From 1f28c2008eb3bf425d47430fa46b81645f2f8d84 Mon Sep 17 00:00:00 2001 From: Yoshi Automation Date: Fri, 2 Feb 2024 01:30:44 +0000 Subject: [PATCH] feat(securitycenter): update the API #### securitycenter:v1beta1 The following keys were added: - schemas.GoogleCloudSecuritycenterV1ExternalSystem.properties.casePriority.description - schemas.GoogleCloudSecuritycenterV1ExternalSystem.properties.casePriority.type - schemas.GoogleCloudSecuritycenterV1ExternalSystem.properties.caseSla.description - schemas.GoogleCloudSecuritycenterV1ExternalSystem.properties.caseSla.format - schemas.GoogleCloudSecuritycenterV1ExternalSystem.properties.caseSla.type - schemas.GoogleCloudSecuritycenterV1ExternalSystem.properties.caseUri.description - schemas.GoogleCloudSecuritycenterV1ExternalSystem.properties.caseUri.type - schemas.GoogleCloudSecuritycenterV1ExternalSystem.properties.ticketInfo.$ref - schemas.GoogleCloudSecuritycenterV1ExternalSystem.properties.ticketInfo.description - schemas.GoogleCloudSecuritycenterV1ResourceValueConfig.properties.sensitiveDataProtectionMapping.$ref - schemas.GoogleCloudSecuritycenterV1ResourceValueConfig.properties.sensitiveDataProtectionMapping.description - schemas.GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping.description - schemas.GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping.id - schemas.GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping.properties.highSensitivityMapping.description - schemas.GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping.properties.highSensitivityMapping.enum - schemas.GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping.properties.highSensitivityMapping.enumDescriptions - schemas.GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping.properties.highSensitivityMapping.type - schemas.GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping.properties.mediumSensitivityMapping.description - schemas.GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping.properties.mediumSensitivityMapping.enum - schemas.GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping.properties.mediumSensitivityMapping.enumDescriptions - schemas.GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping.properties.mediumSensitivityMapping.type - schemas.GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping.type - schemas.PolicyDriftDetails.description - schemas.PolicyDriftDetails.id - schemas.PolicyDriftDetails.properties.detectedValue.description - schemas.PolicyDriftDetails.properties.detectedValue.type - schemas.PolicyDriftDetails.properties.expectedValue.description - schemas.PolicyDriftDetails.properties.expectedValue.type - schemas.PolicyDriftDetails.properties.field.description - schemas.PolicyDriftDetails.properties.field.type - schemas.PolicyDriftDetails.type - schemas.SecurityPosture.properties.policy.description - schemas.SecurityPosture.properties.policy.type - schemas.SecurityPosture.properties.policyDriftDetails.description - schemas.SecurityPosture.properties.policyDriftDetails.items.$ref - schemas.SecurityPosture.properties.policyDriftDetails.type - schemas.SecurityPosture.properties.policySet.description - schemas.SecurityPosture.properties.policySet.type - schemas.TicketInfo.description - schemas.TicketInfo.id - schemas.TicketInfo.properties.assignee.description - schemas.TicketInfo.properties.assignee.type - schemas.TicketInfo.properties.description.description - schemas.TicketInfo.properties.description.type - schemas.TicketInfo.properties.id.description - schemas.TicketInfo.properties.id.type - schemas.TicketInfo.properties.status.description - schemas.TicketInfo.properties.status.type - schemas.TicketInfo.properties.updateTime.description - schemas.TicketInfo.properties.updateTime.format - schemas.TicketInfo.properties.updateTime.type - schemas.TicketInfo.properties.uri.description - schemas.TicketInfo.properties.uri.type - schemas.TicketInfo.type The following keys were changed: - schemas.AttackExposure.properties.attackExposureResult.description - schemas.Binding.properties.role.description - schemas.Cve.description - schemas.SecurityPosture.properties.changedPolicy.description - schemas.SecurityPosture.properties.name.description - schemas.SecurityPosture.properties.postureDeployment.description - schemas.SecurityPosture.properties.postureDeploymentResource.description #### securitycenter:v1beta2 The following keys were added: - schemas.GoogleCloudSecuritycenterV1ExternalSystem.properties.casePriority.description - schemas.GoogleCloudSecuritycenterV1ExternalSystem.properties.casePriority.type - schemas.GoogleCloudSecuritycenterV1ExternalSystem.properties.caseSla.description - schemas.GoogleCloudSecuritycenterV1ExternalSystem.properties.caseSla.format - schemas.GoogleCloudSecuritycenterV1ExternalSystem.properties.caseSla.type - schemas.GoogleCloudSecuritycenterV1ExternalSystem.properties.caseUri.description - schemas.GoogleCloudSecuritycenterV1ExternalSystem.properties.caseUri.type - schemas.GoogleCloudSecuritycenterV1ExternalSystem.properties.ticketInfo.$ref - schemas.GoogleCloudSecuritycenterV1ExternalSystem.properties.ticketInfo.description - schemas.GoogleCloudSecuritycenterV1ResourceValueConfig.properties.sensitiveDataProtectionMapping.$ref - schemas.GoogleCloudSecuritycenterV1ResourceValueConfig.properties.sensitiveDataProtectionMapping.description - schemas.GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping.description - schemas.GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping.id - schemas.GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping.properties.highSensitivityMapping.description - schemas.GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping.properties.highSensitivityMapping.enum - schemas.GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping.properties.highSensitivityMapping.enumDescriptions - schemas.GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping.properties.highSensitivityMapping.type - schemas.GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping.properties.mediumSensitivityMapping.description - schemas.GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping.properties.mediumSensitivityMapping.enum - schemas.GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping.properties.mediumSensitivityMapping.enumDescriptions - schemas.GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping.properties.mediumSensitivityMapping.type - schemas.GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping.type - schemas.PolicyDriftDetails.description - schemas.PolicyDriftDetails.id - schemas.PolicyDriftDetails.properties.detectedValue.description - schemas.PolicyDriftDetails.properties.detectedValue.type - schemas.PolicyDriftDetails.properties.expectedValue.description - schemas.PolicyDriftDetails.properties.expectedValue.type - schemas.PolicyDriftDetails.properties.field.description - schemas.PolicyDriftDetails.properties.field.type - schemas.PolicyDriftDetails.type - schemas.SecurityPosture.properties.policy.description - schemas.SecurityPosture.properties.policy.type - schemas.SecurityPosture.properties.policyDriftDetails.description - schemas.SecurityPosture.properties.policyDriftDetails.items.