Package-level declarations

Types

Link copied to clipboard
Link copied to clipboard
Link copied to clipboard

You don't have permission to perform the action specified in the request.

Link copied to clipboard

The details of an Amazon Web Services account.

Link copied to clipboard
class Action

Provides details about one of the following actions that affects or that was taken on a resource:

Link copied to clipboard

Provides information about the IP address where the scanned port is located.

Link copied to clipboard

For NetworkConnectionAction and PortProbeDetails, LocalPortDetails provides information about the local port that was involved in the action.

Link copied to clipboard

For AwsApiAction, NetworkConnectionAction, and PortProbeAction, RemoteIpDetails provides information about the remote IP address that was involved in the action.

Link copied to clipboard

Provides information about the remote port that was involved in an attempted network connection.

Link copied to clipboard

An ActionTarget object.

Link copied to clipboard
class Actor

Information about the threat actor identified in an Amazon GuardDuty Extended Threat Detection attack sequence. GuardDuty generates an attack sequence finding when multiple events align to a potentially suspicious activity. To receive GuardDuty attack sequence findings in Security Hub, you must have GuardDuty enabled. For more information, see GuardDuty Extended Threat Detection in the Amazon GuardDuty User Guide.

Link copied to clipboard

Contains information about the authenticated session used by the threat actor identified in an Amazon GuardDuty Extended Threat Detection attack sequence. GuardDuty generates an attack sequence finding when multiple events align to a potentially suspicious activity. To receive GuardDuty attack sequence findings in Security Hub, you must have GuardDuty enabled. For more information, see GuardDuty Extended Threat Detection in the Amazon GuardDuty User Guide.

Link copied to clipboard
Link copied to clipboard
class ActorUser

Contains information about the credentials used by the threat actor identified in an Amazon GuardDuty Extended Threat Detection attack sequence. GuardDuty generates an attack sequence finding when multiple events align to a potentially suspicious activity. To receive GuardDuty attack sequence findings in Security Hub, you must have GuardDuty enabled. For more information, see GuardDuty Extended Threat Detection in the Amazon GuardDuty User Guide.

Link copied to clipboard

An adjustment to the CVSS metric.

Link copied to clipboard

Represents a Security Hub administrator account designated by an organization management account.

Link copied to clipboard
sealed class AdminStatus
Link copied to clipboard

Specifies a cross-Region data aggregation configuration, including the aggregation Region and any linked Regions.

Link copied to clipboard
sealed class AllowedOperators
Link copied to clipboard

Information about an enabled security standard in which a security control is enabled.

Link copied to clipboard

Options for filtering the ListConfigurationPolicyAssociations response. You can filter by the Amazon Resource Name (ARN) or universally unique identifier (UUID) of a configuration policy, AssociationType, or AssociationStatus.

Link copied to clipboard

The associations between a route table and one or more subnets or a gateway.

Link copied to clipboard

Describes the state of an association between a route table and a subnet or gateway.

Link copied to clipboard
sealed class AssociationStatus
Link copied to clipboard
sealed class AssociationType
Link copied to clipboard
sealed class AutoEnableStandards
Link copied to clipboard

One or more actions that Security Hub takes when a finding matches the defined criteria of a rule.

Link copied to clipboard
Link copied to clipboard

Allows you to customize security response workflows.

Link copied to clipboard
Link copied to clipboard

Allows you to configure automated responses.

Link copied to clipboard

Defines the configuration of an automation rule.

Link copied to clipboard

Identifies the finding fields that the automation rule action updates when a finding matches the defined criteria.

Link copied to clipboard

Allows you to define the structure for modifying specific fields in security findings.

Link copied to clipboard

The criteria that determine which findings a rule applies to.

Link copied to clipboard

Metadata for automation rules in the calling account. The response includes rules with a RuleStatus of ENABLED and DISABLED.

Link copied to clipboard

Includes essential metadata information about automation rules.

Link copied to clipboard

Information about an Availability Zone.

Link copied to clipboard

Provides details about an Amazon MQ message broker. A message broker allows software applications and components to communicate using various programming languages, operating systems, and formal messaging protocols.

Provides details about broker encryption options.

The metadata of the Lightweight Directory Access Protocol (LDAP) server used to authenticate and authorize connections to the broker. This is an optional failover server.

Link copied to clipboard

Provides information about logs to be activated for the specified broker.

Link copied to clipboard

Provides information about logs to be activated for the specified broker.

The scheduled time period (UTC) during which Amazon MQ begins to apply pending updates or patches to the broker.

Link copied to clipboard

Provides details about the broker usernames for the specified broker. Doesn't apply to RabbitMQ brokers.

Link copied to clipboard

Provided if ActionType is AWS_API_CALL. It provides details about the API call that was detected.

Link copied to clipboard

Provided if CallerType is domain. It provides information about the DNS domain that issued the API call.

Link copied to clipboard

Contains information about settings for logging access for the stage.

Link copied to clipboard

Contains information about settings for canary deployment in the stage.

Link copied to clipboard

Contains information about the endpoints for the API.

Link copied to clipboard

Defines settings for a method for the stage.

Link copied to clipboard

Contains information about a REST API in version 1 of Amazon API Gateway.

Link copied to clipboard

Provides information about a version 1 Amazon API Gateway stage.

Link copied to clipboard

Contains information about a version 2 API in Amazon API Gateway.

Link copied to clipboard

Contains route settings for a stage.

Link copied to clipboard

Contains information about a version 2 stage for Amazon API Gateway.

A list of additional authentication providers for the GraphqlApi API.

Link copied to clipboard

Provides details about an AppSync Graph QL API, which lets you query multiple databases, microservices, and APIs from a single GraphQL endpoint.

Specifies the authorization configuration for using an Lambda function with your AppSync GraphQL API endpoint.

Link copied to clipboard

Specifies the logging configuration when writing GraphQL operations and tracing to Amazon CloudWatch for an AppSync GraphQL API.

Specifies the authorization configuration for using an OpenID Connect compliant service with your AppSync GraphQL API endpoint.

Specifies the authorization configuration for using Amazon Cognito user pools with your AppSync GraphQL API endpoint.

Link copied to clipboard

The configuration of the workgroup, which includes the location in Amazon Simple Storage Service (Amazon S3) where query results are stored, the encryption option, if any, used for query results, whether Amazon CloudWatch metrics are enabled for the workgroup, and the limit for the amount of bytes scanned (cutoff) per query, if it is specified.

The location in Amazon Simple Storage Service (Amazon S3) where query and calculation results are stored and the encryption option, if any, used for query and calculation results. These are known as client-side settings. If workgroup settings override client-side settings, then the query uses the workgroup settings.

Specifies the method used to encrypt the user’s data stores in the Athena workgroup.

Link copied to clipboard

Provides information about an Amazon Athena workgroup.

An Availability Zone for the automatic scaling group.

Link copied to clipboard

Provides details about an auto scaling group.

The mixed instances policy for the automatic scaling group.

Describes a launch template and overrides for a mixed instances policy.

Parameters that are used to automatically set up EBS volumes when an instance is launched.

Link copied to clipboard

Details about a launch configuration.

Information about the type of monitoring for instances in the group.

The metadata options for the instances.

Provides a list of backup options for each resource type.

Link copied to clipboard

Provides details about an Backup backup plan and an array of BackupRule objects, each of which specifies a backup rule.

Link copied to clipboard

Provides details about an Backup backup plan and an array of BackupRule objects, each of which specifies a backup rule.

Link copied to clipboard

Provides lifecycle details for the backup plan. A lifecycle defines when a backup is transitioned to cold storage and when it expires.

An array of CopyAction objects, each of which contains details of the copy operation.

Link copied to clipboard

Provides details about an array of BackupRule objects, each of which specifies a scheduled task that is used to back up a selection of resources.

Link copied to clipboard

Provides details about an Backup backup vault. In Backup, a backup vault is a container that stores and organizes your backups.

Link copied to clipboard

Provides details about the Amazon SNS event notifications for the specified backup vault.

Specifies how long in days before a recovery point transitions to cold storage or is deleted.

Link copied to clipboard

Contains information about the backup plan and rule that Backup used to initiate the recovery point backup.

