@aws-sdk/client-securityhub 3.370.0 → 3.377.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/models/models_0.js +4 -0
- package/dist-cjs/protocols/Aws_restJson1.js +2 -0
- package/dist-es/models/models_0.js +4 -0
- package/dist-es/protocols/Aws_restJson1.js +2 -0
- package/dist-types/commands/BatchGetAutomationRulesCommand.d.ts +8 -8
- package/dist-types/commands/BatchImportFindingsCommand.d.ts +19 -0
- package/dist-types/commands/BatchUpdateAutomationRulesCommand.d.ts +8 -8
- package/dist-types/commands/CreateAutomationRuleCommand.d.ts +8 -8
- package/dist-types/commands/CreateInsightCommand.d.ts +9 -9
- package/dist-types/commands/GetFindingsCommand.d.ts +28 -9
- package/dist-types/commands/GetInsightsCommand.d.ts +9 -9
- package/dist-types/commands/UpdateFindingsCommand.d.ts +9 -9
- package/dist-types/commands/UpdateInsightCommand.d.ts +9 -9
- package/dist-types/models/models_0.d.ts +199 -183
- package/dist-types/models/models_1.d.ts +147 -779
- package/dist-types/models/models_2.d.ts +785 -10
- package/dist-types/ts3.4/models/models_0.d.ts +20 -19
- package/dist-types/ts3.4/models/models_1.d.ts +28 -159
- package/dist-types/ts3.4/models/models_2.d.ts +172 -2
- package/package.json +2 -2
|
@@ -37,31 +37,31 @@ export interface UpdateInsightCommandOutput extends UpdateInsightResponse, __Met
|
|
|
37
37
|
* ProductArn: [ // StringFilterList
|
|
38
38
|
* { // StringFilter
|
|
39
39
|
* Value: "STRING_VALUE",
|
|
40
|
-
* Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS",
|
|
40
|
+
* Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
|
|
41
41
|
* },
|
|
42
42
|
* ],
|
|
43
43
|
* AwsAccountId: [
|
|
44
44
|
* {
|
|
45
45
|
* Value: "STRING_VALUE",
|
|
46
|
-
* Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS",
|
|
46
|
+
* Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
|
|
47
47
|
* },
|
|
48
48
|
* ],
|
|
49
49
|
* Id: [
|
|
50
50
|
* {
|
|
51
51
|
* Value: "STRING_VALUE",
|
|
52
|
-
* Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS",
|
|
52
|
+
* Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
|
|
53
53
|
* },
|
|
54
54
|
* ],
|
|
55
55
|
* GeneratorId: [
|
|
56
56
|
* {
|
|
57
57
|
* Value: "STRING_VALUE",
|
|
58
|
-
* Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS",
|
|
58
|
+
* Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
|
|
59
59
|
* },
|
|
60
60
|
* ],
|
|
61
61
|
* Region: [
|
|
62
62
|
* {
|
|
63
63
|
* Value: "STRING_VALUE",
|
|
64
|
-
* Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS",
|
|
64
|
+
* Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
|
|
65
65
|
* },
|
|
66
66
|
* ],
|
|
67
67
|
* Type: "<StringFilterList>",
|
|
@@ -142,7 +142,7 @@ export interface UpdateInsightCommandOutput extends UpdateInsightResponse, __Met
|
|
|
142
142
|
* { // MapFilter
|
|
143
143
|
* Key: "STRING_VALUE",
|
|
144
144
|
* Value: "STRING_VALUE",
|
|
145
|
-
* Comparison: "EQUALS" || "NOT_EQUALS",
|
|
145
|
+
* Comparison: "EQUALS" || "NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
|
|
146
146
|
* },
|
|
147
147
|
* ],
|
|
148
148
|
* ProductName: "<StringFilterList>",
|
|
@@ -151,7 +151,7 @@ export interface UpdateInsightCommandOutput extends UpdateInsightResponse, __Met
|
|
|
151
151
|
* {
|
|
152
152
|
* Key: "STRING_VALUE",
|
|
153
153
|
* Value: "STRING_VALUE",
|
|
154
|
-
* Comparison: "EQUALS" || "NOT_EQUALS",
|
|
154
|
+
* Comparison: "EQUALS" || "NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
|
|
155
155
|
* },
|
|
156
156
|
* ],
|
|
157
157
|
* MalwareName: "<StringFilterList>",
|
|
@@ -220,7 +220,7 @@ export interface UpdateInsightCommandOutput extends UpdateInsightResponse, __Met
|
|
|
220
220
|
* {
|
|
221
221
|
* Key: "STRING_VALUE",
