Struct aws_sdk_securityhub::model::AwsSecurityFinding
source · [−]#[non_exhaustive]pub struct AwsSecurityFinding {Show 40 fields
pub schema_version: Option<String>,
pub id: Option<String>,
pub product_arn: Option<String>,
pub product_name: Option<String>,
pub company_name: Option<String>,
pub region: Option<String>,
pub generator_id: Option<String>,
pub aws_account_id: Option<String>,
pub types: Option<Vec<String>>,
pub first_observed_at: Option<String>,
pub last_observed_at: Option<String>,
pub created_at: Option<String>,
pub updated_at: Option<String>,
pub severity: Option<Severity>,
pub confidence: i32,
pub criticality: i32,
pub title: Option<String>,
pub description: Option<String>,
pub remediation: Option<Remediation>,
pub source_url: Option<String>,
pub product_fields: Option<HashMap<String, String>>,
pub user_defined_fields: Option<HashMap<String, String>>,
pub malware: Option<Vec<Malware>>,
pub network: Option<Network>,
pub network_path: Option<Vec<NetworkPathComponent>>,
pub process: Option<ProcessDetails>,
pub threat_intel_indicators: Option<Vec<ThreatIntelIndicator>>,
pub resources: Option<Vec<Resource>>,
pub compliance: Option<Compliance>,
pub verification_state: Option<VerificationState>,
pub workflow_state: Option<WorkflowState>,
pub workflow: Option<Workflow>,
pub record_state: Option<RecordState>,
pub related_findings: Option<Vec<RelatedFinding>>,
pub note: Option<Note>,
pub vulnerabilities: Option<Vec<Vulnerability>>,
pub patch_summary: Option<PatchSummary>,
pub action: Option<Action>,
pub finding_provider_fields: Option<FindingProviderFields>,
pub sample: bool,
}
Expand description
Provides consistent format for the contents of the Security Hub-aggregated findings. AwsSecurityFinding
format enables you to share findings between Amazon Web Services security services and third-party solutions, and security standards checks.
A finding is a potential security issue generated either by Amazon Web Services services or by the integrated third-party solutions and standards checks.
Fields (Non-exhaustive)
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.schema_version: Option<String>
The schema version that a finding is formatted for.
id: Option<String>
The security findings provider-specific identifier for a finding.
product_arn: Option<String>
The ARN generated by Security Hub that uniquely identifies a product that generates findings. This can be the ARN for a third-party product that is integrated with Security Hub, or the ARN for a custom integration.
product_name: Option<String>
The name of the product that generated the finding.
Security Hub populates this attribute automatically for each finding. You cannot update it using BatchImportFindings
or BatchUpdateFindings
. The exception to this is when you use a custom integration.
When you use the Security Hub console to filter findings by product name, you use this attribute.
When you use the Security Hub API to filter findings by product name, you use the aws/securityhub/ProductName
attribute under ProductFields
.
Security Hub does not synchronize those two attributes.
company_name: Option<String>
The name of the company for the product that generated the finding.
Security Hub populates this attribute automatically for each finding. You cannot be updated using BatchImportFindings
or BatchUpdateFindings
. The exception to this is when you use a custom integration.
When you use the Security Hub console to filter findings by company name, you use this attribute.
When you use the Security Hub API to filter findings by company name, you use the aws/securityhub/CompanyName
attribute under ProductFields
.
Security Hub does not synchronize those two attributes.
region: Option<String>
The Region from which the finding was generated.
Security Hub populates this attribute automatically for each finding. You cannot update it using BatchImportFindings
or BatchUpdateFindings
.
generator_id: Option<String>
The identifier for the solution-specific component (a discrete unit of logic) that generated a finding. In various security-findings providers' solutions, this generator can be called a rule, a check, a detector, a plugin, etc.
aws_account_id: Option<String>
The Amazon Web Services account ID that a finding is generated in.
types: Option<Vec<String>>
One or more finding types in the format of namespace/category/classifier
that classify a finding.
Valid namespace values are: Software and Configuration Checks | TTPs | Effects | Unusual Behaviors | Sensitive Data Identifications
first_observed_at: Option<String>
Indicates when the security-findings provider first observed the potential security issue that a finding captured.
Uses the date-time
format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z
.
last_observed_at: Option<String>
Indicates when the security-findings provider most recently observed the potential security issue that a finding captured.
Uses the date-time
format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z
.
created_at: Option<String>
Indicates when the security-findings provider created the potential security issue that a finding captured.
Uses the date-time
format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z
.
updated_at: Option<String>
Indicates when the security-findings provider last updated the finding record.
