@aws-sdk/client-securityhub 3.916.0 → 3.917.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (34) hide show
  1. package/dist-cjs/endpoint/ruleset.js +1 -1
  2. package/dist-cjs/index.js +116 -53
  3. package/dist-es/endpoint/ruleset.js +1 -1
  4. package/dist-es/models/models_2.js +76 -8
  5. package/dist-es/models/models_3.js +35 -46
  6. package/dist-es/protocols/Aws_restJson1.js +8 -3
  7. package/dist-types/commands/BatchUpdateFindingsV2Command.d.ts +1 -1
  8. package/dist-types/commands/CreateAggregatorV2Command.d.ts +1 -1
  9. package/dist-types/commands/CreateAutomationRuleV2Command.d.ts +81 -6
  10. package/dist-types/commands/DeleteAggregatorV2Command.d.ts +1 -1
  11. package/dist-types/commands/DeleteAutomationRuleV2Command.d.ts +1 -1
  12. package/dist-types/commands/DescribeProductsV2Command.d.ts +1 -1
  13. package/dist-types/commands/DescribeSecurityHubV2Command.d.ts +1 -1
  14. package/dist-types/commands/DisableSecurityHubV2Command.d.ts +1 -1
  15. package/dist-types/commands/EnableSecurityHubV2Command.d.ts +1 -1
  16. package/dist-types/commands/GetAggregatorV2Command.d.ts +1 -1
  17. package/dist-types/commands/GetAutomationRuleV2Command.d.ts +81 -6
  18. package/dist-types/commands/GetFindingStatisticsV2Command.d.ts +80 -6
  19. package/dist-types/commands/GetFindingsCommand.d.ts +1 -1
  20. package/dist-types/commands/GetFindingsV2Command.d.ts +79 -5
  21. package/dist-types/commands/GetResourcesStatisticsV2Command.d.ts +56 -6
  22. package/dist-types/commands/GetResourcesV2Command.d.ts +56 -6
  23. package/dist-types/commands/ListAggregatorsV2Command.d.ts +1 -1
  24. package/dist-types/commands/ListAutomationRulesV2Command.d.ts +1 -1
  25. package/dist-types/commands/UpdateAggregatorV2Command.d.ts +1 -1
  26. package/dist-types/commands/UpdateAutomationRuleV2Command.d.ts +79 -5
  27. package/dist-types/models/models_2.d.ts +164 -186
  28. package/dist-types/models/models_3.d.ts +476 -345
  29. package/dist-types/ts3.4/commands/CreateAutomationRuleV2Command.d.ts +2 -4
  30. package/dist-types/ts3.4/commands/GetAutomationRuleV2Command.d.ts +2 -4
  31. package/dist-types/ts3.4/commands/GetFindingsCommand.d.ts +1 -1
  32. package/dist-types/ts3.4/models/models_2.d.ts +92 -55
  33. package/dist-types/ts3.4/models/models_3.d.ts +140 -111
  34. package/package.json +2 -2
@@ -27,7 +27,7 @@ declare const CreateAggregatorV2Command_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Enables aggregation across Amazon Web Services Regions. This API is in private preview and subject to change.</p>
30
+ * <p>Enables aggregation across Amazon Web Services Regions. This API is in public preview and subject to change.</p>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -1,6 +1,7 @@
1
1
  import { Command as $Command } from "@smithy/smithy-client";
2
2
  import { MetadataBearer as __MetadataBearer } from "@smithy/types";
3
- import { CreateAutomationRuleV2Request, CreateAutomationRuleV2Response } from "../models/models_2";
3
+ import { CreateAutomationRuleV2Response } from "../models/models_2";
4
+ import { CreateAutomationRuleV2Request } from "../models/models_3";
4
5
  import { SecurityHubClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../SecurityHubClient";
5
6
  /**
6
7
  * @public
@@ -27,7 +28,7 @@ declare const CreateAutomationRuleV2Command_base: {
27
28
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
29
  };
29
30
  /**
30
- * <p>Creates a V2 automation rule. This API is in private preview and subject to change.</p>
31
+ * <p>Creates a V2 automation rule. This API is in public preview and subject to change.</p>
31
32
  * @example
32
33
  * Use a bare-bones client and the command you need to make an API call.
