@aws-sdk/client-securityhub 3.774.0 → 3.777.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (86) hide show
  1. package/dist-cjs/auth/httpAuthSchemeProvider.js +1 -3
  2. package/dist-cjs/index.js +17 -18
  3. package/dist-es/SecurityHubClient.js +2 -1
  4. package/dist-es/auth/httpAuthSchemeProvider.js +1 -3
  5. package/dist-es/endpoint/EndpointParameters.js +2 -3
  6. package/dist-es/runtimeExtensions.js +2 -14
  7. package/dist-types/commands/AcceptAdministratorInvitationCommand.d.ts +8 -5
  8. package/dist-types/commands/AcceptInvitationCommand.d.ts +1 -0
  9. package/dist-types/commands/BatchDeleteAutomationRulesCommand.d.ts +9 -9
  10. package/dist-types/commands/BatchDisableStandardsCommand.d.ts +9 -9
  11. package/dist-types/commands/BatchEnableStandardsCommand.d.ts +10 -10
  12. package/dist-types/commands/BatchGetAutomationRulesCommand.d.ts +49 -49
  13. package/dist-types/commands/BatchGetConfigurationPolicyAssociationsCommand.d.ts +22 -22
  14. package/dist-types/commands/BatchGetSecurityControlsCommand.d.ts +33 -33
  15. package/dist-types/commands/BatchGetStandardsControlAssociationsCommand.d.ts +1 -50
  16. package/dist-types/commands/BatchImportFindingsCommand.d.ts +26 -26
  17. package/dist-types/commands/BatchUpdateAutomationRulesCommand.d.ts +10 -10
  18. package/dist-types/commands/BatchUpdateFindingsCommand.d.ts +30 -30
  19. package/dist-types/commands/BatchUpdateStandardsControlAssociationsCommand.d.ts +20 -20
  20. package/dist-types/commands/CreateActionTargetCommand.d.ts +7 -7
  21. package/dist-types/commands/CreateAutomationRuleCommand.d.ts +35 -35
  22. package/dist-types/commands/CreateConfigurationPolicyCommand.d.ts +37 -37
  23. package/dist-types/commands/CreateFindingAggregatorCommand.d.ts +9 -9
  24. package/dist-types/commands/CreateInsightCommand.d.ts +13 -13
  25. package/dist-types/commands/CreateMembersCommand.d.ts +7 -7
  26. package/dist-types/commands/DeclineInvitationsCommand.d.ts +5 -5
  27. package/dist-types/commands/DeleteActionTargetCommand.d.ts +5 -5
  28. package/dist-types/commands/DeleteConfigurationPolicyCommand.d.ts +7 -4
  29. package/dist-types/commands/DeleteFindingAggregatorCommand.d.ts +7 -4
  30. package/dist-types/commands/DeleteInsightCommand.d.ts +5 -5
  31. package/dist-types/commands/DeleteInvitationsCommand.d.ts +5 -5
  32. package/dist-types/commands/DeleteMembersCommand.d.ts +5 -5
  33. package/dist-types/commands/DescribeActionTargetsCommand.d.ts +8 -8
  34. package/dist-types/commands/DescribeHubCommand.d.ts +8 -8
  35. package/dist-types/commands/DescribeOrganizationConfigurationCommand.d.ts +10 -10
  36. package/dist-types/commands/DescribeProductsCommand.d.ts +17 -17
  37. package/dist-types/commands/DescribeStandardsCommand.d.ts +21 -21
  38. package/dist-types/commands/DescribeStandardsControlsCommand.d.ts +1 -46
  39. package/dist-types/commands/DisableImportFindingsForProductCommand.d.ts +7 -4
  40. package/dist-types/commands/DisableOrganizationAdminAccountCommand.d.ts +7 -4
  41. package/dist-types/commands/DisableSecurityHubCommand.d.ts +7 -4
  42. package/dist-types/commands/DisassociateFromAdministratorAccountCommand.d.ts +7 -4
  43. package/dist-types/commands/DisassociateFromMasterAccountCommand.d.ts +1 -0
  44. package/dist-types/commands/DisassociateMembersCommand.d.ts +7 -4
  45. package/dist-types/commands/EnableImportFindingsForProductCommand.d.ts +5 -5
  46. package/dist-types/commands/EnableOrganizationAdminAccountCommand.d.ts +7 -4