|
|
222
222
|
* Value: "STRING_VALUE",
|
|
223
|
-
* Comparison: "EQUALS" || "NOT_EQUALS",
|
|
223
|
+
* Comparison: "EQUALS" || "NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
|
|
224
224
|
* },
|
|
225
225
|
* ],
|
|
226
226
|
* ResourceAwsEc2InstanceType: "<StringFilterList>",
|
|
@@ -251,7 +251,7 @@ export interface UpdateInsightCommandOutput extends UpdateInsightResponse, __Met
|
|
|
251
251
|
* {
|
|
252
252
|
* Key: "STRING_VALUE",
|
|
253
253
|
* Value: "STRING_VALUE",
|
|
254
|
-
* Comparison: "EQUALS" || "NOT_EQUALS",
|
|
254
|
+
* Comparison: "EQUALS" || "NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
|
|
255
255
|
* },
|
|
256
256
|
* ],
|
|
257
257
|
* ComplianceStatus: "<StringFilterList>",
|
|
@@ -917,7 +917,9 @@ export type AutoEnableStandards = (typeof AutoEnableStandards)[keyof typeof Auto
|
|
|
917
917
|
* @enum
|
|
918
918
|
*/
|
|
919
919
|
export declare const StringFilterComparison: {
|
|
920
|
+
readonly CONTAINS: "CONTAINS";
|
|
920
921
|
readonly EQUALS: "EQUALS";
|
|
922
|
+
readonly NOT_CONTAINS: "NOT_CONTAINS";
|
|
921
923
|
readonly NOT_EQUALS: "NOT_EQUALS";
|
|
922
924
|
readonly PREFIX: "PREFIX";
|
|
923
925
|
readonly PREFIX_NOT_EQUALS: "PREFIX_NOT_EQUALS";
|
|
@@ -928,73 +930,74 @@ export declare const StringFilterComparison: {
|
|
|
928
930
|
export type StringFilterComparison = (typeof StringFilterComparison)[keyof typeof StringFilterComparison];
|
|
929
931
|
/**
|
|
930
932
|
* @public
|
|
931
|
-
* <p>A string filter for
|
|
933
|
+
* <p>A string filter for filtering Security Hub findings.</p>
|
|
932
934
|
*/
|
|
933
935
|
export interface StringFilter {
|
|
934
936
|
/**
|
|
935
937
|
* <p>The string filter value. Filter values are case sensitive. For example, the product name
|
|
936
938
|
* for control-based findings is <code>Security Hub</code>. If you provide <code>security hub</code>
|
|
937
|
-
* as the filter
|
|
939
|
+
* as the filter value, there's no match.</p>
|
|
938
940
|
*/
|
|
939
941
|
Value?: string;
|
|
940
942
|
/**
|
|
941
|
-
* <p>The condition to apply to a string value when
|
|
942
|
-
* values that
|
|
943
|
-
* operators:</p>
|
|
943
|
+
* <p>The condition to apply to a string value when filtering Security Hub findings.</p>
|
|
944
|
+
* <p>To search for values that have the filter value, use one of the following comparison operators:</p>
|
|
944
945
|
* <ul>
|
|
945
946
|
* <li>
|
|
946
|
-
* <p>To search for values that
|
|
947
|
-
* <code>
|
|
948
|
-
*
|
|
949
|
-
* matches findings that have a resource type of
|
|
950
|
-
* <code>AwsEc2SecurityGroup</code>.</p>
|
|
947
|
+
* <p>To search for values that include the filter value, use <code>CONTAINS</code>. For example, the
|
|
948
|
+
* filter <code>Title CONTAINS CloudFront</code> matches findings that have a <code>Title</code> that
|
|
949
|
+
* includes the string CloudFront.</p>
|
|
951
950
|
* </li>
|
|
952
951
|
* <li>
|
|
953
|
-
* <p>To search for values that
|
|
954
|
-
* <code>
|
|
955
|
-
* <
|
|
956
|
-
*
|
|
957
|
-
*
|
|
958
|
-
*
|
|
952
|
+
* <p>To search for values that exactly match the filter value, use <code>EQUALS</code>. For example,
|
|
953
|
+
* the filter <code>AwsAccountId EQUALS 123456789012</code> only matches findings that have an account ID of
|
|
954
|
+
* <code>123456789012</code>.</p>
|
|
955
|
+
* </li>
|
|
956
|
+
* <li>
|
|
957
|
+
* <p>To search for values that start with the filter value, use <code>PREFIX</code>. For example, the
|
|
958
|
+
* filter <code>ResourceRegion PREFIX us</code> matches findings that have a <code>ResourceRegion</code> that starts
|
|
959
|
+
* with <code>us</code>. A <code>ResourceRegion</code> that starts with a different value, such as <code>af</code>,