33
34
  * ```javascript
@@ -47,7 +48,7 @@ declare const CreateAutomationRuleV2Command_base: {
47
48
  * { // CompositeFilter
48
49
  * StringFilters: [ // OcsfStringFilterList
49
50
  * { // OcsfStringFilter
50
- * FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name",
51
+ * FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
51
52
  * Filter: { // StringFilter
52
53
  * Value: "STRING_VALUE",
53
54
  * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
@@ -56,7 +57,7 @@ declare const CreateAutomationRuleV2Command_base: {
56
57
  * ],
57
58
  * DateFilters: [ // OcsfDateFilterList
58
59
  * { // OcsfDateFilter
59
- * FieldName: "finding_info.created_time_dt" || "finding_info.first_seen_time_dt" || "finding_info.last_seen_time_dt" || "finding_info.modified_time_dt",
60
+ * FieldName: "finding_info.created_time_dt" || "finding_info.first_seen_time_dt" || "finding_info.last_seen_time_dt" || "finding_info.modified_time_dt" || "resources.image.created_time_dt" || "resources.image.last_used_time_dt" || "resources.modified_time_dt",
60
61
  * Filter: { // DateFilter
61
62
  * Start: "STRING_VALUE",
62
63
  * End: "STRING_VALUE",
@@ -77,7 +78,7 @@ declare const CreateAutomationRuleV2Command_base: {
77
78
  * ],
78
79
  * NumberFilters: [ // OcsfNumberFilterList
79
80
  * { // OcsfNumberFilter
80
- * FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count",
81
+ * FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
81
82
  * Filter: { // NumberFilter
82
83
  * Gte: Number("double"),
83
84
  * Lte: Number("double"),
@@ -89,7 +90,7 @@ declare const CreateAutomationRuleV2Command_base: {
89
90
  * ],
90
91
  * MapFilters: [ // OcsfMapFilterList
91
92
  * { // OcsfMapFilter
92
- * FieldName: "resources.tags",
93
+ * FieldName: "resources.tags" || "compliance.control_parameters" || "databucket.tags" || "finding_info.tags",
93
94
  * Filter: { // MapFilter
94
95
  * Key: "STRING_VALUE",
95
96
  * Value: "STRING_VALUE",
@@ -97,6 +98,80 @@ declare const CreateAutomationRuleV2Command_base: {
97
98
  * },
98
99
  * },
99
100
  * ],
101
+ * IpFilters: [ // OcsfIpFilterList
102
+ * { // OcsfIpFilter
103
+ * FieldName: "evidences.dst_endpoint.ip" || "evidences.src_endpoint.ip",
104
+ * Filter: { // IpFilter
105
+ * Cidr: "STRING_VALUE",
106
+ * },
107
+ * },
108
+ * ],
109
+ * NestedCompositeFilters: [
110
+ * {
111
+ * StringFilters: [
112
+ * {
113
+ * FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
114
+ * Filter: {
115
+ * Value: "STRING_VALUE",
116
+ * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
117
+ * },
118
+ * },
119
+ * ],
120
+ * DateFilters: [
121
+ * {
122
+ * FieldName: "finding_info.created_time_dt" || "finding_info.first_seen_time_dt" || "finding_info.last_seen_time_dt" || "finding_info.modified_time_dt" || "resources.image.created_time_dt" || "resources.image.last_used_time_dt" || "resources.modified_time_dt",
123
+ * Filter: {
124
+ * Start: "STRING_VALUE",
125
+ * End: "STRING_VALUE",
126
+ * DateRange: {
127
+ * Value: Number("int"),
128
+ * Unit: "DAYS",
129
+ * },
130
+ * },
131
+ * },
132
+ * ],
133
+ * BooleanFilters: [
134
+ * {
135
+ * FieldName: "compliance.assessments.meets_criteria" || "vulnerabilities.is_exploit_available" || "vulnerabilities.is_fix_available",
136
+ * Filter: {
137
+ * Value: true || false,
138
+ * },
139
+ * },
140
+ * ],
141
+ * NumberFilters: [
142
+ * {
143
+ * FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
144
+ * Filter: {
145
+ * Gte: Number("double"),
146
+ * Lte: Number("double"),
147
+ * Eq: Number("double"),
148
+ * Gt: Number("double"),
149
+ * Lt: Number("double"),
150
+ * },
151
+ * },
152
+ * ],
153
+ * MapFilters: [
154
+ * {
155
+ * FieldName: "resources.tags" || "compliance.control_parameters" || "databucket.tags" || "finding_info.tags",
156
+ * Filter: {
157
+ * Key: "STRING_VALUE",
158
+ * Value: "STRING_VALUE",
159
+ * Comparison: "EQUALS" || "NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
160
+ * },
161
+ * },
162
+ * ],
163
+ * IpFilters: [
164
+ * {
165
+ * FieldName: "evidences.dst_endpoint.ip" || "evidences.src_endpoint.ip",
166
+ * Filter: {
167
