@aws-sdk/client-securityhub 3.540.0 → 3.547.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -6,23 +6,47 @@
6
6
 
7
7
  AWS SDK for JavaScript SecurityHub Client for Node.js, Browser and React Native.
8
8
 
9
- <p>Security Hub provides you with a comprehensive view of the security state of
10
- your Amazon Web Services environment and resources. It also provides you with the readiness
11
- status of your environment based on controls from supported security standards. Security Hub collects security data from Amazon Web Services accounts, services, and
12
- integrated third-party products and helps you analyze security trends in your environment
13
- to identify the highest priority security issues. For more information about Security Hub, see the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
14
- <i>Security Hub User
15
- Guide</i>
16
- </a>.</p>
17
- <p>When you use operations in the Security Hub API, the requests are executed only in
9
+ <p>Security Hub provides you with a comprehensive view of your security state in Amazon Web Services and helps
10
+ you assess your Amazon Web Services environment against security industry standards and best practices.</p>
11
+ <p>Security Hub collects security data across Amazon Web Services accounts, Amazon Web Services, and
12
+ supported third-party products and helps you analyze your security trends and identify the highest priority security
13
+ issues.</p>
14
+ <p>To help you manage the security state of your organization, Security Hub supports multiple security standards.
15
+ These include the Amazon Web Services Foundational Security Best Practices (FSBP) standard developed by Amazon Web Services,
16
+ and external compliance frameworks such as the Center for Internet Security (CIS), the Payment Card Industry Data
17
+ Security Standard (PCI DSS), and the National Institute of Standards and Technology (NIST). Each standard includes
18
+ several security controls, each of which represents a security best practice. Security Hub runs checks against
19
+ security controls and generates control findings to help you assess your compliance against security best practices.</p>
20
+ <p>In addition to generating control findings, Security Hub also receives findings from other Amazon Web Services,
21
+ such as Amazon GuardDuty and Amazon Inspector, and
22
+ supported third-party products. This gives you a single pane of glass into a variety of security-related issues. You
23
+ can also send Security Hub findings to other Amazon Web Services and supported third-party products.</p>
24
+ <p>Security Hub offers automation features that help you triage and remediate security issues. For example,
25
+ you can use automation rules to automatically update critical findings when a security check fails. You can also leverage the integration with
26
+ Amazon EventBridge to trigger automatic responses to specific findings.</p>
27
+ <p>This guide, the <i>Security Hub API Reference</i>, provides
28
+ information about the Security Hub API. This includes supported resources, HTTP methods, parameters,
29
+ and schemas. If you're new to Security Hub, you might find it helpful to also review the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
30
+ <i>Security Hub User Guide</i>
31
+ </a>. The
32
+ user guide explains key concepts and provides procedures
33
+ that demonstrate how to use Security Hub features. It also provides information about topics such as
34
+ integrating Security Hub with other Amazon Web Services.</p>
35
+ <p>In addition to interacting with Security Hub by making calls to the Security Hub API, you can
36
+ use a current version of an Amazon Web Services command line tool or SDK. Amazon Web Services provides tools
37
+ and SDKs that consist of libraries and sample code for various languages and platforms, such as PowerShell,
38
+ Java, Go, Python, C++, and .NET. These tools and SDKs provide convenient, programmatic access to
39
+ Security Hub and other Amazon Web Services . They also handle tasks such as signing requests,
40
+ managing errors, and retrying requests automatically. For information about installing and using the Amazon Web Services tools
41
+ and SDKs, see <a href="http://aws.amazon.com/developer/tools/">Tools to Build on Amazon Web Services</a>.</p>
42
+ <p>With the exception of operations that are related to central configuration, Security Hub API requests are executed only in
18
43
  the Amazon Web Services Region that is currently active or in the specific Amazon Web Services Region that you specify in your request. Any configuration or settings change
