@aws-sdk/client-securityhub 3.916.0 → 3.918.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/endpoint/ruleset.js +1 -1
- package/dist-cjs/index.js +116 -53
- package/dist-es/endpoint/ruleset.js +1 -1
- package/dist-es/models/models_2.js +76 -8
- package/dist-es/models/models_3.js +35 -46
- package/dist-es/protocols/Aws_restJson1.js +8 -3
- package/dist-types/commands/BatchUpdateFindingsV2Command.d.ts +1 -1
- package/dist-types/commands/CreateAggregatorV2Command.d.ts +1 -1
- package/dist-types/commands/CreateAutomationRuleV2Command.d.ts +81 -6
- package/dist-types/commands/DeleteAggregatorV2Command.d.ts +1 -1
- package/dist-types/commands/DeleteAutomationRuleV2Command.d.ts +1 -1
- package/dist-types/commands/DescribeProductsV2Command.d.ts +1 -1
- package/dist-types/commands/DescribeSecurityHubV2Command.d.ts +1 -1
- package/dist-types/commands/DisableSecurityHubV2Command.d.ts +1 -1
- package/dist-types/commands/EnableSecurityHubV2Command.d.ts +1 -1
- package/dist-types/commands/GetAggregatorV2Command.d.ts +1 -1
- package/dist-types/commands/GetAutomationRuleV2Command.d.ts +81 -6
- package/dist-types/commands/GetFindingStatisticsV2Command.d.ts +80 -6
- package/dist-types/commands/GetFindingsCommand.d.ts +1 -1
- package/dist-types/commands/GetFindingsV2Command.d.ts +79 -5
- package/dist-types/commands/GetResourcesStatisticsV2Command.d.ts +56 -6
- package/dist-types/commands/GetResourcesV2Command.d.ts +56 -6
- package/dist-types/commands/ListAggregatorsV2Command.d.ts +1 -1
- package/dist-types/commands/ListAutomationRulesV2Command.d.ts +1 -1
- package/dist-types/commands/UpdateAggregatorV2Command.d.ts +1 -1
- package/dist-types/commands/UpdateAutomationRuleV2Command.d.ts +79 -5
- package/dist-types/models/models_2.d.ts +164 -186
- package/dist-types/models/models_3.d.ts +476 -345
- package/dist-types/ts3.4/commands/CreateAutomationRuleV2Command.d.ts +2 -4
- package/dist-types/ts3.4/commands/GetAutomationRuleV2Command.d.ts +2 -4
- package/dist-types/ts3.4/commands/GetFindingsCommand.d.ts +1 -1
- package/dist-types/ts3.4/models/models_2.d.ts +92 -55
- package/dist-types/ts3.4/models/models_3.d.ts +140 -111
- package/package.json +2 -2
|
@@ -27,7 +27,7 @@ declare const CreateAggregatorV2Command_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Enables aggregation across Amazon Web Services Regions. This API is in
|
|
30
|
+
* <p>Enables aggregation across Amazon Web Services Regions. This API is in public preview and subject to change.</p>
|
|
31
31
|
* @example
|
|
32
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
33
33
|
* ```javascript
|
|
@@ -1,6 +1,7 @@
|
|
|
1
1
|
import { Command as $Command } from "@smithy/smithy-client";
|
|
2
2
|
import { MetadataBearer as __MetadataBearer } from "@smithy/types";
|
|
3
|
-
import {
|
|
3
|
+
import { CreateAutomationRuleV2Response } from "../models/models_2";
|
|
4
|
+
import { CreateAutomationRuleV2Request } from "../models/models_3";
|
|
4
5
|
import { SecurityHubClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../SecurityHubClient";
|
|
5
6
|
/**
|
|
6
7
|
* @public
|
|
@@ -27,7 +28,7 @@ declare const CreateAutomationRuleV2Command_base: {
|
|
|
27
28
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
29
|
};
|
|
29
30
|
/**
|
|
30
|
-
* <p>Creates a V2 automation rule. This API is in
|
|
31
|
+
* <p>Creates a V2 automation rule. This API is in public preview and subject to change.</p>
|
|
31
32
|
* @example
|
|
32
33
|
* Use a bare-bones client and the command you need to make an API call.