+ * Cidr: "STRING_VALUE",
168
+ * },
169
+ * },
170
+ * ],
171
+ * NestedCompositeFilters: "<CompositeFilterList>",
172
+ * Operator: "AND" || "OR",
173
+ * },
174
+ * ],
100
175
  * Operator: "AND" || "OR",
101
176
  * },
102
177
  * ],
@@ -27,7 +27,7 @@ declare const DeleteAggregatorV2Command_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Deletes the Aggregator V2. This API is in private preview and subject to change.</p>
30
+ * <p>Deletes the Aggregator V2. This API is in public preview and subject to change.</p>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -27,7 +27,7 @@ declare const DeleteAutomationRuleV2Command_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Deletes a V2 automation rule. This API is in private preview and subject to change.</p>
30
+ * <p>Deletes a V2 automation rule. This API is in public preview and subject to change.</p>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -27,7 +27,7 @@ declare const DescribeProductsV2Command_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Gets information about the product integration. This API is in private preview and subject to change.</p>
30
+ * <p>Gets information about the product integration. This API is in public preview and subject to change.</p>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -27,7 +27,7 @@ declare const DescribeSecurityHubV2Command_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Returns details about the service resource in your account. This API is in private preview and subject to change.</p>
30
+ * <p>Returns details about the service resource in your account. This API is in public preview and subject to change.</p>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -27,7 +27,7 @@ declare const DisableSecurityHubV2Command_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Disable the service for the current Amazon Web Services Region or specified Amazon Web Services Region. This API is in private preview and subject to change.</p>
30
+ * <p>Disable the service for the current Amazon Web Services Region or specified Amazon Web Services Region. This API is in public preview and subject to change.</p>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -27,7 +27,7 @@ declare const EnableSecurityHubV2Command_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Enables the service in account for the current Amazon Web Services Region or specified Amazon Web Services Region. This API is in private preview and subject to change.</p>
30
+ * <p>Enables the service in account for the current Amazon Web Services Region or specified Amazon Web Services Region. This API is in public preview and subject to change.</p>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -27,7 +27,7 @@ declare const GetAggregatorV2Command_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Returns the configuration of the specified Aggregator V2. This API is in private preview and subject to change.</p>
30
+ * <p>Returns the configuration of the specified Aggregator V2. This API is in public preview and subject to change.</p>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -1,6 +1,7 @@
1
1
  import { Command as $Command } from "@smithy/smithy-client";
2
2
  import { MetadataBearer as __MetadataBearer } from "@smithy/types";
3
- import { GetAutomationRuleV2Request, GetAutomationRuleV2Response } from "../models/models_2";
3
+ import { GetAutomationRuleV2Request } from "../models/models_2";
4
+ import { GetAutomationRuleV2Response } from "../models/models_3";
4
5
  import { SecurityHubClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../SecurityHubClient";
5
6
  /**
6
7
  * @public
@@ -27,7 +28,7 @@ declare const GetAutomationRuleV2Command_base: {
27
28
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
29
  };
29
30
  /**
30
- * <p>Returns an automation rule for the V2 service. This API is in private preview and subject to change.</p>
31
+ * <p>Returns an automation rule for the V2 service. This API is in public preview and subject to change.</p>
31
32
  * @example
32
33
  * Use a bare-bones client and the command you need to make an API call.
