@aws-sdk/client-securityhub 3.939.0 → 3.943.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +8 -8
- package/dist-cjs/index.js +97 -50
- package/dist-es/SecurityHub.js +2 -2
- package/dist-es/commands/{ConnectorRegistrationsV2Command.js → RegisterConnectorV2Command.js} +5 -5
- package/dist-es/commands/index.js +1 -1
- package/dist-es/models/enums.js +9 -0
- package/dist-es/models/errors.js +16 -0
- package/dist-es/schemas/schemas_0.js +57 -37
- package/dist-types/SecurityHub.d.ts +7 -7
- package/dist-types/SecurityHubClient.d.ts +3 -3
- package/dist-types/commands/BatchUpdateFindingsV2Command.d.ts +1 -1
- package/dist-types/commands/CreateAggregatorV2Command.d.ts +4 -1
- package/dist-types/commands/CreateAutomationRuleV2Command.d.ts +8 -5
- package/dist-types/commands/CreateConnectorV2Command.d.ts +7 -4
- package/dist-types/commands/CreateTicketV2Command.d.ts +2 -1
- package/dist-types/commands/DeleteAggregatorV2Command.d.ts +1 -1
- package/dist-types/commands/DeleteAutomationRuleV2Command.d.ts +1 -1
- package/dist-types/commands/DeleteConnectorV2Command.d.ts +1 -1
- package/dist-types/commands/DescribeProductsV2Command.d.ts +1 -1
- package/dist-types/commands/DescribeSecurityHubV2Command.d.ts +1 -1
- package/dist-types/commands/DisableSecurityHubV2Command.d.ts +1 -1
- package/dist-types/commands/EnableSecurityHubV2Command.d.ts +1 -1
- package/dist-types/commands/GetAggregatorV2Command.d.ts +1 -1
- package/dist-types/commands/GetAutomationRuleV2Command.d.ts +5 -5
- package/dist-types/commands/GetConnectorV2Command.d.ts +2 -2
- package/dist-types/commands/GetFindingStatisticsV2Command.d.ts +6 -6
- package/dist-types/commands/GetFindingsTrendsV2Command.d.ts +1 -1
- package/dist-types/commands/GetFindingsV2Command.d.ts +5 -5
- package/dist-types/commands/GetResourcesStatisticsV2Command.d.ts +1 -1
- package/dist-types/commands/GetResourcesTrendsV2Command.d.ts +1 -1
- package/dist-types/commands/GetResourcesV2Command.d.ts +1 -1
- package/dist-types/commands/ListAggregatorsV2Command.d.ts +1 -1
- package/dist-types/commands/ListAutomationRulesV2Command.d.ts +1 -1
- package/dist-types/commands/ListConnectorsV2Command.d.ts +1 -1
- package/dist-types/commands/ListStandardsControlAssociationsCommand.d.ts +1 -2
- package/dist-types/commands/ListTagsForResourceCommand.d.ts +2 -1
- package/dist-types/commands/{ConnectorRegistrationsV2Command.d.ts → RegisterConnectorV2Command.d.ts} +23 -23
- package/dist-types/commands/UpdateAggregatorV2Command.d.ts +1 -1
- package/dist-types/commands/UpdateAutomationRuleV2Command.d.ts +5 -5
- package/dist-types/commands/UpdateConnectorV2Command.d.ts +5 -3
- package/dist-types/commands/index.d.ts +1 -1
- package/dist-types/models/enums.d.ts +17 -0
- package/dist-types/models/errors.d.ts +14 -0
- package/dist-types/models/models_0.d.ts +5 -5
- package/dist-types/models/models_2.d.ts +45 -43
- package/dist-types/models/models_3.d.ts +51 -30
- package/dist-types/schemas/schemas_0.d.ts +6 -5
- package/dist-types/ts3.4/SecurityHub.d.ts +17 -17
- package/dist-types/ts3.4/SecurityHubClient.d.ts +6 -6
- package/dist-types/ts3.4/commands/ListStandardsControlAssociationsCommand.d.ts +4 -2
- package/dist-types/ts3.4/commands/ListTagsForResourceCommand.d.ts +2 -4
- package/dist-types/ts3.4/commands/RegisterConnectorV2Command.d.ts +51 -0
- package/dist-types/ts3.4/commands/index.d.ts +1 -1
- package/dist-types/ts3.4/models/enums.d.ts +11 -0
- package/dist-types/ts3.4/models/errors.d.ts +9 -0
- package/dist-types/ts3.4/models/models_2.d.ts +16 -13
- package/dist-types/ts3.4/models/models_3.d.ts +20 -11
- package/dist-types/ts3.4/schemas/schemas_0.d.ts +5 -5
