Struct aws_sdk_securityhub::types::AwsSecurityFinding
source · #[non_exhaustive]pub struct AwsSecurityFinding {Show 41 fields
pub schema_version: Option<String>,
pub id: Option<String>,
pub product_arn: Option<String>,
pub product_name: Option<String>,
pub company_name: Option<String>,
pub region: Option<String>,
pub generator_id: Option<String>,
pub aws_account_id: Option<String>,
pub types: Option<Vec<String>>,
pub first_observed_at: Option<String>,
pub last_observed_at: Option<String>,
pub created_at: Option<String>,
pub updated_at: Option<String>,
pub severity: Option<Severity>,
pub confidence: i32,
pub criticality: i32,
pub title: Option<String>,
pub description: Option<String>,
pub remediation: Option<Remediation>,
pub source_url: Option<String>,
pub product_fields: Option<HashMap<String, String>>,
pub user_defined_fields: Option<HashMap<String, String>>,
pub malware: Option<Vec<Malware>>,
pub network: Option<Network>,
pub network_path: Option<Vec<NetworkPathComponent>>,
pub process: Option<ProcessDetails>,
pub threats: Option<Vec<Threat>>,
pub threat_intel_indicators: Option<Vec<ThreatIntelIndicator>>,
pub resources: Option<Vec<Resource>>,
pub compliance: Option<Compliance>,
pub verification_state: Option<VerificationState>,
pub workflow_state: Option<WorkflowState>,
pub workflow: Option<Workflow>,
pub record_state: Option<RecordState>,
pub related_findings: Option<Vec<RelatedFinding>>,
pub note: Option<Note>,
pub vulnerabilities: Option<Vec<Vulnerability>>,
pub patch_summary: Option<PatchSummary>,
pub action: Option<Action>,
pub finding_provider_fields: Option<FindingProviderFields>,
pub sample: bool,
}
Expand description
Provides a consistent format for Security Hub findings. AwsSecurityFinding
format allows you to share findings between Amazon Web Services security services and third-party solutions.
A finding is a potential security issue generated either by Amazon Web Services services or by the integrated third-party solutions and standards checks.
Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.schema_version: Option<String>
The schema version that a finding is formatted for.
id: Option<String>
The security findings provider-specific identifier for a finding.
product_arn: Option<String>
The ARN generated by Security Hub that uniquely identifies a product that generates findings. This can be the ARN for a third-party product that is integrated with Security Hub, or the ARN for a custom integration.
product_name: Option<String>
The name of the product that generated the finding.
Security Hub populates this attribute automatically for each finding. You cannot update this attribute with BatchImportFindings
or BatchUpdateFindings
. The exception to this is a custom integration.
When you use the Security Hub console or API to filter findings by product name, you use this attribute.
company_name: Option<String>
The name of the company for the product that generated the finding.
Security Hub populates this attribute automatically for each finding. You cannot update this attribute with BatchImportFindings
or BatchUpdateFindings
. The exception to this is a custom integration.
When you use the Security Hub console or API to filter findings by company name, you use this attribute.
region: Option<String>
The Region from which the finding was generated.
Security Hub populates this attribute automatically for each finding. You cannot update it using BatchImportFindings
or BatchUpdateFindings
.
generator_id: Option<String>
The identifier for the solution-specific component (a discrete unit of logic) that generated a finding. In various security findings providers' solutions, this generator can be called a rule, a check, a detector, a plugin, etc.
aws_account_id: Option<String>
The Amazon Web Services account ID that a finding is generated in.
types: Option<Vec<String>>
One or more finding types in the format of namespace/category/classifier
that classify a finding.
Valid namespace values are: Software and Configuration Checks | TTPs | Effects | Unusual Behaviors | Sensitive Data Identifications
first_observed_at: Option<String>
Indicates when the security findings provider first observed the potential security issue that a finding captured.
Uses the date-time
format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T
. For example, 2020-03-22T13:22:13.933Z
.
last_observed_at: Option<String>
Indicates when the security findings provider most recently observed the potential security issue that a finding captured.
Uses the date-time
format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T
. For example, 2020-03-22T13:22:13.933Z
.
created_at: Option<String>
Indicates when the security findings provider created the potential security issue that a finding captured.
