@aws-sdk/client-securityhub 3.940.0 → 3.943.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (60) hide show
  1. package/README.md +8 -8
  2. package/dist-cjs/index.js +97 -50
  3. package/dist-es/SecurityHub.js +2 -2
  4. package/dist-es/commands/{ConnectorRegistrationsV2Command.js → RegisterConnectorV2Command.js} +5 -5
  5. package/dist-es/commands/index.js +1 -1
  6. package/dist-es/models/enums.js +9 -0
  7. package/dist-es/models/errors.js +16 -0
  8. package/dist-es/schemas/schemas_0.js +57 -37
  9. package/dist-types/SecurityHub.d.ts +7 -7
  10. package/dist-types/SecurityHubClient.d.ts +3 -3
  11. package/dist-types/commands/BatchUpdateFindingsV2Command.d.ts +1 -1
  12. package/dist-types/commands/CreateAggregatorV2Command.d.ts +4 -1
  13. package/dist-types/commands/CreateAutomationRuleV2Command.d.ts +8 -5
  14. package/dist-types/commands/CreateConnectorV2Command.d.ts +7 -4
  15. package/dist-types/commands/CreateTicketV2Command.d.ts +2 -1
  16. package/dist-types/commands/DeleteAggregatorV2Command.d.ts +1 -1
  17. package/dist-types/commands/DeleteAutomationRuleV2Command.d.ts +1 -1
  18. package/dist-types/commands/DeleteConnectorV2Command.d.ts +1 -1
  19. package/dist-types/commands/DescribeProductsV2Command.d.ts +1 -1
  20. package/dist-types/commands/DescribeSecurityHubV2Command.d.ts +1 -1
  21. package/dist-types/commands/DisableSecurityHubV2Command.d.ts +1 -1
  22. package/dist-types/commands/EnableSecurityHubV2Command.d.ts +1 -1
  23. package/dist-types/commands/GetAggregatorV2Command.d.ts +1 -1
  24. package/dist-types/commands/GetAutomationRuleV2Command.d.ts +5 -5
  25. package/dist-types/commands/GetConnectorV2Command.d.ts +2 -2
  26. package/dist-types/commands/GetFindingStatisticsV2Command.d.ts +6 -6
  27. package/dist-types/commands/GetFindingsTrendsV2Command.d.ts +1 -1
  28. package/dist-types/commands/GetFindingsV2Command.d.ts +5 -5
  29. package/dist-types/commands/GetResourcesStatisticsV2Command.d.ts +1 -1
  30. package/dist-types/commands/GetResourcesTrendsV2Command.d.ts +1 -1
  31. package/dist-types/commands/GetResourcesV2Command.d.ts +1 -1
  32. package/dist-types/commands/ListAggregatorsV2Command.d.ts +1 -1
  33. package/dist-types/commands/ListAutomationRulesV2Command.d.ts +1 -1
  34. package/dist-types/commands/ListConnectorsV2Command.d.ts +1 -1
  35. package/dist-types/commands/ListStandardsControlAssociationsCommand.d.ts +1 -2
  36. package/dist-types/commands/ListTagsForResourceCommand.d.ts +2 -1
  37. package/dist-types/commands/{ConnectorRegistrationsV2Command.d.ts → RegisterConnectorV2Command.d.ts} +23 -23
  38. package/dist-types/commands/UpdateAggregatorV2Command.d.ts +1 -1
  39. package/dist-types/commands/UpdateAutomationRuleV2Command.d.ts +5 -5
  40. package/dist-types/commands/UpdateConnectorV2Command.d.ts +5 -3
  41. package/dist-types/commands/index.d.ts +1 -1
  42. package/dist-types/models/enums.d.ts +17 -0
  43. package/dist-types/models/errors.d.ts +14 -0
  44. package/dist-types/models/models_0.d.ts +5 -5
  45. package/dist-types/models/models_2.d.ts +45 -43
  46. package/dist-types/models/models_3.d.ts +51 -30
  47. package/dist-types/schemas/schemas_0.d.ts +6 -5
  48. package/dist-types/ts3.4/SecurityHub.d.ts +17 -17
  49. package/dist-types/ts3.4/SecurityHubClient.d.ts +6 -6
  50. package/dist-types/ts3.4/commands/ListStandardsControlAssociationsCommand.d.ts +4 -2
  51. package/dist-types/ts3.4/commands/ListTagsForResourceCommand.d.ts +2 -4
  52. package/dist-types/ts3.4/commands/RegisterConnectorV2Command.d.ts +51 -0
  53. package/dist-types/ts3.4/commands/index.d.ts +1 -1
  54. package/dist-types/ts3.4/models/enums.d.ts +11 -0