- package/package.json +5 -5
- package/dist-types/ts3.4/commands/ConnectorRegistrationsV2Command.d.ts +0 -51
|
@@ -28,7 +28,7 @@ declare const GetAutomationRuleV2Command_base: {
|
|
|
28
28
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
29
29
|
};
|
|
30
30
|
/**
|
|
31
|
-
* <p>Returns an automation rule for the V2 service
|
|
31
|
+
* <p>Returns an automation rule for the V2 service.</p>
|
|
32
32
|
* @example
|
|
33
33
|
* Use a bare-bones client and the command you need to make an API call.
|
|
34
34
|
* ```javascript
|
|
@@ -55,7 +55,7 @@ declare const GetAutomationRuleV2Command_base: {
|
|
|
55
55
|
* // { // CompositeFilter
|
|
56
56
|
* // StringFilters: [ // OcsfStringFilterList
|
|
57
57
|
* // { // OcsfStringFilter
|
|
58
|
-
* // FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
|
|
58
|
+
* // FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.traits.category" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name" || "vendor_attributes.severity",
|
|
59
59
|
* // Filter: { // StringFilter
|
|
60
60
|
* // Value: "STRING_VALUE",
|
|
61
61
|
* // Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
|
|
@@ -85,7 +85,7 @@ declare const GetAutomationRuleV2Command_base: {
|
|
|
85
85
|
* // ],
|
|
86
86
|
* // NumberFilters: [ // OcsfNumberFilterList
|
|
87
87
|
* // { // OcsfNumberFilter
|
|
88
|
-
* // FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
|
|
88
|
+
* // FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count" || "vulnerabilities.cve.cvss.base_score" || "vendor_attributes.severity_id",
|
|
89
89
|
* // Filter: { // NumberFilter
|
|
90
90
|
* // Gte: Number("double"),
|
|
91
91
|
* // Lte: Number("double"),
|
|
@@ -117,7 +117,7 @@ declare const GetAutomationRuleV2Command_base: {
|
|
|
117
117
|
* // {
|
|
118
118
|
* // StringFilters: [
|
|
119
119
|
* // {
|
|
120
|
-
* // FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
|
|
120
|
+
* // FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.traits.category" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name" || "vendor_attributes.severity",
|
|
121
121
|
* // Filter: {
|
|
122
122
|
* // Value: "STRING_VALUE",
|
|
123
123
|
* // Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
|
|
@@ -147,7 +147,7 @@ declare const GetAutomationRuleV2Command_base: {
|
|
|
147
147
|
* // ],
|
|
148
148
|
* // NumberFilters: [
|
|
149
149
|
* // {
|
|
150
|
-
* // FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
|
|
150
|
+
* // FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count" || "vulnerabilities.cve.cvss.base_score" || "vendor_attributes.severity_id",
|
|
151
151
|
* // Filter: {
|
|
152
152
|
* // Gte: Number("double"),
|
|
153
153
|
* // Lte: Number("double"),
|
|
@@ -27,7 +27,7 @@ declare const GetConnectorV2Command_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Grants permission to retrieve details for a connectorV2 based on connector id
|
|
30
|
+
* <p>Grants permission to retrieve details for a connectorV2 based on connector id.</p>
|
|
31
31
|
* @example
|
|
32
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
33
33
|
* ```javascript
|
|
@@ -64,7 +64,7 @@ declare const GetConnectorV2Command_base: {
|
|
|
64
64
|
* // },
|
|
65
65
|
* // ServiceNow: { // ServiceNowDetail
|
|
66
66
|
* // InstanceName: "STRING_VALUE",
|
|
67
|
-
* //
|
|
67
|
+
* // SecretArn: "STRING_VALUE", // required
|
|
68
68
|
* // AuthStatus: "ACTIVE" || "FAILED", // required
|
|
69
69
|
* // },
|
|
70
70
|
* // },
|
|
@@ -30,7 +30,7 @@ declare const GetFindingStatisticsV2Command_base: {
|
|
|
30
30
|
/**
|
|
31
31
|
* <p>Returns aggregated statistical data about findings.
