|
3372 | 3372 | }
|
3373 | 3373 | }
|
3374 | 3374 | },
|
3375 |
| - "revision": "20230309", |
| 3375 | + "revision": "20230321", |
3376 | 3376 | "rootUrl": "https://securitycenter.googleapis.com/",
|
3377 | 3377 | "schemas": {
|
3378 | 3378 | "Access": {
|
|
3643 | 3643 | },
|
3644 | 3644 | "type": "object"
|
3645 | 3645 | },
|
| 3646 | + "CloudDlpDataProfile": { |
| 3647 | + "description": "The [data profile](https://cloud.google.com/dlp/docs/data-profiles) associated with the finding.", |
| 3648 | + "id": "CloudDlpDataProfile", |
| 3649 | + "properties": { |
| 3650 | + "dataProfile": { |
| 3651 | + "description": "Name of the data profile, for example, `projects/123/locations/europe/tableProfiles/8383929`.", |
| 3652 | + "type": "string" |
| 3653 | + } |
| 3654 | + }, |
| 3655 | + "type": "object" |
| 3656 | + }, |
| 3657 | + "CloudDlpInspection": { |
| 3658 | + "description": "Details about the Cloud Data Loss Prevention (Cloud DLP) [inspection job](https://cloud.google.com/dlp/docs/concepts-job-triggers) that produced the finding.", |
| 3659 | + "id": "CloudDlpInspection", |
| 3660 | + "properties": { |
| 3661 | + "fullScan": { |
| 3662 | + "description": "Whether Cloud DLP scanned the complete resource or a sampled subset.", |
| 3663 | + "type": "boolean" |
| 3664 | + }, |
| 3665 | + "infoType": { |
| 3666 | + "description": "The [type of information](https://cloud.google.com/dlp/docs/infotypes-reference) found, for example, `EMAIL_ADDRESS` or `STREET_ADDRESS`.", |
| 3667 | + "type": "string" |
| 3668 | + }, |
| 3669 | + "infoTypeCount": { |
| 3670 | + "description": "The number of times Cloud DLP found this infoType within this job and resource.", |
| 3671 | + "format": "int64", |
| 3672 | + "type": "string" |
| 3673 | + }, |
| 3674 | + "inspectJob": { |
| 3675 | + "description": "Name of the inspection job, for example, `projects/123/locations/europe/dlpJobs/i-8383929`.", |
| 3676 | + "type": "string" |
| 3677 | + } |
| 3678 | + }, |
| 3679 | + "type": "object" |
| 3680 | + }, |
3646 | 3681 | "Compliance": {
|
3647 | 3682 | "description": "Contains compliance information about a security standard indicating unmet recommendations.",
|
3648 | 3683 | "id": "Compliance",
|
|
4116 | 4151 | "description": "The additional taxonomy group within findings from a given source. This field is immutable after creation time. Example: \"XSS_FLASH_INJECTION\"",
|
4117 | 4152 | "type": "string"
|
4118 | 4153 | },
|
| 4154 | + "cloudDlpDataProfile": { |
| 4155 | + "$ref": "CloudDlpDataProfile", |
| 4156 | + "description": "Cloud DLP data profile associated with the finding." |
| 4157 | + }, |
| 4158 | + "cloudDlpInspection": { |
| 4159 | + "$ref": "CloudDlpInspection", |
| 4160 | + "description": "Cloud DLP inspection associated with the finding." |
| 4161 | + }, |
4119 | 4162 | "compliances": {
|
4120 | 4163 | "description": "Contains compliance information for security standards associated to the finding.",
|
4121 | 4164 | "items": {
|
|
4229 | 4272 | "$ref": "MitreAttack",
|
4230 | 4273 | "description": "MITRE ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org"
|
4231 | 4274 | },
|
| 4275 | + "moduleName": { |
| 4276 | + "description": "Unique identifier of the module which generated the finding. Example: folders/598186756061/securityHealthAnalyticsSettings/customModules/56799441161885", |
| 4277 | + "type": "string" |
| 4278 | + }, |
4232 | 4279 | "mute": {
|
4233 | 4280 | "description": "Indicates the mute state of a finding (either muted, unmuted or undefined). Unlike other attributes of a finding, a finding provider shouldn't set the value of mute.",
|
4234 | 4281 | "enum": [
