From 2953ff4ddd10a561097b3195aef5b17de9580d2c Mon Sep 17 00:00:00 2001
From: awstools Security Hub provides you with a comprehensive view of your security state in Amazon Web Services and helps
you assess your Amazon Web Services environment against security industry standards and best practices. Security Hub collects security data across Amazon Web Services accounts, Amazon Web Servicesservices, and
+ Security Hub collects security data across Amazon Web Services accounts, Amazon Web Services services, and
supported third-party products and helps you analyze your security trends and identify the highest priority security
issues. To help you manage the security state of your organization, Security Hub supports multiple security standards.
@@ -17,10 +17,10 @@ and external compliance frameworks such as the Center for Internet Security (CIS
Security Standard (PCI DSS), and the National Institute of Standards and Technology (NIST). Each standard includes
several security controls, each of which represents a security best practice. Security Hub runs checks against
security controls and generates control findings to help you assess your compliance against security best practices. In addition to generating control findings, Security Hub also receives findings from other Amazon Web Servicesservices,
+ In addition to generating control findings, Security Hub also receives findings from other Amazon Web Services services,
such as Amazon GuardDuty and Amazon Inspector, and
supported third-party products. This gives you a single pane of glass into a variety of security-related issues. You
-can also send Security Hub findings to other Amazon Web Servicesservices and supported third-party products.
Security Hub offers automation features that help you triage and remediate security issues. For example, you can use automation rules to automatically update critical findings when a security check fails. You can also leverage the integration with Amazon EventBridge to trigger automatic responses to specific findings.
@@ -31,12 +31,12 @@ and schemas. If you're new to Security Hub, you might find it helpful to also re . The user guide explains key concepts and provides procedures that demonstrate how to use Security Hub features. It also provides information about topics such as -integrating Security Hub with other Amazon Web Servicesservices. +integrating Security Hub with other Amazon Web Services services.In addition to interacting with Security Hub by making calls to the Security Hub API, you can use a current version of an Amazon Web Services command line tool or SDK. Amazon Web Services provides tools and SDKs that consist of libraries and sample code for various languages and platforms, such as PowerShell, Java, Go, Python, C++, and .NET. These tools and SDKs provide convenient, programmatic access to -Security Hub and other Amazon Web Servicesservices . They also handle tasks such as signing requests, +Security Hub and other Amazon Web Services services . They also handle tasks such as signing requests, managing errors, and retrying requests automatically. For information about installing and using the Amazon Web Services tools and SDKs, see Tools to Build on Amazon Web Services.
With the exception of operations that are related to central configuration, Security Hub API requests are executed only in diff --git a/clients/client-securityhub/src/SecurityHub.ts b/clients/client-securityhub/src/SecurityHub.ts index 728f3d9abca7..4712657e5fba 100644 --- a/clients/client-securityhub/src/SecurityHub.ts +++ b/clients/client-securityhub/src/SecurityHub.ts @@ -1746,7 +1746,7 @@ export interface SecurityHub { /** *
Security Hub provides you with a comprehensive view of your security state in Amazon Web Services and helps * you assess your Amazon Web Services environment against security industry standards and best practices.
- *Security Hub collects security data across Amazon Web Services accounts, Amazon Web Servicesservices, and + *
Security Hub collects security data across Amazon Web Services accounts, Amazon Web Services services, and * supported third-party products and helps you analyze your security trends and identify the highest priority security * issues.
*To help you manage the security state of your organization, Security Hub supports multiple security standards. @@ -1755,10 +1755,10 @@ export interface SecurityHub { * Security Standard (PCI DSS), and the National Institute of Standards and Technology (NIST). Each standard includes * several security controls, each of which represents a security best practice. Security Hub runs checks against * security controls and generates control findings to help you assess your compliance against security best practices.
- *In addition to generating control findings, Security Hub also receives findings from other Amazon Web Servicesservices, + *
In addition to generating control findings, Security Hub also receives findings from other Amazon Web Services services, * such as Amazon GuardDuty and Amazon Inspector, and * supported third-party products. This gives you a single pane of glass into a variety of security-related issues. You - * can also send Security Hub findings to other Amazon Web Servicesservices and supported third-party products.
+ * can also send Security Hub findings to other Amazon Web Services services and supported third-party products. *Security Hub offers automation features that help you triage and remediate security issues. For example, * you can use automation rules to automatically update critical findings when a security check fails. You can also leverage the integration with * Amazon EventBridge to trigger automatic responses to specific findings.
@@ -1769,12 +1769,12 @@ export interface SecurityHub { * . The * user guide explains key concepts and provides procedures * that demonstrate how to use Security Hub features. It also provides information about topics such as - * integrating Security Hub with other Amazon Web Servicesservices. + * integrating Security Hub with other Amazon Web Services services. *In addition to interacting with Security Hub by making calls to the Security Hub API, you can * use a current version of an Amazon Web Services command line tool or SDK. Amazon Web Services provides tools * and SDKs that consist of libraries and sample code for various languages and platforms, such as PowerShell, * Java, Go, Python, C++, and .NET. These tools and SDKs provide convenient, programmatic access to - * Security Hub and other Amazon Web Servicesservices . They also handle tasks such as signing requests, + * Security Hub and other Amazon Web Services services . They also handle tasks such as signing requests, * managing errors, and retrying requests automatically. For information about installing and using the Amazon Web Services tools * and SDKs, see Tools to Build on Amazon Web Services.
*With the exception of operations that are related to central configuration, Security Hub API requests are executed only in diff --git a/clients/client-securityhub/src/SecurityHubClient.ts b/clients/client-securityhub/src/SecurityHubClient.ts index 3fcb5911a997..455b4881dde9 100644 --- a/clients/client-securityhub/src/SecurityHubClient.ts +++ b/clients/client-securityhub/src/SecurityHubClient.ts @@ -638,7 +638,7 @@ export interface SecurityHubClientResolvedConfig extends SecurityHubClientResolv /** *
Security Hub provides you with a comprehensive view of your security state in Amazon Web Services and helps * you assess your Amazon Web Services environment against security industry standards and best practices.
- *Security Hub collects security data across Amazon Web Services accounts, Amazon Web Servicesservices, and + *
Security Hub collects security data across Amazon Web Services accounts, Amazon Web Services services, and * supported third-party products and helps you analyze your security trends and identify the highest priority security * issues.
*To help you manage the security state of your organization, Security Hub supports multiple security standards. @@ -647,10 +647,10 @@ export interface SecurityHubClientResolvedConfig extends SecurityHubClientResolv * Security Standard (PCI DSS), and the National Institute of Standards and Technology (NIST). Each standard includes * several security controls, each of which represents a security best practice. Security Hub runs checks against * security controls and generates control findings to help you assess your compliance against security best practices.
- *In addition to generating control findings, Security Hub also receives findings from other Amazon Web Servicesservices, + *
In addition to generating control findings, Security Hub also receives findings from other Amazon Web Services services, * such as Amazon GuardDuty and Amazon Inspector, and * supported third-party products. This gives you a single pane of glass into a variety of security-related issues. You - * can also send Security Hub findings to other Amazon Web Servicesservices and supported third-party products.
+ * can also send Security Hub findings to other Amazon Web Services services and supported third-party products. *Security Hub offers automation features that help you triage and remediate security issues. For example, * you can use automation rules to automatically update critical findings when a security check fails. You can also leverage the integration with * Amazon EventBridge to trigger automatic responses to specific findings.
@@ -661,12 +661,12 @@ export interface SecurityHubClientResolvedConfig extends SecurityHubClientResolv * . The * user guide explains key concepts and provides procedures * that demonstrate how to use Security Hub features. It also provides information about topics such as - * integrating Security Hub with other Amazon Web Servicesservices. + * integrating Security Hub with other Amazon Web Services services. *In addition to interacting with Security Hub by making calls to the Security Hub API, you can * use a current version of an Amazon Web Services command line tool or SDK. Amazon Web Services provides tools * and SDKs that consist of libraries and sample code for various languages and platforms, such as PowerShell, * Java, Go, Python, C++, and .NET. These tools and SDKs provide convenient, programmatic access to - * Security Hub and other Amazon Web Servicesservices . They also handle tasks such as signing requests, + * Security Hub and other Amazon Web Services services . They also handle tasks such as signing requests, * managing errors, and retrying requests automatically. For information about installing and using the Amazon Web Services tools * and SDKs, see Tools to Build on Amazon Web Services.
*With the exception of operations that are related to central configuration, Security Hub API requests are executed only in diff --git a/clients/client-securityhub/src/commands/AcceptAdministratorInvitationCommand.ts b/clients/client-securityhub/src/commands/AcceptAdministratorInvitationCommand.ts index b22b9b3d6699..a7f5a02275f5 100644 --- a/clients/client-securityhub/src/commands/AcceptAdministratorInvitationCommand.ts +++ b/clients/client-securityhub/src/commands/AcceptAdministratorInvitationCommand.ts @@ -33,7 +33,12 @@ export interface AcceptAdministratorInvitationCommandOutput __MetadataBearer {} /** - *
Accepts the invitation to be a member account and be monitored by the Security Hub administrator
+ * We recommend using Organizations instead of Security Hub invitations to manage your member accounts.
+ * For information, see Managing Security Hub administrator and member accounts with Organizations
+ * in the Security Hub User Guide.
Accepts the invitation to be a member account and be monitored by the Security Hub administrator * account that the invitation was sent from.
*This operation is only used by member accounts that are not added through * Organizations.
diff --git a/clients/client-securityhub/src/commands/BatchUpdateFindingsCommand.ts b/clients/client-securityhub/src/commands/BatchUpdateFindingsCommand.ts index 257d849b3b32..f9d74364cb8d 100644 --- a/clients/client-securityhub/src/commands/BatchUpdateFindingsCommand.ts +++ b/clients/client-securityhub/src/commands/BatchUpdateFindingsCommand.ts @@ -32,7 +32,7 @@ export interface BatchUpdateFindingsCommandOutput extends BatchUpdateFindingsRes * Requested by administrator accounts or member accounts. Administrator accounts can update findings for * their account and their member accounts. Member accounts can update findings for their * account. - *Updates from BatchUpdateFindings
do not affect the value of
+ *
Updates from BatchUpdateFindings
don't affect the value of
* UpdatedAt
for a finding.