  55. package/dist-types/ts3.4/models/errors.d.ts +9 -0
  56. package/dist-types/ts3.4/models/models_2.d.ts +16 -13
  57. package/dist-types/ts3.4/models/models_3.d.ts +20 -11
  58. package/dist-types/ts3.4/schemas/schemas_0.d.ts +5 -5
  59. package/package.json +5 -5
  60. package/dist-types/ts3.4/commands/ConnectorRegistrationsV2Command.d.ts +0 -51
@@ -28,7 +28,7 @@ declare const GetAutomationRuleV2Command_base: {
28
28
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
29
29
  };
30
30
  /**
31
- * <p>Returns an automation rule for the V2 service. This API is in public preview and subject to change.</p>
31
+ * <p>Returns an automation rule for the V2 service.</p>
32
32
  * @example
33
33
  * Use a bare-bones client and the command you need to make an API call.
34
34
  * ```javascript
@@ -55,7 +55,7 @@ declare const GetAutomationRuleV2Command_base: {
55
55
  * // { // CompositeFilter
56
56
  * // StringFilters: [ // OcsfStringFilterList
57
57
  * // { // OcsfStringFilter
58
- * // FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
58
+ * // FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.traits.category" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name" || "vendor_attributes.severity",
59
59
  * // Filter: { // StringFilter
60
60
  * // Value: "STRING_VALUE",
61
61
  * // Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
@@ -85,7 +85,7 @@ declare const GetAutomationRuleV2Command_base: {
85
85
  * // ],
86
86
  * // NumberFilters: [ // OcsfNumberFilterList
87
87
  * // { // OcsfNumberFilter
88
- * // FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
88
+ * // FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count" || "vulnerabilities.cve.cvss.base_score" || "vendor_attributes.severity_id",
89
89
  * // Filter: { // NumberFilter
90
90
  * // Gte: Number("double"),
91
91
  * // Lte: Number("double"),
@@ -117,7 +117,7 @@ declare const GetAutomationRuleV2Command_base: {
117
117
  * // {
118
118
  * // StringFilters: [
119
119
  * // {
120
- * // FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
120
+ * // FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.traits.category" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name" || "vendor_attributes.severity",
121
121
  * // Filter: {
122
122
  * // Value: "STRING_VALUE",
123
123
  * // Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
@@ -147,7 +147,7 @@ declare const GetAutomationRuleV2Command_base: {
147
147
  * // ],
148
148
  * // NumberFilters: [
149
149
  * // {
150
- * // FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
150
+ * // FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count" || "vulnerabilities.cve.cvss.base_score" || "vendor_attributes.severity_id",
151
151
  * // Filter: {
152
152
  * // Gte: Number("double"),
153
153
  * // Lte: Number("double"),
@@ -27,7 +27,7 @@ declare const GetConnectorV2Command_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Grants permission to retrieve details for a connectorV2 based on connector id. This API is in public preview and subject to change.</p>
30
+ * <p>Grants permission to retrieve details for a connectorV2 based on connector id.</p>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -64,7 +64,7 @@ declare const GetConnectorV2Command_base: {
64
64
  * // },
65
65
  * // ServiceNow: { // ServiceNowDetail
66
66
  * // InstanceName: "STRING_VALUE",
67
- * // ClientId: "STRING_VALUE",
67
+ * // SecretArn: "STRING_VALUE", // required
68
68
  * // AuthStatus: "ACTIVE" || "FAILED", // required
69
69
  * // },
70
70
  * // },
@@ -30,7 +30,7 @@ declare const GetFindingStatisticsV2Command_base: {
30
30
  /**
31
31
  * <p>Returns aggregated statistical data about findings.
