lib/aws-sdk-securityhub/client.rb in aws-sdk-securityhub-1.24.0 vs lib/aws-sdk-securityhub/client.rb in aws-sdk-securityhub-1.25.0

- old
+ new

@@ -491,10 +491,11 @@ # updated_at: "NonEmptyString", # required # severity: { # required # product: 1.0, # label: "INFORMATIONAL", # accepts INFORMATIONAL, LOW, MEDIUM, HIGH, CRITICAL # normalized: 1, + # original: "NonEmptyString", # }, # confidence: 1, # criticality: 1, # title: "NonEmptyString", # required # description: "NonEmptyString", # required @@ -941,10 +942,16 @@ # }, # ], # compliance: { # status: "PASSED", # accepts PASSED, WARNING, FAILED, NOT_AVAILABLE # related_requirements: ["NonEmptyString"], + # status_reasons: [ + # { + # reason_code: "NonEmptyString", # required + # description: "NonEmptyString", + # }, + # ], # }, # verification_state: "UNKNOWN", # accepts UNKNOWN, TRUE_POSITIVE, FALSE_POSITIVE, BENIGN_POSITIVE # workflow_state: "NEW", # accepts NEW, ASSIGNED, IN_PROGRESS, DEFERRED, RESOLVED # workflow: { # status: "NEW", # accepts NEW, NOTIFIED, RESOLVED, SUPPRESSED @@ -1798,11 +1805,11 @@ # Security Hub, you must use the ` InviteMembers ` operation to invite # the accounts to enable Security Hub and become member accounts in # Security Hub. # # If the account owner accepts the invitation, the account becomes a - # member account in Security Hub, and a permission policy is added that + # member account in Security Hub. A permissions policy is added that # permits the master account to view the findings generated in the # member account. When Security Hub is enabled in the invited account, # findings start to be sent to both the member and master accounts. # # To remove the association between the master and member accounts, use @@ -2333,12 +2340,12 @@ end # Enables the integration of a partner product with Security Hub. # Integrated products send findings to Security Hub. # - # When you enable a product integration, a permission policy that grants - # permission for the product to send findings to Security Hub is + # When you enable a product integration, a permissions policy that + # grants permission for the product to send findings to Security Hub is # applied. # # @option params [required, String] :product_arn # The ARN of the product to enable the integration for. # @@ -2371,13 +2378,20 @@ # When you enable Security Hub, you grant to Security Hub the # permissions necessary to gather findings from other services that are # integrated with Security Hub. # # When you use the `EnableSecurityHub` operation to enable Security Hub, - # you also automatically enable the CIS AWS Foundations standard. You do - # not enable the Payment Card Industry Data Security Standard (PCI DSS) - # standard. To not enable the CIS AWS Foundations standard, set + # you also automatically enable the following standards. + # + # * CIS AWS Foundations + # + # * AWS Foundational Security Best Practices + # + # You do not enable the Payment Card Industry Data Security Standard + # (PCI DSS) standard. + # + # To not enable the automatically enabled standards, set # `EnableDefaultStandards` to `false`. # # After you enable Security Hub, to enable a standard, use the ` # BatchEnableStandards ` operation. To disable a standard, use the ` # BatchDisableStandards ` operation. @@ -2388,11 +2402,11 @@ # # # [1]: https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-settingup.html # # @option params [Hash<String,String>] :tags - # The tags to add to the Hub resource when you enable Security Hub. + # The tags to add to the hub resource when you enable Security Hub. # # @option params [Boolean] :enable_default_standards # Whether to enable the security standards that Security Hub has # designated as automatically enabled. If you do not provide a value for # `EnableDefaultStandards`, it is set to `true`. To not enable the @@ -3081,10 +3095,11 @@ # resp.findings[0].created_at #=> String # resp.findings[0].updated_at #=> String # resp.findings[0].severity.product #=> Float # resp.findings[0].severity.label #=> String, one of "INFORMATIONAL", "LOW", "MEDIUM", "HIGH", "CRITICAL" # resp.findings[0].severity.normalized #=> Integer + # resp.findings[0].severity.original #=> String # resp.findings[0].confidence #=> Integer # resp.findings[0].criticality #=> Integer # resp.findings[0].title #=> String # resp.findings[0].description #=> String # resp.findings[0].remediation.recommendation.text #=> String @@ -3372,10 +3387,13 @@ # resp.findings[0].resources[0].details.other #=> Hash # resp.findings[0].resources[0].details.other["NonEmptyString"] #=> String # resp.findings[0].compliance.status #=> String, one of "PASSED", "WARNING", "FAILED", "NOT_AVAILABLE" # resp.findings[0].compliance.related_requirements #=> Array # resp.findings[0].compliance.related_requirements[0] #=> String + # resp.findings[0].compliance.status_reasons #=> Array + # resp.findings[0].compliance.status_reasons[0].reason_code #=> String + # resp.findings[0].compliance.status_reasons[0].description #=> String # resp.findings[0].verification_state #=> String, one of "UNKNOWN", "TRUE_POSITIVE", "FALSE_POSITIVE", "BENIGN_POSITIVE" # resp.findings[0].workflow_state #=> String, one of "NEW", "ASSIGNED", "IN_PROGRESS", "DEFERRED", "RESOLVED" # resp.findings[0].workflow.status #=> String, one of "NEW", "NOTIFIED", "RESOLVED", "SUPPRESSED" # resp.findings[0].record_state #=> String, one of "ACTIVE", "ARCHIVED" # resp.findings[0].related_findings #=> Array @@ -5372,10 +5390,10 @@ operation: config.api.operation(operation_name), client: self, params: params, config: config) context[:gem_name] = 'aws-sdk-securityhub' - context[:gem_version] = '1.24.0' + context[:gem_version] = '1.25.0' Seahorse::Client::Request.new(handlers, context) end # @api private # @deprecated