  47. package/dist-types/commands/EnableSecurityHubCommand.d.ts +9 -6
  48. package/dist-types/commands/GetAdministratorAccountCommand.d.ts +1 -19
  49. package/dist-types/commands/GetConfigurationPolicyAssociationCommand.d.ts +12 -12
  50. package/dist-types/commands/GetConfigurationPolicyCommand.d.ts +23 -23
  51. package/dist-types/commands/GetEnabledStandardsCommand.d.ts +9 -9
  52. package/dist-types/commands/GetFindingAggregatorCommand.d.ts +8 -8
  53. package/dist-types/commands/GetFindingHistoryCommand.d.ts +1 -42
  54. package/dist-types/commands/GetFindingsCommand.d.ts +63 -63
  55. package/dist-types/commands/GetInsightResultsCommand.d.ts +12 -12
  56. package/dist-types/commands/GetInsightsCommand.d.ts +15 -15
  57. package/dist-types/commands/GetInvitationsCountCommand.d.ts +7 -7
  58. package/dist-types/commands/GetMasterAccountCommand.d.ts +1 -0
  59. package/dist-types/commands/GetMembersCommand.d.ts +1 -37
  60. package/dist-types/commands/GetSecurityControlDefinitionCommand.d.ts +19 -19
  61. package/dist-types/commands/InviteMembersCommand.d.ts +5 -5
  62. package/dist-types/commands/ListAutomationRulesCommand.d.ts +23 -23
  63. package/dist-types/commands/ListConfigurationPoliciesCommand.d.ts +13 -13
  64. package/dist-types/commands/ListConfigurationPolicyAssociationsCommand.d.ts +15 -15
  65. package/dist-types/commands/ListEnabledProductsForImportCommand.d.ts +5 -5
  66. package/dist-types/commands/ListFindingAggregatorsCommand.d.ts +6 -6
  67. package/dist-types/commands/ListInvitationsCommand.d.ts +1 -21
  68. package/dist-types/commands/ListMembersCommand.d.ts +1 -31
  69. package/dist-types/commands/ListOrganizationAdminAccountsCommand.d.ts +7 -7
  70. package/dist-types/commands/ListSecurityControlDefinitionsCommand.d.ts +28 -28
  71. package/dist-types/commands/ListStandardsControlAssociationsCommand.d.ts +1 -44
  72. package/dist-types/commands/ListTagsForResourceCommand.d.ts +7 -7
  73. package/dist-types/commands/StartConfigurationPolicyAssociationCommand.d.ts +13 -13
  74. package/dist-types/commands/StartConfigurationPolicyDisassociationCommand.d.ts +9 -6
  75. package/dist-types/commands/TagResourceCommand.d.ts +10 -7
  76. package/dist-types/commands/UntagResourceCommand.d.ts +8 -5
  77. package/dist-types/commands/UpdateActionTargetCommand.d.ts +9 -6
  78. package/dist-types/commands/UpdateConfigurationPolicyCommand.d.ts +39 -39
  79. package/dist-types/commands/UpdateFindingAggregatorCommand.d.ts +10 -10
  80. package/dist-types/commands/UpdateFindingsCommand.d.ts +1 -0
  81. package/dist-types/commands/UpdateInsightCommand.d.ts +15 -12
  82. package/dist-types/commands/UpdateOrganizationConfigurationCommand.d.ts +10 -7
  83. package/dist-types/commands/UpdateSecurityControlCommand.d.ts +13 -10
  84. package/dist-types/commands/UpdateSecurityHubConfigurationCommand.d.ts +8 -5
  85. package/dist-types/commands/UpdateStandardsControlCommand.d.ts +9 -6
  86. package/package.json +33 -33
@@ -112,65 +112,65 @@ declare const BatchGetSecurityControlsCommand_base: {
112
112
  * @throws {@link SecurityHubServiceException}
113
113
  * <p>Base exception class for all service exceptions from SecurityHub service.</p>
114
114
  *
115
- * @public
115
+ *
116
116
  * @example To get security control details
117
117
  * ```javascript
118
118
  * // The following example gets details for the specified controls in the current AWS account and AWS Region.
