pub struct Builder { /* private fields */ }
Expand description

A builder for AwsSecurityFinding.

Implementations§

The schema version that a finding is formatted for.

The schema version that a finding is formatted for.

The security findings provider-specific identifier for a finding.

The security findings provider-specific identifier for a finding.

The ARN generated by Security Hub that uniquely identifies a product that generates findings. This can be the ARN for a third-party product that is integrated with Security Hub, or the ARN for a custom integration.

The ARN generated by Security Hub that uniquely identifies a product that generates findings. This can be the ARN for a third-party product that is integrated with Security Hub, or the ARN for a custom integration.

The name of the product that generated the finding.

Security Hub populates this attribute automatically for each finding. You cannot update this attribute with BatchImportFindings or BatchUpdateFindings. The exception to this is a custom integration.

When you use the Security Hub console or API to filter findings by product name, you use this attribute.

The name of the product that generated the finding.

Security Hub populates this attribute automatically for each finding. You cannot update this attribute with BatchImportFindings or BatchUpdateFindings. The exception to this is a custom integration.

When you use the Security Hub console or API to filter findings by product name, you use this attribute.

The name of the company for the product that generated the finding.

Security Hub populates this attribute automatically for each finding. You cannot update this attribute with BatchImportFindings or BatchUpdateFindings. The exception to this is a custom integration.

When you use the Security Hub console or API to filter findings by company name, you use this attribute.

The name of the company for the product that generated the finding.

Security Hub populates this attribute automatically for each finding. You cannot update this attribute with BatchImportFindings or BatchUpdateFindings. The exception to this is a custom integration.

When you use the Security Hub console or API to filter findings by company name, you use this attribute.

The Region from which the finding was generated.

Security Hub populates this attribute automatically for each finding. You cannot update it using BatchImportFindings or BatchUpdateFindings.

The Region from which the finding was generated.

Security Hub populates this attribute automatically for each finding. You cannot update it using BatchImportFindings or BatchUpdateFindings.

The identifier for the solution-specific component (a discrete unit of logic) that generated a finding. In various security-findings providers' solutions, this generator can be called a rule, a check, a detector, a plugin, etc.

The identifier for the solution-specific component (a discrete unit of logic) that generated a finding. In various security-findings providers' solutions, this generator can be called a rule, a check, a detector, a plugin, etc.

The Amazon Web Services account ID that a finding is generated in.

The Amazon Web Services account ID that a finding is generated in.

Appends an item to types.

To override the contents of this collection use set_types.

One or more finding types in the format of namespace/category/classifier that classify a finding.

Valid namespace values are: Software and Configuration Checks | TTPs | Effects | Unusual Behaviors | Sensitive Data Identifications

One or more finding types in the format of namespace/category/classifier that classify a finding.

Valid namespace values are: Software and Configuration Checks | TTPs | Effects | Unusual Behaviors | Sensitive Data Identifications

Indicates when the security-findings provider first observed the potential security issue that a finding captured.

Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.

Indicates when the security-findings provider first observed the potential security issue that a finding captured.

Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.

Indicates when the security-findings provider most recently observed the potential security issue that a finding captured.

Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.

Indicates when the security-findings provider most recently observed the potential security issue that a finding captured.

Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.

Indicates when the security-findings provider created the potential security issue that a finding captured.

Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.

Indicates when the security-findings provider created the potential security issue that a finding captured.

Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.

Indicates when the security-findings provider last updated the finding record.

Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.

Indicates when the security-findings provider last updated the finding record.

Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.

A finding's severity.

A finding's severity.

A finding's confidence. Confidence is defined as the likelihood that a finding accurately identifies the behavior or issue that it was intended to identify.

Confidence is scored on a 0-100 basis using a ratio scale, where 0 means zero percent confidence and 100 means 100 percent confidence.

A finding's confidence. Confidence is defined as the likelihood that a finding accurately identifies the behavior or issue that it was intended to identify.

Confidence is scored on a 0-100 basis using a ratio scale, where 0 means zero percent confidence and 100 means 100 percent confidence.

The level of importance assigned to the resources associated with the finding.

A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources.

The level of importance assigned to the resources associated with the finding.

A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources.

A finding's title.

In this release, Title is a required property.

A finding's title.

In this release, Title is a required property.

A finding's description.

In this release, Description is a required property.

A finding's description.

In this release, Description is a required property.

A data type that describes the remediation options for a finding.

A data type that describes the remediation options for a finding.

A URL that links to a page about the current finding in the security-findings provider's solution.

A URL that links to a page about the current finding in the security-findings provider's solution.

Adds a key-value pair to product_fields.

To override the contents of this collection use set_product_fields.

