@aws-sdk/client-securityhub 3.997.0 → 3.999.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +19 -19
- package/dist-cjs/index.js +2 -0
- package/dist-cjs/schemas/schemas_0.js +3 -2
- package/dist-es/models/enums.js +2 -0
- package/dist-es/schemas/schemas_0.js +3 -2
- package/dist-types/SecurityHub.d.ts +19 -19
- package/dist-types/SecurityHubClient.d.ts +19 -19
- package/dist-types/commands/AcceptAdministratorInvitationCommand.d.ts +4 -4
- package/dist-types/commands/AcceptInvitationCommand.d.ts +2 -2
- package/dist-types/commands/BatchDisableStandardsCommand.d.ts +1 -1
- package/dist-types/commands/BatchEnableStandardsCommand.d.ts +1 -1
- package/dist-types/commands/BatchGetConfigurationPolicyAssociationsCommand.d.ts +2 -2
- package/dist-types/commands/BatchImportFindingsCommand.d.ts +4 -4
- package/dist-types/commands/BatchUpdateFindingsCommand.d.ts +3 -3
- package/dist-types/commands/CreateActionTargetCommand.d.ts +2 -2
- package/dist-types/commands/CreateConfigurationPolicyCommand.d.ts +1 -1
- package/dist-types/commands/CreateFindingAggregatorCommand.d.ts +1 -1
- package/dist-types/commands/CreateInsightCommand.d.ts +1 -1
- package/dist-types/commands/CreateMembersCommand.d.ts +8 -8
- package/dist-types/commands/DeclineInvitationsCommand.d.ts +4 -4
- package/dist-types/commands/DeleteActionTargetCommand.d.ts +1 -1
- package/dist-types/commands/DeleteConfigurationPolicyCommand.d.ts +1 -1
- package/dist-types/commands/DeleteInvitationsCommand.d.ts +5 -5
- package/dist-types/commands/DeleteMembersCommand.d.ts +1 -1
- package/dist-types/commands/DescribeActionTargetsCommand.d.ts +1 -1
- package/dist-types/commands/DescribeHubCommand.d.ts +1 -1
- package/dist-types/commands/DescribeOrganizationConfigurationCommand.d.ts +2 -2
- package/dist-types/commands/DescribeProductsCommand.d.ts +1 -1
- package/dist-types/commands/DescribeProductsV2Command.d.ts +2 -1
- package/dist-types/commands/DescribeStandardsCommand.d.ts +1 -1
- package/dist-types/commands/DisableImportFindingsForProductCommand.d.ts +2 -2
- package/dist-types/commands/DisableOrganizationAdminAccountCommand.d.ts +1 -1
- package/dist-types/commands/DisableSecurityHubCommand.d.ts +5 -5
- package/dist-types/commands/DisassociateFromAdministratorAccountCommand.d.ts +1 -1
- package/dist-types/commands/DisassociateFromMasterAccountCommand.d.ts +2 -2
- package/dist-types/commands/EnableImportFindingsForProductCommand.d.ts +3 -3
- package/dist-types/commands/EnableOrganizationAdminAccountCommand.d.ts +1 -1
- package/dist-types/commands/EnableSecurityHubCommand.d.ts +6 -6
- package/dist-types/commands/GetAdministratorAccountCommand.d.ts +1 -1
- package/dist-types/commands/GetConfigurationPolicyAssociationCommand.d.ts +1 -1
- package/dist-types/commands/GetConfigurationPolicyCommand.d.ts +1 -1
- package/dist-types/commands/GetFindingHistoryCommand.d.ts +1 -1
- package/dist-types/commands/GetFindingStatisticsV2Command.d.ts +1 -1
- package/dist-types/commands/GetInsightResultsCommand.d.ts +1 -1
- package/dist-types/commands/GetInvitationsCountCommand.d.ts +4 -4
- package/dist-types/commands/GetMasterAccountCommand.d.ts +2 -2
- package/dist-types/commands/GetMembersCommand.d.ts +3 -3
- package/dist-types/commands/InviteMembersCommand.d.ts +6 -6
- package/dist-types/commands/ListConfigurationPoliciesCommand.d.ts +1 -1
- package/dist-types/commands/ListConfigurationPolicyAssociationsCommand.d.ts +1 -1
- package/dist-types/commands/ListEnabledProductsForImportCommand.d.ts +1 -1
- package/dist-types/commands/ListInvitationsCommand.d.ts +4 -4
- package/dist-types/commands/ListMembersCommand.d.ts +1 -1
- package/dist-types/commands/ListOrganizationAdminAccountsCommand.d.ts +1 -1
- package/dist-types/commands/StartConfigurationPolicyAssociationCommand.d.ts +1 -1
- package/dist-types/commands/StartConfigurationPolicyDisassociationCommand.d.ts +1 -1
- package/dist-types/commands/UpdateActionTargetCommand.d.ts +1 -1
- package/dist-types/commands/UpdateConfigurationPolicyCommand.d.ts +1 -1
- package/dist-types/commands/UpdateFindingsCommand.d.ts +2 -2
- package/dist-types/commands/UpdateInsightCommand.d.ts +1 -1
- package/dist-types/commands/UpdateOrganizationConfigurationCommand.d.ts +2 -2
- package/dist-types/commands/UpdateSecurityHubConfigurationCommand.d.ts +1 -1
- package/dist-types/index.d.ts +19 -19
- package/dist-types/models/enums.d.ts +2 -0
- package/dist-types/models/models_0.d.ts +83 -82
- package/dist-types/models/models_1.d.ts +57 -57
- package/dist-types/models/models_2.d.ts +197 -192
- package/dist-types/models/models_3.d.ts +23 -23
- package/dist-types/ts3.4/models/enums.d.ts +2 -0
- package/dist-types/ts3.4/models/models_2.d.ts +1 -0
- package/package.json +33 -33
package/README.md
CHANGED
|
@@ -6,47 +6,47 @@
|
|
|
6
6
|
|
|
7
7
|
AWS SDK for JavaScript SecurityHub Client for Node.js, Browser and React Native.
|
|
8
8
|
|
|
9
|
-
<p>Security Hub provides you with a comprehensive view of your security state in Amazon Web Services and helps
|
|
9
|
+
<p>Security Hub CSPM provides you with a comprehensive view of your security state in Amazon Web Services and helps
|
|
10
10
|
you assess your Amazon Web Services environment against security industry standards and best practices.</p>
|
|
11
|
-
<p>Security Hub collects security data across Amazon Web Services accounts, Amazon Web Services services, and
|
|
11
|
+
<p>Security Hub CSPM collects security data across Amazon Web Services accounts, Amazon Web Services services, and
|
|
12
12
|
supported third-party products and helps you analyze your security trends and identify the highest priority security
|
|
13
13
|
issues.</p>
|
|
14
|
-
<p>To help you manage the security state of your organization, Security Hub supports multiple security standards.