119
119
  * const input = {
120
- * "SecurityControlIds": [
120
+ * SecurityControlIds: [
121
121
  * "ACM.1",
122
122
  * "APIGateway.1"
123
123
  * ]
124
124
  * };
125
125
  * const command = new BatchGetSecurityControlsCommand(input);
126
126
  * const response = await client.send(command);
127
- * /* response ==
127
+ * /* response is
128
128
  * {
129
- * "SecurityControls": [
129
+ * SecurityControls: [
130
130
  * {
131
- * "Description": "This AWS control checks whether ACM Certificates in your account are marked for expiration within a specified time period. Certificates provided by ACM are automatically renewed. ACM does not automatically renew certificates that you import.",
132
- * "LastUpdateReason": "Stayed with default value",
133
- * "Parameters": {
134
- * "daysToExpiration": {
135
- * "Value": {
136
- * "Integer": 30
131
+ * Description: "This AWS control checks whether ACM Certificates in your account are marked for expiration within a specified time period. Certificates provided by ACM are automatically renewed. ACM does not automatically renew certificates that you import.",
132
+ * LastUpdateReason: "Stayed with default value",
133
+ * Parameters: {
134
+ * daysToExpiration: {
135
+ * Value: {
136
+ * Integer: 30
137
137
  * },
138
- * "ValueType": "DEFAULT"
138
+ * ValueType: "DEFAULT"
139
139
  * }
140
140
  * },
141
- * "RemediationUrl": "https://docs.aws.amazon.com/console/securityhub/ACM.1/remediation",
142
- * "SecurityControlArn": "arn:aws:securityhub:us-west-2:123456789012:security-control/ACM.1",
143
- * "SecurityControlId": "ACM.1",
144
- * "SecurityControlStatus": "ENABLED",
145
- * "SeverityRating": "MEDIUM",
146
- * "Title": "Imported and ACM-issued certificates should be renewed after a specified time period",
147
- * "UpdateStatus": "UPDATING"
141
+ * RemediationUrl: "https://docs.aws.amazon.com/console/securityhub/ACM.1/remediation",
142
+ * SecurityControlArn: "arn:aws:securityhub:us-west-2:123456789012:security-control/ACM.1",
143
+ * SecurityControlId: "ACM.1",
144
+ * SecurityControlStatus: "ENABLED",
145
+ * SeverityRating: "MEDIUM",
146
+ * Title: "Imported and ACM-issued certificates should be renewed after a specified time period",
147
+ * UpdateStatus: "UPDATING"
148
148
  * },
149
149
  * {
150
- * "Description": "This control checks whether all stages of Amazon API Gateway REST and WebSocket APIs have logging enabled. The control fails if logging is not enabled for all methods of a stage or if loggingLevel is neither ERROR nor INFO.",
151
- * "LastUpdateReason": "Updated control parameters to comply with internal requirements",
152
- * "Parameters": {
153
- * "loggingLevel": {
154
- * "Value": {
155
- * "Enum": "ERROR"
150
+ * Description: "This control checks whether all stages of Amazon API Gateway REST and WebSocket APIs have logging enabled. The control fails if logging is not enabled for all methods of a stage or if loggingLevel is neither ERROR nor INFO.",
151
+ * LastUpdateReason: "Updated control parameters to comply with internal requirements",
152
+ * Parameters: {
153
+ * loggingLevel: {
154
+ * Value: {
155
+ * Enum: "ERROR"
156
156
  * },
157
- * "ValueType": "CUSTOM"
157
+ * ValueType: "CUSTOM"
158
158
  * }
159
159
  * },
160
- * "RemediationUrl": "https://docs.aws.amazon.com/console/securityhub/APIGateway.1/remediation",
161
- * "SecurityControlArn": "arn:aws:securityhub:us-west-2:123456789012:security-control/APIGateway.1",
162
- * "SecurityControlId": "APIGateway.1",
163
- * "SecurityControlStatus": "ENABLED",
164
- * "SeverityRating": "MEDIUM",
165
- * "Title": "API Gateway REST and WebSocket API execution logging should be enabled",
166
- * "UpdateStatus": "UPDATING"
160
+ * RemediationUrl: "https://docs.aws.amazon.com/console/securityhub/APIGateway.1/remediation",
161
+ * SecurityControlArn: "arn:aws:securityhub:us-west-2:123456789012:security-control/APIGateway.1",
162
+ * SecurityControlId: "APIGateway.1",
163
+ * SecurityControlStatus: "ENABLED",
164
+ * SeverityRating: "MEDIUM",
165
+ * Title: "API Gateway REST and WebSocket API execution logging should be enabled",
166
+ * UpdateStatus: "UPDATING"
167
167
  * }
168
168
  * ]
169
169
  * }
170
170
  * *\/
171
- * // example id: to-get-security-control-details--1683234478355
172
171
  * ```
173
172
  *
173
+ * @public
174
174
  */
175
175
  export declare class BatchGetSecurityControlsCommand extends BatchGetSecurityControlsCommand_base {
176
176
  /** @internal type navigation helper, not in runtime. */
@@ -105,57 +105,8 @@ declare const BatchGetStandardsControlAssociationsCommand_base: {
105
105
  * @throws {@link SecurityHubServiceException}
106
106
  * <p>Base exception class for all service exceptions from SecurityHub service.</p>
107
107
  *
108
- * @public
109
- * @example To get enablement status of a batch of controls
110
- * ```javascript
111
- * // The following example retrieves the enablement status of the specified controls in the specified standards.