|
|
33
34
|
* ```javascript
|
|
@@ -47,7 +48,7 @@ declare const CreateAutomationRuleV2Command_base: {
|
|
|
47
48
|
* { // CompositeFilter
|
|
48
49
|
* StringFilters: [ // OcsfStringFilterList
|
|
49
50
|
* { // OcsfStringFilter
|
|
50
|
-
* FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name",
|
|
51
|
+
* FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
|
|
51
52
|
* Filter: { // StringFilter
|
|
52
53
|
* Value: "STRING_VALUE",
|
|
53
54
|
* Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
|
|
@@ -56,7 +57,7 @@ declare const CreateAutomationRuleV2Command_base: {
|
|
|
56
57
|
* ],
|
|
57
58
|
* DateFilters: [ // OcsfDateFilterList
|
|
58
59
|
* { // OcsfDateFilter
|
|
59
|
-
* FieldName: "finding_info.created_time_dt" || "finding_info.first_seen_time_dt" || "finding_info.last_seen_time_dt" || "finding_info.modified_time_dt",
|
|
60
|
+
* FieldName: "finding_info.created_time_dt" || "finding_info.first_seen_time_dt" || "finding_info.last_seen_time_dt" || "finding_info.modified_time_dt" || "resources.image.created_time_dt" || "resources.image.last_used_time_dt" || "resources.modified_time_dt",
|
|
60
61
|
* Filter: { // DateFilter
|
|
61
62
|
* Start: "STRING_VALUE",
|
|
62
63
|
* End: "STRING_VALUE",
|
|
@@ -77,7 +78,7 @@ declare const CreateAutomationRuleV2Command_base: {
|
|
|
77
78
|
* ],
|
|
78
79
|
* NumberFilters: [ // OcsfNumberFilterList
|
|
79
80
|
* { // OcsfNumberFilter
|
|
80
|
-
* FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count",
|
|
81
|
+
* FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
|
|
81
82
|
* Filter: { // NumberFilter
|
|
82
83
|
* Gte: Number("double"),
|
|
83
84
|
* Lte: Number("double"),
|
|
@@ -89,7 +90,7 @@ declare const CreateAutomationRuleV2Command_base: {
|
|
|
89
90
|
* ],
|
|
90
91
|
* MapFilters: [ // OcsfMapFilterList
|
|
91
92
|
* { // OcsfMapFilter
|
|
92
|
-
* FieldName: "resources.tags",
|
|
93
|
+
* FieldName: "resources.tags" || "compliance.control_parameters" || "databucket.tags" || "finding_info.tags",
|
|
93
94
|
* Filter: { // MapFilter
|
|
94
95
|
* Key: "STRING_VALUE",
|
|
95
96
|
* Value: "STRING_VALUE",
|
|
@@ -97,6 +98,80 @@ declare const CreateAutomationRuleV2Command_base: {
|
|
|
97
98
|
* },
|
|
98
99
|
* },
|
|
99
100
|
* ],
|
|
101
|
+
* IpFilters: [ // OcsfIpFilterList
|
|
102
|
+
* { // OcsfIpFilter
|
|
103
|
+
* FieldName: "evidences.dst_endpoint.ip" || "evidences.src_endpoint.ip",
|
|
104
|
+
* Filter: { // IpFilter
|
|
105
|
+
* Cidr: "STRING_VALUE",
|
|
106
|
+
* },
|
|
107
|
+
* },
|
|
108
|
+
* ],
|
|
109
|
+
* NestedCompositeFilters: [
|
|
110
|
+
* {
|
|
111
|
+
* StringFilters: [
|
|
112
|
+
* {
|
|
113
|
+
* FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
|
|
114
|
+
* Filter: {
|
|
115
|
+
* Value: "STRING_VALUE",
|
|
116
|
+
* Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
|
|
117
|
+
* },
|
|
118
|
+
* },
|
|
119
|
+
* ],
|
|
120
|
+
* DateFilters: [
|
|
121
|
+
* {
|
|
122
|
+