|
|
14
|
+
<p>To help you manage the security state of your organization, Security Hub CSPM supports multiple security standards.
|
|
15
15
|
These include the Amazon Web Services Foundational Security Best Practices (FSBP) standard developed by Amazon Web Services,
|
|
16
16
|
and external compliance frameworks such as the Center for Internet Security (CIS), the Payment Card Industry Data
|
|
17
17
|
Security Standard (PCI DSS), and the National Institute of Standards and Technology (NIST). Each standard includes
|
|
18
|
-
several security controls, each of which represents a security best practice. Security Hub runs checks against
|
|
18
|
+
several security controls, each of which represents a security best practice. Security Hub CSPM runs checks against
|
|
19
19
|
security controls and generates control findings to help you assess your compliance against security best practices.</p>
|
|
20
|
-
<p>In addition to generating control findings, Security Hub also receives findings from other Amazon Web Services services,
|
|
20
|
+
<p>In addition to generating control findings, Security Hub CSPM also receives findings from other Amazon Web Services services,
|
|
21
21
|
such as Amazon GuardDuty and Amazon Inspector, and
|
|
22
22
|
supported third-party products. This gives you a single pane of glass into a variety of security-related issues. You
|
|
23
|
-
can also send Security Hub findings to other Amazon Web Services services and supported third-party products.</p>
|
|
24
|
-
<p>Security Hub offers automation features that help you triage and remediate security issues. For example,
|
|
23
|
+
can also send Security Hub CSPM findings to other Amazon Web Services services and supported third-party products.</p>
|
|
24
|
+
<p>Security Hub CSPM offers automation features that help you triage and remediate security issues. For example,
|
|
25
25
|
you can use automation rules to automatically update critical findings when a security check fails. You can also leverage the integration with
|
|
26
26
|
Amazon EventBridge to trigger automatic responses to specific findings.</p>
|
|
27
|
-
<p>This guide, the <i>Security Hub API Reference</i>, provides
|
|
28
|
-
information about the Security Hub API. This includes supported resources, HTTP methods, parameters,
|
|
29
|
-
and schemas. If you're new to Security Hub, you might find it helpful to also review the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
|
|
30
|
-
<i>Security Hub User Guide</i>
|
|
27
|
+
<p>This guide, the <i>Security Hub CSPM API Reference</i>, provides
|
|
28
|
+
information about the Security Hub CSPM API. This includes supported resources, HTTP methods, parameters,
|
|
29
|
+
and schemas. If you're new to Security Hub CSPM, you might find it helpful to also review the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
|
|
30
|
+
<i>Security Hub CSPM User Guide</i>
|
|
31
31
|
</a>. The
|
|
32
32
|
user guide explains key concepts and provides procedures
|
|
33
|
-
that demonstrate how to use Security Hub features. It also provides information about topics such as
|
|
34
|
-
integrating Security Hub with other Amazon Web Services services.</p>
|
|
35
|
-
<p>In addition to interacting with Security Hub by making calls to the Security Hub API, you can
|
|
33
|
+
that demonstrate how to use Security Hub CSPM features. It also provides information about topics such as
|
|
34
|
+
integrating Security Hub CSPM with other Amazon Web Services services.</p>
|
|
35
|
+
<p>In addition to interacting with Security Hub CSPM by making calls to the Security Hub CSPM API, you can
|
|
36
36
|
use a current version of an Amazon Web Services command line tool or SDK. Amazon Web Services provides tools
|
|
37
37
|
and SDKs that consist of libraries and sample code for various languages and platforms, such as PowerShell,
|
|
38
38
|
Java, Go, Python, C++, and .NET. These tools and SDKs provide convenient, programmatic access to
|
|
39
|
-
Security Hub and other Amazon Web Services services . They also handle tasks such as signing requests,
|
|
39
|
+
Security Hub CSPM and other Amazon Web Services services . They also handle tasks such as signing requests,
|
|
40
40
|
managing errors, and retrying requests automatically. For information about installing and using the Amazon Web Services tools
|
|
41
41
|
and SDKs, see <a href="http://aws.amazon.com/developer/tools/">Tools to Build on Amazon Web Services</a>.</p>
|
|
42
|
-
<p>With the exception of operations that are related to central configuration, Security Hub API requests are executed only in
|
|
42
|
+
<p>With the exception of operations that are related to central configuration, Security Hub CSPM API requests are executed only in
|
|
43
43
|
the Amazon Web Services Region that is currently active or in the specific Amazon Web Services Region that you specify in your request. Any configuration or settings change
|
|
44
44
|
that results from the operation is applied only to that Region. To make the same change in
|
|
45
45
|
other Regions, call the same API operation in each Region in which you want to apply the change. When you use central configuration,
|
|
46
|
-
API requests for enabling Security Hub, standards, and controls are executed in the home Region and all linked Regions. For a list of
|
|
46
|
+
API requests for enabling Security Hub CSPM, standards, and controls are executed in the home Region and all linked Regions. For a list of
|
|
47
47
|
central configuration operations, see the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/central-configuration-intro.html#central-configuration-concepts">Central configuration