$ref - schemas.SecurityPosture.properties.policyDriftDetails.type - schemas.SecurityPosture.properties.policySet.description - schemas.SecurityPosture.properties.policySet.type - schemas.TicketInfo.description - schemas.TicketInfo.id - schemas.TicketInfo.properties.assignee.description - schemas.TicketInfo.properties.assignee.type - schemas.TicketInfo.properties.description.description - schemas.TicketInfo.properties.description.type - schemas.TicketInfo.properties.id.description - schemas.TicketInfo.properties.id.type - schemas.TicketInfo.properties.status.description - schemas.TicketInfo.properties.status.type - schemas.TicketInfo.properties.updateTime.description - schemas.TicketInfo.properties.updateTime.format - schemas.TicketInfo.properties.updateTime.type - schemas.TicketInfo.properties.uri.description - schemas.TicketInfo.properties.uri.type - schemas.TicketInfo.type The following keys were changed: - schemas.AttackExposure.properties.attackExposureResult.description - schemas.Cve.description - schemas.SecurityPosture.properties.changedPolicy.description - schemas.SecurityPosture.properties.name.description - schemas.SecurityPosture.properties.postureDeployment.description - schemas.SecurityPosture.properties.postureDeploymentResource.description #### securitycenter:v1 The following keys were added: - resources.organizations.resources.simulations.resources.attackExposureResults.resources.valuedResources.methods.list.parameters.orderBy.description - resources.organizations.resources.simulations.resources.attackExposureResults.resources.valuedResources.methods.list.parameters.orderBy.location - resources.organizations.resources.simulations.resources.attackExposureResults.resources.valuedResources.methods.list.parameters.orderBy.type - resources.organizations.resources.simulations.resources.valuedResources.methods.list.parameters.orderBy.description - resources.organizations.resources.simulations.resources.valuedResources.methods.list.parameters.orderBy.location - resources.organizations.resources.simulations.resources.valuedResources.methods.list.parameters.orderBy.type - schemas.GoogleCloudSecuritycenterV1ExternalSystem.properties.casePriority.description - schemas.GoogleCloudSecuritycenterV1ExternalSystem.properties.casePriority.type - schemas.GoogleCloudSecuritycenterV1ExternalSystem.properties.caseSla.description - schemas.GoogleCloudSecuritycenterV1ExternalSystem.properties.caseSla.format - schemas.GoogleCloudSecuritycenterV1ExternalSystem.properties.caseSla.type - schemas.GoogleCloudSecuritycenterV1ExternalSystem.properties.caseUri.description - schemas.GoogleCloudSecuritycenterV1ExternalSystem.properties.caseUri.type - schemas.GoogleCloudSecuritycenterV1ExternalSystem.properties.ticketInfo.$ref - schemas.GoogleCloudSecuritycenterV1ExternalSystem.properties.ticketInfo.description - schemas.PolicyDriftDetails.description - schemas.PolicyDriftDetails.id - schemas.PolicyDriftDetails.properties.detectedValue.description - schemas.PolicyDriftDetails.properties.detectedValue.type - schemas.PolicyDriftDetails.properties.expectedValue.description - schemas.PolicyDriftDetails.properties.expectedValue.type - schemas.PolicyDriftDetails.properties.field.description - schemas.PolicyDriftDetails.properties.field.type - schemas.PolicyDriftDetails.type - schemas.SecurityPosture.properties.policy.description - schemas.SecurityPosture.properties.policy.type - schemas.SecurityPosture.properties.policyDriftDetails.description - schemas.SecurityPosture.properties.policyDriftDetails.items.$ref - schemas.SecurityPosture.properties.policyDriftDetails.type - schemas.SecurityPosture.properties.policySet.description - schemas.SecurityPosture.properties.policySet.type - schemas.TicketInfo.description - schemas.TicketInfo.id - schemas.TicketInfo.properties.assignee.description - schemas.TicketInfo.properties.assignee.type - schemas.TicketInfo.properties.description.description - schemas.TicketInfo.properties.description.type - schemas.TicketInfo.properties.id.description - schemas.TicketInfo.properties.id.type - schemas.TicketInfo.properties.status.description - schemas.TicketInfo.properties.status.type - schemas.TicketInfo.properties.updateTime.description - schemas.TicketInfo.properties.updateTime.format - schemas.TicketInfo.properties.updateTime.type - schemas.TicketInfo.properties.uri.description - schemas.TicketInfo.properties.uri.type - schemas.TicketInfo.type The following keys were changed: - schemas.AttackExposure.properties.attackExposureResult.description - schemas.Binding.properties.role.description - schemas.SecurityPosture.properties.changedPolicy.description - schemas.SecurityPosture.properties.name.description - schemas.SecurityPosture.properties.postureDeployment.description - schemas.SecurityPosture.properties.postureDeploymentResource.description --- discovery/securitycenter-v1.json | 107 +++++++++++++++++-- discovery/securitycenter-v1beta1.json | 146 ++++++++++++++++++++++++-- discovery/securitycenter-v1beta2.json | 144 +++++++++++++++++++++++-- src/apis/securitycenter/v1.ts | 94 +++++++++++++++-- src/apis/securitycenter/v1beta1.ts | 105 ++++++++++++++++-- src/apis/securitycenter/v1beta2.ts | 103 ++++++++++++++++-- 6 files changed, 658 insertions(+), 41 deletions(-) diff --git a/discovery/securitycenter-v1.json b/discovery/securitycenter-v1.json index 26e9683021..36b4c70e2f 100644 --- a/discovery/securitycenter-v1.json +++ b/discovery/securitycenter-v1.json @@ -3483,6 +3483,11 @@ "location": "query", "type": "string" }, + "orderBy": { + "description": "Optional. The fields by which to order the valued resources response. Supported fields: * `exposed_score` * `resource_value` * `resource_type` * `resource` * `display_name` Values should be a comma separated list of fields. For example: `exposed_score,resource_value`. The default sorting order is descending. To specify ascending or descending order for a field, append a \" ASC\" or a \" DESC\" suffix, respectively; for example: `exposed_score DESC`.", + "location": "query", + "type": "string" + }, "pageSize": { "description": "The maximum number of results to return in a single response. Default is 10, minimum is 1, maximum is 1000.", "format": "int32", @@ -3600,6 +3605,11 @@ "location": "query", "type": "string" }, + "orderBy": { + "description": "Optional. The fields by which to order the valued resources response. Supported fields: * `exposed_score` * `resource_value` * `resource_type` * `resource` * `display_name` Values should be a comma separated list of fields. For example: `exposed_score,resource_value`. The default sorting order is descending. To specify ascending or descending order for a field, append a \" ASC\" or a \" DESC\" suffix, respectively; for example: `exposed_score DESC`.", + "location": "query", + "type": "string" + }, "pageSize": { "description": "The maximum number of results to return in a single response. Default is 10, minimum is 1, maximum is 1000.", "format": "int32", @@ -5810,7 +5820,7 @@ } } }, - "revision": "20231218", + "revision": "20240124", "rootUrl": "https://securitycenter.googleapis.com/", "schemas": { "Access": { @@ -6001,7 +6011,7 @@ "id": "AttackExposure", "properties": { "attackExposureResult": { - "description": "The resource name of the attack path simulation result that contains the details regarding this attack exposure score. Example: organizations/123/attackExposureResults/456", + "description": "The resource name of the attack path simulation result that contains the details regarding this attack exposure score. Example: organizations/123/simulations/456/attackExposureResults/789", "type": "string" }, "exposedHighValueResourcesCount": { @@ -6316,7 +6326,7 @@ "type": "array" }, "role": { - "description": "Role that is assigned to the list