* FieldName: "finding_info.created_time_dt" || "finding_info.first_seen_time_dt" || "finding_info.last_seen_time_dt" || "finding_info.modified_time_dt" || "resources.image.created_time_dt" || "resources.image.last_used_time_dt" || "resources.modified_time_dt",
|
|
123
|
+
* Filter: {
|
|
124
|
+
* Start: "STRING_VALUE",
|
|
125
|
+
* End: "STRING_VALUE",
|
|
126
|
+
* DateRange: {
|
|
127
|
+
* Value: Number("int"),
|
|
128
|
+
* Unit: "DAYS",
|
|
129
|
+
* },
|
|
130
|
+
* },
|
|
131
|
+
* },
|
|
132
|
+
* ],
|
|
133
|
+
* BooleanFilters: [
|
|
134
|
+
* {
|
|
135
|
+
* FieldName: "compliance.assessments.meets_criteria" || "vulnerabilities.is_exploit_available" || "vulnerabilities.is_fix_available",
|
|
136
|
+
* Filter: {
|
|
137
|
+
* Value: true || false,
|
|
138
|
+
* },
|
|
139
|
+
* },
|
|
140
|
+
* ],
|
|
141
|
+
* NumberFilters: [
|
|
142
|
+
* {
|
|
143
|
+
* FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
|
|
144
|
+
* Filter: {
|
|
145
|
+
* Gte: Number("double"),
|
|
146
|
+
* Lte: Number("double"),
|
|
147
|
+
* Eq: Number("double"),
|
|
148
|
+
* Gt: Number("double"),
|
|
149
|
+
* Lt: Number("double"),
|
|
150
|
+
* },
|
|
151
|
+
* },
|
|
152
|
+
* ],
|
|
153
|
+
* MapFilters: [
|
|
154
|
+
* {
|
|
155
|
+
* FieldName: "resources.tags" || "compliance.control_parameters" || "databucket.tags" || "finding_info.tags",
|
|
156
|
+
* Filter: {
|
|
157
|
+
* Key: "STRING_VALUE",
|
|
158
|
+
* Value: "STRING_VALUE",
|
|
159
|
+
* Comparison: "EQUALS" || "NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
|
|
160
|
+
* },
|
|
161
|
+
* },
|
|
162
|
+
* ],
|
|
163
|
+
* IpFilters: [
|
|
164
|
+
* {
|
|
165
|
+
* FieldName: "evidences.dst_endpoint.ip" || "evidences.src_endpoint.ip",
|
|
166
|
+
* Filter: {
|
|
167
|
+
* Cidr: "STRING_VALUE",
|
|
168
|
+
* },
|
|
169
|
+
* },
|
|
170
|
+
* ],
|
|
171
|
+
* NestedCompositeFilters: "<CompositeFilterList>",
|
|
172
|
+
* Operator: "AND" || "OR",
|
|
173
|
+
* },
|
|
174
|
+
* ],
|
|
100
175
|
* Operator: "AND" || "OR",
|
|
101
176
|
* },
|
|
102
177
|
* ],
|
|
@@ -27,7 +27,7 @@ declare const DeleteAggregatorV2Command_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Deletes the Aggregator V2. This API is in
|
|
30
|
+
* <p>Deletes the Aggregator V2. This API is in public preview and subject to change.</p>
|
|
31
31
|
* @example
|
|
32
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
33
33
|
* ```javascript
|
|
@@ -27,7 +27,7 @@ declare const DeleteAutomationRuleV2Command_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Deletes a V2 automation rule. This API is in
|
|
30
|
+
* <p>Deletes a V2 automation rule. This API is in public preview and subject to change.</p>
|
|
31
31
|
* @example
|
|
32
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
33
33
|
* ```javascript
|
|
@@ -27,7 +27,7 @@ declare const DescribeProductsV2Command_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Gets information about the product integration. This API is in
|
|
30
|
+
* <p>Gets information about the product integration. This API is in public preview and subject to change.</p>
