aws-sdk 2.1386.0 → 2.1387.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +13 -1
- package/README.md +1 -1
- package/apis/chime-sdk-voice-2022-08-03.min.json +2 -1
- package/apis/glue-2017-03-31.min.json +510 -509
- package/apis/iotfleetwise-2021-06-17.min.json +86 -43
- package/apis/location-2020-11-19.min.json +23 -16
- package/apis/personalize-2018-05-22.min.json +32 -13
- package/apis/securityhub-2018-10-26.examples.json +140 -3
- package/apis/securityhub-2018-10-26.min.json +465 -158
- package/apis/securitylake-2018-05-10.min.json +457 -447
- package/apis/securitylake-2018-05-10.paginators.json +7 -7
- package/apis/wafv2-2019-07-29.min.json +168 -159
- package/clients/chimesdkvoice.d.ts +5 -0
- package/clients/glue.d.ts +29 -24
- package/clients/groundstation.d.ts +2 -2
- package/clients/iotfleetwise.d.ts +98 -13
- package/clients/location.d.ts +24 -8
- package/clients/memorydb.d.ts +2 -2
- package/clients/personalize.d.ts +34 -17
- package/clients/polly.d.ts +2 -2
- package/clients/securityhub.d.ts +539 -1
- package/clients/securitylake.d.ts +560 -541
- package/clients/wafv2.d.ts +16 -6
- package/dist/aws-sdk-core-react-native.js +1 -1
- package/dist/aws-sdk-react-native.js +10 -10
- package/dist/aws-sdk.js +58 -32
- package/dist/aws-sdk.min.js +30 -30
- package/lib/core.js +1 -1
- package/package.json +1 -1
@@ -73,9 +73,103 @@
|
|
73
73
|
"output": {
|
74
74
|
}
|
75
75
|
},
|
76
|
-
"description": "The following example
|
77
|
-
"id": "to-
|
78
|
-
"title": "To
|
76
|
+
"description": "The following example enables the security standard specified by the StandardArn. You can use this operation to enable one or more Security Hub standards.",
|
77
|
+
"id": "to-enable-security-standards-1683233792239",
|
78
|
+
"title": "To enable security standards"
|
79
|
+
}
|
80
|
+
],
|
81
|
+
"BatchGetSecurityControls": [
|
82
|
+
{
|
83
|
+
"input": {
|
84
|
+
"SecurityControlIds": [
|
85
|
+
"ACM.1",
|
86
|
+
"APIGateway.1"
|
87
|
+
]
|
88
|
+
},
|
89
|
+
"output": {
|
90
|
+
"SecurityControls": [
|
91
|
+
{
|
92
|
+
"Description": "This AWS control checks whether ACM Certificates in your account are marked for expiration within a specified time period. Certificates provided by ACM are automatically renewed. ACM does not automatically renew certificates that you import.",
|
93
|
+
"RemediationUrl": "https://docs.aws.amazon.com/console/securityhub/ACM.1/remediation",
|
94
|
+
"SecurityControlArn": "arn:aws:securityhub:us-west-2:123456789012:security-control/ACM.1",
|
95
|
+
"SecurityControlId": "ACM.1",
|
96
|
+
"SecurityControlStatus": "ENABLED",
|
97
|
+
"SeverityRating": "MEDIUM",
|
98
|
+
"Title": "Imported and ACM-issued certificates should be renewed after a specified time period"
|
99
|
+
},
|
100
|
+
{
|
101
|
+
"Description": "This control checks whether all stages of Amazon API Gateway REST and WebSocket APIs have logging enabled. The control fails if logging is not enabled for all methods of a stage or if loggingLevel is neither ERROR nor INFO.",
|
102
|
+
"RemediationUrl": "https://docs.aws.amazon.com/console/securityhub/APIGateway.1/remediation",
|
103
|
+
"SecurityControlArn": "arn:aws:securityhub:us-west-2:123456789012:security-control/APIGateway.1",
|
104
|
+
"SecurityControlId": "APIGateway.1",
|
105
|
+
"SecurityControlStatus": "ENABLED",
|
106
|
+
"SeverityRating": "MEDIUM",
|
107
|
+
"Title": "API Gateway REST and WebSocket API execution logging should be enabled"
|
108
|
+
}
|
109
|
+
]
|
110
|
+
},
|
111
|
+
"comments": {
|
112
|
+
"input": {
|
113
|
+
},
|
114
|
+
"output": {
|
115
|
+
}
|
116
|
+
},
|
117
|
+
"description": "The following example gets details for the specified controls in the current AWS account and AWS Region.",
|
118
|
+
"id": "to-get-security-control-details--1683234478355",
|
119
|
+
"title": "To get security control details "
|
120
|
+
}
|
121
|
+
],
|
122
|
+
"BatchGetStandardsControlAssociations": [
|
123
|
+
{
|
124
|
+
"input": {
|
125
|
+
"StandardsControlAssociationIds": [
|
126
|
+
{
|
127
|
+
"SecurityControlId": "CloudTrail.1",
|
128
|
+
"StandardsArn": "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0"
|
129
|
+
},
|
130
|
+
{
|
131
|
+
"SecurityControlId": "CloudWatch.12",
|
132
|
+
"StandardsArn": "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0"
|
133
|
+
