lib/google/apis/securitycenter_v1beta2/classes.rb in google-apis-securitycenter_v1beta2-0.41.0 vs lib/google/apis/securitycenter_v1beta2/classes.rb in google-apis-securitycenter_v1beta2-0.42.0
- old
+ new
@@ -309,15 +309,15 @@
@source_ip = args[:source_ip] if args.key?(:source_ip)
@source_port = args[:source_port] if args.key?(:source_port)
end
end
- # Representa a single contact's email address
+ # The email address of a contact.
class Contact
include Google::Apis::Core::Hashable
- # An email address e.g. "person123@company.com"
+ # An email address. For example, "`person123@company.com`".
# Corresponds to the JSON property `email`
# @return [String]
attr_accessor :email
def initialize(**args)
@@ -988,24 +988,25 @@
# Represents IAM bindings associated with the Finding.
# Corresponds to the JSON property `iamBindings`
# @return [Array<Google::Apis::SecuritycenterV1beta2::IamBinding>]
attr_accessor :iam_bindings
- # Represents what's commonly known as an Indicator of compromise (IoC) in
+ # Represents what's commonly known as an _indicator of compromise_ (IoC) in
# computer forensics. This is an artifact observed on a network or in an
# operating system that, with high confidence, indicates a computer intrusion.
- # Reference: https://en.wikipedia.org/wiki/Indicator_of_compromise
+ # For more information, see [Indicator of compromise](https://en.wikipedia.org/
+ # wiki/Indicator_of_compromise).
# Corresponds to the JSON property `indicator`
# @return [Google::Apis::SecuritycenterV1beta2::Indicator]
attr_accessor :indicator
# Kernel mode rootkit signatures.
# Corresponds to the JSON property `kernelRootkit`
# @return [Google::Apis::SecuritycenterV1beta2::KernelRootkit]
attr_accessor :kernel_rootkit
- # Kubernetes related attributes.
+ # Kubernetes-related attributes.
# Corresponds to the JSON property `kubernetes`
# @return [Google::Apis::SecuritycenterV1beta2::Kubernetes]
attr_accessor :kubernetes
# MITRE ATT&CK tactics and techniques related to this finding. See: https://
@@ -1197,11 +1198,11 @@
# Configures how to deliver Findings to BigQuery Instance.
class GoogleCloudSecuritycenterV1BigQueryExport
include Google::Apis::Core::Hashable
- # Output only. The time at which the big query export was created. This field is
+ # Output only. The time at which the BigQuery export was created. This field is
# set by the server and will be ignored if provided on export on creation.
# Corresponds to the JSON property `createTime`
# @return [String]
attr_accessor :create_time
@@ -1229,11 +1230,11 @@
# true` and `false` without quotes.
# Corresponds to the JSON property `filter`
# @return [String]
attr_accessor :filter
- # Output only. Email address of the user who last edited the big query export.
+ # Output only. Email address of the user who last edited the BigQuery export.
# This field is set by the server and will be ignored if provided on export
# creation or update.
# Corresponds to the JSON property `mostRecentEditor`
# @return [String]
attr_accessor :most_recent_editor
@@ -1246,19 +1247,19 @@
# ignored when provided in create requests.
# Corresponds to the JSON property `name`
# @return [String]
attr_accessor :name
- # Output only. The service account that needs permission to create table, upload
- # data to the big query dataset.
+ # Output only. The service account that needs permission to create table and
+ # upload data to the BigQuery dataset.
# Corresponds to the JSON property `principal`
# @return [String]
attr_accessor :principal
- # Output only. The most recent time at which the big export was updated. This
- # field is set by the server and will be ignored if provided on export creation
- # or update.
+ # Output only. The most recent time at which the BigQuery export was updated.
+ # This field is set by the server and will be ignored if provided on export
+ # creation or update.
# Corresponds to the JSON property `updateTime`
# @return [String]
attr_accessor :update_time
def initialize(**args)
@@ -1295,12 +1296,12 @@
# Kubernetes Role or ClusterRole.
# Corresponds to the JSON property `role`
# @return [Google::Apis::SecuritycenterV1beta2::Role]
attr_accessor :role
- # Represents the subjects(s) bound to the role. Not always available for PATCH
- # requests.
+ # Represents one or more subjects that are bound to the role. Not always
+ # available for PATCH requests.
# Corresponds to the JSON property `subjects`
# @return [Array<Google::Apis::SecuritycenterV1beta2::Subject>]
attr_accessor :subjects
def initialize(**args)
@@ -1437,14 +1438,14 @@
# Identifier that's used to track the given finding in the external system.
# Corresponds to the JSON property `externalUid`
# @return [String]
attr_accessor :external_uid
- # External System Name e.g. jira, demisto, etc. e.g.: `organizations/1234/
- # sources/5678/findings/123456/externalSystems/jira` `folders/1234/sources/5678/
- # findings/123456/externalSystems/jira` `projects/1234/sources/5678/findings/
- # 123456/externalSystems/jira`
+ # Full resource name of the external system, for example: "organizations/1234/
+ # sources/5678/findings/123456/externalSystems/jira", "folders/1234/sources/5678/
+ # findings/123456/externalSystems/jira", "projects/1234/sources/5678/findings/
+ # 123456/externalSystems/jira"
# Corresponds to the JSON property `name`
# @return [String]
attr_accessor :name
# Most recent status of the corresponding finding's ticket/tracker in the
@@ -2071,23 +2072,24 @@
@member = args[:member] if args.key?(:member)
@role = args[:role] if args.key?(:role)
end
end
- # Represents what's commonly known as an Indicator of compromise (IoC) in
+ # Represents what's commonly known as an _indicator of compromise_ (IoC) in
# computer forensics. This is an artifact observed on a network or in an
# operating system that, with high confidence, indicates a computer intrusion.
- # Reference: https://en.wikipedia.org/wiki/Indicator_of_compromise
+ # For more information, see [Indicator of compromise](https://en.wikipedia.org/
+ # wiki/Indicator_of_compromise).