Administrator and member accounts can use BatchUpdateFindings
to update the
* following finding fields and objects.
Used to enable finding aggregation. Must be called from the aggregation Region.
- *For more details about cross-Region replication, see Configuring finding aggregation in the Security Hub User Guide.
+ * The aggregation Region is now called the home Region.
Used to enable cross-Region aggregation. This operation can be invoked from the home Region only.
+ *For information about how cross-Region aggregation works, see Understanding cross-Region aggregation in Security Hub in the Security Hub User Guide. *
* @example * Use a bare-bones client and the command you need to make an API call. diff --git a/clients/client-securityhub/src/commands/CreateMembersCommand.ts b/clients/client-securityhub/src/commands/CreateMembersCommand.ts index 0e354bf620f8..088f81b42a30 100644 --- a/clients/client-securityhub/src/commands/CreateMembersCommand.ts +++ b/clients/client-securityhub/src/commands/CreateMembersCommand.ts @@ -50,7 +50,7 @@ export interface CreateMembersCommandOutput extends CreateMembersResponse, __Met * then send an invitation to the member account. To send the invitation, you use the *InviteMembers
operation. If the account owner accepts
* the invitation, the account becomes a member account in Security Hub.
- * Accounts that are managed using Organizations do not receive an invitation. They + *
Accounts that are managed using Organizations don't receive an invitation. They * automatically become a member account in Security Hub.
*Declines invitations to become a member account.
+ *We recommend using Organizations instead of Security Hub invitations to manage your member accounts. + * For information, see Managing Security Hub administrator and member accounts with Organizations + * in the Security Hub User Guide.
+ *Declines invitations to become a Security Hub member account.
*A prospective member account uses this operation to decline an invitation to become a member.
- *This operation is only called by member accounts that aren't part of an organization. + *
Only member accounts that aren't part of an Amazon Web Services organization should use this operation. * Organization accounts don't receive invitations.
* @example * Use a bare-bones client and the command you need to make an API call. diff --git a/clients/client-securityhub/src/commands/DeleteFindingAggregatorCommand.ts b/clients/client-securityhub/src/commands/DeleteFindingAggregatorCommand.ts index 86ff80a75bd8..f6f309f05b72 100644 --- a/clients/client-securityhub/src/commands/DeleteFindingAggregatorCommand.ts +++ b/clients/client-securityhub/src/commands/DeleteFindingAggregatorCommand.ts @@ -28,8 +28,13 @@ export interface DeleteFindingAggregatorCommandInput extends DeleteFindingAggreg export interface DeleteFindingAggregatorCommandOutput extends DeleteFindingAggregatorResponse, __MetadataBearer {} /** - *Deletes a finding aggregator. When you delete the finding aggregator, you stop finding aggregation.
- *When you stop finding aggregation, findings that were already aggregated to the aggregation Region are still visible from the aggregation Region. New findings and finding updates are not aggregated.
+ * The aggregation Region is now called the home Region.
Deletes a finding aggregator. When you delete the finding aggregator, you stop cross-Region aggregation. Finding replication stops + * occurring from the linked Regions to the home Region.
+ *When you stop cross-Region aggregation, findings that were already replicated and sent to the home Region are still visible from + * the home Region. However, new findings and finding updates are no longer replicated and sent to the home Region. *
* @example * Use a bare-bones client and the command you need to make an API call. diff --git a/clients/client-securityhub/src/commands/DeleteInvitationsCommand.ts b/clients/client-securityhub/src/commands/DeleteInvitationsCommand.ts index dd2ef056eba2..bee70487d638 100644 --- a/clients/client-securityhub/src/commands/DeleteInvitationsCommand.ts +++ b/clients/client-securityhub/src/commands/DeleteInvitationsCommand.ts @@ -28,9 +28,14 @@ export interface DeleteInvitationsCommandInput extends DeleteInvitationsRequest export interface DeleteInvitationsCommandOutput extends DeleteInvitationsResponse, __MetadataBearer {} /** - *Deletes invitations received by the Amazon Web Services account to become a member account.
- *A Security Hub administrator account can use this operation to delete invitations sent to one or more member accounts.
- *This operation is only used to delete invitations that are sent to member accounts that aren't part of an organization.
+ * We recommend using Organizations instead of Security Hub invitations to manage your member accounts.
+ * For information, see Managing Security Hub administrator and member accounts with Organizations
+ * in the Security Hub User Guide.
Deletes invitations to become a Security Hub member account.
+ *A Security Hub administrator account can use this operation to delete invitations sent to one or more prospective member accounts.
+ *This operation is only used to delete invitations that are sent to prospective member accounts that aren't part of an Amazon Web Services organization. * Organization accounts don't receive invitations.
* @example * Use a bare-bones client and the command you need to make an API call. diff --git a/clients/client-securityhub/src/commands/DescribeProductsCommand.ts b/clients/client-securityhub/src/commands/DescribeProductsCommand.ts index a8aad8465ef5..9f018530cfe8 100644 --- a/clients/client-securityhub/src/commands/DescribeProductsCommand.ts +++ b/clients/client-securityhub/src/commands/DescribeProductsCommand.ts @@ -31,7 +31,7 @@ export interface DescribeProductsCommandOutput extends DescribeProductsResponse, *Returns information about product integrations in Security Hub.
*You can optionally provide an integration ARN. If you provide an integration ARN, then * the results only include that integration.
- *If you do not provide an integration ARN, then the results include all of the available + *
If you don't provide an integration ARN, then the results include all of the available * product integrations.
* @example * Use a bare-bones client and the command you need to make an API call. diff --git a/clients/client-securityhub/src/commands/GetFindingAggregatorCommand.ts b/clients/client-securityhub/src/commands/GetFindingAggregatorCommand.ts index e831a4ec5c14..9f51cce56683 100644 --- a/clients/client-securityhub/src/commands/GetFindingAggregatorCommand.ts +++ b/clients/client-securityhub/src/commands/GetFindingAggregatorCommand.ts @@ -28,7 +28,11 @@ export interface GetFindingAggregatorCommandInput extends GetFindingAggregatorRe export interface GetFindingAggregatorCommandOutput extends GetFindingAggregatorResponse, __MetadataBearer {} /** - *Returns the current finding aggregation configuration.
+ *The aggregation Region is now called the home Region.
+ *Returns the current configuration in the calling account for cross-Region aggregation. A finding aggregator is a resource that establishes + * the home Region and any linked Regions.
* @example * Use a bare-bones client and the command you need to make an API call. * ```javascript diff --git a/clients/client-securityhub/src/commands/GetFindingsCommand.ts b/clients/client-securityhub/src/commands/GetFindingsCommand.ts index 380627421842..b9bf5341710e 100644 --- a/clients/client-securityhub/src/commands/GetFindingsCommand.ts +++ b/clients/client-securityhub/src/commands/GetFindingsCommand.ts @@ -29,7 +29,7 @@ export interface GetFindingsCommandOutput extends GetFindingsResponse, __Metadat /** *Returns a list of findings that match the specified criteria.
- *If finding aggregation is enabled, then when you call GetFindings
from the aggregation Region, the results include all of the matching findings from both the aggregation Region and the linked Regions.
If cross-Region aggregation is enabled, then when you call GetFindings
from the home Region, the results include all of the matching findings from both the home Region and linked Regions.
Returns the count of all Security Hub membership invitations that were sent to the - * current member account, not including the currently accepted invitation.
+ *We recommend using Organizations instead of Security Hub invitations to manage your member accounts. + * For information, see Managing Security Hub administrator and member accounts with Organizations + * in the Security Hub User Guide.
+ *Returns the count of all Security Hub membership invitations that were sent to the + * calling member account, not including the currently accepted invitation.
* @example * Use a bare-bones client and the command you need to make an API call. * ```javascript diff --git a/clients/client-securityhub/src/commands/InviteMembersCommand.ts b/clients/client-securityhub/src/commands/InviteMembersCommand.ts index c8ad739d126c..1753fb9511b4 100644 --- a/clients/client-securityhub/src/commands/InviteMembersCommand.ts +++ b/clients/client-securityhub/src/commands/InviteMembersCommand.ts @@ -28,13 +28,18 @@ export interface InviteMembersCommandInput extends InviteMembersRequest {} export interface InviteMembersCommandOutput extends InviteMembersResponse, __MetadataBearer {} /** - *Invites other Amazon Web Services accounts to become member accounts for the Security Hub administrator account that
+ * We recommend using Organizations instead of Security Hub invitations to manage your member accounts.
+ * For information, see Managing Security Hub administrator and member accounts with Organizations
+ * in the Security Hub User Guide.
Invites other Amazon Web Services accounts to become member accounts for the Security Hub administrator account that * the invitation is sent from.
- *This operation is only used to invite accounts that do not belong to an organization. - * Organization accounts do not receive invitations.
+ *This operation is only used to invite accounts that don't belong to an Amazon Web Services organization. + * Organization accounts don't receive invitations.
*Before you can use this action to invite a member, you must first use the CreateMembers
action to create the member account in Security Hub.
When the account owner enables Security Hub and accepts the invitation to become a member - * account, the administrator account can view the findings generated from the member account.
+ * account, the administrator account can view the findings generated in the member account. * @example * Use a bare-bones client and the command you need to make an API call. * ```javascript diff --git a/clients/client-securityhub/src/commands/ListFindingAggregatorsCommand.ts b/clients/client-securityhub/src/commands/ListFindingAggregatorsCommand.ts index 20823626f745..e3c95cc0a78e 100644 --- a/clients/client-securityhub/src/commands/ListFindingAggregatorsCommand.ts +++ b/clients/client-securityhub/src/commands/ListFindingAggregatorsCommand.ts @@ -28,7 +28,8 @@ export interface ListFindingAggregatorsCommandInput extends ListFindingAggregato export interface ListFindingAggregatorsCommandOutput extends ListFindingAggregatorsResponse, __MetadataBearer {} /** - *If finding aggregation is enabled, then ListFindingAggregators
returns the ARN of the finding aggregator. You can run this operation from any Region.