A data type where security-findings providers can include additional solution-specific details that aren't part of the defined AwsSecurityFinding format.

Can contain up to 50 key-value pairs. For each key-value pair, the key can contain up to 128 characters, and the value can contain up to 2048 characters.

A data type where security-findings providers can include additional solution-specific details that aren't part of the defined AwsSecurityFinding format.

Can contain up to 50 key-value pairs. For each key-value pair, the key can contain up to 128 characters, and the value can contain up to 2048 characters.

Adds a key-value pair to user_defined_fields.

To override the contents of this collection use set_user_defined_fields.

A list of name/value string pairs associated with the finding. These are custom, user-defined fields added to a finding.

A list of name/value string pairs associated with the finding. These are custom, user-defined fields added to a finding.

Appends an item to malware.

To override the contents of this collection use set_malware.

A list of malware related to a finding.

A list of malware related to a finding.

The details of network-related information about a finding.

The details of network-related information about a finding.

Appends an item to network_path.

To override the contents of this collection use set_network_path.

Provides information about a network path that is relevant to a finding. Each entry under NetworkPath represents a component of that path.

Provides information about a network path that is relevant to a finding. Each entry under NetworkPath represents a component of that path.

The details of process-related information about a finding.

The details of process-related information about a finding.

Appends an item to threats.

To override the contents of this collection use set_threats.

Details about the threat detected in a security finding and the file paths that were affected by the threat.

Details about the threat detected in a security finding and the file paths that were affected by the threat.

Appends an item to threat_intel_indicators.

To override the contents of this collection use set_threat_intel_indicators.

Threat intelligence details related to a finding.

Threat intelligence details related to a finding.

Appends an item to resources.

To override the contents of this collection use set_resources.

A set of resource data types that describe the resources that the finding refers to.

A set of resource data types that describe the resources that the finding refers to.

This data type is exclusive to findings that are generated as the result of a check run against a specific rule in a supported security standard, such as CIS Amazon Web Services Foundations. Contains security standard-related finding details.

This data type is exclusive to findings that are generated as the result of a check run against a specific rule in a supported security standard, such as CIS Amazon Web Services Foundations. Contains security standard-related finding details.

Indicates the veracity of a finding.

Indicates the veracity of a finding.

The workflow state of a finding.

The workflow state of a finding.

Provides information about the status of the investigation into a finding.

Provides information about the status of the investigation into a finding.

The record state of a finding.

The record state of a finding.

Appends an item to related_findings.

To override the contents of this collection use set_related_findings.

A list of related findings.

A list of related findings.

A user-defined note added to a finding.

A user-defined note added to a finding.

Appends an item to vulnerabilities.

To override the contents of this collection use set_vulnerabilities.

Provides a list of vulnerabilities associated with the findings.

Provides a list of vulnerabilities associated with the findings.

Provides an overview of the patch compliance status for an instance against a selected compliance standard.

Provides an overview of the patch compliance status for an instance against a selected compliance standard.

Provides details about an action that affects or that was taken on a resource.

Provides details about an action that affects or that was taken on a resource.

In a BatchImportFindings request, finding providers use FindingProviderFields to provide and update their own values for confidence, criticality, related findings, severity, and types.

In a BatchImportFindings request, finding providers use FindingProviderFields to provide and update their own values for confidence, criticality, related findings, severity, and types.

Indicates whether the finding is a sample finding.

Indicates whether the finding is a sample finding.

Consumes the builder and constructs a AwsSecurityFinding.

Trait Implementations§

Returns a copy of the value. Read more
Performs copy-assignment from source. Read more
Formats the value using the given formatter. Read more
Returns the “default value” for a type. Read more
This method tests for self and other values to be equal, and is used by ==.
This method tests for !=. The default implementation is almost always sufficient, and should not be overridden without very good reason.

Auto Trait Implementations§

Blanket Implementations§

Gets the TypeId of self. Read more
Immutably borrows from an owned value. Read more
Mutably borrows from an owned value. Read more

Returns the argument unchanged.

Instruments this type with the provided Span, returning an Instrumented wrapper. Read more
Instruments this type with the current Span, returning an Instrumented wrapper. Read more

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

Should always be Self
The resulting type after obtaining ownership.
Creates owned data from borrowed data, usually by cloning. Read more
Uses borrowed data to replace owned data, usually by cloning. Read more
The type returned in the event of a conversion error.
Performs the conversion.
The type returned in the event of a conversion error.
Performs the conversion.
Attaches the provided Subscriber to this type, returning a WithDispatch wrapper. Read more
Attaches the current default Subscriber to this type, returning a WithDispatch wrapper. Read more