@aws-sdk/client-securityhub 3.536.0 → 3.540.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -6,47 +6,23 @@
6
6
 
7
7
  AWS SDK for JavaScript SecurityHub Client for Node.js, Browser and React Native.
8
8
 
9
- <p>Security Hub provides you with a comprehensive view of your security state in Amazon Web Services and helps
10
- you assess your Amazon Web Services environment against security industry standards and best practices.</p>
11
- <p>Security Hub collects security data across Amazon Web Services accounts, Amazon Web Services, and
12
- supported third-party products and helps you analyze your security trends and identify the highest priority security
13
- issues.</p>
14
- <p>To help you manage the security state of your organization, Security Hub supports multiple security standards.
15
- These include the Amazon Web Services Foundational Security Best Practices (FSBP) standard developed by Amazon Web Services,
16
- and external compliance frameworks such as the Center for Internet Security (CIS), the Payment Card Industry Data
17
- Security Standard (PCI DSS), and the National Institute of Standards and Technology (NIST). Each standard includes
18
- several security controls, each of which represents a security best practice. Security Hub runs checks against
19
- security controls and generates control findings to help you assess your compliance against security best practices.</p>
20
- <p>In addition to generating control findings, Security Hub also receives findings from other Amazon Web Services,
21
- such as Amazon GuardDuty and Amazon Inspector, and
22
- supported third-party products. This gives you a single pane of glass into a variety of security-related issues. You
23
- can also send Security Hub findings to other Amazon Web Services and supported third-party products.</p>
24
- <p>Security Hub offers automation features that help you triage and remediate security issues. For example,
25
- you can use automation rules to automatically update critical findings when a security check fails. You can also leverage the integration with
26
- Amazon EventBridge to trigger automatic responses to specific findings.</p>
27
- <p>This guide, the <i>Security Hub API Reference</i>, provides
28
- information about the Security Hub API. This includes supported resources, HTTP methods, parameters,
29
- and schemas. If you're new to Security Hub, you might find it helpful to also review the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
30
- <i>Security Hub User Guide</i>
31
- </a>. The
32
- user guide explains key concepts and provides procedures
33
- that demonstrate how to use Security Hub features. It also provides information about topics such as
34
- integrating Security Hub with other Amazon Web Services.</p>
35
- <p>In addition to interacting with Security Hub by making calls to the Security Hub API, you can
36
- use a current version of an Amazon Web Services command line tool or SDK. Amazon Web Services provides tools
37
- and SDKs that consist of libraries and sample code for various languages and platforms, such as PowerShell,
38
- Java, Go, Python, C++, and .NET. These tools and SDKs provide convenient, programmatic access to
39
- Security Hub and other Amazon Web Services . They also handle tasks such as signing requests,
40
- managing errors, and retrying requests automatically. For information about installing and using the Amazon Web Services tools
41
- and SDKs, see <a href="http://aws.amazon.com/developer/tools/">Tools to Build on Amazon Web Services</a>.</p>
42
- <p>With the exception of operations that are related to central configuration, Security Hub API requests are executed only in
9
+ <p>Security Hub provides you with a comprehensive view of the security state of
10
+ your Amazon Web Services environment and resources. It also provides you with the readiness
11
+ status of your environment based on controls from supported security standards. Security Hub collects security data from Amazon Web Services accounts, services, and
12
+ integrated third-party products and helps you analyze security trends in your environment
13
+ to identify the highest priority security issues. For more information about Security Hub, see the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
14
+ <i>Security Hub User
15
+ Guide</i>
16
+ </a>.</p>
17
+ <p>When you use operations in the Security Hub API, the requests are executed only in
43
18
  the Amazon Web Services Region that is currently active or in the specific Amazon Web Services Region that you specify in your request. Any configuration or settings change
44
19
  that results from the operation is applied only to that Region. To make the same change in
45
- other Regions, call the same API operation in each Region in which you want to apply the change. When you use central configuration,
46
- API requests for enabling Security Hub, standards, and controls are executed in the home Region and all linked Regions. For a list of
47
- central configuration operations, see the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/central-configuration-intro.html#central-configuration-concepts">Central configuration
48
