */
2528
2756
  DnsRuleGroupPriorityConflictViolation?: DnsRuleGroupPriorityConflictViolation;
2529
2757
  /**
2530
2758
  * <p>Violation detail for a DNS Firewall policy that indicates that a rule group that Firewall Manager
2531
- * tried to associate with a VPC is already associated with the VPC and can't be associated
2532
- * again. </p>
2759
+ * tried to associate with a VPC is already associated with the VPC and can't be associated again. </p>
2533
2760
  */
2534
2761
  DnsDuplicateRuleGroupViolation?: DnsDuplicateRuleGroupViolation;
2535
2762
  /**
2536
- * <p>Violation detail for a DNS Firewall policy that indicates that the VPC reached the limit
2537
- * for associated DNS Firewall rule groups. Firewall Manager tried to associate another rule group with
2538
- * the VPC and failed. </p>
2763
+ * <p>Violation detail for a DNS Firewall policy that indicates that the VPC reached the limit for associated DNS Firewall rule groups. Firewall Manager tried to associate another rule group with the VPC and failed. </p>
2539
2764
  */
2540
2765
  DnsRuleGroupLimitExceededViolation?: DnsRuleGroupLimitExceededViolation;
2541
2766
  /**
2542
- * <p>A list of possible remediation action lists. Each individual possible remediation action
2543
- * is a list of individual remediation actions.</p>
2767
+ * <p>A list of possible remediation action lists. Each individual possible remediation action is a list of individual remediation actions.</p>
2544
2768
  */
2545
2769
  PossibleRemediationActions?: PossibleRemediationActions;
2546
2770
  /**
@@ -2551,6 +2775,22 @@ export interface ResourceViolation {
2551
2775
  * <p>Contains details about the route endpoint that violates the policy scope.</p>
2552
2776
  */
2553
2777
  RouteHasOutOfScopeEndpointViolation?: RouteHasOutOfScopeEndpointViolation;
2778
+ /**
2779
+ * <p>The violation details for a third-party firewall that's been deleted.</p>
2780
+ */
2781
+ ThirdPartyFirewallMissingFirewallViolation?: ThirdPartyFirewallMissingFirewallViolation;
2782
+ /**
2783
+ * <p>The violation details for a third-party firewall's subnet that's been deleted.</p>
2784
+ */
2785
+ ThirdPartyFirewallMissingSubnetViolation?: ThirdPartyFirewallMissingSubnetViolation;
2786
+ /**
2787
+ * <p>The violation details for a third-party firewall that has the Firewall Manager managed route table that was associated with the third-party firewall has been deleted.</p>
2788
+ */
2789
+ ThirdPartyFirewallMissingExpectedRouteTableViolation?: ThirdPartyFirewallMissingExpectedRouteTableViolation;
2790
+ /**
2791
+ * <p>The violation details for a third-party firewall's VPC endpoint subnet that was deleted.</p>
2792
+ */
2793
+ FirewallSubnetMissingVPCEndpointViolation?: FirewallSubnetMissingVPCEndpointViolation;
2554
2794
  }
2555
2795
  export declare namespace ResourceViolation {
2556
2796
  /**
@@ -2559,8 +2799,7 @@ export declare namespace ResourceViolation {
2559
2799
  const filterSensitiveLog: (obj: ResourceViolation) => any;
2560
2800
  }
2561
2801
  /**
2562
- * <p>Violations for a resource based on the specified Firewall Manager policy and Amazon Web Services
2563
- * account.</p>
2802
+ * <p>Violations for a resource based on the specified Firewall Manager policy and Amazon Web Services account.</p>
2564
2803
  */
2565
2804
  export interface ViolationDetail {
2566
2805
  /**
@@ -2585,8 +2824,6 @@ export interface ViolationDetail {
2585
2824
  ResourceViolations: ResourceViolation[] | undefined;
2586
2825
  /**
2587
2826
  * <p>The <code>ResourceTag</code> objects associated with the resource.</p>
2588
- * <p> This option isn't available for the centralized deployment model when creating policies