If cross-Region aggregation is enabled, then ListFindingAggregators
returns the Amazon Resource Name (ARN)
+ * of the finding aggregator. You can run this operation from any Amazon Web Services Region.
Lists all Security Hub membership invitations that were sent to the current Amazon Web Services account.
- *This operation is only used by accounts that are managed by invitation. - * Accounts that are managed using the integration with Organizations do not receive invitations.
+ *We recommend using Organizations instead of Security Hub invitations to manage your member accounts. + * For information, see Managing Security Hub administrator and member accounts with Organizations + * in the Security Hub User Guide.
+ *Lists all Security Hub membership invitations that were sent to the calling account.
+ *Only accounts that are managed by invitation can use this operation. + * Accounts that are managed using the integration with Organizations don't receive invitations.
* @example * Use a bare-bones client and the command you need to make an API call. * ```javascript diff --git a/clients/client-securityhub/src/commands/UpdateFindingAggregatorCommand.ts b/clients/client-securityhub/src/commands/UpdateFindingAggregatorCommand.ts index 3e4739300cad..b1c8205dccfb 100644 --- a/clients/client-securityhub/src/commands/UpdateFindingAggregatorCommand.ts +++ b/clients/client-securityhub/src/commands/UpdateFindingAggregatorCommand.ts @@ -28,8 +28,12 @@ export interface UpdateFindingAggregatorCommandInput extends UpdateFindingAggreg export interface UpdateFindingAggregatorCommandOutput extends UpdateFindingAggregatorResponse, __MetadataBearer {} /** - *Updates the finding aggregation configuration. Used to update the Region linking mode and the list of included or excluded Regions. You cannot use UpdateFindingAggregator
to change the aggregation Region.
You must run The aggregation Region is now called the home Region.UpdateFindingAggregator
from the current aggregation Region.
+ *
Updates cross-Region aggregation settings. You can use this operation to update the Region linking mode and the list + * of included or excluded Amazon Web Services Regions. However, you can't use this operation to change the home Region.
+ *You can invoke this operation from the current home Region only. *
* @example * Use a bare-bones client and the command you need to make an API call. diff --git a/clients/client-securityhub/src/index.ts b/clients/client-securityhub/src/index.ts index 21d1d565d9b6..ef4310e22a64 100644 --- a/clients/client-securityhub/src/index.ts +++ b/clients/client-securityhub/src/index.ts @@ -3,7 +3,7 @@ /** *Security Hub provides you with a comprehensive view of your security state in Amazon Web Services and helps * you assess your Amazon Web Services environment against security industry standards and best practices.
- *Security Hub collects security data across Amazon Web Services accounts, Amazon Web Servicesservices, and + *
Security Hub collects security data across Amazon Web Services accounts, Amazon Web Services services, and * supported third-party products and helps you analyze your security trends and identify the highest priority security * issues.
*To help you manage the security state of your organization, Security Hub supports multiple security standards. @@ -12,10 +12,10 @@ * Security Standard (PCI DSS), and the National Institute of Standards and Technology (NIST). Each standard includes * several security controls, each of which represents a security best practice. Security Hub runs checks against * security controls and generates control findings to help you assess your compliance against security best practices.
- *In addition to generating control findings, Security Hub also receives findings from other Amazon Web Servicesservices, + *
In addition to generating control findings, Security Hub also receives findings from other Amazon Web Services services, * such as Amazon GuardDuty and Amazon Inspector, and * supported third-party products. This gives you a single pane of glass into a variety of security-related issues. You - * can also send Security Hub findings to other Amazon Web Servicesservices and supported third-party products.
+ * can also send Security Hub findings to other Amazon Web Services services and supported third-party products. *Security Hub offers automation features that help you triage and remediate security issues. For example, * you can use automation rules to automatically update critical findings when a security check fails. You can also leverage the integration with * Amazon EventBridge to trigger automatic responses to specific findings.
@@ -26,12 +26,12 @@ * . The * user guide explains key concepts and provides procedures * that demonstrate how to use Security Hub features. It also provides information about topics such as - * integrating Security Hub with other Amazon Web Servicesservices. + * integrating Security Hub with other Amazon Web Services services. *In addition to interacting with Security Hub by making calls to the Security Hub API, you can * use a current version of an Amazon Web Services command line tool or SDK. Amazon Web Services provides tools * and SDKs that consist of libraries and sample code for various languages and platforms, such as PowerShell, * Java, Go, Python, C++, and .NET. These tools and SDKs provide convenient, programmatic access to - * Security Hub and other Amazon Web Servicesservices . They also handle tasks such as signing requests, + * Security Hub and other Amazon Web Services services . They also handle tasks such as signing requests, * managing errors, and retrying requests automatically. For information about installing and using the Amazon Web Services tools * and SDKs, see Tools to Build on Amazon Web Services.
*With the exception of operations that are related to central configuration, Security Hub API requests are executed only in diff --git a/clients/client-securityhub/src/models/models_0.ts b/clients/client-securityhub/src/models/models_0.ts index 34ea9928a7bd..9aaa2a6033f8 100644 --- a/clients/client-securityhub/src/models/models_0.ts +++ b/clients/client-securityhub/src/models/models_0.ts @@ -762,7 +762,7 @@ export interface SeverityUpdate { /** *
The normalized severity for the finding. This attribute is to be deprecated in favor of
* Label
.
If you provide Normalized
and do not provide Label
,
+ *
If you provide Normalized
and don't provide Label
,
* Label
is set automatically as follows.
- * SUPPRESSED
- Indicates that you reviewed the finding and do not believe that any action is needed. The finding is no longer updated.
SUPPRESSED
- Indicates that you reviewed the finding and don't believe that any action is needed. The finding is no longer updated.
* - * One or more actions to update finding fields if a finding matches the defined criteria - * of the rule. + * One or more actions that Security Hub takes when a finding matches the defined criteria + * of a rule. *
* @public */ export interface AutomationRulesAction { /** *
- * Specifies that the rule action should update the Types
finding field. The Types
- * finding field classifies findings in the format of namespace/category/classifier. For more information, see
- * Types taxonomy for ASFF in
- * the Security Hub User Guide.
+ * Specifies the type of action that Security Hub takes when a finding matches the defined criteria of a rule.
*
* The identifier for the given resource type. For Amazon Web Services resources that are identified by * Amazon Resource Names (ARNs), this is the ARN. For Amazon Web Services resources that lack ARNs, - * this is the identifier as defined by the Amazon Web Servicesservice that created the resource. + * this is the identifier as defined by the Amazon Web Services service that created the resource. * For non-Amazon Web Services resources, this is a unique identifier that is associated with the * resource. *
@@ -4731,7 +4728,7 @@ export interface AwsBackupBackupPlanRuleCopyActionsDetails { /** *Defines when a protected resource is transitioned to cold storage and when it expires. * Backup transitions and expires backups automatically according to the - * lifecycle that you define. If you do not specify a lifecycle, Backup applies + * lifecycle that you define. If you don't specify a lifecycle, Backup applies * the lifecycle policy of the source backup to the destination backup.
*Backups transitioned to cold storage must be stored in cold storage for a minimum of 90 days.
* @public @@ -4801,7 +4798,7 @@ export interface AwsBackupBackupPlanRuleDetails { CopyActions?: AwsBackupBackupPlanRuleCopyActionsDetails[]; /** - *Defines when a protected resource is transitioned to cold storage and when it expires. Backup transitions and expires backups automatically according to the lifecycle that you define. If you do not specify a lifecycle, Backup applies the lifecycle policy of the source backup to the destination backup.
+ *Defines when a protected resource is transitioned to cold storage and when it expires. Backup transitions and expires backups automatically according to the lifecycle that you define. If you don't specify a lifecycle, Backup applies the lifecycle policy of the source backup to the destination backup.
*Backups transitioned to cold storage must be stored in cold storage for a minimum of 90 days.
* @public */ @@ -4939,7 +4936,7 @@ export interface AwsBackupBackupVaultDetails { /** *The unique ARN associated with the server-side encryption key. You can specify a key to encrypt your backups from services that support - * full Backup management. If you do not specify a key, Backup creates an KMS key for you by default. + * full Backup management. If you don't specify a key, Backup creates an KMS key for you by default. *
* @public */ @@ -10662,7 +10659,7 @@ export interface RouteSetDetails { /** *- * The prefix of the destination Amazon Web Servicesservice. + * The prefix of the destination Amazon Web Services service. *
* @public */ @@ -12843,7 +12840,7 @@ export interface AwsEcsServiceDetails { /** *The scheduling strategy to use for the service.
*The REPLICA
scheduling strategy places and maintains the desired number of tasks across the cluster. By default, the service scheduler spreads tasks across Availability Zones. Task placement strategies and constraints are used to customize task placement decisions.
The DAEMON
scheduling strategy deploys exactly one task on each active container instance that meets all of the task placement constraints that are specified in the cluster. The service scheduler also evaluates the task placement constraints for running tasks and stops tasks that do not meet the placement constraints.
The DAEMON
scheduling strategy deploys exactly one task on each active container instance that meets all of the task placement constraints that are specified in the cluster. The service scheduler also evaluates the task placement constraints for running tasks and stops tasks that don't meet the placement constraints.
Valid values: REPLICA
| DAEMON
*
Contains the Oracle System ID (SID) of the created DB instance. Not shown when the - * returned parameters do not apply to an Oracle DB instance.
+ * returned parameters don't apply to an Oracle DB instance. * @public */ DBName?: string; @@ -10044,7 +10044,7 @@ export interface Compliance { /** *
* Typically provides the unique identifier of a control across standards. For Security Hub controls, this field consists of an
- * Amazon Web Servicesservice and a unique number, such as APIGateway.5
.
+ * Amazon Web Services service and a unique number, such as APIGateway.5
.