|
|
960
|
+
* <code>ap</code>, or <code>ca</code>, doesn't match.</p>
|
|
959
961
|
* </li>
|
|
960
962
|
* </ul>
|
|
961
963
|
* <p>
|
|
962
|
-
* <code>EQUALS</code
|
|
963
|
-
*
|
|
964
|
-
*
|
|
965
|
-
*
|
|
964
|
+
* <code>CONTAINS</code>, <code>EQUALS</code>, and <code>PREFIX</code> filters on the same field are joined by
|
|
965
|
+
* <code>OR</code>. A finding matches if it matches any one of those filters. For example, the filters <code>Title CONTAINS CloudFront OR
|
|
966
|
+
* Title CONTAINS CloudWatch</code> match a finding that includes either <code>CloudFront</code>,
|
|
967
|
+
* <code>CloudWatch</code>, or both strings in the title.</p>
|
|
968
|
+
* <p>To search for values that don’t have the filter value, use one of the following comparison operators:</p>
|
|
966
969
|
* <ul>
|
|
967
970
|
* <li>
|
|
968
|
-
* <p>To search for values that
|
|
969
|
-
*
|
|
970
|
-
*
|
|
971
|
-
* findings that have a resource type other than <code>AwsIamPolicy</code>.</p>
|
|
971
|
+
* <p>To search for values that exclude the filter value, use <code>NOT_CONTAINS</code>. For example, the
|
|
972
|
+
* filter <code>Title NOT_CONTAINS CloudFront</code> matches findings that have a <code>Title</code> that
|
|
973
|
+
* excludes the string CloudFront.</p>
|
|
972
974
|
* </li>
|
|
973
975
|
* <li>
|
|
974
|
-
* <p>To search for values
|
|
975
|
-
*
|
|
976
|
-
*
|
|
977
|
-
*
|
|
978
|
-
*
|
|
979
|
-
*
|
|
976
|
+
* <p>To search for values other than the filter value, use <code>NOT_EQUALS</code>. For
|
|
977
|
+
* example, the filter <code>AwsAccountId NOT_EQUALS 123456789012</code> only matches findings that have an account
|
|
978
|
+
* ID other than <code>123456789012</code>.</p>
|
|
979
|
+
* </li>
|
|
980
|
+
* <li>
|
|
981
|
+
* <p>To search for values that don't start with the filter value, use <code>PREFIX_NOT_EQUALS</code>. For
|
|
982
|
+
* example, the filter <code>ResourceRegion PREFIX_NOT_EQUALS us</code> matches findings with a
|
|
983
|
+
* <code>ResourceRegion</code> that starts with a value other than <code>us</code>.</p>
|
|
980
984
|
* </li>
|
|
981
985
|
* </ul>
|
|
982
986
|
* <p>
|
|
983
|
-
* <code>NOT_EQUALS</code
|
|
984
|
-
*
|
|
985
|
-
*
|
|
986
|
-
*
|
|
987
|
-
* a <code>
|
|
988
|
-
*
|
|
989
|
-
*
|
|
990
|
-
*
|
|
991
|
-
*
|
|
992
|
-
*
|
|
993
|
-
*
|
|
994
|
-
* <p>
|
|
995
|
-
*
|
|
996
|
-
*
|
|
997
|
-
* have a resource type of <code>AwsEc2NetworkInterface</code>.</p>
|
|
987
|
+
* <code>NOT_CONTAINS</code>, <code>NOT_EQUALS</code>, and <code>PREFIX_NOT_EQUALS</code> filters on the same field
|
|
988
|
+
* are joined by <code>AND</code>. A finding matches only if it matches all of those filters. For example, the filters <code>Title NOT_CONTAINS CloudFront AND
|
|
989
|
+
* Title NOT_CONTAINS CloudWatch</code> match a finding that excludes both <code>CloudFront</code> and
|
|
990
|
+
* <code>CloudWatch</code> in the title.</p>
|
|
991
|
+
* <p>You can’t have both a <code>CONTAINS</code> filter and a <code>NOT_CONTAINS</code> filter on the same field. Similarly,
|
|
992
|
+
* you can't provide both an <code>EQUALS</code> filter and a <code>NOT_EQUALS</code> or
|
|
993
|
+
* <code>PREFIX_NOT_EQUALS</code> filter on the same field. Combining filters in this way returns an error. <code>CONTAINS</code> filters
|
|
994
|
+
* can only be used with other <code>CONTAINS</code> filters. <code>NOT_CONTAINS</code> filters can only be used with
|
|
995
|
+
* other <code>NOT_CONTAINS</code> filters. </p>
|
|
996
|
+
* <p>You can combine <code>PREFIX</code> filters with <code>NOT_EQUALS</code> or <code>PREFIX_NOT_EQUALS</code> filters for the same field.
