@aws-sdk/client-fms 3.58.0 → 3.60.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +11 -0
- package/README.md +6 -6
- package/dist-cjs/FMS.js +60 -0
- package/dist-cjs/commands/AssociateThirdPartyFirewallCommand.js +36 -0
- package/dist-cjs/commands/DisassociateThirdPartyFirewallCommand.js +36 -0
- package/dist-cjs/commands/GetThirdPartyFirewallAssociationStatusCommand.js +36 -0
- package/dist-cjs/commands/ListThirdPartyFirewallFirewallPoliciesCommand.js +36 -0
- package/dist-cjs/commands/index.js +4 -0
- package/dist-cjs/models/models_0.js +108 -3
- package/dist-cjs/pagination/ListThirdPartyFirewallFirewallPoliciesPaginator.js +35 -0
- package/dist-cjs/pagination/index.js +1 -0
- package/dist-cjs/protocols/Aws_json1_1.js +356 -2
- package/dist-es/FMS.js +60 -0
- package/dist-es/commands/AssociateThirdPartyFirewallCommand.js +39 -0
- package/dist-es/commands/DisassociateThirdPartyFirewallCommand.js +39 -0
- package/dist-es/commands/GetThirdPartyFirewallAssociationStatusCommand.js +39 -0
- package/dist-es/commands/ListThirdPartyFirewallFirewallPoliciesCommand.js +39 -0
- package/dist-es/commands/index.js +4 -0
- package/dist-es/models/models_0.js +77 -0
- package/dist-es/pagination/ListThirdPartyFirewallFirewallPoliciesPaginator.js +74 -0
- package/dist-es/pagination/index.js +1 -0
- package/dist-es/protocols/Aws_json1_1.js +414 -1
- package/dist-types/FMS.d.ts +84 -59
- package/dist-types/FMSClient.d.ts +12 -8
- package/dist-types/commands/AssociateAdminAccountCommand.d.ts +4 -5
- package/dist-types/commands/AssociateThirdPartyFirewallCommand.d.ts +35 -0
- package/dist-types/commands/DeleteNotificationChannelCommand.d.ts +2 -2
- package/dist-types/commands/DisassociateAdminAccountCommand.d.ts +3 -3
- package/dist-types/commands/DisassociateThirdPartyFirewallCommand.d.ts +35 -0
- package/dist-types/commands/GetAdminAccountCommand.d.ts +2 -2
- package/dist-types/commands/GetComplianceDetailCommand.d.ts +13 -13
- package/dist-types/commands/GetNotificationChannelCommand.d.ts +2 -2
- package/dist-types/commands/GetProtectionStatusCommand.d.ts +1 -2
- package/dist-types/commands/GetThirdPartyFirewallAssociationStatusCommand.d.ts +35 -0
- package/dist-types/commands/GetViolationDetailsCommand.d.ts +1 -2
- package/dist-types/commands/ListComplianceStatusCommand.d.ts +2 -2
- package/dist-types/commands/ListMemberAccountsCommand.d.ts +2 -2
- package/dist-types/commands/ListTagsForResourceCommand.d.ts +1 -1
- package/dist-types/commands/ListThirdPartyFirewallFirewallPoliciesCommand.d.ts +35 -0
- package/dist-types/commands/PutNotificationChannelCommand.d.ts +5 -6
- package/dist-types/commands/PutPolicyCommand.d.ts +12 -11
- package/dist-types/commands/index.d.ts +4 -0
- package/dist-types/models/models_0.d.ts +808 -518
- package/dist-types/pagination/ListThirdPartyFirewallFirewallPoliciesPaginator.d.ts +4 -0
- package/dist-types/pagination/index.d.ts +1 -0
- package/dist-types/protocols/Aws_json1_1.d.ts +12 -0
- package/dist-types/ts3.4/FMS.d.ts +20 -0
- package/dist-types/ts3.4/FMSClient.d.ts +6 -2
- package/dist-types/ts3.4/commands/AssociateThirdPartyFirewallCommand.d.ts +17 -0
- package/dist-types/ts3.4/commands/DisassociateThirdPartyFirewallCommand.d.ts +17 -0
- package/dist-types/ts3.4/commands/GetThirdPartyFirewallAssociationStatusCommand.d.ts +17 -0
- package/dist-types/ts3.4/commands/ListThirdPartyFirewallFirewallPoliciesCommand.d.ts +17 -0
- package/dist-types/ts3.4/commands/index.d.ts +4 -0
- package/dist-types/ts3.4/models/models_0.d.ts +183 -1
- package/dist-types/ts3.4/pagination/ListThirdPartyFirewallFirewallPoliciesPaginator.d.ts +4 -0
- package/dist-types/ts3.4/pagination/index.d.ts +1 -0
- package/dist-types/ts3.4/protocols/Aws_json1_1.d.ts +12 -0
- package/package.json +1 -1
|
@@ -35,9 +35,7 @@ export interface App {
|
|
|
35
35
|
*/
|
|
36
36
|
AppName: string | undefined;
|
|
37
37
|
/**
|
|
38
|
-
* <p>The IP protocol name or number. The name can be one of <code>tcp</code>,
|
|
39
|
-
* <code>udp</code>, or <code>icmp</code>. For information on possible numbers, see <a href="https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml">Protocol
|
|
40
|
-
* Numbers</a>.</p>
|
|
38
|
+
* <p>The IP protocol name or number. The name can be one of <code>tcp</code>, <code>udp</code>, or <code>icmp</code>. For information on possible numbers, see <a href="https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml">Protocol Numbers</a>.</p>
|
|
41
39
|
*/
|
|
42
40
|
Protocol: string | undefined;
|
|
43
41
|
/**
|
|
@@ -64,9 +62,9 @@ export interface AppsListData {
|
|
|
64
62
|
*/
|
|
65
63
|
ListName: string | undefined;
|
|
66
64
|
/**
|
|
67
|
-
* <p>A unique identifier for each update to the list. When you update
|
|
68
|
-
*
|
|
69
|
-
*
|
|
65
|
+
* <p>A unique identifier for each update to the list. When you update
|
|
66
|
+
* the list, the update token must match the token of the current version of the application list.
|
|
67
|
+
* You can retrieve the update token by getting the list. </p>
|
|
70
68
|
*/
|
|
71
69
|
ListUpdateToken?: string;
|
|
72
70
|
/**
|
|
@@ -82,8 +80,7 @@ export interface AppsListData {
|
|
|
82
80
|
*/
|
|
83
81
|
AppsList: App[] | undefined;
|
|
84
82
|
/**
|
|
85
|
-
* <p>A map of previous version numbers to their corresponding <code>App</code> object
|
|
86
|
-
* arrays.</p>
|
|
83
|
+
* <p>A map of previous version numbers to their corresponding <code>App</code> object arrays.</p>
|
|
87
84
|
*/
|
|
88
85
|
PreviousAppsList?: {
|
|
89
86
|
[key: string]: App[];
|
|
@@ -124,8 +121,10 @@ export declare namespace AppsListDataSummary {
|
|
|
124
121
|
}
|
|
125
122
|
export interface AssociateAdminAccountRequest {
|
|
126
123
|
/**
|
|
127
|
-
* <p>The Amazon Web Services account ID to associate with Firewall Manager as the Firewall Manager
|
|
128
|
-
*
|
|
124
|
+
* <p>The Amazon Web Services account ID to associate with Firewall Manager as the Firewall Manager
|
|
125
|
+
* administrator account. This must be an Organizations member account.
|
|
126
|
+
* For more information about Organizations, see
|
|
127
|
+
* <a href="https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts.html">Managing the Amazon Web Services Accounts in Your Organization</a>. </p>
|
|
129
128
|
*/
|
|
130
129
|
AdminAccount: string | undefined;
|
|
131
130
|
}
|
|
@@ -136,8 +135,8 @@ export declare namespace AssociateAdminAccountRequest {
|
|
|
136
135
|
const filterSensitiveLog: (obj: AssociateAdminAccountRequest) => any;
|
|
137
136
|
}
|
|
138
137
|
/**
|
|
139
|
-
* <p>The operation failed because of a system problem, even though the request was valid.
|
|
140
|
-
*
|
|
138
|
+
* <p>The operation failed because of a system problem, even though the request was valid. Retry
|
|
139
|
+
* your request.</p>
|
|
141
140
|
*/
|
|
142
141
|
export declare class InternalErrorException extends __BaseException {
|
|
143
142
|
readonly name: "InternalErrorException";
|
|
@@ -161,11 +160,11 @@ export declare class InvalidInputException extends __BaseException {
|
|
|
161
160
|
constructor(opts: __ExceptionOptionType<InvalidInputException, __BaseException>);
|
|
162
161
|
}
|
|
163
162
|
/**
|
|
164
|
-
* <p>The operation failed because there was nothing to do or the operation wasn't possible.
|
|
165
|
-
*
|
|
166
|
-
*
|
|
167
|
-
*
|
|
168
|
-
*
|
|
163
|
+
* <p>The operation failed because there was nothing to do or the operation wasn't possible. For example, you might have
|
|
164
|
+
* submitted an <code>AssociateAdminAccount</code> request for an account ID that
|
|
165
|
+
* was already set as the Firewall Manager administrator. Or you might have tried to access a Region
|
|
166
|
+
* that's disabled by default, and that you need to enable for the Firewall Manager
|
|
167
|
+
* administrator account and for Organizations before you can access it.</p>
|
|
169
168
|
*/
|
|
170
169
|
export declare class InvalidOperationException extends __BaseException {
|
|
171
170
|
readonly name: "InvalidOperationException";
|
|
@@ -178,9 +177,9 @@ export declare class InvalidOperationException extends __BaseException {
|
|
|
178
177
|
}
|
|
179
178
|
/**
|
|
180
179
|
* <p>The operation exceeds a resource limit, for example, the maximum number of
|
|
181
|
-
*
|
|
182
|
-
*
|
|
183
|
-
*
|
|
180
|
+
* <code>policy</code> objects that you can create for an Amazon Web Services account. For more information,
|
|
181
|
+
* see <a href="https://docs.aws.amazon.com/waf/latest/developerguide/fms-limits.html">Firewall
|
|
182
|
+
* Manager Limits</a> in the <i>WAF Developer Guide</i>.</p>
|
|
184
183
|
*/
|
|
185
184
|
export declare class LimitExceededException extends __BaseException {
|
|
186
185
|
readonly name: "LimitExceededException";
|
|
@@ -203,6 +202,62 @@ export declare class ResourceNotFoundException extends __BaseException {
|
|
|
203
202
|
*/
|
|
204
203
|
constructor(opts: __ExceptionOptionType<ResourceNotFoundException, __BaseException>);
|
|
205
204
|
}
|
|
205
|
+
export declare enum ThirdPartyFirewall {
|
|
206
|
+
PALO_ALTO_NETWORKS_CLOUD_NGFW = "PALO_ALTO_NETWORKS_CLOUD_NGFW"
|
|
207
|
+
}
|
|
208
|
+
export interface AssociateThirdPartyFirewallRequest {
|
|
209
|
+
/**
|
|
210
|
+
* <p>The name of the third-party firewall vendor.</p>
|
|
211
|
+
*/
|
|
212
|
+
ThirdPartyFirewall: ThirdPartyFirewall | string | undefined;
|
|
213
|
+
}
|
|
214
|
+
export declare namespace AssociateThirdPartyFirewallRequest {
|
|
215
|
+
/**
|
|
216
|
+
* @internal
|
|
217
|
+
*/
|
|
218
|
+
const filterSensitiveLog: (obj: AssociateThirdPartyFirewallRequest) => any;
|
|
219
|
+
}
|
|
220
|
+
export declare enum ThirdPartyFirewallAssociationStatus {
|
|
221
|
+
NOT_EXIST = "NOT_EXIST",
|
|
222
|
+
OFFBOARDING = "OFFBOARDING",
|
|
223
|
+
OFFBOARD_COMPLETE = "OFFBOARD_COMPLETE",
|
|
224
|
+
ONBOARDING = "ONBOARDING",
|
|
225
|
+
ONBOARD_COMPLETE = "ONBOARD_COMPLETE"
|
|
226
|
+
}
|
|
227
|
+
export interface AssociateThirdPartyFirewallResponse {
|
|
228
|
+
/**
|
|
229
|
+
* <p>The current status for setting a Firewall Manager policy administrator's account as an administrator of the third-party firewall tenant.</p>
|
|
230
|
+
* <ul>
|
|
231
|
+
* <li>
|
|
232
|
+
* <p>
|
|
233
|
+
* <code>ONBOARDING</code> - The Firewall Manager policy administrator is being designated as a tenant administrator.</p>
|
|
234
|
+
* </li>
|
|
235
|
+
* <li>
|
|
236
|
+
* <p>
|
|
237
|
+
* <code>ONBOARD_COMPLETE</code> - The Firewall Manager policy administrator is designated as a tenant administrator.</p>
|
|
238
|
+
* </li>
|
|
239
|
+
* <li>
|
|
240
|
+
* <p>
|
|
241
|
+
* <code>OFFBOARDING</code> - The Firewall Manager policy administrator is being removed as a tenant administrator.</p>
|
|
242
|
+
* </li>
|
|
243
|
+
* <li>
|
|
244
|
+
* <p>
|
|
245
|
+
* <code>OFFBOARD_COMPLETE</code> - The Firewall Manager policy administrator has been removed as a tenant administrator.</p>
|
|
246
|
+
* </li>
|
|
247
|
+
* <li>
|
|
248
|
+
* <p>
|
|
249
|
+
* <code>NOT_EXIST</code> - The Firewall Manager policy administrator doesn't exist as a tenant administrator.</p>
|
|
250
|
+
* </li>
|
|
251
|
+
* </ul>
|
|
252
|
+
*/
|
|
253
|
+
ThirdPartyFirewallStatus?: ThirdPartyFirewallAssociationStatus | string;
|
|
254
|
+
}
|
|
255
|
+
export declare namespace AssociateThirdPartyFirewallResponse {
|
|
256
|
+
/**
|
|
257
|
+
* @internal
|
|
258
|
+
*/
|
|
259
|
+
const filterSensitiveLog: (obj: AssociateThirdPartyFirewallResponse) => any;
|
|
260
|
+
}
|
|
206
261
|
/**
|
|
207
262
|
* <p>Violation detail for network interfaces associated with an EC2 instance.</p>
|
|
208
263
|
*/
|
|
@@ -212,8 +267,7 @@ export interface AwsEc2NetworkInterfaceViolation {
|
|
|
212
267
|
*/
|
|
213
268
|
ViolationTarget?: string;
|
|
214
269
|
/**
|
|
215
|
-
* <p>List of security groups that violate the rules specified in the primary security group
|
|
216
|
-
* of the Firewall Manager policy.</p>
|
|
270
|
+
* <p>List of security groups that violate the rules specified in the primary security group of the Firewall Manager policy.</p>
|
|
217
271
|
*/
|
|
218
272
|
ViolatingSecurityGroups?: string[];
|
|
219
273
|
}
|
|
@@ -245,8 +299,7 @@ export declare namespace AwsEc2InstanceViolation {
|
|
|
245
299
|
export interface DeleteAppsListRequest {
|
|
246
300
|
/**
|
|
247
301
|
* <p>The ID of the applications list that you want to delete. You can retrieve this ID from
|
|
248
|
-
*
|
|
249
|
-
* <code>GetAppsList</code>.</p>
|
|
302
|
+
* <code>PutAppsList</code>, <code>ListAppsLists</code>, and <code>GetAppsList</code>.</p>
|
|
250
303
|
*/
|
|
251
304
|
ListId: string | undefined;
|
|
252
305
|
}
|
|
@@ -267,7 +320,7 @@ export declare namespace DeleteNotificationChannelRequest {
|
|
|
267
320
|
export interface DeletePolicyRequest {
|
|
268
321
|
/**
|
|
269
322
|
* <p>The ID of the policy that you want to delete. You can retrieve this ID from
|
|
270
|
-
*
|
|
323
|
+
* <code>PutPolicy</code> and <code>ListPolicies</code>.</p>
|
|
271
324
|
*/
|
|
272
325
|
PolicyId: string | undefined;
|
|
273
326
|
/**
|
|
@@ -284,23 +337,23 @@ export interface DeletePolicyRequest {
|
|
|
284
337
|
* <p>Deletes web ACLs that contain no rules or rule groups</p>
|
|
285
338
|
* </li>
|
|
286
339
|
* </ul>
|
|
287
|
-
* <p>For security group policies, the cleanup does the following for each security group
|
|
288
|
-
*
|
|
340
|
+
* <p>For security group policies, the cleanup does the following for each security group in
|
|
341
|
+
* the policy:</p>
|
|
289
342
|
* <ul>
|
|
290
343
|
* <li>
|
|
291
344
|
* <p>Disassociates the security group from in-scope resources </p>
|
|
292
345
|
* </li>
|
|
293
346
|
* <li>
|
|
294
|
-
* <p>Deletes the security group if it was created through Firewall Manager and if it's
|
|
295
|
-
*
|
|
347
|
+
* <p>Deletes the security group if it was created through Firewall Manager and if it's
|
|
348
|
+
* no longer associated with any resources through another policy</p>
|
|
296
349
|
* </li>
|
|
297
350
|
* </ul>
|
|
298
|
-
* <p>After the cleanup, in-scope resources are no longer protected by web ACLs in this
|
|
299
|
-
*
|
|
300
|
-
*
|
|
301
|
-
*
|
|
302
|
-
*
|
|
303
|
-
*
|
|
351
|
+
* <p>After the cleanup, in-scope resources are no longer protected by web ACLs in this policy.
|
|
352
|
+
* Protection of out-of-scope resources remains unchanged. Scope is determined by tags that you
|
|
353
|
+
* create and accounts that you associate with the policy. When creating the policy, if you
|
|
354
|
+
* specify that only resources in specific accounts or with specific tags are in scope of the
|
|
355
|
+
* policy, those accounts and resources are handled by the policy. All others are out of scope.