33
34
  * ```javascript
@@ -54,7 +55,7 @@ declare const GetAutomationRuleV2Command_base: {
54
55
  * // { // CompositeFilter
55
56
  * // StringFilters: [ // OcsfStringFilterList
56
57
  * // { // OcsfStringFilter
57
- * // FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name",
58
+ * // FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
58
59
  * // Filter: { // StringFilter
59
60
  * // Value: "STRING_VALUE",
60
61
  * // Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
@@ -63,7 +64,7 @@ declare const GetAutomationRuleV2Command_base: {
63
64
  * // ],
64
65
  * // DateFilters: [ // OcsfDateFilterList
65
66
  * // { // OcsfDateFilter
66
- * // FieldName: "finding_info.created_time_dt" || "finding_info.first_seen_time_dt" || "finding_info.last_seen_time_dt" || "finding_info.modified_time_dt",
67
+ * // FieldName: "finding_info.created_time_dt" || "finding_info.first_seen_time_dt" || "finding_info.last_seen_time_dt" || "finding_info.modified_time_dt" || "resources.image.created_time_dt" || "resources.image.last_used_time_dt" || "resources.modified_time_dt",
67
68
  * // Filter: { // DateFilter
68
69
  * // Start: "STRING_VALUE",
69
70
  * // End: "STRING_VALUE",
@@ -84,7 +85,7 @@ declare const GetAutomationRuleV2Command_base: {
84
85
  * // ],
85
86
  * // NumberFilters: [ // OcsfNumberFilterList
86
87
  * // { // OcsfNumberFilter
87
- * // FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count",
88
+ * // FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
88
89
  * // Filter: { // NumberFilter
89
90
  * // Gte: Number("double"),
90
91
  * // Lte: Number("double"),
@@ -96,7 +97,7 @@ declare const GetAutomationRuleV2Command_base: {
96
97
  * // ],
97
98
  * // MapFilters: [ // OcsfMapFilterList
98
99
  * // { // OcsfMapFilter
99
- * // FieldName: "resources.tags",
100
+ * // FieldName: "resources.tags" || "compliance.control_parameters" || "databucket.tags" || "finding_info.tags",
100
101
  * // Filter: { // MapFilter
101
102
  * // Key: "STRING_VALUE",
102
103
  * // Value: "STRING_VALUE",
@@ -104,6 +105,80 @@ declare const GetAutomationRuleV2Command_base: {
104
105
  * // },
105
106
  * // },
106
107
  * // ],
108
+ * // IpFilters: [ // OcsfIpFilterList
109
+ * // { // OcsfIpFilter
110
+ * // FieldName: "evidences.dst_endpoint.ip" || "evidences.src_endpoint.ip",
111
+ * // Filter: { // IpFilter
112
+ * // Cidr: "STRING_VALUE",
113
+ * // },
114
+ * // },
115
+ * // ],
116
+ * // NestedCompositeFilters: [
117
+ * // {
118
+ * // StringFilters: [
119
+ * // {
120
+ * // FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
121
+ * // Filter: {
122
+ * // Value: "STRING_VALUE",
123
+ * // Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
124
+ * // },
125
+ * // },
126
+ * // ],
127
+ * // DateFilters: [
128
+ * // {
129
+ * // FieldName: "finding_info.created_time_dt" || "finding_info.first_seen_time_dt" || "finding_info.last_seen_time_dt" || "finding_info.modified_time_dt" || "resources.image.created_time_dt" || "resources.image.last_used_time_dt" || "resources.modified_time_dt",
130
+ * // Filter: {
131
+ * // Start: "STRING_VALUE",
132
+ * // End: "STRING_VALUE",
133
+ * // DateRange: {
134
+ * // Value: Number("int"),
135
+ * // Unit: "DAYS",
136
+ * // },
137
+ * // },
138
+ * // },
139
+ * // ],
140
+ * // BooleanFilters: [
141
+ * // {
142
+ * // FieldName: "compliance.assessments.meets_criteria" || "vulnerabilities.is_exploit_available" || "vulnerabilities.is_fix_available",
143
+ * // Filter: {
144
+ * // Value: true || false,
145
+ * // },
146
+ * // },
147
+ * // ],
148
+ * // NumberFilters: [
149
+ * // {
150
+ * // FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
151
+ * // Filter: {
152