2589
- * to configure Network Firewall. </p>
2590
2827
  */
2591
2828
  ResourceTags?: Tag[];
2592
2829
  /**
@@ -2618,16 +2855,15 @@ export interface ListAppsListsRequest {
2618
2855
  */
2619
2856
  DefaultLists?: boolean;
2620
2857
  /**
2621
- * <p>If you specify a value for <code>MaxResults</code> in your list request, and you have
2622
- * more objects than the maximum, Firewall Manager returns this token in the response. For all but
2623
- * the first request, you provide the token returned by the prior request in the request
2624
- * parameters, to retrieve the next batch of objects.</p>
2858
+ * <p>If you specify a value for <code>MaxResults</code> in your list request, and you have more objects than the maximum,
2859
+ * Firewall Manager returns this token in the response. For all but the first request, you provide the token returned by the prior request
2860
+ * in the request parameters, to retrieve the next batch of objects.</p>
2625
2861
  */
2626
2862
  NextToken?: string;
2627
2863
  /**
2628
- * <p>The maximum number of objects that you want Firewall Manager to return for this request. If
2629
- * more objects are available, in the response, Firewall Manager provides a <code>NextToken</code>
2630
- * value that you can use in a subsequent call to get the next batch of objects.</p>
2864
+ * <p>The maximum number of objects that you want Firewall Manager to return for this request. If more
2865
+ * objects are available, in the response, Firewall Manager provides a
2866
+ * <code>NextToken</code> value that you can use in a subsequent call to get the next batch of objects.</p>
2631
2867
  * <p>If you don't specify this, Firewall Manager returns all available objects.</p>
2632
2868
  */
2633
2869
  MaxResults: number | undefined;
@@ -2644,9 +2880,8 @@ export interface ListAppsListsResponse {
2644
2880
  */
2645
2881
  AppsLists?: AppsListDataSummary[];
2646
2882
  /**
2647
- * <p>If you specify a value for <code>MaxResults</code> in your list request, and you have
2648
- * more objects than the maximum, Firewall Manager returns this token in the response. You can use
2649
- * this token in subsequent requests to retrieve the next batch of objects.</p>
2883
+ * <p>If you specify a value for <code>MaxResults</code> in your list request, and you have more objects than the maximum,
2884
+ * Firewall Manager returns this token in the response. You can use this token in subsequent requests to retrieve the next batch of objects.</p>
2650
2885
  */
2651
2886
  NextToken?: string;
2652
2887
  }
@@ -2663,20 +2898,20 @@ export interface ListComplianceStatusRequest {
2663
2898
  PolicyId: string | undefined;
2664
2899
  /**
2665
2900
  * <p>If you specify a value for <code>MaxResults</code> and you have more
2666
- * <code>PolicyComplianceStatus</code> objects than the number that you specify for
2667
- * <code>MaxResults</code>, Firewall Manager returns a <code>NextToken</code> value in the
2668
- * response that allows you to list another group of <code>PolicyComplianceStatus</code>
2669
- * objects. For the second and subsequent <code>ListComplianceStatus</code> requests, specify
2670
- * the value of <code>NextToken</code> from the previous response to get information about
2671
- * another batch of <code>PolicyComplianceStatus</code> objects.</p>
2901
+ * <code>PolicyComplianceStatus</code> objects than the number that you specify for
2902
+ * <code>MaxResults</code>, Firewall Manager returns a <code>NextToken</code> value in the
2903
+ * response that allows you to list another group of <code>PolicyComplianceStatus</code> objects.
