@aws-sdk/client-securityhub 3.916.0 → 3.917.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (34) hide show
  1. package/dist-cjs/endpoint/ruleset.js +1 -1
  2. package/dist-cjs/index.js +116 -53
  3. package/dist-es/endpoint/ruleset.js +1 -1
  4. package/dist-es/models/models_2.js +76 -8
  5. package/dist-es/models/models_3.js +35 -46
  6. package/dist-es/protocols/Aws_restJson1.js +8 -3
  7. package/dist-types/commands/BatchUpdateFindingsV2Command.d.ts +1 -1
  8. package/dist-types/commands/CreateAggregatorV2Command.d.ts +1 -1
  9. package/dist-types/commands/CreateAutomationRuleV2Command.d.ts +81 -6
  10. package/dist-types/commands/DeleteAggregatorV2Command.d.ts +1 -1
  11. package/dist-types/commands/DeleteAutomationRuleV2Command.d.ts +1 -1
  12. package/dist-types/commands/DescribeProductsV2Command.d.ts +1 -1
  13. package/dist-types/commands/DescribeSecurityHubV2Command.d.ts +1 -1
  14. package/dist-types/commands/DisableSecurityHubV2Command.d.ts +1 -1
  15. package/dist-types/commands/EnableSecurityHubV2Command.d.ts +1 -1
  16. package/dist-types/commands/GetAggregatorV2Command.d.ts +1 -1
  17. package/dist-types/commands/GetAutomationRuleV2Command.d.ts +81 -6
  18. package/dist-types/commands/GetFindingStatisticsV2Command.d.ts +80 -6
  19. package/dist-types/commands/GetFindingsCommand.d.ts +1 -1
  20. package/dist-types/commands/GetFindingsV2Command.d.ts +79 -5
  21. package/dist-types/commands/GetResourcesStatisticsV2Command.d.ts +56 -6
  22. package/dist-types/commands/GetResourcesV2Command.d.ts +56 -6
  23. package/dist-types/commands/ListAggregatorsV2Command.d.ts +1 -1
  24. package/dist-types/commands/ListAutomationRulesV2Command.d.ts +1 -1
  25. package/dist-types/commands/UpdateAggregatorV2Command.d.ts +1 -1
  26. package/dist-types/commands/UpdateAutomationRuleV2Command.d.ts +79 -5
  27. package/dist-types/models/models_2.d.ts +164 -186
  28. package/dist-types/models/models_3.d.ts +476 -345
  29. package/dist-types/ts3.4/commands/CreateAutomationRuleV2Command.d.ts +2 -4
  30. package/dist-types/ts3.4/commands/GetAutomationRuleV2Command.d.ts +2 -4
  31. package/dist-types/ts3.4/commands/GetFindingsCommand.d.ts +1 -1
  32. package/dist-types/ts3.4/models/models_2.d.ts +92 -55
  33. package/dist-types/ts3.4/models/models_3.d.ts +140 -111
  34. package/package.json +2 -2
@@ -29,7 +29,7 @@ declare const GetFindingsV2Command_base: {
29
29
  /**
30
30
  * <p>Return a list of findings that match the specified criteria.
31
31
  * <code>GetFindings</code> and <code>GetFindingsV2</code> both use <code>securityhub:GetFindings</code> in the <code>Action</code> element of an IAM policy statement.
32
- * You must have permission to perform the <code>securityhub:GetFindings</code> action. This API is in private preview and subject to change.</p>
32
+ * You must have permission to perform the <code>securityhub:GetFindings</code> action. This API is in public preview and subject to change.</p>
33
33
  * @example
34
34
  * Use a bare-bones client and the command you need to make an API call.