+ * // Gte: Number("double"),
153
+ * // Lte: Number("double"),
154
+ * // Eq: Number("double"),
155
+ * // Gt: Number("double"),
156
+ * // Lt: Number("double"),
157
+ * // },
158
+ * // },
159
+ * // ],
160
+ * // MapFilters: [
161
+ * // {
162
+ * // FieldName: "resources.tags" || "compliance.control_parameters" || "databucket.tags" || "finding_info.tags",
163
+ * // Filter: {
164
+ * // Key: "STRING_VALUE",
165
+ * // Value: "STRING_VALUE",
166
+ * // Comparison: "EQUALS" || "NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
167
+ * // },
168
+ * // },
169
+ * // ],
170
+ * // IpFilters: [
171
+ * // {
172
+ * // FieldName: "evidences.dst_endpoint.ip" || "evidences.src_endpoint.ip",
173
+ * // Filter: {
174
+ * // Cidr: "STRING_VALUE",
175
+ * // },
176
+ * // },
177
+ * // ],
178
+ * // NestedCompositeFilters: "<CompositeFilterList>",
179
+ * // Operator: "AND" || "OR",
180
+ * // },
181
+ * // ],
107
182
  * // Operator: "AND" || "OR",
108
183
  * // },
109
184
  * // ],
@@ -29,7 +29,7 @@ declare const GetFindingStatisticsV2Command_base: {
29
29
  /**
30
30
  * <p>Returns aggregated statistical data about findings.
31
31
  * <code>GetFindingStatisticsV2</code> use <code>securityhub:GetAdhocInsightResults</code> in the <code>Action</code> element of an IAM policy statement.
32
- * You must have permission to perform the <code>s</code> action. This API is in private preview and subject to change.</p>
32
+ * You must have permission to perform the <code>s</code> action. This API is in public preview and subject to change.</p>
33
33
  * @example
34
34
  * Use a bare-bones client and the command you need to make an API call.
35
35
  * ```javascript
@@ -46,7 +46,7 @@ declare const GetFindingStatisticsV2Command_base: {
46
46
  * { // CompositeFilter
47
47
  * StringFilters: [ // OcsfStringFilterList
48
48
  * { // OcsfStringFilter
49
- * FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name",
49
+ * FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
50
50
  * Filter: { // StringFilter
51
51
  * Value: "STRING_VALUE",
52
52
  * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
@@ -55,7 +55,7 @@ declare const GetFindingStatisticsV2Command_base: {
55
55
  * ],
56
56
  * DateFilters: [ // OcsfDateFilterList
57
57
  * { // OcsfDateFilter
58
- * FieldName: "finding_info.created_time_dt" || "finding_info.first_seen_time_dt" || "finding_info.last_seen_time_dt" || "finding_info.modified_time_dt",
58
+ * FieldName: "finding_info.created_time_dt" || "finding_info.first_seen_time_dt" || "finding_info.last_seen_time_dt" || "finding_info.modified_time_dt" || "resources.image.created_time_dt" || "resources.image.last_used_time_dt" || "resources.modified_time_dt",
59
59
  * Filter: { // DateFilter
60
60
  * Start: "STRING_VALUE",
61
61
  * End: "STRING_VALUE",
@@ -76,7 +76,7 @@ declare const GetFindingStatisticsV2Command_base: {
76
76
  * ],
77
77
  * NumberFilters: [ // OcsfNumberFilterList
78
78
  * { // OcsfNumberFilter
79
- * FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count",
79
+ * FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
80
80
  * Filter: { // NumberFilter
81
81
  * Gte: Number("double"),
82
82
  * Lte: Number("double"),
@@ -88,7 +88,7 @@ declare const GetFindingStatisticsV2Command_base: {
88
88
  * ],
89
89
  * MapFilters: [ // OcsfMapFilterList
90
90
  * { // OcsfMapFilter
91
- * FieldName: "resources.tags",
91
+ * FieldName: "resources.tags" || "compliance.control_parameters" || "databucket.tags" || "finding_info.tags",
92
92
  * Filter: { // MapFilter
93
93
  * Key: "STRING_VALUE",
94
94
  * Value: "STRING_VALUE",
@@ -96,12 +96,86 @@ declare const GetFindingStatisticsV2Command_base: {
96
96
  * },
97
97
  * },
98
98
  * ],
99