|
|
356
|
+
* If you don't specify tags or accounts, all resources are in scope. </p>
|
|
304
357
|
*/
|
|
305
358
|
DeleteAllPolicyResources?: boolean;
|
|
306
359
|
}
|
|
@@ -313,8 +366,7 @@ export declare namespace DeletePolicyRequest {
|
|
|
313
366
|
export interface DeleteProtocolsListRequest {
|
|
314
367
|
/**
|
|
315
368
|
* <p>The ID of the protocols list that you want to delete. You can retrieve this ID from
|
|
316
|
-
*
|
|
317
|
-
* <code>GetProtocolsLost</code>.</p>
|
|
369
|
+
* <code>PutProtocolsList</code>, <code>ListProtocolsLists</code>, and <code>GetProtocolsLost</code>.</p>
|
|
318
370
|
*/
|
|
319
371
|
ListId: string | undefined;
|
|
320
372
|
}
|
|
@@ -332,6 +384,30 @@ export declare namespace DisassociateAdminAccountRequest {
|
|
|
332
384
|
*/
|
|
333
385
|
const filterSensitiveLog: (obj: DisassociateAdminAccountRequest) => any;
|
|
334
386
|
}
|
|
387
|
+
export interface DisassociateThirdPartyFirewallRequest {
|
|
388
|
+
/**
|
|
389
|
+
* <p>The name of the third-party firewall vendor.</p>
|
|
390
|
+
*/
|
|
391
|
+
ThirdPartyFirewall: ThirdPartyFirewall | string | undefined;
|
|
392
|
+
}
|
|
393
|
+
export declare namespace DisassociateThirdPartyFirewallRequest {
|
|
394
|
+
/**
|
|
395
|
+
* @internal
|
|
396
|
+
*/
|
|
397
|
+
const filterSensitiveLog: (obj: DisassociateThirdPartyFirewallRequest) => any;
|
|
398
|
+
}
|
|
399
|
+
export interface DisassociateThirdPartyFirewallResponse {
|
|
400
|
+
/**
|
|
401
|
+
* <p>The current status for the disassociation of a Firewall Manager administrators account with a third-party firewall.</p>
|
|
402
|
+
*/
|
|
403
|
+
ThirdPartyFirewallStatus?: ThirdPartyFirewallAssociationStatus | string;
|
|
404
|
+
}
|
|
405
|
+
export declare namespace DisassociateThirdPartyFirewallResponse {
|
|
406
|
+
/**
|
|
407
|
+
* @internal
|
|
408
|
+
*/
|
|
409
|
+
const filterSensitiveLog: (obj: DisassociateThirdPartyFirewallResponse) => any;
|
|
410
|
+
}
|
|
335
411
|
export interface GetAdminAccountRequest {
|
|
336
412
|
}
|
|
337
413
|
export declare namespace GetAdminAccountRequest {
|
|
@@ -346,7 +422,8 @@ export interface GetAdminAccountResponse {
|
|
|
346
422
|
*/
|
|
347
423
|
AdminAccount?: string;
|
|
348
424
|
/**
|
|
349
|
-
* <p>The status of the Amazon Web Services account that you set as the Firewall Manager
|
|
425
|
+
* <p>The status of the Amazon Web Services account that you set as the Firewall Manager
|
|
426
|
+
* administrator.</p>
|
|
350
427
|
*/
|
|
351
428
|
RoleStatus?: AccountRoleStatus | string;
|
|
352
429
|
}
|
|
@@ -391,7 +468,7 @@ export declare namespace GetAppsListResponse {
|
|
|
391
468
|
export interface GetComplianceDetailRequest {
|
|
392
469
|
/**
|
|
393
470
|
* <p>The ID of the policy that you want to get the details for. <code>PolicyId</code> is
|
|
394
|
-
*
|
|
471
|
+
* returned by <code>PutPolicy</code> and by <code>ListPolicies</code>.</p>
|
|
395
472
|
*/
|
|
396
473
|
PolicyId: string | undefined;
|
|
397
474
|
/**
|
|
@@ -417,6 +494,7 @@ export declare enum ViolationReason {
|
|
|
417
494
|
FMSCreatedSecurityGroupEdited = "FMS_CREATED_SECURITY_GROUP_EDITED",
|
|
418
495
|
FirewallSubnetIsOutOfScope = "FIREWALL_SUBNET_IS_OUT_OF_SCOPE",
|
|
419
496
|
FirewallSubnetMissingExpectedRoute = "FIREWALL_SUBNET_MISSING_EXPECTED_ROUTE",
|
|
497
|
+
FirewallSubnetMissingVPCEndpoint = "FIREWALL_SUBNET_MISSING_VPCE_ENDPOINT",
|
|
420
498
|
InternetGatewayMissingExpectedRoute = "INTERNET_GATEWAY_MISSING_EXPECTED_ROUTE",
|
|
421
499
|
InternetTrafficNotInspected = "INTERNET_TRAFFIC_NOT_INSPECTED",
|
|
422
500
|
InvalidRouteConfiguration = "INVALID_ROUTE_CONFIGURATION",
|
|
@@ -453,11 +531,10 @@ export interface ComplianceViolator {
|
|
|
453
531
|
*/
|
|
454
532
|
ViolationReason?: ViolationReason | string;
|
|
455
533
|
/**
|
|
456
|
-
* <p>The resource type. This is in the format shown in the <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-template-resource-type-ref.html">Amazon Web Services
|
|
457
|
-
*
|
|
458
|
-
*
|
|
459
|
-
*
|
|
460
|
-
* <code>AWS::NetworkFirewall::FirewallPolicy</code>.</p>
|
|
534
|
+
* <p>The resource type. This is in the format shown in the <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-template-resource-type-ref.html">Amazon Web Services Resource Types Reference</a>. For example:
|
|
535
|
+
* <code>AWS::ElasticLoadBalancingV2::LoadBalancer</code>,
|
|
536
|
+
* <code>AWS::CloudFront::Distribution</code>, or
|
|
537
|
+
* <code>AWS::NetworkFirewall::FirewallPolicy</code>.</p>
|
|
461
538
|
*/
|
|
462
539
|
ResourceType?: string;
|
|
463
540
|
/**
|
|
@@ -475,9 +552,8 @@ export declare namespace ComplianceViolator {
|
|
|
475
552
|
}
|
|
476
553
|
/**
|
|
477
554
|
* <p>Describes
|
|
478
|
-
*
|
|
479
|
-
*
|
|
480
|
-
* noncompliant, <code>EvaluationLimitExceeded</code> is set to <code>True</code>.</p>
|
|
555
|
+
* the noncompliant resources in a member account for a specific Firewall Manager policy. A maximum of 100 entries are displayed. If more than 100 resources are
|
|
556
|
+
* noncompliant, <code>EvaluationLimitExceeded</code> is set to <code>True</code>.</p>
|
|
481
557
|
*/
|
|
482
558
|
export interface PolicyComplianceDetail {
|
|
483
559
|
/**
|
|
@@ -493,22 +569,23 @@ export interface PolicyComplianceDetail {
|
|
|
493
569
|
*/
|
|
494
570
|
MemberAccount?: string;
|
|
495
571
|
/**
|
|
496
|
-
* <p>An array of resources that aren't protected by the WAF or Shield Advanced policy
|
|
497
|
-
*
|
|
572
|
+
* <p>An array of resources that aren't protected by the WAF or Shield Advanced policy or
|
|
573
|
+
* that aren't in compliance with the security group policy.</p>
|
|
498
574
|
*/
|
|
499
575
|
Violators?: ComplianceViolator[];
|
|
500
576
|
/**
|
|
501
|
-
* <p>Indicates if over 100 resources are noncompliant with the Firewall Manager
|
|
577
|
+
* <p>Indicates if over 100 resources are noncompliant with the Firewall Manager
|
|
578
|
+
* policy.</p>
|
|
502
579
|
*/
|
|
503
580
|
EvaluationLimitExceeded?: boolean;
|
|
504
581
|
/**
|
|
505
582
|
* <p>A timestamp that indicates when the returned information should be considered out of
|
|
506
|
-
*
|
|
583
|
+
* date.</p>
|
|
507
584
|
*/
|
|
508
585
|
ExpiredAt?: Date;
|
|
509
586
|
/**
|
|
510
|
-
* <p>Details about problems with dependent services, such as WAF or Config,
|
|
511
|
-
*
|
|
587
|
+
* <p>Details about problems with dependent services, such as WAF or Config,
|
|
588
|
+
* and the error message received that indicates the problem with the service.</p>
|
|
512
589
|
*/
|
|
513
590
|
IssueInfoMap?: {
|
|
514
591
|
[key: string]: string;
|
|
@@ -523,7 +600,7 @@ export declare namespace PolicyComplianceDetail {
|
|
|
523
600
|
export interface GetComplianceDetailResponse {
|
|
524
601
|
/**
|
|
525
602
|
* <p>Information about the resources and the policy that you specified in the
|
|
526
|
-
*
|
|
603
|
+
* <code>GetComplianceDetail</code> request.</p>
|
|
527
604
|
*/
|
|
528
605
|
PolicyComplianceDetail?: PolicyComplianceDetail;
|
|
529
606
|
}
|
|
@@ -574,13 +651,13 @@ export declare enum CustomerPolicyScopeIdType {
|
|
|
574
651
|
ORG_UNIT = "ORG_UNIT"
|
|
575
652
|
}
|
|
576
653
|
/**
|
|
577
|
-
* <p>The resource tags that Firewall Manager uses to determine if a particular resource
|
|
578
|
-
*
|
|
579
|
-
*
|
|
580
|
-
*
|
|
581
|
-
*
|
|
582
|
-
*
|
|
583
|
-
*
|
|
654
|
+
* <p>The resource tags that Firewall Manager uses to determine if a particular resource
|
|
655
|
+
* should be included or excluded from the Firewall Manager policy. Tags enable you to
|
|
656
|
+
* categorize your Amazon Web Services resources in different ways, for example, by purpose, owner, or
|
|
657
|
+
* environment. Each tag consists of a key and an optional value. Firewall Manager combines the
|
|
658
|
+
* tags with "AND" so that, if you add more than one tag to a policy scope, a resource must have
|
|
659
|
+
* all the specified tags to be included or excluded. For more information, see
|
|
660
|
+
* <a href="https://docs.aws.amazon.com/awsconsolehelpdocs/latest/gsg/tag-editor.html">Working with Tag Editor</a>.</p>
|
|
584
661
|
*/
|
|
585
662
|
export interface ResourceTag {
|
|
586
663
|
/**
|
|
@@ -599,7 +676,8 @@ export declare namespace ResourceTag {
|
|
|
599
676
|
const filterSensitiveLog: (obj: ResourceTag) => any;
|
|
600
677
|
}
|
|
601
678
|
export declare enum FirewallDeploymentModel {
|
|
602
|
-
CENTRALIZED = "CENTRALIZED"
|
|
679
|
+
CENTRALIZED = "CENTRALIZED",
|
|
680
|
+
DISTRIBUTED = "DISTRIBUTED"
|
|
603
681
|
}
|
|
604
682
|
/**
|
|
605
683
|
* <p>Configures the firewall policy deployment model of Network Firewall. For information about
|
|
@@ -620,6 +698,21 @@ export declare namespace NetworkFirewallPolicy {
|
|
|
620
698
|
*/
|
|
621
699
|
const filterSensitiveLog: (obj: NetworkFirewallPolicy) => any;
|
|
622
700
|
}
|
|
701
|
+
/**
|
|
702
|
+
* <p>Configures the policy for the third-party firewall.</p>
|
|
703
|
+
*/
|
|
704
|
+
export interface ThirdPartyFirewallPolicy {
|
|
705
|
+
/**
|
|
706
|
+
* <p>Defines the deployment model to use for the third-party firewall.</p>
|
|
707
|
+
*/
|
|
708
|
+
FirewallDeploymentModel?: FirewallDeploymentModel | string;
|
|
709
|
+
}
|
|
710
|
+
export declare namespace ThirdPartyFirewallPolicy {
|
|
711
|
+
/**
|
|
712
|
+
* @internal
|
|
713
|
+
*/
|
|
714
|
+
const filterSensitiveLog: (obj: ThirdPartyFirewallPolicy) => any;
|
|
715
|
+
}
|
|
623
716
|
/**
|
|
624
717
|
* <p>Contains the Network Firewall firewall policy options to configure a centralized deployment
|
|
625
718
|
* model.</p>
|
|
@@ -629,6 +722,10 @@ export interface PolicyOption {
|
|
|
629
722
|
* <p>Defines the deployment model to use for the firewall policy.</p>
|
|
630
723
|
*/
|
|
631
724
|
NetworkFirewallPolicy?: NetworkFirewallPolicy;
|
|
725
|
+
/**
|
|
726
|
+
* <p>Defines the policy options for a third-party firewall policy.</p>
|
|
727
|
+
*/
|
|
728
|
+
ThirdPartyFirewallPolicy?: ThirdPartyFirewallPolicy;
|
|
632
729
|
}
|
|
633
730
|
export declare namespace PolicyOption {
|
|
634
731
|
/**
|
|
@@ -643,6 +740,7 @@ export declare enum SecurityServiceType {
|
|
|
643
740
|
SECURITY_GROUPS_CONTENT_AUDIT = "SECURITY_GROUPS_CONTENT_AUDIT",
|
|
644
741
|
SECURITY_GROUPS_USAGE_AUDIT = "SECURITY_GROUPS_USAGE_AUDIT",
|
|
645
742
|
SHIELD_ADVANCED = "SHIELD_ADVANCED",
|
|
743
|
+
THIRD_PARTY_FIREWALL = "THIRD_PARTY_FIREWALL",
|
|
646
744
|
WAF = "WAF",
|
|
647
745
|
WAFV2 = "WAFV2"
|
|
648
746
|
}
|
|
@@ -651,11 +749,11 @@ export declare enum SecurityServiceType {
|
|
|
651
749
|
*/
|
|
652
750
|
export interface SecurityServicePolicyData {
|
|
653
751
|
/**
|
|
654
|
-
* <p>The service that the policy is using to protect the resources. This specifies the type
|
|
655
|
-
*
|
|
656
|
-
*
|
|
657
|
-
*
|
|
658
|
-
*
|
|
752
|
+
* <p>The service that the policy is using to protect the resources. This specifies the type of
|
|
753
|
+
* policy that is created, either an WAF policy, a Shield Advanced policy, or a security
|
|
754
|
+
* group policy. For security group policies, Firewall Manager supports one security group for
|
|
755
|
+
* each common policy and for each content audit policy. This is an adjustable limit that you can
|
|
756
|
+
* increase by contacting Amazon Web Services Support.</p>
|
|
659
757
|
*/
|
|
660
758
|
Type: SecurityServiceType | string | undefined;
|
|
661
759
|
/**
|
|
@@ -669,158 +767,166 @@ export interface SecurityServicePolicyData {
|
|
|
669
767
|
* </p>
|
|
670
768
|
* <note>
|
|
671
769
|
* <p>Valid values for <code>preProcessRuleGroups</code> are between 1 and 99. Valid
|
|
672
|
-
*
|
|
770
|
+
* values for <code>postProcessRuleGroups</code> are between 9901 and 10000.</p>
|
|
673
771
|
* </note>
|
|
674
772
|
* </li>
|
|
675
773
|
* <li>
|
|
676
|
-
* <p>Example: <code>
|
|
677
|
-
*
|
|
774
|
+
* <p>Example: <code>DNS_FIREWALL</code>
|
|
775
|
+
* </p>
|
|
678
776
|
* <p>
|
|
679
|
-
* <code>"{\"type\":\"
|
|
777
|
+
* <code>"{\"type\":\"DNS_FIREWALL\",\"preProcessRuleGroups\":[{\"ruleGroupId\":\"rslvr-frg-1\",\"priority\":10}],\"postProcessRuleGroups\":[{\"ruleGroupId\":\"rslvr-frg-2\",\"priority\":9911}]}"</code>
|
|
680
778
|
* </p>
|
|
681
|
-
* <
|
|
682
|
-
* <code>
|
|
779
|
+
* <note>
|
|
780
|
+
* <p>Valid values for <code>preProcessRuleGroups</code> are between 1 and 99. Valid
|
|
781
|
+
* values for <code>postProcessRuleGroups</code> are between 9901 and 10000.</p>
|
|
782
|
+
* </note>
|
|
683
783
|
* </li>
|
|
684
784
|
* <li>
|
|
685
785
|
* <p>Example: <code>NETWORK_FIREWALL</code> - Distributed deployment model with
|
|
686
|
-
*
|
|
687
|
-
*
|
|
786
|
+
* automatic Availability Zone configuration. With automatic Availbility Zone
|
|
787
|
+
* configuration, Firewall Manager chooses which Availability Zones to create the endpoints in. </p>
|
|
688
788
|
* <p>
|
|
689
789
|
* <code>"{ \"type\": \"NETWORK_FIREWALL\",
|
|
690
|
-
*
|
|
691
|
-
*
|
|
692
|
-
*
|
|
693
|
-
*
|
|
694
|
-
*
|
|
695
|
-
*
|
|
696
|
-
*
|
|
697
|
-
*
|
|
698
|
-
*
|
|
699
|
-
*
|
|
700
|
-
*
|
|
701
|
-
*
|
|
702
|
-
*
|
|
703
|
-
*
|
|
704
|
-
*
|
|
705
|
-
*
|
|
706
|
-
*
|
|
707
|
-
*
|
|
790
|
+
* \"networkFirewallStatelessRuleGroupReferences\": [ { \"resourceARN\":
|
|
791
|
+
* \"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",
|
|
792
|
+
* \"priority\": 1 } ], \"networkFirewallStatelessDefaultActions\": [
|
|
793
|
+
* \"aws:forward_to_sfe\", \"customActionName\" ],
|
|
794
|
+
* \"networkFirewallStatelessFragmentDefaultActions\": [ \"aws:forward_to_sfe\",
|
|
795
|
+
* \"customActionName\" ], \"networkFirewallStatelessCustomActions\": [ {
|
|
796
|
+
* \"actionName\": \"customActionName\", \"actionDefinition\": {
|
|
797
|
+
* \"publishMetricAction\": { \"dimensions\": [ { \"value\": \"metricdimensionvalue\"
|
|
798
|
+
* } ] } } } ], \"networkFirewallStatefulRuleGroupReferences\": [ { \"resourceARN\":
|
|
799
|
+
* \"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\" } ],
|
|
800
|
+
* \"networkFirewallOrchestrationConfig\": { \"singleFirewallEndpointPerVPC\": false,
|
|
801
|
+
* \"allowedIPV4CidrList\": [ \"10.0.0.0/28\", \"192.168.0.0/28\" ],
|
|
802
|
+
* \"routeManagementAction\": \"OFF\" }, \"networkFirewallLoggingConfiguration\": {
|
|
803
|
+
* \"logDestinationConfigs\": [ { \"logDestinationType\": \"S3\", \"logType\":
|
|
804
|
+
* \"ALERT\", \"logDestination\": { \"bucketName\": \"s3-bucket-name\" } }, {
|
|
805
|
+
* \"logDestinationType\": \"S3\", \"logType\": \"FLOW\", \"logDestination\": {
|
|
806
|
+
* \"bucketName\": \"s3-bucket-name\" } } ], \"overrideExistingConfig\": true }
|
|
807
|
+
* }"</code>
|
|
708
808
|
* </p>
|
|
709
809
|
* <p> To use the distributed deployment model, you must set <a href="https://docs.aws.amazon.com/fms/2018-01-01/APIReference/API_PolicyOption.html">PolicyOption</a> to
|
|
710
|
-
*
|
|
810
|
+
* <code>NULL</code>. </p>
|
|
711
811
|
* </li>
|
|
712
812
|
* <li>
|
|
713
813
|
* <p>Example: <code>NETWORK_FIREWALL</code> - Distributed deployment model with
|
|
714
|
-
*
|
|
814
|
+
* automatic Availability Zone configuration, and route management. </p>
|
|
715
815
|
* <p>
|
|
716
816
|
* <code>"{ \"type\": \"NETWORK_FIREWALL\",
|
|
717
|
-
*
|
|
718
|
-
*
|
|
719
|
-
*
|
|
720
|
-
*
|
|
721
|
-
*
|
|
722
|
-
*
|
|
723
|
-
*
|
|
724
|
-
*
|
|
725
|
-
*
|
|
726
|
-
*
|
|
727
|
-
*
|
|
728
|
-
*
|
|
729
|
-
*
|
|
730
|
-
*
|
|
731
|
-
*
|
|
732
|
-
*
|
|
733
|
-
*
|
|
734
|
-
*
|
|
735
|
-
*
|
|
817
|
+
* \"networkFirewallStatelessRuleGroupReferences\": [ { \"resourceARN\":
|
|
818
|
+
* \"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",
|
|
819
|
+
* \"priority\": 1 } ], \"networkFirewallStatelessDefaultActions\": [
|
|
820
|
+
* \"aws:forward_to_sfe\", \"customActionName\" ],
|
|
821
|
+
* \"networkFirewallStatelessFragmentDefaultActions\": [ \"aws:forward_to_sfe\",
|
|
822
|
+
* \"customActionName\" ], \"networkFirewallStatelessCustomActions\": [ {
|
|
823
|
+