2904
+ * For the second and subsequent <code>ListComplianceStatus</code> requests, specify the value of
2905
+ * <code>NextToken</code> from the previous response to get information about another batch of
2906
+ * <code>PolicyComplianceStatus</code> objects.</p>
2672
2907
  */
2673
2908
  NextToken?: string;
2674
2909
  /**
2675
- * <p>Specifies the number of <code>PolicyComplianceStatus</code> objects that you want Firewall Manager
2676
- * to return for this request. If you have more <code>PolicyComplianceStatus</code> objects
2677
- * than the number that you specify for <code>MaxResults</code>, the response includes a
2678
- * <code>NextToken</code> value that you can use to get another batch of
2679
- * <code>PolicyComplianceStatus</code> objects.</p>
2910
+ * <p>Specifies the number of <code>PolicyComplianceStatus</code> objects that you want
2911
+ * Firewall Manager to return for this request. If you have more
2912
+ * <code>PolicyComplianceStatus</code> objects than the number that you specify for
2913
+ * <code>MaxResults</code>, the response includes a <code>NextToken</code> value that you can
2914
+ * use to get another batch of <code>PolicyComplianceStatus</code> objects.</p>
2680
2915
  */
2681
2916
  MaxResults?: number;
2682
2917
  }
@@ -2691,9 +2926,9 @@ export declare enum PolicyComplianceStatusType {
2691
2926
  NonCompliant = "NON_COMPLIANT"
2692
2927
  }
2693
2928
  /**
2694
- * <p>Describes the compliance status for the account. An account is considered noncompliant
2695
- * if it includes resources that are not protected by the specified policy or that don't
2696
- * comply with the policy.</p>
2929
+ * <p>Describes the compliance status for the account. An account is considered noncompliant if
2930
+ * it includes resources that are not protected by the specified policy or that don't comply with
2931
+ * the policy.</p>
2697
2932
  */
2698
2933
  export interface EvaluationResult {
2699
2934
  /**
@@ -2701,15 +2936,15 @@ export interface EvaluationResult {
2701
2936
  */
2702
2937
  ComplianceStatus?: PolicyComplianceStatusType | string;
2703
2938
  /**
2704
- * <p>The number of resources that are noncompliant with the specified policy. For WAF
2705
- * and Shield Advanced policies, a resource is considered noncompliant if it is not associated
2706
- * with the policy. For security group policies, a resource is considered noncompliant if it
2707
- * doesn't comply with the rules of the policy and remediation is disabled or not
2708
- * possible.</p>
2939
+ * <p>The number of resources that are noncompliant with the specified policy. For WAF and
2940
+ * Shield Advanced policies, a resource is considered noncompliant if it is not associated with
2941
+ * the policy. For security group policies, a resource is considered noncompliant if it doesn't
2942
+ * comply with the rules of the policy and remediation is disabled or not possible.</p>
2709
2943
  */
2710
2944
  ViolatorCount?: number;
2711
2945
  /**
2712
- * <p>Indicates that over 100 resources are noncompliant with the Firewall Manager policy.</p>
2946
+ * <p>Indicates that over 100 resources are noncompliant with the Firewall Manager
2947
+ * policy.</p>
2713
2948
  */
2714
2949
  EvaluationLimitExceeded?: boolean;
2715
2950
  }
@@ -2721,9 +2956,9 @@ export declare namespace EvaluationResult {
2721
2956
  }
2722
2957
  /**
2723
2958
  * <p>Indicates whether the account is compliant with the specified policy. An account is
2724
- * considered noncompliant if it includes resources that are not protected by the policy, for
2725
- * WAF and Shield Advanced policies, or that are noncompliant with the policy, for
2726
- * security group policies.</p>
2959
+ * considered noncompliant if it includes resources that are not protected by the policy, for
2960
+ * WAF and Shield Advanced policies, or that are noncompliant with the policy, for security group
2961
+ * policies.</p>
2727
2962
  */
2728
2963
  export interface PolicyComplianceStatus {
2729
2964
  /**