|
|
32
32
|
* <code>GetFindingStatisticsV2</code> use <code>securityhub:GetAdhocInsightResults</code> in the <code>Action</code> element of an IAM policy statement.
|
|
33
|
-
* You must have permission to perform the <code>s</code> action
|
|
33
|
+
* You must have permission to perform the <code>s</code> action.</p>
|
|
34
34
|
* @example
|
|
35
35
|
* Use a bare-bones client and the command you need to make an API call.
|
|
36
36
|
* ```javascript
|
|
@@ -47,7 +47,7 @@ declare const GetFindingStatisticsV2Command_base: {
|
|
|
47
47
|
* { // CompositeFilter
|
|
48
48
|
* StringFilters: [ // OcsfStringFilterList
|
|
49
49
|
* { // OcsfStringFilter
|
|
50
|
-
* FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
|
|
50
|
+
* FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.traits.category" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name" || "vendor_attributes.severity",
|
|
51
51
|
* Filter: { // StringFilter
|
|
52
52
|
* Value: "STRING_VALUE",
|
|
53
53
|
* Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
|
|
@@ -77,7 +77,7 @@ declare const GetFindingStatisticsV2Command_base: {
|
|
|
77
77
|
* ],
|
|
78
78
|
* NumberFilters: [ // OcsfNumberFilterList
|
|
79
79
|
* { // OcsfNumberFilter
|
|
80
|
-
* FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
|
|
80
|
+
* FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count" || "vulnerabilities.cve.cvss.base_score" || "vendor_attributes.severity_id",
|
|
81
81
|
* Filter: { // NumberFilter
|
|
82
82
|
* Gte: Number("double"),
|
|
83
83
|
* Lte: Number("double"),
|
|
@@ -109,7 +109,7 @@ declare const GetFindingStatisticsV2Command_base: {
|
|
|
109
109
|
* {
|
|
110
110
|
* StringFilters: [
|
|
111
111
|
* {
|
|
112
|
-
* FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
|
|
112
|
+
* FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.traits.category" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name" || "vendor_attributes.severity",
|
|
113
113
|
* Filter: {
|
|
114
114
|
* Value: "STRING_VALUE",
|
|
115
115
|
* Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
|
|
@@ -139,7 +139,7 @@ declare const GetFindingStatisticsV2Command_base: {
|
|
|
139
139
|
* ],
|
|
140
140
|
* NumberFilters: [
|
|
141
141
|
* {
|
|
142
|
-
* FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
|
|
142
|
+
* FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count" || "vulnerabilities.cve.cvss.base_score" || "vendor_attributes.severity_id",
|
|
143
143
|
* Filter: {
|
|
144
144
|
* Gte: Number("double"),
|
|
145
145
|
* Lte: Number("double"),
|
|
@@ -176,7 +176,7 @@ declare const GetFindingStatisticsV2Command_base: {
|
|
|
176
176
|
* ],
|
|
177
177
|
* CompositeOperator: "AND" || "OR",
|
|
178
178
|
* },
|
|
179
|
-
* GroupByField: "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.name" || "compliance.status" || "compliance.control" || "finding_info.title" || "finding_info.types" || "metadata.product.name" || "metadata.product.uid" || "resources.type" || "resources.uid" || "severity" || "status" || "vulnerabilities.fix_coverage" || "class_name" || "vulnerabilities.affected_packages.name" || "finding_info.analytic.name" || "compliance.standards" || "cloud.account.name", // required
|
|
179
|
+
* GroupByField: "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.name" || "compliance.status" || "compliance.control" || "finding_info.title" || "finding_info.related_events.traits.category" || "finding_info.types" || "metadata.product.name" || "metadata.product.uid" || "resources.type" || "resources.uid" || "severity" || "status" || "vulnerabilities.fix_coverage" || "class_name" || "vulnerabilities.affected_packages.name" || "finding_info.analytic.name" || "compliance.standards" || "cloud.account.name" || "vendor_attributes.severity", // required
|
|
180
180
|
* },
|
|
181
181
|
* ],
|
|
182
182
|
* SortOrder: "asc" || "desc",
|
|