Uses the date-time
format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z
.
severity: Option<Severity>
A finding's severity.
confidence: i32
A finding's confidence. Confidence is defined as the likelihood that a finding accurately identifies the behavior or issue that it was intended to identify.
Confidence is scored on a 0-100 basis using a ratio scale, where 0 means zero percent confidence and 100 means 100 percent confidence.
criticality: i32
The level of importance assigned to the resources associated with the finding.
A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources.
title: Option<String>
A finding's title.
In this release, Title
is a required property.
description: Option<String>
A finding's description.
In this release, Description
is a required property.
remediation: Option<Remediation>
A data type that describes the remediation options for a finding.
source_url: Option<String>
A URL that links to a page about the current finding in the security-findings provider's solution.
product_fields: Option<HashMap<String, String>>
A data type where security-findings providers can include additional solution-specific details that aren't part of the defined AwsSecurityFinding
format.
Can contain up to 50 key-value pairs. For each key-value pair, the key can contain up to 128 characters, and the value can contain up to 2048 characters.
user_defined_fields: Option<HashMap<String, String>>
A list of name/value string pairs associated with the finding. These are custom, user-defined fields added to a finding.
malware: Option<Vec<Malware>>
A list of malware related to a finding.
network: Option<Network>
The details of network-related information about a finding.
network_path: Option<Vec<NetworkPathComponent>>
Provides information about a network path that is relevant to a finding. Each entry under NetworkPath
represents a component of that path.
process: Option<ProcessDetails>
The details of process-related information about a finding.
threat_intel_indicators: Option<Vec<ThreatIntelIndicator>>
Threat intelligence details related to a finding.
resources: Option<Vec<Resource>>
A set of resource data types that describe the resources that the finding refers to.
compliance: Option<Compliance>
This data type is exclusive to findings that are generated as the result of a check run against a specific rule in a supported security standard, such as CIS Amazon Web Services Foundations. Contains security standard-related finding details.
verification_state: Option<VerificationState>
Indicates the veracity of a finding.
workflow_state: Option<WorkflowState>
The workflow state of a finding.
workflow: Option<Workflow>
Provides information about the status of the investigation into a finding.
record_state: Option<RecordState>
The record state of a finding.
A list of related findings.
note: Option<Note>
A user-defined note added to a finding.
vulnerabilities: Option<Vec<Vulnerability>>
Provides a list of vulnerabilities associated with the findings.
patch_summary: Option<PatchSummary>
Provides an overview of the patch compliance status for an instance against a selected compliance standard.
action: Option<Action>
Provides details about an action that affects or that was taken on a resource.
finding_provider_fields: Option<FindingProviderFields>
In a BatchImportFindings
request, finding providers use FindingProviderFields
to provide and update their own values for confidence, criticality, related findings, severity, and types.
sample: bool
Indicates whether the finding is a sample finding.
Implementations
sourceimpl AwsSecurityFinding
impl AwsSecurityFinding
sourcepub fn schema_version(&self) -> Option<&str>
pub fn schema_version(&self) -> Option<&str>
The schema version that a finding is formatted for.
sourcepub fn id(&self) -> Option<&str>
pub fn id(&self) -> Option<&str>
The security findings provider-specific identifier for a finding.
sourcepub fn product_arn(&self) -> Option<&str>
pub fn product_arn(&self) -> Option<&str>
The ARN generated by Security Hub that uniquely identifies a product that generates findings. This can be the ARN for a third-party product that is integrated with Security Hub, or the ARN for a custom integration.
sourcepub fn product_name(&self) -> Option<&str>
pub fn product_name(&self) -> Option<&str>
The name of the product that generated the finding.
Security Hub populates this attribute automatically for each finding. You cannot update it using BatchImportFindings
or BatchUpdateFindings
. The exception to this is when you use a custom integration.
When you use the Security Hub console to filter findings by product name, you use this attribute.
When you use the Security Hub API to filter findings by product name, you use the aws/securityhub/ProductName
attribute under ProductFields
.
Security Hub does not synchronize those two attributes.
sourcepub fn company_name(&self) -> Option<&str>
pub fn company_name(&self) -> Option<&str>
The name of the company for the product that generated the finding.
Security Hub populates this attribute automatically for each finding. You cannot be updated using BatchImportFindings
or BatchUpdateFindings
. The exception to this is when you use a custom integration.
When you use the Security Hub console to filter findings by company name, you use this attribute.
When you use the Security Hub API to filter findings by company name, you use the aws/securityhub/CompanyName
attribute under ProductFields
.
Security Hub does not synchronize those two attributes.
sourcepub fn region(&self) -> Option<&str>
pub fn region(&self) -> Option<&str>
The Region from which the finding was generated.