Link copied to clipboard

Contains detailed information about the recovery points stored in an Backup backup vault. A backup, or recovery point, represents the content of a resource at a specified time.

Link copied to clipboard

Contains an array of Transition objects specifying how long in days before a recovery point transitions to cold storage or is deleted.

Link copied to clipboard

Provides details about an Certificate Manager certificate.

Contains information about one of the following:

Contains information about an extended key usage X.509 v3 extension object.

Link copied to clipboard

Contains information about a key usage X.509 v3 extension object.

Link copied to clipboard

Contains other options for the certificate.

Contains information about the Certificate Manager managed renewal for an AMAZON_ISSUED certificate.

Provides details about the CNAME record that is added to the DNS database for domain validation.

Link copied to clipboard

Nests a stack as a resource in a top-level template. Nested stacks are stacks created as resources for another stack.

Provides information about the stack's conformity to its expected template configuration.

Link copied to clipboard

Provides information about the CloudFormation stack output.

Link copied to clipboard

Information about a cache behavior for the distribution.

Link copied to clipboard

Provides information about caching for the CloudFront distribution.

Contains information about the default cache configuration for the CloudFront distribution.

Link copied to clipboard

A CloudFront distribution configuration.

Link copied to clipboard

A complex type that controls whether access logs are written for the CloudFront distribution.

A custom origin. A custom origin is any origin that is not an Amazon S3 bucket, with one exception. An Amazon S3 bucket that is configured with static website hosting is a custom origin.

Link copied to clipboard

Information about an origin group for the CloudFront distribution.

Provides information about when an origin group fails over.

The status codes that cause an origin group to fail over.

Link copied to clipboard

Provides information about origin groups that are associated with the CloudFront distribution.

Link copied to clipboard

A complex type that describes the Amazon S3 bucket, HTTP server (for example, a web server), Elemental MediaStore, or other server from which CloudFront gets your files.

Link copied to clipboard

A complex type that contains information about origins and origin groups for this CloudFront distribution.

Information about an origin that is an Amazon S3 bucket that is not configured with static website hosting.

A complex type that contains information about the SSL/TLS protocols that CloudFront can use when establishing an HTTPS connection with your origin.

Provides information about the TLS/SSL configuration that the CloudFront distribution uses to communicate with viewers.

Link copied to clipboard

Provides details about a CloudTrail trail.

Link copied to clipboard

Specifies an alarm and associates it with the specified metric or metric math expression.

Link copied to clipboard

Details about the dimensions for the metric associated with the alarm.

Link copied to clipboard

Information about the build artifacts for the CodeBuild project.

Link copied to clipboard

Information about an CodeBuild project.

Link copied to clipboard

Information about the build environment for this build project.

Information about an environment variable that is available to builds for the build project.

The credentials for access to a private registry.

Information about CloudWatch Logs for the build project.

Link copied to clipboard

Information about logs for the build project.

Information about logs built to an S3 bucket for a build project.

Link copied to clipboard

Information about the build input source code for this build project.

Link copied to clipboard

Information about the VPC configuration that CodeBuild accesses.

Link copied to clipboard

Contains the cross-origin resource sharing (CORS) configuration for the API. CORS is only supported for HTTP APIs.

Link copied to clipboard

Provides details about an Database Migration Service (DMS) endpoint. An endpoint provides connection, data store type, and location information about your data store.

Link copied to clipboard

Provides details about an Database Migration Service (DMS) replication instance. DMS uses a replication instance to connect to your source data store, read the source data, and format the data for consumption by the target data store.

Provides details about the replication subnet group.

Provides details about the virtual private cloud (VPC) security group that’s associated with the replication instance.

Link copied to clipboard

Provides details about an Database Migration Service (DMS) replication task. A replication task moves a set of data from the source endpoint to the target endpoint.

Link copied to clipboard

Contains a definition of an attribute for the table.

Link copied to clipboard

Provides information about the billing for read/write capacity on the table.

Link copied to clipboard

Provides details about a DynamoDB table.

Link copied to clipboard

Information abut a global secondary index for the table.

Link copied to clipboard

A component of the key schema for the DynamoDB table, a global secondary index, or a local secondary index.

Link copied to clipboard

Information about a local secondary index for a DynamoDB table.

Link copied to clipboard

For global and local secondary indexes, identifies the attributes that are copied from the table into the index.

Link copied to clipboard

Information about the provisioned throughput for the table or for a global secondary index.

Replica-specific configuration for the provisioned throughput.

Link copied to clipboard

Information about a replica of a DynamoDB table.

Information about a global secondary index for a DynamoDB table replica.

Link copied to clipboard

Information about the restore for the table.

Link copied to clipboard

Information about the server-side encryption for the table.

Link copied to clipboard

The current DynamoDB Streams configuration for the table.

Provides details about an Active Directory that’s used to authenticate an Client VPN endpoint.

Information about the authentication method used by the Client VPN endpoint.

Describes the IAM SAML identity providers used for federated authentication.

Information about the client certificate used for authentication.

The options for managing connection authorization for new client connections.

Describes the status of the Client VPN endpoint attribute.

Options for enabling a customizable text banner that will be displayed on Amazon Web Services provided clients when a VPN session is established.

Information about the client connection logging options for the Client VPN endpoint.

Link copied to clipboard

Describes an Client VPN endpoint. A Client VPN endpoint is the resource that you create and configure to enable and manage client VPN sessions. It's the termination point for all client VPN sessions.

Link copied to clipboard

Information about an Elastic IP address.

Link copied to clipboard

The details of an Amazon EC2 instance.

Link copied to clipboard

Metadata options that allow you to configure and secure the Amazon EC2 instance.

Link copied to clipboard

The type of monitoring that’s turned on for an Amazon EC2 instance.

Link copied to clipboard

Identifies a network interface for the Amazon EC2 instance.

Information about a block device mapping for an Amazon Elastic Compute Cloud (Amazon EC2) launch template.

Parameters for a block device for an Amazon Elastic Block Store (Amazon EBS) volume in an Amazon EC2 launch template.

Information about the target Capacity Reservation or Capacity Reservation group in which to run an Amazon EC2 instance.

Specifies the Capacity Reservation targeting option of an Amazon EC2 instance.

Specifies the CPU options for an Amazon EC2 instance. For more information, see Optimize CPU options in the Amazon Elastic Compute Cloud User Guide.

Specifies the credit option for CPU usage of a T2, T3, or T3a Amazon EC2 instance.

Link copied to clipboard

The information to include in an Amazon Elastic Compute Cloud (Amazon EC2) launch template.

Provides details about an Elastic Graphics specification for an Amazon EC2 launch template.

Provides details for an Amazon Elastic Inference accelerator.

Indicates whether the instance is enabled for Amazon Web Services Nitro Enclaves.

Specifies whether your Amazon EC2 instance is configured for hibernation.

Provides details for an Identity and Access Management (IAM) instance profile, which is a container for an IAM role for your instance.

Provides details about the market (purchasing) option for an Amazon EC2 instance.

Provides details about the market (purchasing) options for Spot Instances.

The minimum and maximum number of accelerators (GPUs, FPGAs, or Amazon Web Services Inferentia chips) on an Amazon EC2 instance.

The minimum and maximum amount of memory, in MiB, for the accelerators on an Amazon EC2 instance.

The minimum and maximum baseline bandwidth to Amazon Elastic Block Store (Amazon EBS), in Mbps. For more information, see Amazon EBS–optimized instances in the Amazon EC2 User Guide.

The attributes for the Amazon EC2 instance types.

The minimum and maximum amount of memory per vCPU, in GiB.

The minimum and maximum amount of memory, in MiB, for an Amazon EC2 instance.

The minimum and maximum number of network interfaces to be attached to an Amazon EC2 instance.

The minimum and maximum amount of total local storage, in GB, that an Amazon EC2 instance uses.

The minimum and maximum number of vCPUs for an Amazon EC2 instance.

Provides details about the license configuration for an Amazon EC2 instance.

The maintenance options of an Amazon EC2 instance.

Specifies the metadata options for an Amazon EC2 instance.

The monitoring for an Amazon EC2 instance.