|
|
31
31
|
* @example
|
|
32
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
33
33
|
* ```javascript
|
|
@@ -27,7 +27,7 @@ declare const DescribeSecurityHubV2Command_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Returns details about the service resource in your account. This API is in
|
|
30
|
+
* <p>Returns details about the service resource in your account. This API is in public preview and subject to change.</p>
|
|
31
31
|
* @example
|
|
32
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
33
33
|
* ```javascript
|
|
@@ -27,7 +27,7 @@ declare const DisableSecurityHubV2Command_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Disable the service for the current Amazon Web Services Region or specified Amazon Web Services Region. This API is in
|
|
30
|
+
* <p>Disable the service for the current Amazon Web Services Region or specified Amazon Web Services Region. This API is in public preview and subject to change.</p>
|
|
31
31
|
* @example
|
|
32
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
33
33
|
* ```javascript
|
|
@@ -27,7 +27,7 @@ declare const EnableSecurityHubV2Command_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Enables the service in account for the current Amazon Web Services Region or specified Amazon Web Services Region. This API is in
|
|
30
|
+
* <p>Enables the service in account for the current Amazon Web Services Region or specified Amazon Web Services Region. This API is in public preview and subject to change.</p>
|
|
31
31
|
* @example
|
|
32
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
33
33
|
* ```javascript
|
|
@@ -27,7 +27,7 @@ declare const GetAggregatorV2Command_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Returns the configuration of the specified Aggregator V2. This API is in
|
|
30
|
+
* <p>Returns the configuration of the specified Aggregator V2. This API is in public preview and subject to change.</p>
|
|
31
31
|
* @example
|
|
32
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
33
33
|
* ```javascript
|
|
@@ -1,6 +1,7 @@
|
|
|
1
1
|
import { Command as $Command } from "@smithy/smithy-client";
|
|
2
2
|
import { MetadataBearer as __MetadataBearer } from "@smithy/types";
|
|
3
|
-
import { GetAutomationRuleV2Request
|
|
3
|
+
import { GetAutomationRuleV2Request } from "../models/models_2";
|
|
4
|
+
import { GetAutomationRuleV2Response } from "../models/models_3";
|
|
4
5
|
import { SecurityHubClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../SecurityHubClient";
|
|
5
6
|
/**
|
|
6
7
|
* @public
|
|
@@ -27,7 +28,7 @@ declare const GetAutomationRuleV2Command_base: {
|
|
|
27
28
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
29
|
};
|
|
29
30
|
/**
|
|
30
|
-
* <p>Returns an automation rule for the V2 service. This API is in
|
|
31
|
+
* <p>Returns an automation rule for the V2 service. This API is in public preview and subject to change.</p>
|
|
31
32
|
* @example
|
|
32
33
|
* Use a bare-bones client and the command you need to make an API call.