35
35
  * ```javascript
@@ -44,7 +44,7 @@ declare const GetFindingsV2Command_base: {
44
44
  * { // CompositeFilter
45
45
  * StringFilters: [ // OcsfStringFilterList
46
46
  * { // OcsfStringFilter
47
- * FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name",
47
+ * FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
48
48
  * Filter: { // StringFilter
49
49
  * Value: "STRING_VALUE",
50
50
  * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
@@ -53,7 +53,7 @@ declare const GetFindingsV2Command_base: {
53
53
  * ],
54
54
  * DateFilters: [ // OcsfDateFilterList
55
55
  * { // OcsfDateFilter
56
- * FieldName: "finding_info.created_time_dt" || "finding_info.first_seen_time_dt" || "finding_info.last_seen_time_dt" || "finding_info.modified_time_dt",
56
+ * FieldName: "finding_info.created_time_dt" || "finding_info.first_seen_time_dt" || "finding_info.last_seen_time_dt" || "finding_info.modified_time_dt" || "resources.image.created_time_dt" || "resources.image.last_used_time_dt" || "resources.modified_time_dt",
57
57
  * Filter: { // DateFilter
58
58
  * Start: "STRING_VALUE",
59
59
  * End: "STRING_VALUE",
@@ -74,7 +74,7 @@ declare const GetFindingsV2Command_base: {
74
74
  * ],
75
75
  * NumberFilters: [ // OcsfNumberFilterList
76
76
  * { // OcsfNumberFilter
77
- * FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count",
77
+ * FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
78
78
  * Filter: { // NumberFilter
79
79
  * Gte: Number("double"),
80
80
  * Lte: Number("double"),
@@ -86,7 +86,7 @@ declare const GetFindingsV2Command_base: {
86
86
  * ],
87
87
  * MapFilters: [ // OcsfMapFilterList
88
88
  * { // OcsfMapFilter
89
- * FieldName: "resources.tags",
89
+ * FieldName: "resources.tags" || "compliance.control_parameters" || "databucket.tags" || "finding_info.tags",
90
90
  * Filter: { // MapFilter
91
91
  * Key: "STRING_VALUE",
92
92
  * Value: "STRING_VALUE",
@@ -94,6 +94,80 @@ declare const GetFindingsV2Command_base: {
94
94
  * },
95
95
  * },
96
96
  * ],
97
+ * IpFilters: [ // OcsfIpFilterList
98
+ * { // OcsfIpFilter
99
+ * FieldName: "evidences.dst_endpoint.ip" || "evidences.src_endpoint.ip",
100
+ * Filter: { // IpFilter
101
+ * Cidr: "STRING_VALUE",
102
+ * },
103
+ * },
104
+ * ],
105
+ * NestedCompositeFilters: [
106
+ * {
107
+ * StringFilters: [
108
+ * {
109
+ * FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
110
+ * Filter: {
111
+ * Value: "STRING_VALUE",
112
+ * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
113
+ * },
114
+ * },
115
+ * ],
116
+ * DateFilters: [
117
+ * {
118
+ * FieldName: "finding_info.created_time_dt" || "finding_info.first_seen_time_dt" || "finding_info.last_seen_time_dt" || "finding_info.modified_time_dt" || "resources.image.created_time_dt" || "resources.image.last_used_time_dt" || "resources.modified_time_dt",
119
+ * Filter: {
120
+ * Start: "STRING_VALUE",
121
+ * End: "STRING_VALUE",
122
+ * DateRange: {
123
+ * Value: Number("int"),
124
+ * Unit: "DAYS",
125
+ * },
126
+ * },
127
+ * },
128
+ * ],
129
+ * BooleanFilters: [
130
+ * {
131
+ * FieldName: "compliance.assessments.meets_criteria" || "vulnerabilities.is_exploit_available" || "vulnerabilities.is_fix_available",
132
+ * Filter: {
133
+ * Value: true || false,
134
+ * },
135
+ * },
136
+ * ],
137
+ * NumberFilters: [
138
+ * {
139
+ * FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
140
+ * Filter: {
141
+ * Gte: Number("double"),
142
+ * Lte: Number("double"),