* \"actionName\": \"customActionName\", \"actionDefinition\": {
|
|
824
|
+
* \"publishMetricAction\": { \"dimensions\": [ { \"value\": \"metricdimensionvalue\"
|
|
825
|
+
* } ] } } } ], \"networkFirewallStatefulRuleGroupReferences\": [ { \"resourceARN\":
|
|
826
|
+
* \"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\" } ],
|
|
827
|
+
* \"networkFirewallOrchestrationConfig\": { \"singleFirewallEndpointPerVPC\": false,
|
|
828
|
+
* \"allowedIPV4CidrList\": [ \"10.0.0.0/28\", \"192.168.0.0/28\" ],
|
|
829
|
+
* \"routeManagementAction\": \"MONITOR\", \"routeManagementTargetTypes\": [
|
|
830
|
+
* \"InternetGateway\" ] }, \"networkFirewallLoggingConfiguration\": {
|
|
831
|
+
* \"logDestinationConfigs\": [ { \"logDestinationType\": \"S3\", \"logType\":
|
|
832
|
+
* \"ALERT\", \"logDestination\": { \"bucketName\": \"s3-bucket-name\" } }, {
|
|
833
|
+
* \"logDestinationType\": \"S3\", \"logType\": \"FLOW\", \"logDestination\": {
|
|
834
|
+
* \"bucketName\": \"s3-bucket-name\" } } ], \"overrideExistingConfig\": true }
|
|
835
|
+
* }"</code>
|
|
736
836
|
* </p>
|
|
737
837
|
* </li>
|
|
738
838
|
* <li>
|
|
739
839
|
* <p>Example: <code>NETWORK_FIREWALL</code> - Distributed deployment model with
|
|
740
|
-
*
|
|
741
|
-
*
|
|
742
|
-
*
|
|
840
|
+
* custom Availability Zone configuration. With custom Availability Zone configuration,
|
|
841
|
+
* you define which specific Availability Zones to create endpoints in by configuring
|
|
842
|
+
* <code>firewallCreationConfig</code>. </p>
|
|
743
843
|
* <p>
|
|
744
844
|
* <code>"{
|
|
745
|
-
*
|
|
746
|
-
*
|
|
747
|
-
*
|
|
748
|
-
*
|
|
749
|
-
*
|
|
750
|
-
*
|
|
751
|
-
*
|
|
752
|
-
*
|
|
753
|
-
*
|
|
754
|
-
*
|
|
755
|
-
*
|
|
756
|
-
*
|
|
757
|
-
*
|
|
758
|
-
*
|
|
759
|
-
*
|
|
760
|
-
*
|
|
761
|
-
*
|
|
762
|
-
*
|
|
763
|
-
*
|
|
764
|
-
*
|
|
765
|
-
*
|
|
766
|
-
*
|
|
767
|
-
*
|
|
768
|
-
*
|
|
845
|
+
* \"type\":\"NETWORK_FIREWALL\",\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",\"priority\":1}],
|
|
846
|
+
* \"networkFirewallStatelessDefaultActions\":[ \"aws:forward_to_sfe\",
|
|
847
|
+
* \"customActionName\" ], \"networkFirewallStatelessFragmentDefaultActions\":[
|
|
848
|
+
* \"aws:forward_to_sfe\", \"fragmentcustomactionname\" ],
|
|
849
|
+
* \"networkFirewallStatelessCustomActions\":[ { \"actionName\":\"customActionName\",
|
|
850
|
+
* \"actionDefinition\":{ \"publishMetricAction\":{ \"dimensions\":[ {
|
|
851
|
+
* \"value\":\"metricdimensionvalue\" } ] } } }, {
|
|
852
|
+
* \"actionName\":\"fragmentcustomactionname\", \"actionDefinition\":{
|
|
853
|
+
* \"publishMetricAction\":{ \"dimensions\":[ {
|
|
854
|
+
* \"value\":\"fragmentmetricdimensionvalue\" } ] } } } ],
|
|
855
|
+
* \"networkFirewallStatefulRuleGroupReferences\":[ {
|
|
856
|
+
* \"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\"
|
|
857
|
+
* } ], \"networkFirewallOrchestrationConfig\":{ \"firewallCreationConfig\":{
|
|
858
|
+
* \"endpointLocation\":{ \"availabilityZoneConfigList\":[ {
|
|
859
|
+
* \"availabilityZoneId\":null, \"availabilityZoneName\":\"us-east-1a\",
|
|
860
|
+
* \"allowedIPV4CidrList\":[ \"10.0.0.0/28\" ] }, { ¯\"availabilityZoneId\":null,
|
|
861
|
+
* \"availabilityZoneName\":\"us-east-1b\", \"allowedIPV4CidrList\":[ \"10.0.0.0/28\"
|
|
862
|
+
* ] } ] } }, \"singleFirewallEndpointPerVPC\":false, \"allowedIPV4CidrList\":null,
|
|
863
|
+
* \"routeManagementAction\":\"OFF\", \"networkFirewallLoggingConfiguration\":{
|
|
864
|
+
* \"logDestinationConfigs\":[ { \"logDestinationType\":\"S3\",
|
|
865
|
+
* \"logType\":\"ALERT\", \"logDestination\":{ \"bucketName\":\"s3-bucket-name\" } },
|
|
866
|
+
* { \"logDestinationType\":\"S3\", \"logType\":\"FLOW\", \"logDestination\":{
|
|
867
|
+
* \"bucketName\":\"s3-bucket-name\" } } ], \"overrideExistingConfig\":boolean }
|
|
868
|
+
* }"</code>
|
|
769
869
|
* </p>
|
|
770
870
|
* </li>
|
|
771
871
|
* <li>
|
|
772
872
|
* <p>Example: <code>NETWORK_FIREWALL</code> - Distributed deployment model with
|
|
773
|
-
*
|
|
873
|
+
* custom Availability Zone configuration, and route management. </p>
|
|
774
874
|
* <p>
|
|
775
875
|
* <code>"{
|
|
776
|
-
*
|
|
777
|
-
*
|
|
778
|
-
*
|
|
779
|
-
*
|
|
780
|
-
*
|
|
781
|
-
*
|
|
782
|
-
*
|
|
783
|
-
*
|
|
784
|
-
*
|
|
785
|
-
*
|
|
786
|
-
*
|
|
787
|
-
*
|
|
788
|
-
*
|
|
789
|
-
*
|
|
790
|
-
*
|
|
791
|
-
*
|
|
792
|
-
*
|
|
793
|
-
*
|
|
794
|
-
*
|
|
795
|
-
*
|
|
796
|
-
*
|
|
797
|
-
*
|
|
798
|
-
*
|
|
799
|
-
*
|
|
800
|
-
*
|
|
801
|
-
*
|
|
876
|
+
* \"type\":\"NETWORK_FIREWALL\",\"networkFirewallStatelessRuleGroupReferences\":[{\"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateless-rulegroup/test\",\"priority\":1}],
|
|
877
|
+
* \"networkFirewallStatelessDefaultActions\":[ \"aws:forward_to_sfe\",
|
|
878
|
+
* \"customActionName\" ], \"networkFirewallStatelessFragmentDefaultActions\":[
|
|
879
|
+
* \"aws:forward_to_sfe\", \"fragmentcustomactionname\" ],
|
|
880
|
+
* \"networkFirewallStatelessCustomActions\":[ { \"actionName\":\"customActionName\",
|
|
881
|
+
* \"actionDefinition\":{ \"publishMetricAction\":{ \"dimensions\":[ {
|
|
882
|
+
* \"value\":\"metricdimensionvalue\" } ] } } }, {
|
|
883
|
+
* \"actionName\":\"fragmentcustomactionname\", \"actionDefinition\":{
|
|
884
|
+
* \"publishMetricAction\":{ \"dimensions\":[ {
|
|
885
|
+
* \"value\":\"fragmentmetricdimensionvalue\" } ] } } } ],
|
|
886
|
+
* \"networkFirewallStatefulRuleGroupReferences\":[ {
|
|
887
|
+
* \"resourceARN\":\"arn:aws:network-firewall:us-east-1:123456789011:stateful-rulegroup/test\"
|
|
888
|
+
* } ], \"networkFirewallOrchestrationConfig\":{ \"firewallCreationConfig\":{
|
|
889
|
+
* \"endpointLocation\":{ \"availabilityZoneConfigList\":[ {
|
|
890
|
+
* \"availabilityZoneId\":null, \"availabilityZoneName\":\"us-east-1a\",
|
|
891
|
+
* \"allowedIPV4CidrList\":[ \"10.0.0.0/28\" ] }, { ¯\"availabilityZoneId\":null,
|
|
892
|
+
* \"availabilityZoneName\":\"us-east-1b\", \"allowedIPV4CidrList\":[ \"10.0.0.0/28\"
|
|
893
|
+
* ] } ] } }, \"singleFirewallEndpointPerVPC\":false, \"allowedIPV4CidrList\":null,
|
|
894
|
+
* \"routeManagementAction\":\"MONITOR\", \"routeManagementTargetTypes\":[
|
|
895
|
+
* \"InternetGateway\" ], \"routeManagementConfig\":{
|
|
896
|
+
* \"allowCrossAZTrafficIfNoEndpoint\":true } },
|
|
897
|
+
* \"networkFirewallLoggingConfiguration\":{ \"logDestinationConfigs\":[ {
|
|
898
|
+
* \"logDestinationType\":\"S3\", \"logType\":\"ALERT\", \"logDestination\":{
|
|
899
|
+
* \"bucketName\":\"s3-bucket-name\" } }, { \"logDestinationType\":\"S3\",
|
|
900
|
+
* \"logType\":\"FLOW\", \"logDestination\":{ \"bucketName\":\"s3-bucket-name\" } }
|
|
901
|
+
* ], \"overrideExistingConfig\":boolean } }"</code>
|
|
902
|
+
* </p>
|
|
903
|
+
* </li>
|
|
904
|
+
* <li>
|
|
905
|
+
* <p>Example: <code>PARTNER_FIREWALL</code> for Firewall Manager</p>
|
|
906
|
+
* <p>
|
|
907
|
+
* <code>"{\"type\":\"THIRD_PARTY_FIREWALL\",\"thirdPartyrFirewall\":\"PALO_ALTO_NETWORKS_CLOUD_NGFW\",\"thirdPartyFirewallConfig\":{\"thirdPartyFirewallPolicyList\":[\"global-123456789012-1\"],\"networkFirewallLoggingConfiguration\":null},\"firewallDeploymentModel\":{\"distributedFirewallDeploymentModel\":{\"distributedFirewallOrchestrationConfig\":{\"firewallCreationConfig\":{\"endpointLocation\":{\"availabilityZoneConfigList\":[{\"availabilityZoneId\":null,\"availabilityZoneName\":\"us-east-1a\",\"allowedIPV4CidrList\":[\"10.0.1.0/28\"]}]}},\"allowedIPV4CidrList\":null},\"distributedRouteManagementConfig\":null},\"centralizedFirewallDeploymentModel\":null}}""</code>
|
|
802
908
|
* </p>
|
|
803
909
|
* </li>
|
|
804
910
|
* <li>
|
|
805
911
|
* <p>Specification for <code>SHIELD_ADVANCED</code> for Amazon CloudFront distributions </p>
|
|
806
912
|
* <p>
|
|
807
913
|
* <code>"{\"type\":\"SHIELD_ADVANCED\",\"automaticResponseConfiguration\":
|
|
808
|
-
*
|
|
809
|
-
*
|
|
810
|
-
*
|
|
914
|
+
* {\"automaticResponseStatus\":\"ENABLED|IGNORED|DISABLED\",
|
|
915
|
+
* \"automaticResponseAction\":\"BLOCK|COUNT\"},
|
|
916
|
+
* \"overrideCustomerWebaclClassic\":true|false}"</code>
|
|
811
917
|
* </p>
|
|
812
918
|
* <p>For example:
|
|
813
|
-
*
|
|
814
|
-
*
|
|
815
|
-
*
|
|
919
|
+
* <code>"{\"type\":\"SHIELD_ADVANCED\",\"automaticResponseConfiguration\":
|
|
920
|
+
* {\"automaticResponseStatus\":\"ENABLED\",
|
|
921
|
+
* \"automaticResponseAction\":\"COUNT\"}}"</code>
|
|
816
922
|
* </p>
|
|
817
923
|
* <p>The default value for <code>automaticResponseStatus</code> is
|
|
818
|
-
*
|
|
819
|
-
*
|
|
820
|
-
*
|
|
821
|
-
*
|
|
924
|
+
* <code>IGNORED</code>. The value for <code>automaticResponseAction</code> is only
|
|
925
|
+
* required when <code>automaticResponseStatus</code> is set to <code>ENABLED</code>.
|
|
926
|
+
* The default value for <code>overrideCustomerWebaclClassic</code> is
|
|
927
|
+
* <code>false</code>.</p>
|
|
822
928
|
* <p>For other resource types that you can protect with a Shield Advanced policy, this
|
|
823
|
-
*
|
|
929
|
+
* <code>ManagedServiceData</code> configuration is an empty string.</p>
|
|
824
930
|
* </li>
|
|
825
931
|
* <li>
|
|
826
932
|
* <p>Example: <code>WAFV2</code>
|
|
@@ -829,36 +935,46 @@ export interface SecurityServicePolicyData {
|
|
|
829
935
|
* <code>"{\"type\":\"WAFV2\",\"preProcessRuleGroups\":[{\"ruleGroupArn\":null,\"overrideAction\":{\"type\":\"NONE\"},\"managedRuleGroupIdentifier\":{\"version\":null,\"vendorName\":\"AWS\",\"managedRuleGroupName\":\"AWSManagedRulesAmazonIpReputationList\"},\"ruleGroupType\":\"ManagedRuleGroup\",\"excludeRules\":[{\"name\":\"NoUserAgent_HEADER\"}]}],\"postProcessRuleGroups\":[],\"defaultAction\":{\"type\":\"ALLOW\"},\"overrideCustomerWebACLAssociation\":false,\"loggingConfiguration\":{\"logDestinationConfigs\":[\"arn:aws:firehose:us-west-2:12345678912:deliverystream/aws-waf-logs-fms-admin-destination\"],\"redactedFields\":[{\"redactedFieldType\":\"SingleHeader\",\"redactedFieldValue\":\"Cookies\"},{\"redactedFieldType\":\"Method\"}]}}"</code>
|
|
830
936
|
* </p>
|
|
831
937
|
* <p>In the <code>loggingConfiguration</code>, you can specify one
|
|
832
|
-
*
|
|
833
|
-
*
|
|
834
|
-
*
|
|
835
|
-
*
|
|
938
|
+
* <code>logDestinationConfigs</code>, you can optionally provide up to 20
|
|
939
|
+
* <code>redactedFields</code>, and the <code>RedactedFieldType</code> must be one of
|
|
940
|
+
* <code>URI</code>, <code>QUERY_STRING</code>, <code>HEADER</code>, or
|
|
941
|
+
* <code>METHOD</code>.</p>
|
|
836
942
|
* </li>
|
|
837
943
|
* <li>
|
|
838
944
|
* <p>Example: <code>WAF Classic</code>
|
|
839
945
|
* </p>
|
|
840
946
|
* <p>
|
|
841
947
|
* <code>"{\"type\": \"WAF\", \"ruleGroups\":
|
|
842
|
-
*
|
|
843
|
-
*
|
|
948
|
+
* [{\"id\":\"12345678-1bcd-9012-efga-0987654321ab\", \"overrideAction\" : {\"type\":
|
|
949
|
+
* \"COUNT\"}}], \"defaultAction\": {\"type\": \"BLOCK\"}}"</code>
|
|
950
|
+
* </p>
|
|
951
|
+
* </li>
|
|
952
|
+
* <li>
|
|
953
|
+
* <p>Example: <code>WAFV2</code> - Firewall Manager support for WAF managed rule group versioning
|
|
954
|
+
* </p>
|
|
955
|
+
* <p>
|
|
956
|
+
* <code>"{\"type\":\"WAFV2\",\"preProcessRuleGroups\":[{\"ruleGroupArn\":null,\"overrideAction\":{\"type\":\"NONE\"},\"managedRuleGroupIdentifier\":{\"versionEnabled\":true,\"version\":\"Version_2.0\",\"vendorName\":\"AWS\",\"managedRuleGroupName\":\"AWSManagedRulesCommonRuleSet\"},\"ruleGroupType\":\"ManagedRuleGroup\",\"excludeRules\":[{\"name\":\"NoUserAgent_HEADER\"}]}],\"postProcessRuleGroups\":[],\"defaultAction\":{\"type\":\"ALLOW\"},\"overrideCustomerWebACLAssociation\":false,\"loggingConfiguration\":{\"logDestinationConfigs\":[\"arn:aws:firehose:us-west-2:12345678912:deliverystream/aws-waf-logs-fms-admin-destination\"],\"redactedFields\":[{\"redactedFieldType\":\"SingleHeader\",\"redactedFieldValue\":\"Cookies\"},{\"redactedFieldType\":\"Method\"}]}}"</code>
|
|
844
957
|
* </p>
|
|
958
|
+
* <p>
|
|
959
|
+
* To use a specific version of a WAF managed rule group in your Firewall Manager policy, you must set <code>versionEnabled</code> to <code>true</code>, and set <code>version</code> to the version you'd like to use. If you don't set <code>versionEnabled</code> to <code>true</code>, or if you omit <code>versionEnabled</code>, then Firewall Manager uses the default version of the WAF managed rule group.
|
|
960
|
+
* </p>
|
|
845
961
|
* </li>
|
|
846
962
|
* <li>
|
|
847
963
|
* <p>Example: <code>SECURITY_GROUPS_COMMON</code>
|
|
848
964
|
* </p>
|
|
849
965
|
* <p>
|
|
850
966
|
* <code>"{\"type\":\"SECURITY_GROUPS_COMMON\",\"revertManualSecurityGroupChanges\":false,\"exclusiveResourceSecurityGroupManagement\":false,
|
|
851
|
-
*
|
|
852
|
-
*
|
|
967
|
+
* \"applyToAllEC2InstanceENIs\":false,\"securityGroups\":[{\"id\":\"
|
|
968
|
+
* sg-000e55995d61a06bd\"}]}"</code>
|
|
853
969
|
* </p>
|
|
854
970
|
* </li>
|
|
855
971
|
* <li>
|
|
856
972
|
* <p>Example: Shared VPCs. Apply the preceding policy to resources in shared VPCs as
|
|
857
|
-
*
|
|
973
|
+
* well as to those in VPCs that the account owns </p>
|
|
858
974
|
* <p>
|
|
859
975
|
* <code>"{\"type\":\"SECURITY_GROUPS_COMMON\",\"revertManualSecurityGroupChanges\":false,\"exclusiveResourceSecurityGroupManagement\":false,
|
|
860
|
-
*
|
|
861
|
-
*
|
|
976
|
+
* \"applyToAllEC2InstanceENIs\":false,\"includeSharedVPC\":true,\"securityGroups\":[{\"id\":\"
|
|
977
|
+
* sg-000e55995d61a06bd\"}]}"</code>
|
|
862
978
|
* </p>
|
|
863
979
|
* </li>
|
|
864
980
|
* <li>
|
|
@@ -868,10 +984,10 @@ export interface SecurityServicePolicyData {
|
|
|
868
984
|
* <code>"{\"type\":\"SECURITY_GROUPS_CONTENT_AUDIT\",\"securityGroups\":[{\"id\":\"sg-000e55995d61a06bd\"}],\"securityGroupAction\":{\"type\":\"ALLOW\"}}"</code>
|
|
869
985
|
* </p>
|
|
870
986
|
* <p>The security group action for content audit can be <code>ALLOW</code> or
|
|
871
|
-
*
|
|
872
|
-
*
|
|
873
|
-
*
|
|
874
|
-
*
|
|
987
|
+
* <code>DENY</code>. For <code>ALLOW</code>, all in-scope security group rules must
|
|
988
|
+
* be within the allowed range of the policy's security group rules. For
|
|
989
|
+
* <code>DENY</code>, all in-scope security group rules must not contain a value or a
|
|
990
|
+
* range that matches a rule value or range in the policy security group.</p>
|
|
875
991
|
* </li>
|
|
876
992
|
* <li>
|
|
877
993
|
* <p>Example: <code>SECURITY_GROUPS_USAGE_AUDIT</code>
|
|
@@ -909,10 +1025,10 @@ export interface Policy {
|
|
|
909
1025
|
PolicyName: string | undefined;
|
|
910
1026
|
/**
|
|
911
1027
|
* <p>A unique identifier for each update to the policy. When issuing a <code>PutPolicy</code>
|
|
912
|
-
*
|
|
913
|
-
*
|
|
914
|
-
*
|
|
915
|
-
*
|
|
1028
|
+
* request, the <code>PolicyUpdateToken</code> in the request must match the
|
|
1029
|
+
* <code>PolicyUpdateToken</code> of the current policy version. To get the
|
|
1030
|
+
* <code>PolicyUpdateToken</code> of the current policy version, use a <code>GetPolicy</code>
|
|
1031
|
+
* request.</p>
|
|
916
1032
|
*/
|
|
917
1033
|
PolicyUpdateToken?: string;
|
|
918
1034
|
/**
|
|
@@ -921,25 +1037,20 @@ export interface Policy {
|
|
|
921
1037
|
SecurityServicePolicyData: SecurityServicePolicyData | undefined;
|
|
922
1038
|
/**
|
|
923
1039
|
* <p>The type of resource protected by or in scope of the policy. This is in the format shown
|
|
924
|
-
*
|
|
925
|
-
*
|
|
926
|
-
*
|
|
927
|
-
*
|
|
928
|
-
*
|
|
929
|
-
*
|
|
930
|
-
*
|
|
931
|
-
*
|
|
932
|
-
*
|
|
933
|
-
*
|
|
934
|
-
* <code>AWS::EC2::SecurityGroup</code>, <code>AWS::EC2::NetworkInterface</code>, and
|
|
935
|
-
* <code>AWS::EC2::Instance</code>. For a security group usage audit policy, the value is
|
|
936
|
-
* <code>AWS::EC2::SecurityGroup</code>. For an Network Firewall policy or DNS Firewall policy,
|
|
937
|
-
* the value is <code>AWS::EC2::VPC</code>.</p>
|
|
1040
|
+
* in the <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-template-resource-type-ref.html">Amazon Web Services Resource Types Reference</a>.