@@ -28,7 +28,7 @@ declare const GetFindingsTrendsV2Command_base: {
|
|
|
28
28
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
29
29
|
};
|
|
30
30
|
/**
|
|
31
|
-
* <p>Returns findings trend data based on the specified criteria. This operation helps you analyze patterns and changes in findings over time
|
|
31
|
+
* <p>Returns findings trend data based on the specified criteria. This operation helps you analyze patterns and changes in findings over time.</p>
|
|
32
32
|
* @example
|
|
33
33
|
* Use a bare-bones client and the command you need to make an API call.
|
|
34
34
|
* ```javascript
|
|
@@ -30,7 +30,7 @@ declare const GetFindingsV2Command_base: {
|
|
|
30
30
|
/**
|
|
31
31
|
* <p>Return a list of findings that match the specified criteria.
|
|
32
32
|
* <code>GetFindings</code> and <code>GetFindingsV2</code> both use <code>securityhub:GetFindings</code> in the <code>Action</code> element of an IAM policy statement.
|
|
33
|
-
* You must have permission to perform the <code>securityhub:GetFindings</code> action
|
|
33
|
+
* You must have permission to perform the <code>securityhub:GetFindings</code> action.</p>
|
|
34
34
|
* @example
|
|
35
35
|
* Use a bare-bones client and the command you need to make an API call.
|
|
36
36
|
* ```javascript
|
|
@@ -45,7 +45,7 @@ declare const GetFindingsV2Command_base: {
|
|
|
45
45
|
* { // CompositeFilter
|
|
46
46
|
* StringFilters: [ // OcsfStringFilterList
|
|
47
47
|
* { // OcsfStringFilter
|
|
48
|
-
* FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
|
|
48
|
+
* FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.traits.category" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name" || "vendor_attributes.severity",
|
|
49
49
|
* Filter: { // StringFilter
|
|
50
50
|
* Value: "STRING_VALUE",
|
|
51
51
|
* Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
|
|
@@ -75,7 +75,7 @@ declare const GetFindingsV2Command_base: {
|
|
|
75
75
|
* ],
|
|
76
76
|
* NumberFilters: [ // OcsfNumberFilterList
|
|
77
77
|
* { // OcsfNumberFilter
|
|
78
|
-
* FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
|
|
78
|
+
* FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count" || "vulnerabilities.cve.cvss.base_score" || "vendor_attributes.severity_id",
|
|
79
79
|
* Filter: { // NumberFilter
|
|
80
80
|
* Gte: Number("double"),
|
|
81
81
|
* Lte: Number("double"),
|
|
@@ -107,7 +107,7 @@ declare const GetFindingsV2Command_base: {
|
|
|
107
107
|
* {
|
|
108
108
|
* StringFilters: [
|
|
109
109
|
* {
|
|
110
|
-
* FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
|
|
110
|
+
* FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.traits.category" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name" || "vendor_attributes.severity",
|
|
111
111
|
* Filter: {
|
|
112
112
|
* Value: "STRING_VALUE",
|
|
113
113
|
* Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
|
|
@@ -137,7 +137,7 @@ declare const GetFindingsV2Command_base: {
|
|
|
137
137
|
* ],
|
|
138
138
|
* NumberFilters: [
|
|
139
139
|
* {
|
|
140
|
-
* FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
|
|
140
|
+
* FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count" || "vulnerabilities.cve.cvss.base_score" || "vendor_attributes.severity_id",
|
|
141
141
|
* Filter: {
|
|
142
142
|
* Gte: Number("double"),
|
|
143
143
|
* Lte: Number("double"),
|
|
@@ -28,7 +28,7 @@ declare const GetResourcesStatisticsV2Command_base: {
|
|
|
28
28
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
29
29
|
};
|
|
30
30
|
/**
|
|
31
|
-
* <p>Retrieves statistical information about Amazon Web Services resources and their associated security findings
|
|
31
|
+
* <p>Retrieves statistical information about Amazon Web Services resources and their associated security findings.</p>
|
|
32
32
|
* @example
|
|
33
33
|
* Use a bare-bones client and the command you need to make an API call.