*
* ActivatedRule
|OverrideAction
applies only when updating or
* adding a RuleGroup
- * to a web ACL. In this case you do not use ActivatedRule
+ * to a web ACL. In this case you don't use ActivatedRule
* Action
. For all other update requests,
* ActivatedRule
* Action
is used instead of ActivatedRule
@@ -971,7 +971,7 @@ export interface AwsWafWebAclRule {
*
Specifies the order in which the rules in a web
* ACL are evaluated. Rules with a lower value for Priority
are
* evaluated before rules with a higher value. The value must be a unique integer. If you add
- * multiple rules to a web ACL, the values do not need to be consecutive.
If you provide Normalized
and do not provide Label
, then
+ *
If you provide Normalized
and don't provide Label
, then
* Label
is set automatically as follows.
Deprecated. The normalized severity of a finding.
* Instead of providing Normalized
, provide Label
.
The value of Normalized
can be an integer between 0
and 100
.
If you provide Label
and do not provide Normalized
, then
+ *
If you provide Label
and don't provide Normalized
, then
* Normalized
is set automatically as follows.
- * SUPPRESSED
- Indicates that you reviewed the finding and do not believe that any action is needed. The finding is no longer updated.
SUPPRESSED
- Indicates that you reviewed the finding and don't believe that any action is needed. The finding is no longer updated.
* @@ -3908,7 +3908,7 @@ export interface AwsSecurityFindingFilters { *
- * SUPPRESSED
- Indicates that you reviewed the finding and do not believe that any action is
+ * SUPPRESSED
- Indicates that you reviewed the finding and don't believe that any action is
* needed.
The workflow status of a SUPPRESSED
finding does not change if
* RecordState
changes from ARCHIVED
to
@@ -4045,7 +4045,7 @@ export interface AwsSecurityFindingFilters {
/**
*
* The unique identifier of a control across standards. Values for this field typically consist of an - * Amazon Web Servicesservice and a number, such as APIGateway.5. + * Amazon Web Services service and a number, such as APIGateway.5. *
* @public */ @@ -4970,7 +4970,7 @@ export type UpdateStatus = (typeof UpdateStatus)[keyof typeof UpdateStatus]; export interface SecurityControl { /** *- * The unique identifier of a security control across standards. Values for this field typically consist of an Amazon Web Servicesservice name and a + * The unique identifier of a security control across standards. Values for this field typically consist of an Amazon Web Services service name and a * number, such as APIGateway.3. *
* @public @@ -5182,7 +5182,7 @@ export interface StandardsControlAssociationDetail { /** *- * The unique identifier of a security control across standards. Values for this field typically consist of an Amazon Web Servicesservice + * The unique identifier of a security control across standards. Values for this field typically consist of an Amazon Web Services service * name and a number, such as APIGateway.3. *
* @public @@ -6589,7 +6589,7 @@ export type Policy = Policy.SecurityHubMember | Policy.$UnknownMember; export namespace Policy { /** *- * The Amazon Web Servicesservice that the configuration policy applies to. + * The Amazon Web Services service that the configuration policy applies to. *
* @public */ @@ -6761,8 +6761,8 @@ export interface CreateFindingAggregatorRequest { RegionLinkingMode: string | undefined; /** - *If RegionLinkingMode
is ALL_REGIONS_EXCEPT_SPECIFIED
, then this is a space-separated list of Regions that do not aggregate findings to the aggregation Region.
If RegionLinkingMode
is SPECIFIED_REGIONS
, then this is a space-separated list of Regions that do aggregate findings to the aggregation Region.
+ *
If RegionLinkingMode
is ALL_REGIONS_EXCEPT_SPECIFIED
, then this is a space-separated list of Regions that don't replicate and send findings to the home Region.
If RegionLinkingMode
is SPECIFIED_REGIONS
, then this is a space-separated list of Regions that do replicate and send findings to the home Region.
*
An InvalidInputException
error results if you populate this field while RegionLinkingMode
is
* NO_REGIONS
.
The ARN of the finding aggregator. You use the finding aggregator ARN to retrieve details for, update, and stop finding aggregation.
+ *The ARN of the finding aggregator. You use the finding aggregator ARN to retrieve details for, update, and stop cross-Region aggregation.
* @public */ FindingAggregatorArn?: string; /** - *The aggregation Region.
+ *The home Region. Findings generated in linked Regions are replicated and sent to the home Region.
* @public */ FindingAggregationRegion?: string; @@ -7749,7 +7749,7 @@ export interface EnableSecurityHubRequest { /** *Whether to enable the security standards that Security Hub has designated as automatically
- * enabled. If you do not provide a value for EnableDefaultStandards
, it is set
+ * enabled. If you don't provide a value for EnableDefaultStandards
, it is set
* to true
. To not enable the automatically enabled standards, set
* EnableDefaultStandards
to false
.
A finding aggregator. A finding aggregator contains the configuration for finding aggregation.
+ *A finding aggregator is a Security Hub resource that specifies cross-Region aggregation settings, including the + * home Region and any linked Regions.
* @public */ export interface FindingAggregator { @@ -7850,7 +7851,7 @@ export interface FindingHistoryUpdateSource { *
* Describes the type of finding change event, such as a call to
* BatchImportFindings
- * (by an integrated Amazon Web Servicesservice or third party partner integration) or
+ * (by an integrated Amazon Web Services service or third party partner integration) or
* BatchUpdateFindings
* (by a Security Hub customer).
*
Identifies the source of the event that changed the finding. For example, an integrated
- * Amazon Web Servicesservice or third-party partner integration may call
+ * Amazon Web Services service or third-party partner integration may call
* The aggregation Region. The home Region. Findings generated in linked Regions are replicated and sent to the home Region. The ARNs of the insights to describe. If you do not provide any insight ARNs, then
+ * The ARNs of the insights to describe. If you don't provide any insight ARNs, then
*
* The unique identifier of a security control across standards. Values for this field typically consist of an
- * Amazon Web Servicesservice name and a number (for example, APIGateway.3). This parameter differs from
+ * Amazon Web Services service name and a number (for example, APIGateway.3). This parameter differs from
*
* A unique standard-agnostic identifier for a control. Values for this field typically consist of an
- * Amazon Web Servicesservice and a number, such as APIGateway.5. This field doesn't reference a specific standard.
+ * Amazon Web Services service and a number, such as APIGateway.5. This field doesn't reference a specific standard.
* If If If If An The aggregation Region. The home Region. Findings generated in linked Regions are replicated and sent to the home Region. Accepts the invitation to be a member account and be monitored by the Security Hub administrator\n account that the invitation was sent from. This operation is only used by member accounts that are not added through\n Organizations. When the member account accepts the invitation, permission is granted to the administrator\n account to view findings generated in the member account. We recommend using Organizations instead of Security Hub invitations to manage your member accounts. \n For information, see Managing Security Hub administrator and member accounts with Organizations \n in the Security Hub User Guide. Accepts the invitation to be a member account and be monitored by the Security Hub administrator\n account that the invitation was sent from. This operation is only used by member accounts that are not added through\n Organizations. When the member account accepts the invitation, permission is granted to the administrator\n account to view findings generated in the member account. \n Specifies that the rule action should update the \n Specifies the type of action that Security Hub takes when a finding matches the defined criteria of a rule.\n \n One or more actions to update finding fields if a finding matches the defined criteria \n of the rule.\n \n One or more actions that Security Hub takes when a finding matches the defined criteria \n of a rule.\n \n The identifier for the given resource type. For Amazon Web Services resources that are identified by \n Amazon Resource Names (ARNs), this is the ARN. For Amazon Web Services resources that lack ARNs, \n this is the identifier as defined by the Amazon Web Servicesservice that created the resource. \n For non-Amazon Web Services resources, this is a unique identifier that is associated with the \n resource.\n \n \t\tArray Members: Minimum number of 1 item. Maximum number of 100 items.\n \t \n The identifier for the given resource type. For Amazon Web Services resources that are identified by \n Amazon Resource Names (ARNs), this is the ARN. For Amazon Web Services resources that lack ARNs, \n this is the identifier as defined by the Amazon Web Services service that created the resource. \n For non-Amazon Web Services resources, this is a unique identifier that is associated with the \n resource.\n \n \t\tArray Members: Minimum number of 1 item. Maximum number of 100 items.\n \t Defines when a protected resource is transitioned to cold storage and when it expires.\n Backup transitions and expires backups automatically according to the\n lifecycle that you define. If you do not specify a lifecycle, Backup applies\n the lifecycle policy of the source backup to the destination backup. Backups transitioned to cold storage must be stored in cold storage for a minimum of 90 days. Defines when a protected resource is transitioned to cold storage and when it expires.\n Backup transitions and expires backups automatically according to the\n lifecycle that you define. If you don't specify a lifecycle, Backup applies\n the lifecycle policy of the source backup to the destination backup. Backups transitioned to cold storage must be stored in cold storage for a minimum of 90 days. Defines when a protected resource is transitioned to cold storage and when it expires. Backup transitions and expires backups automatically according to the lifecycle that you define. If you do not specify a lifecycle, Backup applies the lifecycle policy of the source backup to the destination backup. Backups transitioned to cold storage must be stored in cold storage for a minimum of 90 days. Defines when a protected resource is transitioned to cold storage and when it expires. Backup transitions and expires backups automatically according to the lifecycle that you define. If you don't specify a lifecycle, Backup applies the lifecycle policy of the source backup to the destination backup. Backups transitioned to cold storage must be stored in cold storage for a minimum of 90 days. The unique ARN associated with the server-side encryption key. You can specify a key to encrypt your backups from services that support \nfull Backup management. If you do not specify a key, Backup creates an KMS key for you by default.\n The unique ARN associated with the server-side encryption key. You can specify a key to encrypt your backups from services that support \nfull Backup management. If you don't specify a key, Backup creates an KMS key for you by default.\n The scheduling strategy to use for the service. The The Valid values: The scheduling strategy to use for the service. The The Valid values: The meaning of this parameter differs according to the database engine you use. \n MySQL, MariaDB, SQL Server, PostgreSQL\n Contains the name of the initial database of this instance that was provided at create\n time, if one was specified when the DB instance was created. This same name is returned for\n the life of the DB instance. \n Oracle\n Contains the Oracle System ID (SID) of the created DB instance. Not shown when the\n returned parameters do not apply to an Oracle DB instance. The meaning of this parameter differs according to the database engine you use. \n MySQL, MariaDB, SQL Server, PostgreSQL\n Contains the name of the initial database of this instance that was provided at create\n time, if one was specified when the DB instance was created. This same name is returned for\n the life of the DB instance. \n Oracle\n Contains the Oracle System ID (SID) of the created DB instance. Not shown when the\n returned parameters don't apply to an Oracle DB instance. The status of the investigation into a finding. Allowed values are the following. \n Security Hub also resets the workflow status from \n \n \n If one of the following occurs, the workflow status is changed automatically from\n \n \n \n The workflow status of a \n The finding remains \n \n In those cases, the workflow status is automatically reset to For findings from controls, if The status of the investigation into a finding. Allowed values are the following. \n Security Hub also resets the workflow status from \n \n \n If one of the following occurs, the workflow status is changed automatically from\n \n \n \n The workflow status of a \n The finding remains \n \n In those cases, the workflow status is automatically reset to For findings from controls, if \n The unique identifier of a control across standards. Values for this field typically consist of an \n Amazon Web Servicesservice and a number, such as APIGateway.5.