112
- * const input = {
113
- * "StandardsControlAssociationIds": [
114
- * {
115
- * "SecurityControlId": "CloudTrail.1",
116
- * "StandardsArn": "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0"
117
- * },
118
- * {
119
- * "SecurityControlId": "CloudWatch.12",
120
- * "StandardsArn": "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0"
121
- * }
122
- * ]
123
- * };
124
- * const command = new BatchGetStandardsControlAssociationsCommand(input);
125
- * const response = await client.send(command);
126
- * /* response ==
127
- * {
128
- * "StandardsControlAssociationDetails": [
129
- * {
130
- * "AssociationStatus": "ENABLED",
131
- * "RelatedRequirements": [
132
- * "CIS AWS Foundations 2.1"
133
- * ],
134
- * "SecurityControlArn": "arn:aws:securityhub:us-west-2:110479873537:security-control/CloudTrail.1",
135
- * "SecurityControlId": "CloudTrail.1",
136
- * "StandardsArn": "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0",
137
- * "StandardsControlDescription": "AWS CloudTrail is a web service that records AWS API calls for your account and delivers log files to you. The recorded information includes the identity of the API caller, the time of the API call, the source IP address of the API caller, the request parameters, and the response elements returned by the AWS service.",
138
- * "StandardsControlTitle": "Ensure CloudTrail is enabled in all regions",
139
- * "UpdatedAt": "2022-01-13T18:52:29.539000+00:00"
140
- * },
141
- * {
142
- * "AssociationStatus": "ENABLED",
143
- * "RelatedRequirements": [
144
- * "CIS AWS Foundations 3.12"
145
- * ],
146
- * "SecurityControlArn": "arn:aws:securityhub:us-west-2:110479873537:security-control/CloudWatch.12",
147
- * "SecurityControlId": "CloudWatch.12",
148
- * "StandardsArn": "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0",
149
- * "StandardsControlDescription": "Real-time monitoring of API calls can be achieved by directing CloudTrail Logs to CloudWatch Logs and establishing corresponding metric filters and alarms. Network gateways are required to send/receive traffic to a destination outside of a VPC. It is recommended that a metric filter and alarm be established for changes to network gateways.",
150
- * "StandardsControlTitle": "Ensure a log metric filter and alarm exist for changes to network gateways",
151
- * "UpdatedAt": "2022-01-13T18:52:29.686000+00:00"
152
- * }
153
- * ]
154
- * }
155
- * *\/
156
- * // example id: to-get-enablement-status-of-a-batch-of-controls-1683301618357
157
- * ```
158
108
  *
109
+ * @public
159
110
  */
160
111
  export declare class BatchGetStandardsControlAssociationsCommand extends BatchGetStandardsControlAssociationsCommand_base {
161
112
  /** @internal type navigation helper, not in runtime. */
@@ -4413,54 +4413,54 @@ declare const BatchImportFindingsCommand_base: {
4413
4413
  * @throws {@link SecurityHubServiceException}
4414
4414
  * <p>Base exception class for all service exceptions from SecurityHub service.</p>
4415
4415
  *
4416
- * @public
4416
+ *
4417
4417
  * @example To import security findings from a third party provider to Security Hub
4418
4418
  * ```javascript
4419
4419
  * // The following example imports findings from a third party provider to Security Hub.
4420
4420
  * const input = {
4421
- * "Findings": [
4421
+ * Findings: [
4422
4422
  * {
4423
- * "AwsAccountId": "123456789012",
4424
- * "CreatedAt": "2020-05-27T17:05:54.832Z",
4425
- * "Description": "Vulnerability in a CloudTrail trail",
4426
- * "FindingProviderFields": {
4427
- * "Severity": {
4428
- * "Label": "LOW",
4429
- * "Original": "10"
4423
+ * AwsAccountId: "123456789012",
4424
+ * CreatedAt: "2020-05-27T17:05:54.832Z",
4425
+ * Description: "Vulnerability in a CloudTrail trail",
4426
+ * FindingProviderFields: {
4427
+ * Severity: {
4428
+ * Label: "LOW",
4429
+ * Original: "10"
4430
4430
  * },
4431
- * "Types": [
4431
+ * Types: [
4432
4432
  * "Software and Configuration Checks/Vulnerabilities/CVE"
4433
4433
  * ]
4434
4434
  * },
4435
- * "GeneratorId": "TestGeneratorId",
4436
- * "Id": "Id1",
4437
- * "ProductArn": "arn:aws:securityhub:us-west-1:123456789012:product/123456789012/default",
