Module model

Module model 

Source
Expand description

The messages and enums that are part of this client library.

Modules§

ai_model
Defines additional types related to AiModel.
attack_exposure
Defines additional types related to AttackExposure.
attack_path
Defines additional types related to AttackPath.
aws_metadata
Defines additional types related to AwsMetadata.
azure_metadata
Defines additional types related to AzureMetadata.
bulk_mute_findings_request
Defines additional types related to BulkMuteFindingsRequest.
cloud_dlp_data_profile
Defines additional types related to CloudDlpDataProfile.
connection
Defines additional types related to Connection.
cve
Defines additional types related to Cve.
cvssv_3
Defines additional types related to Cvssv3.
data_access_event
Defines additional types related to DataAccessEvent.
data_flow_event
Defines additional types related to DataFlowEvent.
data_retention_deletion_event
Defines additional types related to DataRetentionDeletionEvent.
export_findings_metadata
Defines additional types related to ExportFindingsMetadata.
external_system
Defines additional types related to ExternalSystem.
file
Defines additional types related to File.
finding
Defines additional types related to Finding.
group_membership
Defines additional types related to GroupMembership.
iam_binding
Defines additional types related to IamBinding.
indicator
Defines additional types related to Indicator.
ip_rule
Defines additional types related to IpRule.
ip_rules
Defines additional types related to IpRules.
kubernetes
Defines additional types related to Kubernetes.
list_findings_response
Defines additional types related to ListFindingsResponse.
log_entry
Defines additional types related to LogEntry.
mitre_attack
Defines additional types related to MitreAttack.
mute_config
Defines additional types related to MuteConfig.
notification_config
Defines additional types related to NotificationConfig.
notification_message
Defines additional types related to NotificationMessage.
resource
Defines additional types related to Resource.
resource_path
Defines additional types related to ResourcePath.
resource_value_config
Defines additional types related to ResourceValueConfig.
security_posture
Defines additional types related to SecurityPosture.
valued_resource
Defines additional types related to ValuedResource.
vertex_ai
Defines additional types related to VertexAi.