19
44
  that results from the operation is applied only to that Region. To make the same change in
20
- other Regions, run the same command for each Region in which you want to apply the change.</p>
21
- <p>For example, if your Region is set to <code>us-west-2</code>, when you use <code>CreateMembers</code> to add a member account to Security Hub, the association of
22
- the member account with the administrator account is created only in the <code>us-west-2</code>
23
- Region. Security Hub must be enabled for the member account in the same Region that the invitation
24
- was sent from.</p>
25
- <p>The following throttling limits apply to using Security Hub API operations.</p>
45
+ other Regions, call the same API operation in each Region in which you want to apply the change. When you use central configuration,
46
+ API requests for enabling Security Hub, standards, and controls are executed in the home Region and all linked Regions. For a list of
47
+ central configuration operations, see the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/central-configuration-intro.html#central-configuration-concepts">Central configuration
48
+ terms and concepts</a> section of the <i>Security Hub User Guide</i>.</p>
49
+ <p>The following throttling limits apply to Security Hub API operations.</p>
26
50
  <ul>
27
51
  <li>
28
52
  <p>
@@ -581,23 +581,47 @@ export interface SecurityHub {
581
581
  updateStandardsControl(args: UpdateStandardsControlCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: UpdateStandardsControlCommandOutput) => void): void;
582
582
  }
583
583
  /**
584
- * <p>Security Hub provides you with a comprehensive view of the security state of
585
- * your Amazon Web Services environment and resources. It also provides you with the readiness
586
- * status of your environment based on controls from supported security standards. Security Hub collects security data from Amazon Web Services accounts, services, and
587
- * integrated third-party products and helps you analyze security trends in your environment
588
- * to identify the highest priority security issues. For more information about Security Hub, see the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
589
- * <i>Security Hub User
590
- * Guide</i>
591
- * </a>.</p>
592
- * <p>When you use operations in the Security Hub API, the requests are executed only in
584
+ * <p>Security Hub provides you with a comprehensive view of your security state in Amazon Web Services and helps
585
+ * you assess your Amazon Web Services environment against security industry standards and best practices.</p>
586
+ * <p>Security Hub collects security data across Amazon Web Services accounts, Amazon Web Services, and
587
+ * supported third-party products and helps you analyze your security trends and identify the highest priority security
588
+ * issues.</p>
589
+ * <p>To help you manage the security state of your organization, Security Hub supports multiple security standards.
590
+ * These include the Amazon Web Services Foundational Security Best Practices (FSBP) standard developed by Amazon Web Services,
591
+ * and external compliance frameworks such as the Center for Internet Security (CIS), the Payment Card Industry Data
592
+ * Security Standard (PCI DSS), and the National Institute of Standards and Technology (NIST). Each standard includes
593
+ * several security controls, each of which represents a security best practice. Security Hub runs checks against
594
+ * security controls and generates control findings to help you assess your compliance against security best practices.</p>
595
+ * <p>In addition to generating control findings, Security Hub also receives findings from other Amazon Web Services,
596
+ * such as Amazon GuardDuty and Amazon Inspector, and
597
+ * supported third-party products. This gives you a single pane of glass into a variety of security-related issues. You
598
+ * can also send Security Hub findings to other Amazon Web Services and supported third-party products.</p>
599
+ * <p>Security Hub offers automation features that help you triage and remediate security issues. For example,
600
+ * you can use automation rules to automatically update critical findings when a security check fails. You can also leverage the integration with
601
+ * Amazon EventBridge to trigger automatic responses to specific findings.</p>
602
+ * <p>This guide, the <i>Security Hub API Reference</i>, provides
603
+ * information about the Security Hub API. This includes supported resources, HTTP methods, parameters,
