Struct aws_sdk_securityhub::model::AwsSecurityFinding
source · #[non_exhaustive]pub struct AwsSecurityFinding { /* private fields */ }
Expand description
Provides a consistent format for Security Hub findings. AwsSecurityFinding
format allows you to share findings between Amazon Web Services security services and third-party solutions.
A finding is a potential security issue generated either by Amazon Web Services services or by the integrated third-party solutions and standards checks.
Implementations§
source§impl AwsSecurityFinding
impl AwsSecurityFinding
sourcepub fn schema_version(&self) -> Option<&str>
pub fn schema_version(&self) -> Option<&str>
The schema version that a finding is formatted for.
sourcepub fn id(&self) -> Option<&str>
pub fn id(&self) -> Option<&str>
The security findings provider-specific identifier for a finding.
sourcepub fn product_arn(&self) -> Option<&str>
pub fn product_arn(&self) -> Option<&str>
The ARN generated by Security Hub that uniquely identifies a product that generates findings. This can be the ARN for a third-party product that is integrated with Security Hub, or the ARN for a custom integration.
sourcepub fn product_name(&self) -> Option<&str>
pub fn product_name(&self) -> Option<&str>
The name of the product that generated the finding.
Security Hub populates this attribute automatically for each finding. You cannot update this attribute with BatchImportFindings
or BatchUpdateFindings
. The exception to this is a custom integration.
When you use the Security Hub console or API to filter findings by product name, you use this attribute.
sourcepub fn company_name(&self) -> Option<&str>
pub fn company_name(&self) -> Option<&str>
The name of the company for the product that generated the finding.
Security Hub populates this attribute automatically for each finding. You cannot update this attribute with BatchImportFindings
or BatchUpdateFindings
. The exception to this is a custom integration.
When you use the Security Hub console or API to filter findings by company name, you use this attribute.
sourcepub fn region(&self) -> Option<&str>
pub fn region(&self) -> Option<&str>
The Region from which the finding was generated.
Security Hub populates this attribute automatically for each finding. You cannot update it using BatchImportFindings
or BatchUpdateFindings
.
sourcepub fn generator_id(&self) -> Option<&str>
pub fn generator_id(&self) -> Option<&str>
The identifier for the solution-specific component (a discrete unit of logic) that generated a finding. In various security-findings providers' solutions, this generator can be called a rule, a check, a detector, a plugin, etc.
sourcepub fn aws_account_id(&self) -> Option<&str>
pub fn aws_account_id(&self) -> Option<&str>
The Amazon Web Services account ID that a finding is generated in.
sourcepub fn types(&self) -> Option<&[String]>
pub fn types(&self) -> Option<&[String]>
One or more finding types in the format of namespace/category/classifier
that classify a finding.
Valid namespace values are: Software and Configuration Checks | TTPs | Effects | Unusual Behaviors | Sensitive Data Identifications
sourcepub fn first_observed_at(&self) -> Option<&str>
pub fn first_observed_at(&self) -> Option<&str>
Indicates when the security-findings provider first observed the potential security issue that a finding captured.
Uses the date-time
format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z
.
sourcepub fn last_observed_at(&self) -> Option<&str>
pub fn last_observed_at(&self) -> Option<&str>
Indicates when the security-findings provider most recently observed the potential security issue that a finding captured.
Uses the date-time
format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z
.
sourcepub fn created_at(&self) -> Option<&str>
pub fn created_at(&self) -> Option<&str>
Indicates when the security-findings provider created the potential security issue that a finding captured.
Uses the date-time
format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z
.
sourcepub fn updated_at(&self) -> Option<&str>
pub fn updated_at(&self) -> Option<&str>
Indicates when the security-findings provider last updated the finding record.
Uses the date-time
format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z
.
sourcepub fn confidence(&self) -> i32
pub fn confidence(&self) -> i32
A finding's confidence. Confidence is defined as the likelihood that a finding accurately identifies the behavior or issue that it was intended to identify.
Confidence is scored on a 0-100 basis using a ratio scale, where 0 means zero percent confidence and 100 means 100 percent confidence.
sourcepub fn criticality(&self) -> i32
pub fn criticality(&self) -> i32
The level of importance assigned to the resources associated with the finding.
A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources.
sourcepub fn title(&self) -> Option<&str>
pub fn title(&self) -> Option<&str>
A finding's title.
In this release, Title
is a required property.
sourcepub fn description(&self) -> Option<&str>
pub fn description(&self) -> Option<&str>
A finding's description.