|
|
1041
|
+
* To apply this policy to multiple resource types, specify a resource type of <code>ResourceTypeList</code> and then specify the resource types in a <code>ResourceTypeList</code>.</p>
|
|
1042
|
+
* <p>For WAF and Shield Advanced, resource types include
|
|
1043
|
+
* <code>AWS::ElasticLoadBalancingV2::LoadBalancer</code>, <code>AWS::ElasticLoadBalancing::LoadBalancer</code>, <code>AWS::EC2::EIP</code>, and
|
|
1044
|
+
* <code>AWS::CloudFront::Distribution</code>. For a security group common policy, valid values
|
|
1045
|
+
* are <code>AWS::EC2::NetworkInterface</code> and <code>AWS::EC2::Instance</code>. For a
|
|
1046
|
+
* security group content audit policy, valid values are <code>AWS::EC2::SecurityGroup</code>,
|
|
1047
|
+
* <code>AWS::EC2::NetworkInterface</code>, and <code>AWS::EC2::Instance</code>. For a security
|
|
1048
|
+
* group usage audit policy, the value is <code>AWS::EC2::SecurityGroup</code>. For an Network Firewall policy or DNS Firewall policy,
|
|
1049
|
+
* the value is <code>AWS::EC2::VPC</code>.</p>
|
|
938
1050
|
*/
|
|
939
1051
|
ResourceType: string | undefined;
|
|
940
1052
|
/**
|
|
941
|
-
* <p>An array of <code>ResourceType</code> objects. Use this only to specify multiple
|
|
942
|
-
* resource types. To specify a single resource type, use <code>ResourceType</code>.</p>
|
|
1053
|
+
* <p>An array of <code>ResourceType</code> objects. Use this only to specify multiple resource types. To specify a single resource type, use <code>ResourceType</code>.</p>
|
|
943
1054
|
*/
|
|
944
1055
|
ResourceTypeList?: string[];
|
|
945
1056
|
/**
|
|
@@ -948,11 +1059,9 @@ export interface Policy {
|
|
|
948
1059
|
ResourceTags?: ResourceTag[];
|
|
949
1060
|
/**
|
|
950
1061
|
* <p>If set to <code>True</code>, resources with the tags that are specified in the
|
|
951
|
-
*
|
|
952
|
-
*
|
|
953
|
-
*
|
|
954
|
-
* <p> This option isn't available for the centralized deployment model when creating policies
|
|
955
|
-
* to configure Network Firewall. </p>
|
|
1062
|
+
* <code>ResourceTag</code> array are not in scope of the policy. If set to <code>False</code>,
|
|
1063
|
+
* and the <code>ResourceTag</code> array is not null, only resources with the specified tags are
|
|
1064
|
+
* in scope of the policy.</p>
|
|
956
1065
|
*/
|
|
957
1066
|
ExcludeResourceTags: boolean | undefined;
|
|
958
1067
|
/**
|
|
@@ -968,67 +1077,53 @@ export interface Policy {
|
|
|
968
1077
|
*/
|
|
969
1078
|
DeleteUnusedFMManagedResources?: boolean;
|
|
970
1079
|
/**
|
|
971
|
-
* <p>Specifies the Amazon Web Services account IDs and Organizations organizational units (OUs) to include in
|
|
972
|
-
*
|
|
973
|
-
*
|
|
974
|
-
*
|
|
975
|
-
*
|
|
976
|
-
*
|
|
977
|
-
* <code>IncludeMap</code>, and does not evaluate any <code>ExcludeMap</code>
|
|
978
|
-
* specifications. If you do not specify an <code>IncludeMap</code>, then Firewall Manager applies the
|
|
979
|
-
* policy to all accounts except for those specified by the <code>ExcludeMap</code>.</p>
|
|
1080
|
+
* <p>Specifies the Amazon Web Services account IDs and Organizations organizational units (OUs) to include in the policy.
|
|
1081
|
+
* Specifying an OU is the equivalent of specifying all accounts in the OU and in any of its child OUs, including any child OUs and accounts that are added at a later time.</p>
|
|
1082
|
+
* <p>You can specify inclusions or exclusions, but not both. If you specify an <code>IncludeMap</code>, Firewall Manager
|
|
1083
|
+
* applies the policy to all accounts specified by the <code>IncludeMap</code>, and
|
|
1084
|
+
* does not evaluate any <code>ExcludeMap</code> specifications. If you do not specify an <code>IncludeMap</code>, then Firewall Manager
|
|
1085
|
+
* applies the policy to all accounts except for those specified by the <code>ExcludeMap</code>.</p>
|
|
980
1086
|
* <p>You can specify account IDs, OUs, or a combination: </p>
|
|
981
1087
|
* <ul>
|
|
982
1088
|
* <li>
|
|
983
|
-
* <p>Specify account IDs by setting the key to <code>ACCOUNT</code>. For example, the
|
|
984
|
-
*
|
|
985
|
-
* “accountID2”]}</code>.</p>
|
|
1089
|
+
* <p>Specify account IDs by setting the key to <code>ACCOUNT</code>. For example, the following is a valid map:
|
|
1090
|
+
* <code>{“ACCOUNT” : [“accountID1”, “accountID2”]}</code>.</p>
|
|
986
1091
|
* </li>
|
|
987
1092
|
* <li>
|
|
988
|
-
* <p>Specify OUs by setting the key to <code>ORG_UNIT</code>. For example, the
|
|
989
|
-
*
|
|
1093
|
+
* <p>Specify OUs by setting the key to <code>ORG_UNIT</code>. For example, the following is a valid map:
|
|
1094
|
+
* <code>{“ORG_UNIT” : [“ouid111”, “ouid112”]}</code>.</p>
|
|
990
1095
|
* </li>
|
|
991
1096
|
* <li>
|
|
992
|
-
* <p>Specify accounts and OUs together in a single map, separated with a comma. For
|
|
993
|
-
*
|
|
994
|
-
* “accountID2”], “ORG_UNIT” : [“ouid111”, “ouid112”]}</code>.</p>
|
|
1097
|
+
* <p>Specify accounts and OUs together in a single map, separated with a comma. For example, the following is a valid map:
|
|
1098
|
+
* <code>{“ACCOUNT” : [“accountID1”, “accountID2”], “ORG_UNIT” : [“ouid111”, “ouid112”]}</code>.</p>
|
|
995
1099
|
* </li>
|
|
996
1100
|
* </ul>
|
|
997
|
-
* <p> This option isn't available for the centralized deployment model when creating policies
|
|
998
|
-
* to configure Network Firewall. </p>
|
|
999
1101
|
*/
|
|
1000
1102
|
IncludeMap?: {
|
|
1001
1103
|
[key: string]: string[];
|
|
1002
1104
|
};
|
|
1003
1105
|
/**
|
|
1004
|
-
* <p>Specifies the Amazon Web Services account IDs and Organizations organizational units (OUs) to exclude from
|
|
1005
|
-
*
|
|
1006
|
-
*
|
|
1007
|
-
*
|
|
1008
|
-
*
|
|
1009
|
-
*
|
|
1010
|
-
* <code>IncludeMap</code>, and does not evaluate any <code>ExcludeMap</code>
|
|
1011
|
-
* specifications. If you do not specify an <code>IncludeMap</code>, then Firewall Manager applies the
|
|
1012
|
-
* policy to all accounts except for those specified by the <code>ExcludeMap</code>.</p>
|
|
1106
|
+
* <p>Specifies the Amazon Web Services account IDs and Organizations organizational units (OUs) to exclude from the policy.
|
|
1107
|
+
* Specifying an OU is the equivalent of specifying all accounts in the OU and in any of its child OUs, including any child OUs and accounts that are added at a later time.</p>
|
|
1108
|
+
* <p>You can specify inclusions or exclusions, but not both. If you specify an <code>IncludeMap</code>, Firewall Manager
|
|
1109
|
+
* applies the policy to all accounts specified by the <code>IncludeMap</code>, and
|
|
1110
|
+
* does not evaluate any <code>ExcludeMap</code> specifications. If you do not specify an <code>IncludeMap</code>, then Firewall Manager
|
|
1111
|
+
* applies the policy to all accounts except for those specified by the <code>ExcludeMap</code>.</p>
|
|
1013
1112
|
* <p>You can specify account IDs, OUs, or a combination: </p>
|
|
1014
1113
|
* <ul>
|
|
1015
1114
|
* <li>
|
|
1016
|
-
* <p>Specify account IDs by setting the key to <code>ACCOUNT</code>. For example, the
|
|
1017
|
-
*
|
|
1018
|
-
* “accountID2”]}</code>.</p>
|
|
1115
|
+
* <p>Specify account IDs by setting the key to <code>ACCOUNT</code>. For example, the following is a valid map:
|
|
1116
|
+
* <code>{“ACCOUNT” : [“accountID1”, “accountID2”]}</code>.</p>
|
|
1019
1117
|
* </li>
|
|
1020
1118
|
* <li>
|
|
1021
|
-
* <p>Specify OUs by setting the key to <code>ORG_UNIT</code>. For example, the
|
|
1022
|
-
*
|
|
1119
|
+
* <p>Specify OUs by setting the key to <code>ORG_UNIT</code>. For example, the following is a valid map:
|
|
1120
|
+
* <code>{“ORG_UNIT” : [“ouid111”, “ouid112”]}</code>.</p>
|
|
1023
1121
|
* </li>
|
|
1024
1122
|
* <li>
|
|
1025
|
-
* <p>Specify accounts and OUs together in a single map, separated with a comma. For
|
|
1026
|
-
*
|
|
1027
|
-
* “accountID2”], “ORG_UNIT” : [“ouid111”, “ouid112”]}</code>.</p>
|
|
1123
|
+
* <p>Specify accounts and OUs together in a single map, separated with a comma. For example, the following is a valid map:
|
|
1124
|
+
* <code>{“ACCOUNT” : [“accountID1”, “accountID2”], “ORG_UNIT” : [“ouid111”, “ouid112”]}</code>.</p>
|
|
1028
1125
|
* </li>
|
|
1029
1126
|
* </ul>
|
|
1030
|
-
* <p> This option isn't available for the centralized deployment model when creating policies
|
|
1031
|
-
* to configure Network Firewall. </p>
|
|
1032
1127
|
*/
|
|
1033
1128
|
ExcludeMap?: {
|
|
1034
1129
|
[key: string]: string[];
|
|
@@ -1079,33 +1174,28 @@ export interface GetProtectionStatusRequest {
|
|
|
1079
1174
|
*/
|
|
1080
1175
|
MemberAccountId?: string;
|
|
1081
1176
|
/**
|
|
1082
|
-
* <p>The start of the time period to query for the attacks. This is a <code>timestamp</code>
|
|
1083
|
-
*
|
|
1084
|
-
*
|
|
1085
|
-
* is allowed.</p>
|
|
1177
|
+
* <p>The start of the time period to query for the attacks. This is a <code>timestamp</code> type. The
|
|
1178
|
+
* request syntax listing indicates a <code>number</code> type because the default used by Firewall Manager is Unix time in seconds. However, any valid <code>timestamp</code> format is
|
|
1179
|
+
* allowed.</p>
|
|
1086
1180
|
*/
|
|
1087
1181
|
StartTime?: Date;
|
|
1088
1182
|
/**
|
|
1089
|
-
* <p>The end of the time period to query for the attacks. This is a <code>timestamp</code>
|
|
1090
|
-
*
|
|
1091
|
-
*
|
|
1092
|
-
* is allowed.</p>
|
|
1183
|
+
* <p>The end of the time period to query for the attacks. This is a <code>timestamp</code> type. The
|
|
1184
|
+
* request syntax listing indicates a <code>number</code> type because the default used by Firewall Manager is Unix time in seconds. However, any valid <code>timestamp</code> format is
|
|
1185
|
+
* allowed.</p>
|
|
1093
1186
|
*/
|
|
1094
1187
|
EndTime?: Date;
|
|
1095
1188
|
/**
|
|
1096
|
-
* <p>If you specify a value for <code>MaxResults</code> and you have more objects than the
|
|
1097
|
-
*
|
|
1098
|
-
*
|
|
1099
|
-
*
|
|
1100
|
-
* specify the value of <code>NextToken</code> from the previous response to get information
|
|
1101
|
-
* about another batch of objects.</p>
|
|
1189
|
+
* <p>If you specify a value for <code>MaxResults</code> and you have more objects than the number that you specify
|
|
1190
|
+
* for <code>MaxResults</code>, Firewall Manager returns a <code>NextToken</code> value in the response, which you can use to retrieve another group of
|
|
1191
|
+
* objects. For the second and subsequent <code>GetProtectionStatus</code> requests, specify the value of <code>NextToken</code>
|
|
1192
|
+
* from the previous response to get information about another batch of objects.</p>
|
|
1102
1193
|
*/
|
|
1103
1194
|
NextToken?: string;
|
|
1104
1195
|
/**
|
|
1105
|
-
* <p>Specifies the number of objects that you want Firewall Manager to return for this request. If
|
|
1106
|
-
*
|
|
1107
|
-
*
|
|
1108
|
-
* objects.</p>
|
|
1196
|
+
* <p>Specifies the number of objects that you want Firewall Manager to return for this request. If you have more
|
|
1197
|
+
* objects than the number that you specify for <code>MaxResults</code>, the response includes a
|
|
1198
|
+
* <code>NextToken</code> value that you can use to get another batch of objects.</p>
|
|
1109
1199
|
*/
|
|
1110
1200
|
MaxResults?: number;
|
|
1111
1201
|
}
|
|
@@ -1148,14 +1238,13 @@ export interface GetProtectionStatusResponse {
|
|
|
1148
1238
|
*/
|
|
1149
1239
|
Data?: string;
|
|
1150
1240
|
/**
|
|
1151
|
-
* <p>If you have more objects than the number that you specified for <code>MaxResults</code>
|
|
1152
|
-
*
|
|
1153
|
-
*
|
|
1154
|
-
*
|
|
1155
|
-
*
|
|
1156
|
-
*
|
|
1157
|
-
*
|
|
1158
|
-
* not supported by <code>GetProtectionStatus</code>. You must submit subsequent requests with
|
|
1241
|
+
* <p>If you have more objects than the number that you specified for <code>MaxResults</code> in the request,
|
|
1242
|
+
* the response includes a <code>NextToken</code> value. To list more objects, submit another
|
|
1243
|
+
* <code>GetProtectionStatus</code> request, and specify the <code>NextToken</code> value from the response in the
|
|
1244
|
+
* <code>NextToken</code> value in the next request.</p>
|
|
1245
|
+
* <p>Amazon Web Services SDKs provide auto-pagination that identify <code>NextToken</code> in a response and
|
|
1246
|
+
* make subsequent request calls automatically on your behalf. However, this feature is not
|
|
1247
|
+
* supported by <code>GetProtectionStatus</code>. You must submit subsequent requests with
|
|
1159
1248
|
* <code>NextToken</code> using your own processes. </p>
|
|
1160
1249
|
*/
|
|
1161
1250
|
NextToken?: string;
|
|
@@ -1195,9 +1284,9 @@ export interface ProtocolsListData {
|
|
|
1195
1284
|
*/
|
|
1196
1285
|
ListName: string | undefined;
|
|
1197
1286
|
/**
|
|
1198
|
-
* <p>A unique identifier for each update to the list. When you update
|
|
1199
|
-
*
|
|
1200
|
-
*
|
|
1287
|
+
* <p>A unique identifier for each update to the list. When you update
|
|
1288
|
+
* the list, the update token must match the token of the current version of the application list.