|
|
34
34
|
* ```javascript
|
|
@@ -28,7 +28,7 @@ declare const GetResourcesTrendsV2Command_base: {
|
|
|
28
28
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
29
29
|
};
|
|
30
30
|
/**
|
|
31
|
-
* <p>Returns resource trend data based on the specified criteria. This operation helps you analyze patterns and changes in resource compliance over time
|
|
31
|
+
* <p>Returns resource trend data based on the specified criteria. This operation helps you analyze patterns and changes in resource compliance over time.</p>
|
|
32
32
|
* @example
|
|
33
33
|
* Use a bare-bones client and the command you need to make an API call.
|
|
34
34
|
* ```javascript
|
|
@@ -28,7 +28,7 @@ declare const GetResourcesV2Command_base: {
|
|
|
28
28
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
29
29
|
};
|
|
30
30
|
/**
|
|
31
|
-
* <p>Returns a list of resources
|
|
31
|
+
* <p>Returns a list of resources.</p>
|
|
32
32
|
* @example
|
|
33
33
|
* Use a bare-bones client and the command you need to make an API call.
|
|
34
34
|
* ```javascript
|
|
@@ -27,7 +27,7 @@ declare const ListAggregatorsV2Command_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Retrieves a list of V2 aggregators
|
|
30
|
+
* <p>Retrieves a list of V2 aggregators.</p>
|
|
31
31
|
* @example
|
|
32
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
33
33
|
* ```javascript
|
|
@@ -27,7 +27,7 @@ declare const ListAutomationRulesV2Command_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Returns a list of automation rules and metadata for the calling account
|
|
30
|
+
* <p>Returns a list of automation rules and metadata for the calling account.</p>
|
|
31
31
|
* @example
|
|
32
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
33
33
|
* ```javascript
|
|
@@ -27,7 +27,7 @@ declare const ListConnectorsV2Command_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Grants permission to retrieve a list of connectorsV2 and their metadata for the calling account
|
|
30
|
+
* <p>Grants permission to retrieve a list of connectorsV2 and their metadata for the calling account.</p>
|
|
31
31
|
* @example
|
|
32
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
33
33
|
* ```javascript
|
|
@@ -1,7 +1,6 @@
|
|
|
1
1
|
import { Command as $Command } from "@smithy/smithy-client";
|
|
2
2
|
import { MetadataBearer as __MetadataBearer } from "@smithy/types";
|
|
3
|
-
import { ListStandardsControlAssociationsRequest } from "../models/models_2";
|
|
4
|
-
import { ListStandardsControlAssociationsResponse } from "../models/models_3";
|
|
3
|
+
import { ListStandardsControlAssociationsRequest, ListStandardsControlAssociationsResponse } from "../models/models_2";
|
|
5
4
|
import { SecurityHubClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../SecurityHubClient";
|
|
6
5
|
/**
|
|
7
6
|
* @public
|
|
@@ -1,6 +1,7 @@
|
|
|
1
1
|
import { Command as $Command } from "@smithy/smithy-client";
|
|
2
2
|
import { MetadataBearer as __MetadataBearer } from "@smithy/types";
|
|
3
|
-
import { ListTagsForResourceRequest
|
|
3
|
+
import { ListTagsForResourceRequest } from "../models/models_2";
|
|
4
|
+
import { ListTagsForResourceResponse } from "../models/models_3";
|
|
4
5
|
import { SecurityHubClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../SecurityHubClient";
|
|
5
6
|
/**
|
|
6
7
|
* @public
|
package/dist-types/commands/{ConnectorRegistrationsV2Command.d.ts → RegisterConnectorV2Command.d.ts}