@@ -2751,8 +2986,8 @@ export interface PolicyComplianceStatus {
2751
2986
  */
2752
2987
  LastUpdated?: Date;
2753
2988
  /**
2754
- * <p>Details about problems with dependent services, such as WAF or Config, and the
2755
- * error message received that indicates the problem with the service.</p>
2989
+ * <p>Details about problems with dependent services, such as WAF or Config,
2990
+ * and the error message received that indicates the problem with the service.</p>
2756
2991
  */
2757
2992
  IssueInfoMap?: {
2758
2993
  [key: string]: string;
@@ -2771,11 +3006,11 @@ export interface ListComplianceStatusResponse {
2771
3006
  PolicyComplianceStatusList?: PolicyComplianceStatus[];
2772
3007
  /**
2773
3008
  * <p>If you have more <code>PolicyComplianceStatus</code> objects than the number that you
2774
- * specified for <code>MaxResults</code> in the request, the response includes a
2775
- * <code>NextToken</code> value. To list more <code>PolicyComplianceStatus</code> objects,
2776
- * submit another <code>ListComplianceStatus</code> request, and specify the
2777
- * <code>NextToken</code> value from the response in the <code>NextToken</code> value in
2778
- * the next request.</p>
3009
+ * specified for <code>MaxResults</code> in the request, the response includes a
3010
+ * <code>NextToken</code> value. To list more <code>PolicyComplianceStatus</code> objects,
3011
+ * submit another <code>ListComplianceStatus</code> request, and specify the
3012
+ * <code>NextToken</code> value from the response in the <code>NextToken</code> value in the
3013
+ * next request.</p>
2779
3014
  */
2780
3015
  NextToken?: string;
2781
3016
  }
@@ -2787,19 +3022,19 @@ export declare namespace ListComplianceStatusResponse {
2787
3022
  }
2788
3023
  export interface ListMemberAccountsRequest {
2789
3024
  /**
2790
- * <p>If you specify a value for <code>MaxResults</code> and you have more account IDs than
2791
- * the number that you specify for <code>MaxResults</code>, Firewall Manager returns a
2792
- * <code>NextToken</code> value in the response that allows you to list another group of
2793
- * IDs. For the second and subsequent <code>ListMemberAccountsRequest</code> requests, specify
2794
- * the value of <code>NextToken</code> from the previous response to get information about
2795
- * another batch of member account IDs.</p>
3025
+ * <p>If you specify a value for <code>MaxResults</code> and you have more account IDs than the
3026
+ * number that you specify for <code>MaxResults</code>, Firewall Manager returns a
3027
+ * <code>NextToken</code> value in the response that allows you to list another group of IDs.
3028
+ * For the second and subsequent <code>ListMemberAccountsRequest</code> requests, specify the
3029
+ * value of <code>NextToken</code> from the previous response to get information about another
3030
+ * batch of member account IDs.</p>
2796
3031
  */
2797
3032
  NextToken?: string;
2798
3033
  /**
2799
- * <p>Specifies the number of member account IDs that you want Firewall Manager to return for this
2800
- * request. If you have more IDs than the number that you specify for <code>MaxResults</code>,
2801
- * the response includes a <code>NextToken</code> value that you can use to get another batch
2802
- * of member account IDs.</p>
3034
+ * <p>Specifies the number of member account IDs that you want Firewall Manager to return
3035
+ * for this request. If you have more IDs than the number that you specify for
3036
+ * <code>MaxResults</code>, the response includes a <code>NextToken</code> value that you can
3037
+ * use to get another batch of member account IDs.</p>
2803
3038
  */
2804
3039
  MaxResults?: number;
2805
3040
  }
@@ -2816,10 +3051,10 @@ export interface ListMemberAccountsResponse {
2816
3051
  MemberAccounts?: string[];
2817
3052
  /**
2818
3053
  * <p>If you have more member account IDs than the number that you specified for
2819
- * <code>MaxResults</code> in the request, the response includes a <code>NextToken</code>
2820
- * value. To list more IDs, submit another <code>ListMemberAccounts</code> request, and