604
+ * and schemas. If you're new to Security Hub, you might find it helpful to also review the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
605
+ * <i>Security Hub User Guide</i>
606
+ * </a>. The
607
+ * user guide explains key concepts and provides procedures
608
+ * that demonstrate how to use Security Hub features. It also provides information about topics such as
609
+ * integrating Security Hub with other Amazon Web Services.</p>
610
+ * <p>In addition to interacting with Security Hub by making calls to the Security Hub API, you can
611
+ * use a current version of an Amazon Web Services command line tool or SDK. Amazon Web Services provides tools
612
+ * and SDKs that consist of libraries and sample code for various languages and platforms, such as PowerShell,
613
+ * Java, Go, Python, C++, and .NET. These tools and SDKs provide convenient, programmatic access to
614
+ * Security Hub and other Amazon Web Services . They also handle tasks such as signing requests,
615
+ * managing errors, and retrying requests automatically. For information about installing and using the Amazon Web Services tools
616
+ * and SDKs, see <a href="http://aws.amazon.com/developer/tools/">Tools to Build on Amazon Web Services</a>.</p>
617
+ * <p>With the exception of operations that are related to central configuration, Security Hub API requests are executed only in
593
618
  * the Amazon Web Services Region that is currently active or in the specific Amazon Web Services Region that you specify in your request. Any configuration or settings change
594
619
  * that results from the operation is applied only to that Region. To make the same change in
595
- * other Regions, run the same command for each Region in which you want to apply the change.</p>
596
- * <p>For example, if your Region is set to <code>us-west-2</code>, when you use <code>CreateMembers</code> to add a member account to Security Hub, the association of
597
- * the member account with the administrator account is created only in the <code>us-west-2</code>
598
- * Region. Security Hub must be enabled for the member account in the same Region that the invitation
599
- * was sent from.</p>
600
- * <p>The following throttling limits apply to using Security Hub API operations.</p>
620
+ * other Regions, call the same API operation in each Region in which you want to apply the change. When you use central configuration,
621
+ * API requests for enabling Security Hub, standards, and controls are executed in the home Region and all linked Regions. For a list of
622
+ * central configuration operations, see the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/central-configuration-intro.html#central-configuration-concepts">Central configuration
623
+ * terms and concepts</a> section of the <i>Security Hub User Guide</i>.</p>
624
+ * <p>The following throttling limits apply to Security Hub API operations.</p>
601
625
  * <ul>
602
626
  * <li>
603
627
  * <p>
@@ -230,23 +230,47 @@ export type SecurityHubClientResolvedConfigType = __SmithyResolvedConfiguration<
230
230
  export interface SecurityHubClientResolvedConfig extends SecurityHubClientResolvedConfigType {
231
231
  }
232
232
  /**
233
- * <p>Security Hub provides you with a comprehensive view of the security state of
234
- * your Amazon Web Services environment and resources. It also provides you with the readiness
235
- * status of your environment based on controls from supported security standards. Security Hub collects security data from Amazon Web Services accounts, services, and
236
- * integrated third-party products and helps you analyze security trends in your environment
237
- * to identify the highest priority security issues. For more information about Security Hub, see the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
238
- * <i>Security Hub User
239
- * Guide</i>
240
- * </a>.</p>
241
- * <p>When you use operations in the Security Hub API, the requests are executed only in
233
+ * <p>Security Hub provides you with a comprehensive view of your security state in Amazon Web Services and helps
234
+ * you assess your Amazon Web Services environment against security industry standards and best practices.</p>
235
+ * <p>Security Hub collects security data across Amazon Web Services accounts, Amazon Web Services, and
236
+ * supported third-party products and helps you analyze your security trends and identify the highest priority security
237
+ * issues.</p>
238
+ * <p>To help you manage the security state of your organization, Security Hub supports multiple security standards.