of `members`, or principals. For example, `roles/viewer`, `roles/editor`, or `roles/owner`.", + "description": "Role that is assigned to the list of `members`, or principals. For example, `roles/viewer`, `roles/editor`, or `roles/owner`. For an overview of the IAM roles and permissions, see the [IAM documentation](https://cloud.google.com/iam/docs/roles-overview). For a list of the available pre-defined roles, see [here](https://cloud.google.com/iam/docs/understanding-roles).", "type": "string" } }, @@ -7569,6 +7579,19 @@ }, "type": "array" }, + "casePriority": { + "description": "The priority of the finding's corresponding case in the external system.", + "type": "string" + }, + "caseSla": { + "description": "The SLA of the finding's corresponding case in the external system.", + "format": "google-datetime", + "type": "string" + }, + "caseUri": { + "description": "The link to the finding's corresponding case in the external system.", + "type": "string" + }, "externalSystemUpdateTime": { "description": "The time when the case was last updated, as reported by the external system.", "format": "google-datetime", @@ -7585,6 +7608,10 @@ "status": { "description": "The most recent status of the finding's corresponding case, as reported by the external system.", "type": "string" + }, + "ticketInfo": { + "$ref": "TicketInfo", + "description": "Information about the ticket, if any, that is being used to track the resolution of the issue that is identified by this finding." } }, "type": "object" @@ -9359,6 +9386,25 @@ }, "type": "object" }, + "PolicyDriftDetails": { + "description": "The policy field that violates the deployed posture and its expected and and detected values.", + "id": "PolicyDriftDetails", + "properties": { + "detectedValue": { + "description": "The detected value that violates the deployed posture, for example, `false` or `allowed_values={\"projects/22831892”}`.", + "type": "string" + }, + "expectedValue": { + "description": "The value of this field that was configured in a posture, for example, `true` or `allowed_values={\"projects/29831892”}`.", + "type": "string" + }, + "field": { + "description": "The name of the updated field, for example constraint.implementation.policy_rules[0].enforce", + "type": "string" + } + }, + "type": "object" + }, "Position": { "description": "A position in the uploaded text version of a module.", "id": "Position", @@ -9660,19 +9706,34 @@ "id": "SecurityPosture", "properties": { "changedPolicy": { - "description": "The name of the policy that has been updated, for example, `projects/{project_id}/policies/{constraint_name}`.", + "description": "The name of the updated policy, for example, `projects/{project_id}/policies/{constraint_name}`.", "type": "string" }, "name": { - "description": "Name of the posture, for example, `organizations/{org_id}/locations/{location}/postures/{posture_name}`.", + "description": "Name of the posture, for example, `CIS-Posture`.", + "type": "string" + }, + "policy": { + "description": "The ID of the updated policy, for example, `compute-policy-1`.", + "type": "string" + }, + "policyDriftDetails": { + "description": "The details about a change in an updated policy that violates the deployed posture.", + "items": { + "$ref": "PolicyDriftDetails" + }, + "type": "array" + }, + "policySet": { + "description": "The name of the updated policyset, for example, `cis-policyset`.", "type": "string" }, "postureDeployment": { - "description": "The name of the posture deployment, for example, `projects/{project_id}/posturedeployments/{posture_deployment_id}`.", + "description": "The name of the posture deployment, for example, `organizations/{org_id}/posturedeployments/{posture_deployment_id}`.", "type": "string" }, "postureDeploymentResource": { - "description": "The project, folder, or organization on which the posture is deployed, for example, `projects/{project_id}`.", + "description": "The project, folder, or organization on which the posture is deployed, for example, `projects/{project_number}`.", "type": "string" }, "revisionId": { @@ -9974,6 +10035,38 @@ }, "type": "object" }, + "TicketInfo": { + "description": "Information about the ticket, if any, that is being used to track the resolution of the issue that is identified by this finding.", + "id": "TicketInfo", + "properties": { + "assignee": { + "description": "The assignee of the ticket in the ticket system.", + "type": "string" + }, + "description": { + "description": "The description of the ticket in the ticket system.", + "type": "string" + }, + "id": { + "description": "The identifier of the ticket in the ticket system.", + "type": "string" + }, + "status": { + "description": "The latest status of the ticket, as reported by the ticket system.", + "type": "string" + }, + "updateTime": { + "description": "The time when the ticket was last updated, as reported by the ticket system.", + "format": "google-datetime", + "type": "string" + }, + "uri": { + "description": "The link to the ticket in the ticket system.", + "type": "string" + } + }, + "type": "object" + }, "ValidateEventThreatDetectionCustomModuleRequest": { "description": "Request to validate an Event Threat Detection custom module.", "id": "ValidateEventThreatDetectionCustomModuleRequest", diff --git a/discovery/securitycenter-v1beta1.json b/discovery/securitycenter-v1beta1.json index baf90b59ac..1ee4e90f6c 100644 --- a/discovery/securitycenter-v1beta1.json +++ b/discovery/securitycenter-v1beta1.json @@ -896,7 +896,7 @@ } } }, - "revision": "20231218", + "revision": "20240130", "rootUrl": "https://securitycenter.googleapis.com/", "schemas": { "Access": { @@ -1072,7 +1072,7 @@ "id": "AttackExposure", "properties": { "attackExposureResult": { - "description": "The resource name of the attack path simulation result that contains the details regarding this attack exposure score. Example: organizations/123/attackExposureResults/456", + "description": "The resource name of the attack path simulation result that contains the details regarding this attack exposure score. Example: organizations/123/simulations/456/attackExposureResults/789", "type": "string" }, "exposedHighValueResourcesCount": { @@ -1238,7 +1238,7 @@ "type": "array" }, "role": { - "description": "Role that is assigned to the list of `members`, or principals. For example, `roles/viewer`, `roles/editor`, or `roles/owner`.", + "description": "Role that is assigned to the list of `members`, or principals. For example, `roles/viewer`, `roles/editor`, or `roles/owner`. For an overview of the IAM roles and permissions, see the [IAM documentation](https://cloud.google.com/iam/docs/roles-overview). For a list of the available pre-defined roles, see [here](https://cloud.google.com/iam/docs/understanding-roles).", "type": "string" } }, @@ -1447,7 +1447,7 @@ "type": "object" }, "Cve": { - "description": "CVE stands for Common Vulnerabilities and Exposures. More information: https://cve.mitre.org", + "description": "CVE stands for Common Vulnerabilities and Exposures. Information from the [CVE record](https://www.cve.org/ResourcesSupport/Glossary) that describes this vulnerability.", "id": "Cve", "properties": { "cvssv3": { @@ -2316,6 +2316,19 @@ }, "type": "array" }, + "casePriority": { + "description": "The priority of the finding's corresponding case in the external system.", + "type": "string" + }, + "caseSla": { + "description": "The SLA of the finding's corresponding case in the external