- terms and concepts</a> section of the <i>Security Hub User Guide</i>.</p>
49
- <p>The following throttling limits apply to Security Hub API operations.</p>
20
+ other Regions, run the same command for each Region in which you want to apply the change.</p>
21
+ <p>For example, if your Region is set to <code>us-west-2</code>, when you use <code>CreateMembers</code> to add a member account to Security Hub, the association of
22
+ the member account with the administrator account is created only in the <code>us-west-2</code>
23
+ Region. Security Hub must be enabled for the member account in the same Region that the invitation
24
+ was sent from.</p>
25
+ <p>The following throttling limits apply to using Security Hub API operations.</p>
50
26
  <ul>
51
27
  <li>
52
28
  <p>
@@ -1,12 +1,14 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
3
  exports.defaultEndpointResolver = void 0;
4
- const util_endpoints_1 = require("@smithy/util-endpoints");
4
+ const util_endpoints_1 = require("@aws-sdk/util-endpoints");
5
+ const util_endpoints_2 = require("@smithy/util-endpoints");
5
6
  const ruleset_1 = require("./ruleset");
6
7
  const defaultEndpointResolver = (endpointParams, context = {}) => {
7
- return (0, util_endpoints_1.resolveEndpoint)(ruleset_1.ruleSet, {
8
+ return (0, util_endpoints_2.resolveEndpoint)(ruleset_1.ruleSet, {
8
9
  endpointParams: endpointParams,
9
10
  logger: context.logger,
10
11
  });
11
12
  };
12
13
  exports.defaultEndpointResolver = defaultEndpointResolver;
14
+ util_endpoints_2.customEndpointFunctions.aws = util_endpoints_1.awsEndpointFunctions;
package/dist-cjs/index.js CHANGED
@@ -3924,6 +3924,7 @@ var se_Vulnerability = /* @__PURE__ */ __name((input, context) => {
3924
3924
  ExploitAvailable: [],
3925
3925
  FixAvailable: [],
3926
3926
  Id: [],
3927
+ LastKnownExploitAt: [],
3927
3928
  ReferenceUrls: import_smithy_client._json,
3928
3929
  RelatedVulnerabilities: import_smithy_client._json,
3929
3930
  Vendor: import_smithy_client._json,
@@ -5052,6 +5053,7 @@ var de_Vulnerability = /* @__PURE__ */ __name((output, context) => {
5052
5053
  ExploitAvailable: import_smithy_client.expectString,
5053
5054
  FixAvailable: import_smithy_client.expectString,
5054
5055
  Id: import_smithy_client.expectString,
5056
+ LastKnownExploitAt: import_smithy_client.expectString,
5055
5057
  ReferenceUrls: import_smithy_client._json,
5056
5058
  RelatedVulnerabilities: import_smithy_client._json,
5057
5059
  Vendor: import_smithy_client._json,
@@ -6620,9 +6622,6 @@ var RecordState = {
6620
6622
  ACTIVE: "ACTIVE",
6621
6623
  ARCHIVED: "ARCHIVED"
6622
6624
  };
6623
-
6624
- // src/index.ts
6625
- var import_util_endpoints = require("@aws-sdk/util-endpoints");
6626
6625
  // Annotate the CommonJS export names for ESM import in node:
6627
6626
 
6628
6627
  0 && (module.exports = {
@@ -1,4 +1,5 @@
1
- import { resolveEndpoint } from "@smithy/util-endpoints";
1
+ import { awsEndpointFunctions } from "@aws-sdk/util-endpoints";
2
+ import { customEndpointFunctions, resolveEndpoint } from "@smithy/util-endpoints";
2
3
  import { ruleSet } from "./ruleset";
3
4
  export const defaultEndpointResolver = (endpointParams, context = {}) => {
4
5
  return resolveEndpoint(ruleSet, {
@@ -6,3 +7,4 @@ export const defaultEndpointResolver = (endpointParams, context = {}) => {
6
7
  logger: context.logger,
7
8
  });
8
9
  };
10
+ customEndpointFunctions.aws = awsEndpointFunctions;
package/dist-es/index.js CHANGED
@@ -3,5 +3,4 @@ export * from "./SecurityHub";
3
3
  export * from "./commands";
4
4
  export * from "./pagination";
5
5
  export * from "./models";
6
- import "@aws-sdk/util-endpoints";
7
6
  export { SecurityHubServiceException } from "./models/SecurityHubServiceException";
@@ -3102,6 +3102,7 @@ const se_Vulnerability = (input, context) => {
3102
3102
  ExploitAvailable: [],
3103
3103
  FixAvailable: [],
3104
3104
  Id: [],
3105
+ LastKnownExploitAt: [],
3105
3106
  ReferenceUrls: _json,
3106
3107
  RelatedVulnerabilities: _json,
3107
3108
  Vendor: _json,
@@ -4276,6 +4277,7 @@ const de_Vulnerability = (output, context) => {
4276
4277
  ExploitAvailable: __expectString,
4277
4278
  FixAvailable: __expectString,
4278
4279
  Id: __expectString,
4280
+ LastKnownExploitAt: __expectString,
4279
4281
  ReferenceUrls: _json,
4280
4282
  RelatedVulnerabilities: _json,
4281
4283
  Vendor: _json,
@@ -581,47 +581,23 @@ export interface SecurityHub {
581
581
  updateStandardsControl(args: UpdateStandardsControlCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: UpdateStandardsControlCommandOutput) => void): void;
582
582
  }
583
583
  /**
584
- * <p>Security Hub provides you with a comprehensive view of your security state in Amazon Web Services and helps
585
- * you assess your Amazon Web Services environment against security industry standards and best practices.</p>
586
- * <p>Security Hub collects security data across Amazon Web Services accounts, Amazon Web Services, and
587
- * supported third-party products and helps you analyze your security trends and identify the highest priority security
588
- * issues.</p>
589
- * <p>To help you manage the security state of your organization, Security Hub supports multiple security standards.