Structs§

Access
Represents an access event.
AdaptiveProtection
Information about Google Cloud Armor Adaptive Protection.
AffectedResources
Details about resources affected by this finding.
AiModel
Contains information about the AI model associated with the finding.
Allowed
Allowed IP rule.
Application
Represents an application associated with a finding.
Attack
Information about DDoS attack volume and classification.
AttackExposure
An attack exposure contains the results of an attack path simulation run.
AttackPath
A path that an attacker could take to reach an exposed resource.
AwsMetadata
AWS metadata associated with the resource, only applicable if the finding’s cloud provider is Amazon Web Services.
AzureMetadata
Azure metadata associated with the resource, only applicable if the finding’s cloud provider is Microsoft Azure.
BackupDisasterRecovery
Information related to Google Cloud Backup and DR Service findings.
BatchCreateResourceValueConfigsRequest
Request message to create multiple resource value configs
BatchCreateResourceValueConfigsResponse
Response message for BatchCreateResourceValueConfigs
BigQueryDestination
The destination big query dataset to export findings to.
BigQueryExport
Configures how to deliver Findings to BigQuery Instance.
BulkMuteFindingsRequest
Request message for bulk findings update.
BulkMuteFindingsResponse
The response to a BulkMute request. Contains the LRO information.
Chokepoint
Contains details about a chokepoint, which is a resource or resource group where high-risk attack paths converge, based on [attack path simulations] (https://cloud.google.com/security-command-center/docs/attack-exposure-learn#attack_path_simulations).
CloudArmor
Fields related to Google Cloud Armor findings.
CloudDlpDataProfile
The data profile associated with the finding.
CloudDlpInspection
Details about the Cloud Data Loss Prevention (Cloud DLP) inspection job that produced the finding.
CloudLoggingEntry
Metadata taken from a Cloud Logging LogEntry
Compliance
Contains compliance information about a security standard indicating unmet recommendations.
Connection
Contains information about the IP connection associated with the finding.
Contact
The email address of a contact.
ContactDetails
Details about specific contacts
Container
Container associated with the finding.
CreateBigQueryExportRequest
Request message for creating a BigQuery export.
CreateFindingRequest
Request message for creating a finding.
CreateMuteConfigRequest
Request message for creating a mute config.
CreateNotificationConfigRequest
Request message for creating a notification config.
CreateResourceValueConfigRequest
Request message to create single resource value config
CreateSourceRequest
Request message for creating a source.
Cve
CVE stands for Common Vulnerabilities and Exposures. Information from the CVE record that describes this vulnerability.
Cvssv3
Common Vulnerability Scoring System version 3.
Cwe
CWE stands for Common Weakness Enumeration. Information about this weakness, as described by CWE.
DataAccessEvent
Details about a data access attempt made by a principal not authorized under applicable data security policy.
DataFlowEvent
Details about a data flow event, in which either the data is moved to or is accessed from a non-compliant geo-location, as defined in the applicable data security policy.
DataRetentionDeletionEvent
Details about data retention deletion violations, in which the data is non-compliant based on their retention or deletion time, as defined in the applicable data security policy. The Data Retention Deletion (DRD) control is a control of the DSPM (Data Security Posture Management) suite that enables organizations to manage data retention and deletion policies in compliance with regulations, such as GDPR and CRPA. DRD supports two primary policy types: maximum storage length (max TTL) and minimum storage length (min TTL). Both are aimed at helping organizations meet regulatory and data management commitments.
Database
Represents database access information, such as queries. A database may be a sub-resource of an instance (as in the case of Cloud SQL instances or Cloud Spanner instances), or the database instance itself. Some database resources might not have the full resource name populated because these resource types, such as Cloud SQL databases, are not yet supported by Cloud Asset Inventory. In these cases only the display name is provided.
DeleteBigQueryExportRequest
Request message for deleting a BigQuery export.
DeleteMuteConfigRequest
Request message for deleting a mute config. If no location is specified, default is global.
DeleteNotificationConfigRequest
Request message for deleting a notification config.
DeleteResourceValueConfigRequest
Request message to delete resource value config
Denied
Denied IP rule.
Disk
Contains information about the disk associated with the finding.
EnvironmentVariable
A name-value pair representing an environment variable used in an operating system process.
ExfilResource
Resource where data was exfiltrated from or exfiltrated to.
Exfiltration
Exfiltration represents a data exfiltration attempt from one or more sources to one or more targets. The sources attribute lists the sources of the exfiltrated data. The targets attribute lists the destinations the data was copied to.
ExportFindingsMetadata
The LRO metadata for a ExportFindings request.
ExportFindingsResponse
The response to a ExportFindings request. Contains the LRO information.
ExternalSystem
Representation of third party SIEM/SOAR fields within SCC.
File
File information about the related binary/library used by an executable, or the script used by a script interpreter
Finding
Security Command Center finding.
Folder
Message that contains the resource name and display name of a folder resource.
GcpMetadata
Google Cloud metadata associated with the resource. Only applicable if the finding’s cloud provider is Google Cloud.
Geolocation
Represents a geographical location for a given access.
GetBigQueryExportRequest
Request message for retrieving a BigQuery export.
GetMuteConfigRequest
Request message for retrieving a mute config. If no location is specified, default is global.
GetNotificationConfigRequest
Request message for getting a notification config.
GetResourceValueConfigRequest
Request message to get resource value config
GetSimulationRequest
Request message for getting simulation. Simulation name can include “latest” to retrieve the latest simulation For example, “organizations/123/simulations/latest”