\n \n The unique identifier of a control across standards. Values for this field typically consist of an \n Amazon Web Services service and a number, such as APIGateway.5.\n Use the Any rule in a However, if you first want to test the \n Use the Any rule in a However, if you first want to test the \n Specifies the order in which the rules in a web\n ACL are evaluated. Rules with a lower value for Specifies the order in which the rules in a web\n ACL are evaluated. Rules with a lower value for Used by Security Hub customers to update information about their investigation into a finding.\n Requested by administrator accounts or member accounts. Administrator accounts can update findings for\n their account and their member accounts. Member accounts can update findings for their\n account. Updates from Administrator and member accounts can use \n \n \n \n \n \n \n \n \n You can configure IAM policies to restrict access to fields and field values. For\n example, you might not want member accounts to be able to suppress findings or change the\n finding severity. See Configuring access to BatchUpdateFindings in the\n Security Hub User Guide. Used by Security Hub customers to update information about their investigation into a finding.\n Requested by administrator accounts or member accounts. Administrator accounts can update findings for\n their account and their member accounts. Member accounts can update findings for their\n account. Updates from Administrator and member accounts can use \n \n \n \n \n \n \n \n \n You can configure IAM policies to restrict access to fields and field values. For\n example, you might not want member accounts to be able to suppress findings or change the\n finding severity. See Configuring access to BatchUpdateFindings in the\n Security Hub User Guide. \n Typically provides the unique identifier of a control across standards. For Security Hub controls, this field consists of an \n Amazon Web Servicesservice and a unique number, such as \n Typically provides the unique identifier of a control across standards. For Security Hub controls, this field consists of an \n Amazon Web Services service and a unique number, such as Used to enable finding aggregation. Must be called from the aggregation Region. For more details about cross-Region replication, see Configuring finding aggregation in the Security Hub User Guide.\n The aggregation Region is now called the home Region. Used to enable cross-Region aggregation. This operation can be invoked from the home Region only. For information about how cross-Region aggregation works, see Understanding cross-Region aggregation in Security Hub in the Security Hub User Guide.\n If If An If If An The ARN of the finding aggregator. You use the finding aggregator ARN to retrieve details for, update, and stop finding aggregation. The ARN of the finding aggregator. You use the finding aggregator ARN to retrieve details for, update, and stop cross-Region aggregation. The aggregation Region. The home Region. Findings generated in linked Regions are replicated and sent to the home Region. Creates a member association in Security Hub between the specified accounts and the account\n used to make the request, which is the administrator account. If you are integrated with\n Organizations, then the administrator account is designated by the organization management account. \n For accounts that are managed using Organizations, Security Hub is not configured to automatically add new organization accounts. The account was disassociated or deleted in Security Hub. This action can only be used by an account that has Security Hub enabled. To enable Security Hub, you\n can use the For accounts that are not organization members, you create the account association and\n then send an invitation to the member account. To send the invitation, you use the\n Accounts that are managed using Organizations do not receive an invitation. They\n automatically become a member account in Security Hub. If the organization account does not have Security Hub enabled, then Security Hub and the default standards are automatically enabled. Note that Security Hub cannot be enabled automatically for the organization management account. The organization management account must enable Security Hub before the administrator account enables it as a member account. For organization accounts that already have Security Hub enabled, Security Hub does not make any other changes to those accounts. It does not change their enabled standards or controls. A permissions policy is added that permits the administrator account to view the findings\n generated in the member account. To remove the association between the administrator and member accounts, use the Creates a member association in Security Hub between the specified accounts and the account\n used to make the request, which is the administrator account. If you are integrated with\n Organizations, then the administrator account is designated by the organization management account. \n For accounts that are managed using Organizations, Security Hub is not configured to automatically add new organization accounts. The account was disassociated or deleted in Security Hub. This action can only be used by an account that has Security Hub enabled. To enable Security Hub, you\n can use the For accounts that are not organization members, you create the account association and\n then send an invitation to the member account. To send the invitation, you use the\n Accounts that are managed using Organizations don't receive an invitation. They\n automatically become a member account in Security Hub. If the organization account does not have Security Hub enabled, then Security Hub and the default standards are automatically enabled. Note that Security Hub cannot be enabled automatically for the organization management account. The organization management account must enable Security Hub before the administrator account enables it as a member account. For organization accounts that already have Security Hub enabled, Security Hub does not make any other changes to those accounts. It does not change their enabled standards or controls. A permissions policy is added that permits the administrator account to view the findings\n generated in the member account. To remove the association between the administrator and member accounts, use the Declines invitations to become a member account. A prospective member account uses this operation to decline an invitation to become a member. This operation is only called by member accounts that aren't part of an organization.\n Organization accounts don't receive invitations. We recommend using Organizations instead of Security Hub invitations to manage your member accounts. \n For information, see Managing Security Hub administrator and member accounts with Organizations \n in the Security Hub User Guide. Declines invitations to become a Security Hub member account. A prospective member account uses this operation to decline an invitation to become a member. Only member accounts that aren't part of an Amazon Web Services organization should use this operation.\n Organization accounts don't receive invitations. Deletes a finding aggregator. When you delete the finding aggregator, you stop finding aggregation. When you stop finding aggregation, findings that were already aggregated to the aggregation Region are still visible from the aggregation Region. New findings and finding updates are not aggregated.\n The aggregation Region is now called the home Region. Deletes a finding aggregator. When you delete the finding aggregator, you stop cross-Region aggregation. Finding replication stops \noccurring from the linked Regions to the home Region. When you stop cross-Region aggregation, findings that were already replicated and sent to the home Region are still visible from \n the home Region. However, new findings and finding updates are no longer replicated and sent to the home Region.\n Deletes invitations received by the Amazon Web Services account to become a member account. A Security Hub administrator account can use this operation to delete invitations sent to one or more member accounts. This operation is only used to delete invitations that are sent to member accounts that aren't part of an organization.\n Organization accounts don't receive invitations. We recommend using Organizations instead of Security Hub invitations to manage your member accounts. \n For information, see Managing Security Hub administrator and member accounts with Organizations \n in the Security Hub User Guide. Deletes invitations to become a Security Hub member account. A Security Hub administrator account can use this operation to delete invitations sent to one or more prospective member accounts. This operation is only used to delete invitations that are sent to prospective member accounts that aren't part of an Amazon Web Services organization.\n Organization accounts don't receive invitations. Returns information about product integrations in Security Hub. You can optionally provide an integration ARN. If you provide an integration ARN, then\n the results only include that integration. If you do not provide an integration ARN, then the results include all of the available\n product integrations. Returns information about product integrations in Security Hub. You can optionally provide an integration ARN. If you provide an integration ARN, then\n the results only include that integration. If you don't provide an integration ARN, then the results include all of the available\n product integrations. Whether to enable the security standards that Security Hub has designated as automatically\n enabled. If you do not provide a value for Whether to enable the security standards that Security Hub has designated as automatically\n enabled. If you don't provide a value for A finding aggregator. A finding aggregator contains the configuration for finding aggregation. A finding aggregator is a Security Hub resource that specifies cross-Region aggregation settings, including the \nhome Region and any linked Regions. Identifies the source of the event that changed the finding. For example, an integrated\n Amazon Web Servicesservice or third-party partner integration may call \n Identifies the source of the event that changed the finding. For example, an integrated\n Amazon Web Services service or third-party partner integration may call \n \n Describes the type of finding change event, such as a call to \n \n Describes the type of finding change event, such as a call to \n Returns the current finding aggregation configuration. The aggregation Region is now called the home Region. Returns the current configuration in the calling account for cross-Region aggregation. A finding aggregator is a resource that establishes \nthe home Region and any linked Regions. The aggregation Region. The home Region. Findings generated in linked Regions are replicated and sent to the home Region. Returns a list of findings that match the specified criteria. If finding aggregation is enabled, then when you call Returns a list of findings that match the specified criteria. If cross-Region aggregation is enabled, then when you call The ARNs of the insights to describe. If you do not provide any insight ARNs, then\n The ARNs of the insights to describe. If you don't provide any insight ARNs, then\n Returns the count of all Security Hub membership invitations that were sent to the\n current member account, not including the currently accepted invitation. We recommend using Organizations instead of Security Hub invitations to manage your member accounts. \n For information, see Managing Security Hub administrator and member accounts with Organizations \n in the Security Hub User Guide. Returns the count of all Security Hub membership invitations that were sent to the\n calling member account, not including the currently accepted invitation. Invites other Amazon Web Services accounts to become member accounts for the Security Hub administrator account that\n the invitation is sent from. This operation is only used to invite accounts that do not belong to an organization.\n Organization accounts do not receive invitations. Before you can use this action to invite a member, you must first use the When the account owner enables Security Hub and accepts the invitation to become a member\n account, the administrator account can view the findings generated from the member account. We recommend using Organizations instead of Security Hub invitations to manage your member accounts. \n For information, see Managing Security Hub administrator and member accounts with Organizations \n in the Security Hub User Guide. Invites other Amazon Web Services accounts to become member accounts for the Security Hub administrator account that\n the invitation is sent from. This operation is only used to invite accounts that don't belong to an Amazon Web Services organization.\n Organization accounts don't receive invitations. Before you can use this action to invite a member, you must first use the When the account owner enables Security Hub and accepts the invitation to become a member\n account, the administrator account can view the findings generated in the member account. If finding aggregation is enabled, then If cross-Region aggregation is enabled, then Lists all Security Hub membership invitations that were sent to the current Amazon Web Services account. This operation is only used by accounts that are managed by invitation.