We announced the upcoming end-of-support for AWS SDK for JavaScript v2.
We recommend that you migrate to AWS SDK for JavaScript v3. For dates, additional details, and information on how to migrate, please refer to the linked announcement.

Class: AWS.SecurityHub

Inherits:
AWS.Service show all
Identifier:
securityhub
API Version:
2018-10-26
Defined in:
(unknown)

Overview

Constructs a service interface object. Each API operation is exposed as a function on service.

Service Description

Security Hub provides you with a comprehensive view of the security state of your Amazon Web Services environment and resources. It also provides you with the readiness status of your environment based on controls from supported security standards. Security Hub collects security data from Amazon Web Services accounts, services, and integrated third-party products and helps you analyze security trends in your environment to identify the highest priority security issues. For more information about Security Hub, see the Security Hub User Guide .

When you use operations in the Security Hub API, the requests are executed only in the Amazon Web Services Region that is currently active or in the specific Amazon Web Services Region that you specify in your request. Any configuration or settings change that results from the operation is applied only to that Region. To make the same change in other Regions, run the same command for each Region in which you want to apply the change.

For example, if your Region is set to us-west-2, when you use CreateMembers to add a member account to Security Hub, the association of the member account with the administrator account is created only in the us-west-2 Region. Security Hub must be enabled for the member account in the same Region that the invitation was sent from.

The following throttling limits apply to using Security Hub API operations.

  • BatchEnableStandards - RateLimit of 1 request per second. BurstLimit of 1 request per second.

  • GetFindings - RateLimit of 3 requests per second. BurstLimit of 6 requests per second.

  • BatchImportFindings - RateLimit of 10 requests per second. BurstLimit of 30 requests per second.

  • BatchUpdateFindings - RateLimit of 10 requests per second. BurstLimit of 30 requests per second.

  • UpdateStandardsControl - RateLimit of 1 request per second. BurstLimit of 5 requests per second.

  • All other operations - RateLimit of 10 requests per second. BurstLimit of 30 requests per second.

Sending a Request Using SecurityHub

var securityhub = new AWS.SecurityHub();
securityhub.createActionTarget(params, function (err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Locking the API Version

In order to ensure that the SecurityHub object uses this specific API, you can construct the object by passing the apiVersion option to the constructor:

var securityhub = new AWS.SecurityHub({apiVersion: '2018-10-26'});

You can also set the API version globally in AWS.config.apiVersions using the securityhub service identifier:

AWS.config.apiVersions = {
  securityhub: '2018-10-26',
  // other service API versions
};

var securityhub = new AWS.SecurityHub();

Version:

  • 2018-10-26

Constructor Summary collapse

Property Summary collapse

Properties inherited from AWS.Service

apiVersions

Method Summary collapse

Methods inherited from AWS.Service

makeRequest, makeUnauthenticatedRequest, waitFor, setupRequestListeners, defineService

Constructor Details

new AWS.SecurityHub(options = {}) ⇒ Object

Constructs a service object. This object has one method for each API operation.

Examples:

Constructing a SecurityHub object

var securityhub = new AWS.SecurityHub({apiVersion: '2018-10-26'});

Options Hash (options):

  • params (map)

    An optional map of parameters to bind to every request sent by this service object. For more information on bound parameters, see "Working with Services" in the Getting Started Guide.

  • endpoint (String|AWS.Endpoint)

    The endpoint URI to send requests to. The default endpoint is built from the configured region. The endpoint should be a string like 'https://{service}.{region}.amazonaws.com' or an Endpoint object.

  • accessKeyId (String)

    your AWS access key ID.

  • secretAccessKey (String)

    your AWS secret access key.

  • sessionToken (AWS.Credentials)

    the optional AWS session token to sign requests with.

  • credentials (AWS.Credentials)

    the AWS credentials to sign requests with. You can either specify this object, or specify the accessKeyId and secretAccessKey options directly.

  • credentialProvider (AWS.CredentialProviderChain)

    the provider chain used to resolve credentials if no static credentials property is set.

  • region (String)

    the region to send service requests to. See AWS.SecurityHub.region for more information.

  • maxRetries (Integer)

    the maximum amount of retries to attempt with a request. See AWS.SecurityHub.maxRetries for more information.

  • maxRedirects (Integer)

    the maximum amount of redirects to follow with a request. See AWS.SecurityHub.maxRedirects for more information.

  • sslEnabled (Boolean)

    whether to enable SSL for requests.

  • paramValidation (Boolean|map)

    whether input parameters should be validated against the operation description before sending the request. Defaults to true. Pass a map to enable any of the following specific validation features:

    • min [Boolean] — Validates that a value meets the min constraint. This is enabled by default when paramValidation is set to true.
    • max [Boolean] — Validates that a value meets the max constraint.
    • pattern [Boolean] — Validates that a string value matches a regular expression.
    • enum [Boolean] — Validates that a string value matches one of the allowable enum values.
  • computeChecksums (Boolean)

    whether to compute checksums for payload bodies when the service accepts it (currently supported in S3 only)

  • convertResponseTypes (Boolean)

    whether types are converted when parsing response data. Currently only supported for JSON based services. Turning this off may improve performance on large response payloads. Defaults to true.

  • correctClockSkew (Boolean)

    whether to apply a clock skew correction and retry requests that fail because of an skewed client clock. Defaults to false.

  • s3ForcePathStyle (Boolean)

    whether to force path style URLs for S3 objects.