|
|
33
34
|
* ```javascript
|
|
@@ -54,7 +55,7 @@ declare const GetAutomationRuleV2Command_base: {
|
|
|
54
55
|
* // { // CompositeFilter
|
|
55
56
|
* // StringFilters: [ // OcsfStringFilterList
|
|
56
57
|
* // { // OcsfStringFilter
|
|
57
|
-
* // FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name",
|
|
58
|
+
* // FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
|
|
58
59
|
* // Filter: { // StringFilter
|
|
59
60
|
* // Value: "STRING_VALUE",
|
|
60
61
|
* // Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
|
|
@@ -63,7 +64,7 @@ declare const GetAutomationRuleV2Command_base: {
|
|
|
63
64
|
* // ],
|
|
64
65
|
* // DateFilters: [ // OcsfDateFilterList
|
|
65
66
|
* // { // OcsfDateFilter
|
|
66
|
-
* // FieldName: "finding_info.created_time_dt" || "finding_info.first_seen_time_dt" || "finding_info.last_seen_time_dt" || "finding_info.modified_time_dt",
|
|
67
|
+
* // FieldName: "finding_info.created_time_dt" || "finding_info.first_seen_time_dt" || "finding_info.last_seen_time_dt" || "finding_info.modified_time_dt" || "resources.image.created_time_dt" || "resources.image.last_used_time_dt" || "resources.modified_time_dt",
|
|
67
68
|
* // Filter: { // DateFilter
|
|
68
69
|
* // Start: "STRING_VALUE",
|
|
69
70
|
* // End: "STRING_VALUE",
|
|
@@ -84,7 +85,7 @@ declare const GetAutomationRuleV2Command_base: {
|
|
|
84
85
|
* // ],
|
|
85
86
|
* // NumberFilters: [ // OcsfNumberFilterList
|
|
86
87
|
* // { // OcsfNumberFilter
|
|
87
|
-
* // FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count",
|
|
88
|
+
* // FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
|
|
88
89
|
* // Filter: { // NumberFilter
|
|
89
90
|
* // Gte: Number("double"),
|
|
90
91
|
* // Lte: Number("double"),
|
|
@@ -96,7 +97,7 @@ declare const GetAutomationRuleV2Command_base: {
|
|
|
96
97
|
* // ],
|
|
97
98
|
* // MapFilters: [ // OcsfMapFilterList
|
|
98
99
|
* // { // OcsfMapFilter
|
|
99
|
-
* // FieldName: "resources.tags",
|
|
100
|
+
* // FieldName: "resources.tags" || "compliance.control_parameters" || "databucket.tags" || "finding_info.tags",
|
|
100
101
|
* // Filter: { // MapFilter
|
|
101
102
|
* // Key: "STRING_VALUE",
|
|
102
103
|
* // Value: "STRING_VALUE",
|
|
@@ -104,6 +105,80 @@ declare const GetAutomationRuleV2Command_base: {
|
|
|
104
105
|
* // },
|
|
105
106
|
* // },
|
|
106
107
|
* // ],
|
|
108
|
+
* // IpFilters: [ // OcsfIpFilterList
|
|
109
|
+
* // { // OcsfIpFilter
|
|
110
|
+
* // FieldName: "evidences.dst_endpoint.ip" || "evidences.src_endpoint.ip",
|
|
111
|
+
* // Filter: { // IpFilter
|
|
112
|
+
* // Cidr: "STRING_VALUE",
|
|
113
|
+
* // },
|
|
114
|
+
* // },
|
|
115
|
+
* // ],
|
|
116
|
+
* // NestedCompositeFilters: [
|
|
117
|
+
* // {
|
|
118
|
+
* // StringFilters: [
|
|
119
|
+
* // {
|
|
120
|
+
* // FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
|
|
121
|
+
* // Filter: {
|
|
122
|
+
* // Value: "STRING_VALUE",
|
|
123
|
+
* // Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
|
|