\n Accounts that are managed using the integration with Organizations do not receive invitations. We recommend using Organizations instead of Security Hub invitations to manage your member accounts. \n For information, see Managing Security Hub administrator and member accounts with Organizations \n in the Security Hub User Guide. Lists all Security Hub membership invitations that were sent to the calling account. Only accounts that are managed by invitation can use this operation.\n Accounts that are managed using the integration with Organizations don't receive invitations. \n The Amazon Web Servicesservice that the configuration policy applies to.\n \n The Amazon Web Services service that the configuration policy applies to.\n \n The prefix of the destination Amazon Web Servicesservice.\n \n The prefix of the destination Amazon Web Services service.\n \n The unique identifier of a security control across standards. Values for this field typically consist of an Amazon Web Servicesservice name and a \n number, such as APIGateway.3.\n \n The unique identifier of a security control across standards. Values for this field typically consist of an Amazon Web Services service name and a \n number, such as APIGateway.3.\n \n The unique identifier of a security control across standards. Values for this field typically consist of an \n Amazon Web Servicesservice name and a number (for example, APIGateway.3). This parameter differs from \n \n The unique identifier of a security control across standards. Values for this field typically consist of an \n Amazon Web Services service name and a number (for example, APIGateway.3). This parameter differs from \n Security Hub provides you with a comprehensive view of your security state in Amazon Web Services and helps \n you assess your Amazon Web Services environment against security industry standards and best practices. Security Hub collects security data across Amazon Web Services accounts, Amazon Web Servicesservices, and \n supported third-party products and helps you analyze your security trends and identify the highest priority security \n issues. To help you manage the security state of your organization, Security Hub supports multiple security standards. \n These include the Amazon Web Services Foundational Security Best Practices (FSBP) standard developed by Amazon Web Services, \n and external compliance frameworks such as the Center for Internet Security (CIS), the Payment Card Industry Data \n Security Standard (PCI DSS), and the National Institute of Standards and Technology (NIST). Each standard includes \n several security controls, each of which represents a security best practice. Security Hub runs checks against \n security controls and generates control findings to help you assess your compliance against security best practices. In addition to generating control findings, Security Hub also receives findings from other Amazon Web Servicesservices, \n such as Amazon GuardDuty and Amazon Inspector, and \n supported third-party products. This gives you a single pane of glass into a variety of security-related issues. You \n can also send Security Hub findings to other Amazon Web Servicesservices and supported third-party products. Security Hub offers automation features that help you triage and remediate security issues. For example, \n you can use automation rules to automatically update critical findings when a security check fails. You can also leverage the integration with \n Amazon EventBridge to trigger automatic responses to specific findings. This guide, the Security Hub API Reference, provides\n information about the Security Hub API. This includes supported resources, HTTP methods, parameters,\n and schemas. If you're new to Security Hub, you might find it helpful to also review the \n Security Hub User Guide\n . The\n user guide explains key concepts and provides procedures\n that demonstrate how to use Security Hub features. It also provides information about topics such as\n integrating Security Hub with other Amazon Web Servicesservices. In addition to interacting with Security Hub by making calls to the Security Hub API, you can\n use a current version of an Amazon Web Services command line tool or SDK. Amazon Web Services provides tools \n and SDKs that consist of libraries and sample code for various languages and platforms, such as PowerShell,\n Java, Go, Python, C++, and .NET. These tools and SDKs provide convenient, programmatic access to\n Security Hub and other Amazon Web Servicesservices . They also handle tasks such as signing requests, \n managing errors, and retrying requests automatically. For information about installing and using the Amazon Web Services tools\n and SDKs, see Tools to Build on Amazon Web Services. With the exception of operations that are related to central configuration, Security Hub API requests are executed only in\n the Amazon Web Services Region that is currently active or in the specific Amazon Web Services Region that you specify in your request. Any configuration or settings change\n that results from the operation is applied only to that Region. To make the same change in\n other Regions, call the same API operation in each Region in which you want to apply the change. When you use central configuration, \nAPI requests for enabling Security Hub, standards, and controls are executed in the home Region and all linked Regions. For a list of \ncentral configuration operations, see the Central configuration \nterms and concepts section of the Security Hub User Guide. The following throttling limits apply to Security Hub API operations. \n \n \n \n \n All other operations - Security Hub provides you with a comprehensive view of your security state in Amazon Web Services and helps \n you assess your Amazon Web Services environment against security industry standards and best practices. Security Hub collects security data across Amazon Web Services accounts, Amazon Web Services services, and \n supported third-party products and helps you analyze your security trends and identify the highest priority security \n issues. To help you manage the security state of your organization, Security Hub supports multiple security standards. \n These include the Amazon Web Services Foundational Security Best Practices (FSBP) standard developed by Amazon Web Services, \n and external compliance frameworks such as the Center for Internet Security (CIS), the Payment Card Industry Data \n Security Standard (PCI DSS), and the National Institute of Standards and Technology (NIST). Each standard includes \n several security controls, each of which represents a security best practice. Security Hub runs checks against \n security controls and generates control findings to help you assess your compliance against security best practices. In addition to generating control findings, Security Hub also receives findings from other Amazon Web Services services, \n such as Amazon GuardDuty and Amazon Inspector, and \n supported third-party products. This gives you a single pane of glass into a variety of security-related issues. You \n can also send Security Hub findings to other Amazon Web Services services and supported third-party products. Security Hub offers automation features that help you triage and remediate security issues. For example, \n you can use automation rules to automatically update critical findings when a security check fails. You can also leverage the integration with \n Amazon EventBridge to trigger automatic responses to specific findings. This guide, the Security Hub API Reference, provides\n information about the Security Hub API. This includes supported resources, HTTP methods, parameters,\n and schemas. If you're new to Security Hub, you might find it helpful to also review the \n Security Hub User Guide\n . The\n user guide explains key concepts and provides procedures\n that demonstrate how to use Security Hub features. It also provides information about topics such as\n integrating Security Hub with other Amazon Web Services services. In addition to interacting with Security Hub by making calls to the Security Hub API, you can\n use a current version of an Amazon Web Services command line tool or SDK. Amazon Web Services provides tools \n and SDKs that consist of libraries and sample code for various languages and platforms, such as PowerShell,\n Java, Go, Python, C++, and .NET. These tools and SDKs provide convenient, programmatic access to\n Security Hub and other Amazon Web Services services . They also handle tasks such as signing requests, \n managing errors, and retrying requests automatically. For information about installing and using the Amazon Web Services tools\n and SDKs, see Tools to Build on Amazon Web Services. With the exception of operations that are related to central configuration, Security Hub API requests are executed only in\n the Amazon Web Services Region that is currently active or in the specific Amazon Web Services Region that you specify in your request. Any configuration or settings change\n that results from the operation is applied only to that Region. To make the same change in\n other Regions, call the same API operation in each Region in which you want to apply the change. When you use central configuration, \nAPI requests for enabling Security Hub, standards, and controls are executed in the home Region and all linked Regions. For a list of \ncentral configuration operations, see the Central configuration \nterms and concepts section of the Security Hub User Guide. The following throttling limits apply to Security Hub API operations. \n \n \n \n \n All other operations - The severity value of the finding. The allowed values are the following. \n \n \n \n \n If you provide 0 - 1–39 - 40–69 - 70–89 - 90–100 - The severity value of the finding. The allowed values are the following. \n \n \n \n \n If you provide 0 - 1–39 - 40–69 - 70–89 - 90–100 - Deprecated. The normalized severity of a finding.\n Instead of providing The value of If you provide \n \n \n \n \n Deprecated. The normalized severity of a finding.\n Instead of providing The value of If you provide \n \n \n \n \n The normalized severity for the finding. This attribute is to be deprecated in favor of\n If you provide 0 - 1–39 - 40–69 - 70–89 - 90–100 - The normalized severity for the finding. This attribute is to be deprecated in favor of\n If you provide 0 - 1–39 - 40–69 - 70–89 - 90–100 - \n The unique identifier of a security control across standards. Values for this field typically consist of an Amazon Web Servicesservice \n name and a number, such as APIGateway.3.\n \n The unique identifier of a security control across standards. Values for this field typically consist of an Amazon Web Services service \n name and a number, such as APIGateway.3.\n \n A unique standard-agnostic identifier for a control. Values for this field typically consist of an \n Amazon Web Servicesservice and a number, such as APIGateway.5. This field doesn't reference a specific standard.\n \n A unique standard-agnostic identifier for a control. Values for this field typically consist of an \n Amazon Web Services service and a number, such as APIGateway.5. This field doesn't reference a specific standard.\n Updates the finding aggregation configuration. Used to update the Region linking mode and the list of included or excluded Regions. You cannot use You must run The aggregation Region is now called the home Region. Updates cross-Region aggregation settings. You can use this operation to update the Region linking mode and the list \n of included or excluded Amazon Web Services Regions. However, you can't use this operation to change the home Region. You can invoke this operation from the current home Region only.\n If If An If If An The aggregation Region. The home Region. Findings generated in linked Regions are replicated and sent to the home Region. The status of the investigation into the finding. The workflow status is specific to an individual finding. It does not affect the generation of new findings. For example, setting the workflow status to The allowed values are the following. \n Security Hub also resets the workflow status from \n \n \n \n \n The status of the investigation into the finding. The workflow status is specific to an individual finding. It does not affect the generation of new findings. For example, setting the workflow status to The allowed values are the following. \n Security Hub also resets the workflow status from \n \n \n \n \n The status of the investigation into the finding. The workflow status is specific to an individual finding. It does not affect the generation of new findings. For example, setting the workflow status to The allowed values are the following. \n Security Hub also resets The record state changes from The compliance status changes from \n \n \n The status of the investigation into the finding. The workflow status is specific to an individual finding. It does not affect the generation of new findings. For example, setting the workflow status to The allowed values are the following. \n Security Hub also resets The record state changes from The compliance status changes from \n \n \n BatchImportFindings
* , or an Security Hub customer
* may call
@@ -8223,7 +8224,7 @@ export interface GetFindingAggregatorResponse {
FindingAggregatorArn?: string;
/**
- * GetInsights
returns all of your custom insights. It does not return any
* managed insights.SecurityControlArn
, which is a unique Amazon Resource Name (ARN) assigned to a control. The
* ARN references the security control ID (for example, arn:aws:securityhub:eu-central-1:123456789012:security-control/APIGateway.3).
