GSP
Quick Navigator

Search Site

Unix VPS
A - Starter
B - Basic
C - Preferred
D - Commercial
MPS - Dedicated
Previous VPSs
* Sign Up! *

Support
Contact Us
Online Help
Handbooks
Domain Status
Man Pages

FAQ
Virtual Servers
Pricing
Billing
Technical

Network
Facilities
Connectivity
Topology Map

Miscellaneous
Server Agreement
Year 2038
Credits
 

USA Flag

 

 

Man Pages
Paws::SecurityHub::AwsSecurityFindingFilters(3) User Contributed Perl Documentation Paws::SecurityHub::AwsSecurityFindingFilters(3)

Paws::SecurityHub::AwsSecurityFindingFilters

This class represents one of two things:

Arguments in a call to a service

Use the attributes of this class as arguments to methods. You shouldn't make instances of this class. Each attribute should be used as a named argument in the calls that expect this type of object.

As an example, if Att1 is expected to be a Paws::SecurityHub::AwsSecurityFindingFilters object:

  $service_obj->Method(Att1 => { AwsAccountId => $value, ..., WorkflowStatus => $value  });

Results returned from an API call

Use accessors for each attribute. If Att1 is expected to be an Paws::SecurityHub::AwsSecurityFindingFilters object:

  $result = $service_obj->Method(...);
  $result->Att1->AwsAccountId

A collection of attributes that are applied to all active Security Hub-aggregated findings and that result in a subset of findings that are included in this insight.

You can filter by up to 10 finding attributes. For each attribute, you can provide up to 20 filter values.

The AWS account ID that a finding is generated in.

The name of the findings provider (company) that owns the solution (product) that generates findings.

Exclusive to findings that are generated as the result of a check run against a specific rule in a supported standard, such as CIS AWS Foundations. Contains security standard-related finding details.

A finding's confidence. Confidence is defined as the likelihood that a finding accurately identifies the behavior or issue that it was intended to identify.

Confidence is scored on a 0-100 basis using a ratio scale, where 0 means zero percent confidence and 100 means 100 percent confidence.

An ISO8601-formatted timestamp that indicates when the security-findings provider captured the potential security issue that a finding captured.

The level of importance assigned to the resources associated with the finding.

A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources.

A finding's description.

The finding provider value for the finding confidence. Confidence is defined as the likelihood that a finding accurately identifies the behavior or issue that it was intended to identify.

Confidence is scored on a 0-100 basis using a ratio scale, where 0 means zero percent confidence and 100 means 100 percent confidence.

The finding provider value for the level of importance assigned to the resources associated with the findings.

A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources.

The finding identifier of a related finding that is identified by the finding provider.

The ARN of the solution that generated a related finding that is identified by the finding provider.

The finding provider value for the severity label.

The finding provider's original value for the severity.

One or more finding types that the finding provider assigned to the finding. Uses the format of "namespace/category/classifier" that classify a finding.

Valid namespace values are: Software and Configuration Checks | TTPs | Effects | Unusual Behaviors | Sensitive Data Identifications

An ISO8601-formatted timestamp that indicates when the security-findings provider first observed the potential security issue that a finding captured.

The identifier for the solution-specific component (a discrete unit of logic) that generated a finding. In various security-findings providers' solutions, this generator can be called a rule, a check, a detector, a plugin, etc.

The security findings provider-specific identifier for a finding.

A keyword for a finding.

An ISO8601-formatted timestamp that indicates when the security-findings provider most recently observed the potential security issue that a finding captured.

The name of the malware that was observed.

The filesystem path of the malware that was observed.

The state of the malware that was observed.

The type of the malware that was observed.

The destination domain of network-related information about a finding.

The destination IPv4 address of network-related information about a finding.

The destination IPv6 address of network-related information about a finding.

The destination port of network-related information about a finding.

Indicates the direction of network traffic associated with a finding.

The protocol of network-related information about a finding.