|
|
1289
|
+
* You can retrieve the update token by getting the list. </p>
|
|
1201
1290
|
*/
|
|
1202
1291
|
ListUpdateToken?: string;
|
|
1203
1292
|
/**
|
|
@@ -1241,10 +1330,78 @@ export declare namespace GetProtocolsListResponse {
|
|
|
1241
1330
|
*/
|
|
1242
1331
|
const filterSensitiveLog: (obj: GetProtocolsListResponse) => any;
|
|
1243
1332
|
}
|
|
1333
|
+
export interface GetThirdPartyFirewallAssociationStatusRequest {
|
|
1334
|
+
/**
|
|
1335
|
+
* <p>The name of the third-party firewall vendor.</p>
|
|
1336
|
+
*/
|
|
1337
|
+
ThirdPartyFirewall: ThirdPartyFirewall | string | undefined;
|
|
1338
|
+
}
|
|
1339
|
+
export declare namespace GetThirdPartyFirewallAssociationStatusRequest {
|
|
1340
|
+
/**
|
|
1341
|
+
* @internal
|
|
1342
|
+
*/
|
|
1343
|
+
const filterSensitiveLog: (obj: GetThirdPartyFirewallAssociationStatusRequest) => any;
|
|
1344
|
+
}
|
|
1345
|
+
export declare enum MarketplaceSubscriptionOnboardingStatus {
|
|
1346
|
+
COMPLETE = "COMPLETE",
|
|
1347
|
+
NOT_COMPLETE = "NOT_COMPLETE",
|
|
1348
|
+
NO_SUBSCRIPTION = "NO_SUBSCRIPTION"
|
|
1349
|
+
}
|
|
1350
|
+
export interface GetThirdPartyFirewallAssociationStatusResponse {
|
|
1351
|
+
/**
|
|
1352
|
+
* <p>The current status for setting a Firewall Manager policy administrators account as an administrator of the third-party firewall tenant.</p>
|
|
1353
|
+
* <ul>
|
|
1354
|
+
* <li>
|
|
1355
|
+
* <p>
|
|
1356
|
+
* <code>ONBOARDING</code> - The Firewall Manager policy administrator is being designated as a tenant administrator.</p>
|
|
1357
|
+
* </li>
|
|
1358
|
+
* <li>
|
|
1359
|
+
* <p>
|
|
1360
|
+
* <code>ONBOARD_COMPLETE</code> - The Firewall Manager policy administrator is designated as a tenant administrator.</p>
|
|
1361
|
+
* </li>
|
|
1362
|
+
* <li>
|
|
1363
|
+
* <p>
|
|
1364
|
+
* <code>OFFBOARDING</code> - The Firewall Manager policy administrator is being removed as a tenant administrator.</p>
|
|
1365
|
+
* </li>
|
|
1366
|
+
* <li>
|
|
1367
|
+
* <p>
|
|
1368
|
+
* <code>OFFBOARD_COMPLETE</code> - The Firewall Manager policy administrator has been removed as a tenant administrator.</p>
|
|
1369
|
+
* </li>
|
|
1370
|
+
* <li>
|
|
1371
|
+
* <p>
|
|
1372
|
+
* <code>NOT_EXIST</code> - The Firewall Manager policy administrator doesn't exist as a tenant administrator.</p>
|
|
1373
|
+
* </li>
|
|
1374
|
+
* </ul>
|
|
1375
|
+
*/
|
|
1376
|
+
ThirdPartyFirewallStatus?: ThirdPartyFirewallAssociationStatus | string;
|
|
1377
|
+
/**
|
|
1378
|
+
* <p>The status for subscribing to the third-party firewall vendor in the AWS Marketplace.</p>
|
|
1379
|
+
* <ul>
|
|
1380
|
+
* <li>
|
|
1381
|
+
* <p>
|
|
1382
|
+
* <code>NO_SUBSCRIPTION</code> - The Firewall Manager policy administrator isn't subscribed to the third-party firewall service in the AWS Marketplace.</p>
|
|
1383
|
+
* </li>
|
|
1384
|
+
* <li>
|
|
1385
|
+
* <p>
|
|
1386
|
+
* <code>NOT_COMPLETE</code> - The Firewall Manager policy administrator is in the process of subscribing to the third-party firewall service in the Amazon Web Services Marketplace, but doesn't yet have an active subscription.</p>
|
|
1387
|
+
* </li>
|
|
1388
|
+
* <li>
|
|
1389
|
+
* <p>
|
|
1390
|
+
* <code>COMPLETE</code> - The Firewall Manager policy administrator has an active subscription to the third-party firewall service in the Amazon Web Services Marketplace.</p>
|
|
1391
|
+
* </li>
|
|
1392
|
+
* </ul>
|
|
1393
|
+
*/
|
|
1394
|
+
MarketplaceOnboardingStatus?: MarketplaceSubscriptionOnboardingStatus | string;
|
|
1395
|
+
}
|
|
1396
|
+
export declare namespace GetThirdPartyFirewallAssociationStatusResponse {
|
|
1397
|
+
/**
|
|
1398
|
+
* @internal
|
|
1399
|
+
*/
|
|
1400
|
+
const filterSensitiveLog: (obj: GetThirdPartyFirewallAssociationStatusResponse) => any;
|
|
1401
|
+
}
|
|
1244
1402
|
export interface GetViolationDetailsRequest {
|
|
1245
1403
|
/**
|
|
1246
|
-
* <p>The ID of the Firewall Manager policy that you want the details for. This currently only
|
|
1247
|
-
* supports security group content audit policies.</p>
|
|
1404
|
+
* <p>The ID of the Firewall Manager policy that you want the details for. This currently only supports security group content audit policies.</p>
|
|
1248
1405
|
*/
|
|
1249
1406
|
PolicyId: string | undefined;
|
|
1250
1407
|
/**
|
|
@@ -1256,11 +1413,14 @@ export interface GetViolationDetailsRequest {
|
|
|
1256
1413
|
*/
|
|
1257
1414
|
ResourceId: string | undefined;
|
|
1258
1415
|
/**
|
|
1259
|
-
* <p>The resource type. This is in the format shown in the <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-template-resource-type-ref.html">Amazon Web Services
|
|
1260
|
-
*
|
|
1261
|
-
*
|
|
1262
|
-
*
|
|
1263
|
-
*
|
|
1416
|
+
* <p>The resource type. This is in the format shown in the <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-template-resource-type-ref.html">Amazon Web Services Resource Types Reference</a>.
|
|
1417
|
+
* Supported resource types are:
|
|
1418
|
+
* <code>AWS::EC2::Instance</code>,
|
|
1419
|
+
* <code>AWS::EC2::NetworkInterface</code>,
|
|
1420
|
+
* <code>AWS::EC2::SecurityGroup</code>,
|
|
1421
|
+
* <code>AWS::NetworkFirewall::FirewallPolicy</code>, and
|
|
1422
|
+
* <code>AWS::EC2::Subnet</code>.
|
|
1423
|
+
* </p>
|
|
1264
1424
|
*/
|
|
1265
1425
|
ResourceType: string | undefined;
|
|
1266
1426
|
}
|
|
@@ -1271,22 +1431,15 @@ export declare namespace GetViolationDetailsRequest {
|
|
|
1271
1431
|
const filterSensitiveLog: (obj: GetViolationDetailsRequest) => any;
|
|
1272
1432
|
}
|
|
1273
1433
|
/**
|
|
1274
|
-
* <p>A collection of key:value pairs associated with an Amazon Web Services resource. The key:value pair
|
|
1275
|
-
* can be anything you define. Typically, the tag key represents a category (such as
|
|
1276
|
-
* "environment") and the tag value represents a specific value within that category (such as
|
|
1277
|
-
* "test," "development," or "production"). You can add up to 50 tags to each Amazon Web Services resource.
|
|
1278
|
-
* </p>
|
|
1434
|
+
* <p>A collection of key:value pairs associated with an Amazon Web Services resource. The key:value pair can be anything you define. Typically, the tag key represents a category (such as "environment") and the tag value represents a specific value within that category (such as "test," "development," or "production"). You can add up to 50 tags to each Amazon Web Services resource. </p>
|
|
1279
1435
|
*/
|
|
1280
1436
|
export interface Tag {
|
|
1281
1437
|
/**
|
|
1282
|
-
* <p>Part of the key:value pair that defines a tag. You can use a tag key to describe a
|
|
1283
|
-
* category of information, such as "customer." Tag keys are case-sensitive.</p>
|
|
1438
|
+
* <p>Part of the key:value pair that defines a tag. You can use a tag key to describe a category of information, such as "customer." Tag keys are case-sensitive.</p>
|
|
1284
1439
|
*/
|
|
1285
1440
|
Key: string | undefined;
|
|
1286
1441
|
/**
|
|
1287
|
-
* <p>Part of the key:value pair that defines a tag. You can use a tag value to describe a
|
|
1288
|
-
* specific value within a category, such as "companyA" or "companyB." Tag values are
|
|
1289
|
-
* case-sensitive. </p>
|
|
1442
|
+
* <p>Part of the key:value pair that defines a tag. You can use a tag value to describe a specific value within a category, such as "companyA" or "companyB." Tag values are case-sensitive. </p>
|
|
1290
1443
|
*/
|
|
1291
1444
|
Value: string | undefined;
|
|
1292
1445
|
}
|
|
@@ -1297,8 +1450,7 @@ export declare namespace Tag {
|
|
|
1297
1450
|
const filterSensitiveLog: (obj: Tag) => any;
|
|
1298
1451
|
}
|
|
1299
1452
|
/**
|
|
1300
|
-
* <p>The reference rule that partially matches the <code>ViolationTarget</code> rule and
|
|
1301
|
-
* violation reason.</p>
|
|
1453
|
+
* <p>The reference rule that partially matches the <code>ViolationTarget</code> rule and violation reason.</p>
|
|
1302
1454
|
*/
|
|
1303
1455
|
export interface PartialMatch {
|
|
1304
1456
|
/**
|
|
@@ -1337,18 +1489,15 @@ export interface SecurityGroupRuleDescription {
|
|
|
1337
1489
|
*/
|
|
1338
1490
|
PrefixListId?: string;
|
|
1339
1491
|
/**
|
|
1340
|
-
* <p>The IP protocol name (<code>tcp</code>, <code>udp</code>, <code>icmp</code>,
|
|
1341
|
-
* <code>icmpv6</code>) or number.</p>
|
|
1492
|
+
* <p>The IP protocol name (<code>tcp</code>, <code>udp</code>, <code>icmp</code>, <code>icmpv6</code>) or number.</p>
|
|
1342
1493
|
*/
|
|
1343
1494
|
Protocol?: string;
|
|
1344
1495
|
/**
|
|
1345
|
-
* <p>The start of the port range for the TCP and UDP protocols, or an ICMP/ICMPv6 type
|
|
1346
|
-
* number. A value of <code>-1</code> indicates all ICMP/ICMPv6 types.</p>
|
|
1496
|
+
* <p>The start of the port range for the TCP and UDP protocols, or an ICMP/ICMPv6 type number. A value of <code>-1</code> indicates all ICMP/ICMPv6 types.</p>
|
|
1347
1497
|
*/
|
|
1348
1498
|
FromPort?: number;
|
|
1349
1499
|
/**
|
|
1350
|
-
* <p>The end of the port range for the TCP and UDP protocols, or an ICMP/ICMPv6 code. A value
|
|
1351
|
-
* of <code>-1</code> indicates all ICMP/ICMPv6 codes.</p>
|
|
1500
|
+
* <p>The end of the port range for the TCP and UDP protocols, or an ICMP/ICMPv6 code. A value of <code>-1</code> indicates all ICMP/ICMPv6 codes.</p>
|
|
1352
1501
|
*/
|
|
1353
1502
|
ToPort?: number;
|
|
1354
1503
|
}
|
|
@@ -1371,8 +1520,7 @@ export interface SecurityGroupRemediationAction {
|
|
|
1371
1520
|
*/
|
|
1372
1521
|
Description?: string;
|
|
1373
1522
|
/**
|
|
1374
|
-
* <p>The final state of the rule specified in the <code>ViolationTarget</code> after it is
|
|
1375
|
-
* remediated.</p>
|
|
1523
|
+
* <p>The final state of the rule specified in the <code>ViolationTarget</code> after it is remediated.</p>
|
|
1376
1524
|
*/
|
|
1377
1525
|
RemediationResult?: SecurityGroupRuleDescription;
|
|
1378
1526
|
/**
|
|
@@ -1387,8 +1535,7 @@ export declare namespace SecurityGroupRemediationAction {
|
|
|
1387
1535
|
const filterSensitiveLog: (obj: SecurityGroupRemediationAction) => any;
|
|
1388
1536
|
}
|
|
1389
1537
|
/**
|
|
1390
|
-
* <p>Violation detail for the rule violation in a security group when compared to the primary
|
|
1391
|
-
* security group of the Firewall Manager policy.</p>
|
|
1538
|
+
* <p>Violation detail for the rule violation in a security group when compared to the primary security group of the Firewall Manager policy.</p>
|
|
1392
1539
|
*/
|
|
1393
1540
|
export interface AwsVPCSecurityGroupViolation {
|
|
1394
1541
|
/**
|
|
@@ -1400,8 +1547,7 @@ export interface AwsVPCSecurityGroupViolation {
|
|
|
1400
1547
|
*/
|
|
1401
1548
|
ViolationTargetDescription?: string;
|
|
1402
1549
|
/**
|
|
1403
|
-
* <p>List of rules specified in the security group of the Firewall Manager policy that partially
|
|
1404
|
-
* match the <code>ViolationTarget</code> rule.</p>
|
|
1550
|
+
* <p>List of rules specified in the security group of the Firewall Manager policy that partially match the <code>ViolationTarget</code> rule.</p>
|
|
1405
1551
|
*/
|
|
1406
1552
|
PartialMatches?: PartialMatch[];
|
|
1407
1553
|
/**
|
|
@@ -1416,8 +1562,8 @@ export declare namespace AwsVPCSecurityGroupViolation {
|
|
|
1416
1562
|
const filterSensitiveLog: (obj: AwsVPCSecurityGroupViolation) => any;
|
|
1417
1563
|
}
|
|
1418
1564
|
/**
|
|
1419
|
-
* <p>A DNS Firewall rule group that Firewall Manager
|
|
1420
|
-
*
|
|
1565
|
+
* <p>A DNS Firewall rule group that Firewall Manager
|
|
1566
|
+
* tried to associate with a VPC is already associated with the VPC and can't be associated again. </p>
|
|
1421
1567
|
*/
|
|
1422
1568
|
export interface DnsDuplicateRuleGroupViolation {
|
|
1423
1569
|
/**
|
|
@@ -1436,9 +1582,7 @@ export declare namespace DnsDuplicateRuleGroupViolation {
|
|
|
1436
1582
|
const filterSensitiveLog: (obj: DnsDuplicateRuleGroupViolation) => any;
|
|
1437
1583
|
}
|
|
1438
1584
|
/**
|
|
1439
|
-
* <p>The VPC that Firewall Manager was applying a DNS Fireall policy to reached the limit for associated
|
|
1440
|
-
* DNS Firewall rule groups. Firewall Manager tried to associate another rule group with the VPC and
|
|
1441
|
-
* failed due to the limit. </p>
|
|
1585
|
+
* <p>The VPC that Firewall Manager was applying a DNS Fireall policy to reached the limit for associated DNS Firewall rule groups. Firewall Manager tried to associate another rule group with the VPC and failed due to the limit. </p>
|
|
1442
1586
|
*/
|
|
1443
1587
|
export interface DnsRuleGroupLimitExceededViolation {
|
|
1444
1588
|
/**
|
|
@@ -1450,7 +1594,7 @@ export interface DnsRuleGroupLimitExceededViolation {
|
|
|
1450
1594
|
*/
|
|
1451
1595
|
ViolationTargetDescription?: string;
|
|
1452
1596
|
/**
|
|
1453
|
-
* <p>The number of rule groups currently associated with the VPC.
|
|
1597
|
+
* <p>The number of rule groups currently associated with the VPC. </p>
|
|
1454
1598
|
*/
|
|
1455
1599
|
NumberOfRuleGroupsAlreadyAssociated?: number;
|
|
1456
1600
|
}
|
|
@@ -1461,8 +1605,8 @@ export declare namespace DnsRuleGroupLimitExceededViolation {
|
|
|
1461
1605
|
const filterSensitiveLog: (obj: DnsRuleGroupLimitExceededViolation) => any;
|
|
1462
1606
|
}
|
|
1463
1607
|
/**
|
|
1464
|
-
* <p>A rule group that Firewall Manager
|
|
1465
|
-
*
|
|
1608
|
+
* <p>A rule group that Firewall Manager
|
|
1609
|
+
* tried to associate with a VPC has the same priority as a rule group that's already associated. </p>
|
|
1466
1610
|
*/
|
|
1467
1611
|
export interface DnsRuleGroupPriorityConflictViolation {
|
|
1468
1612
|
/**
|
|
@@ -1470,8 +1614,7 @@ export interface DnsRuleGroupPriorityConflictViolation {
|
|
|
1470
1614
|
*/
|
|
1471
1615
|
ViolationTarget?: string;
|
|
1472
1616
|
/**
|
|
1473
|
-
* <p>A description of the violation that specifies the VPC and the rule group that's already
|
|
1474
|
-
* associated with it.</p>
|
|
1617
|
+
* <p>A description of the violation that specifies the VPC and the rule group that's already associated with it.</p>
|
|
1475
1618
|
*/
|
|
1476
1619
|
ViolationTargetDescription?: string;
|
|
1477
1620
|
/**
|
|
@@ -1479,14 +1622,13 @@ export interface DnsRuleGroupPriorityConflictViolation {
|
|
|
1479
1622
|
*/
|
|
1480
1623
|
ConflictingPriority?: number;
|
|
1481
1624
|
/**
|
|
1482
|
-
* <p>The ID of the Firewall Manager DNS Firewall policy that was already applied to the VPC.
|
|
1483
|
-
*
|
|
1625
|
+
* <p>The ID of the Firewall Manager DNS Firewall policy that was already applied to the VPC.