RENAMED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import { Command as $Command } from "@smithy/smithy-client";
|
|
2
2
|
import { MetadataBearer as __MetadataBearer } from "@smithy/types";
|
|
3
|
-
import {
|
|
3
|
+
import { RegisterConnectorV2Request, RegisterConnectorV2Response } from "../models/models_3";
|
|
4
4
|
import { SecurityHubClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../SecurityHubClient";
|
|
5
5
|
/**
|
|
6
6
|
* @public
|
|
@@ -10,49 +10,49 @@ export { $Command };
|
|
|
10
10
|
/**
|
|
11
11
|
* @public
|
|
12
12
|
*
|
|
13
|
-
* The input for {@link
|
|
13
|
+
* The input for {@link RegisterConnectorV2Command}.
|
|
14
14
|
*/
|
|
15
|
-
export interface
|
|
15
|
+
export interface RegisterConnectorV2CommandInput extends RegisterConnectorV2Request {
|
|
16
16
|
}
|
|
17
17
|
/**
|
|
18
18
|
* @public
|
|
19
19
|
*
|
|
20
|
-
* The output of {@link
|
|
20
|
+
* The output of {@link RegisterConnectorV2Command}.
|
|
21
21
|
*/
|
|
22
|
-
export interface
|
|
22
|
+
export interface RegisterConnectorV2CommandOutput extends RegisterConnectorV2Response, __MetadataBearer {
|
|
23
23
|
}
|
|
24
|
-
declare const
|
|
25
|
-
new (input:
|
|
26
|
-
new (input:
|
|
24
|
+
declare const RegisterConnectorV2Command_base: {
|
|
25
|
+
new (input: RegisterConnectorV2CommandInput): import("@smithy/smithy-client").CommandImpl<RegisterConnectorV2CommandInput, RegisterConnectorV2CommandOutput, SecurityHubClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
|
|
26
|
+
new (input: RegisterConnectorV2CommandInput): import("@smithy/smithy-client").CommandImpl<RegisterConnectorV2CommandInput, RegisterConnectorV2CommandOutput, SecurityHubClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Grants permission to complete the authorization based on input parameters
|
|
30
|
+
* <p>Grants permission to complete the authorization based on input parameters.</p>
|
|
31
31
|
* @example
|
|
32
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
33
33
|
* ```javascript
|
|
34
|
-
* import { SecurityHubClient,
|
|
35
|
-
* // const { SecurityHubClient,
|
|
34
|
+
* import { SecurityHubClient, RegisterConnectorV2Command } from "@aws-sdk/client-securityhub"; // ES Modules import
|
|
35
|
+
* // const { SecurityHubClient, RegisterConnectorV2Command } = require("@aws-sdk/client-securityhub"); // CommonJS import
|
|
36
36
|
* // import type { SecurityHubClientConfig } from "@aws-sdk/client-securityhub";
|
|
37
37
|
* const config = {}; // type is SecurityHubClientConfig
|
|
38
38
|
* const client = new SecurityHubClient(config);
|
|
39
|
-
* const input = { //
|
|
39
|
+
* const input = { // RegisterConnectorV2Request
|
|
40
40
|
* AuthCode: "STRING_VALUE", // required
|
|
41
41
|
* AuthState: "STRING_VALUE", // required
|
|
42
42
|
* };
|
|
43
|
-
* const command = new
|
|
43
|
+
* const command = new RegisterConnectorV2Command(input);
|
|
44
44
|
* const response = await client.send(command);
|
|
45
|
-
* // { //
|
|
45
|
+
* // { // RegisterConnectorV2Response
|
|
46
46
|
* // ConnectorArn: "STRING_VALUE",
|
|
47
47
|
* // ConnectorId: "STRING_VALUE", // required
|
|
48
48
|
* // };
|
|
49
49
|
*
|
|
50
50
|
* ```
|
|
51
51
|
*
|
|
52
|
-
* @param
|
|
53
|
-
* @returns {@link
|
|
54
|
-
* @see {@link
|
|
55
|
-
* @see {@link
|
|
52
|
+
* @param RegisterConnectorV2CommandInput - {@link RegisterConnectorV2CommandInput}
|
|
53
|
+
* @returns {@link RegisterConnectorV2CommandOutput}
|
|
54
|
+
* @see {@link RegisterConnectorV2CommandInput} for command's `input` shape.