2821
- * specify the <code>NextToken</code> value from the response in the <code>NextToken</code>
2822
- * value in the next request.</p>
3054
+ * <code>MaxResults</code> in the request, the response includes a <code>NextToken</code>
3055
+ * value. To list more IDs, submit another <code>ListMemberAccounts</code> request, and specify
3056
+ * the <code>NextToken</code> value from the response in the <code>NextToken</code> value in the
3057
+ * next request.</p>
2823
3058
  */
2824
3059
  NextToken?: string;
2825
3060
  }
@@ -2832,20 +3067,19 @@ export declare namespace ListMemberAccountsResponse {
2832
3067
  export interface ListPoliciesRequest {
2833
3068
  /**
2834
3069
  * <p>If you specify a value for <code>MaxResults</code> and you have more
2835
- * <code>PolicySummary</code> objects than the number that you specify for
2836
- * <code>MaxResults</code>, Firewall Manager returns a <code>NextToken</code> value in the
2837
- * response that allows you to list another group of <code>PolicySummary</code> objects. For
2838
- * the second and subsequent <code>ListPolicies</code> requests, specify the value of
2839
- * <code>NextToken</code> from the previous response to get information about another batch
2840
- * of <code>PolicySummary</code> objects.</p>
3070
+ * <code>PolicySummary</code> objects than the number that you specify for
3071
+ * <code>MaxResults</code>, Firewall Manager returns a <code>NextToken</code> value in the
3072
+ * response that allows you to list another group of <code>PolicySummary</code> objects. For the
3073
+ * second and subsequent <code>ListPolicies</code> requests, specify the value of
3074
+ * <code>NextToken</code> from the previous response to get information about another batch of
3075
+ * <code>PolicySummary</code> objects.</p>
2841
3076
  */
2842
3077
  NextToken?: string;
2843
3078
  /**
2844
- * <p>Specifies the number of <code>PolicySummary</code> objects that you want Firewall Manager to
2845
- * return for this request. If you have more <code>PolicySummary</code> objects than the
2846
- * number that you specify for <code>MaxResults</code>, the response includes a
2847
- * <code>NextToken</code> value that you can use to get another batch of
2848
- * <code>PolicySummary</code> objects.</p>
3079
+ * <p>Specifies the number of <code>PolicySummary</code> objects that you want Firewall Manager to return for this request. If you have more <code>PolicySummary</code> objects than
3080
+ * the number that you specify for <code>MaxResults</code>, the response includes a
3081
+ * <code>NextToken</code> value that you can use to get another batch of
3082
+ * <code>PolicySummary</code> objects.</p>
2849
3083
  */
2850
3084
  MaxResults?: number;
2851
3085
  }
@@ -2873,22 +3107,21 @@ export interface PolicySummary {
2873
3107
  PolicyName?: string;
2874
3108
  /**
2875
3109
  * <p>The type of resource protected by or in scope of the policy. This is in the format shown
2876
- * in the <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-template-resource-type-ref.html">Amazon Web Services
2877
- * Resource Types Reference</a>. For WAF and Shield Advanced, examples include
2878
- * <code>AWS::ElasticLoadBalancingV2::LoadBalancer</code> and
2879
- * <code>AWS::CloudFront::Distribution</code>. For a security group common policy, valid
2880
- * values are <code>AWS::EC2::NetworkInterface</code> and <code>AWS::EC2::Instance</code>. For
2881
- * a security group content audit policy, valid values are
2882
- * <code>AWS::EC2::SecurityGroup</code>, <code>AWS::EC2::NetworkInterface</code>, and
2883
- * <code>AWS::EC2::Instance</code>. For a security group usage audit policy, the value is
2884
- * <code>AWS::EC2::SecurityGroup</code>. For an Network Firewall policy or DNS Firewall policy,
2885
- * the value is <code>AWS::EC2::VPC</code>.</p>
3110
+ * in the <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-template-resource-type-ref.html">Amazon Web Services Resource Types Reference</a>.