124
|
+
* // },
|
|
125
|
+
* // },
|
|
126
|
+
* // ],
|
|
127
|
+
* // DateFilters: [
|
|
128
|
+
* // {
|
|
129
|
+
* // FieldName: "finding_info.created_time_dt" || "finding_info.first_seen_time_dt" || "finding_info.last_seen_time_dt" || "finding_info.modified_time_dt" || "resources.image.created_time_dt" || "resources.image.last_used_time_dt" || "resources.modified_time_dt",
|
|
130
|
+
* // Filter: {
|
|
131
|
+
* // Start: "STRING_VALUE",
|
|
132
|
+
* // End: "STRING_VALUE",
|
|
133
|
+
* // DateRange: {
|
|
134
|
+
* // Value: Number("int"),
|
|
135
|
+
* // Unit: "DAYS",
|
|
136
|
+
* // },
|
|
137
|
+
* // },
|
|
138
|
+
* // },
|
|
139
|
+
* // ],
|
|
140
|
+
* // BooleanFilters: [
|
|
141
|
+
* // {
|
|
142
|
+
* // FieldName: "compliance.assessments.meets_criteria" || "vulnerabilities.is_exploit_available" || "vulnerabilities.is_fix_available",
|
|
143
|
+
* // Filter: {
|
|
144
|
+
* // Value: true || false,
|
|
145
|
+
* // },
|
|
146
|
+
* // },
|
|
147
|
+
* // ],
|
|
148
|
+
* // NumberFilters: [
|
|
149
|
+
* // {
|
|
150
|
+
* // FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
|
|
151
|
+
* // Filter: {
|
|
152
|
+
* // Gte: Number("double"),
|
|
153
|
+
* // Lte: Number("double"),
|
|
154
|
+
* // Eq: Number("double"),
|
|
155
|
+
* // Gt: Number("double"),
|
|
156
|
+
* // Lt: Number("double"),
|
|
157
|
+
* // },
|
|
158
|
+
* // },
|
|
159
|
+
* // ],
|
|
160
|
+
* // MapFilters: [
|
|
161
|
+
* // {
|
|
162
|
+
* // FieldName: "resources.tags" || "compliance.control_parameters" || "databucket.tags" || "finding_info.tags",
|
|
163
|
+
* // Filter: {
|
|
164
|
+
* // Key: "STRING_VALUE",
|
|
165
|
+
* // Value: "STRING_VALUE",
|
|
166
|
+
* // Comparison: "EQUALS" || "NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
|
|
167
|
+
* // },
|
|
168
|
+
* // },
|
|
169
|
+
* // ],
|
|
170
|
+
* // IpFilters: [
|
|
171
|
+
* // {
|
|
172
|
+
* // FieldName: "evidences.dst_endpoint.ip" || "evidences.src_endpoint.ip",
|
|
173
|
+
* // Filter: {
|
|
174
|
+
* // Cidr: "STRING_VALUE",
|
|
175
|
+
* // },
|
|
176
|
+
* // },
|
|
177
|
+
* // ],
|
|
178
|
+
* // NestedCompositeFilters: "<CompositeFilterList>",
|
|
179
|
+
* // Operator: "AND" || "OR",
|
|
180
|
+
* // },
|
|
181
|
+
* // ],
|
|
107
182
|
* // Operator: "AND" || "OR",
|
|
108
183
|
* // },
|
|
109
184
|
* // ],
|
|
@@ -29,7 +29,7 @@ declare const GetFindingStatisticsV2Command_base: {
|
|
|
29
29
|
/**
|
|
30
30
|
* <p>Returns aggregated statistical data about findings.
|
|
31
31
|
* <code>GetFindingStatisticsV2</code> use <code>securityhub:GetAdhocInsightResults</code> in the <code>Action</code> element of an IAM policy statement.
|
|
32
|
-
* You must have permission to perform the <code>s</code> action. This API is in
|
|
32
|
+
* You must have permission to perform the <code>s</code> action. This API is in public preview and subject to change.</p>
|
|
33
33
|
* @example
|
|
34
34
|
* Use a bare-bones client and the command you need to make an API call.