143
+ * Eq: Number("double"),
144
+ * Gt: Number("double"),
145
+ * Lt: Number("double"),
146
+ * },
147
+ * },
148
+ * ],
149
+ * MapFilters: [
150
+ * {
151
+ * FieldName: "resources.tags" || "compliance.control_parameters" || "databucket.tags" || "finding_info.tags",
152
+ * Filter: {
153
+ * Key: "STRING_VALUE",
154
+ * Value: "STRING_VALUE",
155
+ * Comparison: "EQUALS" || "NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
156
+ * },
157
+ * },
158
+ * ],
159
+ * IpFilters: [
160
+ * {
161
+ * FieldName: "evidences.dst_endpoint.ip" || "evidences.src_endpoint.ip",
162
+ * Filter: {
163
+ * Cidr: "STRING_VALUE",
164
+ * },
165
+ * },
166
+ * ],
167
+ * NestedCompositeFilters: "<CompositeFilterList>",
168
+ * Operator: "AND" || "OR",
169
+ * },
170
+ * ],
97
171
  * Operator: "AND" || "OR",
98
172
  * },
99
173
  * ],
@@ -27,7 +27,7 @@ declare const GetResourcesStatisticsV2Command_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Retrieves statistical information about Amazon Web Services resources and their associated security findings. This API is in private preview and subject to change.</p>
30
+ * <p>Retrieves statistical information about Amazon Web Services resources and their associated security findings. This API is in public preview and subject to change.</p>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -39,13 +39,13 @@ declare const GetResourcesStatisticsV2Command_base: {
39
39
  * const input = { // GetResourcesStatisticsV2Request
40
40
  * GroupByRules: [ // ResourceGroupByRules // required
41
41
  * { // ResourceGroupByRule
42
- * GroupByField: "account_id" || "region" || "resource_category" || "resource_type" || "resource_name" || "findings_summary.finding_type", // required
42
+ * GroupByField: "AccountId" || "Region" || "ResourceCategory" || "ResourceType" || "ResourceName" || "FindingsSummary.FindingType", // required
43
43
  * Filters: { // ResourcesFilters
44
44
  * CompositeFilters: [ // ResourcesCompositeFilterList
45
45
  * { // ResourcesCompositeFilter
46
46
  * StringFilters: [ // ResourcesStringFilterList
47
47
  * { // ResourcesStringFilter
48
- * FieldName: "resource_arn" || "resource_id" || "account_id" || "region" || "resource_category" || "resource_type" || "resource_name" || "findings_summary.finding_type" || "findings_summary.product_name",
48
+ * FieldName: "ResourceGuid" || "ResourceId" || "AccountId" || "Region" || "ResourceCategory" || "ResourceType" || "ResourceName" || "FindingsSummary.FindingType" || "FindingsSummary.ProductName",
49
49
  * Filter: { // StringFilter
50
50
  * Value: "STRING_VALUE",
51
51
  * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
@@ -54,7 +54,7 @@ declare const GetResourcesStatisticsV2Command_base: {
54
54
  * ],
55
55
  * DateFilters: [ // ResourcesDateFilterList
56
56
  * { // ResourcesDateFilter
57
- * FieldName: "resource_detail_capture_time_dt" || "resource_creation_time_dt",
57
+ * FieldName: "ResourceDetailCaptureTime" || "ResourceCreationTime",
58
58
  * Filter: { // DateFilter
59
59
  * Start: "STRING_VALUE",
60
60
  * End: "STRING_VALUE",
@@ -67,7 +67,7 @@ declare const GetResourcesStatisticsV2Command_base: {
67
67
  * ],
68
68
  * NumberFilters: [ // ResourcesNumberFilterList
69
69
  * { // ResourcesNumberFilter
70
