Filter Filter Criteria Args
Constructors
Properties
(Optional) The AWS account ID in which the finding was generated. Documented below.
(Optional) The ID of the component. Documented below.
(Optional) The ID of the component. Documented below.
(Optional) The ID of the component. Documented below.
(Optional) The ID of the component. Documented below.
(Optional) The type of the component. Documented below.
(Optional) The ID of the Amazon Machine Image (AMI). Documented below.
(Optional) The ID of the subnet. Documented below.
(Optional) The ID of the VPC. Documented below.
(Optional) The architecture of the ECR image. Documented below.
(Optional) The SHA256 hash of the ECR image. Documented below.
(Optional) The date range when the image was pushed. Documented below.
(Optional) The registry of the ECR image. Documented below.
(Optional) The name of the ECR repository. Documented below.
(Optional) The tags associated with the ECR image. Documented below.
(Optional) EPSS (Exploit Prediction Scoring System) Score of the finding. Documented below.
(Optional) Availability of exploits. Documented below.
(Optional) The ARN of the finding. Documented below.
(Optional) The status of the finding. Documented below.
(Optional) The type of the finding. Documented below.
(Optional) When the finding was first observed. Documented below.
(Optional) Availability of the fix. Documented below.
(Optional) The Inspector score given to the finding. Documented below.
(Optional) Lambda execution role ARN. Documented below.
(Optional) Last modified timestamp of the lambda function. Documented below.
(Optional) Lambda function layers. Documented below.
(Optional) Lambda function name. Documented below.
(Optional) Lambda function runtime. Documented below.
(Optional) When the finding was last observed. Documented below.
(Optional) The network protocol of the finding. Documented below.
(Optional) The port range of the finding. Documented below.
(Optional) Related vulnerabilities. Documented below.
(Optional) The ID of the resource. Documented below.
(Optional) The tags of the resource. Documented below.
(Optional) The type of the resource. Documented below.
(Optional) The severity of the finding. Documented below.
(Optional) The title of the finding. Documented below.
(Optional) When the finding was last updated. Documented below.
(Optional) The severity as reported by the vendor. Documented below.
(Optional) The ID of the vulnerability. Documented below.
(Optional) The source of the vulnerability. Documented below.
(Optional) Details about vulnerable packages. Documented below.