32
32
  * <code>GetFindingStatisticsV2</code> use <code>securityhub:GetAdhocInsightResults</code> in the <code>Action</code> element of an IAM policy statement.
33
- * You must have permission to perform the <code>s</code> action. This API is in public preview and subject to change.</p>
33
+ * You must have permission to perform the <code>s</code> action.</p>
34
34
  * @example
35
35
  * Use a bare-bones client and the command you need to make an API call.
36
36
  * ```javascript
@@ -47,7 +47,7 @@ declare const GetFindingStatisticsV2Command_base: {
47
47
  * { // CompositeFilter
48
48
  * StringFilters: [ // OcsfStringFilterList
49
49
  * { // OcsfStringFilter
50
- * FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
50
+ * FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.traits.category" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name" || "vendor_attributes.severity",
51
51
  * Filter: { // StringFilter
52
52
  * Value: "STRING_VALUE",
53
53
  * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
@@ -77,7 +77,7 @@ declare const GetFindingStatisticsV2Command_base: {
77
77
  * ],
78
78
  * NumberFilters: [ // OcsfNumberFilterList
79
79
  * { // OcsfNumberFilter
80
- * FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
80
+ * FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count" || "vulnerabilities.cve.cvss.base_score" || "vendor_attributes.severity_id",
81
81
  * Filter: { // NumberFilter
82
82
  * Gte: Number("double"),
83
83
  * Lte: Number("double"),
@@ -109,7 +109,7 @@ declare const GetFindingStatisticsV2Command_base: {
109
109
  * {
110
110
  * StringFilters: [
111
111
  * {
112
- * FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
112
+ * FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.traits.category" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name" || "vendor_attributes.severity",
113
113
  * Filter: {
114
114
  * Value: "STRING_VALUE",
115
115
  * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
@@ -139,7 +139,7 @@ declare const GetFindingStatisticsV2Command_base: {
139
139
  * ],
140
140
  * NumberFilters: [
141
141
  * {
142
- * FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
142
+ * FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count" || "vulnerabilities.cve.cvss.base_score" || "vendor_attributes.severity_id",
143
143
  * Filter: {
144
144
  * Gte: Number("double"),
145
145
  * Lte: Number("double"),
@@ -176,7 +176,7 @@ declare const GetFindingStatisticsV2Command_base: {
176
176
  * ],
177
177
  * CompositeOperator: "AND" || "OR",
178
178
  * },
179
- * GroupByField: "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.name" || "compliance.status" || "compliance.control" || "finding_info.title" || "finding_info.types" || "metadata.product.name" || "metadata.product.uid" || "resources.type" || "resources.uid" || "severity" || "status" || "vulnerabilities.fix_coverage" || "class_name" || "vulnerabilities.affected_packages.name" || "finding_info.analytic.name" || "compliance.standards" || "cloud.account.name", // required
179
+ * GroupByField: "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.name" || "compliance.status" || "compliance.control" || "finding_info.title" || "finding_info.related_events.traits.category" || "finding_info.types" || "metadata.product.name" || "metadata.product.uid" || "resources.type" || "resources.uid" || "severity" || "status" || "vulnerabilities.fix_coverage" || "class_name" || "vulnerabilities.affected_packages.name" || "finding_info.analytic.name" || "compliance.standards" || "cloud.account.name" || "vendor_attributes.severity", // required
180
180
  * },
181
181
  * ],
182
182
  * SortOrder: "asc" || "desc",
@@ -28,7 +28,7 @@ declare const GetFindingsTrendsV2Command_base: {
28
28
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
29
29
  };
30
30
  /**
31
- * <p>Returns findings trend data based on the specified criteria. This operation helps you analyze patterns and changes in findings over time. This API is in public preview and subject to change.</p>
31
+ * <p>Returns findings trend data based on the specified criteria. This operation helps you analyze patterns and changes in findings over time.</p>
32
32
  * @example
33
33
  * Use a bare-bones client and the command you need to make an API call.