|
|
997
|
+
* Security Hub first processes the <code>PREFIX</code> filters, and then the <code>NOT_EQUALS</code> or <code>PREFIX_NOT_EQUALS</code> filters.</p>
|
|
998
|
+
* <p>For example, for the following filters, Security Hub first identifies findings that have resource types
|
|
999
|
+
* that start with either <code>AwsIam</code> or <code>AwsEc2</code>. It then excludes findings that have a resource
|
|
1000
|
+
* type of <code>AwsIamPolicy</code> and findings that have a resource type of <code>AwsEc2NetworkInterface</code>.</p>
|
|
998
1001
|
* <ul>
|
|
999
1002
|
* <li>
|
|
1000
1003
|
* <p>
|
|
@@ -1017,6 +1020,9 @@ export interface StringFilter {
|
|
|
1017
1020
|
* </p>
|
|
1018
1021
|
* </li>
|
|
1019
1022
|
* </ul>
|
|
1023
|
+
* <p>
|
|
1024
|
+
* <code>CONTAINS</code> and <code>NOT_CONTAINS</code> operators can be used only with automation rules. For more information,
|
|
1025
|
+
* see <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/automation-rules.html">Automation rules</a> in the <i>Security Hub User Guide</i>.</p>
|
|
1020
1026
|
*/
|
|
1021
1027
|
Comparison?: StringFilterComparison | string;
|
|
1022
1028
|
}
|
|
@@ -1093,7 +1099,9 @@ export interface DateFilter {
|
|
|
1093
1099
|
* @enum
|
|
1094
1100
|
*/
|
|
1095
1101
|
export declare const MapFilterComparison: {
|
|
1102
|
+
readonly CONTAINS: "CONTAINS";
|
|
1096
1103
|
readonly EQUALS: "EQUALS";
|
|
1104
|
+
readonly NOT_CONTAINS: "NOT_CONTAINS";
|
|
1097
1105
|
readonly NOT_EQUALS: "NOT_EQUALS";
|
|
1098
1106
|
};
|
|
1099
1107
|
/**
|
|
@@ -1102,8 +1110,8 @@ export declare const MapFilterComparison: {
|
|
|
1102
1110
|
export type MapFilterComparison = (typeof MapFilterComparison)[keyof typeof MapFilterComparison];
|
|
1103
1111
|
/**
|
|
1104
1112
|
* @public
|
|
1105
|
-
* <p>A map filter for
|
|
1106
|
-
* value to
|
|
1113
|
+
* <p>A map filter for filtering Security Hub findings. Each map filter provides the field to check for, the
|
|
1114
|
+
* value to check for, and the comparison operator.</p>
|
|
1107
1115
|
*/
|
|
1108
1116
|
export interface MapFilter {
|
|
1109
1117
|
/**
|
|
@@ -1115,28 +1123,59 @@ export interface MapFilter {
|
|
|
1115
1123
|
/**
|
|
1116
1124
|
* <p>The value for the key in the map filter. Filter values are case sensitive. For example,
|
|
1117
1125
|
* one of the values for a tag called <code>Department</code> might be <code>Security</code>.