system.", + "format": "google-datetime", + "type": "string" + }, + "caseUri": { + "description": "The link to the finding's corresponding case in the external system.", + "type": "string" + }, "externalSystemUpdateTime": { "description": "The time when the case was last updated, as reported by the external system.", "format": "google-datetime", @@ -2332,6 +2345,10 @@ "status": { "description": "The most recent status of the finding's corresponding case, as reported by the external system.", "type": "string" + }, + "ticketInfo": { + "$ref": "TicketInfo", + "description": "Information about the ticket, if any, that is being used to track the resolution of the issue that is identified by this finding." } }, "type": "object" @@ -2519,6 +2536,10 @@ "description": "Project or folder to scope this config to. For example, \"project/456\" would apply this config only to resources in \"project/456\" scope will be checked with \"AND\" of other resources.", "type": "string" }, + "sensitiveDataProtectionMapping": { + "$ref": "GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping", + "description": "A mapping of the sensitivity on Sensitive Data Protection finding to resource values. This mapping can only be used in combination with a resource_type that is related to BigQuery, e.g. \"bigquery.googleapis.com/Dataset\"." + }, "tagValues": { "description": "Required. Tag values combined with AND to check against. Values in the form \"tagValues/123\" E.g. [ \"tagValues/123\", \"tagValues/456\", \"tagValues/789\" ] https://cloud.google.com/resource-manager/docs/tags/tags-creating-and-managing", "items": { @@ -2614,6 +2635,49 @@ }, "type": "object" }, + "GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping": { + "description": "Resource value mapping for Sensitive Data Protection findings. If any of these mappings have a resource value that is not unspecified, the resource_value field will be ignored when reading this configuration.", + "id": "GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping", + "properties": { + "highSensitivityMapping": { + "description": "Resource value mapping for high-sensitivity Sensitive Data Protection findings", + "enum": [ + "RESOURCE_VALUE_UNSPECIFIED", + "HIGH", + "MEDIUM", + "LOW", + "NONE" + ], + "enumDescriptions": [ + "Unspecific value", + "High resource value", + "Medium resource value", + "Low resource value", + "No resource value, e.g. ignore these resources" + ], + "type": "string" + }, + "mediumSensitivityMapping": { + "description": "Resource value mapping for medium-sensitivity Sensitive Data Protection findings", + "enum": [ + "RESOURCE_VALUE_UNSPECIFIED", + "HIGH", + "MEDIUM", + "LOW", + "NONE" + ], + "enumDescriptions": [ + "Unspecific value", + "High resource value", + "Medium resource value", + "Low resource value", + "No resource value, e.g. ignore these resources" + ], + "type": "string" + } + }, + "type": "object" + }, "GoogleCloudSecuritycenterV1beta1Finding": { "description": "Security Command Center finding. A finding is a record of assessment data (security, risk, health or privacy) ingested into Security Command Center for presentation, notification, analysis, policy testing, and enforcement. For example, an XSS vulnerability in an App Engine application is a finding.", "id": "GoogleCloudSecuritycenterV1beta1Finding", @@ -3861,6 +3925,25 @@ }, "type": "object" }, + "PolicyDriftDetails": { + "description": "The policy field that violates the deployed posture and its expected and and detected values.", + "id": "PolicyDriftDetails", + "properties": { + "detectedValue": { + "description": "The detected value that violates the deployed posture, for example, `false` or `allowed_values={\"projects/22831892”}`.", + "type": "string" + }, + "expectedValue": { + "description": "The value of this field that was configured in a posture, for example, `true` or `allowed_values={\"projects/29831892”}`.", + "type": "string" + }, + "field": { + "description": "The name of the updated field, for example constraint.implementation.policy_rules[0].enforce", + "type": "string" + } + }, + "type": "object" + }, "Process": { "description": "Represents an operating system process.", "id": "Process", @@ -4075,19 +4158,34 @@ "id": "SecurityPosture", "properties": { "changedPolicy": { - "description": "The name of the policy that has been updated, for example, `projects/{project_id}/policies/{constraint_name}`.", + "description": "The name of the updated policy, for example, `projects/{project_id}/policies/{constraint_name}`.", "type": "string" }, "name": { - "description": "Name of the posture, for example, `organizations/{org_id}/locations/{location}/postures/{posture_name}`.", + "description": "Name of the posture, for example, `CIS-Posture`.", + "type": "string" + }, + "policy": { + "description": "The ID of the updated policy, for example, `compute-policy-1`.", + "type": "string" + }, + "policyDriftDetails": { + "description": "The details about a change in an updated policy that violates the deployed posture.", + "items": { + "$ref": "PolicyDriftDetails" + }, + "type": "array" + }, + "policySet": { + "description": "The name of the updated policyset, for example, `cis-policyset`.", "type": "string" }, "postureDeployment": { - "description": "The name of the posture deployment, for example, `projects/{project_id}/posturedeployments/{posture_deployment_id}`.", + "description": "The name of the posture deployment, for example, `organizations/{org_id}/posturedeployments/{posture_deployment_id}`.", "type": "string" }, "postureDeploymentResource": { - "description": "The project, folder, or organization on which the posture is deployed, for example, `projects/{project_id}`.", + "description": "The project, folder, or organization on which the posture is deployed, for example, `projects/{project_number}`.", "type": "string" }, "revisionId": { @@ -4259,6 +4357,38 @@ }, "type": "object" }, + "TicketInfo": { + "description": "Information about the ticket, if any, that is being used to track the resolution of the issue that is identified by this finding.", + "id": "TicketInfo", + "properties": { + "assignee": { + "description": "The assignee of the ticket in the ticket system.", + "type": "string" + }, + "description": { + "description": "The description of the ticket in the ticket system.", + "type": "string" + }, + "id": { + "description": "The identifier of the ticket in the ticket system.", + "type": "string" + }, + "status": { + "description": "The latest status of the ticket, as reported by the ticket system.", + "type": "string" + }, + "updateTime": { + "description": "The time when the ticket was last updated, as reported by the ticket system.", + "format": "google-datetime", + "type": "string" + }, + "uri": { + "description": "The link to the ticket in the ticket system.", + "type": "string" + } + }, + "type": "object" + }, "Vulnerability": { "description": "Refers to common vulnerability fields e.g. cve, cvss, cwe etc.", "id": "Vulnerability", diff --git a/discovery/securitycenter-v1beta2.json b/discovery/securitycenter-v1beta2.json index fea98015a4..93404831aa 100644 --- a/discovery/securitycenter-v1beta2.json +++ b/discovery/securitycenter-v1beta2.json @@ -1906,7 +1906,7 @@ } } }, - "revision": "20231218", + "revision": "20240130", "rootUrl": "https://securitycenter.googleapis.com/", "schemas": { "Access": { @@ -2018,7 +2018,7 @@ "id": "AttackExposure", "properties": { "attackExposureResult": { - "description": "The resource name of the