34
34
  * ```javascript
@@ -30,7 +30,7 @@ declare const GetFindingsV2Command_base: {
30
30
  /**
31
31
  * <p>Return a list of findings that match the specified criteria.
32
32
  * <code>GetFindings</code> and <code>GetFindingsV2</code> both use <code>securityhub:GetFindings</code> in the <code>Action</code> element of an IAM policy statement.
33
- * You must have permission to perform the <code>securityhub:GetFindings</code> action. This API is in public preview and subject to change.</p>
33
+ * You must have permission to perform the <code>securityhub:GetFindings</code> action.</p>
34
34
  * @example
35
35
  * Use a bare-bones client and the command you need to make an API call.
36
36
  * ```javascript
@@ -45,7 +45,7 @@ declare const GetFindingsV2Command_base: {
45
45
  * { // CompositeFilter
46
46
  * StringFilters: [ // OcsfStringFilterList
47
47
  * { // OcsfStringFilter
48
- * FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
48
+ * FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.traits.category" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name" || "vendor_attributes.severity",
49
49
  * Filter: { // StringFilter
50
50
  * Value: "STRING_VALUE",
51
51
  * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
@@ -75,7 +75,7 @@ declare const GetFindingsV2Command_base: {
75
75
  * ],
76
76
  * NumberFilters: [ // OcsfNumberFilterList
77
77
  * { // OcsfNumberFilter
78
- * FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
78
+ * FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count" || "vulnerabilities.cve.cvss.base_score" || "vendor_attributes.severity_id",
79
79
  * Filter: { // NumberFilter
80
80
  * Gte: Number("double"),
81
81
  * Lte: Number("double"),
@@ -107,7 +107,7 @@ declare const GetFindingsV2Command_base: {
107
107
  * {
108
108
  * StringFilters: [
109
109
  * {
110
- * FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
110
+ * FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.traits.category" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name" || "vendor_attributes.severity",
111
111
  * Filter: {
112
112
  * Value: "STRING_VALUE",
113
113
  * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
@@ -137,7 +137,7 @@ declare const GetFindingsV2Command_base: {
137
137
  * ],
138
138
  * NumberFilters: [
139
139
  * {
140
- * FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
140
+ * FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count" || "vulnerabilities.cve.cvss.base_score" || "vendor_attributes.severity_id",
141
141
  * Filter: {
142
142
  * Gte: Number("double"),
143
143
  * Lte: Number("double"),
@@ -28,7 +28,7 @@ declare const GetResourcesStatisticsV2Command_base: {
28
28
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
29
29
  };
30
30
  /**
31
- * <p>Retrieves statistical information about Amazon Web Services resources and their associated security findings. This API is in public preview and subject to change.</p>
31
+ * <p>Retrieves statistical information about Amazon Web Services resources and their associated security findings.</p>
32
32
  * @example
33
33
  * Use a bare-bones client and the command you need to make an API call.
34
34
  * ```javascript
@@ -28,7 +28,7 @@ declare const GetResourcesTrendsV2Command_base: {
28
28
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
29
29
  };
30
30
  /**
31
- * <p>Returns resource trend data based on the specified criteria. This operation helps you analyze patterns and changes in resource compliance over time. This API is in public preview and subject to change.</p>
31
+ * <p>Returns resource trend data based on the specified criteria. This operation helps you analyze patterns and changes in resource compliance over time.</p>
32
32
  * @example
33
33
  * Use a bare-bones client and the command you need to make an API call.