- * FieldName: "findings_summary.total_findings" || "findings_summary.severities.other" || "findings_summary.severities.fatal" || "findings_summary.severities.critical" || "findings_summary.severities.high" || "findings_summary.severities.medium" || "findings_summary.severities.low" || "findings_summary.severities.informational" || "findings_summary.severities.unknown",
70
+ * FieldName: "FindingsSummary.TotalFindings" || "FindingsSummary.Severities.Other" || "FindingsSummary.Severities.Fatal" || "FindingsSummary.Severities.Critical" || "FindingsSummary.Severities.High" || "FindingsSummary.Severities.Medium" || "FindingsSummary.Severities.Low" || "FindingsSummary.Severities.Informational" || "FindingsSummary.Severities.Unknown",
71
71
  * Filter: { // NumberFilter
72
72
  * Gte: Number("double"),
73
73
  * Lte: Number("double"),
@@ -79,7 +79,7 @@ declare const GetResourcesStatisticsV2Command_base: {
79
79
  * ],
80
80
  * MapFilters: [ // ResourcesMapFilterList
81
81
  * { // ResourcesMapFilter
82
- * FieldName: "tags",
82
+ * FieldName: "ResourceTags",
83
83
  * Filter: { // MapFilter
84
84
  * Key: "STRING_VALUE",
85
85
  * Value: "STRING_VALUE",
@@ -87,6 +87,56 @@ declare const GetResourcesStatisticsV2Command_base: {
87
87
  * },
88
88
  * },
89
89
  * ],
90
+ * NestedCompositeFilters: [
91
+ * {
92
+ * StringFilters: [
93
+ * {
94
+ * FieldName: "ResourceGuid" || "ResourceId" || "AccountId" || "Region" || "ResourceCategory" || "ResourceType" || "ResourceName" || "FindingsSummary.FindingType" || "FindingsSummary.ProductName",
95
+ * Filter: {
96
+ * Value: "STRING_VALUE",
97
+ * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
98
+ * },
99
+ * },
100
+ * ],
101
+ * DateFilters: [
102
+ * {
103
+ * FieldName: "ResourceDetailCaptureTime" || "ResourceCreationTime",
104
+ * Filter: {
105
+ * Start: "STRING_VALUE",
106
+ * End: "STRING_VALUE",
107
+ * DateRange: {
108
+ * Value: Number("int"),
109
+ * Unit: "DAYS",
110
+ * },
111
+ * },
112
+ * },
113
+ * ],
114
+ * NumberFilters: [
115
+ * {
116
+ * FieldName: "FindingsSummary.TotalFindings" || "FindingsSummary.Severities.Other" || "FindingsSummary.Severities.Fatal" || "FindingsSummary.Severities.Critical" || "FindingsSummary.Severities.High" || "FindingsSummary.Severities.Medium" || "FindingsSummary.Severities.Low" || "FindingsSummary.Severities.Informational" || "FindingsSummary.Severities.Unknown",
117
+ * Filter: {
118
+ * Gte: Number("double"),
119
+ * Lte: Number("double"),
120
+ * Eq: Number("double"),
121
+ * Gt: Number("double"),
122
+ * Lt: Number("double"),
123
+ * },
124
+ * },
125
+ * ],
126
+ * MapFilters: [
127
+ * {
128
+ * FieldName: "ResourceTags",
129
+ * Filter: {
130
+ * Key: "STRING_VALUE",
131
+ * Value: "STRING_VALUE",
132
+ * Comparison: "EQUALS" || "NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
133
+ * },
134
+ * },
135
+ * ],
136
+ * NestedCompositeFilters: "<ResourcesCompositeFilterList>",
137
+ * Operator: "AND" || "OR",
138
+ * },
139
+ * ],
90
140
  * Operator: "AND" || "OR",
91
141
  * },
92
142
  * ],
@@ -27,7 +27,7 @@ declare const GetResourcesV2Command_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Returns a list of resources. This API is in private preview and subject to change.</p>
30
+ * <p>Returns a list of resources. This API is in public preview and subject to change.</p>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -42,7 +42,7 @@ declare const GetResourcesV2Command_base: {
42
42
  * { // ResourcesCompositeFilter
43
43
  * StringFilters: [ // ResourcesStringFilterList
44
44
  * { // ResourcesStringFilter
45