3111
+ * For WAF and Shield Advanced, examples include
3112
+ * <code>AWS::ElasticLoadBalancingV2::LoadBalancer</code> and
3113
+ * <code>AWS::CloudFront::Distribution</code>. For a security group common policy, valid values
3114
+ * are <code>AWS::EC2::NetworkInterface</code> and <code>AWS::EC2::Instance</code>. For a
3115
+ * security group content audit policy, valid values are <code>AWS::EC2::SecurityGroup</code>,
3116
+ * <code>AWS::EC2::NetworkInterface</code>, and <code>AWS::EC2::Instance</code>. For a security
3117
+ * group usage audit policy, the value is <code>AWS::EC2::SecurityGroup</code>. For an Network Firewall policy or DNS Firewall policy,
3118
+ * the value is <code>AWS::EC2::VPC</code>.</p>
2886
3119
  */
2887
3120
  ResourceType?: string;
2888
3121
  /**
2889
- * <p>The service that the policy is using to protect the resources. This specifies the type
2890
- * of policy that is created, either an WAF policy, a Shield Advanced policy, or a
2891
- * security group policy.</p>
3122
+ * <p>The service that the policy is using to protect the resources. This specifies the type of
3123
+ * policy that is created, either an WAF policy, a Shield Advanced policy, or a security
3124
+ * group policy.</p>
2892
3125
  */
2893
3126
  SecurityServiceType?: SecurityServiceType | string;
2894
3127
  /**
@@ -2916,11 +3149,11 @@ export interface ListPoliciesResponse {
2916
3149
  */
2917
3150
  PolicyList?: PolicySummary[];
2918
3151
  /**
2919
- * <p>If you have more <code>PolicySummary</code> objects than the number that you specified
2920
- * for <code>MaxResults</code> in the request, the response includes a <code>NextToken</code>
2921
- * value. To list more <code>PolicySummary</code> objects, submit another
2922
- * <code>ListPolicies</code> request, and specify the <code>NextToken</code> value from the
2923
- * response in the <code>NextToken</code> value in the next request.</p>
3152
+ * <p>If you have more <code>PolicySummary</code> objects than the number that you specified for
3153
+ * <code>MaxResults</code> in the request, the response includes a <code>NextToken</code>
3154
+ * value. To list more <code>PolicySummary</code> objects, submit another
3155
+ * <code>ListPolicies</code> request, and specify the <code>NextToken</code> value from the
3156
+ * response in the <code>NextToken</code> value in the next request.</p>
2924
3157
  */
2925
3158
  NextToken?: string;
2926
3159
  }
@@ -2936,16 +3169,15 @@ export interface ListProtocolsListsRequest {
2936
3169
  */
2937
3170
  DefaultLists?: boolean;
2938
3171
  /**
2939
- * <p>If you specify a value for <code>MaxResults</code> in your list request, and you have
2940
- * more objects than the maximum, Firewall Manager returns this token in the response. For all but
2941
- * the first request, you provide the token returned by the prior request in the request
2942
- * parameters, to retrieve the next batch of objects.</p>
3172
+ * <p>If you specify a value for <code>MaxResults</code> in your list request, and you have more objects than the maximum,
3173
+ * Firewall Manager returns this token in the response. For all but the first request, you provide the token returned by the prior request
3174
+ * in the request parameters, to retrieve the next batch of objects.</p>