34
34
  * ```javascript
@@ -28,7 +28,7 @@ declare const GetResourcesV2Command_base: {
28
28
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
29
29
  };
30
30
  /**
31
- * <p>Returns a list of resources. This API is in public preview and subject to change.</p>
31
+ * <p>Returns a list of resources.</p>
32
32
  * @example
33
33
  * Use a bare-bones client and the command you need to make an API call.
34
34
  * ```javascript
@@ -27,7 +27,7 @@ declare const ListAggregatorsV2Command_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Retrieves a list of V2 aggregators. This API is in public preview and subject to change.</p>
30
+ * <p>Retrieves a list of V2 aggregators.</p>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -27,7 +27,7 @@ declare const ListAutomationRulesV2Command_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Returns a list of automation rules and metadata for the calling account. This API is in public preview and subject to change.</p>
30
+ * <p>Returns a list of automation rules and metadata for the calling account.</p>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -27,7 +27,7 @@ declare const ListConnectorsV2Command_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Grants permission to retrieve a list of connectorsV2 and their metadata for the calling account. This API is in public preview and subject to change.</p>
30
+ * <p>Grants permission to retrieve a list of connectorsV2 and their metadata for the calling account.</p>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -1,7 +1,6 @@
1
1
  import { Command as $Command } from "@smithy/smithy-client";
2
2
  import { MetadataBearer as __MetadataBearer } from "@smithy/types";
3
- import { ListStandardsControlAssociationsRequest } from "../models/models_2";
4
- import { ListStandardsControlAssociationsResponse } from "../models/models_3";
3
+ import { ListStandardsControlAssociationsRequest, ListStandardsControlAssociationsResponse } from "../models/models_2";
5
4
  import { SecurityHubClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../SecurityHubClient";
6
5
  /**
7
6
  * @public
@@ -1,6 +1,7 @@
1
1
  import { Command as $Command } from "@smithy/smithy-client";
2
2
  import { MetadataBearer as __MetadataBearer } from "@smithy/types";
3
- import { ListTagsForResourceRequest, ListTagsForResourceResponse } from "../models/models_3";
3
+ import { ListTagsForResourceRequest } from "../models/models_2";
4
+ import { ListTagsForResourceResponse } from "../models/models_3";
4
5
  import { SecurityHubClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../SecurityHubClient";
5
6
  /**
6
7
  * @public
@@ -1,6 +1,6 @@
1
1
  import { Command as $Command } from "@smithy/smithy-client";
2
2
  import { MetadataBearer as __MetadataBearer } from "@smithy/types";
3
- import { ConnectorRegistrationsV2Request, ConnectorRegistrationsV2Response } from "../models/models_2";
3
+ import { RegisterConnectorV2Request, RegisterConnectorV2Response } from "../models/models_3";
4
4
  import { SecurityHubClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../SecurityHubClient";
5
5
  /**
6
6
  * @public
@@ -10,49 +10,49 @@ export { $Command };
10
10
  /**
11
11
  * @public
12
12
  *
13
- * The input for {@link ConnectorRegistrationsV2Command}.
13
+ * The input for {@link RegisterConnectorV2Command}.
14
14
  */
15
- export interface ConnectorRegistrationsV2CommandInput extends ConnectorRegistrationsV2Request {
15
+ export interface RegisterConnectorV2CommandInput extends RegisterConnectorV2Request {
16
16
  }
17
17
  /**
18
18
  * @public
19
19
  *
20
- * The output of {@link ConnectorRegistrationsV2Command}.
20
+ * The output of {@link RegisterConnectorV2Command}.