4438
- * "Resources": [
4435
+ * GeneratorId: "TestGeneratorId",
4436
+ * Id: "Id1",
4437
+ * ProductArn: "arn:aws:securityhub:us-west-1:123456789012:product/123456789012/default",
4438
+ * Resources: [
4439
4439
  * {
4440
- * "Id": "arn:aws:cloudtrail:us-west-1:123456789012:trail/TrailName",
4441
- * "Partition": "aws",
4442
- * "Region": "us-west-1",
4443
- * "Type": "AwsCloudTrailTrail"
4440
+ * Id: "arn:aws:cloudtrail:us-west-1:123456789012:trail/TrailName",
4441
+ * Partition: "aws",
4442
+ * Region: "us-west-1",
4443
+ * Type: "AwsCloudTrailTrail"
4444
4444
  * }
4445
4445
  * ],
4446
- * "SchemaVersion": "2018-10-08",
4447
- * "Title": "CloudTrail trail vulnerability",
4448
- * "UpdatedAt": "2020-06-02T16:05:54.832Z"
4446
+ * SchemaVersion: "2018-10-08",
4447
+ * Title: "CloudTrail trail vulnerability",
4448
+ * UpdatedAt: "2020-06-02T16:05:54.832Z"
4449
4449
  * }
4450
4450
  * ]
4451
4451
  * };
4452
4452
  * const command = new BatchImportFindingsCommand(input);
4453
4453
  * const response = await client.send(command);
4454
- * /* response ==
4454
+ * /* response is
4455
4455
  * {
4456
- * "FailedCount": 123,
4457
- * "FailedFindings": [],
4458
- * "SuccessCount": 123
4456
+ * FailedCount: 123,
4457
+ * FailedFindings: [],
4458
+ * SuccessCount: 123
4459
4459
  * }
4460
4460
  * *\/
4461
- * // example id: to-import-security-findings-from-a-third-party-provider-to-security-hub-1675090935260
4462
4461
  * ```
4463
4462
  *
4463
+ * @public
4464
4464
  */
4465
4465
  export declare class BatchImportFindingsCommand extends BatchImportFindingsCommand_base {
4466
4466
  /** @internal type navigation helper, not in runtime. */
@@ -270,36 +270,36 @@ declare const BatchUpdateAutomationRulesCommand_base: {
270
270
  * @throws {@link SecurityHubServiceException}
271
271
  * <p>Base exception class for all service exceptions from SecurityHub service.</p>
272
272
  *
273
- * @public
273
+ *
274
274
  * @example To update one ore more automation rules
275
275
  * ```javascript
276
276
  * // The following example updates the specified automation rules.
277
277
  * const input = {
278
- * "UpdateAutomationRulesRequestItems": [
278
+ * UpdateAutomationRulesRequestItems: [
279
279
  * {
280
- * "RuleArn": "arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
281
- * "RuleOrder": 15,
282
- * "RuleStatus": "ENABLED"
280
+ * RuleArn: "arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
281
+ * RuleOrder: 15,
282
+ * RuleStatus: "ENABLED"
283
283
  * },
284
284
  * {
285
- * "RuleArn": "arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE22222",
286
- * "RuleStatus": "DISABLED"
285
+ * RuleArn: "arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE22222",
286
+ * RuleStatus: "DISABLED"
287
287
  * }
288
288
  * ]
289
289
  * };
290
290
  * const command = new BatchUpdateAutomationRulesCommand(input);
291
291
  * const response = await client.send(command);
292
- * /* response ==
292
+ * /* response is
293
293
  * {
294
- * "ProcessedAutomationRules": [
294
+ * ProcessedAutomationRules: [
295
295
  * "arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
296
296
  * "arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE22222"
297
297
  * ]
298
298
  * }
299
299
  * *\/
300
- * // example id: to-update-one-ore-more-automation-rules-1684771025347
301
300
  * ```
302
301
  *
302
+ * @public
303
303
  */
304
304
  export declare class BatchUpdateAutomationRulesCommand extends BatchUpdateAutomationRulesCommand_base {
305
305
  /** @internal type navigation helper, not in runtime. */
@@ -173,67 +173,67 @@ declare const BatchUpdateFindingsCommand_base: {
173
173
  * @throws {@link SecurityHubServiceException}
174
174
  * <p>Base exception class for all service exceptions from SecurityHub service.</p>
175
175
  *
176
- * @public
176
+ *
177
177
  * @example To update Security Hub findings
178
178
  * ```javascript
179
179
  * // The following example updates Security Hub findings. The finding identifier parameter specifies which findings to update. Only specific finding fields can be updated with this operation.