- * FieldName: "resource_arn" || "resource_id" || "account_id" || "region" || "resource_category" || "resource_type" || "resource_name" || "findings_summary.finding_type" || "findings_summary.product_name",
45
+ * FieldName: "ResourceGuid" || "ResourceId" || "AccountId" || "Region" || "ResourceCategory" || "ResourceType" || "ResourceName" || "FindingsSummary.FindingType" || "FindingsSummary.ProductName",
46
46
  * Filter: { // StringFilter
47
47
  * Value: "STRING_VALUE",
48
48
  * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
@@ -51,7 +51,7 @@ declare const GetResourcesV2Command_base: {
51
51
  * ],
52
52
  * DateFilters: [ // ResourcesDateFilterList
53
53
  * { // ResourcesDateFilter
54
- * FieldName: "resource_detail_capture_time_dt" || "resource_creation_time_dt",
54
+ * FieldName: "ResourceDetailCaptureTime" || "ResourceCreationTime",
55
55
  * Filter: { // DateFilter
56
56
  * Start: "STRING_VALUE",
57
57
  * End: "STRING_VALUE",
@@ -64,7 +64,7 @@ declare const GetResourcesV2Command_base: {
64
64
  * ],
65
65
  * NumberFilters: [ // ResourcesNumberFilterList
66
66
  * { // ResourcesNumberFilter
67
- * FieldName: "findings_summary.total_findings" || "findings_summary.severities.other" || "findings_summary.severities.fatal" || "findings_summary.severities.critical" || "findings_summary.severities.high" || "findings_summary.severities.medium" || "findings_summary.severities.low" || "findings_summary.severities.informational" || "findings_summary.severities.unknown",
67
+ * FieldName: "FindingsSummary.TotalFindings" || "FindingsSummary.Severities.Other" || "FindingsSummary.Severities.Fatal" || "FindingsSummary.Severities.Critical" || "FindingsSummary.Severities.High" || "FindingsSummary.Severities.Medium" || "FindingsSummary.Severities.Low" || "FindingsSummary.Severities.Informational" || "FindingsSummary.Severities.Unknown",
68
68
  * Filter: { // NumberFilter
69
69
  * Gte: Number("double"),
70
70
  * Lte: Number("double"),
@@ -76,7 +76,7 @@ declare const GetResourcesV2Command_base: {
76
76
  * ],
77
77
  * MapFilters: [ // ResourcesMapFilterList
78
78
  * { // ResourcesMapFilter
79
- * FieldName: "tags",
79
+ * FieldName: "ResourceTags",
80
80
  * Filter: { // MapFilter
81
81
  * Key: "STRING_VALUE",
82
82
  * Value: "STRING_VALUE",
@@ -84,6 +84,56 @@ declare const GetResourcesV2Command_base: {
84
84
  * },
85
85
  * },
86
86
  * ],
87
+ * NestedCompositeFilters: [
88
+ * {
89
+ * StringFilters: [
90
+ * {
91
+ * FieldName: "ResourceGuid" || "ResourceId" || "AccountId" || "Region" || "ResourceCategory" || "ResourceType" || "ResourceName" || "FindingsSummary.FindingType" || "FindingsSummary.ProductName",
92
+ * Filter: {
93
+ * Value: "STRING_VALUE",
94
+ * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
95
+ * },
96
+ * },
97
+ * ],
98
+ * DateFilters: [
99
+ * {
100
+ * FieldName: "ResourceDetailCaptureTime" || "ResourceCreationTime",
101
+ * Filter: {
102
+ * Start: "STRING_VALUE",
103
+ * End: "STRING_VALUE",
104
+ * DateRange: {
105
+ * Value: Number("int"),
106
+ * Unit: "DAYS",
107
+ * },
108
+ * },
109
+ * },
110
+ * ],
111
+ * NumberFilters: [
112
+ * {
113
+ * FieldName: "FindingsSummary.TotalFindings" || "FindingsSummary.Severities.Other" || "FindingsSummary.Severities.Fatal" || "FindingsSummary.Severities.Critical" || "FindingsSummary.Severities.High" || "FindingsSummary.Severities.Medium" || "FindingsSummary.Severities.Low" || "FindingsSummary.Severities.Informational" || "FindingsSummary.Severities.Unknown",
114
+ * Filter: {
115