|
|
48
|
-
terms and concepts</a> section of the <i>Security Hub User Guide</i>.</p>
|
|
49
|
-
<p>The following throttling limits apply to Security Hub API operations.</p>
|
|
48
|
+
terms and concepts</a> section of the <i>Security Hub CSPM User Guide</i>.</p>
|
|
49
|
+
<p>The following throttling limits apply to Security Hub CSPM API operations.</p>
|
|
50
50
|
<ul>
|
|
51
51
|
<li>
|
|
52
52
|
<p>
|
package/dist-cjs/index.js
CHANGED
|
@@ -1956,6 +1956,7 @@ const IntegrationType = {
|
|
|
1956
1956
|
UPDATE_FINDINGS_IN_SECURITY_HUB: "UPDATE_FINDINGS_IN_SECURITY_HUB",
|
|
1957
1957
|
};
|
|
1958
1958
|
const IntegrationV2Type = {
|
|
1959
|
+
EXTENDED_PLAN: "EXTENDED_PLAN",
|
|
1959
1960
|
RECEIVE_FINDINGS_FROM_SECURITY_HUB: "RECEIVE_FINDINGS_FROM_SECURITY_HUB",
|
|
1960
1961
|
SEND_FINDINGS_TO_SECURITY_HUB: "SEND_FINDINGS_TO_SECURITY_HUB",
|
|
1961
1962
|
UPDATE_FINDINGS_IN_SECURITY_HUB: "UPDATE_FINDINGS_IN_SECURITY_HUB",
|
|
@@ -2001,6 +2002,7 @@ const GroupByField = {
|
|
|
2001
2002
|
FINDING_INFO_TYPES: "finding_info.types",
|
|
2002
2003
|
METADATA_PRODUCT_NAME: "metadata.product.name",
|
|
2003
2004
|
METADATA_PRODUCT_UID: "metadata.product.uid",
|
|
2005
|
+
METADATA_PRODUCT_VENDOR_NAME: "metadata.product.vendor_name",
|
|
2004
2006
|
RESOURCES_TYPE: "resources.type",
|
|
2005
2007
|
RESOURCES_UID: "resources.uid",
|
|
2006
2008
|
SEVERITY: "severity",
|
|
@@ -2273,6 +2273,7 @@ const _MO = "MetadataOptions";
|
|
|
2273
2273
|
const _MOa = "MaintenanceOptions";
|
|
2274
2274
|
const _MOo = "MountOptions";
|
|
2275
2275
|
const _MP = "MaxPrice";
|
|
2276
|
+
const _MPI = "MarketplaceProductId";
|
|
2276
2277
|
const _MPIOL = "MapPublicIpOnLaunch";
|
|
2277
2278
|
const _MPU = "MetadataProductUid";
|
|
2278
2279
|
const _MPV = "MinimumProtocolVersion";
|
|
@@ -7576,8 +7577,8 @@ exports.Product$ = [3, n0, _Produ,
|
|
|
7576
7577
|
];
|
|
7577
7578
|
exports.ProductV2$ = [3, n0, _PVro,
|
|
7578
7579
|
0,
|
|
7579
|
-
[_PVN, _CN, _D, _Cate, _IVT, _MUa, _AUc],
|
|
7580
|
-
[0, 0, 0, 64 | 0, 64 | 0, 0, 0]
|
|
7580
|
+
[_PVN, _CN, _D, _Cate, _IVT, _MUa, _AUc, _MPI],
|
|
7581
|
+
[0, 0, 0, 64 | 0, 64 | 0, 0, 0, 0]
|
|
7581
7582
|
];
|
|
7582
7583
|
exports.PropagatingVgwSetDetails$ = [3, n0, _PVSD,
|
|
7583
7584
|
0,
|
package/dist-es/models/enums.js
CHANGED
|
@@ -373,6 +373,7 @@ export const IntegrationType = {
|
|
|
373
373
|
UPDATE_FINDINGS_IN_SECURITY_HUB: "UPDATE_FINDINGS_IN_SECURITY_HUB",
|
|
374
374
|
};
|
|
375
375
|
export const IntegrationV2Type = {
|
|
376
|
+
EXTENDED_PLAN: "EXTENDED_PLAN",
|
|
376
377
|
RECEIVE_FINDINGS_FROM_SECURITY_HUB: "RECEIVE_FINDINGS_FROM_SECURITY_HUB",
|
|
377
378
|
SEND_FINDINGS_TO_SECURITY_HUB: "SEND_FINDINGS_TO_SECURITY_HUB",
|
|
378
379
|
UPDATE_FINDINGS_IN_SECURITY_HUB: "UPDATE_FINDINGS_IN_SECURITY_HUB",
|
|
@@ -418,6 +419,7 @@ export const GroupByField = {
|
|
|
418
419
|
FINDING_INFO_TYPES: "finding_info.types",
|
|
419
420
|
METADATA_PRODUCT_NAME: "metadata.product.name",
|
|
420
421
|
METADATA_PRODUCT_UID: "metadata.product.uid",
|
|
422
|
+
METADATA_PRODUCT_VENDOR_NAME: "metadata.product.vendor_name",
|
|
421
423
|
RESOURCES_TYPE: "resources.type",
|
|
422
424
|
RESOURCES_UID: "resources.uid",
|
|
423
425
|
SEVERITY: "severity",
|
|
@@ -2249,6 +2249,7 @@ const _MO = "MetadataOptions";
|
|
|
2249
2249
|
const _MOa = "MaintenanceOptions";
|
|
2250
2250
|
const _MOo = "MountOptions";
|
|
2251
2251
|
const _MP = "MaxPrice";
|
|
2252
|
+
const _MPI = "MarketplaceProductId";
|
|
2252
2253
|
const _MPIOL = "MapPublicIpOnLaunch";
|
|
2253
2254
|
const _MPU = "MetadataProductUid";
|
|
2254
2255
|
const _MPV = "MinimumProtocolVersion";
|
|
@@ -7552,8 +7553,8 @@ export var Product$ = [3, n0, _Produ,
|
|
|
7552
7553
|
];
|
|
7553
7554
|
export var ProductV2$ = [3, n0, _PVro,
|
|
7554
7555
|
0,
|
|
7555
|
-
[_PVN, _CN, _D, _Cate, _IVT, _MUa, _AUc],
|
|
7556
|
-
[0, 0, 0, 64 | 0, 64 | 0, 0, 0]
|
|
7556
|
+
[_PVN, _CN, _D, _Cate, _IVT, _MUa, _AUc, _MPI],
|
|
7557
|
+
[0, 0, 0, 64 | 0, 64 | 0, 0, 0, 0]
|
|
7557
7558
|
];
|
|
7558
7559
|
export var PropagatingVgwSetDetails$ = [3, n0, _PVSD,
|
|
7559
7560
|
0,
|
|
@@ -948,47 +948,47 @@ export interface SecurityHub {
|
|
|
948
948
|
paginateListStandardsControlAssociations(args: ListStandardsControlAssociationsCommandInput, paginationConfig?: Omit<PaginationConfiguration, "client">): Paginator<ListStandardsControlAssociationsCommandOutput>;
|
|
949
949
|
}
|
|
950
950
|
/**
|
|
951
|
-
* <p>Security Hub provides you with a comprehensive view of your security state in Amazon Web Services and helps
|
|
951
|
+
* <p>Security Hub CSPM provides you with a comprehensive view of your security state in Amazon Web Services and helps
|
|
952
952
|
* you assess your Amazon Web Services environment against security industry standards and best practices.</p>
|
|
953
|
-
* <p>Security Hub collects security data across Amazon Web Services accounts, Amazon Web Services services, and
|
|
953
|
+
* <p>Security Hub CSPM collects security data across Amazon Web Services accounts, Amazon Web Services services, and
|
|
954
954
|
* supported third-party products and helps you analyze your security trends and identify the highest priority security
|
|
955
955
|
* issues.</p>
|
|
956
|
-
* <p>To help you manage the security state of your organization, Security Hub supports multiple security standards.
|
|
956
|
+
* <p>To help you manage the security state of your organization, Security Hub CSPM supports multiple security standards.