|
|
4263 | 4310 | "description": "Next steps associate to the finding.",
|
4264 | 4311 | "type": "string"
|
4265 | 4312 | },
|
| 4313 | + "orgPolicyConstraints": { |
| 4314 | + "description": "Contains information about the org policy constraints associated with the finding.", |
| 4315 | + "items": { |
| 4316 | + "$ref": "OrgPolicyConstraint" |
| 4317 | + }, |
| 4318 | + "type": "array" |
| 4319 | + }, |
4266 | 4320 | "parent": {
|
4267 | 4321 | "description": "The relative resource name of the source the finding belongs to. See: https://cloud.google.com/apis/design/resource_names#relative_resource_name This field is immutable after creation time. For example: \"organizations/{organization_id}/sources/{source_id}\"",
|
4268 | 4322 | "type": "string"
|
|
4672 | 4726 | "description": "A resource value config is a mapping configuration of user's tag values to resource values. Used by the attack path simulation.",
|
4673 | 4727 | "id": "GoogleCloudSecuritycenterV1ResourceValueConfig",
|
4674 | 4728 | "properties": {
|
| 4729 | + "createTime": { |
| 4730 | + "description": "Output only. Timestamp this resource value config was created.", |
| 4731 | + "format": "google-datetime", |
| 4732 | + "readOnly": true, |
| 4733 | + "type": "string" |
| 4734 | + }, |
| 4735 | + "description": { |
| 4736 | + "description": "Description of the resource value config.", |
| 4737 | + "type": "string" |
| 4738 | + }, |
4675 | 4739 | "name": {
|
4676 | 4740 | "description": "Name for the resource value config",
|
4677 | 4741 | "type": "string"
|
4678 | 4742 | },
|
| 4743 | + "resourceLabelsSelector": { |
| 4744 | + "additionalProperties": { |
| 4745 | + "type": "string" |
| 4746 | + }, |
| 4747 | + "description": "List of resource labels to search for, evaluated with AND. E.g. \"resource_labels_selector\": {\"key\": \"value\", \"env\": \"prod\"} will match resources with labels \"key\": \"value\" AND \"env\": \"prod\" https://cloud.google.com/resource-manager/docs/creating-managing-labels", |
| 4748 | + "type": "object" |
| 4749 | + }, |
4679 | 4750 | "resourceType": {
|
4680 | 4751 | "description": "Apply resource_value only to resources that match resource_type. resource_type will be checked with \"AND\" of other resources. E.g. \"storage.googleapis.com/Bucket\" with resource_value \"HIGH\" will apply \"HIGH\" value only to \"storage.googleapis.com/Bucket\" resources.",
|
4681 | 4752 | "type": "string"
|
|
4708 | 4779 | "type": "string"
|
4709 | 4780 | },
|
4710 | 4781 | "type": "array"
|
| 4782 | + }, |
| 4783 | + "updateTime": { |
| 4784 | + "description": "Output only. Timestamp this resource value config was last updated.", |
| 4785 | + "format": "google-datetime", |
| 4786 | + "readOnly": true, |
| 4787 | + "type": "string" |
4711 | 4788 | }
|
4712 | 4789 | },
|
4713 | 4790 | "type": "object"
|
|
5870 | 5947 | },
|
5871 | 5948 | "type": "object"
|
5872 | 5949 | },
|
| 5950 | + "OrgPolicyConstraint": { |
| 5951 | + "description": "Encapsulates data about a constraint associated with an organization policy.", |
| 5952 | + "id": "OrgPolicyConstraint", |
| 5953 | + "properties": { |
| 5954 | + "name": { |
| 5955 | + "description": "The resource name of the constraint. Example: \"organizations/{organization_id}/constraints/{constraint_name}\"", |
| 5956 | + "type": "string" |
| 5957 | + } |
| 5958 | + }, |
| 5959 | + "type": "object" |
| 5960 | + }, |
5873 | 5961 | "OrganizationSettings": {
|
5874 | 5962 | "description": "User specified settings that are attached to the Security Command Center organization.",
|
5875 | 5963 | "id": "OrganizationSettings",
|
|
0 commit comments