590
- * These include the Amazon Web Services Foundational Security Best Practices (FSBP) standard developed by Amazon Web Services,
591
- * and external compliance frameworks such as the Center for Internet Security (CIS), the Payment Card Industry Data
592
- * Security Standard (PCI DSS), and the National Institute of Standards and Technology (NIST). Each standard includes
593
- * several security controls, each of which represents a security best practice. Security Hub runs checks against
594
- * security controls and generates control findings to help you assess your compliance against security best practices.</p>
595
- * <p>In addition to generating control findings, Security Hub also receives findings from other Amazon Web Services,
596
- * such as Amazon GuardDuty and Amazon Inspector, and
597
- * supported third-party products. This gives you a single pane of glass into a variety of security-related issues. You
598
- * can also send Security Hub findings to other Amazon Web Services and supported third-party products.</p>
599
- * <p>Security Hub offers automation features that help you triage and remediate security issues. For example,
600
- * you can use automation rules to automatically update critical findings when a security check fails. You can also leverage the integration with
601
- * Amazon EventBridge to trigger automatic responses to specific findings.</p>
602
- * <p>This guide, the <i>Security Hub API Reference</i>, provides
603
- * information about the Security Hub API. This includes supported resources, HTTP methods, parameters,
604
- * and schemas. If you're new to Security Hub, you might find it helpful to also review the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
605
- * <i>Security Hub User Guide</i>
606
- * </a>. The
607
- * user guide explains key concepts and provides procedures
608
- * that demonstrate how to use Security Hub features. It also provides information about topics such as
609
- * integrating Security Hub with other Amazon Web Services.</p>
610
- * <p>In addition to interacting with Security Hub by making calls to the Security Hub API, you can
611
- * use a current version of an Amazon Web Services command line tool or SDK. Amazon Web Services provides tools
612
- * and SDKs that consist of libraries and sample code for various languages and platforms, such as PowerShell,
613
- * Java, Go, Python, C++, and .NET. These tools and SDKs provide convenient, programmatic access to
614
- * Security Hub and other Amazon Web Services . They also handle tasks such as signing requests,
615
- * managing errors, and retrying requests automatically. For information about installing and using the Amazon Web Services tools
616
- * and SDKs, see <a href="http://aws.amazon.com/developer/tools/">Tools to Build on Amazon Web Services</a>.</p>
617
- * <p>With the exception of operations that are related to central configuration, Security Hub API requests are executed only in
584
+ * <p>Security Hub provides you with a comprehensive view of the security state of
585
+ * your Amazon Web Services environment and resources. It also provides you with the readiness
586
+ * status of your environment based on controls from supported security standards. Security Hub collects security data from Amazon Web Services accounts, services, and
587
+ * integrated third-party products and helps you analyze security trends in your environment
588
+ * to identify the highest priority security issues. For more information about Security Hub, see the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
589
+ * <i>Security Hub User
590
+ * Guide</i>
591
+ * </a>.</p>
592
+ * <p>When you use operations in the Security Hub API, the requests are executed only in
618
593
  * the Amazon Web Services Region that is currently active or in the specific Amazon Web Services Region that you specify in your request. Any configuration or settings change
619
594
  * that results from the operation is applied only to that Region. To make the same change in
620
- * other Regions, call the same API operation in each Region in which you want to apply the change. When you use central configuration,
621
- * API requests for enabling Security Hub, standards, and controls are executed in the home Region and all linked Regions. For a list of
622
- * central configuration operations, see the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/central-configuration-intro.html#central-configuration-concepts">Central configuration
623
- * terms and concepts</a> section of the <i>Security Hub User Guide</i>.</p>
624
- * <p>The following throttling limits apply to Security Hub API operations.</p>
595
+ * other Regions, run the same command for each Region in which you want to apply the change.</p>
596
+ * <p>For example, if your Region is set to <code>us-west-2</code>, when you use <code>CreateMembers</code> to add a member account to Security Hub, the association of
597
+ * the member account with the administrator account is created only in the <code>us-west-2</code>
598
+ * Region. Security Hub must be enabled for the member account in the same Region that the invitation
599
+ * was sent from.</p>
600
+ * <p>The following throttling limits apply to using Security Hub API operations.</p>
625
601
  * <ul>
626
602
  * <li>
627
603
  * <p>
@@ -230,47 +230,23 @@ export type SecurityHubClientResolvedConfigType = __SmithyResolvedConfiguration<
230
230
  export interface SecurityHubClientResolvedConfig extends SecurityHubClientResolvedConfigType {
231
231
  }
232
232
  /**
233
- * <p>Security Hub provides you with a comprehensive view of your security state in Amazon Web Services and helps
234
- * you assess your Amazon Web Services environment against security industry standards and best practices.</p>
235