|
|
1118
|
-
* If you provide <code>security</code> as the filter value, then there
|
|
1126
|
+
* If you provide <code>security</code> as the filter value, then there's no match.</p>
|
|
1119
1127
|
*/
|
|
1120
1128
|
Value?: string;
|
|
1121
1129
|
/**
|
|
1122
|
-
* <p>The condition to apply to the key value when
|
|
1130
|
+
* <p>The condition to apply to the key value when filtering Security Hub findings with a map
|
|
1123
1131
|
* filter.</p>
|
|
1124
|
-
* <p>To search for values that
|
|
1125
|
-
*
|
|
1126
|
-
*
|
|
1127
|
-
*
|
|
1128
|
-
*
|
|
1129
|
-
*
|
|
1130
|
-
*
|
|
1131
|
-
*
|
|
1132
|
+
* <p>To search for values that have the filter value, use one of the following comparison operators:</p>
|
|
1133
|
+
* <ul>
|
|
1134
|
+
* <li>
|
|
1135
|
+
* <p>To search for values that include the filter value, use <code>CONTAINS</code>. For example, for the
|
|
1136
|
+
* <code>ResourceTags</code> field, the filter <code>Department CONTAINS Security</code> matches findings that
|
|
1137
|
+
* include the value <code>Security</code> for the <code>Department</code> tag. In the same example, a finding with a value of
|
|
1138
|
+
* <code>Security team</code> for the <code>Department</code> tag is a match.</p>
|
|
1139
|
+
* </li>
|
|
1140
|
+
* <li>
|
|
1141
|
+
* <p>To search for values that exactly match the filter value, use <code>EQUALS</code>. For example, for
|
|
1142
|
+
* the <code>ResourceTags</code> field, the filter <code>Department EQUALS Security</code> matches findings that
|
|
1143
|
+
* have the value <code>Security</code> for the <code>Department</code> tag.</p>
|
|
1144
|
+
* </li>
|
|
1145
|
+
* </ul>
|
|
1146
|
+
* <p>
|
|
1147
|
+
* <code>CONTAINS</code> and <code>EQUALS</code> filters on the same field are joined by <code>OR</code>. A
|
|
1148
|
+
* finding matches if it matches any one of those filters. For example, the filters <code>Department CONTAINS Security OR
|
|
1149
|
+
* Department CONTAINS Finance</code> match a finding that includes either <code>Security</code>,
|
|
1150
|
+
* <code>Finance</code>, or both values.</p>
|
|
1151
|
+
* <p>To search for values that don't have the filter value, use one of the following comparison operators:</p>
|
|
1152
|
+
* <ul>
|
|
1153
|
+
* <li>
|
|
1154
|
+
* <p>To search for values that exclude the filter value, use <code>NOT_CONTAINS</code>. For example, for
|
|
1155
|
+
* the <code>ResourceTags</code> field, the filter <code>Department NOT_CONTAINS Finance</code> matches findings
|
|
1156
|
+
* that exclude the value <code>Finance</code> for the <code>Department</code> tag.</p>
|
|
1157
|
+
* </li>
|
|
1158
|
+
* <li>
|
|
1159
|
+
* <p>To search for values other than the filter value, use <code>NOT_EQUALS</code>. For example, for the
|
|
1160
|
+
* <code>ResourceTags</code> field, the filter <code>Department NOT_EQUALS Finance</code> matches findings that
|
|
1161
|
+
* don’t have the value <code>Finance</code> for the <code>Department</code> tag.</p>
|
|
1162
|
+
* </li>
|
|
1163
|
+
* </ul>
|
|
1164
|
+
* <p>
|
|
1165
|
+
* <code>NOT_CONTAINS</code> and <code>NOT_EQUALS</code> filters on the same field are joined by <code>AND</code>.
|
|
1166
|
+
* A finding matches only if it matches all of those filters. For example, the filters <code>Department NOT_CONTAINS Security AND
|
|
1167
|
+
* Department NOT_CONTAINS Finance</code> match a finding that excludes both the <code>Security</code> and
|
|
1168
|
+
* <code>Finance</code> values.</p>
|
|
1132
1169
|
* <p>
|
|
1133
|
-
* <code>
|
|
1134
|
-
*
|
|
1170
|
+
* <code>CONTAINS</code> filters can only be used with other <code>CONTAINS</code> filters. <code>NOT_CONTAINS</code>
|
|
1171
|
+
* filters can only be used with other <code>NOT_CONTAINS</code> filters.</p>
|
|
1172
|
+
* <p>You can’t have both a <code>CONTAINS</code> filter and a <code>NOT_CONTAINS</code> filter on the same field.
|
|
1173
|
+
* Similarly, you can’t have both an <code>EQUALS</code> filter and a <code>NOT_EQUALS</code> filter on the same field.
|
|
1174
|
+
* Combining filters in this way returns an error.
|
|
1175
|
+
* </p>
|
|
1135
1176
|
* <p>
|
|
1136
|
-
* <code>
|
|
1137
|
-
*
|
|
1138
|
-
* <p>You cannot have both an <code>EQUALS</code> filter and a <code>NOT_EQUALS</code> filter
|
|
1139
|
-
* on the same field.</p>
|
|
1177
|
+
* <code>CONTAINS</code> and <code>NOT_CONTAINS</code> operators can be used only with automation rules. For more information,
|
|
1178
|
+
* see <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/automation-rules.html">Automation rules</a> in the <i>Security Hub User Guide</i>.</p>
|
|
1140
1179
|
*/
|
|
1141
1180
|
Comparison?: MapFilterComparison | string;
|
|
1142
1181
|
}
|
|
@@ -1437,11 +1476,9 @@ export interface AutomationRulesConfig {
|
|
|
1437
1476
|
*/
|
|
1438
1477
|
Description?: string;
|
|
1439
1478
|
/**
|
|
1440
|
-
* <p>Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful
|
|
1441
|
-
*
|
|
1442
|
-
*
|
|
1443
|
-
* the rule criteria and doesn't evaluate other rules for the finding.
