Expand description
Security monitoring and threat detection configuration.
Structs§
- Audit
Config - Audit configuration
- Cloud
Security Monitoring Config - Security monitoring configuration
- Communication
Plan - Communication plan
- Compliance
Monitoring Config - Compliance monitoring configuration
- Compliance
Reporting Config - Compliance reporting configuration
- Escalation
Contact - Escalation contact
- Feed
Auth Config - Feed authentication configuration
- Feed
Integration Config - Feed integration configuration
- Incident
Response Config - Incident response configuration
- Response
Playbook - Response playbook
- Response
Step - Response step
- Stakeholder
Group - Stakeholder group
- Threat
Detection Config - Threat detection configuration
- Threat
Escalation Level - Threat escalation level
- Threat
Escalation Rules - Threat escalation rules
- Threat
Intelligence Config - Threat intelligence configuration
- Threat
Response Policy - Threat response policy
Enums§
- Audit
Event - Audit events
- Auth
Type - Authentication types
- Compliance
Framework - Compliance frameworks
- Escalation
Trigger - Escalation triggers
- Intelligence
Source - Intelligence sources
- Report
Type - Report types
- Response
Action Type - Response action types
- Security
Event - Security events
- Threat
Detection Method - Threat detection methods
- Threat
Response Action - Threat response actions
- Threat
Type - Threat types