- * <p>Security Hub collects security data across Amazon Web Services accounts, Amazon Web Services, and
236
- * supported third-party products and helps you analyze your security trends and identify the highest priority security
237
- * issues.</p>
238
- * <p>To help you manage the security state of your organization, Security Hub supports multiple security standards.
239
- * These include the Amazon Web Services Foundational Security Best Practices (FSBP) standard developed by Amazon Web Services,
240
- * and external compliance frameworks such as the Center for Internet Security (CIS), the Payment Card Industry Data
241
- * Security Standard (PCI DSS), and the National Institute of Standards and Technology (NIST). Each standard includes
242
- * several security controls, each of which represents a security best practice. Security Hub runs checks against
243
- * security controls and generates control findings to help you assess your compliance against security best practices.</p>
244
- * <p>In addition to generating control findings, Security Hub also receives findings from other Amazon Web Services,
245
- * such as Amazon GuardDuty and Amazon Inspector, and
246
- * supported third-party products. This gives you a single pane of glass into a variety of security-related issues. You
247
- * can also send Security Hub findings to other Amazon Web Services and supported third-party products.</p>
248
- * <p>Security Hub offers automation features that help you triage and remediate security issues. For example,
249
- * you can use automation rules to automatically update critical findings when a security check fails. You can also leverage the integration with
250
- * Amazon EventBridge to trigger automatic responses to specific findings.</p>
251
- * <p>This guide, the <i>Security Hub API Reference</i>, provides
252
- * information about the Security Hub API. This includes supported resources, HTTP methods, parameters,
253
- * and schemas. If you're new to Security Hub, you might find it helpful to also review the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
254
- * <i>Security Hub User Guide</i>
255
- * </a>. The
256
- * user guide explains key concepts and provides procedures
257
- * that demonstrate how to use Security Hub features. It also provides information about topics such as
258
- * integrating Security Hub with other Amazon Web Services.</p>
259
- * <p>In addition to interacting with Security Hub by making calls to the Security Hub API, you can
260
- * use a current version of an Amazon Web Services command line tool or SDK. Amazon Web Services provides tools
261
- * and SDKs that consist of libraries and sample code for various languages and platforms, such as PowerShell,
262
- * Java, Go, Python, C++, and .NET. These tools and SDKs provide convenient, programmatic access to
263
- * Security Hub and other Amazon Web Services . They also handle tasks such as signing requests,
264
- * managing errors, and retrying requests automatically. For information about installing and using the Amazon Web Services tools
265
- * and SDKs, see <a href="http://aws.amazon.com/developer/tools/">Tools to Build on Amazon Web Services</a>.</p>
266
- * <p>With the exception of operations that are related to central configuration, Security Hub API requests are executed only in
233
+ * <p>Security Hub provides you with a comprehensive view of the security state of
234
+ * your Amazon Web Services environment and resources. It also provides you with the readiness
235
+ * status of your environment based on controls from supported security standards. Security Hub collects security data from Amazon Web Services accounts, services, and
236
+ * integrated third-party products and helps you analyze security trends in your environment
237
+ * to identify the highest priority security issues. For more information about Security Hub, see the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
238
+ * <i>Security Hub User
239
+ * Guide</i>
240
+ * </a>.</p>
241
+ * <p>When you use operations in the Security Hub API, the requests are executed only in
267
242
  * the Amazon Web Services Region that is currently active or in the specific Amazon Web Services Region that you specify in your request. Any configuration or settings change
268
243
  * that results from the operation is applied only to that Region. To make the same change in
269
- * other Regions, call the same API operation in each Region in which you want to apply the change. When you use central configuration,
270
- * API requests for enabling Security Hub, standards, and controls are executed in the home Region and all linked Regions. For a list of
271
- * central configuration operations, see the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/central-configuration-intro.html#central-configuration-concepts">Central configuration
272
- * terms and concepts</a> section of the <i>Security Hub User Guide</i>.</p>
273
- * <p>The following throttling limits apply to Security Hub API operations.</p>
244
+ * other Regions, run the same command for each Region in which you want to apply the change.</p>
245
+ * <p>For example, if your Region is set to <code>us-west-2</code>, when you use <code>CreateMembers</code> to add a member account to Security Hub, the association of
246
+ * the member account with the administrator account is created only in the <code>us-west-2</code>
247
+ * Region. Security Hub must be enabled for the member account in the same Region that the invitation
248
+ * was sent from.</p>
249
+ * <p>The following throttling limits apply to using Security Hub API operations.</p>
274
250
  * <ul>
275
251
  * <li>
276
252
  * <p>
@@ -127,18 +127,18 @@ declare const BatchGetAutomationRulesCommand_base: {
127
127
  * // { // NumberFilter
128
128