|
|
957
957
|
* These include the Amazon Web Services Foundational Security Best Practices (FSBP) standard developed by Amazon Web Services,
|
|
958
958
|
* and external compliance frameworks such as the Center for Internet Security (CIS), the Payment Card Industry Data
|
|
959
959
|
* Security Standard (PCI DSS), and the National Institute of Standards and Technology (NIST). Each standard includes
|
|
960
|
-
* several security controls, each of which represents a security best practice. Security Hub runs checks against
|
|
960
|
+
* several security controls, each of which represents a security best practice. Security Hub CSPM runs checks against
|
|
961
961
|
* security controls and generates control findings to help you assess your compliance against security best practices.</p>
|
|
962
|
-
* <p>In addition to generating control findings, Security Hub also receives findings from other Amazon Web Services services,
|
|
962
|
+
* <p>In addition to generating control findings, Security Hub CSPM also receives findings from other Amazon Web Services services,
|
|
963
963
|
* such as Amazon GuardDuty and Amazon Inspector, and
|
|
964
964
|
* supported third-party products. This gives you a single pane of glass into a variety of security-related issues. You
|
|
965
|
-
* can also send Security Hub findings to other Amazon Web Services services and supported third-party products.</p>
|
|
966
|
-
* <p>Security Hub offers automation features that help you triage and remediate security issues. For example,
|
|
965
|
+
* can also send Security Hub CSPM findings to other Amazon Web Services services and supported third-party products.</p>
|
|
966
|
+
* <p>Security Hub CSPM offers automation features that help you triage and remediate security issues. For example,
|
|
967
967
|
* you can use automation rules to automatically update critical findings when a security check fails. You can also leverage the integration with
|
|
968
968
|
* Amazon EventBridge to trigger automatic responses to specific findings.</p>
|
|
969
|
-
* <p>This guide, the <i>Security Hub API Reference</i>, provides
|
|
970
|
-
* information about the Security Hub API. This includes supported resources, HTTP methods, parameters,
|
|
971
|
-
* and schemas. If you're new to Security Hub, you might find it helpful to also review the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
|
|
972
|
-
* <i>Security Hub User Guide</i>
|
|
969
|
+
* <p>This guide, the <i>Security Hub CSPM API Reference</i>, provides
|
|
970
|
+
* information about the Security Hub CSPM API. This includes supported resources, HTTP methods, parameters,
|
|
971
|
+
* and schemas. If you're new to Security Hub CSPM, you might find it helpful to also review the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
|
|
972
|
+
* <i>Security Hub CSPM User Guide</i>
|
|
973
973
|
* </a>. The
|
|
974
974
|
* user guide explains key concepts and provides procedures
|
|
975
|
-
* that demonstrate how to use Security Hub features. It also provides information about topics such as
|
|
976
|
-
* integrating Security Hub with other Amazon Web Services services.</p>
|
|
977
|
-
* <p>In addition to interacting with Security Hub by making calls to the Security Hub API, you can
|
|
975
|
+
* that demonstrate how to use Security Hub CSPM features. It also provides information about topics such as
|
|
976
|
+
* integrating Security Hub CSPM with other Amazon Web Services services.</p>
|
|
977
|
+
* <p>In addition to interacting with Security Hub CSPM by making calls to the Security Hub CSPM API, you can
|
|
978
978
|
* use a current version of an Amazon Web Services command line tool or SDK. Amazon Web Services provides tools
|
|
979
979
|
* and SDKs that consist of libraries and sample code for various languages and platforms, such as PowerShell,
|
|
980
980
|
* Java, Go, Python, C++, and .NET. These tools and SDKs provide convenient, programmatic access to
|
|
981
|
-
* Security Hub and other Amazon Web Services services . They also handle tasks such as signing requests,
|
|
981
|
+
* Security Hub CSPM and other Amazon Web Services services . They also handle tasks such as signing requests,
|
|
982
982
|
* managing errors, and retrying requests automatically. For information about installing and using the Amazon Web Services tools
|
|
983
983
|
* and SDKs, see <a href="http://aws.amazon.com/developer/tools/">Tools to Build on Amazon Web Services</a>.</p>
|
|
984
|
-
* <p>With the exception of operations that are related to central configuration, Security Hub API requests are executed only in
|
|
984
|
+
* <p>With the exception of operations that are related to central configuration, Security Hub CSPM API requests are executed only in
|
|
985
985
|
* the Amazon Web Services Region that is currently active or in the specific Amazon Web Services Region that you specify in your request. Any configuration or settings change
|
|
986
986
|
* that results from the operation is applied only to that Region. To make the same change in
|
|
987
987
|
* other Regions, call the same API operation in each Region in which you want to apply the change. When you use central configuration,
|
|
988
|
-
* API requests for enabling Security Hub, standards, and controls are executed in the home Region and all linked Regions. For a list of
|
|
988
|
+
* API requests for enabling Security Hub CSPM, standards, and controls are executed in the home Region and all linked Regions. For a list of
|
|
989
989
|
* central configuration operations, see the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/central-configuration-intro.html#central-configuration-concepts">Central configuration
|
|
990
|
-
* terms and concepts</a> section of the <i>Security Hub User Guide</i>.</p>
|
|
991
|
-
* <p>The following throttling limits apply to Security Hub API operations.</p>
|
|
990
|
+
* terms and concepts</a> section of the <i>Security Hub CSPM User Guide</i>.</p>
|
|
991
|
+
* <p>The following throttling limits apply to Security Hub CSPM API operations.</p>
|
|
992
992
|
* <ul>
|
|
993
993
|
* <li>
|
|
994
994
|
* <p>
|
|
@@ -276,47 +276,47 @@ export type SecurityHubClientResolvedConfigType = __SmithyResolvedConfiguration<
|
|
|
276
276
|
export interface SecurityHubClientResolvedConfig extends SecurityHubClientResolvedConfigType {
|
|
277
277
|
}
|
|
278
278
|
/**
|
|
279
|
-
* <p>Security Hub provides you with a comprehensive view of your security state in Amazon Web Services and helps
|
|
279
|
+
* <p>Security Hub CSPM provides you with a comprehensive view of your security state in Amazon Web Services and helps
|
|
280
280
|
* you assess your Amazon Web Services environment against security industry standards and best practices.</p>
|
|
281
|
-
* <p>Security Hub collects security data across Amazon Web Services accounts, Amazon Web Services services, and
|
|
281
|
+
* <p>Security Hub CSPM collects security data across Amazon Web Services accounts, Amazon Web Services services, and
|
|
282
282
|
* supported third-party products and helps you analyze your security trends and identify the highest priority security
|
|
283
283
|
* issues.</p>
|
|
284
|
-
* <p>To help you manage the security state of your organization, Security Hub supports multiple security standards.