class Indicator
include Google::Apis::Core::Hashable
# List of domains associated to the Finding.
# Corresponds to the JSON property `domains`
# @return [Array<String>]
attr_accessor :domains
- # List of ip addresses associated to the Finding.
+ # The list of IP addresses that are associated with the finding.
# Corresponds to the JSON property `ipAddresses`
# @return [Array<String>]
attr_accessor :ip_addresses
# The list of matched signatures indicating that the given process is present in
@@ -2121,59 +2123,59 @@
# Rootkit name when available.
# Corresponds to the JSON property `name`
# @return [String]
attr_accessor :name
- # Flag indicating unexpected modifications of kernel code memory.
+ # True when unexpected modifications of kernel code memory are present.
# Corresponds to the JSON property `unexpectedCodeModification`
# @return [Boolean]
attr_accessor :unexpected_code_modification
alias_method :unexpected_code_modification?, :unexpected_code_modification
- # Flag indicating presence of ftrace points with callbacks pointing to regions
- # that are not in the expected kernel or module code range.
+ # True when `ftrace` points are present with callbacks pointing to regions that
+ # are not in the expected kernel or module code range.
# Corresponds to the JSON property `unexpectedFtraceHandler`
# @return [Boolean]
attr_accessor :unexpected_ftrace_handler
alias_method :unexpected_ftrace_handler?, :unexpected_ftrace_handler
- # Flag indicating presence of interrupt handlers that are are not in the
- # expected kernel, module code regions.
+ # True when interrupt handlers that are are not in the expected kernel or module
+ # code regions are present.
# Corresponds to the JSON property `unexpectedInterruptHandler`
# @return [Boolean]
attr_accessor :unexpected_interrupt_handler
alias_method :unexpected_interrupt_handler?, :unexpected_interrupt_handler
- # Flag indicating presence of kernel code pages that are not in the expected
- # kernel, module code regions.
+ # True when kernel code pages that are not in the expected kernel or module code
+ # regions are present.
# Corresponds to the JSON property `unexpectedKernelCodePages`
# @return [Boolean]
attr_accessor :unexpected_kernel_code_pages
alias_method :unexpected_kernel_code_pages?, :unexpected_kernel_code_pages
- # Flag indicating presence of kprobe points with callbacks pointing to regions
- # that are not in the expected kernel or module code range.
+ # True when `kprobe` points are present with callbacks pointing to regions that
+ # are not in the expected kernel or module code range.
# Corresponds to the JSON property `unexpectedKprobeHandler`
# @return [Boolean]
attr_accessor :unexpected_kprobe_handler
alias_method :unexpected_kprobe_handler?, :unexpected_kprobe_handler
- # Flag indicating unexpected process(es) in the scheduler run-queue, those that
- # are in the run-queue, but not in the process task-list.
+ # True when unexpected processes in the scheduler run queue are present. Such
+ # processes are in the run queue, but not in the process task list.
# Corresponds to the JSON property `unexpectedProcessesInRunqueue`
# @return [Boolean]
attr_accessor :unexpected_processes_in_runqueue
alias_method :unexpected_processes_in_runqueue?, :unexpected_processes_in_runqueue
- # Flag indicating unexpected modifications of kernel read-only data memory.
+ # True when unexpected modifications of kernel read-only data memory are present.
# Corresponds to the JSON property `unexpectedReadOnlyDataModification`
# @return [Boolean]
attr_accessor :unexpected_read_only_data_modification
alias_method :unexpected_read_only_data_modification?, :unexpected_read_only_data_modification
- # Flag indicating presence of system call handlers that are are not in the
- # expected kernel, module code regions.
+ # True when system call handlers that are are not in the expected kernel or
+ # module code regions are present.
# Corresponds to the JSON property `unexpectedSystemCallHandler`
# @return [Boolean]
attr_accessor :unexpected_system_call_handler
alias_method :unexpected_system_call_handler?, :unexpected_system_call_handler
@@ -2193,10 +2195,10 @@
@unexpected_read_only_data_modification = args[:unexpected_read_only_data_modification] if args.key?(:unexpected_read_only_data_modification)
@unexpected_system_call_handler = args[:unexpected_system_call_handler] if args.key?(:unexpected_system_call_handler)
end
end
- # Kubernetes related attributes.
+ # Kubernetes-related attributes.
class Kubernetes
include Google::Apis::Core::Hashable
# Provides information on any Kubernetes access reviews (i.e. privilege checks)
# relevant to the finding.