|
|
1626
|
+
* This policy contains the rule group that's already associated with the VPC. </p>
|
|
1484
1627
|
*/
|
|
1485
1628
|
ConflictingPolicyId?: string;
|
|
1486
1629
|
/**
|
|
1487
|
-
* <p>The priorities of rule groups that are already associated with the VPC. To retry your
|
|
1488
|
-
*
|
|
1489
|
-
* new DNS Firewall policy. </p>
|
|
1630
|
+
* <p>The priorities of rule groups that are already associated with the VPC. To retry your operation,
|
|
1631
|
+
* choose priority settings that aren't in this list for the rule groups in your new DNS Firewall policy. </p>
|
|
1490
1632
|
*/
|
|
1491
1633
|
UnavailablePriorities?: number[];
|
|
1492
1634
|
}
|
|
@@ -1527,6 +1669,33 @@ export declare namespace FirewallSubnetIsOutOfScopeViolation {
|
|
|
1527
1669
|
*/
|
|
1528
1670
|
const filterSensitiveLog: (obj: FirewallSubnetIsOutOfScopeViolation) => any;
|
|
1529
1671
|
}
|
|
1672
|
+
/**
|
|
1673
|
+
* <p>The violation details for a firewall subnet's VPC endpoint that's deleted or missing.</p>
|
|
1674
|
+
*/
|
|
1675
|
+
export interface FirewallSubnetMissingVPCEndpointViolation {
|
|
1676
|
+
/**
|
|
1677
|
+
* <p>The ID of the firewall that this VPC endpoint is associated with.</p>
|
|
1678
|
+
*/
|
|
1679
|
+
FirewallSubnetId?: string;
|
|
1680
|
+
/**
|
|
1681
|
+
* <p>The resource ID of the VPC associated with the deleted VPC subnet.</p>
|
|
1682
|
+
*/
|
|
1683
|
+
VpcId?: string;
|
|
1684
|
+
/**
|
|
1685
|
+
* <p>The name of the Availability Zone of the deleted VPC subnet.</p>
|
|
1686
|
+
*/
|
|
1687
|
+
SubnetAvailabilityZone?: string;
|
|
1688
|
+
/**
|
|
1689
|
+
* <p>The ID of the Availability Zone of the deleted VPC subnet.</p>
|
|
1690
|
+
*/
|
|
1691
|
+
SubnetAvailabilityZoneId?: string;
|
|
1692
|
+
}
|
|
1693
|
+
export declare namespace FirewallSubnetMissingVPCEndpointViolation {
|
|
1694
|
+
/**
|
|
1695
|
+
* @internal
|
|
1696
|
+
*/
|
|
1697
|
+
const filterSensitiveLog: (obj: FirewallSubnetMissingVPCEndpointViolation) => any;
|
|
1698
|
+
}
|
|
1530
1699
|
export declare enum DestinationType {
|
|
1531
1700
|
IPV4 = "IPV4",
|
|
1532
1701
|
IPV6 = "IPV6",
|
|
@@ -1572,8 +1741,7 @@ export declare namespace Route {
|
|
|
1572
1741
|
const filterSensitiveLog: (obj: Route) => any;
|
|
1573
1742
|
}
|
|
1574
1743
|
/**
|
|
1575
|
-
* <p>Violation detail for an internet gateway route with an inactive state in the customer
|
|
1576
|
-
* subnet route table or Network Firewall subnet route table.</p>
|
|
1744
|
+
* <p>Violation detail for an internet gateway route with an inactive state in the customer subnet route table or Network Firewall subnet route table.</p>
|
|
1577
1745
|
*/
|
|
1578
1746
|
export interface NetworkFirewallBlackHoleRouteDetectedViolation {
|
|
1579
1747
|
/**
|
|
@@ -1635,8 +1803,7 @@ export declare namespace ExpectedRoute {
|
|
|
1635
1803
|
const filterSensitiveLog: (obj: ExpectedRoute) => any;
|
|
1636
1804
|
}
|
|
1637
1805
|
/**
|
|
1638
|
-
* <p>Violation detail for the subnet for which internet traffic that hasn't been
|
|
1639
|
-
* inspected.</p>
|
|
1806
|
+
* <p>Violation detail for the subnet for which internet traffic that hasn't been inspected.</p>
|
|
1640
1807
|
*/
|
|
1641
1808
|
export interface NetworkFirewallInternetTrafficNotInspectedViolation {
|
|
1642
1809
|
/**
|
|
@@ -1707,9 +1874,8 @@ export declare namespace NetworkFirewallInternetTrafficNotInspectedViolation {
|
|
|
1707
1874
|
const filterSensitiveLog: (obj: NetworkFirewallInternetTrafficNotInspectedViolation) => any;
|
|
1708
1875
|
}
|
|
1709
1876
|
/**
|
|
1710
|
-
* <p>Violation detail for the improperly configured subnet route. It's possible there is a
|
|
1711
|
-
*
|
|
1712
|
-
* Zone boundary.</p>
|
|
1877
|
+
* <p>Violation detail for the improperly configured subnet route. It's possible there is a missing route table route,
|
|
1878
|
+
* or a configuration that causes traffic to cross an Availability Zone boundary.</p>
|
|
1713
1879
|
*/
|
|
1714
1880
|
export interface NetworkFirewallInvalidRouteConfigurationViolation {
|
|
1715
1881
|
/**
|
|
@@ -1807,8 +1973,8 @@ export declare namespace NetworkFirewallMissingExpectedRoutesViolation {
|
|
|
1807
1973
|
const filterSensitiveLog: (obj: NetworkFirewallMissingExpectedRoutesViolation) => any;
|
|
1808
1974
|
}
|
|
1809
1975
|
/**
|
|
1810
|
-
* <p>Violation detail for Network Firewall for a subnet that's not associated to the expected
|
|
1811
|
-
*
|
|
1976
|
+
* <p>Violation detail for Network Firewall for a subnet that's not associated to the expected
|
|
1977
|
+
* Firewall Manager managed route table.</p>
|
|
1812
1978
|
*/
|
|
1813
1979
|
export interface NetworkFirewallMissingExpectedRTViolation {
|
|
1814
1980
|
/**
|
|
@@ -1824,8 +1990,7 @@ export interface NetworkFirewallMissingExpectedRTViolation {
|
|
|
1824
1990
|
*/
|
|
1825
1991
|
AvailabilityZone?: string;
|
|
1826
1992
|
/**
|
|
1827
|
-
* <p>The resource ID of the current route table that's associated with the subnet, if one is
|
|
1828
|
-
* available.</p>
|
|
1993
|
+
* <p>The resource ID of the current route table that's associated with the subnet, if one is available.</p>
|
|
1829
1994
|
*/
|
|
1830
1995
|
CurrentRouteTable?: string;
|
|
1831
1996
|
/**
|
|
@@ -1840,8 +2005,8 @@ export declare namespace NetworkFirewallMissingExpectedRTViolation {
|
|
|
1840
2005
|
const filterSensitiveLog: (obj: NetworkFirewallMissingExpectedRTViolation) => any;
|
|
1841
2006
|
}
|
|
1842
2007
|
/**
|
|
1843
|
-
* <p>Violation detail for Network Firewall for a subnet that doesn't have a
|
|
1844
|
-
*
|
|
2008
|
+
* <p>Violation detail for Network Firewall for a subnet that doesn't have a
|
|
2009
|
+
* Firewall Manager managed firewall in its VPC. </p>
|
|
1845
2010
|
*/
|
|
1846
2011
|
export interface NetworkFirewallMissingFirewallViolation {
|
|
1847
2012
|
/**
|
|
@@ -1868,8 +2033,8 @@ export declare namespace NetworkFirewallMissingFirewallViolation {
|
|
|
1868
2033
|
const filterSensitiveLog: (obj: NetworkFirewallMissingFirewallViolation) => any;
|
|
1869
2034
|
}
|
|
1870
2035
|
/**
|
|
1871
|
-
* <p>Violation detail for Network Firewall for an Availability Zone that's
|
|
1872
|
-
*
|
|
2036
|
+
* <p>Violation detail for Network Firewall for an Availability Zone that's
|
|
2037
|
+
* missing the expected Firewall Manager managed subnet.</p>
|
|
1873
2038
|
*/
|
|
1874
2039
|
export interface NetworkFirewallMissingSubnetViolation {
|
|
1875
2040
|
/**
|
|
@@ -1927,8 +2092,7 @@ export interface StatelessRuleGroup {
|
|
|
1927
2092
|
*/
|
|
1928
2093
|
ResourceId?: string;
|
|
1929
2094
|
/**
|
|
1930
|
-
* <p>The priority of the rule group. Network Firewall evaluates the stateless rule groups in a
|
|
1931
|
-
* firewall policy starting from the lowest priority setting. </p>
|
|
2095
|
+
* <p>The priority of the rule group. Network Firewall evaluates the stateless rule groups in a firewall policy starting from the lowest priority setting. </p>
|
|
1932
2096
|
*/
|
|
1933
2097
|
Priority?: number;
|
|
1934
2098
|
}
|
|
@@ -1947,18 +2111,15 @@ export interface NetworkFirewallPolicyDescription {
|
|
|
1947
2111
|
*/
|
|
1948
2112
|
StatelessRuleGroups?: StatelessRuleGroup[];
|
|
1949
2113
|
/**
|
|
1950
|
-
* <p>The actions to take on packets that don't match any of the stateless rule groups.
|
|
1951
|
-
* </p>
|
|
2114
|
+
* <p>The actions to take on packets that don't match any of the stateless rule groups. </p>
|
|
1952
2115
|
*/
|
|
1953
2116
|
StatelessDefaultActions?: string[];
|
|
1954
2117
|
/**
|
|
1955
|
-
* <p>The actions to take on packet fragments that don't match any of the stateless rule
|
|
1956
|
-
* groups. </p>
|
|
2118
|
+
* <p>The actions to take on packet fragments that don't match any of the stateless rule groups. </p>
|
|
1957
2119
|
*/
|
|
1958
2120
|
StatelessFragmentDefaultActions?: string[];
|
|
1959
2121
|
/**
|
|
1960
|
-
* <p>Names of custom actions that are available for use in the stateless default actions
|
|
1961
|
-
* settings.</p>
|
|
2122
|
+
* <p>Names of custom actions that are available for use in the stateless default actions settings.</p>
|
|
1962
2123
|
*/
|
|
1963
2124
|
StatelessCustomActions?: string[];
|
|
1964
2125
|
/**
|
|
@@ -1973,8 +2134,8 @@ export declare namespace NetworkFirewallPolicyDescription {
|
|
|
1973
2134
|
const filterSensitiveLog: (obj: NetworkFirewallPolicyDescription) => any;
|
|
1974
2135
|
}
|
|
1975
2136
|
/**
|
|
1976
|
-
* <p>Violation detail for Network Firewall for a firewall policy that has a different
|
|
1977
|
-
*
|
|
2137
|
+
* <p>Violation detail for Network Firewall for a firewall policy that has a different
|
|
2138
|
+
* <a>NetworkFirewallPolicyDescription</a> than is required by the Firewall Manager policy. </p>
|
|
1978
2139
|
*/
|
|
1979
2140
|
export interface NetworkFirewallPolicyModifiedViolation {
|
|
1980
2141
|
/**
|
|
@@ -1986,8 +2147,7 @@ export interface NetworkFirewallPolicyModifiedViolation {
|
|
|
1986
2147
|
*/
|
|
1987
2148
|
CurrentPolicyDescription?: NetworkFirewallPolicyDescription;
|
|
1988
2149
|
/**
|
|
1989
|
-
* <p>The policy that should be in use in the individual account in order to be compliant.
|
|
1990
|
-
* </p>
|
|
2150
|
+
* <p>The policy that should be in use in the individual account in order to be compliant. </p>
|
|
1991
2151
|
*/
|
|
1992
2152
|
ExpectedPolicyDescription?: NetworkFirewallPolicyDescription;
|
|
1993
2153
|
}
|
|
@@ -2041,7 +2201,7 @@ export interface NetworkFirewallUnexpectedGatewayRoutesViolation {
|
|
|
2041
2201
|
*/
|
|
2042
2202
|
ViolatingRoutes?: Route[];
|
|
2043
2203
|
/**
|
|
2044
|
-
* <p>Information about the
|
|
2204
|
+
* <p>Information about the route table.</p>
|
|
2045
2205
|
*/
|
|
2046
2206
|
RouteTableId?: string;
|
|
2047
2207
|
/**
|
|
@@ -2056,13 +2216,11 @@ export declare namespace NetworkFirewallUnexpectedGatewayRoutesViolation {
|
|
|
2056
2216
|
const filterSensitiveLog: (obj: NetworkFirewallUnexpectedGatewayRoutesViolation) => any;
|
|
2057
2217
|
}
|
|
2058
2218
|
/**
|
|
2059
|
-
* <p>The action of associating an EC2 resource, such as a subnet or internet gateway, with a
|
|
2060
|
-
* route table.</p>
|
|
2219
|
+
* <p>The action of associating an EC2 resource, such as a subnet or internet gateway, with a route table.</p>
|
|
2061
2220
|
*/
|
|
2062
2221
|
export interface EC2AssociateRouteTableAction {
|
|
2063
2222
|
/**
|
|
2064
|
-
* <p>A description of the EC2 route table that is associated with the remediation
|
|
2065
|
-
* action.</p>
|
|
2223
|
+
* <p>A description of the EC2 route table that is associated with the remediation action.</p>
|
|
2066
2224
|
*/
|
|
2067
2225
|
Description?: string;
|
|
2068
2226
|
/**
|
|
@@ -2070,13 +2228,11 @@ export interface EC2AssociateRouteTableAction {
|
|
|
2070
2228
|
*/
|
|
2071
2229
|
RouteTableId: ActionTarget | undefined;
|
|
2072
2230
|
/**
|
|
2073
|
-
* <p>The ID of the subnet for the EC2 route table that is associated with the remediation
|
|
2074
|
-
* action.</p>
|
|
2231
|
+
* <p>The ID of the subnet for the EC2 route table that is associated with the remediation action.</p>
|
|
2075
2232
|
*/
|
|
2076
2233
|
SubnetId?: ActionTarget;
|
|
2077
2234
|
/**
|
|
2078
|
-
* <p>The ID of the gateway to be used with the EC2 route table that is associated with the
|
|
2079
|
-
* remediation action.</p>
|
|
2235
|
+
* <p>The ID of the gateway to be used with the EC2 route table that is associated with the remediation action.</p>
|
|
2080
2236
|
*/
|
|
2081
2237
|
GatewayId?: ActionTarget;
|
|
2082
2238
|
}
|
|
@@ -2091,18 +2247,15 @@ export declare namespace EC2AssociateRouteTableAction {
|
|
|
2091
2247
|
*/
|
|
2092
2248
|
export interface EC2CopyRouteTableAction {
|
|
2093
2249
|
/**
|
|
2094
|
-
* <p>A description of the copied EC2 route table that is associated with the remediation
|
|
2095
|
-
* action.</p>
|
|
2250
|
+
* <p>A description of the copied EC2 route table that is associated with the remediation action.</p>
|
|
2096
2251
|
*/
|
|
2097
2252
|
Description?: string;
|
|
2098
2253
|
/**
|
|
2099
|
-
* <p>The VPC ID of the copied EC2 route table that is associated with the remediation
|
|
2100
|
-
* action.</p>
|
|
2254
|
+
* <p>The VPC ID of the copied EC2 route table that is associated with the remediation action.</p>
|
|
2101
2255
|
*/
|
|
2102
2256
|
VpcId: ActionTarget | undefined;
|
|
2103
2257
|
/**
|
|
2104
|
-
* <p>The ID of the copied EC2 route table that is associated with the remediation
|
|
2105
|
-
* action.</p>
|
|
2258
|
+
* <p>The ID of the copied EC2 route table that is associated with the remediation action.</p>
|
|
2106
2259
|
*/
|
|
2107
2260
|
RouteTableId: ActionTarget | undefined;
|
|
2108
2261
|
}
|
|
@@ -2133,13 +2286,11 @@ export interface EC2CreateRouteAction {
|
|
|
2133
2286
|
*/
|
|
2134
2287
|
DestinationIpv6CidrBlock?: string;
|
|
2135
2288
|
/**
|
|
2136
|
-
* <p>Information about the ID of a VPC endpoint. Supported for Gateway Load Balancer
|
|
2137
|
-
* endpoints only.</p>
|
|
2289
|
+
* <p>Information about the ID of a VPC endpoint. Supported for Gateway Load Balancer endpoints only.</p>
|
|
2138
2290
|
*/
|
|
2139
2291
|
VpcEndpointId?: ActionTarget;
|
|
2140
2292
|
/**
|
|
2141
|
-
* <p>Information about the ID of an internet gateway or virtual private gateway attached to
|
|
2142
|
-
* your VPC.</p>
|
|
2293
|
+
* <p>Information about the ID of an internet gateway or virtual private gateway attached to your VPC.</p>
|
|
2143
2294
|
*/
|
|
2144
2295
|
GatewayId?: ActionTarget;
|
|
2145
2296
|
/**
|
|
@@ -2181,8 +2332,7 @@ export interface EC2DeleteRouteAction {
|
|
|
2181
2332
|
*/
|
|
2182
2333
|
Description?: string;
|
|
2183
2334
|
/**
|
|
2184
|
-
* <p>Information about the IPv4 CIDR range for the route. The value you specify must match
|
|
2185
|
-
* the CIDR for the route exactly.</p>
|
|
2335
|
+
* <p>Information about the IPv4 CIDR range for the route. The value you specify must match the CIDR for the route exactly.</p>
|
|
2186
2336
|
*/
|
|
2187
2337
|
DestinationCidrBlock?: string;
|
|
2188
2338
|
/**
|
|
@@ -2190,8 +2340,7 @@ export interface EC2DeleteRouteAction {
|
|
|
2190
2340
|
*/
|
|
2191
2341
|
DestinationPrefixListId?: string;
|
|
2192
2342
|
/**
|
|
2193
|
-
* <p>Information about the IPv6 CIDR range for the route. The value you specify must match
|
|
2194
|
-
* the CIDR for the route exactly.</p>
|
|
2343
|
+
* <p>Information about the IPv6 CIDR range for the route. The value you specify must match the CIDR for the route exactly.</p>
|
|
2195
2344
|
*/
|
|
2196
2345
|
DestinationIpv6CidrBlock?: string;
|
|
2197
2346
|
/**
|
|
@@ -2214,8 +2363,7 @@ export interface EC2ReplaceRouteAction {
|
|
|
2214
2363
|
*/
|
|
2215
2364
|
Description?: string;
|
|
2216
2365
|
/**
|
|
2217
|
-
* <p>Information about the IPv4 CIDR address block used for the destination match. The value
|
|
2218
|
-
* that you provide must match the CIDR of an existing route in the table.</p>
|
|
2366
|
+
* <p>Information about the IPv4 CIDR address block used for the destination match. The value that you provide must match the CIDR of an existing route in the table.</p>
|
|
2219
2367
|
*/
|
|
2220
2368
|
DestinationCidrBlock?: string;
|
|
2221
2369
|
/**
|
|
@@ -2223,8 +2371,7 @@ export interface EC2ReplaceRouteAction {
|
|
|
2223
2371
|
*/
|
|
2224
2372
|
DestinationPrefixListId?: string;
|
|
2225
2373
|
/**
|
|
2226
|
-
* <p>Information about the IPv6 CIDR address block used for the destination match. The value
|
|
2227
|
-
* that you provide must match the CIDR of an existing route in the table.</p>
|
|
2374
|
+
* <p>Information about the IPv6 CIDR address block used for the destination match. The value that you provide must match the CIDR of an existing route in the table.</p>
|
|
2228
2375
|
*/
|
|
2229
2376
|
DestinationIpv6CidrBlock?: string;
|
|
2230
2377
|
/**
|
|
@@ -2313,8 +2460,7 @@ export interface RemediationAction {
|
|
|
2313
2460
|
*/
|
|
2314
2461
|
EC2CopyRouteTableAction?: EC2CopyRouteTableAction;
|
|
2315
2462
|
/**
|
|
2316
|
-
* <p>Information about the ReplaceRouteTableAssociation action in the Amazon EC2
|
|
2317
|
-
* API.</p>
|
|
2463
|
+
* <p>Information about the ReplaceRouteTableAssociation action in the Amazon EC2 API.</p>
|
|
2318
2464
|
*/
|
|
2319
2465
|
EC2ReplaceRouteTableAssociationAction?: EC2ReplaceRouteTableAssociationAction;
|
|
2320
2466
|
/**
|
|
@@ -2379,8 +2525,7 @@ export declare namespace PossibleRemediationAction {
|
|
|
2379
2525
|
const filterSensitiveLog: (obj: PossibleRemediationAction) => any;
|
|
2380
2526
|
}
|
|
2381
2527
|
/**
|
|
2382
|
-
* <p>A list of possible remediation action lists. Each individual possible remediation action
|
|
2383
|
-
* is a list of individual remediation actions.</p>
|
|
2528
|
+
* <p>A list of possible remediation action lists. Each individual possible remediation action is a list of individual remediation actions.</p>
|
|
2384
2529
|
*/
|
|
2385
2530
|
export interface PossibleRemediationActions {
|
|
2386
2531
|
/**
|
|
@@ -2457,6 +2602,91 @@ export declare namespace RouteHasOutOfScopeEndpointViolation {
|
|
|
2457
2602
|
*/
|
|
2458
2603
|
const filterSensitiveLog: (obj: RouteHasOutOfScopeEndpointViolation) => any;
|
|
2459
2604
|
}
|
|
2605
|
+
/**
|
|
2606
|
+
* <p>The violation details for a third-party firewall that's not associated with an Firewall Manager managed route table.</p>
|
|
2607
|
+
*/
|
|
2608
|
+
export interface ThirdPartyFirewallMissingExpectedRouteTableViolation {
|
|
2609
|
+
/**
|
|
2610
|
+
* <p>The ID of the third-party firewall or VPC resource that's causing the violation.</p>
|
|
2611
|
+
*/
|
|
2612
|
+
ViolationTarget?: string;
|
|
2613
|
+
/**
|
|
2614
|
+
* <p>The resource ID of the VPC associated with a fireawll subnet that's causing the violation.</p>
|
|
2615
|
+
*/
|
|
2616
|
+
VPC?: string;
|
|
2617
|
+
/**
|
|
2618
|
+
* <p>The Availability Zone of the firewall subnet that's causing the violation.</p>
|
|
2619
|
+
*/
|
|
2620
|
+
AvailabilityZone?: string;
|
|
2621
|
+
/**
|
|
2622
|
+
* <p>The resource ID of the current route table that's associated with the subnet, if one is available.</p>
|
|
2623
|
+
*/
|
|
2624
|
+
CurrentRouteTable?: string;
|
|
2625
|
+
/**
|
|
2626
|
+
* <p>The resource ID of the route table that should be associated with the subnet.</p>
|
|
2627
|
+
*/
|
|
2628
|
+
ExpectedRouteTable?: string;
|
|
2629
|
+
}
|
|
2630
|
+
export declare namespace ThirdPartyFirewallMissingExpectedRouteTableViolation {
|
|
2631
|
+
/**
|
|
2632
|
+
* @internal
|
|
2633
|
+
*/
|
|
2634
|
+
const filterSensitiveLog: (obj: ThirdPartyFirewallMissingExpectedRouteTableViolation) => any;
|
|
2635
|
+
}
|
|
2636
|
+
/**
|
|
2637
|
+
* <p>The violation details about a third-party firewall's subnet that doesn't have a Firewall Manager managed firewall in its VPC.</p>
|
|
2638
|
+
*/
|
|
2639
|
+
export interface ThirdPartyFirewallMissingFirewallViolation {
|
|
2640
|
+
/**
|
|
2641
|
+
* <p>The ID of the third-party firewall that's causing the violation.</p>
|
|
2642
|
+
*/
|
|
2643
|
+
ViolationTarget?: string;
|
|
2644
|
+
/**
|
|
2645
|
+
* <p>The resource ID of the VPC associated with a third-party firewall.</p>
|
|
2646
|
+
*/
|
|
2647
|
+
VPC?: string;
|
|
2648
|
+
/**
|
|
2649
|
+
* <p>The Availability Zone of the third-party firewall that's causing the violation.</p>
|
|
2650
|
+
*/
|
|
2651
|
+
AvailabilityZone?: string;
|
|
2652
|
+
/**
|
|
2653
|
+
* <p>The reason the resource is causing this violation, if a reason is available.</p>
|
|
2654
|
+
*/
|
|
2655
|
+
TargetViolationReason?: string;
|
|
2656
|
+
}
|
|
2657
|
+
export declare namespace ThirdPartyFirewallMissingFirewallViolation {
|
|
2658
|
+
/**
|
|
2659
|
+
* @internal
|
|
2660
|
+
*/
|
|
2661
|
+
const filterSensitiveLog: (obj: ThirdPartyFirewallMissingFirewallViolation) => any;
|
|
2662
|
+
}
|
|
2663
|
+
/**
|
|
2664
|
+
* <p>The violation details for a third-party firewall for an Availability Zone that's missing the Firewall Manager managed subnet.</p>
|
|
2665
|
+
*/
|
|
2666
|
+
export interface ThirdPartyFirewallMissingSubnetViolation {
|
|
2667
|
+
/**
|
|
2668
|
+
* <p>The ID of the third-party firewall or VPC resource that's causing the violation.</p>
|
|
2669
|
+
*/
|
|
2670
|
+
ViolationTarget?: string;
|
|
2671
|
+
/**
|
|
2672
|
+
* <p>The resource ID of the VPC associated with a subnet that's causing the violation.</p>
|
|
2673
|
+
*/
|
|
2674
|
+
VPC?: string;
|
|
2675
|
+
/**
|
|
2676
|
+
* <p>The Availability Zone of a subnet that's causing the violation.</p>
|
|
2677
|
+
*/
|
|
2678
|
+
AvailabilityZone?: string;
|
|
2679
|
+
/**
|
|
2680
|
+
* <p>The reason the resource is causing the violation, if a reason is available.</p>
|
|
2681
|
+
*/
|
|
2682
|
+
TargetViolationReason?: string;
|
|
2683
|
+
}
|
|
2684
|
+
export declare namespace ThirdPartyFirewallMissingSubnetViolation {
|
|
2685
|
+
/**
|
|
2686
|
+
* @internal
|
|
2687
|
+
*/
|
|
2688
|
+
const filterSensitiveLog: (obj: ThirdPartyFirewallMissingSubnetViolation) => any;
|
|
2689
|
+
}
|
|
2460
2690
|
/**
|
|
2461
2691
|
* <p>Violation detail based on resource type.</p>
|
|
2462
2692
|
*/
|
|
@@ -2474,25 +2704,25 @@ export interface ResourceViolation {
|
|
|
2474
2704
|
*/
|
|
2475
2705
|
AwsEc2InstanceViolation?: AwsEc2InstanceViolation;
|
|
2476
2706
|
/**
|
|
2477
|
-
* <p>Violation detail for an Network Firewall policy that indicates that a subnet has no Firewall Manager
|
|
2478
|
-
*
|
|
2707
|
+
* <p>Violation detail for an Network Firewall policy that indicates that a subnet has no Firewall Manager
|
|
2708
|
+
* managed firewall in its VPC. </p>
|
|
2479
2709
|
*/
|
|
2480
2710
|
NetworkFirewallMissingFirewallViolation?: NetworkFirewallMissingFirewallViolation;
|
|
2481
2711
|
/**
|
|
2482
2712
|
* <p>Violation detail for an Network Firewall policy that indicates that an Availability Zone is
|
|
2483
|
-
*
|
|
2713
|
+
* missing the expected Firewall Manager managed subnet.</p>
|
|
2484
2714
|
*/
|
|
2485
2715
|
NetworkFirewallMissingSubnetViolation?: NetworkFirewallMissingSubnetViolation;
|
|
2486
2716
|
/**
|
|
2487
|
-
* <p>Violation detail for an Network Firewall policy that indicates that a subnet
|
|
2488
|
-
*
|
|
2717
|
+
* <p>Violation detail for an Network Firewall policy that indicates that a subnet
|
|
2718
|
+
* is not associated with the expected Firewall Manager managed route table. </p>
|
|
2489
2719
|
*/
|
|
2490
2720
|
NetworkFirewallMissingExpectedRTViolation?: NetworkFirewallMissingExpectedRTViolation;
|
|
2491
2721
|
/**
|
|
2492
|
-
* <p>Violation detail for an Network Firewall policy that indicates that a firewall policy
|
|
2493
|
-
*
|
|
2494
|
-
*
|
|
2495
|
-
*
|
|
2722
|
+
* <p>Violation detail for an Network Firewall policy that indicates that a firewall policy
|
|
2723
|
+
* in an individual account has been modified in a way that makes it noncompliant.