|
|
1444
|
-
The default value of this field is <code>false</code>.
|
|
1479
|
+
* <p>Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding
|
|
1480
|
+
* matches the criteria for multiple rules, and each rule has different actions. If a rule is terminal, Security Hub applies the rule action to a finding that matches
|
|
1481
|
+
* the rule criteria and doesn't evaluate other rules for the finding. By default, a rule isn't terminal.
|
|
1445
1482
|
* </p>
|
|
1446
1483
|
*/
|
|
1447
1484
|
IsTerminal?: boolean;
|
|
@@ -1530,12 +1567,9 @@ export interface AutomationRulesMetadata {
|
|
|
1530
1567
|
*/
|
|
1531
1568
|
Description?: string;
|
|
1532
1569
|
/**
|
|
1533
|
-
* <p>
|
|
1534
|
-
*
|
|
1535
|
-
*
|
|
1536
|
-
* field is set to <code>true</code> for a rule, Security Hub applies the rule action to a finding that matches
|
|
1537
|
-
* the rule criteria and doesn't evaluate other rules for the finding.
|
|
1538
|
-
The default value of this field is <code>false</code>.
|
|
1570
|
+
* <p>Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding
|
|
1571
|
+
* matches the criteria for multiple rules, and each rule has different actions. If a rule is terminal, Security Hub applies the rule action to a finding that matches
|
|
1572
|
+
* the rule criteria and doesn't evaluate other rules for the finding. By default, a rule isn't terminal.
|
|
1539
1573
|
* </p>
|
|
1540
1574
|
*/
|
|
1541
1575
|
IsTerminal?: boolean;
|
|
@@ -2602,6 +2636,97 @@ export interface AwsAppSyncGraphQlApiDetails {
|
|
|
2602
2636
|
*/
|
|
2603
2637
|
WafWebAclArn?: string;
|
|
2604
2638
|
}
|
|
2639
|
+
/**
|
|
2640
|
+
* @public
|
|
2641
|
+
* <p>
|
|
2642
|
+
* Specifies the method used to encrypt the user’s data stores in the Athena workgroup.
|
|
2643
|
+
* </p>
|
|
2644
|
+
*/
|
|
2645
|
+
export interface AwsAthenaWorkGroupConfigurationResultConfigurationEncryptionConfigurationDetails {
|
|
2646
|
+
/**
|
|
2647
|
+
* <p>
|
|
2648
|
+
* Indicates whether Amazon Simple Storage Service (Amazon S3) server-side encryption with Amazon S3 managed
|
|
2649
|
+
* keys (SSE_S3), server-side encryption with KMS keys (SSE_KMS), or client-side encryption with
|
|
2650
|
+
* KMS customer managed keys (CSE_KMS) is used.
|
|
2651
|
+
* </p>
|
|
2652
|
+
*/
|
|
2653
|
+
EncryptionOption?: string;
|
|
2654
|
+
/**
|
|
2655
|
+
* <p>
|
|
2656
|
+
* For <code>SSE_KMS</code> and <code>CSE_KMS</code>, this is the KMS key Amazon Resource Name (ARN) or ID.
|
|
2657
|
+
* </p>
|
|
2658
|
+
*/
|
|
2659
|
+
KmsKey?: string;
|
|
2660
|
+
}
|
|
2661
|
+
/**
|
|
2662
|
+
* @public
|
|
2663
|
+
* <p>
|
|
2664
|
+
* The location in Amazon Simple Storage Service (Amazon S3) where query and calculation results are stored and the encryption option, if any,
|
|
2665
|
+
* used for query and calculation results. These are known as client-side settings. If workgroup settings override
|
|
2666
|
+
* client-side settings, then the query uses the workgroup settings.
|
|
2667
|
+
* </p>
|
|
2668
|
+
*/
|
|
2669
|
+
export interface AwsAthenaWorkGroupConfigurationResultConfigurationDetails {
|
|
2670
|
+
/**
|
|
2671
|
+
* <p>
|
|
2672
|
+
* Specifies the method used to encrypt the user’s data stores in the Athena workgroup.
|
|
2673
|
+
* </p>
|
|
2674
|
+
*/
|
|
2675
|
+
EncryptionConfiguration?: AwsAthenaWorkGroupConfigurationResultConfigurationEncryptionConfigurationDetails;
|
|
2676
|
+
}
|
|
2677
|
+
/**
|
|
2678
|
+
* @public
|
|
2679
|
+
* <p>
|
|
2680
|
+
* The configuration of the workgroup, which includes the location in Amazon Simple Storage Service (Amazon S3) where
|
|
2681
|
+
* query results are stored, the encryption option, if any, used for query results, whether Amazon CloudWatch
|
|
2682
|
+
* metrics are enabled for the workgroup, and the limit for the amount of bytes scanned (cutoff) per query, if it is
|
|
2683
|
+
* specified.