* RegionLinkingMode
is ALL_REGIONS_EXCEPT_SPECIFIED
, then this is a space-separated list of Regions that do not aggregate findings to the aggregation Region.RegionLinkingMode
is SPECIFIED_REGIONS
, then this is a space-separated list of Regions that do aggregate findings to the aggregation Region.RegionLinkingMode
is ALL_REGIONS_EXCEPT_SPECIFIED
, then this is a space-separated list of Regions that don't replicate and send findings to the home Region.RegionLinkingMode
is SPECIFIED_REGIONS
, then this is a space-separated list of Regions that do replicate and send findings to the home Region.InvalidInputException
error results if you populate this field while RegionLinkingMode
is
* NO_REGIONS
.Types
finding field. The Types
\n finding field classifies findings in the format of namespace/category/classifier. For more information, see\n Types taxonomy for ASFF in \n the Security Hub User Guide.\n REPLICA
scheduling strategy places and maintains the desired number of tasks across the cluster. By default, the service scheduler spreads tasks across Availability Zones. Task placement strategies and constraints are used to customize task placement decisions.DAEMON
scheduling strategy deploys exactly one task on each active container instance that meets all of the task placement constraints that are specified in the cluster. The service scheduler also evaluates the task placement constraints for running tasks and stops tasks that do not meet the placement constraints.REPLICA
| DAEMON
\n REPLICA
scheduling strategy places and maintains the desired number of tasks across the cluster. By default, the service scheduler spreads tasks across Availability Zones. Task placement strategies and constraints are used to customize task placement decisions.DAEMON
scheduling strategy deploys exactly one task on each active container instance that meets all of the task placement constraints that are specified in the cluster. The service scheduler also evaluates the task placement constraints for running tasks and stops tasks that don't meet the placement constraints.REPLICA
| DAEMON
\n \n
"
+ "smithy.api#documentation": "NEW
- The initial state of a finding, before it is reviewed.NOTIFIED
or\n RESOLVED
to NEW
in the following cases:\n
\n RecordState
changes from ARCHIVED
to ACTIVE
.Compliance.Status
changes from PASSED
to either WARNING
,\n FAILED
, or NOT_AVAILABLE
.NOTIFIED
- Indicates that the resource owner has been notified about\n the security issue. Used when the initial reviewer is not the resource owner, and\n needs intervention from the resource owner.NOTIFIED
to NEW
:\n
\n RecordState
changes from ARCHIVED
to\n ACTIVE
.Compliance.Status
changes from PASSED
to FAILED
,\n WARNING
, or NOT_AVAILABLE
.SUPPRESSED
- Indicates that you reviewed the finding and do not believe that any action is\n needed.SUPPRESSED
finding does not change if\n RecordState
changes from ARCHIVED
to\n ACTIVE
.RESOLVED
- The finding was reviewed and remediated and is now\n considered resolved. RESOLVED
unless one of the following occurs:\n
\n RecordState
changes from ARCHIVED
to\n ACTIVE
.Compliance.Status
changes from PASSED
to FAILED
,\n WARNING
, or NOT_AVAILABLE
.NEW
.Compliance.Status
is PASSED
,\n then Security Hub automatically sets the workflow status to RESOLVED
.\n
"
}
},
"RecordState": {
@@ -19082,7 +19082,7 @@
"ComplianceSecurityControlId": {
"target": "com.amazonaws.securityhub#StringFilterList",
"traits": {
- "smithy.api#documentation": "NEW
- The initial state of a finding, before it is reviewed.NOTIFIED
or\n RESOLVED
to NEW
in the following cases:\n
\n RecordState
changes from ARCHIVED
to ACTIVE
.Compliance.Status
changes from PASSED
to either WARNING
,\n FAILED
, or NOT_AVAILABLE
.NOTIFIED
- Indicates that the resource owner has been notified about\n the security issue. Used when the initial reviewer is not the resource owner, and\n needs intervention from the resource owner.NOTIFIED
to NEW
:\n
\n RecordState
changes from ARCHIVED
to\n ACTIVE
.Compliance.Status
changes from PASSED
to FAILED
,\n WARNING
, or NOT_AVAILABLE
.SUPPRESSED
- Indicates that you reviewed the finding and don't believe that any action is\n needed.SUPPRESSED
finding does not change if\n RecordState
changes from ARCHIVED
to\n ACTIVE
.RESOLVED
- The finding was reviewed and remediated and is now\n considered resolved. RESOLVED
unless one of the following occurs:\n
\n RecordState
changes from ARCHIVED
to\n ACTIVE
.Compliance.Status
changes from PASSED
to FAILED
,\n WARNING
, or NOT_AVAILABLE
.NEW
.Compliance.Status
is PASSED
,\n then Security Hub automatically sets the workflow status to RESOLVED
.OverrideAction
to test your RuleGroup
.RuleGroup
can potentially block a request. If you set the OverrideAction
to\n None
, the RuleGroup
blocks a request if any individual rule in the RuleGroup
\n matches the request and is configured to block that request.RuleGroup
,\n set the OverrideAction
to Count
. The RuleGroup
\n then overrides any block action specified by individual rules contained within the group.\n Instead of blocking matching requests, those requests are counted.ActivatedRule
|OverrideAction
applies only when updating or\n adding a RuleGroup
\n to a web ACL. In this case you do not use ActivatedRule
\n Action
. For all other update requests,\n ActivatedRule
\n Action
is used instead of ActivatedRule
\n OverrideAction
.OverrideAction
to test your RuleGroup
.RuleGroup
can potentially block a request. If you set the OverrideAction
to\n None
, the RuleGroup
blocks a request if any individual rule in the RuleGroup
\n matches the request and is configured to block that request.RuleGroup
,\n set the OverrideAction
to Count
. The RuleGroup
\n then overrides any block action specified by individual rules contained within the group.\n Instead of blocking matching requests, those requests are counted.ActivatedRule
|OverrideAction
applies only when updating or\n adding a RuleGroup
\n to a web ACL. In this case you don't use ActivatedRule
\n Action
. For all other update requests,\n ActivatedRule
\n Action
is used instead of ActivatedRule
\n OverrideAction
.Priority
are\n evaluated before rules with a higher value. The value must be a unique integer. If you add\n multiple rules to a web ACL, the values do not need to be consecutive.Priority
are\n evaluated before rules with a higher value. The value must be a unique integer. If you add\n multiple rules to a web ACL, the values don't need to be consecutive.BatchUpdateFindings
do not affect the value of\n UpdatedAt
for a finding.BatchUpdateFindings
to update the\n following finding fields and objects.\n
\n Confidence
\n Criticality
\n Note
\n RelatedFindings
\n Severity
\n Types
\n UserDefinedFields
\n VerificationState
\n Workflow
\n BatchUpdateFindings
don't affect the value of\n UpdatedAt
for a finding.BatchUpdateFindings
to update the\n following finding fields and objects.\n
\n Confidence
\n Criticality
\n Note
\n RelatedFindings
\n Severity
\n Types
\n UserDefinedFields
\n VerificationState
\n Workflow
\n APIGateway.5
.\n APIGateway.5
.\n RegionLinkingMode
is ALL_REGIONS_EXCEPT_SPECIFIED
, then this is a space-separated list of Regions that do not aggregate findings to the aggregation Region.RegionLinkingMode
is SPECIFIED_REGIONS
, then this is a space-separated list of Regions that do aggregate findings to the aggregation Region.\n InvalidInputException
error results if you populate this field while RegionLinkingMode
is \n NO_REGIONS
.RegionLinkingMode
is ALL_REGIONS_EXCEPT_SPECIFIED
, then this is a space-separated list of Regions that don't replicate and send findings to the home Region.RegionLinkingMode
is SPECIFIED_REGIONS
, then this is a space-separated list of Regions that do replicate and send findings to the home Region.\n InvalidInputException
error results if you populate this field while RegionLinkingMode
is \n NO_REGIONS
.CreateMembers
is always used to add accounts that are not organization\n members.CreateMembers
is only used\n in the following cases:\n
\n EnableSecurityHub
operation.InviteMembers
operation. If the account owner accepts\n the invitation, the account becomes a member account in Security Hub.\n
\n DisassociateFromMasterAccount
or DisassociateMembers
operation.CreateMembers
is always used to add accounts that are not organization\n members.CreateMembers
is only used\n in the following cases:\n
\n EnableSecurityHub
operation.InviteMembers
operation. If the account owner accepts\n the invitation, the account becomes a member account in Security Hub.\n
\n DisassociateFromMasterAccount
or DisassociateMembers
operation.EnableDefaultStandards
, it is set\n to true
. To not enable the automatically enabled standards, set\n EnableDefaultStandards
to false
.EnableDefaultStandards
, it is set\n to true
. To not enable the automatically enabled standards, set\n EnableDefaultStandards
to false
.BatchImportFindings
\n , or an Security Hub customer\n may call \n BatchUpdateFindings
\n . BatchImportFindings
\n , or an Security Hub customer\n may call \n BatchUpdateFindings
\n . BatchImportFindings