180
180
  * const input = {
181
- * "Confidence": 80,
182
- * "Criticality": 80,
183
- * "FindingIdentifiers": [
181
+ * Confidence: 80,
182
+ * Criticality: 80,
183
+ * FindingIdentifiers: [
184
184
  * {
185
- * "Id": "arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1/PCI.Lambda.2/finding/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
186
- * "ProductArn": "arn:aws:securityhub:us-west-1::product/aws/securityhub"
185
+ * Id: "arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1/PCI.Lambda.2/finding/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
186
+ * ProductArn: "arn:aws:securityhub:us-west-1::product/aws/securityhub"
187
187
  * },
188
188
  * {
189
- * "Id": "arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1/PCI.Lambda.2/finding/a1b2c3d4-5678-90ab-cdef-EXAMPLE22222",
190
- * "ProductArn": "arn:aws:securityhub:us-west-1::product/aws/securityhub"
189
+ * Id: "arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1/PCI.Lambda.2/finding/a1b2c3d4-5678-90ab-cdef-EXAMPLE22222",
190
+ * ProductArn: "arn:aws:securityhub:us-west-1::product/aws/securityhub"
191
191
  * }
192
192
  * ],
193
- * "Note": {
194
- * "Text": "Known issue that is not a risk.",
195
- * "UpdatedBy": "user1"
193
+ * Note: {
194
+ * Text: "Known issue that is not a risk.",
195
+ * UpdatedBy: "user1"
196
196
  * },
197
- * "RelatedFindings": [
197
+ * RelatedFindings: [
198
198
  * {
199
- * "Id": "arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1/PCI.Lambda.2/finding/a1b2c3d4-5678-90ab-cdef-EXAMPLE33333",
200
- * "ProductArn": "arn:aws:securityhub:us-west-1::product/aws/securityhub"
199
+ * Id: "arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1/PCI.Lambda.2/finding/a1b2c3d4-5678-90ab-cdef-EXAMPLE33333",
200
+ * ProductArn: "arn:aws:securityhub:us-west-1::product/aws/securityhub"
201
201
  * }
202
202
  * ],
203
- * "Severity": {
204
- * "Label": "LOW"
203
+ * Severity: {
204
+ * Label: "LOW"
205
205
  * },
206
- * "Types": [
206
+ * Types: [
207
207
  * "Software and Configuration Checks/Vulnerabilities/CVE"
208
208
  * ],
209
- * "UserDefinedFields": {
210
- * "reviewedByCio": "true"
209
+ * UserDefinedFields: {
210
+ * reviewedByCio: "true"
211
211
  * },
212
- * "VerificationState": "TRUE_POSITIVE",
213
- * "Workflow": {
214
- * "Status": "RESOLVED"
212
+ * VerificationState: "TRUE_POSITIVE",
213
+ * Workflow: {
214
+ * Status: "RESOLVED"
215
215
  * }
216
216
  * };
217
217
  * const command = new BatchUpdateFindingsCommand(input);
218
218
  * const response = await client.send(command);
219
- * /* response ==
219
+ * /* response is
220
220
  * {
221
- * "ProcessedFindings": [
221
+ * ProcessedFindings: [
222
222
  * {
223
- * "Id": "arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1/PCI.Lambda.2/finding/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
224
- * "ProductArn": "arn:aws:securityhub:us-west-1::product/aws/securityhub"
223
+ * Id: "arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1/PCI.Lambda.2/finding/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
224
+ * ProductArn: "arn:aws:securityhub:us-west-1::product/aws/securityhub"
225
225
  * },
226
226
  * {
227
- * "Id": "arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1/PCI.Lambda.2/finding/a1b2c3d4-5678-90ab-cdef-EXAMPLE22222",
228
- * "ProductArn": "arn:aws:securityhub:us-west-1::product/aws/securityhub"
227
+ * Id: "arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1/PCI.Lambda.2/finding/a1b2c3d4-5678-90ab-cdef-EXAMPLE22222",
228
+ * ProductArn: "arn:aws:securityhub:us-west-1::product/aws/securityhub"
229
229
  * }
230
230
  * ],
231
- * "UnprocessedFindings": []
231
+ * UnprocessedFindings: []
232
232
  * }
233
233
  * *\/
234
- * // example id: to-update-security-hub-findings-1675183938248
235
234
  * ```
236
235
  *
236
+ * @public
237
237
  */
238
238
  export declare class BatchUpdateFindingsCommand extends BatchUpdateFindingsCommand_base {
239
239
  /** @internal type navigation helper, not in runtime. */
@@ -91,47 +91,47 @@ declare const BatchUpdateStandardsControlAssociationsCommand_base: {
91
91
  * @throws {@link SecurityHubServiceException}
92
92
  * <p>Base exception class for all service exceptions from SecurityHub service.</p>
93
93
  *
94
- * @public
94
+ *
95
95
  * @example To update enablement status of a batch of controls
96
96
  * ```javascript
97
97
  * // The following example disables CloudWatch.12 in CIS AWS Foundations Benchmark v1.2.0. The example returns an error for CloudTrail.1 because an invalid standard ARN is provided.