2943
3175
  */
2944
3176
  NextToken?: string;
2945
3177
  /**
2946
- * <p>The maximum number of objects that you want Firewall Manager to return for this request. If
2947
- * more objects are available, in the response, Firewall Manager provides a <code>NextToken</code>
2948
- * value that you can use in a subsequent call to get the next batch of objects.</p>
3178
+ * <p>The maximum number of objects that you want Firewall Manager to return for this request. If more
3179
+ * objects are available, in the response, Firewall Manager provides a
3180
+ * <code>NextToken</code> value that you can use in a subsequent call to get the next batch of objects.</p>
2949
3181
  * <p>If you don't specify this, Firewall Manager returns all available objects.</p>
2950
3182
  */
2951
3183
  MaxResults: number | undefined;
@@ -2989,9 +3221,8 @@ export interface ListProtocolsListsResponse {
2989
3221
  */
2990
3222
  ProtocolsLists?: ProtocolsListDataSummary[];
2991
3223
  /**
2992
- * <p>If you specify a value for <code>MaxResults</code> in your list request, and you have
2993
- * more objects than the maximum, Firewall Manager returns this token in the response. You can use
2994
- * this token in subsequent requests to retrieve the next batch of objects.</p>
3224
+ * <p>If you specify a value for <code>MaxResults</code> in your list request, and you have more objects than the maximum,
3225
+ * Firewall Manager returns this token in the response. You can use this token in subsequent requests to retrieve the next batch of objects.</p>
2995
3226
  */
2996
3227
  NextToken?: string;
2997
3228
  }
@@ -3003,9 +3234,7 @@ export declare namespace ListProtocolsListsResponse {
3003
3234
  }
3004
3235
  export interface ListTagsForResourceRequest {
3005
3236
  /**
3006
- * <p>The Amazon Resource Name (ARN) of the resource to return tags for. The Firewall Manager
3007
- * resources that support tagging are policies, applications lists, and protocols lists.
3008
- * </p>
3237
+ * <p>The Amazon Resource Name (ARN) of the resource to return tags for. The Firewall Manager resources that support tagging are policies, applications lists, and protocols lists. </p>
3009
3238
  */
3010
3239
  ResourceArn: string | undefined;
3011
3240
  }
@@ -3027,6 +3256,71 @@ export declare namespace ListTagsForResourceResponse {
3027
3256
  */
3028
3257
  const filterSensitiveLog: (obj: ListTagsForResourceResponse) => any;
3029
3258
  }
3259
+ export interface ListThirdPartyFirewallFirewallPoliciesRequest {
3260
+ /**
3261
+ * <p>The name of the third-party firewall vendor.</p>
3262
+ */
3263
+ ThirdPartyFirewall: ThirdPartyFirewall | string | undefined;
3264
+ /**
3265
+ * <p>If the previous response included a <code>NextToken</code> element, the specified third-party firewall vendor is associated with more
3266
+ * third-party firewall policies. To get more third-party firewall policies, submit another <code>ListThirdPartyFirewallFirewallPoliciesRequest</code> request.</p>
3267
+ * <p>
3268
+ * For the value of <code>NextToken</code>, specify the value of <code>NextToken</code> from the previous response.
3269
+ * If the previous response didn't include a <code>NextToken</code> element, there are no more third-party firewall policies to
3270
+ * get.