attack path simulation result that contains the details regarding this attack exposure score. Example: organizations/123/attackExposureResults/456", + "description": "The resource name of the attack path simulation result that contains the details regarding this attack exposure score. Example: organizations/123/simulations/456/attackExposureResults/789", "type": "string" }, "exposedHighValueResourcesCount": { @@ -2393,7 +2393,7 @@ "type": "object" }, "Cve": { - "description": "CVE stands for Common Vulnerabilities and Exposures. More information: https://cve.mitre.org", + "description": "CVE stands for Common Vulnerabilities and Exposures. Information from the [CVE record](https://www.cve.org/ResourcesSupport/Glossary) that describes this vulnerability.", "id": "Cve", "properties": { "cvssv3": { @@ -3310,6 +3310,19 @@ }, "type": "array" }, + "casePriority": { + "description": "The priority of the finding's corresponding case in the external system.", + "type": "string" + }, + "caseSla": { + "description": "The SLA of the finding's corresponding case in the external system.", + "format": "google-datetime", + "type": "string" + }, + "caseUri": { + "description": "The link to the finding's corresponding case in the external system.", + "type": "string" + }, "externalSystemUpdateTime": { "description": "The time when the case was last updated, as reported by the external system.", "format": "google-datetime", @@ -3326,6 +3339,10 @@ "status": { "description": "The most recent status of the finding's corresponding case, as reported by the external system.", "type": "string" + }, + "ticketInfo": { + "$ref": "TicketInfo", + "description": "Information about the ticket, if any, that is being used to track the resolution of the issue that is identified by this finding." } }, "type": "object" @@ -3513,6 +3530,10 @@ "description": "Project or folder to scope this config to. For example, \"project/456\" would apply this config only to resources in \"project/456\" scope will be checked with \"AND\" of other resources.", "type": "string" }, + "sensitiveDataProtectionMapping": { + "$ref": "GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping", + "description": "A mapping of the sensitivity on Sensitive Data Protection finding to resource values. This mapping can only be used in combination with a resource_type that is related to BigQuery, e.g. \"bigquery.googleapis.com/Dataset\"." + }, "tagValues": { "description": "Required. Tag values combined with AND to check against. Values in the form \"tagValues/123\" E.g. [ \"tagValues/123\", \"tagValues/456\", \"tagValues/789\" ] https://cloud.google.com/resource-manager/docs/tags/tags-creating-and-managing", "items": { @@ -3608,6 +3629,49 @@ }, "type": "object" }, + "GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping": { + "description": "Resource value mapping for Sensitive Data Protection findings. If any of these mappings have a resource value that is not unspecified, the resource_value field will be ignored when reading this configuration.", + "id": "GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping", + "properties": { + "highSensitivityMapping": { + "description": "Resource value mapping for high-sensitivity Sensitive Data Protection findings", + "enum": [ + "RESOURCE_VALUE_UNSPECIFIED", + "HIGH", + "MEDIUM", + "LOW", + "NONE" + ], + "enumDescriptions": [ + "Unspecific value", + "High resource value", + "Medium resource value", + "Low resource value", + "No resource value, e.g. ignore these resources" + ], + "type": "string" + }, + "mediumSensitivityMapping": { + "description": "Resource value mapping for medium-sensitivity Sensitive Data Protection findings", + "enum": [ + "RESOURCE_VALUE_UNSPECIFIED", + "HIGH", + "MEDIUM", + "LOW", + "NONE" + ], + "enumDescriptions": [ + "Unspecific value", + "High resource value", + "Medium resource value", + "Low resource value", + "No resource value, e.g. ignore these resources" + ], + "type": "string" + } + }, + "type": "object" + }, "GoogleCloudSecuritycenterV1beta1RunAssetDiscoveryResponse": { "description": "Response of asset discovery run", "id": "GoogleCloudSecuritycenterV1beta1RunAssetDiscoveryResponse", @@ -4440,6 +4504,25 @@ }, "type": "object" }, + "PolicyDriftDetails": { + "description": "The policy field that violates the deployed posture and its expected and and detected values.", + "id": "PolicyDriftDetails", + "properties": { + "detectedValue": { + "description": "The detected value that violates the deployed posture, for example, `false` or `allowed_values={\"projects/22831892”}`.", + "type": "string" + }, + "expectedValue": { + "description": "The value of this field that was configured in a posture, for example, `true` or `allowed_values={\"projects/29831892”}`.", + "type": "string" + }, + "field": { + "description": "The name of the updated field, for example constraint.implementation.policy_rules[0].enforce", + "type": "string" + } + }, + "type": "object" + }, "Process": { "description": "Represents an operating system process.", "id": "Process", @@ -4729,19 +4812,34 @@ "id": "SecurityPosture", "properties": { "changedPolicy": { - "description": "The name of the policy that has been updated, for example, `projects/{project_id}/policies/{constraint_name}`.", + "description": "The name of the updated policy, for example, `projects/{project_id}/policies/{constraint_name}`.", "type": "string" }, "name": { - "description": "Name of the posture, for example, `organizations/{org_id}/locations/{location}/postures/{posture_name}`.", + "description": "Name of the posture, for example, `CIS-Posture`.", + "type": "string" + }, + "policy": { + "description": "The ID of the updated policy, for example, `compute-policy-1`.", + "type": "string" + }, + "policyDriftDetails": { + "description": "The details about a change in an updated policy that violates the deployed posture.", + "items": { + "$ref": "PolicyDriftDetails" + }, + "type": "array" + }, + "policySet": { + "description": "The name of the updated policyset, for example, `cis-policyset`.", "type": "string" }, "postureDeployment": { - "description": "The name of the posture deployment, for example, `projects/{project_id}/posturedeployments/{posture_deployment_id}`.", + "description": "The name of the posture deployment, for example, `organizations/{org_id}/posturedeployments/{posture_deployment_id}`.", "type": "string" }, "postureDeploymentResource": { - "description": "The project, folder, or organization on which the posture is deployed, for example, `projects/{project_id}`.", + "description": "The project, folder, or organization on which the posture is deployed, for example, `projects/{project_number}`.", "type": "string" }, "revisionId": { @@ -4828,6 +4926,38 @@ }, "type": "object" }, + "TicketInfo": { + "description": "Information about the ticket, if any, that is being used to track the resolution of the issue that is identified by this finding.", + "id": "TicketInfo", + "properties": { + "assignee": { + "description": "The assignee of the ticket in the ticket system.", + "type": "string" + }, + "description": { + "description": "The description of the ticket in the ticket system.", + "type": "string" + }, + "id": { + "description": "The identifier of the ticket in the ticket system.", + "type": "string" + }, + "status": { + "description": "The latest status of the ticket, as reported by the ticket system.", + "type": "string" + }, + "updateTime": { + "description": "The time when the