Uses the date-time
format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T
. For example, 2020-03-22T13:22:13.933Z
.
updated_at: Option<String>
Indicates when the security findings provider last updated the finding record.
Uses the date-time
format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T
. For example, 2020-03-22T13:22:13.933Z
.
severity: Option<Severity>
A finding's severity.
confidence: i32
A finding's confidence. Confidence is defined as the likelihood that a finding accurately identifies the behavior or issue that it was intended to identify.
Confidence is scored on a 0-100 basis using a ratio scale, where 0 means zero percent confidence and 100 means 100 percent confidence.
criticality: i32
The level of importance assigned to the resources associated with the finding.
A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources.
title: Option<String>
A finding's title.
In this release, Title
is a required property.
description: Option<String>
A finding's description.
In this release, Description
is a required property.
remediation: Option<Remediation>
A data type that describes the remediation options for a finding.
source_url: Option<String>
A URL that links to a page about the current finding in the security findings provider's solution.
product_fields: Option<HashMap<String, String>>
A data type where security findings providers can include additional solution-specific details that aren't part of the defined AwsSecurityFinding
format.
Can contain up to 50 key-value pairs. For each key-value pair, the key can contain up to 128 characters, and the value can contain up to 2048 characters.
user_defined_fields: Option<HashMap<String, String>>
A list of name/value string pairs associated with the finding. These are custom, user-defined fields added to a finding.
malware: Option<Vec<Malware>>
A list of malware related to a finding.
network: Option<Network>
The details of network-related information about a finding.
network_path: Option<Vec<NetworkPathComponent>>
Provides information about a network path that is relevant to a finding. Each entry under NetworkPath
represents a component of that path.
process: Option<ProcessDetails>
The details of process-related information about a finding.
threats: Option<Vec<Threat>>
Details about the threat detected in a security finding and the file paths that were affected by the threat.
threat_intel_indicators: Option<Vec<ThreatIntelIndicator>>
Threat intelligence details related to a finding.
resources: Option<Vec<Resource>>
A set of resource data types that describe the resources that the finding refers to.
compliance: Option<Compliance>
This data type is exclusive to findings that are generated as the result of a check run against a specific rule in a supported security standard, such as CIS Amazon Web Services Foundations. Contains security standard-related finding details.
verification_state: Option<VerificationState>
Indicates the veracity of a finding.
workflow_state: Option<WorkflowState>
The workflow state of a finding.
workflow: Option<Workflow>
Provides information about the status of the investigation into a finding.
record_state: Option<RecordState>
The record state of a finding.
A list of related findings.
note: Option<Note>
A user-defined note added to a finding.
vulnerabilities: Option<Vec<Vulnerability>>
Provides a list of vulnerabilities associated with the findings.
patch_summary: Option<PatchSummary>
Provides an overview of the patch compliance status for an instance against a selected compliance standard.
action: Option<Action>
Provides details about an action that affects or that was taken on a resource.
finding_provider_fields: Option<FindingProviderFields>
In a BatchImportFindings
request, finding providers use FindingProviderFields
to provide and update their own values for confidence, criticality, related findings, severity, and types.
sample: bool
Indicates whether the finding is a sample finding.
Implementations§
source§impl AwsSecurityFinding
impl AwsSecurityFinding
sourcepub fn schema_version(&self) -> Option<&str>
pub fn schema_version(&self) -> Option<&str>
The schema version that a finding is formatted for.
sourcepub fn id(&self) -> Option<&str>
pub fn id(&self) -> Option<&str>
The security findings provider-specific identifier for a finding.
sourcepub fn product_arn(&self) -> Option<&str>
pub fn product_arn(&self) -> Option<&str>
The ARN generated by Security Hub that uniquely identifies a product that generates findings. This can be the ARN for a third-party product that is integrated with Security Hub, or the ARN for a custom integration.
sourcepub fn product_name(&self) -> Option<&str>
pub fn product_name(&self) -> Option<&str>
The name of the product that generated the finding.
Security Hub populates this attribute automatically for each finding. You cannot update this attribute with BatchImportFindings
or BatchUpdateFindings
. The exception to this is a custom integration.