|
|
35
35
|
* ```javascript
|
|
@@ -46,7 +46,7 @@ declare const GetFindingStatisticsV2Command_base: {
|
|
|
46
46
|
* { // CompositeFilter
|
|
47
47
|
* StringFilters: [ // OcsfStringFilterList
|
|
48
48
|
* { // OcsfStringFilter
|
|
49
|
-
* FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name",
|
|
49
|
+
* FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
|
|
50
50
|
* Filter: { // StringFilter
|
|
51
51
|
* Value: "STRING_VALUE",
|
|
52
52
|
* Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
|
|
@@ -55,7 +55,7 @@ declare const GetFindingStatisticsV2Command_base: {
|
|
|
55
55
|
* ],
|
|
56
56
|
* DateFilters: [ // OcsfDateFilterList
|
|
57
57
|
* { // OcsfDateFilter
|
|
58
|
-
* FieldName: "finding_info.created_time_dt" || "finding_info.first_seen_time_dt" || "finding_info.last_seen_time_dt" || "finding_info.modified_time_dt",
|
|
58
|
+
* FieldName: "finding_info.created_time_dt" || "finding_info.first_seen_time_dt" || "finding_info.last_seen_time_dt" || "finding_info.modified_time_dt" || "resources.image.created_time_dt" || "resources.image.last_used_time_dt" || "resources.modified_time_dt",
|
|
59
59
|
* Filter: { // DateFilter
|
|
60
60
|
* Start: "STRING_VALUE",
|
|
61
61
|
* End: "STRING_VALUE",
|
|
@@ -76,7 +76,7 @@ declare const GetFindingStatisticsV2Command_base: {
|
|
|
76
76
|
* ],
|
|
77
77
|
* NumberFilters: [ // OcsfNumberFilterList
|
|
78
78
|
* { // OcsfNumberFilter
|
|
79
|
-
* FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count",
|
|
79
|
+
* FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
|
|
80
80
|
* Filter: { // NumberFilter
|
|
81
81
|
* Gte: Number("double"),
|
|
82
82
|
* Lte: Number("double"),
|
|
@@ -88,7 +88,7 @@ declare const GetFindingStatisticsV2Command_base: {
|
|
|
88
88
|
* ],
|
|
89
89
|
* MapFilters: [ // OcsfMapFilterList
|
|
90
90
|
* { // OcsfMapFilter
|
|
91
|
-
* FieldName: "resources.tags",
|
|
91
|
+
* FieldName: "resources.tags" || "compliance.control_parameters" || "databucket.tags" || "finding_info.tags",
|
|
92
92
|
* Filter: { // MapFilter
|
|
93
93
|
* Key: "STRING_VALUE",
|
|
94
94
|
* Value: "STRING_VALUE",
|
|
@@ -96,12 +96,86 @@ declare const GetFindingStatisticsV2Command_base: {
|
|
|
96
96
|
* },
|
|
97
97
|
* },
|
|
98
98
|
* ],
|
|
99
|
+
* IpFilters: [ // OcsfIpFilterList
|
|
100
|
+
* { // OcsfIpFilter
|
|
101
|
+
* FieldName: "evidences.dst_endpoint.ip" || "evidences.src_endpoint.ip",
|
|
102
|
+
* Filter: { // IpFilter
|
|
103
|
+
* Cidr: "STRING_VALUE",
|
|
104
|
+
* },
|
|
105
|
+
* },
|
|
106
|
+
* ],
|
|
107
|
+
* NestedCompositeFilters: [
|
|
108
|
+
* {
|
|
109
|
+
* StringFilters: [
|
|
110
|
+
* {
|
|
111
|
+
* FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
|
|
112
|
+
* Filter: {
|
|
113
|
+
* Value: "STRING_VALUE",
|
|
114
|
+
* Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
|
|
115
|
+
* },
|
|
116
|
+
* },
|
|
117
|
+
* ],
|
|
118
|
+
* DateFilters: [
|
|
119
|
+
* {
|
|
120
|
+
* FieldName: "finding_info.created_time_dt" || "finding_info.first_seen_time_dt" || "finding_info.last_seen_time_dt" || "finding_info.modified_time_dt" || "resources.image.created_time_dt" || "resources.image.last_used_time_dt" || "resources.modified_time_dt",
|
|
121
|
+
* Filter: {
|
|
122
|
+