21
21
  */
22
- export interface ConnectorRegistrationsV2CommandOutput extends ConnectorRegistrationsV2Response, __MetadataBearer {
22
+ export interface RegisterConnectorV2CommandOutput extends RegisterConnectorV2Response, __MetadataBearer {
23
23
  }
24
- declare const ConnectorRegistrationsV2Command_base: {
25
- new (input: ConnectorRegistrationsV2CommandInput): import("@smithy/smithy-client").CommandImpl<ConnectorRegistrationsV2CommandInput, ConnectorRegistrationsV2CommandOutput, SecurityHubClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
26
- new (input: ConnectorRegistrationsV2CommandInput): import("@smithy/smithy-client").CommandImpl<ConnectorRegistrationsV2CommandInput, ConnectorRegistrationsV2CommandOutput, SecurityHubClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
24
+ declare const RegisterConnectorV2Command_base: {
25
+ new (input: RegisterConnectorV2CommandInput): import("@smithy/smithy-client").CommandImpl<RegisterConnectorV2CommandInput, RegisterConnectorV2CommandOutput, SecurityHubClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
26
+ new (input: RegisterConnectorV2CommandInput): import("@smithy/smithy-client").CommandImpl<RegisterConnectorV2CommandInput, RegisterConnectorV2CommandOutput, SecurityHubClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes>;
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Grants permission to complete the authorization based on input parameters. This API is in public preview and subject to change.</p>
30
+ * <p>Grants permission to complete the authorization based on input parameters.</p>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
34
- * import { SecurityHubClient, ConnectorRegistrationsV2Command } from "@aws-sdk/client-securityhub"; // ES Modules import
35
- * // const { SecurityHubClient, ConnectorRegistrationsV2Command } = require("@aws-sdk/client-securityhub"); // CommonJS import
34
+ * import { SecurityHubClient, RegisterConnectorV2Command } from "@aws-sdk/client-securityhub"; // ES Modules import
35
+ * // const { SecurityHubClient, RegisterConnectorV2Command } = require("@aws-sdk/client-securityhub"); // CommonJS import
36
36
  * // import type { SecurityHubClientConfig } from "@aws-sdk/client-securityhub";
37
37
  * const config = {}; // type is SecurityHubClientConfig
38
38
  * const client = new SecurityHubClient(config);
39
- * const input = { // ConnectorRegistrationsV2Request
39
+ * const input = { // RegisterConnectorV2Request
40
40
  * AuthCode: "STRING_VALUE", // required
41
41
  * AuthState: "STRING_VALUE", // required
42
42
  * };
43
- * const command = new ConnectorRegistrationsV2Command(input);
43
+ * const command = new RegisterConnectorV2Command(input);
44
44
  * const response = await client.send(command);
45
- * // { // ConnectorRegistrationsV2Response
45
+ * // { // RegisterConnectorV2Response
46
46
  * // ConnectorArn: "STRING_VALUE",
47
47
  * // ConnectorId: "STRING_VALUE", // required
48
48
  * // };
49
49
  *
50
50
  * ```
51
51
  *
52
- * @param ConnectorRegistrationsV2CommandInput - {@link ConnectorRegistrationsV2CommandInput}
53
- * @returns {@link ConnectorRegistrationsV2CommandOutput}
54
- * @see {@link ConnectorRegistrationsV2CommandInput} for command's `input` shape.
55
- * @see {@link ConnectorRegistrationsV2CommandOutput} for command's `response` shape.
52
+ * @param RegisterConnectorV2CommandInput - {@link RegisterConnectorV2CommandInput}
53
+ * @returns {@link RegisterConnectorV2CommandOutput}
54
+ * @see {@link RegisterConnectorV2CommandInput} for command's `input` shape.
55
+ * @see {@link RegisterConnectorV2CommandOutput} for command's `response` shape.
56
56
  * @see {@link SecurityHubClientResolvedConfig | config} for SecurityHubClient's `config` shape.