ticket was last updated, as reported by the ticket system.", + "format": "google-datetime", + "type": "string" + }, + "uri": { + "description": "The link to the ticket in the ticket system.", + "type": "string" + } + }, + "type": "object" + }, "VirtualMachineThreatDetectionSettings": { "description": "Resource capturing the settings for the Virtual Machine Threat Detection service.", "id": "VirtualMachineThreatDetectionSettings", diff --git a/src/apis/securitycenter/v1.ts b/src/apis/securitycenter/v1.ts index 83d40e3f98..9f2ee8b2a9 100644 --- a/src/apis/securitycenter/v1.ts +++ b/src/apis/securitycenter/v1.ts @@ -282,7 +282,7 @@ export namespace securitycenter_v1 { */ export interface Schema$AttackExposure { /** - * The resource name of the attack path simulation result that contains the details regarding this attack exposure score. Example: organizations/123/attackExposureResults/456 + * The resource name of the attack path simulation result that contains the details regarding this attack exposure score. Example: organizations/123/simulations/456/attackExposureResults/789 */ attackExposureResult?: string | null; /** @@ -496,7 +496,7 @@ export namespace securitycenter_v1 { */ members?: string[] | null; /** - * Role that is assigned to the list of `members`, or principals. For example, `roles/viewer`, `roles/editor`, or `roles/owner`. + * Role that is assigned to the list of `members`, or principals. For example, `roles/viewer`, `roles/editor`, or `roles/owner`. For an overview of the IAM roles and permissions, see the [IAM documentation](https://cloud.google.com/iam/docs/roles-overview). For a list of the available pre-defined roles, see [here](https://cloud.google.com/iam/docs/understanding-roles). */ role?: string | null; } @@ -1350,6 +1350,18 @@ export namespace securitycenter_v1 { * References primary/secondary etc assignees in the external system. */ assignees?: string[] | null; + /** + * The priority of the finding's corresponding case in the external system. + */ + casePriority?: string | null; + /** + * The SLA of the finding's corresponding case in the external system. + */ + caseSla?: string | null; + /** + * The link to the finding's corresponding case in the external system. + */ + caseUri?: string | null; /** * The time when the case was last updated, as reported by the external system. */ @@ -1366,6 +1378,10 @@ export namespace securitycenter_v1 { * The most recent status of the finding's corresponding case, as reported by the external system. */ status?: string | null; + /** + * Information about the ticket, if any, that is being used to track the resolution of the issue that is identified by this finding. + */ + ticketInfo?: Schema$TicketInfo; } /** * A mute config is a Cloud SCC resource that contains the configuration to mute create/update events of findings. @@ -2469,6 +2485,23 @@ export namespace securitycenter_v1 { */ version?: number | null; } + /** + * The policy field that violates the deployed posture and its expected and and detected values. + */ + export interface Schema$PolicyDriftDetails { + /** + * The detected value that violates the deployed posture, for example, `false` or `allowed_values={"projects/22831892”\}`. + */ + detectedValue?: string | null; + /** + * The value of this field that was configured in a posture, for example, `true` or `allowed_values={"projects/29831892”\}`. + */ + expectedValue?: string | null; + /** + * The name of the updated field, for example constraint.implementation.policy_rules[0].enforce + */ + field?: string | null; + } /** * A position in the uploaded text version of a module. */ @@ -2698,19 +2731,31 @@ export namespace securitycenter_v1 { */ export interface Schema$SecurityPosture { /** - * The name of the policy that has been updated, for example, `projects/{project_id\}/policies/{constraint_name\}`. + * The name of the updated policy, for example, `projects/{project_id\}/policies/{constraint_name\}`. */ changedPolicy?: string | null; /** - * Name of the posture, for example, `organizations/{org_id\}/locations/{location\}/postures/{posture_name\}`. + * Name of the posture, for example, `CIS-Posture`. */ name?: string | null; /** - * The name of the posture deployment, for example, `projects/{project_id\}/posturedeployments/{posture_deployment_id\}`. + * The ID of the updated policy, for example, `compute-policy-1`. + */ + policy?: string | null; + /** + * The details about a change in an updated policy that violates the deployed posture. + */ + policyDriftDetails?: Schema$PolicyDriftDetails[]; + /** + * The name of the updated policyset, for example, `cis-policyset`. + */ + policySet?: string | null; + /** + * The name of the posture deployment, for example, `organizations/{org_id\}/posturedeployments/{posture_deployment_id\}`. */ postureDeployment?: string | null; /** - * The project, folder, or organization on which the posture is deployed, for example, `projects/{project_id\}`. + * The project, folder, or organization on which the posture is deployed, for example, `projects/{project_number\}`. */ postureDeploymentResource?: string | null; /** @@ -2921,6 +2966,35 @@ export namespace securitycenter_v1 { */ permissions?: string[] | null; } + /** + * Information about the ticket, if any, that is being used to track the resolution of the issue that is identified by this finding. + */ + export interface Schema$TicketInfo { + /** + * The assignee of the ticket in the ticket system. + */ + assignee?: string | null; + /** + * The description of the ticket in the ticket system. + */ + description?: string | null; + /** + * The identifier of the ticket in the ticket system. + */ + id?: string | null; + /** + * The latest status of the ticket, as reported by the ticket system. + */ + status?: string | null; + /** + * The time when the ticket was last updated, as reported by the ticket system. + */ + updateTime?: string | null; + /** + * The link to the ticket in the ticket system. + */ + uri?: string | null; + } /** * Request to validate an Event Threat Detection custom module. */ @@ -14273,6 +14347,10 @@ export namespace securitycenter_v1 { * The filter expression that filters the valued resources in the response. Supported fields: * `resource_value` supports = * `resource_type` supports = */ filter?: string; + /** + * Optional. The fields by which to order the valued resources response. Supported fields: * `exposed_score` * `resource_value` * `resource_type` * `resource` * `display_name` Values should be a comma separated list of fields. For example: `exposed_score,resource_value`. The default sorting order is descending. To specify ascending or descending order for a field, append a " ASC" or a " DESC" suffix, respectively; for example: `exposed_score DESC`. + */ + orderBy?: string; /** * The maximum number of results to return in a single response. Default is 10, minimum is 1, maximum is 1000. */ @@ -14615,6 +14693,10 @@ export namespace securitycenter_v1 { * The filter expression that filters the valued resources in the response. Supported fields: * `resource_value` supports = * `resource_type` supports = */ filter?: string; + /** + * Optional. The fields by which to order the valued resources response. Supported fields: * `exposed_score` * `resource_value` * `resource_type` * `resource` * `display_name` Values should be a comma separated list of fields. For example: `exposed_score,resource_value`. The default sorting order is descending. To specify ascending or descending order for a