One or more network interfaces to attach to an Amazon EC2 instance. If you specify a network interface, you must specify security groups and subnets as part of the network interface.

Provides details on one or more IPv4 prefixes for a network interface.

Specifies an IPv6 address in an Amazon EC2 launch template.

Provides details on one or more IPv6 prefixes to be assigned to the network interface.

Link copied to clipboard

Provides details about the placement of an Amazon EC2 instance.

Describes the options for Amazon EC2 instance hostnames.

Link copied to clipboard

Specifies the properties for creating an Amazon Elastic Compute Cloud (Amazon EC2) launch template.

Link copied to clipboard

An association between the network ACL and a subnet.

Link copied to clipboard

Contains details about an Amazon EC2 network access control list (ACL).

Link copied to clipboard

A rule for the network ACL. Each rule allows or denies access based on the IP address, traffic direction, port, and protocol.

Link copied to clipboard

Information about the network interface attachment.

Link copied to clipboard

Details about the network interface

Link copied to clipboard

Provides information about an IPV6 address that is associated with the network interface.

Provides information about a private IPv4 address that is with the network interface.

Link copied to clipboard

A security group associated with the network interface.

Link copied to clipboard

Provides details about a route table for the specified VPC.

Link copied to clipboard

Details about an Amazon EC2 security group.

Link copied to clipboard

An IP permission for an EC2 security group.

Link copied to clipboard

A range of IPv4 addresses.

Link copied to clipboard

A range of IPv6 addresses.

Link copied to clipboard

A prefix list ID.

Link copied to clipboard

A relationship between a security group and a user.

Link copied to clipboard

Contains information about a subnet in Amazon EC2.

Link copied to clipboard

Information about an Amazon Web Services Amazon EC2 Transit Gateway that interconnects virtual private clouds (VPCs) and on-premises networks.

Link copied to clipboard

An attachment to an Amazon EC2 volume.

Link copied to clipboard

Details about an EC2 volume.

Link copied to clipboard

Details about an EC2 VPC.

Link copied to clipboard

Contains details about the service configuration for a VPC endpoint service.

The service type information for a VPC endpoint service.

Link copied to clipboard

Provides information about a VPC peering connection between two VPCs: a requester VPC that you own and an accepter VPC with which to create the connection.

Link copied to clipboard

Details about the status of the VPC peering connection.

Link copied to clipboard

Describes a VPC in a VPC peering connection.

Link copied to clipboard

Details about an Amazon EC2 VPN connection.

Link copied to clipboard

VPN connection options.

Link copied to clipboard

A static routes associated with the VPN connection.

Link copied to clipboard

Information about the VPN tunnel.

Link copied to clipboard

Information about an Amazon ECR image.

Link copied to clipboard

Provides information about an Amazon Elastic Container Registry repository.

The image scanning configuration for a repository.

Link copied to clipboard

Information about the lifecycle policy for the repository.

Link copied to clipboard

Indicates whether to enable CloudWatch Container Insights for the ECS cluster.

Link copied to clipboard

The run command configuration for the cluster.

Contains the run command configuration for the cluster.

The default capacity provider strategy for the cluster. The default capacity provider strategy is used when services or tasks are run without a specified launch type or capacity provider strategy.

Link copied to clipboard

Provides details about an Amazon ECS cluster.

Link copied to clipboard

Provides information about an Amazon ECS container.

Strategy item for the capacity provider strategy that the service uses.

Determines whether a service deployment fails if a service cannot reach a steady state.

Optional deployment parameters for the service.

Link copied to clipboard

Information about the deployment controller type that the service uses.

Link copied to clipboard

Provides details about a service within an ECS cluster.

Link copied to clipboard

Information about a load balancer that the service uses.

For tasks that use the awsvpc networking mode, the VPC subnet and security group configuration.

Link copied to clipboard

For tasks that use the awsvpc networking mode, the VPC subnet and security group configuration.

Link copied to clipboard

A placement constraint for the tasks in the service.

Link copied to clipboard

A placement strategy that determines how to place the tasks for the service.

Link copied to clipboard

Information about a service discovery registry to assign to the service.

A dependency that is defined for container startup and shutdown.

A container definition that describes a container in the task.

An environment variable to pass to the container.

A file that contain environment variables to pass to a container.

A hostname and IP address mapping to append to the /etc/hosts file on the container.

The FireLens configuration for the container. The configuration specifies and configures a log router for container logs.

The container health check command and associated configuration parameters for the container.

The Linux capabilities for the container that are added to or dropped from the default configuration provided by Docker.

The container path, mount options, and size (in MiB) of a tmpfs mount.

The log configuration specification for the container.

A mount point for the data volumes in the container.

The private repository authentication credentials to use.

A namespaced kernel parameter to set in the container.

A data volume to mount from another container.

Link copied to clipboard

Details about a task definition. A task definition describes the container and volume definitions of an Amazon Elastic Container Service task.

An Elastic Inference accelerator to use for the containers in the task.

A placement constraint object to use for tasks.

The configuration details for the App Mesh proxy.

A network configuration parameter to provide to the Container Network Interface (CNI) plugin.

Link copied to clipboard

A data volume to mount from another container.

Information about the Amazon Elastic File System file system that is used for task storage.

Link copied to clipboard

Information about a bind mount host volume.

Link copied to clipboard

Provides details about a task in a cluster.

Link copied to clipboard

Provides information about a data volume that's used in a task definition.

Link copied to clipboard

Provides details on a container instance bind mount host volume.

Link copied to clipboard

Provides information about an Amazon EFS access point.

Link copied to clipboard

Provides details for all file system operations using this Amazon EFS access point.

Provides information about the settings that Amazon EFS uses to create the root directory when a client connects to an access point.

Link copied to clipboard

Provides information about the directory on the Amazon EFS file system that the access point exposes as the root directory to NFS clients using the access point.

Link copied to clipboard

Provides details about an Amazon EKS cluster.

Details for a cluster logging configuration.

Link copied to clipboard

The logging configuration for an Amazon EKS cluster.

Link copied to clipboard

Information about the VPC configuration used by the cluster control plane.

Link copied to clipboard

Contains details about an Elastic Beanstalk environment.

Contains information about a link to another environment that is in the same group.

A configuration option setting for the environment.

Link copied to clipboard

Contains information about the tier of the environment.

Link copied to clipboard

Information about an Elasticsearch domain.

Additional options for the domain endpoint, such as whether to require HTTPS for all traffic.

details about the configuration of an OpenSearch cluster.

Details about the configuration for encryption at rest.

configures the CloudWatch Logs to publish for the Elasticsearch domain.

Details about the configuration for node-to-node encryption.

Information about the state of the domain relative to the latest service software.

Link copied to clipboard

Information that OpenSearch derives based on VPCOptions for the domain.

Link copied to clipboard

Contains information about a stickiness policy that was created using CreateAppCookieStickinessPolicy.

Link copied to clipboard

Contains information about a stickiness policy that was created using CreateLBCookieStickinessPolicy.

Link copied to clipboard

Contains information about the access log configuration for the load balancer.

Link copied to clipboard

Provides information about additional attributes for the load balancer.

Link copied to clipboard

Contains attributes for the load balancer.

Provides information about the configuration of an EC2 instance for the load balancer.

Link copied to clipboard

Contains information about the connection draining configuration for the load balancer.

Link copied to clipboard

Contains connection settings for the load balancer.

Link copied to clipboard

Contains cross-zone load balancing settings for the load balancer.

Link copied to clipboard

Contains details about a Classic Load Balancer.

Link copied to clipboard

Contains information about the health checks that are conducted on the load balancer.

Link copied to clipboard

Provides information about an EC2 instance for a load balancer.

Link copied to clipboard

Information about a load balancer listener.

Link copied to clipboard

Lists the policies that are enabled for a load balancer listener.

Link copied to clipboard

Contains information about the policies for a load balancer.

Link copied to clipboard

Contains information about the security group for the load balancer.

Link copied to clipboard

A load balancer attribute.

Link copied to clipboard

Information about a load balancer.

Link copied to clipboard

A schema defines the structure of events that are sent to Amazon EventBridge. Schema registries are containers for schemas. They collect and organize schemas so that your schemas are in logical groups.