|
|
284
|
+
* <p>To help you manage the security state of your organization, Security Hub CSPM supports multiple security standards.
|
|
285
285
|
* These include the Amazon Web Services Foundational Security Best Practices (FSBP) standard developed by Amazon Web Services,
|
|
286
286
|
* and external compliance frameworks such as the Center for Internet Security (CIS), the Payment Card Industry Data
|
|
287
287
|
* Security Standard (PCI DSS), and the National Institute of Standards and Technology (NIST). Each standard includes
|
|
288
|
-
* several security controls, each of which represents a security best practice. Security Hub runs checks against
|
|
288
|
+
* several security controls, each of which represents a security best practice. Security Hub CSPM runs checks against
|
|
289
289
|
* security controls and generates control findings to help you assess your compliance against security best practices.</p>
|
|
290
|
-
* <p>In addition to generating control findings, Security Hub also receives findings from other Amazon Web Services services,
|
|
290
|
+
* <p>In addition to generating control findings, Security Hub CSPM also receives findings from other Amazon Web Services services,
|
|
291
291
|
* such as Amazon GuardDuty and Amazon Inspector, and
|
|
292
292
|
* supported third-party products. This gives you a single pane of glass into a variety of security-related issues. You
|
|
293
|
-
* can also send Security Hub findings to other Amazon Web Services services and supported third-party products.</p>
|
|
294
|
-
* <p>Security Hub offers automation features that help you triage and remediate security issues. For example,
|
|
293
|
+
* can also send Security Hub CSPM findings to other Amazon Web Services services and supported third-party products.</p>
|
|
294
|
+
* <p>Security Hub CSPM offers automation features that help you triage and remediate security issues. For example,
|
|
295
295
|
* you can use automation rules to automatically update critical findings when a security check fails. You can also leverage the integration with
|
|
296
296
|
* Amazon EventBridge to trigger automatic responses to specific findings.</p>
|
|
297
|
-
* <p>This guide, the <i>Security Hub API Reference</i>, provides
|
|
298
|
-
* information about the Security Hub API. This includes supported resources, HTTP methods, parameters,
|
|
299
|
-
* and schemas. If you're new to Security Hub, you might find it helpful to also review the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
|
|
300
|
-
* <i>Security Hub User Guide</i>
|
|
297
|
+
* <p>This guide, the <i>Security Hub CSPM API Reference</i>, provides
|
|
298
|
+
* information about the Security Hub CSPM API. This includes supported resources, HTTP methods, parameters,
|
|
299
|
+
* and schemas. If you're new to Security Hub CSPM, you might find it helpful to also review the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html">
|
|
300
|
+
* <i>Security Hub CSPM User Guide</i>
|
|
301
301
|
* </a>. The
|
|
302
302
|
* user guide explains key concepts and provides procedures
|
|
303
|
-
* that demonstrate how to use Security Hub features. It also provides information about topics such as
|
|
304
|
-
* integrating Security Hub with other Amazon Web Services services.</p>
|
|
305
|
-
* <p>In addition to interacting with Security Hub by making calls to the Security Hub API, you can
|
|
303
|
+
* that demonstrate how to use Security Hub CSPM features. It also provides information about topics such as
|
|
304
|
+
* integrating Security Hub CSPM with other Amazon Web Services services.</p>
|
|
305
|
+
* <p>In addition to interacting with Security Hub CSPM by making calls to the Security Hub CSPM API, you can
|
|
306
306
|
* use a current version of an Amazon Web Services command line tool or SDK. Amazon Web Services provides tools
|
|
307
307
|
* and SDKs that consist of libraries and sample code for various languages and platforms, such as PowerShell,
|
|
308
308
|
* Java, Go, Python, C++, and .NET. These tools and SDKs provide convenient, programmatic access to
|
|
309
|
-
* Security Hub and other Amazon Web Services services . They also handle tasks such as signing requests,
|
|
309
|
+
* Security Hub CSPM and other Amazon Web Services services . They also handle tasks such as signing requests,
|
|
310
310
|
* managing errors, and retrying requests automatically. For information about installing and using the Amazon Web Services tools
|
|
311
311
|
* and SDKs, see <a href="http://aws.amazon.com/developer/tools/">Tools to Build on Amazon Web Services</a>.</p>
|
|
312
|
-
* <p>With the exception of operations that are related to central configuration, Security Hub API requests are executed only in
|
|
312
|
+
* <p>With the exception of operations that are related to central configuration, Security Hub CSPM API requests are executed only in
|
|
313
313
|
* the Amazon Web Services Region that is currently active or in the specific Amazon Web Services Region that you specify in your request. Any configuration or settings change
|
|
314
314
|
* that results from the operation is applied only to that Region. To make the same change in
|
|
315
315
|
* other Regions, call the same API operation in each Region in which you want to apply the change. When you use central configuration,
|
|
316
|
-
* API requests for enabling Security Hub, standards, and controls are executed in the home Region and all linked Regions. For a list of
|
|
316
|
+
* API requests for enabling Security Hub CSPM, standards, and controls are executed in the home Region and all linked Regions. For a list of
|
|
317
317
|
* central configuration operations, see the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/central-configuration-intro.html#central-configuration-concepts">Central configuration
|
|
318
|
-
* terms and concepts</a> section of the <i>Security Hub User Guide</i>.</p>
|
|
319
|
-
* <p>The following throttling limits apply to Security Hub API operations.</p>
|
|
318
|
+
* terms and concepts</a> section of the <i>Security Hub CSPM User Guide</i>.</p>
|
|
319
|
+
* <p>The following throttling limits apply to Security Hub CSPM API operations.</p>
|
|
320
320
|
* <ul>
|
|
321
321
|
* <li>
|
|
322
322
|
* <p>
|
|
@@ -28,11 +28,11 @@ declare const AcceptAdministratorInvitationCommand_base: {
|
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
30
|
* <note>
|
|
31
|
-
* <p>We recommend using Organizations instead of Security Hub invitations to manage your member accounts.
|
|
32
|
-
* For information, see <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-accounts-orgs.html">Managing Security Hub administrator and member accounts with Organizations</a>
|
|
33
|
-
* in the <i>Security Hub User Guide</i>.</p>
|
|
31
|
+
* <p>We recommend using Organizations instead of Security Hub CSPM invitations to manage your member accounts.