98
98
  * const input = {
99
- * "StandardsControlAssociationUpdates": [
99
+ * StandardsControlAssociationUpdates: [
100
100
  * {
101
- * "AssociationStatus": "DISABLED",
102
- * "SecurityControlId": "CloudTrail.1",
103
- * "StandardsArn": "arn:aws:securityhub:::ruleset/sample-standard/v/1.1.0",
104
- * "UpdatedReason": "Not relevant to environment"
101
+ * AssociationStatus: "DISABLED",
102
+ * SecurityControlId: "CloudTrail.1",
103
+ * StandardsArn: "arn:aws:securityhub:::ruleset/sample-standard/v/1.1.0",
104
+ * UpdatedReason: "Not relevant to environment"
105
105
  * },
106
106
  * {
107
- * "AssociationStatus": "DISABLED",
108
- * "SecurityControlId": "CloudWatch.12",
109
- * "StandardsArn": "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0",
110
- * "UpdatedReason": "Not relevant to environment"
107
+ * AssociationStatus: "DISABLED",
108
+ * SecurityControlId: "CloudWatch.12",
109
+ * StandardsArn: "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0",
110
+ * UpdatedReason: "Not relevant to environment"
111
111
  * }
112
112
  * ]
113
113
  * };
114
114
  * const command = new BatchUpdateStandardsControlAssociationsCommand(input);
115
115
  * const response = await client.send(command);
116
- * /* response ==
116
+ * /* response is
117
117
  * {
118
- * "UnprocessedAssociationUpdates": [
118
+ * UnprocessedAssociationUpdates: [
119
119
  * {
120
- * "ErrorCode": "INVALID_INPUT",
121
- * "ErrorReason": "Invalid Standards Arn: 'arn:aws:securityhub:::ruleset/sample-standard/v/1.1.0'",
122
- * "StandardsControlAssociationUpdate": {
123
- * "AssociationStatus": "DISABLED",
124
- * "SecurityControlId": "CloudTrail.1",
125
- * "StandardsArn": "arn:aws:securityhub:::ruleset/sample-standard/v/1.1.0",
126
- * "UpdatedReason": "Test Reason"
120
+ * ErrorCode: "INVALID_INPUT",
121
+ * ErrorReason: "Invalid Standards Arn: 'arn:aws:securityhub:::ruleset/sample-standard/v/1.1.0'",
122
+ * StandardsControlAssociationUpdate: {
123
+ * AssociationStatus: "DISABLED",
124
+ * SecurityControlId: "CloudTrail.1",
125
+ * StandardsArn: "arn:aws:securityhub:::ruleset/sample-standard/v/1.1.0",
126
+ * UpdatedReason: "Test Reason"
127
127
  * }
128
128
  * }
129
129
  * ]
130
130
  * }
131
131
  * *\/
132
- * // example id: to-update-enablement-status-of-a-batch-of-controls-1683300378416
133
132
  * ```
134
133
  *
134
+ * @public
135
135
  */
136
136
  export declare class BatchUpdateStandardsControlAssociationsCommand extends BatchUpdateStandardsControlAssociationsCommand_base {
137
137
  /** @internal type navigation helper, not in runtime. */
@@ -75,25 +75,25 @@ declare const CreateActionTargetCommand_base: {
75
75
  * @throws {@link SecurityHubServiceException}
76
76
  * <p>Base exception class for all service exceptions from SecurityHub service.</p>
77
77
  *
78
- * @public
78
+ *
79
79
  * @example To create a custom action target
80
80
  * ```javascript
81
81
  * // The following example creates a custom action target in Security Hub. Custom actions on findings and insights automatically trigger actions in Amazon CloudWatch Events.