|
|
2684
|
+
* </p>
|
|
2685
|
+
*/
|
|
2686
|
+
export interface AwsAthenaWorkGroupConfigurationDetails {
|
|
2687
|
+
/**
|
|
2688
|
+
* <p>
|
|
2689
|
+
* The location in Amazon S3 where query and calculation results are stored and the
|
|
2690
|
+
* encryption option, if any, used for query and calculation results. These are known as client-side settings. If
|
|
2691
|
+
* workgroup settings override client-side settings, then the query uses the workgroup settings.</p>
|
|
2692
|
+
*/
|
|
2693
|
+
ResultConfiguration?: AwsAthenaWorkGroupConfigurationResultConfigurationDetails;
|
|
2694
|
+
}
|
|
2695
|
+
/**
|
|
2696
|
+
* @public
|
|
2697
|
+
* <p>
|
|
2698
|
+
* Provides information about an Amazon Athena workgroup.
|
|
2699
|
+
* </p>
|
|
2700
|
+
*/
|
|
2701
|
+
export interface AwsAthenaWorkGroupDetails {
|
|
2702
|
+
/**
|
|
2703
|
+
* <p>
|
|
2704
|
+
* The workgroup name.
|
|
2705
|
+
* </p>
|
|
2706
|
+
*/
|
|
2707
|
+
Name?: string;
|
|
2708
|
+
/**
|
|
2709
|
+
* <p>
|
|
2710
|
+
* The workgroup description.
|
|
2711
|
+
* </p>
|
|
2712
|
+
*/
|
|
2713
|
+
Description?: string;
|
|
2714
|
+
/**
|
|
2715
|
+
* <p>
|
|
2716
|
+
* Whether the workgroup is enabled or disabled.
|
|
2717
|
+
* </p>
|
|
2718
|
+
*/
|
|
2719
|
+
State?: string;
|
|
2720
|
+
/**
|
|
2721
|
+
* <p>
|
|
2722
|
+
* The configuration of the workgroup, which includes the location in Amazon Simple Storage Service (Amazon S3)
|
|
2723
|
+
* where query results are stored, the encryption option, if any, used for query results, whether
|
|
2724
|
+
* Amazon CloudWatch metrics are enabled for the workgroup, and the limit for the amount of bytes scanned
|
|
2725
|
+
* (cutoff) per query, if it is specified.
|
|
2726
|
+
* </p>
|
|
2727
|
+
*/
|
|
2728
|
+
Configuration?: AwsAthenaWorkGroupConfigurationDetails;
|
|
2729
|
+
}
|
|
2605
2730
|
/**
|
|
2606
2731
|
* @public
|
|
2607
2732
|
* <p>An Availability Zone for the automatic scaling group.</p>
|
|
@@ -9755,112 +9880,3 @@ export interface AwsEfsAccessPointRootDirectoryCreationInfoDetails {
|
|
|
9755
9880
|
*/
|
|
9756
9881
|
Permissions?: string;
|
|
9757
9882
|
}
|
|
9758
|
-
/**
|
|
9759
|
-
* @public
|
|
9760
|
-
* <p>Provides information about the directory on the Amazon EFS file system that the access point exposes
|
|
9761
|
-
* as the root directory to NFS clients using the access point.
|
|
9762
|
-
* </p>
|
|
9763
|
-
*/
|
|
9764
|
-
export interface AwsEfsAccessPointRootDirectoryDetails {
|
|
9765
|
-
/**
|
|
9766
|
-
* <p>Specifies the POSIX IDs and permissions to apply to the access point's root directory.
|
|
9767
|
-
* </p>
|
|
9768
|
-
*/
|
|
9769
|
-
CreationInfo?: AwsEfsAccessPointRootDirectoryCreationInfoDetails;
|
|
9770
|
-
/**
|
|
9771
|
-
* <p>Specifies the path on the Amazon EFS file system to expose as the root directory to NFS clients
|
|
9772
|
-
* using the access point to access the EFS file system. A path can have up to four subdirectories. If the specified
|
|
9773
|
-
* path does not exist, you are required to provide <code>CreationInfo</code>.