|
|
32
|
+
* For information, see <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-accounts-orgs.html">Managing Security Hub CSPM administrator and member accounts with Organizations</a>
|
|
33
|
+
* in the <i>Security Hub CSPM User Guide</i>.</p>
|
|
34
34
|
* </note>
|
|
35
|
-
* <p>Accepts the invitation to be a member account and be monitored by the Security Hub administrator
|
|
35
|
+
* <p>Accepts the invitation to be a member account and be monitored by the Security Hub CSPM administrator
|
|
36
36
|
* account that the invitation was sent from.</p>
|
|
37
37
|
* <p>This operation is only used by member accounts that are not added through
|
|
38
38
|
* Organizations.</p>
|
|
@@ -28,8 +28,8 @@ declare const AcceptInvitationCommand_base: {
|
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
30
|
* <p>This method is deprecated. Instead, use <code>AcceptAdministratorInvitation</code>.</p>
|
|
31
|
-
* <p>The Security Hub console continues to use <code>AcceptInvitation</code>. It will eventually change to use <code>AcceptAdministratorInvitation</code>. Any IAM policies that specifically control access to this function must continue to use <code>AcceptInvitation</code>. You should also add <code>AcceptAdministratorInvitation</code> to your policies to ensure that the correct permissions are in place after the console begins to use <code>AcceptAdministratorInvitation</code>.</p>
|
|
32
|
-
* <p>Accepts the invitation to be a member account and be monitored by the Security Hub administrator
|
|
31
|
+
* <p>The Security Hub CSPM console continues to use <code>AcceptInvitation</code>. It will eventually change to use <code>AcceptAdministratorInvitation</code>. Any IAM policies that specifically control access to this function must continue to use <code>AcceptInvitation</code>. You should also add <code>AcceptAdministratorInvitation</code> to your policies to ensure that the correct permissions are in place after the console begins to use <code>AcceptAdministratorInvitation</code>.</p>
|
|
32
|
+
* <p>Accepts the invitation to be a member account and be monitored by the Security Hub CSPM administrator
|
|
33
33
|
* account that the invitation was sent from.</p>
|
|
34
34
|
* <p>This operation is only used by member accounts that are not added through
|
|
35
35
|
* Organizations.</p>
|
|
@@ -29,7 +29,7 @@ declare const BatchDisableStandardsCommand_base: {
|
|
|
29
29
|
/**
|
|
30
30
|
* <p>Disables the standards specified by the provided
|
|
31
31
|
* <code>StandardsSubscriptionArns</code>.</p>
|
|
32
|
-
* <p>For more information, see <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-standards.html">Security Standards</a> section of the <i>Security Hub User
|
|
32
|
+
* <p>For more information, see <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-standards.html">Security Standards</a> section of the <i>Security Hub CSPM User
|
|
33
33
|
* Guide</i>.</p>
|
|
34
34
|
* @example
|
|
35
35
|
* Use a bare-bones client and the command you need to make an API call.
|
|
@@ -31,7 +31,7 @@ declare const BatchEnableStandardsCommand_base: {
|
|
|
31
31
|
* ARN for a standard, use the <code>DescribeStandards</code>
|
|
32
32
|
* operation.</p>
|
|
33
33
|
* <p>For more information, see the <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-standards.html">Security Standards</a>
|
|
34
|
-
* section of the <i>Security Hub User Guide</i>.</p>
|
|
34
|
+
* section of the <i>Security Hub CSPM User Guide</i>.</p>
|
|
35
35
|
* @example
|
|
36
36
|
* Use a bare-bones client and the command you need to make an API call.
|
|
37
37
|
* ```javascript
|
|
@@ -28,8 +28,8 @@ declare const BatchGetConfigurationPolicyAssociationsCommand_base: {
|
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
30
|
* <p>
|
|
31
|
-
* Returns associations between an Security Hub configuration and a batch of target accounts, organizational units, or the root.
|
|
32
|
-
* Only the Security Hub delegated administrator can invoke this operation from the home Region. A configuration
|
|
31
|
+
* Returns associations between an Security Hub CSPM configuration and a batch of target accounts, organizational units, or the root.
|
|
32
|
+
* Only the Security Hub CSPM delegated administrator can invoke this operation from the home Region. A configuration
|
|
33
33
|
* can refer to a configuration policy or to a self-managed configuration.
|
|
34
34
|
* </p>
|
|
35
35
|
* @example
|
|
@@ -27,9 +27,9 @@ declare const BatchImportFindingsCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Imports security findings generated by a finding provider into Security Hub.
|
|
30
|
+
* <p>Imports security findings generated by a finding provider into Security Hub CSPM.
|
|
31
31
|
* This action is requested by the finding provider to import its findings into
|
|
32
|
-
* Security Hub.</p>
|
|
32
|
+
* Security Hub CSPM.</p>
|
|
33
33
|
* <p>
|
|
34
34
|
* <code>BatchImportFindings</code> must be called by one of the following:</p>
|
|
35
35
|
* <ul>
|
|
@@ -41,7 +41,7 @@ declare const BatchImportFindingsCommand_base: {
|
|
|
41
41
|
* from needs to be the same as the <code>AwsAccountId</code> attribute for the finding.</p>
|
|
42
42
|
* </li>
|
|
43
43
|
* <li>
|
|
44
|
-
* <p>An Amazon Web Services account that Security Hub has allow-listed for an official partner
|
|
44
|
+
* <p>An Amazon Web Services account that Security Hub CSPM has allow-listed for an official partner
|
|
45
45
|
* integration. In this case, you can call <code>BatchImportFindings</code> from the allow-listed
|
|
46
46
|
* account and send findings from different customer accounts in the same batch.</p>
|
|
47
47
|
* </li>
|
|
@@ -49,7 +49,7 @@ declare const BatchImportFindingsCommand_base: {
|
|
|
49
49
|
* <p>The maximum allowed size for a finding is 240 Kb. An error is returned for any finding
|
|
50
50
|
* larger than 240 Kb.</p>
|
|
51
51
|
* <p>After a finding is created, <code>BatchImportFindings</code> cannot be used to update
|
|
52
|
-
* the following finding fields and objects, which Security Hub customers use to manage their
|
|
52
|
+
* the following finding fields and objects, which Security Hub CSPM customers use to manage their
|
|
53
53
|
* investigation workflow.</p>
|
|
54
54
|
* <ul>
|
|
55
55
|
* <li>
|
|
@@ -28,7 +28,7 @@ declare const BatchUpdateFindingsCommand_base: {
|
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
30
|
* <p>
|
|
31
|
-
* Used by Security Hub customers to update information about their investigation into one or more findings.
|
|
31
|
+
* Used by Security Hub CSPM customers to update information about their investigation into one or more findings.
|
|
32
32
|
* Requested by administrator accounts or member accounts.
|
|
33
33
|
* Administrator accounts can update findings for their account and their member accounts.
|
|
34
34
|
* A member account can update findings only for their own account.