|
|
2724
|
+
* For example, the individual account owner might have deleted a rule group,
|
|
2725
|
+
* changed the priority of a stateless rule group, or changed a policy default action.</p>
|
|
2496
2726
|
*/
|
|
2497
2727
|
NetworkFirewallPolicyModifiedViolation?: NetworkFirewallPolicyModifiedViolation;
|
|
2498
2728
|
/**
|
|
@@ -2504,8 +2734,7 @@ export interface ResourceViolation {
|
|
|
2504
2734
|
*/
|
|
2505
2735
|
NetworkFirewallInvalidRouteConfigurationViolation?: NetworkFirewallInvalidRouteConfigurationViolation;
|
|
2506
2736
|
/**
|
|
2507
|
-
* <p>Violation detail for an internet gateway route with an inactive state in the customer
|
|
2508
|
-
* subnet route table or Network Firewall subnet route table.</p>
|
|
2737
|
+
* <p>Violation detail for an internet gateway route with an inactive state in the customer subnet route table or Network Firewall subnet route table.</p>
|
|
2509
2738
|
*/
|
|
2510
2739
|
NetworkFirewallBlackHoleRouteDetectedViolation?: NetworkFirewallBlackHoleRouteDetectedViolation;
|
|
2511
2740
|
/**
|
|
@@ -2522,25 +2751,20 @@ export interface ResourceViolation {
|
|
|
2522
2751
|
NetworkFirewallMissingExpectedRoutesViolation?: NetworkFirewallMissingExpectedRoutesViolation;
|
|
2523
2752
|
/**
|
|
2524
2753
|
* <p>Violation detail for a DNS Firewall policy that indicates that a rule group that Firewall Manager
|
|
2525
|
-
*
|
|
2526
|
-
* associated. </p>
|
|
2754
|
+
* tried to associate with a VPC has the same priority as a rule group that's already associated. </p>
|
|
2527
2755
|
*/
|
|
2528
2756
|
DnsRuleGroupPriorityConflictViolation?: DnsRuleGroupPriorityConflictViolation;
|
|
2529
2757
|
/**
|
|
2530
2758
|
* <p>Violation detail for a DNS Firewall policy that indicates that a rule group that Firewall Manager
|
|
2531
|
-
*
|
|
2532
|
-
* again. </p>
|
|
2759
|
+
* tried to associate with a VPC is already associated with the VPC and can't be associated again. </p>
|
|
2533
2760
|
*/
|
|
2534
2761
|
DnsDuplicateRuleGroupViolation?: DnsDuplicateRuleGroupViolation;
|
|
2535
2762
|
/**
|
|
2536
|
-
* <p>Violation detail for a DNS Firewall policy that indicates that the VPC reached the limit
|
|
2537
|
-
* for associated DNS Firewall rule groups. Firewall Manager tried to associate another rule group with
|
|
2538
|
-
* the VPC and failed. </p>
|
|
2763
|
+
* <p>Violation detail for a DNS Firewall policy that indicates that the VPC reached the limit for associated DNS Firewall rule groups. Firewall Manager tried to associate another rule group with the VPC and failed. </p>
|
|
2539
2764
|
*/
|
|
2540
2765
|
DnsRuleGroupLimitExceededViolation?: DnsRuleGroupLimitExceededViolation;
|
|
2541
2766
|
/**
|
|
2542
|
-
* <p>A list of possible remediation action lists. Each individual possible remediation action
|
|
2543
|
-
* is a list of individual remediation actions.</p>
|
|
2767
|
+
* <p>A list of possible remediation action lists. Each individual possible remediation action is a list of individual remediation actions.</p>
|
|
2544
2768
|
*/
|
|
2545
2769
|
PossibleRemediationActions?: PossibleRemediationActions;
|
|
2546
2770
|
/**
|
|
@@ -2551,6 +2775,22 @@ export interface ResourceViolation {
|
|
|
2551
2775
|
* <p>Contains details about the route endpoint that violates the policy scope.</p>
|
|
2552
2776
|
*/
|
|
2553
2777
|
RouteHasOutOfScopeEndpointViolation?: RouteHasOutOfScopeEndpointViolation;
|
|
2778
|
+
/**
|
|
2779
|
+
* <p>The violation details for a third-party firewall that's been deleted.</p>
|
|
2780
|
+
*/
|
|
2781
|
+
ThirdPartyFirewallMissingFirewallViolation?: ThirdPartyFirewallMissingFirewallViolation;
|
|
2782
|
+
/**
|
|
2783
|
+
* <p>The violation details for a third-party firewall's subnet that's been deleted.</p>
|
|
2784
|
+
*/
|
|
2785
|
+
ThirdPartyFirewallMissingSubnetViolation?: ThirdPartyFirewallMissingSubnetViolation;
|
|
2786
|
+
/**
|
|
2787
|
+
* <p>The violation details for a third-party firewall that has the Firewall Manager managed route table that was associated with the third-party firewall has been deleted.</p>
|
|
2788
|
+
*/
|
|
2789
|
+
ThirdPartyFirewallMissingExpectedRouteTableViolation?: ThirdPartyFirewallMissingExpectedRouteTableViolation;
|
|
2790
|
+
/**
|
|
2791
|
+
* <p>The violation details for a third-party firewall's VPC endpoint subnet that was deleted.</p>
|
|
2792
|
+
*/
|
|
2793
|
+
FirewallSubnetMissingVPCEndpointViolation?: FirewallSubnetMissingVPCEndpointViolation;
|
|
2554
2794
|
}
|
|
2555
2795
|
export declare namespace ResourceViolation {
|
|
2556
2796
|
/**
|
|
@@ -2559,8 +2799,7 @@ export declare namespace ResourceViolation {
|
|
|
2559
2799
|
const filterSensitiveLog: (obj: ResourceViolation) => any;
|
|
2560
2800
|
}
|
|
2561
2801
|
/**
|
|
2562
|
-
* <p>Violations for a resource based on the specified Firewall Manager policy and Amazon Web Services
|
|
2563
|
-
* account.</p>
|
|
2802
|
+
* <p>Violations for a resource based on the specified Firewall Manager policy and Amazon Web Services account.</p>
|
|
2564
2803
|
*/
|
|
2565
2804
|
export interface ViolationDetail {
|
|
2566
2805
|
/**
|
|
@@ -2585,8 +2824,6 @@ export interface ViolationDetail {
|
|
|
2585
2824
|
ResourceViolations: ResourceViolation[] | undefined;
|
|
2586
2825
|
/**
|
|
2587
2826
|
* <p>The <code>ResourceTag</code> objects associated with the resource.</p>
|
|
2588
|
-
* <p> This option isn't available for the centralized deployment model when creating policies
|
|
2589
|
-
* to configure Network Firewall. </p>
|
|
2590
2827
|
*/
|
|
2591
2828
|
ResourceTags?: Tag[];
|
|
2592
2829
|
/**
|
|
@@ -2618,16 +2855,15 @@ export interface ListAppsListsRequest {
|
|
|
2618
2855
|
*/
|
|
2619
2856
|
DefaultLists?: boolean;
|
|
2620
2857
|
/**
|
|
2621
|
-
* <p>If you specify a value for <code>MaxResults</code> in your list request, and you have
|
|
2622
|
-
*
|
|
2623
|
-
*
|
|
2624
|
-
* parameters, to retrieve the next batch of objects.</p>
|
|
2858
|
+
* <p>If you specify a value for <code>MaxResults</code> in your list request, and you have more objects than the maximum,
|
|
2859
|
+
* Firewall Manager returns this token in the response. For all but the first request, you provide the token returned by the prior request
|
|
2860
|
+
* in the request parameters, to retrieve the next batch of objects.</p>
|
|
2625
2861
|
*/
|
|
2626
2862
|
NextToken?: string;
|
|
2627
2863
|
/**
|
|
2628
|
-
* <p>The maximum number of objects that you want Firewall Manager to return for this request. If
|
|
2629
|
-
*
|
|
2630
|
-
*
|
|
2864
|
+
* <p>The maximum number of objects that you want Firewall Manager to return for this request. If more
|
|
2865
|
+
* objects are available, in the response, Firewall Manager provides a
|
|
2866
|
+
* <code>NextToken</code> value that you can use in a subsequent call to get the next batch of objects.</p>
|
|
2631
2867
|
* <p>If you don't specify this, Firewall Manager returns all available objects.</p>
|
|
2632
2868
|
*/
|
|
2633
2869
|
MaxResults: number | undefined;
|
|
@@ -2644,9 +2880,8 @@ export interface ListAppsListsResponse {
|
|
|
2644
2880
|
*/
|
|
2645
2881
|
AppsLists?: AppsListDataSummary[];
|
|
2646
2882
|
/**
|
|
2647
|
-
* <p>If you specify a value for <code>MaxResults</code> in your list request, and you have
|
|
2648
|
-
*
|
|
2649
|
-
* this token in subsequent requests to retrieve the next batch of objects.</p>
|
|
2883
|
+
* <p>If you specify a value for <code>MaxResults</code> in your list request, and you have more objects than the maximum,
|
|
2884
|
+
* Firewall Manager returns this token in the response. You can use this token in subsequent requests to retrieve the next batch of objects.</p>
|
|
2650
2885
|
*/
|
|
2651
2886
|
NextToken?: string;
|
|
2652
2887
|
}
|
|
@@ -2663,20 +2898,20 @@ export interface ListComplianceStatusRequest {
|
|
|
2663
2898
|
PolicyId: string | undefined;
|
|
2664
2899
|
/**
|
|
2665
2900
|
* <p>If you specify a value for <code>MaxResults</code> and you have more
|
|
2666
|
-
*
|
|
2667
|
-
*
|
|
2668
|
-
*
|
|
2669
|
-
*
|
|
2670
|
-
*
|
|
2671
|
-
*
|
|
2901
|
+
* <code>PolicyComplianceStatus</code> objects than the number that you specify for
|
|
2902
|
+
* <code>MaxResults</code>, Firewall Manager returns a <code>NextToken</code> value in the
|
|
2903
|
+
* response that allows you to list another group of <code>PolicyComplianceStatus</code> objects.
|
|
2904
|
+
* For the second and subsequent <code>ListComplianceStatus</code> requests, specify the value of
|
|
2905
|
+
* <code>NextToken</code> from the previous response to get information about another batch of
|
|
2906
|
+
* <code>PolicyComplianceStatus</code> objects.</p>
|
|
2672
2907
|
*/
|
|
2673
2908
|
NextToken?: string;
|
|
2674
2909
|
/**
|
|
2675
|
-
* <p>Specifies the number of <code>PolicyComplianceStatus</code> objects that you want
|
|
2676
|
-
*
|
|
2677
|
-
*
|
|
2678
|
-
*
|
|
2679
|
-
*
|
|
2910
|
+
* <p>Specifies the number of <code>PolicyComplianceStatus</code> objects that you want
|
|
2911
|
+
* Firewall Manager to return for this request. If you have more
|
|
2912
|
+
* <code>PolicyComplianceStatus</code> objects than the number that you specify for
|
|
2913
|
+
* <code>MaxResults</code>, the response includes a <code>NextToken</code> value that you can
|
|
2914
|
+
* use to get another batch of <code>PolicyComplianceStatus</code> objects.</p>
|
|
2680
2915
|
*/
|
|
2681
2916
|
MaxResults?: number;
|
|
2682
2917
|
}
|
|
@@ -2691,9 +2926,9 @@ export declare enum PolicyComplianceStatusType {
|
|
|
2691
2926
|
NonCompliant = "NON_COMPLIANT"
|
|
2692
2927
|
}
|
|
2693
2928
|
/**
|
|
2694
|
-
* <p>Describes the compliance status for the account. An account is considered noncompliant
|
|
2695
|
-
*
|
|
2696
|
-
*
|
|
2929
|
+
* <p>Describes the compliance status for the account. An account is considered noncompliant if
|
|
2930
|
+
* it includes resources that are not protected by the specified policy or that don't comply with
|
|
2931
|
+
* the policy.</p>
|
|
2697
2932
|
*/
|
|
2698
2933
|
export interface EvaluationResult {
|
|
2699
2934
|
/**
|
|
@@ -2701,15 +2936,15 @@ export interface EvaluationResult {
|
|
|
2701
2936
|
*/
|
|
2702
2937
|
ComplianceStatus?: PolicyComplianceStatusType | string;
|
|
2703
2938
|
/**
|
|
2704
|
-
* <p>The number of resources that are noncompliant with the specified policy. For WAF
|
|
2705
|
-
*
|
|
2706
|
-
*
|
|
2707
|
-
*
|
|
2708
|
-
* possible.</p>
|
|
2939
|
+
* <p>The number of resources that are noncompliant with the specified policy. For WAF and
|
|
2940
|
+
* Shield Advanced policies, a resource is considered noncompliant if it is not associated with
|
|
2941
|
+
* the policy. For security group policies, a resource is considered noncompliant if it doesn't
|
|
2942
|
+
* comply with the rules of the policy and remediation is disabled or not possible.</p>
|
|
2709
2943
|
*/
|
|
2710
2944
|
ViolatorCount?: number;
|
|
2711
2945
|
/**
|
|
2712
|
-
* <p>Indicates that over 100 resources are noncompliant with the Firewall Manager
|
|
2946
|
+
* <p>Indicates that over 100 resources are noncompliant with the Firewall Manager
|
|
2947
|
+
* policy.</p>
|
|
2713
2948
|
*/
|
|
2714
2949
|
EvaluationLimitExceeded?: boolean;
|
|
2715
2950
|
}
|
|
@@ -2721,9 +2956,9 @@ export declare namespace EvaluationResult {
|
|
|
2721
2956
|
}
|
|
2722
2957
|
/**
|
|
2723
2958
|
* <p>Indicates whether the account is compliant with the specified policy. An account is
|
|
2724
|
-
*
|
|
2725
|
-
*
|
|
2726
|
-
*
|
|
2959
|
+
* considered noncompliant if it includes resources that are not protected by the policy, for
|
|
2960
|
+
* WAF and Shield Advanced policies, or that are noncompliant with the policy, for security group
|
|
2961
|
+
* policies.</p>
|
|
2727
2962
|
*/
|
|
2728
2963
|
export interface PolicyComplianceStatus {
|
|
2729
2964
|
/**
|
|
@@ -2751,8 +2986,8 @@ export interface PolicyComplianceStatus {
|
|
|
2751
2986
|
*/
|
|
2752
2987
|
LastUpdated?: Date;
|
|
2753
2988
|
/**
|
|
2754
|
-
* <p>Details about problems with dependent services, such as WAF or Config,
|
|
2755
|
-
*
|
|
2989
|
+
* <p>Details about problems with dependent services, such as WAF or Config,
|
|
2990
|
+
* and the error message received that indicates the problem with the service.</p>
|
|
2756
2991
|
*/
|
|
2757
2992
|
IssueInfoMap?: {
|
|
2758
2993
|
[key: string]: string;
|
|
@@ -2771,11 +3006,11 @@ export interface ListComplianceStatusResponse {
|
|
|
2771
3006
|
PolicyComplianceStatusList?: PolicyComplianceStatus[];
|
|
2772
3007
|
/**
|
|
2773
3008
|
* <p>If you have more <code>PolicyComplianceStatus</code> objects than the number that you
|
|
2774
|
-
*
|
|
2775
|
-
*
|
|
2776
|
-
*
|
|
2777
|
-
*
|
|
2778
|
-
*
|
|
3009
|
+
* specified for <code>MaxResults</code> in the request, the response includes a
|
|
3010
|
+
* <code>NextToken</code> value. To list more <code>PolicyComplianceStatus</code> objects,
|
|
3011
|
+
* submit another <code>ListComplianceStatus</code> request, and specify the
|
|
3012
|
+
* <code>NextToken</code> value from the response in the <code>NextToken</code> value in the
|
|
3013
|
+
* next request.</p>
|
|
2779
3014
|
*/
|
|
2780
3015
|
NextToken?: string;
|
|
2781
3016
|
}
|
|
@@ -2787,19 +3022,19 @@ export declare namespace ListComplianceStatusResponse {
|
|
|
2787
3022
|
}
|
|
2788
3023
|
export interface ListMemberAccountsRequest {
|
|
2789
3024
|
/**
|
|
2790
|
-
* <p>If you specify a value for <code>MaxResults</code> and you have more account IDs than
|
|
2791
|
-
*
|
|
2792
|
-
*
|
|
2793
|
-
*
|
|
2794
|
-
*
|
|
2795
|
-
*
|
|
3025
|
+
* <p>If you specify a value for <code>MaxResults</code> and you have more account IDs than the
|
|
3026
|
+
* number that you specify for <code>MaxResults</code>, Firewall Manager returns a
|
|
3027
|
+
* <code>NextToken</code> value in the response that allows you to list another group of IDs.