3271
+ * </p>
3272
+ */
3273
+ NextToken?: string;
3274
+ /**
3275
+ * <p>The maximum number of third-party firewall policies that you want Firewall Manager to return. If
3276
+ * the specified third-party firewall vendor is associated with more than <code>MaxResults</code> firewall policies, the response includes a
3277
+ * <code>NextToken</code> element. <code>NextToken</code> contains an encrypted token that identifies the first third-party firewall policies
3278
+ * that Firewall Manager will return if you submit another request.</p>
3279
+ */
3280
+ MaxResults: number | undefined;
3281
+ }
3282
+ export declare namespace ListThirdPartyFirewallFirewallPoliciesRequest {
3283
+ /**
3284
+ * @internal
3285
+ */
3286
+ const filterSensitiveLog: (obj: ListThirdPartyFirewallFirewallPoliciesRequest) => any;
3287
+ }
3288
+ /**
3289
+ * <p>Configures the firewall policy deployment model for a third-party firewall. The deployment model can either be distributed or centralized.</p>
3290
+ */
3291
+ export interface ThirdPartyFirewallFirewallPolicy {
3292
+ /**
3293
+ * <p>The ID of the specified firewall policy.</p>
3294
+ */
3295
+ FirewallPolicyId?: string;
3296
+ /**
3297
+ * <p>The name of the specified firewall policy.</p>
3298
+ */
3299
+ FirewallPolicyName?: string;
3300
+ }
3301
+ export declare namespace ThirdPartyFirewallFirewallPolicy {
3302
+ /**
3303
+ * @internal
3304
+ */
3305
+ const filterSensitiveLog: (obj: ThirdPartyFirewallFirewallPolicy) => any;
3306
+ }
3307
+ export interface ListThirdPartyFirewallFirewallPoliciesResponse {
3308
+ /**
3309
+ * <p>A list that contains one <code>ThirdPartyFirewallFirewallPolicies</code> element for each third-party firewall policies that the specified
3310
+ * third-party firewall vendor is associated with. Each <code>ThirdPartyFirewallFirewallPolicies</code> element contains the firewall policy name and ID.</p>
3311
+ */
3312
+ ThirdPartyFirewallFirewallPolicies?: ThirdPartyFirewallFirewallPolicy[];
3313
+ /**
3314
+ * <p>The value that you will use for <code>NextToken</code> in the next <code>ListThirdPartyFirewallFirewallPolicies</code> request.</p>
3315
+ */
3316
+ NextToken?: string;
3317
+ }
3318
+ export declare namespace ListThirdPartyFirewallFirewallPoliciesResponse {
3319
+ /**
3320
+ * @internal
3321
+ */
3322
+ const filterSensitiveLog: (obj: ListThirdPartyFirewallFirewallPoliciesResponse) => any;
3323
+ }
3030
3324
  export interface PutAppsListRequest {
3031
3325
  /**
3032
3326
  * <p>The details of the Firewall Manager applications list to be created.</p>
@@ -3062,12 +3356,12 @@ export declare namespace PutAppsListResponse {
3062
3356
  export interface PutNotificationChannelRequest {
3063
3357
  /**
3064
3358
  * <p>The Amazon Resource Name (ARN) of the SNS topic that collects notifications from
3065
- * Firewall Manager.</p>
3359
+ * Firewall Manager.</p>
3066
3360
  */
3067
3361
  SnsTopicArn: string | undefined;
3068
3362
  /**
3069
3363
  * <p>The Amazon Resource Name (ARN) of the IAM role that allows Amazon SNS to record
3070
- * Firewall Manager activity. </p>
3364
+ * Firewall Manager activity. </p>
3071
3365
  */
3072
3366
  SnsRoleName: string | undefined;
3073
3367
  }
@@ -3143,9 +3437,7 @@ export declare namespace PutProtocolsListResponse {
3143
3437
  }
3144
3438
  export interface TagResourceRequest {
3145
3439
  /**
3146
- * <p>The Amazon Resource Name (ARN) of the resource to return tags for. The Firewall Manager
3147
- * resources that support tagging are policies, applications lists, and protocols lists.
3148
- * </p>
3440
+ * <p>The Amazon Resource Name (ARN) of the resource to return tags for. The Firewall Manager resources that support tagging are policies, applications lists, and protocols lists. </p>
3149
3441
  */
3150
3442
  ResourceArn: string | undefined;
3151
3443
  /**
@@ -3169,9 +3461,7 @@ export declare namespace TagResourceResponse {
3169
3461
  }
3170
3462
  export interface UntagResourceRequest {
3171
3463
  /**
3172
- * <p>The Amazon Resource Name (ARN) of the resource to return tags for. The Firewall Manager
3173
- * resources that support tagging are policies, applications lists, and protocols lists.
3174
- * </p>
3464
+ * <p>The Amazon Resource Name (ARN) of the resource to return tags for. The Firewall Manager resources that support tagging are policies, applications lists, and protocols lists. </p>
3175
3465
  */
3176
3466
  ResourceArn: string | undefined;
3177
3467
  /**