57
57
  *
58
58
  * @throws {@link AccessDeniedException} (client fault)
@@ -83,16 +83,16 @@ declare const ConnectorRegistrationsV2Command_base: {
83
83
  *
84
84
  * @public
85
85
  */
86
- export declare class ConnectorRegistrationsV2Command extends ConnectorRegistrationsV2Command_base {
86
+ export declare class RegisterConnectorV2Command extends RegisterConnectorV2Command_base {
87
87
  /** @internal type navigation helper, not in runtime. */
88
88
  protected static __types: {
89
89
  api: {
90
- input: ConnectorRegistrationsV2Request;
91
- output: ConnectorRegistrationsV2Response;
90
+ input: RegisterConnectorV2Request;
91
+ output: RegisterConnectorV2Response;
92
92
  };
93
93
  sdk: {
94
- input: ConnectorRegistrationsV2CommandInput;
95
- output: ConnectorRegistrationsV2CommandOutput;
94
+ input: RegisterConnectorV2CommandInput;
95
+ output: RegisterConnectorV2CommandOutput;
96
96
  };
97
97
  };
98
98
  }
@@ -27,7 +27,7 @@ declare const UpdateAggregatorV2Command_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Udpates the configuration for the Aggregator V2. This API is in public preview and subject to change.</p>
30
+ * <p>Udpates the configuration for the Aggregator V2.</p>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -27,7 +27,7 @@ declare const UpdateAutomationRuleV2Command_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Updates a V2 automation rule. This API is in public preview and subject to change.</p>
30
+ * <p>Updates a V2 automation rule.</p>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -48,7 +48,7 @@ declare const UpdateAutomationRuleV2Command_base: {
48
48
  * { // CompositeFilter
49
49
  * StringFilters: [ // OcsfStringFilterList
50
50
  * { // OcsfStringFilter
51
- * FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
51
+ * FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.traits.category" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name" || "vendor_attributes.severity",
52
52
  * Filter: { // StringFilter
53
53
  * Value: "STRING_VALUE",
54
54
  * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
@@ -78,7 +78,7 @@ declare const UpdateAutomationRuleV2Command_base: {
78
78
  * ],
79
79
  * NumberFilters: [ // OcsfNumberFilterList
80
80
  * { // OcsfNumberFilter
81
- * FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
81
+ * FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count" || "vulnerabilities.cve.cvss.base_score" || "vendor_attributes.severity_id",
82
82
  * Filter: { // NumberFilter
83
83
  * Gte: Number("double"),
84
84
  * Lte: Number("double"),
@@ -110,7 +110,7 @@ declare const UpdateAutomationRuleV2Command_base: {
110
110
  * {
111
111
  * StringFilters: [
112
112
  * {
113
- * FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name",
113
+ * FieldName: "metadata.uid" || "activity_name" || "cloud.account.uid" || "cloud.provider" || "cloud.region" || "compliance.assessments.category" || "compliance.assessments.name" || "compliance.control" || "compliance.status" || "compliance.standards" || "finding_info.desc" || "finding_info.src_url" || "finding_info.title" || "finding_info.types" || "finding_info.uid" || "finding_info.related_events.traits.category" || "finding_info.related_events.uid" || "finding_info.related_events.product.uid" || "finding_info.related_events.title" || "metadata.product.name" || "metadata.product.uid" || "metadata.product.vendor_name" || "remediation.desc" || "remediation.references" || "resources.cloud_partition" || "resources.region" || "resources.type" || "resources.uid" || "severity" || "status" || "comment" || "vulnerabilities.fix_coverage" || "class_name" || "databucket.encryption_details.algorithm" || "databucket.encryption_details.key_uid" || "databucket.file.data_classifications.classifier_details.type" || "evidences.actor.user.account.uid" || "evidences.api.operation" || "evidences.api.response.error_message" || "evidences.api.service.name" || "evidences.connection_info.direction" || "evidences.connection_