  * // Gte: Number("double"),
129
129
  * // Lte: Number("double"),
130
+ * // Eq: Number("double"),
130
131
  * // Gt: Number("double"),
131
132
  * // Lt: Number("double"),
132
- * // Eq: Number("double"),
133
133
  * // },
134
134
  * // ],
135
135
  * // Criticality: [
136
136
  * // {
137
137
  * // Gte: Number("double"),
138
138
  * // Lte: Number("double"),
139
+ * // Eq: Number("double"),
139
140
  * // Gt: Number("double"),
140
141
  * // Lt: Number("double"),
141
- * // Eq: Number("double"),
142
142
  * // },
143
143
  * // ],
144
144
  * // Title: "<StringFilterList>",
@@ -4132,6 +4132,7 @@ declare const BatchImportFindingsCommand_base: {
4132
4132
  * FixAvailable: "YES" || "NO" || "PARTIAL",
4133
4133
  * EpssScore: Number("double"),
4134
4134
  * ExploitAvailable: "YES" || "NO",
4135
+ * LastKnownExploitAt: "STRING_VALUE",
4135
4136
  * CodeVulnerabilities: [ // VulnerabilityCodeVulnerabilitiesList
4136
4137
  * { // VulnerabilityCodeVulnerabilities
4137
4138
  * Cwes: "<TypeList>",
@@ -120,18 +120,18 @@ declare const BatchUpdateAutomationRulesCommand_base: {
120
120
  * { // NumberFilter
121
121
  * Gte: Number("double"),
122
122
  * Lte: Number("double"),
123
+ * Eq: Number("double"),
123
124
  * Gt: Number("double"),
124
125
  * Lt: Number("double"),
125
- * Eq: Number("double"),
126
126
  * },
127
127
  * ],
128
128
  * Criticality: [
129
129
  * {
130
130
  * Gte: Number("double"),
131
131
  * Lte: Number("double"),
132
+ * Eq: Number("double"),
132
133
  * Gt: Number("double"),
133
134
  * Lt: Number("double"),
134
- * Eq: Number("double"),
135
135
  * },
136
136
  * ],
137
137
  * Title: "<StringFilterList>",
@@ -119,18 +119,18 @@ declare const CreateAutomationRuleCommand_base: {
119
119
  * { // NumberFilter
120
120
  * Gte: Number("double"),
121
121
  * Lte: Number("double"),
122
+ * Eq: Number("double"),
122
123
  * Gt: Number("double"),
123
124
  * Lt: Number("double"),
124
- * Eq: Number("double"),
125
125
  * },
126
126
  * ],
127
127
  * Criticality: [
128
128
  * {
129
129
  * Gte: Number("double"),
130
130
  * Lte: Number("double"),
131
+ * Eq: Number("double"),
131
132
  * Gt: Number("double"),
132
133
  * Lt: Number("double"),
133
- * Eq: Number("double"),
134
134
  * },
135
135
  * ],
136
136
  * Title: "<StringFilterList>",
@@ -114,18 +114,18 @@ declare const CreateInsightCommand_base: {
114
114
  * { // NumberFilter
115
115
  * Gte: Number("double"),
116
116
  * Lte: Number("double"),
117
+ * Eq: Number("double"),
117
118
  * Gt: Number("double"),
118
119
  * Lt: Number("double"),
119
- * Eq: Number("double"),
120
120
  * },
121
121
  * ],
122
122
  * SeverityNormalized: [
123
123
  * {
124
124
  * Gte: Number("double"),
125
125
  * Lte: Number("double"),
126
+ * Eq: Number("double"),
126
127
  * Gt: Number("double"),
127
128
  * Lt: Number("double"),
128
- * Eq: Number("double"),
129
129
  * },
130
130
  * ],
131
131
  * SeverityLabel: "<StringFilterList>",
@@ -133,18 +133,18 @@ declare const CreateInsightCommand_base: {
133
133
  * {
134
134
  * Gte: Number("double"),
135
135
  * Lte: Number("double"),
136
+ * Eq: Number("double"),
136
137
  * Gt: Number("double"),
137
138
  * Lt: Number("double"),
138
- * Eq: Number("double"),
139
139
  * },
140
140
  * ],
141
141
  * Criticality: [
142
142
  * {
143
143
  * Gte: Number("double"),
144
144
  * Lte: Number("double"),
145
+ * Eq: Number("double"),
145
146
  * Gt: Number("double"),
146
147
  * Lt: Number("double"),
147
- * Eq: Number("double"),
148
148
  * },
149
149
  * ],
150
150
  * Title: "<StringFilterList>",
@@ -187,9 +187,9 @@ declare const CreateInsightCommand_base: {
187
187
  * {
188
188
  * Gte: Number("double"),
189
189
  * Lte: Number("double"),
190
+ * Eq: Number("double"),
190
191
  * Gt: Number("double"),
191
192
  * Lt: Number("double"),
192
- * Eq: Number("double"),
193
193
  * },
194
194
  * ],
195
195
  * NetworkSourceDomain: "<StringFilterList>",
@@ -111,18 +111,18 @@ declare const GetFindingsCommand_base: {
111
111
  * { // NumberFilter
112
112
  * Gte: Number("double"),
113
113
  * Lte: Number("double"),
114
+ * Eq: Number("double"),
114
115
  * Gt: Number("double"),
115
116
  * Lt: Number("double"),
116
- * Eq: Number("double"),
117
117
  * },
118
118
  * ],
119
119
  * SeverityNormalized: [
120
120
  * {
121
121
  * Gte: Number("double"),
122
122
  * Lte: Number("double"),
123
+ * Eq: Number("double"),
123
124
  * Gt: Number("double"),
124
125
  * Lt: Number("double"),
125
- * Eq: Number("double"),
126
126
  * },
127
127
  * ],
128
128
  * SeverityLabel: "<StringFilterList>",
@@ -130,18 +130,18 @@ declare const GetFindingsCommand_base: {
130
130
  * {
131
131
  * Gte: Number("double"),
132
132
  * Lte: Number("double"),
133
+ * Eq: Number("double"),
133
134
  * Gt: Number("double"),
134
135
  * Lt: Number("double"),
135
- * Eq: Number("double"),
136
136
  * },
137
137
  * ],
138
138
  * Criticality: [
139
139
  * {
140
140
  * Gte: Number("double"),
141
141
  * Lte: Number("double"),
142
+ * Eq: Number("double"),
142
143
  * Gt: Number("double"),
143
144
  * Lt: Number("double"),
144
- * Eq: Number("double"),
145
145
  * },
146
146
  * ],
147
147
  * Title: "<StringFilterList>",
@@ -184,9 +184,9 @@ declare const GetFindingsCommand_base: {
184
184
  * {
185
185
  * Gte: Number("double"),
186
186
  * Lte: Number("double"),
187
+ * Eq: Number("double"),
187
188
  * Gt: Number("double"),
188
189
  * Lt: Number("double"),
189
- * Eq: Number("double"),
190
190
  * },
191
191
  * ],
192
192
  * NetworkSourceDomain: "<StringFilterList>",
@@ -4339,6 +4339,7 @@ declare const GetFindingsCommand_base: {
4339
4339
  * // FixAvailable: "YES" || "NO" || "PARTIAL",
4340
4340
  * // EpssScore: Number("double"),
4341
4341
  * // ExploitAvailable: "YES" || "NO",
4342
+ * // LastKnownExploitAt: "STRING_VALUE",
4342
4343