Link copied to clipboard

Provides details about an Amazon EventBridge global endpoint. The endpoint can improve your application’s availability by making it Regional-fault tolerant.

Link copied to clipboard

Provides details about the Amazon EventBridge event buses that the endpoint is associated with.

Indicates whether replication is enabled or disabled for the endpoint. If enabled, the endpoint can replicate all events to a secondary Amazon Web Services Region.

Link copied to clipboard

Provides details about the routing configuration of the endpoint.

The failover configuration for an endpoint. This includes what triggers failover and what happens when it's triggered.

Provides details about the primary Amazon Web Services Region of the endpoint.

The Amazon Web Services Region that events are routed to when failover is triggered or event replication is enabled.

Link copied to clipboard

Provides details about Amazon EventBridge event bus. An event bus is a router that receives events and delivers them to zero or more destinations, or targets. This can be a custom event bus which you can use to receive events from your custom applications and services, or it can be a partner event bus which can be matched to a partner event source.

An object that contains information on the status of CloudTrail as a data source for the detector.

Link copied to clipboard

Describes which data sources are activated for the detector.

An object that contains information on the status of DNS logs as a data source for the detector.

An object that contains information on the status of VPC Flow Logs as a data source for the detector.

An object that contains information on the status of Kubernetes audit logs as a data source for the detector.

An object that contains information on the status of Kubernetes data sources for the detector.

An object that contains information on the status of Malware Protection as a data source for the detector.

Describes the configuration of Malware Protection for EC2 instances with findings.

Describes the configuration of scanning EBS volumes (Malware Protection) as a data source.

An object that contains information on the status of S3 data event logs as a data source for the detector.

Link copied to clipboard

Provides details about an Amazon GuardDuty detector. A detector is an object that represents the GuardDuty service. A detector is required for GuardDuty to become operational.

Link copied to clipboard

Describes which features are activated for the detector.

Link copied to clipboard

IAM access key details related to a finding.

Link copied to clipboard

Provides information about the session that the key was used for.

Link copied to clipboard

Attributes of the session that the key was used for.

Information about the entity that created the session.

Link copied to clipboard
Link copied to clipboard

A managed policy that is attached to an IAM principal.

Link copied to clipboard

Contains details about an IAM group.

Link copied to clipboard

A managed policy that is attached to the IAM group.

Link copied to clipboard

Information about an instance profile.

Link copied to clipboard

Information about a role associated with an instance profile.

Link copied to clipboard

Information about the policy used to set the permissions boundary for an IAM principal.

Link copied to clipboard

Represents an IAM permissions policy.

Link copied to clipboard

A version of an IAM policy.

Link copied to clipboard

Contains information about an IAM role, including all of the role's policies.

Link copied to clipboard

An inline policy that is embedded in the role.

Link copied to clipboard

Information about an IAM user.

Link copied to clipboard

Information about an inline policy that is embedded in the user.

Link copied to clipboard

Provides information about an Amazon Kinesis data stream.

Link copied to clipboard

Provides information about stream encryption.

Link copied to clipboard

Contains metadata about an KMS key.

Link copied to clipboard

The code for the Lambda function. You can specify either an object in Amazon S3, or upload a deployment package directly.

Link copied to clipboard

The dead-letter queue for failed asynchronous invocations.

Link copied to clipboard

Details about an Lambda function's configuration.

Link copied to clipboard

A function's environment variable settings.

Link copied to clipboard

Error messages for environment variables that could not be applied.

Link copied to clipboard

An Lambda layer.

Link copied to clipboard

The function's X-Ray tracing configuration.

Link copied to clipboard

The VPC security groups and subnets that are attached to a Lambda function.

Link copied to clipboard

Details about a Lambda layer version.

Link copied to clipboard

Details for a volume mount point that's used in a container definition.

Provides details about different modes of client authentication.

Provides details for client authentication using SASL.

Provides details for client authentication using TLS.

Provides details for allowing no client authentication.

Link copied to clipboard

Provide details about an Amazon Managed Streaming for Apache Kafka (Amazon MSK) cluster.

Includes encryption-related information, such as the KMS key used for encrypting data at rest and whether you want MSK to encrypt your data in transit.

The data-volume encryption details. You can't update encryption at rest settings for existing clusters.

Link copied to clipboard

Provides details about an Amazon Managed Streaming for Apache Kafka (Amazon MSK) cluster.

Link copied to clipboard

Details about an Network Firewall firewall.

Link copied to clipboard

Details about a firewall policy. A firewall policy defines the behavior of a network firewall.

A public subnet that Network Firewall uses for the firewall.

Link copied to clipboard

Details about an Network Firewall rule group. Rule groups are used to inspect and control network traffic. Stateless rule groups apply to individual packets. Stateful rule groups apply to packets in the context of their traffic flow.

Provides information about domain access control options.

Details about the configuration of an OpenSearch cluster.

Link copied to clipboard

Information about an Amazon OpenSearch Service domain.

Information about additional options for the domain endpoint.

Details about the configuration for encryption at rest for the OpenSearch domain.

Configuration details for a log publishing option.

Configures the CloudWatch Logs to publish for the OpenSearch domain.

Specifies information about the master user of the domain.

Provides details about the configuration for node-to-node encryption.

Provides information about the state of the domain relative to the latest service software.

Contains information that OpenSearch Service derives based on the VPCOptions for the domain.

Link copied to clipboard

An IAM role that is associated with the Amazon RDS DB cluster.

Link copied to clipboard

Information about an Amazon RDS DB cluster.

Link copied to clipboard

Information about an instance in the DB cluster.

Link copied to clipboard

Information about an option group membership for a DB cluster.

Contains the name and values of a manual Amazon Relational Database Service (RDS) DB cluster snapshot attribute.

Link copied to clipboard

Information about an Amazon RDS DB cluster snapshot.

Link copied to clipboard

Information about an Active Directory domain membership record associated with the DB instance.

Link copied to clipboard

An IAM role associated with the DB instance.

Link copied to clipboard

Contains the details of an Amazon RDS DB instance.

Link copied to clipboard

Specifies the connection endpoint.

Link copied to clipboard

A VPC security groups that the DB instance belongs to.

Link copied to clipboard

An option group membership.

Link copied to clipboard

Provides information about a parameter group for a DB instance.

Link copied to clipboard

Changes to a DB instance that are currently pending.

Link copied to clipboard

A processor feature.

Link copied to clipboard

Provides information about an Amazon RDS DB security group.

Link copied to clipboard

EC2 security group information for an RDS DB security group.

Link copied to clipboard

IP range information for an RDS DB security group.

Link copied to clipboard

Provides details about an Amazon RDS DB cluster snapshot.

Link copied to clipboard

Information about the status of a read replica.

Link copied to clipboard

Information about the subnet group for the database instance.

Link copied to clipboard

Information about a subnet in a subnet group.

An Availability Zone for a subnet in a subnet group.

Link copied to clipboard

Details about an Amazon RDS event notification subscription. The subscription allows Amazon RDS to post events to an SNS topic.

Link copied to clipboard

Identifies the log types to enable and disable.

Link copied to clipboard

A node in an Amazon Redshift cluster.

Link copied to clipboard

A cluster parameter group that is associated with an Amazon Redshift cluster.

Link copied to clipboard

The status of a parameter in a cluster parameter group for an Amazon Redshift cluster.

Link copied to clipboard

A security group that is associated with the cluster.

You can configure Amazon Redshift to copy snapshots for a cluster to another Amazon Web Services Region. This parameter provides information about a cross-Region snapshot copy.

A time windows during which maintenance was deferred for an Amazon Redshift cluster.

Link copied to clipboard

Details about an Amazon Redshift cluster.

Link copied to clipboard

The status of the elastic IP (EIP) address for an Amazon Redshift cluster.

Link copied to clipboard

The connection endpoint for an Amazon Redshift cluster.

Link copied to clipboard

Information about whether an Amazon Redshift cluster finished applying any hardware changes to security module (HSM) settings that were specified in a modify cluster command.

Link copied to clipboard

An IAM role that the cluster can use to access other Amazon Web Services services.

Link copied to clipboard

Provides information about the logging status of the cluster.