+ * Gte: Number("double"),
116
+ * Lte: Number("double"),
117
+ * Eq: Number("double"),
118
+ * Gt: Number("double"),
119
+ * Lt: Number("double"),
120
+ * },
121
+ * },
122
+ * ],
123
+ * MapFilters: [
124
+ * {
125
+ * FieldName: "ResourceTags",
126
+ * Filter: {
127
+ * Key: "STRING_VALUE",
128
+ * Value: "STRING_VALUE",
129
+ * Comparison: "EQUALS" || "NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
130
+ * },
131
+ * },
132
+ * ],
133
+ * NestedCompositeFilters: "<ResourcesCompositeFilterList>",
134
+ * Operator: "AND" || "OR",
135
+ * },
136
+ * ],
87
137
  * Operator: "AND" || "OR",
88
138
  * },
89
139
  * ],
@@ -103,7 +153,7 @@ declare const GetResourcesV2Command_base: {
103
153
  * // { // GetResourcesV2Response
104
154
  * // Resources: [ // Resources // required
105
155
  * // { // ResourceResult
106
- * // ResourceArn: "STRING_VALUE",
156
+ * // ResourceGuid: "STRING_VALUE",
107
157
  * // ResourceId: "STRING_VALUE", // required
108
158
  * // AccountId: "STRING_VALUE", // required
109
159
  * // Region: "STRING_VALUE", // required
@@ -27,7 +27,7 @@ declare const ListAggregatorsV2Command_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Retrieves a list of V2 aggregators. This API is in private preview and subject to change.</p>
30
+ * <p>Retrieves a list of V2 aggregators. This API is in public preview and subject to change.</p>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -27,7 +27,7 @@ declare const ListAutomationRulesV2Command_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Returns a list of automation rules and metadata for the calling account. This API is in private preview and subject to change.</p>
30
+ * <p>Returns a list of automation rules and metadata for the calling account. This API is in public preview and subject to change.</p>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -27,7 +27,7 @@ declare const UpdateAggregatorV2Command_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Udpates the configuration for the Aggregator V2. This API is in private preview and subject to change.</p>
30
+ * <p>Udpates the configuration for the Aggregator V2. This API is in public preview and subject to change.</p>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -27,7 +27,7 @@ declare const UpdateAutomationRuleV2Command_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Updates a V2 automation rule. This API is in private preview and subject to change.</p>
30
+ * <p>Updates a V2 automation rule. This API is in public preview and subject to change.</p>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -48,7 +48,7 @@ declare const UpdateAutomationRuleV2Command_base: {
48
48
  * { // CompositeFilter
49
49
  * StringFilters: [ // OcsfStringFilterList
50
50
  * { // OcsfStringFilter
51
- * FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name",
51
+ * FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
52
52
  * Filter: { // StringFilter
53
53
  * Value: "STRING_VALUE",
54
54
  * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
@@ -57,7 +57,7 @@ declare const UpdateAutomationRuleV2Command_base: {
57
57
  * ],
58
58
  * DateFilters: [ // OcsfDateFilterList
59
59
  * { // OcsfDateFilter
60
- * FieldName: "finding_info.created_time_dt" || "finding_info.first_seen_time_dt" || "finding_info.last_seen_time_dt" || "finding_info.modified_time_dt",
60
