lib/aws-sdk-securityhub/client.rb in aws-sdk-securityhub-1.24.0 vs lib/aws-sdk-securityhub/client.rb in aws-sdk-securityhub-1.25.0
- old
+ new
@@ -491,10 +491,11 @@
# updated_at: "NonEmptyString", # required
# severity: { # required
# product: 1.0,
# label: "INFORMATIONAL", # accepts INFORMATIONAL, LOW, MEDIUM, HIGH, CRITICAL
# normalized: 1,
+ # original: "NonEmptyString",
# },
# confidence: 1,
# criticality: 1,
# title: "NonEmptyString", # required
# description: "NonEmptyString", # required
@@ -941,10 +942,16 @@
# },
# ],
# compliance: {
# status: "PASSED", # accepts PASSED, WARNING, FAILED, NOT_AVAILABLE
# related_requirements: ["NonEmptyString"],
+ # status_reasons: [
+ # {
+ # reason_code: "NonEmptyString", # required
+ # description: "NonEmptyString",
+ # },
+ # ],
# },
# verification_state: "UNKNOWN", # accepts UNKNOWN, TRUE_POSITIVE, FALSE_POSITIVE, BENIGN_POSITIVE
# workflow_state: "NEW", # accepts NEW, ASSIGNED, IN_PROGRESS, DEFERRED, RESOLVED
# workflow: {
# status: "NEW", # accepts NEW, NOTIFIED, RESOLVED, SUPPRESSED
@@ -1798,11 +1805,11 @@
# Security Hub, you must use the ` InviteMembers ` operation to invite
# the accounts to enable Security Hub and become member accounts in
# Security Hub.
#
# If the account owner accepts the invitation, the account becomes a
- # member account in Security Hub, and a permission policy is added that
+ # member account in Security Hub. A permissions policy is added that
# permits the master account to view the findings generated in the
# member account. When Security Hub is enabled in the invited account,
# findings start to be sent to both the member and master accounts.
#
# To remove the association between the master and member accounts, use
@@ -2333,12 +2340,12 @@
end
# Enables the integration of a partner product with Security Hub.
# Integrated products send findings to Security Hub.
#
- # When you enable a product integration, a permission policy that grants
- # permission for the product to send findings to Security Hub is
+ # When you enable a product integration, a permissions policy that
+ # grants permission for the product to send findings to Security Hub is
# applied.
#
# @option params [required, String] :product_arn
# The ARN of the product to enable the integration for.
#
@@ -2371,13 +2378,20 @@
# When you enable Security Hub, you grant to Security Hub the
# permissions necessary to gather findings from other services that are
# integrated with Security Hub.
#
# When you use the `EnableSecurityHub` operation to enable Security Hub,
- # you also automatically enable the CIS AWS Foundations standard. You do
- # not enable the Payment Card Industry Data Security Standard (PCI DSS)
- # standard. To not enable the CIS AWS Foundations standard, set
+ # you also automatically enable the following standards.
+ #
+ # * CIS AWS Foundations
+ #
+ # * AWS Foundational Security Best Practices
+ #
+ # You do not enable the Payment Card Industry Data Security Standard
+ # (PCI DSS) standard.
+ #
+ # To not enable the automatically enabled standards, set
# `EnableDefaultStandards` to `false`.
#
# After you enable Security Hub, to enable a standard, use the `
# BatchEnableStandards ` operation. To disable a standard, use the `
# BatchDisableStandards ` operation.
@@ -2388,11 +2402,11 @@
#
#
# [1]: https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-settingup.html
#
# @option params [Hash<String,String>] :tags
- # The tags to add to the Hub resource when you enable Security Hub.
+ # The tags to add to the hub resource when you enable Security Hub.
#
# @option params [Boolean] :enable_default_standards
# Whether to enable the security standards that Security Hub has
# designated as automatically enabled. If you do not provide a value for
# `EnableDefaultStandards`, it is set to `true`. To not enable the
@@ -3081,10 +3095,11 @@
# resp.findings[0].created_at #=> String
# resp.findings[0].updated_at #=> String
# resp.findings[0].severity.product #=> Float
# resp.findings[0].severity.label #=> String, one of "INFORMATIONAL", "LOW", "MEDIUM", "HIGH", "CRITICAL"
# resp.findings[0].severity.normalized #=> Integer
+ # resp.findings[0].severity.original #=> String
# resp.findings[0].confidence #=> Integer
# resp.findings[0].criticality #=> Integer
# resp.findings[0].title #=> String
# resp.findings[0].description #=> String
# resp.findings[0].remediation.recommendation.text #=> String
@@ -3372,10 +3387,13 @@
# resp.findings[0].resources[0].details.other #=> Hash
# resp.findings[0].resources[0].details.other["NonEmptyString"] #=> String
# resp.findings[0].compliance.status #=> String, one of "PASSED", "WARNING", "FAILED", "NOT_AVAILABLE"
# resp.findings[0].compliance.related_requirements #=> Array
# resp.findings[0].compliance.related_requirements[0] #=> String
+ # resp.findings[0].compliance.status_reasons #=> Array
+ # resp.findings[0].compliance.status_reasons[0].reason_code #=> String
+ # resp.findings[0].compliance.status_reasons[0].description #=> String
# resp.findings[0].verification_state #=> String, one of "UNKNOWN", "TRUE_POSITIVE", "FALSE_POSITIVE", "BENIGN_POSITIVE"
# resp.findings[0].workflow_state #=> String, one of "NEW", "ASSIGNED", "IN_PROGRESS", "DEFERRED", "RESOLVED"
# resp.findings[0].workflow.status #=> String, one of "NEW", "NOTIFIED", "RESOLVED", "SUPPRESSED"
# resp.findings[0].record_state #=> String, one of "ACTIVE", "ARCHIVED"
# resp.findings[0].related_findings #=> Array
@@ -5372,10 +5390,10 @@
operation: config.api.operation(operation_name),
client: self,
params: params,
config: config)
context[:gem_name] = 'aws-sdk-securityhub'
- context[:gem_version] = '1.24.0'
+ context[:gem_version] = '1.25.0'
Seahorse::Client::Request.new(handlers, context)
end
# @api private
# @deprecated