When you use the Security Hub console or API to filter findings by product name, you use this attribute.
sourcepub fn company_name(&self) -> Option<&str>
pub fn company_name(&self) -> Option<&str>
The name of the company for the product that generated the finding.
Security Hub populates this attribute automatically for each finding. You cannot update this attribute with BatchImportFindings
or BatchUpdateFindings
. The exception to this is a custom integration.
When you use the Security Hub console or API to filter findings by company name, you use this attribute.
sourcepub fn region(&self) -> Option<&str>
pub fn region(&self) -> Option<&str>
The Region from which the finding was generated.
Security Hub populates this attribute automatically for each finding. You cannot update it using BatchImportFindings
or BatchUpdateFindings
.
sourcepub fn generator_id(&self) -> Option<&str>
pub fn generator_id(&self) -> Option<&str>
The identifier for the solution-specific component (a discrete unit of logic) that generated a finding. In various security findings providers' solutions, this generator can be called a rule, a check, a detector, a plugin, etc.
sourcepub fn aws_account_id(&self) -> Option<&str>
pub fn aws_account_id(&self) -> Option<&str>
The Amazon Web Services account ID that a finding is generated in.
sourcepub fn types(&self) -> Option<&[String]>
pub fn types(&self) -> Option<&[String]>
One or more finding types in the format of namespace/category/classifier
that classify a finding.
Valid namespace values are: Software and Configuration Checks | TTPs | Effects | Unusual Behaviors | Sensitive Data Identifications
sourcepub fn first_observed_at(&self) -> Option<&str>
pub fn first_observed_at(&self) -> Option<&str>
Indicates when the security findings provider first observed the potential security issue that a finding captured.
Uses the date-time
format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T
. For example, 2020-03-22T13:22:13.933Z
.
sourcepub fn last_observed_at(&self) -> Option<&str>
pub fn last_observed_at(&self) -> Option<&str>
Indicates when the security findings provider most recently observed the potential security issue that a finding captured.
Uses the date-time
format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T
. For example, 2020-03-22T13:22:13.933Z
.
sourcepub fn created_at(&self) -> Option<&str>
pub fn created_at(&self) -> Option<&str>
Indicates when the security findings provider created the potential security issue that a finding captured.
Uses the date-time
format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T
. For example, 2020-03-22T13:22:13.933Z
.
sourcepub fn updated_at(&self) -> Option<&str>
pub fn updated_at(&self) -> Option<&str>
Indicates when the security findings provider last updated the finding record.
Uses the date-time
format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T
. For example, 2020-03-22T13:22:13.933Z
.
sourcepub fn confidence(&self) -> i32
pub fn confidence(&self) -> i32
A finding's confidence. Confidence is defined as the likelihood that a finding accurately identifies the behavior or issue that it was intended to identify.
Confidence is scored on a 0-100 basis using a ratio scale, where 0 means zero percent confidence and 100 means 100 percent confidence.
sourcepub fn criticality(&self) -> i32
pub fn criticality(&self) -> i32
The level of importance assigned to the resources associated with the finding.
A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources.
sourcepub fn title(&self) -> Option<&str>
pub fn title(&self) -> Option<&str>
A finding's title.
In this release, Title
is a required property.
sourcepub fn description(&self) -> Option<&str>
pub fn description(&self) -> Option<&str>
A finding's description.
In this release, Description
is a required property.
sourcepub fn remediation(&self) -> Option<&Remediation>
pub fn remediation(&self) -> Option<&Remediation>
A data type that describes the remediation options for a finding.
sourcepub fn source_url(&self) -> Option<&str>
pub fn source_url(&self) -> Option<&str>
A URL that links to a page about the current finding in the security findings provider's solution.
sourcepub fn product_fields(&self) -> Option<&HashMap<String, String>>
pub fn product_fields(&self) -> Option<&HashMap<String, String>>
A data type where security findings providers can include additional solution-specific details that aren't part of the defined AwsSecurityFinding
format.