+ * IpFilters: [ // OcsfIpFilterList
100
+ * { // OcsfIpFilter
101
+ * FieldName: "evidences.dst_endpoint.ip" || "evidences.src_endpoint.ip",
102
+ * Filter: { // IpFilter
103
+ * Cidr: "STRING_VALUE",
104
+ * },
105
+ * },
106
+ * ],
107
+ * NestedCompositeFilters: [
108
+ * {
109
+ * StringFilters: [
110
+ * {
111
+ * FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
112
+ * Filter: {
113
+ * Value: "STRING_VALUE",
114
+ * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
115
+ * },
116
+ * },
117
+ * ],
118
+ * DateFilters: [
119
+ * {
120
+ * FieldName: "finding_info.created_time_dt" || "finding_info.first_seen_time_dt" || "finding_info.last_seen_time_dt" || "finding_info.modified_time_dt" || "resources.image.created_time_dt" || "resources.image.last_used_time_dt" || "resources.modified_time_dt",
121
+ * Filter: {
122
+ * Start: "STRING_VALUE",
123
+ * End: "STRING_VALUE",
124
+ * DateRange: {
125
+ * Value: Number("int"),
126
+ * Unit: "DAYS",
127
+ * },
128
+ * },
129
+ * },
130
+ * ],
131
+ * BooleanFilters: [
132
+ * {
133
+ * FieldName: "compliance.assessments.meets_criteria" || "vulnerabilities.is_exploit_available" || "vulnerabilities.is_fix_available",
134
+ * Filter: {
135
+ * Value: true || false,
136
+ * },
137
+ * },
138
+ * ],
139
+ * NumberFilters: [
140
+ * {
141
+ * FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
142
+ * Filter: {
143
+ * Gte: Number("double"),
144
+ * Lte: Number("double"),
145
+ * Eq: Number("double"),
146
+ * Gt: Number("double"),
147
+ * Lt: Number("double"),
148
+ * },
149
+ * },
150
+ * ],
151
+ * MapFilters: [
152
+ * {
153
+ * FieldName: "resources.tags" || "compliance.control_parameters" || "databucket.tags" || "finding_info.tags",
154
+ * Filter: {
155
+ * Key: "STRING_VALUE",
156
+ * Value: "STRING_VALUE",
157
+ * Comparison: "EQUALS" || "NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
158
+ * },
159
+ * },
160
+ * ],
161
+ * IpFilters: [
162
+ * {
163
+ * FieldName: "evidences.dst_endpoint.ip" || "evidences.src_endpoint.ip",
164
+ * Filter: {
165
+ * Cidr: "STRING_VALUE",
166
+ * },
167
+ * },
168
+ * ],
169
+ * NestedCompositeFilters: "<CompositeFilterList>",
170
+ * Operator: "AND" || "OR",
171
+ * },
172
+ * ],
99
173
  * Operator: "AND" || "OR",
100
174
  * },
101
175
  * ],
102
176
  * CompositeOperator: "AND" || "OR",
103
177
  * },
104
- * GroupByField: "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.name" || "compliance.status" || "compliance.control" || "finding_info.title" || "finding_info.types" || "metadata.product.name" || "metadata.product.uid" || "resources.type" || "resources.uid" || "severity" || "status" || "vulnerabilities.fix_coverage" || "class_name", // required
178
+ * GroupByField: "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.name" || "compliance.status" || "compliance.control" || "finding_info.title" || "finding_info.types" || "metadata.product.name" || "metadata.product.uid" || "resources.type" || "resources.uid" || "severity" || "status" || "vulnerabilities.fix_coverage" || "class_name" || "vulnerabilities.affected_packages.name" || "finding_info.analytic.name" || "compliance.standards" || "cloud.account.name", // required
105
179
  * },
106
180
  * ],
107
181
  * SortOrder: "asc" || "desc",
@@ -1,6 +1,6 @@
1
1
  import { Command as $Command } from "@smithy/smithy-client";
2
2
  import { MetadataBearer as __MetadataBearer } from "@smithy/types";
3
- import { GetFindingsRequest, GetFindingsResponse } from "../models/models_3";
3
+ import { GetFindingsRequest, GetFindingsResponse } from "../models/models_2";
4
4
  import { SecurityHubClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../SecurityHubClient";
5
5
  /**
6
6
  * @public