|
|
55
|
+
* @see {@link RegisterConnectorV2CommandOutput} for command's `response` shape.
|
|
56
56
|
* @see {@link SecurityHubClientResolvedConfig | config} for SecurityHubClient's `config` shape.
|
|
57
57
|
*
|
|
58
58
|
* @throws {@link AccessDeniedException} (client fault)
|
|
@@ -83,16 +83,16 @@ declare const ConnectorRegistrationsV2Command_base: {
|
|
|
83
83
|
*
|
|
84
84
|
* @public
|
|
85
85
|
*/
|
|
86
|
-
export declare class
|
|
86
|
+
export declare class RegisterConnectorV2Command extends RegisterConnectorV2Command_base {
|
|
87
87
|
/** @internal type navigation helper, not in runtime. */
|
|
88
88
|
protected static __types: {
|
|
89
89
|
api: {
|
|
90
|
-
input:
|
|
91
|
-
output:
|
|
90
|
+
input: RegisterConnectorV2Request;
|
|
91
|
+
output: RegisterConnectorV2Response;
|
|
92
92
|
};
|
|
93
93
|
sdk: {
|
|
94
|
-
input:
|
|
95
|
-
output:
|
|
94
|
+
input: RegisterConnectorV2CommandInput;
|
|
95
|
+
output: RegisterConnectorV2CommandOutput;
|
|
96
96
|
};
|
|
97
97
|
};
|
|
98
98
|
}
|
|
@@ -27,7 +27,7 @@ declare const UpdateAggregatorV2Command_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Udpates the configuration for the Aggregator V2
|
|
30
|
+
* <p>Udpates the configuration for the Aggregator V2.</p>
|
|
31
31
|
* @example
|
|
32
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
33
33
|
* ```javascript
|
|
@@ -27,7 +27,7 @@ declare const UpdateAutomationRuleV2Command_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Updates a V2 automation rule
|
|
30
|
+
* <p>Updates a V2 automation rule.</p>
|
|
31
31
|
* @example
|
|
32
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
33
33
|
* ```javascript
|
|
@@ -48,7 +48,7 @@ declare const UpdateAutomationRuleV2Command_base: {
|
|
|
48
48
|
* { // CompositeFilter
|
|
49
49
|
* StringFilters: [ // OcsfStringFilterList
|
|
50
50
|
* { // OcsfStringFilter
|
|
51
|
-
* FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
|
|
51
|
+
* FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.traits.category" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name" || "vendor_attributes.severity",
|
|
52
52
|
* Filter: { // StringFilter
|
|
53
53
|
* Value: "STRING_VALUE",
|
|
54
54
|
* Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
|
|
@@ -78,7 +78,7 @@ declare const UpdateAutomationRuleV2Command_base: {
|
|
|
78
78
|
* ],
|
|
79
79
|
* NumberFilters: [ // OcsfNumberFilterList
|
|
80
80
|
* { // OcsfNumberFilter
|
|
81
|
-
* FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
|
|
81
|
+
* FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count" || "vulnerabilities.cve.cvss.base_score" || "vendor_attributes.severity_id",
|
|
82
82
|
* Filter: { // NumberFilter
|
|
83
83
|
* Gte: Number("double"),
|
|
84
84
|
* Lte: Number("double"),
|
|
@@ -110,7 +110,7 @@ declare const UpdateAutomationRuleV2Command_base: {
|
|
|
110
110
|
* {
|
|
111
111
|
* StringFilters: [
|
|
112
112
|
* {
|
|
113
|
-
* FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