The source domain of network-related information about a finding.

The source IPv4 address of network-related information about a finding.

The source IPv6 address of network-related information about a finding.

The source media access control (MAC) address of network-related information about a finding.

The source port of network-related information about a finding.

The text of a note.

The timestamp of when the note was updated.

The principal that created a note.

The date/time that the process was launched.

The name of the process.

The parent process ID.

The path to the process executable.

The process ID.

The date/time that the process was terminated.

The ARN generated by Security Hub that uniquely identifies a third-party company (security findings provider) after this provider's product (solution that generates findings) is registered with Security Hub.

A data type where security-findings providers can include additional solution-specific details that aren't part of the defined "AwsSecurityFinding" format.

The name of the solution (product) that generates findings.

The recommendation of what to do about the issue described in a finding.

The updated record state for the finding.

The solution-generated identifier for a related finding.

The ARN of the solution that generated a related finding.

The IAM profile ARN of the instance.

The Amazon Machine Image (AMI) ID of the instance.

The IPv4 addresses associated with the instance.

The IPv6 addresses associated with the instance.

The key name associated with the instance.

The date and time the instance was launched.

The identifier of the subnet that the instance was launched in.

The instance type of the instance.

The identifier of the VPC that the instance was launched in.

The creation date/time of the IAM access key related to a finding.

The status of the IAM access key related to a finding.

The user associated with the IAM access key related to a finding.

The canonical user ID of the owner of the S3 bucket.

The display name of the owner of the S3 bucket.

The identifier of the image related to a finding.

The name of the image related to a finding.

The date/time that the container was started.

The name of the container related to a finding.

The details of a resource that doesn't have a specific subfield for the resource type defined.

The canonical identifier for the given resource type.

The canonical AWS partition name that the Region is assigned to.

The canonical AWS external Region name where this resource is located.

A list of AWS tags associated with a resource at the time the finding was processed.

Specifies the type of the resource that details are provided for.

The label of a finding's severity.

The normalized severity of a finding.

The native severity as defined by the security-findings provider's solution that generated the finding.

A URL that links to a page about the current finding in the security-findings provider's solution.

The category of a threat intelligence indicator.

The date/time of the last observation of a threat intelligence indicator.

The source of the threat intelligence.

The URL for more details from the source of the threat intelligence.

The type of a threat intelligence indicator.

The value of a threat intelligence indicator.

A finding's title.

A finding type in the format of "namespace/category/classifier" that classifies a finding.

An ISO8601-formatted timestamp that indicates when the security-findings provider last updated the finding record.

A list of name/value string pairs associated with the finding. These are custom, user-defined fields added to a finding.

The veracity of a finding.

The workflow state of a finding.

Note that this field is deprecated. To search for a finding based on its workflow status, use "WorkflowStatus".

The status of the investigation into a finding. Allowed values are the following.

"NEW" - The initial state of a finding, before it is reviewed.

Security Hub also resets the workflow status from "NOTIFIED" or "RESOLVED" to "NEW" in the following cases:

  • The record state changes from "ARCHIVED" to "ACTIVE".
  • The compliance status changes from "PASSED" to either "WARNING", "FAILED", or "NOT_AVAILABLE".
  • "NOTIFIED" - Indicates that the resource owner has been notified about the security issue. Used when the initial reviewer is not the resource owner, and needs intervention from the resource owner.
  • "SUPPRESSED" - The finding will not be reviewed again and will not be acted upon.
  • "RESOLVED" - The finding was reviewed and remediated and is now considered resolved.

This class forms part of Paws, describing an object used in Paws::SecurityHub

The source code is located here: <https://github.com/pplu/aws-sdk-perl>

Please report bugs to: <https://github.com/pplu/aws-sdk-perl/issues>

2022-06-01 perl v5.40.2

Search for    or go to Top of page |  Section 3 |  Main Index

Powered by GSP Visit the GSP FreeBSD Man Page Interface.
Output converted with ManDoc.