82
82
  * const input = {
83
- * "Description": "Action to send the finding for remediation tracking",
84
- * "Id": "Remediation",
85
- * "Name": "Send to remediation"
83
+ * Description: "Action to send the finding for remediation tracking",
84
+ * Id: "Remediation",
85
+ * Name: "Send to remediation"
86
86
  * };
87
87
  * const command = new CreateActionTargetCommand(input);
88
88
  * const response = await client.send(command);
89
- * /* response ==
89
+ * /* response is
90
90
  * {
91
- * "ActionTargetArn": "arn:aws:securityhub:us-west-1:123456789012:action/custom/Remediation"
91
+ * ActionTargetArn: "arn:aws:securityhub:us-west-1:123456789012:action/custom/Remediation"
92
92
  * }
93
93
  * *\/
94
- * // example id: to-create-a-custom-action-target-1675184966299
95
94
  * ```
96
95
  *
96
+ * @public
97
97
  */
98
98
  export declare class CreateActionTargetCommand extends CreateActionTargetCommand_base {
99
99
  /** @internal type navigation helper, not in runtime. */
@@ -258,76 +258,76 @@ declare const CreateAutomationRuleCommand_base: {
258
258
  * @throws {@link SecurityHubServiceException}
259
259
  * <p>Base exception class for all service exceptions from SecurityHub service.</p>
260
260
  *
261
- * @public
261
+ *
262
262
  * @example To create an automation rule
263
263
  * ```javascript
264
264
  * // The following example creates an automation rule.
265
265
  * const input = {
266
- * "Actions": [
266
+ * Actions: [
267
267
  * {
268
- * "FindingFieldsUpdate": {
269
- * "Note": {
270
- * "Text": "This is a critical S3 bucket, please look into this ASAP",
271
- * "UpdatedBy": "test-user"
268
+ * FindingFieldsUpdate: {
269
+ * Note: {
270
+ * Text: "This is a critical S3 bucket, please look into this ASAP",
271
+ * UpdatedBy: "test-user"
272
272
  * },
273
- * "Severity": {
274
- * "Label": "CRITICAL"
273
+ * Severity: {
274
+ * Label: "CRITICAL"
275
275
  * }
276
276
  * },
277
- * "Type": "FINDING_FIELDS_UPDATE"
277
+ * Type: "FINDING_FIELDS_UPDATE"
278
278
  * }
279
279
  * ],
280
- * "Criteria": {
281
- * "ComplianceStatus": [
280
+ * Criteria: {
281
+ * ComplianceStatus: [
282
282
  * {
283
- * "Comparison": "EQUALS",
284
- * "Value": "FAILED"
283
+ * Comparison: "EQUALS",
284
+ * Value: "FAILED"
285
285
  * }
286
286
  * ],
287
- * "ProductName": [
287
+ * ProductName: [
288
288
  * {
289
- * "Comparison": "EQUALS",
290
- * "Value": "Security Hub"
289
+ * Comparison: "EQUALS",
290
+ * Value: "Security Hub"
291
291
  * }
292
292
  * ],
293
- * "RecordState": [
293
+ * RecordState: [
294
294
  * {
295
- * "Comparison": "EQUALS",
296
- * "Value": "ACTIVE"
295
+ * Comparison: "EQUALS",
296
+ * Value: "ACTIVE"
297
297
  * }
298
298
  * ],
299
- * "ResourceId": [
299
+ * ResourceId: [
300
300
  * {
301
- * "Comparison": "EQUALS",
302
- * "Value": "arn:aws:s3:::examplebucket/developers/design_info.doc"
301
+ * Comparison: "EQUALS",
302
+ * Value: "arn:aws:s3:::examplebucket/developers/design_info.doc"
303
303
  * }
304
304
  * ],
305
- * "WorkflowStatus": [
305
+ * WorkflowStatus: [
306
306
  * {
307
- * "Comparison": "EQUALS",
308
- * "Value": "NEW"
307
+ * Comparison: "EQUALS",
308
+ * Value: "NEW"
309
309
  * }
310
310
  * ]
311
311
  * },
312
- * "Description": "Elevate finding severity to Critical for important resources",
313
- * "IsTerminal": false,
314
- * "RuleName": "Elevate severity for important resources",
315
- * "RuleOrder": 1,
316
- * "RuleStatus": "ENABLED",
317
- * "Tags": {
318
- * "important-resources-rule": "s3-bucket"
312
+ * Description: "Elevate finding severity to Critical for important resources",
313
+ * IsTerminal: false,
314
+ * RuleName: "Elevate severity for important resources",
315
+ * RuleOrder: 1,
316
+ * RuleStatus: "ENABLED",
317
+ * Tags: {
318
+ * important-resources-rule: "s3-bucket"
319
319
  * }
320
320
  * };
321
321
  * const command = new CreateAutomationRuleCommand(input);
322
322
  * const response = await client.send(command);
323
- * /* response ==
323
+ * /* response is
324
324
  * {
325
- * "RuleArn": "arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111"
325
+ * RuleArn: "arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111"
326
326
  * }
327
327
  * *\/
328
- * // example id: to-create-an-automation-rule-1684768393507
329
328
  * ```
330
329
  *
330
+ * @public
331
331
  */
332
332
  export declare class CreateAutomationRuleCommand extends CreateAutomationRuleCommand_base {
333
333
  /** @internal type navigation helper, not in runtime. */