field, append a " ASC" or a " DESC" suffix, respectively; for example: `exposed_score DESC`. + */ + orderBy?: string; /** * The maximum number of results to return in a single response. Default is 10, minimum is 1, maximum is 1000. */ diff --git a/src/apis/securitycenter/v1beta1.ts b/src/apis/securitycenter/v1beta1.ts index 7de2420fda..0bf7026d27 100644 --- a/src/apis/securitycenter/v1beta1.ts +++ b/src/apis/securitycenter/v1beta1.ts @@ -266,7 +266,7 @@ export namespace securitycenter_v1beta1 { */ export interface Schema$AttackExposure { /** - * The resource name of the attack path simulation result that contains the details regarding this attack exposure score. Example: organizations/123/attackExposureResults/456 + * The resource name of the attack path simulation result that contains the details regarding this attack exposure score. Example: organizations/123/simulations/456/attackExposureResults/789 */ attackExposureResult?: string | null; /** @@ -378,7 +378,7 @@ export namespace securitycenter_v1beta1 { */ members?: string[] | null; /** - * Role that is assigned to the list of `members`, or principals. For example, `roles/viewer`, `roles/editor`, or `roles/owner`. + * Role that is assigned to the list of `members`, or principals. For example, `roles/viewer`, `roles/editor`, or `roles/owner`. For an overview of the IAM roles and permissions, see the [IAM documentation](https://cloud.google.com/iam/docs/roles-overview). For a list of the available pre-defined roles, see [here](https://cloud.google.com/iam/docs/understanding-roles). */ role?: string | null; } @@ -527,7 +527,7 @@ export namespace securitycenter_v1beta1 { uri?: string | null; } /** - * CVE stands for Common Vulnerabilities and Exposures. More information: https://cve.mitre.org + * CVE stands for Common Vulnerabilities and Exposures. Information from the [CVE record](https://www.cve.org/ResourcesSupport/Glossary) that describes this vulnerability. */ export interface Schema$Cve { /** @@ -1171,6 +1171,18 @@ export namespace securitycenter_v1beta1 { * References primary/secondary etc assignees in the external system. */ assignees?: string[] | null; + /** + * The priority of the finding's corresponding case in the external system. + */ + casePriority?: string | null; + /** + * The SLA of the finding's corresponding case in the external system. + */ + caseSla?: string | null; + /** + * The link to the finding's corresponding case in the external system. + */ + caseUri?: string | null; /** * The time when the case was last updated, as reported by the external system. */ @@ -1187,6 +1199,10 @@ export namespace securitycenter_v1beta1 { * The most recent status of the finding's corresponding case, as reported by the external system. */ status?: string | null; + /** + * Information about the ticket, if any, that is being used to track the resolution of the issue that is identified by this finding. + */ + ticketInfo?: Schema$TicketInfo; } /** * A mute config is a Cloud SCC resource that contains the configuration to mute create/update events of findings. @@ -1471,6 +1487,10 @@ export namespace securitycenter_v1beta1 { * Project or folder to scope this config to. For example, "project/456" would apply this config only to resources in "project/456" scope will be checked with "AND" of other resources. */ scope?: string | null; + /** + * A mapping of the sensitivity on Sensitive Data Protection finding to resource values. This mapping can only be used in combination with a resource_type that is related to BigQuery, e.g. "bigquery.googleapis.com/Dataset". + */ + sensitiveDataProtectionMapping?: Schema$GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping; /** * Required. Tag values combined with AND to check against. Values in the form "tagValues/123" E.g. [ "tagValues/123", "tagValues/456", "tagValues/789" ] https://cloud.google.com/resource-manager/docs/tags/tags-creating-and-managing */ @@ -1526,6 +1546,19 @@ export namespace securitycenter_v1beta1 { */ updateTime?: string | null; } + /** + * Resource value mapping for Sensitive Data Protection findings. If any of these mappings have a resource value that is not unspecified, the resource_value field will be ignored when reading this configuration. + */ + export interface Schema$GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping { + /** + * Resource value mapping for high-sensitivity Sensitive Data Protection findings + */ + highSensitivityMapping?: string | null; + /** + * Resource value mapping for medium-sensitivity Sensitive Data Protection findings + */ + mediumSensitivityMapping?: string | null; + } /** * Request message for grouping by assets. */ @@ -2050,6 +2083,23 @@ export namespace securitycenter_v1beta1 { */ version?: number | null; } + /** + * The policy field that violates the deployed posture and its expected and and detected values. + */ + export interface Schema$PolicyDriftDetails { + /** + * The detected value that violates the deployed posture, for example, `false` or `allowed_values={"projects/22831892”\}`. + */ + detectedValue?: string | null; + /** + * The value of this field that was configured in a posture, for example, `true` or `allowed_values={"projects/29831892”\}`. + */ + expectedValue?: string | null; + /** + * The name of the updated field, for example constraint.implementation.policy_rules[0].enforce + */ + field?: string | null; + } /** * Represents an operating system process. */ @@ -2210,19 +2260,31 @@ export namespace securitycenter_v1beta1 { */ export interface Schema$SecurityPosture { /** - * The name of the policy that has been updated, for example, `projects/{project_id\}/policies/{constraint_name\}`. + * The name of the updated policy, for example, `projects/{project_id\}/policies/{constraint_name\}`. */ changedPolicy?: string | null; /** - * Name of the posture, for example, `organizations/{org_id\}/locations/{location\}/postures/{posture_name\}`. + * Name of the posture, for example, `CIS-Posture`. */ name?: string | null; /** - * The name of the posture deployment, for example, `projects/{project_id\}/posturedeployments/{posture_deployment_id\}`. + * The ID of the updated policy, for example, `compute-policy-1`. + */ + policy?: string | null; + /** + * The details about a change in an updated policy that violates the deployed posture. + */ + policyDriftDetails?: Schema$PolicyDriftDetails[]; + /** + * The name of the updated policyset, for example, `cis-policyset`. + */ + policySet?: string | null; + /** + * The name of the posture deployment, for example, `organizations/{org_id\}/posturedeployments/{posture_deployment_id\}`. */ postureDeployment?: string | null; /** - * The project, folder, or organization on which the posture is deployed, for example, `projects/{project_id\}`. + * The project, folder, or organization on which the posture is deployed, for example, `projects/{project_number\}`. */ postureDeploymentResource?: string | null; /** @@ -2338,6 +2400,35 @@ export namespace securitycenter_v1beta1 { */ permissions?: string[] | null; } + /** + * Information about the ticket, if any, that is being used to track the resolution of the issue that is identified by this finding. + */ + export interface Schema$TicketInfo { + /** + * The assignee of the ticket in the ticket system. + */ + assignee?: string | null; + /** + * The description of the ticket in the ticket system. + */ + description?: string | null; + /** + * The identifier of the ticket in the ticket system. + */ + id?: string | null; + /** + * The latest status of the ticket, as reported by the ticket system. + */ + status?: string | null; + /** + * The time when the ticket was last updated, as reported by the ticket system. + */ + updateTime?: string | null; + /** + * The link to the ticket in the ticket system. + */ + uri?: string | null; + } /** * Refers to common vulnerability fields e.g. cve, cvss, cwe etc. */ diff --git a/src/apis/securitycenter/v1beta2.ts b/src/apis/securitycenter/v1beta2.ts index 6419052bf8..ce2f1d085c 100644 --- a/src/apis/securitycenter/v1beta2.ts +++ b/src/apis/securitycenter/v1beta2.ts @@ -228,7 +228,7 @@ export namespace securitycenter_v1beta2 { */ export interface Schema$AttackExposure { /** - * The resource name of the attack path simulation result that contains the details regarding this attack exposure score. Example: organizations/123/attackExposureResults/456 + * The resource name of the attack path simulation result that contains the details regarding this attack exposure score. Example: organizations/123/simulations/456/attackExposureResults/789 */ attackExposureResult?: string | null; /** @@ -480,7 +480,7 @@ export namespace securitycenter_v1beta2 { updateTime?: string | null; } /** - * CVE stands for Common Vulnerabilities and Exposures. More information: https://cve.mitre.org + * CVE stands for Common Vulnerabilities and Exposures. Information from the [CVE record](https://www.cve.org/ResourcesSupport/Glossary) that describes this vulnerability. */ export interface Schema$Cve { /** @@ -1082,6 +1082,18 @@ export namespace securitycenter_v1beta2 { * References primary/secondary etc assignees in the external system. */ assignees?: string[] | null; + /** + * The priority of the finding's corresponding case in the external system. + */ + casePriority?: string | null; + /** + * The SLA of the finding's corresponding case in the external system. + */ + caseSla?: string | null; + /** + * The link to the finding's corresponding case in the external system. + */ + caseUri?: string | null; /** * The time when the case was last updated, as reported by the external system. */ @@ -1098,6 +1110,10 @@ export namespace securitycenter_v1beta2 { * The most recent status of the finding's corresponding case, as reported by the external system. */ status?: string | null; + /** + * Information about the ticket, if any, that is being used to track the resolution of the issue that is identified by this finding. + */ + ticketInfo?: Schema$TicketInfo; } /** * A mute config is a Cloud SCC resource that contains the configuration to mute create/update events of findings. @@ -1382,6 +1398,10 @@ export namespace securitycenter_v1beta2 { * Project or folder to scope this config to. For example, "project/456" would apply this config only to resources in "project/456" scope will be checked with "AND" of other resources. */ scope?: string | null; + /** + * A mapping of the sensitivity on Sensitive Data Protection finding to resource values. This mapping can only be used in combination with a resource_type that is related to BigQuery, e.g. "bigquery.googleapis.com/Dataset". + */ + sensitiveDataProtectionMapping?: Schema$GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping; /** * Required. Tag values combined with AND to check against. Values in the form "tagValues/123" E.g. [ "tagValues/123", "tagValues/456", "tagValues/789" ] https://cloud.google.com/resource-manager/docs/tags/tags-creating-and-managing */ @@ -1437,6 +1457,19 @@ export namespace securitycenter_v1beta2 { */ updateTime?: string | null; } + /** + * Resource value mapping for Sensitive Data Protection findings. If any of these mappings have a resource value that is not unspecified, the resource_value field will be ignored when reading this configuration. + */ + export interface Schema$GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping { + /** + * Resource value mapping for high-sensitivity Sensitive Data Protection findings + */ + highSensitivityMapping?: string | null; + /** + * Resource value mapping for medium-sensitivity Sensitive Data Protection findings + */ + mediumSensitivityMapping?: string | null; + } /** * Represents a particular IAM binding, which captures a member's role addition, removal, or state. */ @@ -1716,6 +1749,23 @@ export namespace securitycenter_v1beta2 { */ ns?: string | null; } + /** + * The policy field that violates the deployed posture and its expected and and detected values. + */ + export interface Schema$PolicyDriftDetails { + /** + * The detected value that violates the deployed posture, for example, `false` or `allowed_values={"projects/22831892”\}`. + */ + detectedValue?: string | null; + /** + * The value of this field that was configured in a posture, for example, `true` or `allowed_values={"projects/29831892”\}`. + */ + expectedValue?: string | null; + /** + * The name of the updated field, for example constraint.implementation.policy_rules[0].enforce + */ + field?: string | null; + } /** * Represents an operating system process. */ @@ -1914,19 +1964,31 @@ export namespace securitycenter_v1beta2 { */ export interface Schema$SecurityPosture { /** - * The name of the policy that has been updated, for example, `projects/{project_id\}/policies/{constraint_name\}`. + * The name of the updated policy, for example, `projects/{project_id\}/policies/{constraint_name\}`. */ changedPolicy?: string | null; /** - * Name of the posture, for example, `organizations/{org_id\}/locations/{location\}/postures/{posture_name\}`. + * Name of the posture, for example, `CIS-Posture`. */ name?: string | null; /** - * The name of the posture deployment, for example, `projects/{project_id\}/posturedeployments/{posture_deployment_id\}`. + * The ID of the updated policy, for example, `compute-policy-1`. + */ + policy?: string | null; + /** + * The details about a change in an updated policy that violates the deployed posture. + */ + policyDriftDetails?: Schema$PolicyDriftDetails[]; + /** + * The name of the updated policyset, for example, `cis-policyset`. + */ + policySet?: string | null; + /** + * The name of the posture deployment, for example, `organizations/{org_id\}/posturedeployments/{posture_deployment_id\}`. */ postureDeployment?: string | null; /** - * The project, folder, or organization on which the posture is deployed, for example, `projects/{project_id\}`. + * The project, folder, or organization on which the posture is deployed, for example, `projects/{project_number\}`. */ postureDeploymentResource?: string | null; /** @@ -1981,6 +2043,35 @@ export namespace securitycenter_v1beta2 { */ tier?: string | null; } + /** + * Information about the ticket, if any, that is being used to track the resolution of the issue that is identified by this finding. + */ + export interface Schema$TicketInfo { + /** + * The assignee of the ticket in the ticket system. + */ + assignee?: string | null; + /** + * The description of the ticket in the ticket system. + */ + description?: string | null; + /** + * The identifier of the ticket in the ticket system. + */ + id?: string | null; + /** + * The latest status of the ticket, as reported by the ticket system. + */ + status?: string | null; + /** + * The time when the ticket was last updated, as reported by the ticket system. + */ + updateTime?: string | null; + /** + * The link to the ticket in the ticket system. + */ + uri?: string | null; + } /** * Resource capturing the settings for the Virtual Machine Threat Detection service. */