Insight Aws Security Finding Filters Args
A collection of filters that are applied to all active findings aggregated by AWS Security Hub.
Constructors
Properties
The AWS account ID in which a finding is generated.
The name of the AWS account in which a finding is generated.
The name of the findings provider (company) that owns the solution (product) that generates findings.
The unique identifier of a standard in which a control is enabled.
The unique identifier of a control across standards.
The name of a security control parameter.
The current value of a security control parameter.
Exclusive to findings that are generated as the result of a check run against a specific rule in a supported standard.
A finding's confidence.
An ISO8601-formatted timestamp that indicates when the security findings provider captured the potential security issue that a finding captured.
The level of importance assigned to the resources associated with the finding.
A finding's description.
The finding provider value for the finding confidence.
The finding provider value for the level of importance assigned to the resources associated with the findings.
The finding identifier of a related finding that is identified by the finding provider.
The ARN of the solution that generated a related finding that is identified by the finding provider.
The finding provider value for the severity label.
The finding provider's original value for the severity.
One or more finding types that the finding provider assigned to the finding.
An ISO8601-formatted timestamp that indicates when the security findings provider first observed the potential security issue that a finding captured.
The identifier for the solution-specific component (a discrete unit of logic) that generated a finding.
The security findings provider-specific identifier for a finding.
A keyword for a finding.
An ISO8601-formatted timestamp that indicates when the security findings provider most recently observed the potential security issue that a finding captured.
The name of the malware that was observed.
The filesystem path of the malware that was observed.
The state of the malware that was observed.
The type of the malware that was observed.
The destination domain of network-related information about a finding.
The destination IPv4 address of network-related information about a finding.
The destination IPv6 address of network-related information about a finding.
The destination port of network-related information about a finding.
Indicates the direction of network traffic associated with a finding.
The protocol of network-related information about a finding.
The source domain of network-related information about a finding.
The source IPv4 address of network-related information about a finding.
The source IPv6 address of network-related information about a finding.
The source media access control (MAC) address of network-related information about a finding.
The source port of network-related information about a finding.
The text of a note.
The timestamp of when the note was updated.
The principal that created a note.
A timestamp that identifies when the process was launched.
The name of the process.
The parent process ID.
The path to the process executable.
The process ID.
A timestamp that identifies when the process was terminated.
The ARN generated by Security Hub that uniquely identifies a third-party company (security findings provider) after this provider's product (solution that generates findings) is registered with Security Hub.
A data type where security findings providers can include additional solution-specific details that aren't part of the defined AwsSecurityFinding format.
The name of the solution (product) that generates findings.
The recommendation of what to do about the issue described in a finding.
The updated record state for the finding.
The Region from which the finding was generated.
The solution-generated identifier for a related finding.
The ARN of the solution that generated a related finding.
The ARN of the application that is related to a finding.
The name of the application that is related to a finding.
The IAM profile ARN of the instance.
The Amazon Machine Image (AMI) ID of the instance.
The IPv4 addresses associated with the instance.
The IPv6 addresses associated with the instance.
The key name associated with the instance.
The date and time the instance was launched.
The identifier of the subnet that the instance was launched in.
The instance type of the instance.
The identifier of the VPC that the instance was launched in.
The creation date/time of the IAM access key related to a finding.
The name of the principal that is associated with an IAM access key.
The status of the IAM access key related to a finding.
The user associated with the IAM access key related to a finding.
The name of an IAM user.
The canonical user ID of the owner of the S3 bucket.
The display name of the owner of the S3 bucket.
The identifier of the image related to a finding.
The name of the image related to a finding.
A timestamp that identifies when the container was started.
The name of the container related to a finding.
The details of a resource that doesn't have a specific subfield for the resource type defined.
The canonical identifier for the given resource type.
The canonical AWS partition name that the Region is assigned to.
The canonical AWS external Region name where this resource is located.
A list of AWS tags associated with a resource at the time the finding was processed.
Specifies the type of the resource that details are provided for.
Indicates whether or not sample findings are included in the filter results.
The label of a finding's severity.
The normalized severity of a finding.
The native severity as defined by the security findings provider's solution that generated the finding.
A URL that links to a page about the current finding in the security findings provider's solution.
The category of a threat intelligence indicator.
A timestamp that identifies the last observation of a threat intelligence indicator.
The source of the threat intelligence.
The URL for more details from the source of the threat intelligence.
The type of a threat intelligence indicator.
The value of a threat intelligence indicator.
A finding's title.
A finding type in the format of namespace/category/classifier that classifies a finding.
An ISO8601-formatted timestamp that indicates when the security findings provider last updated the finding record.
A list of name/value string pairs associated with the finding.
The veracity of a finding.
Indicates whether a software vulnerability in your environment has a known exploit.
Indicates whether a vulnerability is fixed in a newer version of the affected software packages.
The workflow state of a finding.
The status of the investigation into a finding.