|
|
113
|
+
* FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.traits.category" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name" || "vendor_attributes.severity",
|
|
114
114
|
* Filter: {
|
|
115
115
|
* Value: "STRING_VALUE",
|
|
116
116
|
* Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
|
|
@@ -140,7 +140,7 @@ declare const UpdateAutomationRuleV2Command_base: {
|
|
|
140
140
|
* ],
|
|
141
141
|
* NumberFilters: [
|
|
142
142
|
* {
|
|
143
|
-
* FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
|
|
143
|
+
* FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count" || "vulnerabilities.cve.cvss.base_score" || "vendor_attributes.severity_id",
|
|
144
144
|
* Filter: {
|
|
145
145
|
* Gte: Number("double"),
|
|
146
146
|
* Lte: Number("double"),
|
|
@@ -27,7 +27,7 @@ declare const UpdateConnectorV2Command_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Grants permission to update a connectorV2 based on its id and input parameters
|
|
30
|
+
* <p>Grants permission to update a connectorV2 based on its id and input parameters.</p>
|
|
31
31
|
* @example
|
|
32
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
33
33
|
* ```javascript
|
|
@@ -38,11 +38,13 @@ declare const UpdateConnectorV2Command_base: {
|
|
|
38
38
|
* const client = new SecurityHubClient(config);
|
|
39
39
|
* const input = { // UpdateConnectorV2Request
|
|
40
40
|
* ConnectorId: "STRING_VALUE", // required
|
|
41
|
-
* ClientSecret: "STRING_VALUE",
|
|
42
41
|
* Description: "STRING_VALUE",
|
|
43
42
|
* Provider: { // ProviderUpdateConfiguration Union: only one key present
|
|
44
43
|
* JiraCloud: { // JiraCloudUpdateConfiguration
|
|
45
|
-
* ProjectKey: "STRING_VALUE",
|
|
44
|
+
* ProjectKey: "STRING_VALUE",
|
|
45
|
+
* },
|
|
46
|
+
* ServiceNow: { // ServiceNowUpdateConfiguration
|
|
47
|
+
* SecretArn: "STRING_VALUE",
|
|
46
48
|
* },
|
|
47
49
|
* },
|
|
48
50
|
* };
|
|
@@ -12,7 +12,6 @@ export * from "./BatchUpdateAutomationRulesCommand";
|
|
|
12
12
|
export * from "./BatchUpdateFindingsCommand";
|
|
13
13
|
export * from "./BatchUpdateFindingsV2Command";
|
|
14
14
|
export * from "./BatchUpdateStandardsControlAssociationsCommand";
|
|
15
|
-
export * from "./ConnectorRegistrationsV2Command";
|
|
16
15
|
export * from "./CreateActionTargetCommand";
|
|
17
16
|
export * from "./CreateAggregatorV2Command";
|
|
18
17
|
export * from "./CreateAutomationRuleCommand";
|
|
@@ -89,6 +88,7 @@ export * from "./ListOrganizationAdminAccountsCommand";
|
|
|
89
88
|
export * from "./ListSecurityControlDefinitionsCommand";
|
|
90
89
|
export * from "./ListStandardsControlAssociationsCommand";
|
|
91
90
|
export * from "./ListTagsForResourceCommand";
|
|
91
|
+
export * from "./RegisterConnectorV2Command";
|
|
92
92
|
export * from "./StartConfigurationPolicyAssociationCommand";
|
|
93
93
|
export * from "./StartConfigurationPolicyDisassociationCommand";
|
|
94
94
|
export * from "./TagResourceCommand";
|