  * // CodeVulnerabilities: [ // VulnerabilityCodeVulnerabilitiesList
4343
4344
  * // { // VulnerabilityCodeVulnerabilities
4344
4345
  * // Cwes: "<TypeList>",
@@ -123,18 +123,18 @@ declare const GetInsightsCommand_base: {
123
123
  * // { // NumberFilter
124
124
  * // Gte: Number("double"),
125
125
  * // Lte: Number("double"),
126
+ * // Eq: Number("double"),
126
127
  * // Gt: Number("double"),
127
128
  * // Lt: Number("double"),
128
- * // Eq: Number("double"),
129
129
  * // },
130
130
  * // ],
131
131
  * // SeverityNormalized: [
132
132
  * // {
133
133
  * // Gte: Number("double"),
134
134
  * // Lte: Number("double"),
135
+ * // Eq: Number("double"),
135
136
  * // Gt: Number("double"),
136
137
  * // Lt: Number("double"),
137
- * // Eq: Number("double"),
138
138
  * // },
139
139
  * // ],
140
140
  * // SeverityLabel: "<StringFilterList>",
@@ -142,18 +142,18 @@ declare const GetInsightsCommand_base: {
142
142
  * // {
143
143
  * // Gte: Number("double"),
144
144
  * // Lte: Number("double"),
145
+ * // Eq: Number("double"),
145
146
  * // Gt: Number("double"),
146
147
  * // Lt: Number("double"),
147
- * // Eq: Number("double"),
148
148
  * // },
149
149
  * // ],
150
150
  * // Criticality: [
151
151
  * // {
152
152
  * // Gte: Number("double"),
153
153
  * // Lte: Number("double"),
154
+ * // Eq: Number("double"),
154
155
  * // Gt: Number("double"),
155
156
  * // Lt: Number("double"),
156
- * // Eq: Number("double"),
157
157
  * // },
158
158
  * // ],
159
159
  * // Title: "<StringFilterList>",
@@ -196,9 +196,9 @@ declare const GetInsightsCommand_base: {
196
196
  * // {
197
197
  * // Gte: Number("double"),
198
198
  * // Lte: Number("double"),
199
+ * // Eq: Number("double"),
199
200
  * // Gt: Number("double"),
200
201
  * // Lt: Number("double"),
201
- * // Eq: Number("double"),
202
202
  * // },
203
203
  * // ],
204
204
  * // NetworkSourceDomain: "<StringFilterList>",
@@ -115,18 +115,18 @@ declare const UpdateFindingsCommand_base: {
115
115
  * { // NumberFilter
116
116
  * Gte: Number("double"),
117
117
  * Lte: Number("double"),
118
+ * Eq: Number("double"),
118
119
  * Gt: Number("double"),
119
120
  * Lt: Number("double"),
120
- * Eq: Number("double"),
121
121
  * },
122
122
  * ],
123
123
  * SeverityNormalized: [
124
124
  * {
125
125
  * Gte: Number("double"),
126
126
  * Lte: Number("double"),
127
+ * Eq: Number("double"),
127
128
  * Gt: Number("double"),
128
129
  * Lt: Number("double"),
129
- * Eq: Number("double"),
130
130
  * },
131
131
  * ],
132
132
  * SeverityLabel: "<StringFilterList>",
@@ -134,18 +134,18 @@ declare const UpdateFindingsCommand_base: {
134
134
  * {
135
135
  * Gte: Number("double"),
136
136
  * Lte: Number("double"),
137
+ * Eq: Number("double"),
137
138
  * Gt: Number("double"),
138
139
  * Lt: Number("double"),
139
- * Eq: Number("double"),
140
140
  * },
141
141
  * ],
142
142
  * Criticality: [
143
143
  * {
144
144
  * Gte: Number("double"),
145
145
  * Lte: Number("double"),
146
+ * Eq: Number("double"),
146
147
  * Gt: Number("double"),
147
148
  * Lt: Number("double"),
148
- * Eq: Number("double"),
149
149
  * },
150
150
  * ],
151
151
  * Title: "<StringFilterList>",
@@ -188,9 +188,9 @@ declare const UpdateFindingsCommand_base: {
188
188
  * {
189
189
  * Gte: Number("double"),
190
190
  * Lte: Number("double"),
191
+ * Eq: Number("double"),
191
192
  * Gt: Number("double"),
192
193
  * Lt: Number("double"),
193
- * Eq: Number("double"),
194
194
  * },
195
195
  * ],
196
196
  * NetworkSourceDomain: "<StringFilterList>",
@@ -112,18 +112,18 @@ declare const UpdateInsightCommand_base: {
112
112
  * { // NumberFilter
113
113
  * Gte: Number("double"),
114
114
  * Lte: Number("double"),
115
+ * Eq: Number("double"),
115
116
  * Gt: Number("double"),
116
117
  * Lt: Number("double"),
117
- * Eq: Number("double"),
118
118
  * },
119
119
  * ],
120
120
  * SeverityNormalized: [
121
121
  * {
122
122
  * Gte: Number("double"),
123
123
  * Lte: Number("double"),
124
+ * Eq: Number("double"),
124
125
  * Gt: Number("double"),
125
126
  * Lt: Number("double"),
126
- * Eq: Number("double"),
127
127
  * },
128
128
  * ],
129
129
  * SeverityLabel: "<StringFilterList>",
@@ -131,18 +131,18 @@ declare const UpdateInsightCommand_base: {
131
131
  * {
132
132
  * Gte: Number("double"),
133
133
  * Lte: Number("double"),
134
+ * Eq: Number("double"),
134
135
  * Gt: Number("double"),
135
136
  * Lt: Number("double"),
136
- * Eq: Number("double"),
137
137
  * },
138
138
  * ],
139
139
  * Criticality: [
140
140
  * {
141
141
  * Gte: Number("double"),
142
142
  * Lte: Number("double"),
143
+ * Eq: Number("double"),
143
144
  * Gt: Number("double"),
144
145
  * Lt: Number("double"),
145
- * Eq: Number("double"),
146
146
  * },
147
147
  * ],
148
148
  * Title: "<StringFilterList>",
@@ -185,9 +185,9 @@ declare const UpdateInsightCommand_base: {
185
185
  * {
186
186
  * Gte: Number("double"),
187
187
  * Lte: Number("double"),
188
+ * Eq: Number("double"),
188
189
  * Gt: Number("double"),
189
190
  * Lt: Number("double"),
190
- * Eq: Number("double"),
191
191
  * },
192
192
  * ],
193
193
  * NetworkSourceDomain: "<StringFilterList>",
@@ -1,45 +1,21 @@
1
1
  /**
2
- * <p>Security Hub provides you with a comprehensive view of your security state in Amazon Web Services and helps
3
- * you assess your Amazon Web Services environment against security industry standards and best practices.</p>
4
- * <p>Security Hub collects security data across Amazon Web Services accounts, Amazon Web Services, and
5
- * supported third-party products and helps you analyze your security trends and identify the highest priority security
6
- * issues.</p>
7
- * <p>To help you manage the security state of your organization, Security Hub supports multiple security standards.