Link copied to clipboard

Changes to the Amazon Redshift cluster that are currently pending.

Link copied to clipboard

Information about the resize operation for the cluster.

Link copied to clipboard

Information about the status of a cluster restore action. It only applies if the cluster was created by restoring a snapshot.

Link copied to clipboard

A VPC security group that the cluster belongs to, if the cluster is in a VPC.

Link copied to clipboard

An object that contains an optional comment about your Amazon Route 53 hosted zone.

Link copied to clipboard

Provides details about a specified Amazon Route 53 hosted zone, including the four name servers assigned to the hosted zone. A hosted zone represents a collection of records that can be managed together, belonging to a single parent domain name.

Link copied to clipboard

An object that contains information about an Amazon Route 53 hosted zone.

Link copied to clipboard

For private hosted zones, this is a complex type that contains information about an Amazon VPC.

Link copied to clipboard

Provides details about a specified Amazon Route 53 configuration for DNS query logging.

Link copied to clipboard

Returns configuration information about the specified Amazon S3 access point. S3 access points are named network endpoints that are attached to buckets that you can use to perform S3 object operations.

Link copied to clipboard

The virtual private cloud (VPC) configuration for an Amazon S3 access point.

Link copied to clipboard

provides information about the Amazon S3 Public Access Block configuration for accounts.

The lifecycle configuration for the objects in the S3 bucket.

Information about what Amazon S3 does when a multipart upload is incomplete.

Configuration for a lifecycle rule.

Identifies the objects that a rule applies to.

A transition rule that describes when noncurrent objects transition to a specified storage class.

A rule for when objects transition to specific storage classes.

Link copied to clipboard

Describes the versioning state of an S3 bucket.

Link copied to clipboard

The details of an Amazon Simple Storage Service (Amazon S3) bucket.

Link copied to clipboard

Information about logging for the S3 bucket

Link copied to clipboard

The notification configuration for the S3 bucket.

Details for an S3 bucket notification configuration.

Filtering information for the notifications. The filtering is based on Amazon S3 key names.

Details for an Amazon S3 filter.

Link copied to clipboard

The container element for S3 Object Lock configuration parameters. In Amazon S3, Object Lock can help prevent objects from being deleted or overwritten for a fixed amount of time or indefinitely.

The default S3 Object Lock retention mode and period that you want to apply to new objects placed in the specified Amazon S3 bucket.

Specifies the S3 Object Lock rule for the specified object. In Amazon S3, Object Lock can help prevent objects from being deleted or overwritten for a fixed amount of time or indefinitely.

Link copied to clipboard

Specifies the default server-side encryption to apply to new objects in the bucket.

The encryption configuration for the S3 bucket.

Link copied to clipboard

An encryption rule to apply to the S3 bucket.

Link copied to clipboard

Website parameters for the S3 bucket.

The redirect behavior for requests to the website.

A rule for redirecting requests to the website.

The condition that must be met in order to apply the routing rule.

The rules to redirect the request if the condition in Condition is met.

Link copied to clipboard

Details about an Amazon S3 object.

Link copied to clipboard

Provides details about an Amazon SageMaker AI notebook instance.

Information on the instance metadata service (IMDS) configuration of the notebook instance.

Link copied to clipboard

Details about an Secrets Manager secret.

Link copied to clipboard

Defines the rotation schedule for the secret.

Link copied to clipboard

Provides a consistent format for Security Hub findings. AwsSecurityFinding format allows you to share findings between Amazon Web Services security services and third-party solutions.

Link copied to clipboard

A collection of filters that are applied to all active findings aggregated by Security Hub.

Link copied to clipboard

Identifies which finding to get the finding history for.

Link copied to clipboard

Provides information about an Amazon SNS topic to which notifications can be published.

Link copied to clipboard

A wrapper type for the attributes of an Amazon SNS subscription.

Link copied to clipboard

Data about a queue.

Link copied to clipboard

Provides the details about the compliance status for a patch.

Link copied to clipboard

Provides details about the compliance for a patch.

Link copied to clipboard

Provides information about the state of a patch on an instance based on the patch baseline that was used to patch the instance.

Link copied to clipboard

Provides details about an Step Functions state machine, which is a workflow consisting of a series of event- driven steps.

An array of objects that describes where your execution history events will be logged.

The LoggingConfiguration data type is used to set CloudWatch Logs options.

Specifies whether X-Ray tracing is enabled.

Link copied to clipboard

Details about a rate-based rule for global resources. A rate-based rule provides settings to indicate when to allow, block, or count a request. Rate-based rules include the number of requests that arrive over a specified period of time.

Link copied to clipboard

A match predicate. A predicate might look for characteristics such as specific IP addresses, geographic locations, or sizes.

Link copied to clipboard

contains details about a rate-based rule for Regional resources. A rate-based rule provides settings to indicate when to allow, block, or count a request. Rate-based rules include the number of requests that arrive over a specified period of time.

Details for a match predicate. A predicate might look for characteristics such as specific IP addresses, geographic locations, or sizes.

Link copied to clipboard

Provides information about an WAF Regional rule. This rule identifies the web requests that you want to allow, block, or count.

Link copied to clipboard

Provides information about an WAF Regional rule group. The rule group is a collection of rules for inspecting and controlling web requests.

Describes the action that WAF should take on a web request when it matches the criteria defined in the rule.

Link copied to clipboard

Provides information about the rules attached to a rule group

Link copied to clipboard

Provides details about the ByteMatchSet, IPSet, SqlInjectionMatchSet, XssMatchSet, RegexMatchSet, GeoMatchSet, and SizeConstraintSet objects that you want to add to a rule and, for each object, indicates whether you want to negate the settings.

Link copied to clipboard

Provides information about the web access control list (web ACL). The web ACL contains the rules that identify the requests that you want to allow, block, or count.

The action that WAF takes when a web request matches all conditions in the rule, such as allow, block, or count the request.

Link copied to clipboard

A combination of ByteMatchSet, IPSet, and/or SqlInjectionMatchSet objects that identify the web requests that you want to allow, block, or count.

Provides details about the action to use in the place of the action that results from the rule group evaluation.

Link copied to clipboard

Provides information about a WAF rule. This rule specifies the web requests that you want to allow, block, or count.

Link copied to clipboard

Provides information about an WAF rule group. A rule group is a collection of rules for inspecting and controlling web requests.

Link copied to clipboard

Provides information about what action WAF should take on a web request when it matches the criteria defined in the rule.

Link copied to clipboard

Provides information about the rules attached to the rule group. These rules identify the web requests that you want to allow, block, or count.

Link copied to clipboard

Provides details about the ByteMatchSet, IPSet, SqlInjectionMatchSet, XssMatchSet, RegexMatchSet, GeoMatchSet, and SizeConstraintSet objects that you want to add to a rule and, for each object, indicates whether you want to negate the settings.

Link copied to clipboard

Specifies that WAF should allow the request and optionally defines additional custom handling for the request.

Link copied to clipboard

Specifies that WAF should block the request and optionally defines additional custom handling for the response to the web request.

Link copied to clipboard

A custom header for custom request and response handling.

Link copied to clipboard

Custom request handling behavior that inserts custom headers into a web request. WAF uses custom request handling when the rule action doesn't block the request.

Link copied to clipboard

A custom response to send to the client. You can define a custom response for rule actions and default web ACL actions that are set to block.

Link copied to clipboard

Details about an WAFv2 rule group.

Link copied to clipboard

Specifies that WAF should run a CAPTCHA check against the request.

Link copied to clipboard

Specifies that WAF should count the request.

Link copied to clipboard

The action that WAF should take on a web request when it matches a rule's statement. Settings at the web ACL level can override the rule action setting.

Link copied to clipboard

Provides details about rules in a rule group. A rule identifies web requests that you want to allow, block, or count. Each rule includes one top-level Statement that WAF uses to identify matching web requests, and parameters that govern how WAF handles them.

Link copied to clipboard

Defines and enables Amazon CloudWatch metrics and web request sample collection.

Link copied to clipboard

Specifies the action that Amazon CloudFront or WAF takes when a web request matches the conditions in the rule.

Link copied to clipboard

Specifies how WAF should handle CAPTCHA evaluations for rules that don't have their own CaptchaConfig settings.