239
+ * These include the Amazon Web Services Foundational Security Best Practices (FSBP) standard developed by Amazon Web Services,
240
+ * and external compliance frameworks such as the Center for Internet Security (CIS), the Payment Card Industry Data
241
+ * Security Standard (PCI DSS), and the National Institute of Standards and Technology (NIST). Each standard includes
242
+ * several security controls, each of which represents a security best practice. Security Hub runs checks against
243
+ * security controls and generates control findings to help you assess your compliance against security best practices.</p>
244
+ * <p>In addition to generating control findings, Security Hub also receives findings from other Amazon Web Services,
245
+ * such as Amazon GuardDuty and Amazon Inspector, and
246
+ * supported third-party products. This gives you a single pane of glass into a variety of security-related issues. You
247
+ * can also send Security Hub findings to other Amazon Web Services and supported third-party products.</p>
248
+ * <p>Security Hub offers automation features that help you triage and remediate security issues. For example,
249
+ * you can use automation rules to automatically update critical findings when a security check fails. You can also leverage the integration with
250
+ * Amazon EventBridge to trigger automatic responses to specific findings.</p>
251
+ * <p>This guide, the <i>Security Hub API Reference</i>, provides
252
+ * information about the Security Hub API. This includes supported resources, HTTP methods, parameters,
253
+ * and schemas. If you're new to Security Hub, you might find it helpful to also review the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
254
+ * <i>Security Hub User Guide</i>
255
+ * </a>. The
256
+ * user guide explains key concepts and provides procedures
257
+ * that demonstrate how to use Security Hub features. It also provides information about topics such as
258
+ * integrating Security Hub with other Amazon Web Services.</p>
259
+ * <p>In addition to interacting with Security Hub by making calls to the Security Hub API, you can
260
+ * use a current version of an Amazon Web Services command line tool or SDK. Amazon Web Services provides tools
261
+ * and SDKs that consist of libraries and sample code for various languages and platforms, such as PowerShell,
262
+ * Java, Go, Python, C++, and .NET. These tools and SDKs provide convenient, programmatic access to
263
+ * Security Hub and other Amazon Web Services . They also handle tasks such as signing requests,
264
+ * managing errors, and retrying requests automatically. For information about installing and using the Amazon Web Services tools
265
+ * and SDKs, see <a href="http://aws.amazon.com/developer/tools/">Tools to Build on Amazon Web Services</a>.</p>
266
+ * <p>With the exception of operations that are related to central configuration, Security Hub API requests are executed only in
242
267
  * the Amazon Web Services Region that is currently active or in the specific Amazon Web Services Region that you specify in your request. Any configuration or settings change
243
268
  * that results from the operation is applied only to that Region. To make the same change in
244
- * other Regions, run the same command for each Region in which you want to apply the change.</p>
245
- * <p>For example, if your Region is set to <code>us-west-2</code>, when you use <code>CreateMembers</code> to add a member account to Security Hub, the association of
246
- * the member account with the administrator account is created only in the <code>us-west-2</code>
247
- * Region. Security Hub must be enabled for the member account in the same Region that the invitation
248
- * was sent from.</p>
249
- * <p>The following throttling limits apply to using Security Hub API operations.</p>
269
+ * other Regions, call the same API operation in each Region in which you want to apply the change. When you use central configuration,
270
+ * API requests for enabling Security Hub, standards, and controls are executed in the home Region and all linked Regions. For a list of
271
+ * central configuration operations, see the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/central-configuration-intro.html#central-configuration-concepts">Central configuration
272
+ * terms and concepts</a> section of the <i>Security Hub User Guide</i>.</p>
273
+ * <p>The following throttling limits apply to Security Hub API operations.</p>
250
274
  * <ul>
251
275
  * <li>
252
276
  * <p>
@@ -1,21 +1,45 @@
1
1
  /**
2
- * <p>Security Hub provides you with a comprehensive view of the security state of
3
- * your Amazon Web Services environment and resources. It also provides you with the readiness
4
- * status of your environment based on controls from supported security standards. Security Hub collects security data from Amazon Web Services accounts, services, and
5
- * integrated third-party products and helps you analyze security trends in your environment
6
- * to identify the highest priority security issues. For more information about Security Hub, see the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
7
- * <i>Security Hub User
8
- * Guide</i>
9
- * </a>.</p>
10
- * <p>When you use operations in the Security Hub API, the requests are executed only in
2
+ * <p>Security Hub provides you with a comprehensive view of your security state in Amazon Web Services and helps
3
+ * you assess your Amazon Web Services environment against security industry standards and best practices.</p>
4
+ * <p>Security Hub collects security data across Amazon Web Services accounts, Amazon Web Services, and
5
+ * supported third-party products and helps you analyze your security trends and identify the highest priority security
6
+ * issues.</p>
7
+ * <p>To help you manage the security state of your organization, Security Hub supports multiple security standards.