|
|
@@ -83,12 +83,12 @@ declare const BatchUpdateFindingsCommand_base: {
|
|
|
83
83
|
* </ul>
|
|
84
84
|
* <p>
|
|
85
85
|
* If you use this operation to update a finding, your updates don’t affect the value for the <code>UpdatedAt</code> field of the finding.
|
|
86
|
-
* Also note that it can take several minutes for Security Hub to process your request and update each finding specified in the request.
|
|
86
|
+
* Also note that it can take several minutes for Security Hub CSPM to process your request and update each finding specified in the request.
|
|
87
87
|
* </p>
|
|
88
88
|
* <p>
|
|
89
89
|
* You can configure IAM policies to restrict access to fields and field values.
|
|
90
90
|
* For example, you might not want member accounts to be able to suppress findings or change the finding severity.
|
|
91
|
-
* For more information see <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/finding-update-batchupdatefindings.html#batchupdatefindings-configure-access">Configuring access to BatchUpdateFindings</a> in the <i>Security Hub User Guide</i>.
|
|
91
|
+
* For more information see <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/finding-update-batchupdatefindings.html#batchupdatefindings-configure-access">Configuring access to BatchUpdateFindings</a> in the <i>Security Hub CSPM User Guide</i>.
|
|
92
92
|
* </p>
|
|
93
93
|
* @example
|
|
94
94
|
* Use a bare-bones client and the command you need to make an API call.
|
|
@@ -27,8 +27,8 @@ declare const CreateActionTargetCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Creates a custom action target in Security Hub.</p>
|
|
31
|
-
* <p>You can use custom actions on findings and insights in Security Hub to trigger target actions
|
|
30
|
+
* <p>Creates a custom action target in Security Hub CSPM.</p>
|
|
31
|
+
* <p>You can use custom actions on findings and insights in Security Hub CSPM to trigger target actions
|
|
32
32
|
* in Amazon CloudWatch Events.</p>
|
|
33
33
|
* @example
|
|
34
34
|
* Use a bare-bones client and the command you need to make an API call.
|
|
@@ -28,7 +28,7 @@ declare const CreateConfigurationPolicyCommand_base: {
|
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
30
|
* <p>
|
|
31
|
-
* Creates a configuration policy with the defined configuration. Only the Security Hub delegated administrator
|
|
31
|
+
* Creates a configuration policy with the defined configuration. Only the Security Hub CSPM delegated administrator
|
|
32
32
|
* can invoke this operation from the home Region.
|
|
33
33
|
* </p>
|
|
34
34
|
* @example
|
|
@@ -31,7 +31,7 @@ declare const CreateFindingAggregatorCommand_base: {
|
|
|
31
31
|
* <p>The <i>aggregation Region</i> is now called the <i>home Region</i>.</p>
|
|
32
32
|
* </note>
|
|
33
33
|
* <p>Used to enable cross-Region aggregation. This operation can be invoked from the home Region only.</p>
|
|
34
|
-
* <p>For information about how cross-Region aggregation works, see <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/finding-aggregation.html">Understanding cross-Region aggregation in Security Hub</a> in the <i>Security Hub User Guide</i>.
|
|
34
|
+
* <p>For information about how cross-Region aggregation works, see <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/finding-aggregation.html">Understanding cross-Region aggregation in Security Hub CSPM</a> in the <i>Security Hub CSPM User Guide</i>.
|
|
35
35
|
* </p>
|
|
36
36
|
* @example
|
|
37
37
|
* Use a bare-bones client and the command you need to make an API call.
|
|
@@ -27,7 +27,7 @@ declare const CreateInsightCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Creates a custom insight in Security Hub. An insight is a consolidation of findings that relate
|
|
30
|
+
* <p>Creates a custom insight in Security Hub CSPM. An insight is a consolidation of findings that relate
|
|
31
31
|
* to a security issue that requires attention or remediation.</p>
|
|
32
32
|
* <p>To group the related findings in the insight, use the
|
|
33
33
|
* <code>GroupByAttribute</code>.</p>
|
|
@@ -27,7 +27,7 @@ declare const CreateMembersCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Creates a member association in Security Hub between the specified accounts and the account
|
|
30
|
+
* <p>Creates a member association in Security Hub CSPM between the specified accounts and the account
|
|
31
31
|
* used to make the request, which is the administrator account. If you are integrated with
|
|
32
32
|
* Organizations, then the administrator account is designated by the organization management account.</p>
|
|
33
33
|
* <p>
|
|
@@ -37,26 +37,26 @@ declare const CreateMembersCommand_base: {
|
|
|
37
37
|
* in the following cases:</p>
|
|
38
38
|
* <ul>
|
|
39
39
|
* <li>
|
|
40
|
-
* <p>Security Hub is not configured to automatically add new organization accounts.</p>
|
|
40
|
+
* <p>Security Hub CSPM is not configured to automatically add new organization accounts.</p>
|
|
41
41
|
* </li>
|
|
42
42
|
* <li>
|
|
43
|
-
* <p>The account was disassociated or deleted in Security Hub.</p>
|
|
43
|
+
* <p>The account was disassociated or deleted in Security Hub CSPM.</p>
|
|
44
44
|
* </li>
|
|
45
45
|
* </ul>
|
|
46
|
-
* <p>This action can only be used by an account that has Security Hub enabled. To enable Security Hub, you
|
|
46
|
+
* <p>This action can only be used by an account that has Security Hub CSPM enabled. To enable Security Hub CSPM, you
|
|
47
47
|
* can use the <code>EnableSecurityHub</code> operation.</p>
|
|
48
48
|
* <p>For accounts that are not organization members, you create the account association and
|
|
49
49
|
* then send an invitation to the member account. To send the invitation, you use the
|
|
50
50
|
* <code>InviteMembers</code> operation. If the account owner accepts
|
|
51
|
-
* the invitation, the account becomes a member account in Security Hub.</p>
|
|
51
|
+
* the invitation, the account becomes a member account in Security Hub CSPM.</p>
|
|
52
52
|
* <p>Accounts that are managed using Organizations don't receive an invitation. They
|
|
53
|
-
* automatically become a member account in Security Hub.</p>
|
|
53
|
+
* automatically become a member account in Security Hub CSPM.</p>
|
|
54
54
|
* <ul>
|
|
55
55
|
* <li>
|
|
56
|
-
* <p>If the organization account does not have Security Hub enabled, then Security Hub and the default standards are automatically enabled. Note that Security Hub cannot be enabled automatically for the organization management account. The organization management account must enable Security Hub before the administrator account enables it as a member account.</p>
|
|
56
|
+
* <p>If the organization account does not have Security Hub CSPM enabled, then Security Hub CSPM and the default standards are automatically enabled. Note that Security Hub CSPM cannot be enabled automatically for the organization management account. The organization management account must enable Security Hub CSPM before the administrator account enables it as a member account.</p>
|
|
57
57
|
* </li>
|
|
58
58
|
* <li>
|
|
59
|
-
* <p>For organization accounts that already have Security Hub enabled, Security Hub does not make any other changes to those accounts. It does not change their enabled standards or controls.</p>
|
|
59
|
+
* <p>For organization accounts that already have Security Hub CSPM enabled, Security Hub CSPM does not make any other changes to those accounts. It does not change their enabled standards or controls.</p>
|
|
60
60
|
* </li>
|
|
61
61
|
* </ul>
|
|
62
62
|
* <p>A permissions policy is added that permits the administrator account to view the findings
|
|
@@ -28,11 +28,11 @@ declare const DeclineInvitationsCommand_base: {
|
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
30
|
* <note>
|
|
31
|
-
* <p>We recommend using Organizations instead of Security Hub invitations to manage your member accounts.