\n (by an integrated Amazon Web Servicesservice or third party partner integration) or \n BatchUpdateFindings
\n (by a Security Hub customer). \n BatchImportFindings
\n (by an integrated Amazon Web Services service or third party partner integration) or \n BatchUpdateFindings
\n (by a Security Hub customer). \n GetFindings
from the aggregation Region, the results include all of the matching findings from both the aggregation Region and the linked Regions.GetFindings
from the home Region, the results include all of the matching findings from both the home Region and linked Regions.GetInsights
returns all of your custom insights. It does not return any\n managed insights.GetInsights
returns all of your custom insights. It does not return any\n managed insights.CreateMembers
action to create the member account in Security Hub.CreateMembers
action to create the member account in Security Hub.ListFindingAggregators
returns the ARN of the finding aggregator. You can run this operation from any Region.ListFindingAggregators
returns the Amazon Resource Name (ARN) \nof the finding aggregator. You can run this operation from any Amazon Web Services Region.SecurityControlArn
, which is a unique Amazon Resource Name (ARN) assigned to a control. The \n ARN references the security control ID (for example, arn:aws:securityhub:eu-central-1:123456789012:security-control/APIGateway.3).\n SecurityControlArn
, which is a unique Amazon Resource Name (ARN) assigned to a control. The \n ARN references the security control ID (for example, arn:aws:securityhub:eu-central-1:123456789012:security-control/APIGateway.3).\n \n
",
+ "smithy.api#documentation": "BatchEnableStandards
- RateLimit
of 1 request per\n second. BurstLimit
of 1 request per second.GetFindings
- RateLimit
of 3 requests per second.\n BurstLimit
of 6 requests per second.BatchImportFindings
- RateLimit
of 10 requests per second.\n BurstLimit
of 30 requests per second.BatchUpdateFindings
- RateLimit
of 10 requests per second.\n BurstLimit
of 30 requests per second.UpdateStandardsControl
- RateLimit
of 1 request per\n second. BurstLimit
of 5 requests per second.RateLimit
of 10 requests per second.\n BurstLimit
of 30 requests per second.\n
",
"smithy.api#title": "AWS SecurityHub",
"smithy.rules#endpointRuleSet": {
"version": "1.0",
@@ -33071,13 +33071,13 @@
"Label": {
"target": "com.amazonaws.securityhub#SeverityLabel",
"traits": {
- "smithy.api#documentation": "BatchEnableStandards
- RateLimit
of 1 request per\n second. BurstLimit
of 1 request per second.GetFindings
- RateLimit
of 3 requests per second.\n BurstLimit
of 6 requests per second.BatchImportFindings
- RateLimit
of 10 requests per second.\n BurstLimit
of 30 requests per second.BatchUpdateFindings
- RateLimit
of 10 requests per second.\n BurstLimit
of 30 requests per second.UpdateStandardsControl
- RateLimit
of 1 request per\n second. BurstLimit
of 5 requests per second.RateLimit
of 10 requests per second.\n BurstLimit
of 30 requests per second.\n
\n INFORMATIONAL
- No issue was found.LOW
- The issue does not require action on its own.MEDIUM
- The issue must be addressed but not urgently.HIGH
- The issue must be addressed as a priority.CRITICAL
- The issue must be remediated immediately to avoid it\n escalating.Normalized
and do not provide Label
, then\n Label
is set automatically as follows. \n
"
+ "smithy.api#documentation": "INFORMATIONAL
\n LOW
\n MEDIUM
\n HIGH
\n CRITICAL
\n \n
\n INFORMATIONAL
- No issue was found.LOW
- The issue does not require action on its own.MEDIUM
- The issue must be addressed but not urgently.HIGH
- The issue must be addressed as a priority.CRITICAL
- The issue must be remediated immediately to avoid it\n escalating.Normalized
and don't provide Label
, then\n Label
is set automatically as follows. \n
"
}
},
"Normalized": {
"target": "com.amazonaws.securityhub#Integer",
"traits": {
- "smithy.api#documentation": "INFORMATIONAL
\n LOW
\n MEDIUM
\n HIGH
\n CRITICAL
\n Normalized
, provide Label
.Normalized
can be an integer between 0
and 100
.Label
and do not provide Normalized
, then\n Normalized
is set automatically as follows.\n
"
+ "smithy.api#documentation": "INFORMATIONAL
- 0LOW
- 1MEDIUM
- 40HIGH
- 70CRITICAL
- 90Normalized
, provide Label
.Normalized
can be an integer between 0
and 100
.Label
and don't provide Normalized
, then\n Normalized
is set automatically as follows.\n
"
}
},
"Original": {
@@ -33161,7 +33161,7 @@
"Normalized": {
"target": "com.amazonaws.securityhub#RatioScale",
"traits": {
- "smithy.api#documentation": "INFORMATIONAL
- 0LOW
- 1MEDIUM
- 40HIGH
- 70CRITICAL
- 90Label
.Normalized
and do not provide Label
,\n Label
is set automatically as follows.\n
"
+ "smithy.api#documentation": "INFORMATIONAL
\n LOW
\n MEDIUM
\n HIGH
\n CRITICAL
\n Label
.Normalized
and don't provide Label
,\n Label
is set automatically as follows.\n
"
}
},
"Product": {
@@ -33440,7 +33440,7 @@
"target": "com.amazonaws.securityhub#NonEmptyString",
"traits": {
"smithy.api#clientOptional": {},
- "smithy.api#documentation": "INFORMATIONAL
\n LOW
\n MEDIUM
\n HIGH
\n CRITICAL
\n UpdateFindingAggregator
to change the aggregation Region.UpdateFindingAggregator
from the current aggregation Region.\n RegionLinkingMode
is ALL_REGIONS_EXCEPT_SPECIFIED
, then this is a space-separated list of Regions that do not aggregate findings to the aggregation Region.RegionLinkingMode
is SPECIFIED_REGIONS
, then this is a space-separated list of Regions that do aggregate findings to the aggregation Region.InvalidInputException
error results if you populate this field while RegionLinkingMode
is \n NO_REGIONS
.RegionLinkingMode
is ALL_REGIONS_EXCEPT_SPECIFIED
, then this is a space-separated list of Regions that don't replicate and send findings to the home Region.RegionLinkingMode
is SPECIFIED_REGIONS
, then this is a space-separated list of Regions that do replicate and send findings to the home Region.InvalidInputException
error results if you populate this field while RegionLinkingMode
is \n NO_REGIONS
.SUPPRESSED
or RESOLVED
does not prevent a new finding for the same issue.\n
"
+ "smithy.api#documentation": "NEW
- The initial state of a finding, before it is reviewed.NOTIFIED
or\n RESOLVED
to NEW
in the following cases:\n
\n RecordState
changes from ARCHIVED
to\n ACTIVE
.ComplianceStatus
changes from PASSED
to either\n WARNING
, FAILED
, or\n NOT_AVAILABLE
.NOTIFIED
- Indicates that you notified the resource owner about the\n security issue. Used when the initial reviewer is not the resource owner, and needs\n intervention from the resource owner.SUPPRESSED
- Indicates that you reviewed the finding and do not believe that any action is needed. The finding is no longer updated.RESOLVED
- The finding was reviewed and remediated and is now\n considered resolved. SUPPRESSED
or RESOLVED
does not prevent a new finding for the same issue.\n
"
}
}
},
@@ -36360,7 +36360,7 @@
"Status": {
"target": "com.amazonaws.securityhub#WorkflowStatus",
"traits": {
- "smithy.api#documentation": "NEW
- The initial state of a finding, before it is reviewed.NOTIFIED
or\n RESOLVED
to NEW
in the following cases:\n
\n RecordState
changes from ARCHIVED
to\n ACTIVE
.ComplianceStatus
changes from PASSED
to either\n WARNING
, FAILED
, or\n NOT_AVAILABLE
.NOTIFIED
- Indicates that you notified the resource owner about the\n security issue. Used when the initial reviewer is not the resource owner, and needs\n intervention from the resource owner.SUPPRESSED
- Indicates that you reviewed the finding and don't believe that any action is needed. The finding is no longer updated.RESOLVED
- The finding was reviewed and remediated and is now\n considered resolved. SUPPRESSED
or RESOLVED
does not prevent a new finding for the same issue.\n
"
+ "smithy.api#documentation": "NEW
- The initial state of a finding, before it is reviewed.WorkFlowStatus
from NOTIFIED
or\n RESOLVED
to NEW
in the following cases:\n
\n ARCHIVED
to\n ACTIVE
.PASSED
to either\n WARNING
, FAILED
, or\n NOT_AVAILABLE
.NOTIFIED
- Indicates that you notified the resource owner about the\n security issue. Used when the initial reviewer is not the resource owner, and needs\n intervention from the resource owner.RESOLVED
- The finding was reviewed and remediated and is now\n considered resolved.SUPPRESSED
- Indicates that you reviewed the finding and do not believe that any action is needed. The finding is no longer updated.SUPPRESSED
or RESOLVED
does not prevent a new finding for the same issue.\n
"
}
}
},
NEW
- The initial state of a finding, before it is reviewed.WorkFlowStatus
from NOTIFIED
or\n RESOLVED
to NEW
in the following cases:\n
\n ARCHIVED
to\n ACTIVE
.PASSED
to either\n WARNING
, FAILED
, or\n NOT_AVAILABLE
.NOTIFIED
- Indicates that you notified the resource owner about the\n security issue. Used when the initial reviewer is not the resource owner, and needs\n intervention from the resource owner.RESOLVED
- The finding was reviewed and remediated and is now\n considered resolved.SUPPRESSED
- Indicates that you reviewed the finding and don't believe that any action is needed. The finding is no longer updated.