* Start: "STRING_VALUE",
|
|
123
|
+
* End: "STRING_VALUE",
|
|
124
|
+
* DateRange: {
|
|
125
|
+
* Value: Number("int"),
|
|
126
|
+
* Unit: "DAYS",
|
|
127
|
+
* },
|
|
128
|
+
* },
|
|
129
|
+
* },
|
|
130
|
+
* ],
|
|
131
|
+
* BooleanFilters: [
|
|
132
|
+
* {
|
|
133
|
+
* FieldName: "compliance.assessments.meets_criteria" || "vulnerabilities.is_exploit_available" || "vulnerabilities.is_fix_available",
|
|
134
|
+
* Filter: {
|
|
135
|
+
* Value: true || false,
|
|
136
|
+
* },
|
|
137
|
+
* },
|
|
138
|
+
* ],
|
|
139
|
+
* NumberFilters: [
|
|
140
|
+
* {
|
|
141
|
+
* FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
|
|
142
|
+
* Filter: {
|
|
143
|
+
* Gte: Number("double"),
|
|
144
|
+
* Lte: Number("double"),
|
|
145
|
+
* Eq: Number("double"),
|
|
146
|
+
* Gt: Number("double"),
|
|
147
|
+
* Lt: Number("double"),
|
|
148
|
+
* },
|
|
149
|
+
* },
|
|
150
|
+
* ],
|
|
151
|
+
* MapFilters: [
|
|
152
|
+
* {
|
|
153
|
+
* FieldName: "resources.tags" || "compliance.control_parameters" || "databucket.tags" || "finding_info.tags",
|
|
154
|
+
* Filter: {
|
|
155
|
+
* Key: "STRING_VALUE",
|
|
156
|
+
* Value: "STRING_VALUE",
|
|
157
|
+
* Comparison: "EQUALS" || "NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
|
|
158
|
+
* },
|
|
159
|
+
* },
|
|
160
|
+
* ],
|
|
161
|
+
* IpFilters: [
|
|
162
|
+
* {
|
|
163
|
+
* FieldName: "evidences.dst_endpoint.ip" || "evidences.src_endpoint.ip",
|
|
164
|
+
* Filter: {
|
|
165
|
+
* Cidr: "STRING_VALUE",
|
|
166
|
+
* },
|
|
167
|
+
* },
|
|
168
|
+
* ],
|
|
169
|
+
* NestedCompositeFilters: "<CompositeFilterList>",
|
|
170
|
+
* Operator: "AND" || "OR",
|
|
171
|
+
* },
|
|
172
|
+
* ],
|
|
99
173
|
* Operator: "AND" || "OR",
|
|
100
174
|
* },
|
|
101
175
|
* ],
|
|
102
176
|
* CompositeOperator: "AND" || "OR",
|
|
103
177
|
* },
|
|
104
|
-
* GroupByField: "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.name" || "compliance.status" || "compliance.control" || "finding_info.title" || "finding_info.types" || "metadata.product.name" || "metadata.product.uid" || "resources.type" || "resources.uid" || "severity" || "status" || "vulnerabilities.fix_coverage" || "class_name", // required
|
|
178
|
+
* GroupByField: "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.name" || "compliance.status" || "compliance.control" || "finding_info.title" || "finding_info.types" || "metadata.product.name" || "metadata.product.uid" || "resources.type" || "resources.uid" || "severity" || "status" || "vulnerabilities.fix_coverage" || "class_name" || "vulnerabilities.affected_packages.name" || "finding_info.analytic.name" || "compliance.standards" || "cloud.account.name", // required
|
|
105
179
|
* },
|
|
106
180
|
* ],
|
|
107
181
|
* SortOrder: "asc" || "desc",
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import { Command as $Command } from "@smithy/smithy-client";
|
|
2
2
|
import { MetadataBearer as __MetadataBearer } from "@smithy/types";
|
|
3
|
-
import { GetFindingsRequest, GetFindingsResponse } from "../models/
|
|
3
|
+
import { GetFindingsRequest, GetFindingsResponse } from "../models/models_2";
|
|
4
4
|
import { SecurityHubClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../SecurityHubClient";
|
|
5
5
|
/**
|
|
6
6
|
* @public
|