In this release, Description
is a required property.
sourcepub fn remediation(&self) -> Option<&Remediation>
pub fn remediation(&self) -> Option<&Remediation>
A data type that describes the remediation options for a finding.
sourcepub fn source_url(&self) -> Option<&str>
pub fn source_url(&self) -> Option<&str>
A URL that links to a page about the current finding in the security-findings provider's solution.
sourcepub fn product_fields(&self) -> Option<&HashMap<String, String>>
pub fn product_fields(&self) -> Option<&HashMap<String, String>>
A data type where security-findings providers can include additional solution-specific details that aren't part of the defined AwsSecurityFinding
format.
Can contain up to 50 key-value pairs. For each key-value pair, the key can contain up to 128 characters, and the value can contain up to 2048 characters.
sourcepub fn user_defined_fields(&self) -> Option<&HashMap<String, String>>
pub fn user_defined_fields(&self) -> Option<&HashMap<String, String>>
A list of name/value string pairs associated with the finding. These are custom, user-defined fields added to a finding.
sourcepub fn network(&self) -> Option<&Network>
pub fn network(&self) -> Option<&Network>
The details of network-related information about a finding.
sourcepub fn network_path(&self) -> Option<&[NetworkPathComponent]>
pub fn network_path(&self) -> Option<&[NetworkPathComponent]>
Provides information about a network path that is relevant to a finding. Each entry under NetworkPath
represents a component of that path.
sourcepub fn process(&self) -> Option<&ProcessDetails>
pub fn process(&self) -> Option<&ProcessDetails>
The details of process-related information about a finding.
sourcepub fn threats(&self) -> Option<&[Threat]>
pub fn threats(&self) -> Option<&[Threat]>
Details about the threat detected in a security finding and the file paths that were affected by the threat.
sourcepub fn threat_intel_indicators(&self) -> Option<&[ThreatIntelIndicator]>
pub fn threat_intel_indicators(&self) -> Option<&[ThreatIntelIndicator]>
Threat intelligence details related to a finding.
sourcepub fn resources(&self) -> Option<&[Resource]>
pub fn resources(&self) -> Option<&[Resource]>
A set of resource data types that describe the resources that the finding refers to.
sourcepub fn compliance(&self) -> Option<&Compliance>
pub fn compliance(&self) -> Option<&Compliance>
This data type is exclusive to findings that are generated as the result of a check run against a specific rule in a supported security standard, such as CIS Amazon Web Services Foundations. Contains security standard-related finding details.
sourcepub fn verification_state(&self) -> Option<&VerificationState>
pub fn verification_state(&self) -> Option<&VerificationState>
Indicates the veracity of a finding.
sourcepub fn workflow_state(&self) -> Option<&WorkflowState>
pub fn workflow_state(&self) -> Option<&WorkflowState>
The workflow state of a finding.
sourcepub fn workflow(&self) -> Option<&Workflow>
pub fn workflow(&self) -> Option<&Workflow>
Provides information about the status of the investigation into a finding.
sourcepub fn record_state(&self) -> Option<&RecordState>
pub fn record_state(&self) -> Option<&RecordState>
The record state of a finding.
A list of related findings.
sourcepub fn vulnerabilities(&self) -> Option<&[Vulnerability]>
pub fn vulnerabilities(&self) -> Option<&[Vulnerability]>
Provides a list of vulnerabilities associated with the findings.
sourcepub fn patch_summary(&self) -> Option<&PatchSummary>
pub fn patch_summary(&self) -> Option<&PatchSummary>
Provides an overview of the patch compliance status for an instance against a selected compliance standard.
sourcepub fn action(&self) -> Option<&Action>
pub fn action(&self) -> Option<&Action>
Provides details about an action that affects or that was taken on a resource.
sourcepub fn finding_provider_fields(&self) -> Option<&FindingProviderFields>
pub fn finding_provider_fields(&self) -> Option<&FindingProviderFields>
In a BatchImportFindings
request, finding providers use FindingProviderFields
to provide and update their own values for confidence, criticality, related findings, severity, and types.
source§impl AwsSecurityFinding
impl AwsSecurityFinding
sourcepub fn builder() -> Builder
pub fn builder() -> Builder
Creates a new builder-style object to manufacture AwsSecurityFinding
.
Trait Implementations§
source§impl Clone for AwsSecurityFinding
impl Clone for AwsSecurityFinding
source§fn clone(&self) -> AwsSecurityFinding
fn clone(&self) -> AwsSecurityFinding
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moresource§impl Debug for AwsSecurityFinding
impl Debug for AwsSecurityFinding
source§impl PartialEq<AwsSecurityFinding> for AwsSecurityFinding
impl PartialEq<AwsSecurityFinding> for AwsSecurityFinding
source§fn eq(&self, other: &AwsSecurityFinding) -> bool
fn eq(&self, other: &AwsSecurityFinding) -> bool
self
and other
values to be equal, and is used
by ==
.