info.protocol_name" || "evidences.dst_endpoint.autonomous_system.name" || "evidences.dst_endpoint.location.city" || "evidences.dst_endpoint.location.country" || "evidences.src_endpoint.autonomous_system.name" || "evidences.src_endpoint.hostname" || "evidences.src_endpoint.location.city" || "evidences.src_endpoint.location.country" || "finding_info.analytic.name" || "malware.name" || "malware_scan_info.uid" || "malware.severity" || "resources.cloud_function.layers.uid_alt" || "resources.cloud_function.runtime" || "resources.cloud_function.user.uid" || "resources.device.encryption_details.key_uid" || "resources.device.image.uid" || "resources.image.architecture" || "resources.image.registry_uid" || "resources.image.repository_name" || "resources.image.uid" || "resources.subnet_info.uid" || "resources.vpc_uid" || "vulnerabilities.affected_code.file.path" || "vulnerabilities.affected_packages.name" || "vulnerabilities.cve.epss.score" || "vulnerabilities.cve.uid" || "vulnerabilities.related_vulnerabilities" || "cloud.account.name" || "vendor_attributes.severity",
114
114
  * Filter: {
115
115
  * Value: "STRING_VALUE",
116
116
  * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS" || "CONTAINS_WORD",
@@ -140,7 +140,7 @@ declare const UpdateAutomationRuleV2Command_base: {
140
140
  * ],
141
141
  * NumberFilters: [
142
142
  * {
143
- * FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count",
143
+ * FieldName: "activity_id" || "compliance.status_id" || "confidence_score" || "severity_id" || "status_id" || "finding_info.related_events_count" || "evidences.api.response.code" || "evidences.dst_endpoint.autonomous_system.number" || "evidences.dst_endpoint.port" || "evidences.src_endpoint.autonomous_system.number" || "evidences.src_endpoint.port" || "resources.image.in_use_count" || "vulnerabilities.cve.cvss.base_score" || "vendor_attributes.severity_id",
144
144
  * Filter: {
145
145
  * Gte: Number("double"),
146
146
  * Lte: Number("double"),
@@ -27,7 +27,7 @@ declare const UpdateConnectorV2Command_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Grants permission to update a connectorV2 based on its id and input parameters. This API is in public preview and subject to change.</p>
30
+ * <p>Grants permission to update a connectorV2 based on its id and input parameters.</p>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -38,11 +38,13 @@ declare const UpdateConnectorV2Command_base: {
38
38
  * const client = new SecurityHubClient(config);
39
39
  * const input = { // UpdateConnectorV2Request
40
40
  * ConnectorId: "STRING_VALUE", // required
41
- * ClientSecret: "STRING_VALUE",
42
41
  * Description: "STRING_VALUE",
43
42
  * Provider: { // ProviderUpdateConfiguration Union: only one key present
44
43
  * JiraCloud: { // JiraCloudUpdateConfiguration
45
- * ProjectKey: "STRING_VALUE", // required
44
+ * ProjectKey: "STRING_VALUE",
45
+ * },
46
+ * ServiceNow: { // ServiceNowUpdateConfiguration
47
+ * SecretArn: "STRING_VALUE",
46
48
  * },
47
49
  * },
48
50
  * };
@@ -12,7 +12,6 @@ export * from "./BatchUpdateAutomationRulesCommand";
12
12
  export * from "./BatchUpdateFindingsCommand";
13
13
  export * from "./BatchUpdateFindingsV2Command";
14
14
  export * from "./BatchUpdateStandardsControlAssociationsCommand";
15
- export * from "./ConnectorRegistrationsV2Command";
16
15
  export * from "./CreateActionTargetCommand";
17
16
  export * from "./CreateAggregatorV2Command";
18
17
  export * from "./CreateAutomationRuleCommand";
@@ -89,6 +88,7 @@ export * from "./ListOrganizationAdminAccountsCommand";
89
88
  export * from "./ListSecurityControlDefinitionsCommand";
90
89
  export * from "./ListStandardsControlAssociationsCommand";
91
90
  export * from "./ListTagsForResourceCommand";
91
+ export * from "./RegisterConnectorV2Command";
92
92
  export * from "./StartConfigurationPolicyAssociationCommand";
93
93
  export * from "./StartConfigurationPolicyDisassociationCommand";
94
94
  export * from "./TagResourceCommand";