GetSourceRequest
Request message for getting a source.
GetValuedResourceRequest
Request message for getting a valued resource.
GroupFindingsRequest
Request message for grouping by findings.
GroupFindingsResponse
Response message for group by findings.
GroupMembership
Contains details about groups of which this finding is a member. A group is a collection of findings that are related in some way.
GroupResult
Result containing the properties and count of a groupBy request.
IamBinding
Represents a particular IAM binding, which captures a member’s role addition, removal, or state.
Indicator
Represents what’s commonly known as an indicator of compromise (IoC) in computer forensics. This is an artifact observed on a network or in an operating system that, with high confidence, indicates a computer intrusion. For more information, see Indicator of compromise.
IpRule
IP rule information.
IpRules
IP rules associated with the finding.
Job
Describes a job
KernelRootkit
Kernel mode rootkit signatures.
Kubernetes
Kubernetes-related attributes.
Label
Represents a generic name-value label. A label has separate name and value fields to support filtering with the contains() function. For more information, see Filtering on array-type fields.
ListAttackPathsRequest
Request message for listing the attack paths for a given simulation or valued resource.
ListAttackPathsResponse
Response message for listing the attack paths for a given simulation or valued resource.
ListBigQueryExportsRequest
Request message for listing BigQuery exports at a given scope e.g. organization, folder or project.
ListBigQueryExportsResponse
Response message for listing BigQuery exports.
ListFindingsRequest
Request message for listing findings.
ListFindingsResponse
Response message for listing findings.
ListMuteConfigsRequest
Request message for listing mute configs at a given scope e.g. organization, folder or project. If no location is specified, default is global.
ListMuteConfigsResponse
Response message for listing mute configs.
ListNotificationConfigsRequest
Request message for listing notification configs.
ListNotificationConfigsResponse
Response message for listing notification configs.
ListResourceValueConfigsRequest
Request message to list resource value configs of a parent
ListResourceValueConfigsResponse
Response message to list resource value configs
ListSourcesRequest
Request message for listing sources.
ListSourcesResponse
Response message for listing sources.
ListValuedResourcesRequest
Request message for listing the valued resources for a given simulation.
ListValuedResourcesResponse
Response message for listing the valued resources for a given simulation.
LoadBalancer
Contains information related to the load balancer associated with the finding.
LogEntry
An individual entry in a log.
MitreAttack
MITRE ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org
MuteConfig
A mute config is a Cloud SCC resource that contains the configuration to mute create/update events of findings.
Network
Contains information about a VPC network associated with the finding.
Notebook
Represents a Jupyter notebook IPYNB file, such as a Colab Enterprise notebook file, that is associated with a finding.
NotificationConfig
Cloud Security Command Center (Cloud SCC) notification configs.
NotificationMessage
Cloud SCC’s Notification
OrgPolicy
Contains information about the org policies associated with the finding.
Package
Package is a generic definition of a package.
Process
Represents an operating system process.
Reference
Additional Links
Requests
Information about the requests relevant to the finding.
Resource
Information related to the Google Cloud resource.
ResourcePath
Represents the path of resources leading up to the resource this finding is about.
ResourceValueConfig
A resource value configuration (RVC) is a mapping configuration of user’s resources to resource values. Used in Attack path simulations.
ResourceValueConfigMetadata
Metadata about a ResourceValueConfig. For example, id and name.
SecurityBulletin
SecurityBulletin are notifications of vulnerabilities of Google products.
SecurityMarks
User specified security marks that are attached to the parent Security Command Center resource. Security marks are scoped within a Security Command Center organization – they can be modified and viewed by all users who have proper permissions on the organization.
SecurityPolicy
Information about the Google Cloud Armor security policy relevant to the finding.
SecurityPosture
Represents a posture that is deployed on Google Cloud by the Security Command Center Posture Management service. A posture contains one or more policy sets. A policy set is a group of policies that enforce a set of security rules on Google Cloud.
ServiceAccountDelegationInfo
Identity delegation history of an authenticated service account.
SetFindingStateRequest
Request message for updating a finding’s state.
SetMuteRequest
Request message for updating a finding’s mute status.
Simulation
Attack path simulation
Source
Security Command Center finding source. A finding source is an entity or a mechanism that can produce a finding. A source is like a container of findings that come from the same scanner, logger, monitor, and other tools.
ToxicCombination
Contains details about a group of security issues that, when the issues occur together, represent a greater risk than when the issues occur independently. A group of such issues is referred to as a toxic combination.
UpdateBigQueryExportRequest
Request message for updating a BigQuery export.
UpdateExternalSystemRequest
Request message for updating a ExternalSystem resource.
UpdateFindingRequest
Request message for updating or creating a finding.
UpdateMuteConfigRequest
Request message for updating a mute config.
UpdateNotificationConfigRequest
Request message for updating a notification config.
UpdateResourceValueConfigRequest
Request message to update resource value config
UpdateSecurityMarksRequest
Request message for updating a SecurityMarks resource.
UpdateSourceRequest
Request message for updating a source.
ValuedResource
A resource that is determined to have value to a user’s system
VertexAi
Vertex AI-related information associated with the finding.
Vulnerability
Refers to common vulnerability fields e.g. cve, cvss, cwe etc.

Enums§

CloudProvider
The cloud provider the finding pertains to.
JobState
JobState represents the state of the job.
ResourceValue
Value enum to map to a resource