}
|
134
|
+
]
|
135
|
+
},
|
136
|
+
"output": {
|
137
|
+
"StandardsControlAssociationDetails": [
|
138
|
+
{
|
139
|
+
"AssociationStatus": "ENABLED",
|
140
|
+
"RelatedRequirements": [
|
141
|
+
"CIS AWS Foundations 2.1"
|
142
|
+
],
|
143
|
+
"SecurityControlArn": "arn:aws:securityhub:us-west-2:110479873537:security-control/CloudTrail.1",
|
144
|
+
"SecurityControlId": "CloudTrail.1",
|
145
|
+
"StandardsArn": "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0",
|
146
|
+
"StandardsControlDescription": "AWS CloudTrail is a web service that records AWS API calls for your account and delivers log files to you. The recorded information includes the identity of the API caller, the time of the API call, the source IP address of the API caller, the request parameters, and the response elements returned by the AWS service.",
|
147
|
+
"StandardsControlTitle": "Ensure CloudTrail is enabled in all regions",
|
148
|
+
"UpdatedAt": "2022-01-13T18:52:29.539000+00:00"
|
149
|
+
},
|
150
|
+
{
|
151
|
+
"AssociationStatus": "ENABLED",
|
152
|
+
"RelatedRequirements": [
|
153
|
+
"CIS AWS Foundations 3.12"
|
154
|
+
],
|
155
|
+
"SecurityControlArn": "arn:aws:securityhub:us-west-2:110479873537:security-control/CloudWatch.12",
|
156
|
+
"SecurityControlId": "CloudWatch.12",
|
157
|
+
"StandardsArn": "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0",
|
158
|
+
"StandardsControlDescription": "Real-time monitoring of API calls can be achieved by directing CloudTrail Logs to CloudWatch Logs and establishing corresponding metric filters and alarms. Network gateways are required to send/receive traffic to a destination outside of a VPC. It is recommended that a metric filter and alarm be established for changes to network gateways.",
|
159
|
+
"StandardsControlTitle": "Ensure a log metric filter and alarm exist for changes to network gateways",
|
160
|
+
"UpdatedAt": "2022-01-13T18:52:29.686000+00:00"
|
161
|
+
}
|
162
|
+
]
|
163
|
+
},
|
164
|
+
"comments": {
|
165
|
+
"input": {
|
166
|
+
},
|
167
|
+
"output": {
|
168
|
+
}
|
169
|
+
},
|
170
|
+
"description": "The following example retrieves the enablement status of the specified controls in the specified standards.",
|
171
|
+
"id": "to-get-enablement-status-of-a-batch-of-controls-1683301618357",
|
172
|
+
"title": "To get enablement status of a batch of controls"
|
79
173
|
}
|
80
174
|
],
|
81
175
|
"BatchImportFindings": [
|
@@ -195,6 +289,49 @@
|
|
195
289
|
"title": "To update Security Hub findings"
|
196
290
|
}
|
197
291
|
],
|
292
|
+
"BatchUpdateStandardsControlAssociations": [
|
293
|
+
{
|
294
|
+
"input": {
|
295
|
+
"StandardsControlAssociationUpdates": [
|
296
|
+
{
|
297
|
+
"AssociationStatus": "DISABLED",
|
298
|
+
"SecurityControlId": "CloudTrail.1",
|
299
|
+
"StandardsArn": "arn:aws:securityhub:::ruleset/sample-standard/v/1.1.0",
|
300
|
+
"UpdatedReason": "Not relevant to environment"
|
301
|
+
},
|
302
|
+
{
|
303
|
+
"AssociationStatus": "DISABLED",
|
304
|
+
"SecurityControlId": "CloudWatch.12",
|
305
|
+
"StandardsArn": "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0",
|
306
|
+
"UpdatedReason": "Not relevant to environment"
|
307
|
+
}
|
308
|
+
]
|
309
|
+
},
|
310
|
+
"output": {
|
311
|
+
"UnprocessedAssociationUpdates": [
|
312
|
+
{
|
313
|
+
"ErrorCode": "INVALID_INPUT",
|
314
|
+
"ErrorReason": "Invalid Standards Arn: 'arn:aws:securityhub:::ruleset/sample-standard/v/1.1.0'",
|
315
|
+
"StandardsControlAssociationUpdate": {
|
316
|
+
"AssociationStatus": "DISABLED",
|
317
|
+
"SecurityControlId": "CloudTrail.1",
|
318
|
+
"StandardsArn": "arn:aws:securityhub:::ruleset/sample-standard/v/1.1.0",
|
319
|
+
"UpdatedReason": "Test Reason"
|
320
|
+
}
|
321
|
+
}
|
322
|
+
]
|
323
|
+
},
|
324
|
+
"comments": {
|
325
|
+
"input": {
|
326
|
+
},
|
327
|
+
"output": {
|
328
|
+
}
|
329
|
+
},
|
330
|
+
"description": "The following example disables CloudWatch.12 in CIS AWS Foundations Benchmark v1.2.0. The example returns an error for CloudTrail.1 because an invalid standard ARN is provided.",
|
331
|
+
"id": "to-update-enablement-status-of-a-batch-of-controls-1683300378416",
|
332
|
+
"title": "To update enablement status of a batch of controls"
|
333
|
+
}
|
334
|
+
],
|
198
335
|
"CreateActionTarget": [
|
199
336
|
{
|
200
337
|
"input": {
|