Used for CAPTCHA and challenge token settings. Determines how long a CAPTCHA or challenge timestamp remains valid after WAF updates it for a successful CAPTCHA or challenge response.

Link copied to clipboard

Details about an WAFv2 web Access Control List (ACL).

Link copied to clipboard

Provides information about an WAF web access control list (web ACL).

Link copied to clipboard

Details for a rule in an WAF web ACL.

Link copied to clipboard

Information about the encryption configuration for X-Ray.

Link copied to clipboard

A finding from a BatchUpdateFindings request that Security Hub was unable to update.

Link copied to clipboard

The list of findings that were updated.

Link copied to clipboard

The list of findings that were not updated.

Link copied to clipboard

The options for customizing a security control parameter with a boolean. For a boolean parameter, the options are true and false.

Link copied to clipboard

Boolean filter for querying findings.

Link copied to clipboard
class Cell

An occurrence of sensitive data detected in a Microsoft Excel workbook, comma-separated value (CSV) file, or tab-separated value (TSV) file.

Link copied to clipboard

An IPv4 CIDR block association.

Link copied to clipboard
class City

Information about a city.

Link copied to clipboard

Details about the sensitive data that was detected on the resource.

Link copied to clipboard

Provides details about the current status of the sensitive data detection.

Link copied to clipboard

The Amazon Resource Name (ARN) and other details of the Amazon CloudWatch Logs log group that Amazon Route 53 is publishing logs to.

Link copied to clipboard

Provides details about where a code vulnerability is located in your Lambda function.

Link copied to clipboard

This object typically provides details about a control finding, such as applicable standards and the status of control checks. While finding providers can add custom content in Compliance object fields, they are typically used to review details of Security Hub control findings.

Link copied to clipboard
sealed class ComplianceStatus
Link copied to clipboard

Enables the creation of filtering criteria for security findings.

Link copied to clipboard

The options for customizing a security control parameter.

Link copied to clipboard

Provides details about the association between an Security Hub configuration and a target account, organizational unit, or the root. An association can exist between a target and a configuration policy, or between a target and self-managed behavior.

Link copied to clipboard

An object that contains the details of a configuration policy association that’s returned in a ListConfigurationPolicyAssociations request.

Link copied to clipboard

An object that contains the details of an Security Hub configuration policy that’s returned in a ListConfigurationPolicies request.

Link copied to clipboard

The request causes conflict with the current state of the service resource.

Link copied to clipboard
sealed class ConnectionDirection
Link copied to clipboard
sealed class ConnectorAuthStatus
Link copied to clipboard
Link copied to clipboard
sealed class ConnectorStatus
Link copied to clipboard

A condensed overview of the connectorV2..

Link copied to clipboard

Container details related to a finding.

Link copied to clipboard
Link copied to clipboard
sealed class ControlStatus
Link copied to clipboard
class Country

Information about a country.

Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
sealed class Criteria

Defines the parameters and conditions used to evaluate and filter security findings.

Link copied to clipboard

The list of detected instances of sensitive data.

Link copied to clipboard

Contains an instance of sensitive data that was detected by a customer-defined identifier.

Link copied to clipboard
class Cvss

CVSS scores from the advisory related to the vulnerability.

Link copied to clipboard

Provides details about sensitive data that was detected on a resource.

Link copied to clipboard

A date filter for querying findings.

Link copied to clipboard
class DateRange

A date range for the date filter.

Link copied to clipboard
sealed class DateRangeUnit
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
class Detection

A top-level object field that provides details about an Amazon GuardDuty Extended Threat Detection attack sequence. GuardDuty generates an attack sequence finding when multiple events align to a potentially suspicious activity. To receive GuardDuty attack sequence findings in Security Hub, you must have GuardDuty enabled. For more information, see GuardDuty Extended Threat Detection in the Amazon GuardDuty User Guide.

Link copied to clipboard
Link copied to clipboard

Provided if ActionType is DNS_REQUEST. It provides details about the DNS request that was detected.

Link copied to clipboard

The options for customizing a security control parameter that is a double.

Link copied to clipboard
Link copied to clipboard
Link copied to clipboard

The options for customizing a security control parameter that is an enum.

Link copied to clipboard

The options for customizing a security control parameter that is a list of enums.

Link copied to clipboard

Defines the settings and parameters required for integrating external security tools and services.

Link copied to clipboard
class FilePaths

Provides information about the file paths that were affected by the threat.

Link copied to clipboard

A finding aggregator is a Security Hub resource that specifies cross-Region aggregation settings, including the home Region and any linked Regions.

Link copied to clipboard

A list of events that changed the specified finding during the specified time period. Each record represents a single finding change event.

Link copied to clipboard

An array of objects that provides details about a change to a finding, including the Amazon Web Services Security Finding Format (ASFF) field that changed, the value of the field before the change, and the value of the field after the change.

Link copied to clipboard

Identifies the source of the finding change event.

Link copied to clipboard
Link copied to clipboard

In a BatchImportFindings request, finding providers use FindingProviderFields to provide and update values for the following fields:

Link copied to clipboard

The severity assigned to a finding by the finding provider. This object may include one or more of the following attributes:

Link copied to clipboard

Defines the behavior of the firewall.

A stateful rule group that is used by the firewall policy.

A custom action that can be used for stateless packet handling.

A stateless rule group that is used by the firewall policy.

Link copied to clipboard

Provides metadata for the Amazon CodeGuru detector associated with a finding. This field pertains to findings that relate to Lambda functions. Amazon Inspector identifies policy violations and vulnerabilities in Lambda function code based on internal detectors developed in collaboration with Amazon CodeGuru. Security Hub receives those findings.

Link copied to clipboard

Provides the latitude and longitude coordinates of a location.

Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
sealed class GroupByField
Link copied to clipboard

Represents finding statistics grouped by GroupedByField.

Link copied to clipboard

Defines the how the finding attribute should be grouped.

Link copied to clipboard

Represents individual aggregated results when grouping security findings for each GroupByField.

Link copied to clipboard

Information about the operational status and health of a connectorV2.

Link copied to clipboard

An Internet Control Message Protocol (ICMP) type and code.

Link copied to clipboard

The list of the findings that cannot be imported. For each finding, the list provides the error.

Link copied to clipboard
class Indicator

Contains information about the indicators observed in an Amazon GuardDuty Extended Threat Detection attack sequence. Indicators include a set of signals, which can be API activities or findings that GuardDuty uses to detect an attack sequence finding. GuardDuty generates an attack sequence finding when multiple signals align to a potentially suspicious activity. To receive GuardDuty attack sequence findings in Security Hub, you must have GuardDuty and GuardDuty S3 Protection enabled. For more information, see GuardDuty Extended Threat Detection in the Amazon GuardDuty User Guide.

Link copied to clipboard
class Insight

Contains information about a Security Hub insight.

Link copied to clipboard

The insight results returned by the GetInsightResults operation.

Link copied to clipboard

The insight result values returned by the GetInsightResults operation.

Link copied to clipboard

The options for customizing a security control parameter that is an integer.

Link copied to clipboard

The options for customizing a security control parameter that is a list of integers.

Link copied to clipboard
sealed class IntegrationType
Link copied to clipboard
sealed class IntegrationV2Type
Link copied to clipboard

Internal server error.

Link copied to clipboard

The request has failed due to an internal failure of the service.

Link copied to clipboard

The account doesn't have permission to perform this action.

Link copied to clipboard

The request was rejected because you supplied an invalid or out-of-range value for an input parameter.

Link copied to clipboard

Details about an invitation.

Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
class IpFilter

The IP filter for querying findings.

Link copied to clipboard

Provides information about an internet provider.

Link copied to clipboard

An IPV6 CIDR block association.

Link copied to clipboard

Information about the configuration and status of a Jira Cloud integration.

Link copied to clipboard

The initial configuration settings required to establish an integration between Security Hub and Jira Cloud.

Link copied to clipboard

The parameters used to modify an existing Jira Cloud integration.

Link copied to clipboard

A keyword filter for querying findings.

Link copied to clipboard

The request was rejected because it attempted to create resources beyond the current Amazon Web Services account or throttling limits. The error code describes the limit exceeded.

Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard

Information about the state of the load balancer.

Link copied to clipboard
class Malware

A list of malware related to a finding.

Link copied to clipboard
sealed class MalwareState
Link copied to clipboard
sealed class MalwareType
Link copied to clipboard
class MapFilter

A map filter for filtering Security Hub findings. Each map filter provides the field to check for, the value to check for, and the comparison operator.

Link copied to clipboard
sealed class MapFilterComparison
Link copied to clipboard
class Member

The details about a member account.

Link copied to clipboard
class Network

The details of network-related information about a finding.

Link copied to clipboard

Contains information about the Autonomous System (AS) of the network endpoints involved in an Amazon GuardDuty Extended Threat Detection attack sequence. GuardDuty generates an attack sequence finding when multiple events align to a potentially suspicious activity. To receive GuardDuty attack sequence findings in Security Hub, you must have GuardDuty enabled. For more information, see GuardDuty Extended Threat Detection in the Amazon GuardDuty User Guide.

Link copied to clipboard

Contains information about the network connection involved in an Amazon GuardDuty Extended Threat Detection attack sequence. GuardDuty generates an attack sequence finding when multiple events align to a potentially suspicious activity. To receive GuardDuty attack sequence findings in Security Hub, you must have GuardDuty enabled. For more information, see GuardDuty Extended Threat Detection in the Amazon GuardDuty User Guide.

Link copied to clipboard

Provided if ActionType is NETWORK_CONNECTION. It provides details about the attempted network connection that was detected.

Link copied to clipboard
sealed class NetworkDirection
Link copied to clipboard

Contains information about network endpoints involved in an Amazon GuardDuty Extended Threat Detection attack sequence. GuardDuty generates an attack sequence finding when multiple events align to a potentially suspicious activity. To receive GuardDuty attack sequence findings in Security Hub, you must have GuardDuty enabled. For more information, see GuardDuty Extended Threat Detection in the Amazon GuardDuty User Guide.

Link copied to clipboard

Contains information about the location of a network endpoint involved in an Amazon GuardDuty Extended Threat Detection attack sequence. GuardDuty generates an attack sequence finding when multiple events align to a potentially suspicious activity. To receive GuardDuty attack sequence findings in Security Hub, you must have GuardDuty enabled. For more information, see GuardDuty Extended Threat Detection in the Amazon GuardDuty User Guide.

Link copied to clipboard

Details about a network path component that occurs before or after the current component.

Link copied to clipboard

Information about a network path component.

Link copied to clipboard

Information about the destination of the next component in the network path.

Link copied to clipboard
class Note

A user-defined note added to a finding.

Link copied to clipboard

The updated note.

Link copied to clipboard

A number filter for querying findings.

Link copied to clipboard

The detected occurrences of sensitive data.

Link copied to clipboard
sealed class OcsfBooleanField
Link copied to clipboard

Enables filtering of security findings based on boolean field values in OCSF.

Link copied to clipboard
sealed class OcsfDateField
Link copied to clipboard

Enables filtering of security findings based on date and timestamp fields in OCSF.

Link copied to clipboard

Specifies the filtering criteria for security findings using OCSF.

Link copied to clipboard

Provides a standard to identify security findings using OCSF.

Link copied to clipboard
sealed class OcsfMapField
Link copied to clipboard

Enables filtering of security findings based on map field values in OCSF.

Link copied to clipboard
sealed class OcsfNumberField
Link copied to clipboard

Enables filtering of security findings based on numerical field values in OCSF.

Link copied to clipboard
sealed class OcsfStringField
Link copied to clipboard

Enables filtering of security findings based on string field values in OCSF.

Link copied to clipboard

Provides information about the way an organization is configured in Security Hub.

Link copied to clipboard
class Page

An occurrence of sensitive data in an Adobe Portable Document Format (PDF) file.

Link copied to clipboard

An object that provides the current value of a security control parameter and identifies whether it has been customized.

Link copied to clipboard

An object that describes a security control parameter and the options for customizing it.

Link copied to clipboard
sealed class ParameterValue

An object that includes the data type of a security control parameter and its current value.

Link copied to clipboard
sealed class ParameterValueType
Link copied to clipboard
sealed class Partition
Link copied to clipboard

Provides an overview of the patch compliance status for an instance against a selected compliance standard.

Link copied to clipboard
sealed class Policy

An object that defines how Security Hub is configured. It includes whether Security Hub is enabled or disabled, a list of enabled security standards, a list of enabled or disabled security controls, and a list of custom parameter values for specified controls. If you provide a list of security controls that are enabled in the configuration policy, Security Hub disables all other controls (including newly released controls). If you provide a list of security controls that are disabled in the configuration policy, Security Hub enables all other controls (including newly released controls).

Link copied to clipboard

Provided if ActionType is PORT_PROBE. It provides details about the attempted port probe that was detected.

Link copied to clipboard

A port scan that was part of the port probe. For each scan, PortProbeDetails provides information about the local IP address and port that were scanned, and the remote IP address that the scan originated from.

Link copied to clipboard
class PortRange

A range of ports.

Link copied to clipboard

A range of ports.

Link copied to clipboard

The details of process-related information about a finding.

Link copied to clipboard
class Product

Contains details about a product.

Link copied to clipboard
class ProductV2

Defines the structure for the productV2.

Link copied to clipboard

Describes a virtual private gateway propagating route.

Link copied to clipboard

The initial configuration settings required to establish an integration between Security Hub and third-party provider.

Link copied to clipboard
sealed class ProviderDetail

The third-party provider detail for a service configuration.

Link copied to clipboard

The connectorV2 third-party provider configuration summary.

Link copied to clipboard

The parameters required to update the configuration of an integration provider.

Link copied to clipboard
class Range

Identifies where the sensitive data begins and ends.

Link copied to clipboard

A recommendation on how to remediate the issue identified in a finding.

Link copied to clipboard
class Record

An occurrence of sensitive data in an Apache Avro object container or an Apache Parquet file.

Link copied to clipboard
sealed class RecordState
Link copied to clipboard
Link copied to clipboard

Details about a related finding.

Link copied to clipboard

Details about the remediation steps for a finding.

Link copied to clipboard
class Resource

A resource related to a finding.

Link copied to clipboard
sealed class ResourceCategory
Link copied to clipboard

The resource specified in the request conflicts with an existing resource.

Link copied to clipboard

Additional details about a resource related to a finding.

Link copied to clipboard

A list of summaries for all finding types on a resource.

Link copied to clipboard
Link copied to clipboard

Defines the configuration for organizing and categorizing Amazon Web Services resources based on associated security findings.

Link copied to clipboard

The request was rejected because it conflicts with the resource's availability. For example, you tried to update a security control that's currently in the UPDATING state.

Link copied to clipboard

The request was rejected because we can't find the specified resource.

Link copied to clipboard

Provides comprehensive details about an Amazon Web Services resource and its associated security findings.

Link copied to clipboard

Enables the creation of criteria for Amazon Web Services resources in Security Hub.

Link copied to clipboard
sealed class ResourcesDateField
Link copied to clipboard

Enables the filtering of Amazon Web Services resources based on date and timestamp attributes.

Link copied to clipboard

A comprehensive distribution of security findings by severity level for Amazon Web Services resources.

Link copied to clipboard

Enables filtering of Amazon Web Services resources based on data.

Link copied to clipboard
sealed class ResourcesMapField
Link copied to clipboard

Enables filtering of Amazon Web Services resources based on key-value map attributes.

Link copied to clipboard
Link copied to clipboard

Enables filtering of Amazon Web Services resources based on numerical values.

Link copied to clipboard
Link copied to clipboard

Enables filtering of Amazon Web Services resources based on string field values.

Link copied to clipboard

Represents tag information associated with Amazon Web Services resources.

Link copied to clipboard
class Result

Details about the account that was not processed.

Link copied to clipboard

Provides details about the routes in the route table.

Link copied to clipboard

Details about the rule group.

Link copied to clipboard

The rules and actions for the rule group.

Link copied to clipboard

A custom action definition. A custom action is an optional, non-standard action to use for stateless packet handling.