8
+ * These include the Amazon Web Services Foundational Security Best Practices (FSBP) standard developed by Amazon Web Services,
9
+ * and external compliance frameworks such as the Center for Internet Security (CIS), the Payment Card Industry Data
10
+ * Security Standard (PCI DSS), and the National Institute of Standards and Technology (NIST). Each standard includes
11
+ * several security controls, each of which represents a security best practice. Security Hub runs checks against
12
+ * security controls and generates control findings to help you assess your compliance against security best practices.</p>
13
+ * <p>In addition to generating control findings, Security Hub also receives findings from other Amazon Web Services,
14
+ * such as Amazon GuardDuty and Amazon Inspector, and
15
+ * supported third-party products. This gives you a single pane of glass into a variety of security-related issues. You
16
+ * can also send Security Hub findings to other Amazon Web Services and supported third-party products.</p>
17
+ * <p>Security Hub offers automation features that help you triage and remediate security issues. For example,
18
+ * you can use automation rules to automatically update critical findings when a security check fails. You can also leverage the integration with
19
+ * Amazon EventBridge to trigger automatic responses to specific findings.</p>
20
+ * <p>This guide, the <i>Security Hub API Reference</i>, provides
21
+ * information about the Security Hub API. This includes supported resources, HTTP methods, parameters,
22
+ * and schemas. If you're new to Security Hub, you might find it helpful to also review the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
23
+ * <i>Security Hub User Guide</i>
24
+ * </a>. The
25
+ * user guide explains key concepts and provides procedures
26
+ * that demonstrate how to use Security Hub features. It also provides information about topics such as
27
+ * integrating Security Hub with other Amazon Web Services.</p>
28
+ * <p>In addition to interacting with Security Hub by making calls to the Security Hub API, you can
29
+ * use a current version of an Amazon Web Services command line tool or SDK. Amazon Web Services provides tools
30
+ * and SDKs that consist of libraries and sample code for various languages and platforms, such as PowerShell,
31
+ * Java, Go, Python, C++, and .NET. These tools and SDKs provide convenient, programmatic access to
32
+ * Security Hub and other Amazon Web Services . They also handle tasks such as signing requests,
33
+ * managing errors, and retrying requests automatically. For information about installing and using the Amazon Web Services tools
34
+ * and SDKs, see <a href="http://aws.amazon.com/developer/tools/">Tools to Build on Amazon Web Services</a>.</p>
35
+ * <p>With the exception of operations that are related to central configuration, Security Hub API requests are executed only in
11
36
  * the Amazon Web Services Region that is currently active or in the specific Amazon Web Services Region that you specify in your request. Any configuration or settings change
12
37
  * that results from the operation is applied only to that Region. To make the same change in
13
- * other Regions, run the same command for each Region in which you want to apply the change.</p>
14
- * <p>For example, if your Region is set to <code>us-west-2</code>, when you use <code>CreateMembers</code> to add a member account to Security Hub, the association of
15
- * the member account with the administrator account is created only in the <code>us-west-2</code>
16
- * Region. Security Hub must be enabled for the member account in the same Region that the invitation
17
- * was sent from.</p>
18
- * <p>The following throttling limits apply to using Security Hub API operations.</p>
38
+ * other Regions, call the same API operation in each Region in which you want to apply the change. When you use central configuration,
39
+ * API requests for enabling Security Hub, standards, and controls are executed in the home Region and all linked Regions. For a list of
40
+ * central configuration operations, see the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/central-configuration-intro.html#central-configuration-concepts">Central configuration
41
+ * terms and concepts</a> section of the <i>Security Hub User Guide</i>.</p>
42
+ * <p>The following throttling limits apply to Security Hub API operations.</p>
19
43
  * <ul>
20
44
  * <li>
21
45
  * <p>