|
|
3028
|
+
* For the second and subsequent <code>ListMemberAccountsRequest</code> requests, specify the
|
|
3029
|
+
* value of <code>NextToken</code> from the previous response to get information about another
|
|
3030
|
+
* batch of member account IDs.</p>
|
|
2796
3031
|
*/
|
|
2797
3032
|
NextToken?: string;
|
|
2798
3033
|
/**
|
|
2799
|
-
* <p>Specifies the number of member account IDs that you want Firewall Manager to return
|
|
2800
|
-
*
|
|
2801
|
-
*
|
|
2802
|
-
*
|
|
3034
|
+
* <p>Specifies the number of member account IDs that you want Firewall Manager to return
|
|
3035
|
+
* for this request. If you have more IDs than the number that you specify for
|
|
3036
|
+
* <code>MaxResults</code>, the response includes a <code>NextToken</code> value that you can
|
|
3037
|
+
* use to get another batch of member account IDs.</p>
|
|
2803
3038
|
*/
|
|
2804
3039
|
MaxResults?: number;
|
|
2805
3040
|
}
|
|
@@ -2816,10 +3051,10 @@ export interface ListMemberAccountsResponse {
|
|
|
2816
3051
|
MemberAccounts?: string[];
|
|
2817
3052
|
/**
|
|
2818
3053
|
* <p>If you have more member account IDs than the number that you specified for
|
|
2819
|
-
*
|
|
2820
|
-
*
|
|
2821
|
-
*
|
|
2822
|
-
*
|
|
3054
|
+
* <code>MaxResults</code> in the request, the response includes a <code>NextToken</code>
|
|
3055
|
+
* value. To list more IDs, submit another <code>ListMemberAccounts</code> request, and specify
|
|
3056
|
+
* the <code>NextToken</code> value from the response in the <code>NextToken</code> value in the
|
|
3057
|
+
* next request.</p>
|
|
2823
3058
|
*/
|
|
2824
3059
|
NextToken?: string;
|
|
2825
3060
|
}
|
|
@@ -2832,20 +3067,19 @@ export declare namespace ListMemberAccountsResponse {
|
|
|
2832
3067
|
export interface ListPoliciesRequest {
|
|
2833
3068
|
/**
|
|
2834
3069
|
* <p>If you specify a value for <code>MaxResults</code> and you have more
|
|
2835
|
-
*
|
|
2836
|
-
*
|
|
2837
|
-
*
|
|
2838
|
-
*
|
|
2839
|
-
*
|
|
2840
|
-
*
|
|
3070
|
+
* <code>PolicySummary</code> objects than the number that you specify for
|
|
3071
|
+
* <code>MaxResults</code>, Firewall Manager returns a <code>NextToken</code> value in the
|
|
3072
|
+
* response that allows you to list another group of <code>PolicySummary</code> objects. For the
|
|
3073
|
+
* second and subsequent <code>ListPolicies</code> requests, specify the value of
|
|
3074
|
+
* <code>NextToken</code> from the previous response to get information about another batch of
|
|
3075
|
+
* <code>PolicySummary</code> objects.</p>
|
|
2841
3076
|
*/
|
|
2842
3077
|
NextToken?: string;
|
|
2843
3078
|
/**
|
|
2844
|
-
* <p>Specifies the number of <code>PolicySummary</code> objects that you want Firewall Manager to
|
|
2845
|
-
*
|
|
2846
|
-
*
|
|
2847
|
-
*
|
|
2848
|
-
* <code>PolicySummary</code> objects.</p>
|
|
3079
|
+
* <p>Specifies the number of <code>PolicySummary</code> objects that you want Firewall Manager to return for this request. If you have more <code>PolicySummary</code> objects than
|
|
3080
|
+
* the number that you specify for <code>MaxResults</code>, the response includes a
|
|
3081
|
+
* <code>NextToken</code> value that you can use to get another batch of
|
|
3082
|
+
* <code>PolicySummary</code> objects.</p>
|
|
2849
3083
|
*/
|
|
2850
3084
|
MaxResults?: number;
|
|
2851
3085
|
}
|
|
@@ -2873,22 +3107,21 @@ export interface PolicySummary {
|
|
|
2873
3107
|
PolicyName?: string;
|
|
2874
3108
|
/**
|
|
2875
3109
|
* <p>The type of resource protected by or in scope of the policy. This is in the format shown
|
|
2876
|
-
*
|
|
2877
|
-
*
|
|
2878
|
-
*
|
|
2879
|
-
*
|
|
2880
|
-
*
|
|
2881
|
-
*
|
|
2882
|
-
*
|
|
2883
|
-
*
|
|
2884
|
-
*
|
|
2885
|
-
* the value is <code>AWS::EC2::VPC</code>.</p>
|
|
3110
|
+
* in the <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-template-resource-type-ref.html">Amazon Web Services Resource Types Reference</a>.
|
|
3111
|
+
* For WAF and Shield Advanced, examples include
|
|
3112
|
+
* <code>AWS::ElasticLoadBalancingV2::LoadBalancer</code> and
|
|
3113
|
+
* <code>AWS::CloudFront::Distribution</code>. For a security group common policy, valid values
|
|
3114
|
+
* are <code>AWS::EC2::NetworkInterface</code> and <code>AWS::EC2::Instance</code>. For a
|
|
3115
|
+
* security group content audit policy, valid values are <code>AWS::EC2::SecurityGroup</code>,
|
|
3116
|
+
* <code>AWS::EC2::NetworkInterface</code>, and <code>AWS::EC2::Instance</code>. For a security
|
|
3117
|
+
* group usage audit policy, the value is <code>AWS::EC2::SecurityGroup</code>. For an Network Firewall policy or DNS Firewall policy,
|
|
3118
|
+
* the value is <code>AWS::EC2::VPC</code>.</p>
|
|
2886
3119
|
*/
|
|
2887
3120
|
ResourceType?: string;
|
|
2888
3121
|
/**
|
|
2889
|
-
* <p>The service that the policy is using to protect the resources. This specifies the type
|
|
2890
|
-
*
|
|
2891
|
-
*
|
|
3122
|
+
* <p>The service that the policy is using to protect the resources. This specifies the type of
|
|
3123
|
+
* policy that is created, either an WAF policy, a Shield Advanced policy, or a security
|
|
3124
|
+
* group policy.</p>
|
|
2892
3125
|
*/
|
|
2893
3126
|
SecurityServiceType?: SecurityServiceType | string;
|
|
2894
3127
|
/**
|
|
@@ -2916,11 +3149,11 @@ export interface ListPoliciesResponse {
|
|
|
2916
3149
|
*/
|
|
2917
3150
|
PolicyList?: PolicySummary[];
|
|
2918
3151
|
/**
|
|
2919
|
-
* <p>If you have more <code>PolicySummary</code> objects than the number that you specified
|
|
2920
|
-
*
|
|
2921
|
-
*
|
|
2922
|
-
*
|
|
2923
|
-
*
|
|
3152
|
+
* <p>If you have more <code>PolicySummary</code> objects than the number that you specified for
|
|
3153
|
+
* <code>MaxResults</code> in the request, the response includes a <code>NextToken</code>
|
|
3154
|
+
* value. To list more <code>PolicySummary</code> objects, submit another
|
|
3155
|
+
* <code>ListPolicies</code> request, and specify the <code>NextToken</code> value from the
|
|
3156
|
+
* response in the <code>NextToken</code> value in the next request.</p>
|
|
2924
3157
|
*/
|
|
2925
3158
|
NextToken?: string;
|
|
2926
3159
|
}
|
|
@@ -2936,16 +3169,15 @@ export interface ListProtocolsListsRequest {
|
|
|
2936
3169
|
*/
|
|
2937
3170
|
DefaultLists?: boolean;
|
|
2938
3171
|
/**
|
|
2939
|
-
* <p>If you specify a value for <code>MaxResults</code> in your list request, and you have
|
|
2940
|
-
*
|
|
2941
|
-
*
|
|
2942
|
-
* parameters, to retrieve the next batch of objects.</p>
|
|
3172
|
+
* <p>If you specify a value for <code>MaxResults</code> in your list request, and you have more objects than the maximum,
|
|
3173
|
+
* Firewall Manager returns this token in the response. For all but the first request, you provide the token returned by the prior request
|
|
3174
|
+
* in the request parameters, to retrieve the next batch of objects.</p>
|
|
2943
3175
|
*/
|
|
2944
3176
|
NextToken?: string;
|
|
2945
3177
|
/**
|
|
2946
|
-
* <p>The maximum number of objects that you want Firewall Manager to return for this request. If
|
|
2947
|
-
*
|
|
2948
|
-
*
|
|
3178
|
+
* <p>The maximum number of objects that you want Firewall Manager to return for this request. If more
|
|
3179
|
+
* objects are available, in the response, Firewall Manager provides a
|
|
3180
|
+
* <code>NextToken</code> value that you can use in a subsequent call to get the next batch of objects.</p>
|
|
2949
3181
|
* <p>If you don't specify this, Firewall Manager returns all available objects.</p>
|
|
2950
3182
|
*/
|
|
2951
3183
|
MaxResults: number | undefined;
|
|
@@ -2989,9 +3221,8 @@ export interface ListProtocolsListsResponse {
|
|
|
2989
3221
|
*/
|
|
2990
3222
|
ProtocolsLists?: ProtocolsListDataSummary[];
|
|
2991
3223
|
/**
|
|
2992
|
-
* <p>If you specify a value for <code>MaxResults</code> in your list request, and you have
|
|
2993
|
-
*
|
|
2994
|
-
* this token in subsequent requests to retrieve the next batch of objects.</p>
|
|
3224
|
+
* <p>If you specify a value for <code>MaxResults</code> in your list request, and you have more objects than the maximum,
|
|
3225
|
+
* Firewall Manager returns this token in the response. You can use this token in subsequent requests to retrieve the next batch of objects.</p>
|
|
2995
3226
|
*/
|
|
2996
3227
|
NextToken?: string;
|
|
2997
3228
|
}
|
|
@@ -3003,9 +3234,7 @@ export declare namespace ListProtocolsListsResponse {
|
|
|
3003
3234
|
}
|
|
3004
3235
|
export interface ListTagsForResourceRequest {
|
|
3005
3236
|
/**
|
|
3006
|
-
* <p>The Amazon Resource Name (ARN) of the resource to return tags for. The Firewall Manager
|
|
3007
|
-
* resources that support tagging are policies, applications lists, and protocols lists.
|
|
3008
|
-
* </p>
|
|
3237
|
+
* <p>The Amazon Resource Name (ARN) of the resource to return tags for. The Firewall Manager resources that support tagging are policies, applications lists, and protocols lists. </p>
|
|
3009
3238
|
*/
|
|
3010
3239
|
ResourceArn: string | undefined;
|
|
3011
3240
|
}
|
|
@@ -3027,6 +3256,71 @@ export declare namespace ListTagsForResourceResponse {
|
|
|
3027
3256
|
*/
|
|
3028
3257
|
const filterSensitiveLog: (obj: ListTagsForResourceResponse) => any;
|
|
3029
3258
|
}
|
|
3259
|
+
export interface ListThirdPartyFirewallFirewallPoliciesRequest {
|
|
3260
|
+
/**
|
|
3261
|
+
* <p>The name of the third-party firewall vendor.</p>
|
|
3262
|
+
*/
|
|
3263
|
+
ThirdPartyFirewall: ThirdPartyFirewall | string | undefined;
|
|
3264
|
+
/**
|
|
3265
|
+
* <p>If the previous response included a <code>NextToken</code> element, the specified third-party firewall vendor is associated with more
|
|
3266
|
+
* third-party firewall policies. To get more third-party firewall policies, submit another <code>ListThirdPartyFirewallFirewallPoliciesRequest</code> request.</p>
|
|
3267
|
+
* <p>
|
|
3268
|
+
* For the value of <code>NextToken</code>, specify the value of <code>NextToken</code> from the previous response.
|
|
3269
|
+
* If the previous response didn't include a <code>NextToken</code> element, there are no more third-party firewall policies to
|
|
3270
|
+
* get.
|
|
3271
|
+
* </p>
|
|
3272
|
+
*/
|
|
3273
|
+
NextToken?: string;
|
|
3274
|
+
/**
|
|
3275
|
+
* <p>The maximum number of third-party firewall policies that you want Firewall Manager to return. If
|
|
3276
|
+
* the specified third-party firewall vendor is associated with more than <code>MaxResults</code> firewall policies, the response includes a
|
|
3277
|
+
* <code>NextToken</code> element. <code>NextToken</code> contains an encrypted token that identifies the first third-party firewall policies
|
|
3278
|
+
* that Firewall Manager will return if you submit another request.</p>
|
|
3279
|
+
*/
|
|
3280
|
+
MaxResults: number | undefined;
|
|
3281
|
+
}
|
|
3282
|
+
export declare namespace ListThirdPartyFirewallFirewallPoliciesRequest {
|
|
3283
|
+
/**
|
|
3284
|
+
* @internal
|
|
3285
|
+
*/
|
|
3286
|
+
const filterSensitiveLog: (obj: ListThirdPartyFirewallFirewallPoliciesRequest) => any;
|
|
3287
|
+
}
|
|
3288
|
+
/**
|
|
3289
|
+
* <p>Configures the firewall policy deployment model for a third-party firewall. The deployment model can either be distributed or centralized.</p>
|
|
3290
|
+
*/
|
|
3291
|
+
export interface ThirdPartyFirewallFirewallPolicy {
|
|
3292
|
+
/**
|
|
3293
|
+
* <p>The ID of the specified firewall policy.</p>
|
|
3294
|
+
*/
|
|
3295
|
+
FirewallPolicyId?: string;
|
|
3296
|
+
/**
|
|
3297
|
+
* <p>The name of the specified firewall policy.</p>
|
|
3298
|
+
*/
|
|
3299
|
+
FirewallPolicyName?: string;
|
|
3300
|
+
}
|
|
3301
|
+
export declare namespace ThirdPartyFirewallFirewallPolicy {
|
|
3302
|
+
/**
|
|
3303
|
+
* @internal
|
|
3304
|
+
*/
|
|
3305
|
+
const filterSensitiveLog: (obj: ThirdPartyFirewallFirewallPolicy) => any;
|
|
3306
|
+
}
|
|
3307
|
+
export interface ListThirdPartyFirewallFirewallPoliciesResponse {
|
|
3308
|
+
/**
|
|
3309
|
+
* <p>A list that contains one <code>ThirdPartyFirewallFirewallPolicies</code> element for each third-party firewall policies that the specified
|
|
3310
|
+
* third-party firewall vendor is associated with. Each <code>ThirdPartyFirewallFirewallPolicies</code> element contains the firewall policy name and ID.</p>
|
|
3311
|
+
*/
|
|
3312
|
+
ThirdPartyFirewallFirewallPolicies?: ThirdPartyFirewallFirewallPolicy[];
|
|
3313
|
+
/**
|
|
3314
|
+
* <p>The value that you will use for <code>NextToken</code> in the next <code>ListThirdPartyFirewallFirewallPolicies</code> request.</p>
|
|
3315
|
+
*/
|
|
3316
|
+
NextToken?: string;
|
|
3317
|
+
}
|
|
3318
|
+
export declare namespace ListThirdPartyFirewallFirewallPoliciesResponse {
|
|
3319
|
+
/**
|
|
3320
|
+
* @internal
|
|
3321
|
+
*/
|
|
3322
|
+
const filterSensitiveLog: (obj: ListThirdPartyFirewallFirewallPoliciesResponse) => any;
|
|
3323
|
+
}
|
|
3030
3324
|
export interface PutAppsListRequest {
|
|
3031
3325
|
/**
|
|
3032
3326
|
* <p>The details of the Firewall Manager applications list to be created.</p>
|
|
@@ -3062,12 +3356,12 @@ export declare namespace PutAppsListResponse {
|
|
|
3062
3356
|
export interface PutNotificationChannelRequest {
|
|
3063
3357
|
/**
|
|
3064
3358
|
* <p>The Amazon Resource Name (ARN) of the SNS topic that collects notifications from
|
|
3065
|
-
*
|
|
3359
|
+
* Firewall Manager.</p>
|
|
3066
3360
|
*/
|
|
3067
3361
|
SnsTopicArn: string | undefined;
|
|
3068
3362
|
/**
|
|
3069
3363
|
* <p>The Amazon Resource Name (ARN) of the IAM role that allows Amazon SNS to record
|
|
3070
|
-
*
|
|
3364
|
+
* Firewall Manager activity. </p>
|
|
3071
3365
|
*/
|
|
3072
3366
|
SnsRoleName: string | undefined;
|
|
3073
3367
|
}
|
|
@@ -3143,9 +3437,7 @@ export declare namespace PutProtocolsListResponse {
|
|
|
3143
3437
|
}
|
|
3144
3438
|
export interface TagResourceRequest {
|
|
3145
3439
|
/**
|
|
3146
|
-
* <p>The Amazon Resource Name (ARN) of the resource to return tags for. The Firewall Manager
|
|
3147
|
-
* resources that support tagging are policies, applications lists, and protocols lists.
|
|
3148
|
-
* </p>
|
|
3440
|
+
* <p>The Amazon Resource Name (ARN) of the resource to return tags for. The Firewall Manager resources that support tagging are policies, applications lists, and protocols lists. </p>
|
|
3149
3441
|
*/
|
|
3150
3442
|
ResourceArn: string | undefined;
|
|
3151
3443
|
/**
|
|
@@ -3169,9 +3461,7 @@ export declare namespace TagResourceResponse {
|
|
|
3169
3461
|
}
|
|
3170
3462
|
export interface UntagResourceRequest {
|
|
3171
3463
|
/**
|
|
3172
|
-
* <p>The Amazon Resource Name (ARN) of the resource to return tags for. The Firewall Manager
|
|
3173
|
-
* resources that support tagging are policies, applications lists, and protocols lists.
|
|
3174
|
-
* </p>
|
|
3464
|
+
* <p>The Amazon Resource Name (ARN) of the resource to return tags for. The Firewall Manager resources that support tagging are policies, applications lists, and protocols lists. </p>
|
|
3175
3465
|
*/
|
|
3176
3466
|
ResourceArn: string | undefined;
|
|
3177
3467
|
/**
|