|
|
32
|
-
* For information, see <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-accounts-orgs.html">Managing Security Hub administrator and member accounts with Organizations</a>
|
|
33
|
-
* in the <i>Security Hub User Guide</i>.</p>
|
|
31
|
+
* <p>We recommend using Organizations instead of Security Hub CSPM invitations to manage your member accounts.
|
|
32
|
+
* For information, see <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-accounts-orgs.html">Managing Security Hub CSPM administrator and member accounts with Organizations</a>
|
|
33
|
+
* in the <i>Security Hub CSPM User Guide</i>.</p>
|
|
34
34
|
* </note>
|
|
35
|
-
* <p>Declines invitations to become a Security Hub member account.</p>
|
|
35
|
+
* <p>Declines invitations to become a Security Hub CSPM member account.</p>
|
|
36
36
|
* <p>A prospective member account uses this operation to decline an invitation to become a member.</p>
|
|
37
37
|
* <p>Only member accounts that aren't part of an Amazon Web Services organization should use this operation.
|
|
38
38
|
* Organization accounts don't receive invitations.</p>
|
|
@@ -27,7 +27,7 @@ declare const DeleteActionTargetCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Deletes a custom action target from Security Hub.</p>
|
|
30
|
+
* <p>Deletes a custom action target from Security Hub CSPM.</p>
|
|
31
31
|
* <p>Deleting a custom action target does not affect any findings or insights that were
|
|
32
32
|
* already sent to Amazon CloudWatch Events using the custom action.</p>
|
|
33
33
|
* @example
|
|
@@ -28,7 +28,7 @@ declare const DeleteConfigurationPolicyCommand_base: {
|
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
30
|
* <p>
|
|
31
|
-
* Deletes a configuration policy. Only the Security Hub delegated administrator can invoke this operation
|
|
31
|
+
* Deletes a configuration policy. Only the Security Hub CSPM delegated administrator can invoke this operation
|
|
32
32
|
* from the home Region. For the deletion to succeed, you must first disassociate a configuration policy from target accounts,
|
|
33
33
|
* organizational units, or the root by invoking the <code>StartConfigurationPolicyDisassociation</code> operation.
|
|
34
34
|
* </p>
|
|
@@ -28,12 +28,12 @@ declare const DeleteInvitationsCommand_base: {
|
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
30
|
* <note>
|
|
31
|
-
* <p>We recommend using Organizations instead of Security Hub invitations to manage your member accounts.
|
|
32
|
-
* For information, see <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-accounts-orgs.html">Managing Security Hub administrator and member accounts with Organizations</a>
|
|
33
|
-
* in the <i>Security Hub User Guide</i>.</p>
|
|
31
|
+
* <p>We recommend using Organizations instead of Security Hub CSPM invitations to manage your member accounts.
|
|
32
|
+
* For information, see <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-accounts-orgs.html">Managing Security Hub CSPM administrator and member accounts with Organizations</a>
|
|
33
|
+
* in the <i>Security Hub CSPM User Guide</i>.</p>
|
|
34
34
|
* </note>
|
|
35
|
-
* <p>Deletes invitations to become a Security Hub member account.</p>
|
|
36
|
-
* <p>A Security Hub administrator account can use this operation to delete invitations sent to one or more prospective member accounts.</p>
|
|
35
|
+
* <p>Deletes invitations to become a Security Hub CSPM member account.</p>
|
|
36
|
+
* <p>A Security Hub CSPM administrator account can use this operation to delete invitations sent to one or more prospective member accounts.</p>
|
|
37
37
|
* <p>This operation is only used to delete invitations that are sent to prospective member accounts that aren't part of an Amazon Web Services organization.
|
|
38
38
|
* Organization accounts don't receive invitations.</p>
|
|
39
39
|
* @example
|
|
@@ -27,7 +27,7 @@ declare const DeleteMembersCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Deletes the specified member accounts from Security Hub.</p>
|
|
30
|
+
* <p>Deletes the specified member accounts from Security Hub CSPM.</p>
|
|
31
31
|
* <p>You can invoke this API only to delete accounts that became members through invitation. You can't invoke this
|
|
32
32
|
* API to delete accounts that belong to an Organizations organization.</p>
|
|
33
33
|
* @example
|
|
@@ -27,7 +27,7 @@ declare const DescribeActionTargetsCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Returns a list of the custom action targets in Security Hub in your account.</p>
|
|
30
|
+
* <p>Returns a list of the custom action targets in Security Hub CSPM in your account.</p>
|
|
31
31
|
* @example
|
|
32
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
33
33
|
* ```javascript
|
|
@@ -28,7 +28,7 @@ declare const DescribeHubCommand_base: {
|
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
30
|
* <p>Returns details about the Hub resource in your account, including the
|
|
31
|
-
* <code>HubArn</code> and the time when you enabled Security Hub.</p>
|
|
31
|
+
* <code>HubArn</code> and the time when you enabled Security Hub CSPM.</p>
|
|
32
32
|
* @example
|
|
33
33
|
* Use a bare-bones client and the command you need to make an API call.
|
|
34
34
|
* ```javascript
|
|
@@ -27,8 +27,8 @@ declare const DescribeOrganizationConfigurationCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Returns information about the way your organization is configured in Security Hub. Only the
|
|
31
|
-
* Security Hub administrator account can invoke this operation.</p>
|
|
30
|
+
* <p>Returns information about the way your organization is configured in Security Hub CSPM. Only the
|
|
31
|
+
* Security Hub CSPM administrator account can invoke this operation.</p>
|
|
32
32
|
* @example
|
|
33
33
|
* Use a bare-bones client and the command you need to make an API call.
|
|
34
34
|
* ```javascript
|