Link copied to clipboard

Stateful inspection criteria for a domain list rule group.

Link copied to clipboard

A Suricata rule specification.

The inspection criteria for a stateful rule.

A rule option for a stateful rule.

Link copied to clipboard

The definition of the stateless rule.

Criteria for the stateless rule.

A port range to specify the destination ports to inspect for.

A port range to specify the source ports to inspect for.

A source IP addresses and address range to inspect for.

A set of TCP flags and masks to inspect for.

Stateless rules and custom actions for a stateless rule group.

Link copied to clipboard

A stateless rule in the rule group.

Link copied to clipboard

Additional settings to use in the specified rules.

Link copied to clipboard

A list of IP addresses and address ranges, in CIDR notation.

Link copied to clipboard

A list of port ranges.

Link copied to clipboard
sealed class RuleStatus
Link copied to clipboard
sealed class RuleStatusV2
Link copied to clipboard

A security control in Security Hub describes a security best practice related to a specific resource.

Link copied to clipboard

A list of security controls and control parameter values that are included in a configuration policy.

Link copied to clipboard

Provides metadata for a security control, including its unique standard-agnostic identifier, title, description, severity, availability in Amazon Web Services Regions, and a link to remediation steps.

Link copied to clipboard

A parameter that a security control accepts.

Link copied to clipboard
Link copied to clipboard

An object that defines which security controls are enabled in an Security Hub configuration policy. The enablement status of a control is aligned across all of the enabled standards in an account.

Link copied to clipboard

Base class for all service related exceptions thrown by the SecurityHub client

Link copied to clipboard
sealed class SecurityHubFeature
Link copied to clipboard

An object that defines how Security Hub is configured. The configuration policy includes whether Security Hub is enabled or disabled, a list of enabled security standards, a list of enabled or disabled security controls, and a list of custom parameter values for specified controls. If you provide a list of security controls that are enabled in the configuration policy, Security Hub disables all other controls (including newly released controls). If you provide a list of security controls that are disabled in the configuration policy, Security Hub enables all other controls (including newly released controls).

Link copied to clipboard

The list of detected instances of sensitive data.

Link copied to clipboard

Contains a detected instance of sensitive data that are based on built-in identifiers.

Link copied to clipboard
class Sequence

Contains information about an Amazon GuardDuty Extended Threat Detection attack sequence finding. GuardDuty generates an attack sequence finding when multiple events align to a potentially suspicious activity. To receive GuardDuty attack sequence findings in Security Hub, you must have GuardDuty enabled. For more information, see GuardDuty Extended Threat Detection in the Amazon GuardDuty User Guide.

Link copied to clipboard

Information about a ServiceNow ITSM integration.

Link copied to clipboard

The initial configuration settings required to establish an integration between Security Hub and ServiceNow ITSM.

Link copied to clipboard
class Severity

The severity of the finding.

Link copied to clipboard
sealed class SeverityLabel
Link copied to clipboard
sealed class SeverityRating
Link copied to clipboard

Updates to the severity information for a finding.

Link copied to clipboard
class Signal

Contains information about the signals involved in an Amazon GuardDuty Extended Threat Detection attack sequence. An attack sequence is a type of threat detected by GuardDuty. GuardDuty generates an attack sequence finding when multiple events, or signals, align to a potentially suspicious activity. When GuardDuty and Security Hub are integrated, GuardDuty sends attack sequence findings to Security Hub.

Link copied to clipboard

Information about a software package.

Link copied to clipboard

A collection of finding attributes used to sort findings.

Link copied to clipboard
sealed class SortOrder
Link copied to clipboard
class Standard

Provides information about a specific security standard.

Link copied to clipboard

Details for an individual security standard control.

Link copied to clipboard

Provides details about a control's enablement status in a specified standard.

Link copied to clipboard

An array with one or more objects that includes a security control (identified with SecurityControlId, SecurityControlArn, or a mix of both parameters) and the Amazon Resource Name (ARN) of a standard. The security control ID or ARN is the same across standards.

Link copied to clipboard

An array that provides the enablement status and other details for each control that applies to each enabled standard.

Link copied to clipboard

An array of requested updates to the enablement status of controls in specified standards. The objects in the array include a security control ID, the Amazon Resource Name (ARN) of the standard, the requested enablement status, and the reason for updating the enablement status.

Link copied to clipboard
Link copied to clipboard

Provides details about the management of a security standard.

Link copied to clipboard
sealed class StandardsStatus
Link copied to clipboard

The reason for the current status of your subscription to the standard.

Link copied to clipboard

A resource that represents your subscription to a supported standard.

Link copied to clipboard

The standard that you want to enable.

Link copied to clipboard

The definition of a custom action that can be used for stateless packet handling.

Link copied to clipboard

Information about metrics to publish to CloudWatch.

Defines a CloudWatch dimension value to publish.

Link copied to clipboard

Provides additional context for the value of Compliance.Status.

Link copied to clipboard
sealed class StatusReasonCode
Link copied to clipboard

The options for customizing a security control parameter that is a string.

Link copied to clipboard

A string filter for filtering Security Hub findings.

Link copied to clipboard
Link copied to clipboard

The options for customizing a security control parameter that is a list of strings.

Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
sealed class Target

The target account, organizational unit, or the root that is associated with an Security Hub configuration. The configuration can be a configuration policy or self-managed behavior.

Link copied to clipboard
sealed class TargetType
Link copied to clipboard
class Threat

Provides information about the threat detected in a security finding and the file paths that were affected by the threat.

Link copied to clipboard

Details about the threat intelligence related to a finding.

Link copied to clipboard
Link copied to clipboard
Link copied to clipboard

The limit on the number of requests per second was exceeded.

Link copied to clipboard

A list of objects containing RuleArn, ErrorCode, and ErrorMessage. This parameter tells you which automation rules the request didn't process and why.

An array of configuration policy associations, one for each configuration policy association identifier, that was specified in a BatchGetConfigurationPolicyAssociations request but couldn’t be processed due to an error.

Link copied to clipboard
Link copied to clipboard

Provides details about a security control for which a response couldn't be returned.

Link copied to clipboard

Provides details about which control's enablement status couldn't be retrieved in a specified standard when calling BatchUpdateStandardsControlAssociations. This parameter also provides details about why the request was unprocessed.

Provides details about which control's enablement status could not be updated in a specified standard when calling the BatchUpdateStandardsControlAssociations API. This parameter also provides details about why the request was unprocessed.

Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard

Specifies the parameters to update in an existing automation rule.

Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
sealed class UpdateStatus
Link copied to clipboard

Provides Amazon Web Services account information of the user involved in an Amazon GuardDuty Extended Threat Detection attack sequence. GuardDuty generates an attack sequence finding when multiple events align to a potentially suspicious activity. To receive GuardDuty attack sequence findings in Security Hub, you must have GuardDuty enabled. For more information, see GuardDuty Extended Threat Detection in the Amazon GuardDuty User Guide.

Link copied to clipboard

The request has failed validation because it's missing required fields or has invalid inputs.

Link copied to clipboard
sealed class VerificationState
Link copied to clipboard

Describes the mounting of a volume in a container.

Link copied to clipboard

Provides details about the IPv4 CIDR blocks for the VPC.

Link copied to clipboard

Provides details about the IPv6 CIDR blocks for the VPC.

Link copied to clipboard

Provides information about the VPC peering connection options for the accepter or requester VPC.

Link copied to clipboard

A vulnerability associated with a finding.

Link copied to clipboard

Provides details about the vulnerabilities found in your Lambda function code. This field pertains to findings that Security Hub receives from Amazon Inspector.

Link copied to clipboard
Link copied to clipboard
Link copied to clipboard

A vendor that generates a vulnerability report.

Link copied to clipboard
class WafAction

Details about the action that CloudFront or WAF takes when a web request matches the conditions in the rule.

Link copied to clipboard

Details about a rule to exclude from a rule group.

Link copied to clipboard

Details about an override action for a rule.

Link copied to clipboard
class Workflow

Provides details about the status of the investigation into a finding.

Link copied to clipboard
sealed class WorkflowState
Link copied to clipboard
sealed class WorkflowStatus
Link copied to clipboard

Used to update information about the investigation into the finding.