Security Hub populates this attribute automatically for each finding. You cannot update it using BatchImportFindings
or BatchUpdateFindings
.
sourcepub fn generator_id(&self) -> Option<&str>
pub fn generator_id(&self) -> Option<&str>
The identifier for the solution-specific component (a discrete unit of logic) that generated a finding. In various security-findings providers' solutions, this generator can be called a rule, a check, a detector, a plugin, etc.
sourcepub fn aws_account_id(&self) -> Option<&str>
pub fn aws_account_id(&self) -> Option<&str>
The Amazon Web Services account ID that a finding is generated in.
sourcepub fn types(&self) -> Option<&[String]>
pub fn types(&self) -> Option<&[String]>
One or more finding types in the format of namespace/category/classifier
that classify a finding.
Valid namespace values are: Software and Configuration Checks | TTPs | Effects | Unusual Behaviors | Sensitive Data Identifications
sourcepub fn first_observed_at(&self) -> Option<&str>
pub fn first_observed_at(&self) -> Option<&str>
Indicates when the security-findings provider first observed the potential security issue that a finding captured.
Uses the date-time
format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z
.
sourcepub fn last_observed_at(&self) -> Option<&str>
pub fn last_observed_at(&self) -> Option<&str>
Indicates when the security-findings provider most recently observed the potential security issue that a finding captured.
Uses the date-time
format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z
.
sourcepub fn created_at(&self) -> Option<&str>
pub fn created_at(&self) -> Option<&str>
Indicates when the security-findings provider created the potential security issue that a finding captured.
Uses the date-time
format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z
.
sourcepub fn updated_at(&self) -> Option<&str>
pub fn updated_at(&self) -> Option<&str>
Indicates when the security-findings provider last updated the finding record.
Uses the date-time
format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z
.
sourcepub fn confidence(&self) -> i32
pub fn confidence(&self) -> i32
A finding's confidence. Confidence is defined as the likelihood that a finding accurately identifies the behavior or issue that it was intended to identify.
Confidence is scored on a 0-100 basis using a ratio scale, where 0 means zero percent confidence and 100 means 100 percent confidence.
sourcepub fn criticality(&self) -> i32
pub fn criticality(&self) -> i32
The level of importance assigned to the resources associated with the finding.
A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources.
sourcepub fn title(&self) -> Option<&str>
pub fn title(&self) -> Option<&str>
A finding's title.
In this release, Title
is a required property.
sourcepub fn description(&self) -> Option<&str>
pub fn description(&self) -> Option<&str>
A finding's description.
In this release, Description
is a required property.
sourcepub fn remediation(&self) -> Option<&Remediation>
pub fn remediation(&self) -> Option<&Remediation>
A data type that describes the remediation options for a finding.
sourcepub fn source_url(&self) -> Option<&str>
pub fn source_url(&self) -> Option<&str>
A URL that links to a page about the current finding in the security-findings provider's solution.
sourcepub fn product_fields(&self) -> Option<&HashMap<String, String>>
pub fn product_fields(&self) -> Option<&HashMap<String, String>>
A data type where security-findings providers can include additional solution-specific details that aren't part of the defined AwsSecurityFinding
format.
Can contain up to 50 key-value pairs. For each key-value pair, the key can contain up to 128 characters, and the value can contain up to 2048 characters.
sourcepub fn user_defined_fields(&self) -> Option<&HashMap<String, String>>
pub fn user_defined_fields(&self) -> Option<&HashMap<String, String>>
A list of name/value string pairs associated with the finding. These are custom, user-defined fields added to a finding.
sourcepub fn network(&self) -> Option<&Network>
pub fn network(&self) -> Option<&Network>
The details of network-related information about a finding.
sourcepub fn network_path(&self) -> Option<&[NetworkPathComponent]>
pub fn network_path(&self) -> Option<&[NetworkPathComponent]>
Provides information about a network path that is relevant to a finding. Each entry under NetworkPath
represents a component of that path.
sourcepub fn process(&self) -> Option<&ProcessDetails>
pub fn process(&self) -> Option<&ProcessDetails>
The details of process-related information about a finding.
sourcepub fn threat_intel_indicators(&self) -> Option<&[ThreatIntelIndicator]>
pub fn threat_intel_indicators(&self) -> Option<&[ThreatIntelIndicator]>
Threat intelligence details related to a finding.
sourcepub fn resources(&self) -> Option<&[Resource]>
pub fn resources(&self) -> Option<&[Resource]>
A set of resource data types that describe the resources that the finding refers to.
sourcepub fn compliance(&self) -> Option<&Compliance>
pub fn compliance(&self) -> Option<&Compliance>
This data type is exclusive to findings that are generated as the result of a check run against a specific rule in a supported security standard, such as CIS Amazon Web Services Foundations. Contains security standard-related finding details.