8
- * These include the Amazon Web Services Foundational Security Best Practices (FSBP) standard developed by Amazon Web Services,
9
- * and external compliance frameworks such as the Center for Internet Security (CIS), the Payment Card Industry Data
10
- * Security Standard (PCI DSS), and the National Institute of Standards and Technology (NIST). Each standard includes
11
- * several security controls, each of which represents a security best practice. Security Hub runs checks against
12
- * security controls and generates control findings to help you assess your compliance against security best practices.</p>
13
- * <p>In addition to generating control findings, Security Hub also receives findings from other Amazon Web Services,
14
- * such as Amazon GuardDuty and Amazon Inspector, and
15
- * supported third-party products. This gives you a single pane of glass into a variety of security-related issues. You
16
- * can also send Security Hub findings to other Amazon Web Services and supported third-party products.</p>
17
- * <p>Security Hub offers automation features that help you triage and remediate security issues. For example,
18
- * you can use automation rules to automatically update critical findings when a security check fails. You can also leverage the integration with
19
- * Amazon EventBridge to trigger automatic responses to specific findings.</p>
20
- * <p>This guide, the <i>Security Hub API Reference</i>, provides
21
- * information about the Security Hub API. This includes supported resources, HTTP methods, parameters,
22
- * and schemas. If you're new to Security Hub, you might find it helpful to also review the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
23
- * <i>Security Hub User Guide</i>
24
- * </a>. The
25
- * user guide explains key concepts and provides procedures
26
- * that demonstrate how to use Security Hub features. It also provides information about topics such as
27
- * integrating Security Hub with other Amazon Web Services.</p>
28
- * <p>In addition to interacting with Security Hub by making calls to the Security Hub API, you can
29
- * use a current version of an Amazon Web Services command line tool or SDK. Amazon Web Services provides tools
30
- * and SDKs that consist of libraries and sample code for various languages and platforms, such as PowerShell,
31
- * Java, Go, Python, C++, and .NET. These tools and SDKs provide convenient, programmatic access to
32
- * Security Hub and other Amazon Web Services . They also handle tasks such as signing requests,
33
- * managing errors, and retrying requests automatically. For information about installing and using the Amazon Web Services tools
34
- * and SDKs, see <a href="http://aws.amazon.com/developer/tools/">Tools to Build on Amazon Web Services</a>.</p>
35
- * <p>With the exception of operations that are related to central configuration, Security Hub API requests are executed only in
2
+ * <p>Security Hub provides you with a comprehensive view of the security state of
3
+ * your Amazon Web Services environment and resources. It also provides you with the readiness
4
+ * status of your environment based on controls from supported security standards. Security Hub collects security data from Amazon Web Services accounts, services, and
5
+ * integrated third-party products and helps you analyze security trends in your environment
6
+ * to identify the highest priority security issues. For more information about Security Hub, see the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
7
+ * <i>Security Hub User
8
+ * Guide</i>
9
+ * </a>.</p>
10
+ * <p>When you use operations in the Security Hub API, the requests are executed only in
36
11
  * the Amazon Web Services Region that is currently active or in the specific Amazon Web Services Region that you specify in your request. Any configuration or settings change
37
12
  * that results from the operation is applied only to that Region. To make the same change in
38
- * other Regions, call the same API operation in each Region in which you want to apply the change. When you use central configuration,
39
- * API requests for enabling Security Hub, standards, and controls are executed in the home Region and all linked Regions. For a list of
40
- * central configuration operations, see the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/central-configuration-intro.html#central-configuration-concepts">Central configuration
41
- * terms and concepts</a> section of the <i>Security Hub User Guide</i>.</p>
42
- * <p>The following throttling limits apply to Security Hub API operations.</p>
13
+ * other Regions, run the same command for each Region in which you want to apply the change.</p>
14
+ * <p>For example, if your Region is set to <code>us-west-2</code>, when you use <code>CreateMembers</code> to add a member account to Security Hub, the association of
15
+ * the member account with the administrator account is created only in the <code>us-west-2</code>
16
+ * Region. Security Hub must be enabled for the member account in the same Region that the invitation
17
+ * was sent from.</p>
18
+ * <p>The following throttling limits apply to using Security Hub API operations.</p>
43
19
  * <ul>
44
20
  * <li>
45
21
  * <p>
@@ -82,5 +58,4 @@ export { SecurityHubExtensionConfiguration } from "./extensionConfiguration";
82
58
  export * from "./commands";
83
59
  export * from "./pagination";
84
60
  export * from "./models";
85
- import "@aws-sdk/util-endpoints";
86
61
  export { SecurityHubServiceException } from "./models/SecurityHubServiceException";
@@ -1189,6 +1189,12 @@ export interface NumberFilter {
1189
1189
  * @public
1190
1190
  */
1191
1191
  Lte?: number;
1192
+ /**
1193
+ * <p>The equal-to condition to be applied to a single field when querying for
1194
+ * findings.</p>
1195
+ * @public
1196
+ */
1197
+ Eq?: number;
1192
1198
  /**
1193
1199
  * <p>
1194
1200
  * The greater-than condition to be applied to a single field when querying for findings.