Can contain up to 50 key-value pairs. For each key-value pair, the key can contain up to 128 characters, and the value can contain up to 2048 characters.
sourcepub fn user_defined_fields(&self) -> Option<&HashMap<String, String>>
pub fn user_defined_fields(&self) -> Option<&HashMap<String, String>>
A list of name/value string pairs associated with the finding. These are custom, user-defined fields added to a finding.
sourcepub fn network(&self) -> Option<&Network>
pub fn network(&self) -> Option<&Network>
The details of network-related information about a finding.
sourcepub fn network_path(&self) -> Option<&[NetworkPathComponent]>
pub fn network_path(&self) -> Option<&[NetworkPathComponent]>
Provides information about a network path that is relevant to a finding. Each entry under NetworkPath
represents a component of that path.
sourcepub fn process(&self) -> Option<&ProcessDetails>
pub fn process(&self) -> Option<&ProcessDetails>
The details of process-related information about a finding.
sourcepub fn threats(&self) -> Option<&[Threat]>
pub fn threats(&self) -> Option<&[Threat]>
Details about the threat detected in a security finding and the file paths that were affected by the threat.
sourcepub fn threat_intel_indicators(&self) -> Option<&[ThreatIntelIndicator]>
pub fn threat_intel_indicators(&self) -> Option<&[ThreatIntelIndicator]>
Threat intelligence details related to a finding.
sourcepub fn resources(&self) -> Option<&[Resource]>
pub fn resources(&self) -> Option<&[Resource]>
A set of resource data types that describe the resources that the finding refers to.
sourcepub fn compliance(&self) -> Option<&Compliance>
pub fn compliance(&self) -> Option<&Compliance>
This data type is exclusive to findings that are generated as the result of a check run against a specific rule in a supported security standard, such as CIS Amazon Web Services Foundations. Contains security standard-related finding details.
sourcepub fn verification_state(&self) -> Option<&VerificationState>
pub fn verification_state(&self) -> Option<&VerificationState>
Indicates the veracity of a finding.
sourcepub fn workflow_state(&self) -> Option<&WorkflowState>
pub fn workflow_state(&self) -> Option<&WorkflowState>
The workflow state of a finding.
sourcepub fn workflow(&self) -> Option<&Workflow>
pub fn workflow(&self) -> Option<&Workflow>
Provides information about the status of the investigation into a finding.
sourcepub fn record_state(&self) -> Option<&RecordState>
pub fn record_state(&self) -> Option<&RecordState>
The record state of a finding.
A list of related findings.
sourcepub fn vulnerabilities(&self) -> Option<&[Vulnerability]>
pub fn vulnerabilities(&self) -> Option<&[Vulnerability]>
Provides a list of vulnerabilities associated with the findings.
sourcepub fn patch_summary(&self) -> Option<&PatchSummary>
pub fn patch_summary(&self) -> Option<&PatchSummary>
Provides an overview of the patch compliance status for an instance against a selected compliance standard.
sourcepub fn action(&self) -> Option<&Action>
pub fn action(&self) -> Option<&Action>
Provides details about an action that affects or that was taken on a resource.
sourcepub fn finding_provider_fields(&self) -> Option<&FindingProviderFields>
pub fn finding_provider_fields(&self) -> Option<&FindingProviderFields>
In a BatchImportFindings
request, finding providers use FindingProviderFields
to provide and update their own values for confidence, criticality, related findings, severity, and types.
source§impl AwsSecurityFinding
impl AwsSecurityFinding
sourcepub fn builder() -> AwsSecurityFindingBuilder
pub fn builder() -> AwsSecurityFindingBuilder
Creates a new builder-style object to manufacture AwsSecurityFinding
.
Trait Implementations§
source§impl Clone for AwsSecurityFinding
impl Clone for AwsSecurityFinding
source§fn clone(&self) -> AwsSecurityFinding
fn clone(&self) -> AwsSecurityFinding
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moresource§impl Debug for AwsSecurityFinding
impl Debug for AwsSecurityFinding
source§impl PartialEq<AwsSecurityFinding> for AwsSecurityFinding
impl PartialEq<AwsSecurityFinding> for AwsSecurityFinding
source§fn eq(&self, other: &AwsSecurityFinding) -> bool
fn eq(&self, other: &AwsSecurityFinding) -> bool
self
and other
values to be equal, and is used
by ==
.