|
|
9774
|
-
* </p>
|
|
9775
|
-
*/
|
|
9776
|
-
Path?: string;
|
|
9777
|
-
}
|
|
9778
|
-
/**
|
|
9779
|
-
* @public
|
|
9780
|
-
* <p>Provides information about an Amazon EFS access point.
|
|
9781
|
-
* </p>
|
|
9782
|
-
*/
|
|
9783
|
-
export interface AwsEfsAccessPointDetails {
|
|
9784
|
-
/**
|
|
9785
|
-
* <p>The ID of the Amazon EFS access point.
|
|
9786
|
-
* </p>
|
|
9787
|
-
*/
|
|
9788
|
-
AccessPointId?: string;
|
|
9789
|
-
/**
|
|
9790
|
-
* <p>The Amazon Resource Name (ARN) of the Amazon EFS access point. </p>
|
|
9791
|
-
*/
|
|
9792
|
-
Arn?: string;
|
|
9793
|
-
/**
|
|
9794
|
-
* <p>The opaque string specified in the request to ensure idempotent creation.
|
|
9795
|
-
* </p>
|
|
9796
|
-
*/
|
|
9797
|
-
ClientToken?: string;
|
|
9798
|
-
/**
|
|
9799
|
-
* <p>The ID of the Amazon EFS file system that the access point applies to.
|
|
9800
|
-
* </p>
|
|
9801
|
-
*/
|
|
9802
|
-
FileSystemId?: string;
|
|
9803
|
-
/**
|
|
9804
|
-
* <p>The full POSIX identity, including the user ID, group ID, and secondary group IDs on the access point,
|
|
9805
|
-
* that is used for all file operations by NFS clients using the access point.
|
|
9806
|
-
* </p>
|
|
9807
|
-
*/
|
|
9808
|
-
PosixUser?: AwsEfsAccessPointPosixUserDetails;
|
|
9809
|
-
/**
|
|
9810
|
-
* <p>The directory on the Amazon EFS file system that the access point exposes as the root
|
|
9811
|
-
* directory to NFS clients using the access point.
|
|
9812
|
-
* </p>
|
|
9813
|
-
*/
|
|
9814
|
-
RootDirectory?: AwsEfsAccessPointRootDirectoryDetails;
|
|
9815
|
-
}
|
|
9816
|
-
/**
|
|
9817
|
-
* @public
|
|
9818
|
-
* <p>Details for a cluster logging configuration.</p>
|
|
9819
|
-
*/
|
|
9820
|
-
export interface AwsEksClusterLoggingClusterLoggingDetails {
|
|
9821
|
-
/**
|
|
9822
|
-
* <p>Whether the logging types that are listed in <code>Types</code> are enabled.</p>
|
|
9823
|
-
*/
|
|
9824
|
-
Enabled?: boolean;
|
|
9825
|
-
/**
|
|
9826
|
-
* <p>A list of logging types. Valid values are as follows:</p>
|
|
9827
|
-
* <ul>
|
|
9828
|
-
* <li>
|
|
9829
|
-
* <p>
|
|
9830
|
-
* <code>api</code>
|
|
9831
|
-
* </p>
|
|
9832
|
-
* </li>
|
|
9833
|
-
* <li>
|
|
9834
|
-
* <p>
|
|
9835
|
-
* <code>audit</code>
|
|
9836
|
-
* </p>
|
|
9837
|
-
* </li>
|
|
9838
|
-
* <li>
|
|
9839
|
-
* <p>
|
|
9840
|
-
* <code>authenticator</code>
|
|
9841
|
-
* </p>
|
|
9842
|
-
* </li>
|
|
9843
|
-
* <li>
|
|
9844
|
-
* <p>
|
|
9845
|
-
* <code>controllerManager</code>
|
|
9846
|
-
* </p>
|
|
9847
|
-
* </li>
|
|
9848
|
-
* <li>
|
|
9849
|
-
* <p>
|
|
9850
|
-
* <code>scheduler</code>
|
|
9851
|
-
* </p>
|
|
9852
|
-
* </li>
|
|
9853
|
-
* </ul>
|
|
9854
|
-
*/
|
|
9855
|
-
Types?: string[];
|
|
9856
|
-
}
|
|
9857
|
-
/**
|
|
9858
|
-
* @public
|
|
9859
|
-
* <p>The logging configuration for an Amazon EKS cluster.</p>
|
|
9860
|
-
*/
|
|
9861
|
-
export interface AwsEksClusterLoggingDetails {
|
|
9862
|
-
/**
|
|
9863
|
-
* <p>Cluster logging configurations.</p>
|
|
9864
|
-
*/
|
|
9865
|
-
ClusterLogging?: AwsEksClusterLoggingClusterLoggingDetails[];
|
|
9866
|
-
}
|