sourcepub fn verification_state(&self) -> Option<&VerificationState>
pub fn verification_state(&self) -> Option<&VerificationState>
Indicates the veracity of a finding.
sourcepub fn workflow_state(&self) -> Option<&WorkflowState>
pub fn workflow_state(&self) -> Option<&WorkflowState>
The workflow state of a finding.
sourcepub fn workflow(&self) -> Option<&Workflow>
pub fn workflow(&self) -> Option<&Workflow>
Provides information about the status of the investigation into a finding.
sourcepub fn record_state(&self) -> Option<&RecordState>
pub fn record_state(&self) -> Option<&RecordState>
The record state of a finding.
A list of related findings.
sourcepub fn vulnerabilities(&self) -> Option<&[Vulnerability]>
pub fn vulnerabilities(&self) -> Option<&[Vulnerability]>
Provides a list of vulnerabilities associated with the findings.
sourcepub fn patch_summary(&self) -> Option<&PatchSummary>
pub fn patch_summary(&self) -> Option<&PatchSummary>
Provides an overview of the patch compliance status for an instance against a selected compliance standard.
sourcepub fn action(&self) -> Option<&Action>
pub fn action(&self) -> Option<&Action>
Provides details about an action that affects or that was taken on a resource.
sourcepub fn finding_provider_fields(&self) -> Option<&FindingProviderFields>
pub fn finding_provider_fields(&self) -> Option<&FindingProviderFields>
In a BatchImportFindings
request, finding providers use FindingProviderFields
to provide and update their own values for confidence, criticality, related findings, severity, and types.
sourceimpl AwsSecurityFinding
impl AwsSecurityFinding
sourcepub fn builder() -> Builder
pub fn builder() -> Builder
Creates a new builder-style object to manufacture AwsSecurityFinding
Trait Implementations
sourceimpl Clone for AwsSecurityFinding
impl Clone for AwsSecurityFinding
sourcefn clone(&self) -> AwsSecurityFinding
fn clone(&self) -> AwsSecurityFinding
Returns a copy of the value. Read more
1.0.0 · sourcefn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
Performs copy-assignment from source
. Read more
sourceimpl Debug for AwsSecurityFinding
impl Debug for AwsSecurityFinding
sourceimpl PartialEq<AwsSecurityFinding> for AwsSecurityFinding
impl PartialEq<AwsSecurityFinding> for AwsSecurityFinding
sourcefn eq(&self, other: &AwsSecurityFinding) -> bool
fn eq(&self, other: &AwsSecurityFinding) -> bool
This method tests for self
and other
values to be equal, and is used
by ==
. Read more
sourcefn ne(&self, other: &AwsSecurityFinding) -> bool
fn ne(&self, other: &AwsSecurityFinding) -> bool
This method tests for !=
.
impl StructuralPartialEq for AwsSecurityFinding
Auto Trait Implementations
impl RefUnwindSafe for AwsSecurityFinding
impl Send for AwsSecurityFinding
impl Sync for AwsSecurityFinding
impl Unpin for AwsSecurityFinding
impl UnwindSafe for AwsSecurityFinding
Blanket Implementations
sourceimpl<T> BorrowMut<T> for T where
T: ?Sized,
impl<T> BorrowMut<T> for T where
T: ?Sized,
const: unstable · sourcepub fn borrow_mut(&mut self) -> &mut T
pub fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more
sourceimpl<T> Instrument for T
impl<T> Instrument for T
sourcefn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
sourcefn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
sourceimpl<T> ToOwned for T where
T: Clone,
impl<T> ToOwned for T where
T: Clone,
type Owned = T
type Owned = T
The resulting type after obtaining ownership.
sourcepub fn to_owned(&self) -> T
pub fn to_owned(&self) -> T
Creates owned data from borrowed data, usually by cloning. Read more
sourcepub fn clone_into(&self, target: &mut T)
pub fn clone_into(&self, target: &mut T)
toowned_clone_into
)Uses borrowed data to replace owned data, usually by cloning. Read more
sourceimpl<T> WithSubscriber for T
impl<T> WithSubscriber for T
sourcefn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self> where
S: Into<Dispatch>,
fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self> where
S: Into<Dispatch>,
Attaches the provided Subscriber
to this type, returning a
WithDispatch
wrapper. Read more
sourcefn with_current_subscriber(self) -> WithDispatch<Self>
fn with_current_subscriber(self) -> WithDispatch<Self>
Attaches the current default Subscriber
to this type, returning a
WithDispatch
wrapper. Read more