+ * FieldName: "finding_info.created_time_dt" || "finding_info.first_seen_time_dt" || "finding_info.last_seen_time_dt" || "finding_info.modified_time_dt" || "resources.image.created_time_dt" || "resources.image.last_used_time_dt" || "resources.modified_time_dt",
61
61
  * Filter: { // DateFilter
62
62
  * Start: "STRING_VALUE",
63
63
  * End: "STRING_VALUE",
@@ -78,7 +78,7 @@ declare const UpdateAutomationRuleV2Command_base: {
78
78
  * ],
79
79
  * NumberFilters: [ // OcsfNumberFilterList
80
80
  * { // OcsfNumberFilter
81
- * FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count",
81
+ * FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
82
82
  * Filter: { // NumberFilter
83
83
  * Gte: Number("double"),
84
84
  * Lte: Number("double"),
@@ -90,7 +90,7 @@ declare const UpdateAutomationRuleV2Command_base: {
90
90
  * ],
91
91
  * MapFilters: [ // OcsfMapFilterList
92
92
  * { // OcsfMapFilter
93
- * FieldName: "resources.tags",
93
+ * FieldName: "resources.tags" || "compliance.control_parameters" || "databucket.tags" || "finding_info.tags",
94
94
  * Filter: { // MapFilter
95
95
  * Key: "STRING_VALUE",
96
96
  * Value: "STRING_VALUE",
@@ -98,6 +98,80 @@ declare const UpdateAutomationRuleV2Command_base: {
98
98
  * },
99
99
  * },
100
100
  * ],
101
+ * IpFilters: [ // OcsfIpFilterList
102
+ * { // OcsfIpFilter
103
+ * FieldName: "evidences.dst_endpoint.ip" || "evidences.src_endpoint.ip",
104
+ * Filter: { // IpFilter
105
+ * Cidr: "STRING_VALUE",
106
+ * },
107
+ * },
108
+ * ],
109
+ * NestedCompositeFilters: [
110
+ * {
111
+ * StringFilters: [
112
+ * {
113
+ * FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
114
+ * Filter: {
115
+ * Value: "STRING_VALUE",
116
+ * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
117
+ * },
118
+ * },
119
+ * ],
120
+ * DateFilters: [
121
+ * {
122
+ * FieldName: "finding_info.created_time_dt" || "finding_info.first_seen_time_dt" || "finding_info.last_seen_time_dt" || "finding_info.modified_time_dt" || "resources.image.created_time_dt" || "resources.image.last_used_time_dt" || "resources.modified_time_dt",
123
+ * Filter: {
124
+ * Start: "STRING_VALUE",
125
+ * End: "STRING_VALUE",
126
+ * DateRange: {
127
+ * Value: Number("int"),
128
+ * Unit: "DAYS",
129
+ * },
130
+ * },
131
+ * },
132
+ * ],
133
+ * BooleanFilters: [
134
+ * {
135
+ * FieldName: "compliance.assessments.meets_criteria" || "vulnerabilities.is_exploit_available" || "vulnerabilities.is_fix_available",
136
+ * Filter: {
137
+ * Value: true || false,
138
+ * },
139
+ * },
140
+ * ],
141
+ * NumberFilters: [
142
+ * {
143
+ * FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
144
+ * Filter: {
145
+ * Gte: Number("double"),
146
+ * Lte: Number("double"),
147
+ * Eq: Number("double"),
148
+ * Gt: Number("double"),
149
+ * Lt: Number("double"),
150
+ * },
151
+ * },
152
+ * ],
153
+ * MapFilters: [
154
+ * {
155
+ * FieldName: "resources.tags" || "compliance.control_parameters" || "databucket.tags" || "finding_info.tags",
156
+ * Filter: {
157
+ * Key: "STRING_VALUE",
158
+ * Value: "STRING_VALUE",
159
+ * Comparison: "EQUALS" || "NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
160
+ * },
161
+ * },
162
+ * ],
163
+ * IpFilters: [
164
+ * {
165
+ * FieldName: "evidences.dst_endpoint.ip" || "evidences.src_endpoint.ip",
166
+ * Filter: {
167
+ * Cidr: "STRING_VALUE",
168
+ * },
169
+ * },
170
+ * ],
171
+ * NestedCompositeFilters: "<CompositeFilterList>",
172
+ * Operator: "AND" || "OR",
173
+ * },
174
+ * ],
101
175
  * Operator: "AND" || "OR",
102
176
  * },
103
177
  * ],