@@ -1203,12 +1209,6 @@ export interface NumberFilter {
1203
1209
  * @public
1204
1210
  */
1205
1211
  Lt?: number;
1206
- /**
1207
- * <p>The equal-to condition to be applied to a single field when querying for
1208
- * findings.</p>
1209
- * @public
1210
- */
1211
- Eq?: number;
1212
1212
  }
1213
1213
  /**
1214
1214
  * @public
@@ -3429,10 +3429,12 @@ export interface AwsLambdaLayerVersionDetails {
3429
3429
  */
3430
3430
  Version?: number;
3431
3431
  /**
3432
- * <p>The layer's compatible <a href="https://docs.aws.amazon.com/lambda/latest/dg/lambda-runtimes.html">function runtimes</a>.</p>
3433
- * <p>The following list includes deprecated runtimes. For more information, see <a href="https://docs.aws.amazon.com/lambda/latest/dg/lambda-runtimes.html#runtime-support-policy">Runtime deprecation policy</a> in the <i>Lambda Developer Guide</i>.</p>
3434
- * <p>Array Members: Maximum number of 5 items.</p>
3435
- * <p>Valid Values: <code>nodejs | nodejs4.3 | nodejs6.10 | nodejs8.10 | nodejs10.x | nodejs12.x | nodejs14.x | nodejs16.x | java8 | java8.al2 | java11 | python2.7 | python3.6 | python3.7 | python3.8 | python3.9 | dotnetcore1.0 | dotnetcore2.0 | dotnetcore2.1 | dotnetcore3.1 | dotnet6 | nodejs4.3-edge | go1.x | ruby2.5 | ruby2.7 | provided | provided.al2 | nodejs18.x | python3.10 | java17 | ruby3.2 | python3.11 | nodejs20.x | provided.al2023 | python3.12 | java21</code>
3432
+ * <p>The layer's compatible runtimes. Maximum number of five items.</p>
3433
+ * <p>Valid values: <code>nodejs10.x</code> | <code>nodejs12.x</code> | <code>java8</code> |
3434
+ * <code>java11</code> | <code>python2.7</code> | <code>python3.6</code> |
3435
+ * <code>python3.7</code> | <code>python3.8</code> | <code>dotnetcore1.0</code> |
3436
+ * <code>dotnetcore2.1</code> | <code>go1.x</code> | <code>ruby2.5</code> |
3437
+ * <code>provided</code>
3436
3438
  * </p>
3437
3439
  * @public
3438
3440
  */
@@ -2092,6 +2092,13 @@ export interface Vulnerability {
2092
2092
  * @public
2093
2093
  */
2094
2094
  ExploitAvailable?: VulnerabilityExploitAvailable;
2095
+ /**
2096
+ * <p>
2097
+ * The date and time of the last exploit associated with a finding discovered in your environment.
2098
+ * </p>
2099
+ * @public
2100
+ */
2101
+ LastKnownExploitAt?: string;
2095
2102
  /**
2096
2103
  * <p>The vulnerabilities found in your Lambda function code. This field pertains to findings that
2097
2104
  * Security Hub receives from Amazon Inspector.
@@ -6,5 +6,4 @@ export { SecurityHubExtensionConfiguration } from "./extensionConfiguration";
6
6
  export * from "./commands";
7
7
  export * from "./pagination";
8
8
  export * from "./models";
9
- import "@aws-sdk/util-endpoints";
10
9
  export { SecurityHubServiceException } from "./models/SecurityHubServiceException";
@@ -283,9 +283,9 @@ export interface StringFilter {
283
283
  export interface NumberFilter {
284
284
  Gte?: number;
285
285
  Lte?: number;
286
+ Eq?: number;
286
287
  Gt?: number;
287
288
  Lt?: number;
288
- Eq?: number;
289
289
  }
290
290
  export declare const DateRangeUnit: {
291
291
  readonly DAYS: "DAYS";
@@ -520,6 +520,7 @@ export interface Vulnerability {
520
520
  FixAvailable?: VulnerabilityFixAvailable;
521
521
  EpssScore?: number;
522
522
  ExploitAvailable?: VulnerabilityExploitAvailable;
523
+ LastKnownExploitAt?: string;
523
524
  CodeVulnerabilities?: VulnerabilityCodeVulnerabilities[];
524
525
  }
525
526
  export interface Workflow {
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-securityhub",
3
3
  "description": "AWS SDK for JavaScript Securityhub Client for Node.js, Browser and React Native",
4
- "version": "3.536.0",
4
+ "version": "3.540.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
7
7
  "build:cjs": "node ../../scripts/compilation/inline client-securityhub",
@@ -20,16 +20,16 @@
20
20
  "dependencies": {
21
21
  "@aws-crypto/sha256-browser": "3.0.0",
22
22
  "@aws-crypto/sha256-js": "3.0.0",
23
- "@aws-sdk/client-sts": "3.535.0",
23
+ "@aws-sdk/client-sts": "3.540.0",
24
24
  "@aws-sdk/core": "3.535.0",
25
- "@aws-sdk/credential-provider-node": "3.535.0",
25
+ "@aws-sdk/credential-provider-node": "3.540.0",
26
26
  "@aws-sdk/middleware-host-header": "3.535.0",
27
27
  "@aws-sdk/middleware-logger": "3.535.0",
28
28
  "@aws-sdk/middleware-recursion-detection": "3.535.0",
29
- "@aws-sdk/middleware-user-agent": "3.535.0",
29
+ "@aws-sdk/middleware-user-agent": "3.540.0",
30
30
  "@aws-sdk/region-config-resolver": "3.535.0",
31
31
  "@aws-sdk/types": "3.535.0",
32
- "@aws-sdk/util-endpoints": "3.535.0",
32
+ "@aws-sdk/util-endpoints": "3.540.0",
33
33
  "@aws-sdk/util-user-agent-browser": "3.535.0",
34
34
  "@aws-sdk/util-user-agent-node": "3.535.0",
35
35
  "@smithy/config-resolver": "^2.2.0",