  • s3BucketEndpoint (Boolean)

    whether the provided endpoint addresses an individual bucket (false if it addresses the root API endpoint). Note that setting this configuration option requires an endpoint to be provided explicitly to the service constructor.

  • s3DisableBodySigning (Boolean)

    whether S3 body signing should be disabled when using signature version v4. Body signing can only be disabled when using https. Defaults to true.

  • s3UsEast1RegionalEndpoint ('legacy'|'regional')

    when region is set to 'us-east-1', whether to send s3 request to global endpoints or 'us-east-1' regional endpoints. This config is only applicable to S3 client. Defaults to legacy

  • s3UseArnRegion (Boolean)

    whether to override the request region with the region inferred from requested resource's ARN. Only available for S3 buckets Defaults to true

  • retryDelayOptions (map)

    A set of options to configure the retry delay on retryable errors. Currently supported options are:

    • base [Integer] — The base number of milliseconds to use in the exponential backoff for operation retries. Defaults to 100 ms for all services except DynamoDB, where it defaults to 50ms.
    • customBackoff [function] — A custom function that accepts a retry count and error and returns the amount of time to delay in milliseconds. If the result is a non-zero negative value, no further retry attempts will be made. The base option will be ignored if this option is supplied. The function is only called for retryable errors.
  • httpOptions (map)

    A set of options to pass to the low-level HTTP request. Currently supported options are:

    • proxy [String] — the URL to proxy requests through
    • agent [http.Agent, https.Agent] — the Agent object to perform HTTP requests with. Used for connection pooling. Defaults to the global agent (http.globalAgent) for non-SSL connections. Note that for SSL connections, a special Agent object is used in order to enable peer certificate verification. This feature is only available in the Node.js environment.
    • connectTimeout [Integer] — Sets the socket to timeout after failing to establish a connection with the server after connectTimeout milliseconds. This timeout has no effect once a socket connection has been established.
    • timeout [Integer] — Sets the socket to timeout after timeout milliseconds of inactivity on the socket. Defaults to two minutes (120000).
    • xhrAsync [Boolean] — Whether the SDK will send asynchronous HTTP requests. Used in the browser environment only. Set to false to send requests synchronously. Defaults to true (async on).
    • xhrWithCredentials [Boolean] — Sets the "withCredentials" property of an XMLHttpRequest object. Used in the browser environment only. Defaults to false.
  • apiVersion (String, Date)

    a String in YYYY-MM-DD format (or a date) that represents the latest possible API version that can be used in all services (unless overridden by apiVersions). Specify 'latest' to use the latest possible version.

  • apiVersions (map<String, String|Date>)

    a map of service identifiers (the lowercase service class name) with the API version to use when instantiating a service. Specify 'latest' for each individual that can use the latest available version.

  • logger (#write, #log)

    an object that responds to .write() (like a stream) or .log() (like the console object) in order to log information about requests

  • systemClockOffset (Number)

    an offset value in milliseconds to apply to all signing times. Use this to compensate for clock skew when your system may be out of sync with the service time. Note that this configuration option can only be applied to the global AWS.config object and cannot be overridden in service-specific configuration. Defaults to 0 milliseconds.

  • signatureVersion (String)

    the signature version to sign requests with (overriding the API configuration). Possible values are: 'v2', 'v3', 'v4'.

  • signatureCache (Boolean)

    whether the signature to sign requests with (overriding the API configuration) is cached. Only applies to the signature version 'v4'. Defaults to true.

  • dynamoDbCrc32 (Boolean)

    whether to validate the CRC32 checksum of HTTP response bodies returned by DynamoDB. Default: true.

  • useAccelerateEndpoint (Boolean)

    Whether to use the S3 Transfer Acceleration endpoint with the S3 service. Default: false.

  • clientSideMonitoring (Boolean)

    whether to collect and publish this client's performance metrics of all its API requests.

  • endpointDiscoveryEnabled (Boolean|undefined)

    whether to call operations with endpoints given by service dynamically. Setting this

  • endpointCacheSize (Number)

    the size of the global cache storing endpoints from endpoint discovery operations. Once endpoint cache is created, updating this setting cannot change existing cache size. Defaults to 1000

  • hostPrefixEnabled (Boolean)

    whether to marshal request parameters to the prefix of hostname. Defaults to true.

  • stsRegionalEndpoints ('legacy'|'regional')

    whether to send sts request to global endpoints or regional endpoints. Defaults to 'legacy'.

  • useFipsEndpoint (Boolean)

    Enables FIPS compatible endpoints. Defaults to false.

  • useDualstackEndpoint (Boolean)

    Enables IPv6 dualstack endpoint. Defaults to false.

Property Details

endpointAWS.Endpoint (readwrite)

Returns an Endpoint object representing the endpoint URL for service requests.

Returns:

  • (AWS.Endpoint)

    an Endpoint object representing the endpoint URL for service requests.

Method Details

acceptAdministratorInvitation(params = {}, callback) ⇒ AWS.Request

Accepts the invitation to be a member account and be monitored by the Security Hub administrator account that the invitation was sent from.

This operation is only used by member accounts that are not added through Organizations.

When the member account accepts the invitation, permission is granted to the administrator account to view findings generated in the member account.

Service Reference:

Examples:

To accept an invitation be a member account


/* The following example demonstrates how an account can accept an invitation from the Security Hub administrator account to be a member account. This operation is applicable only to member accounts that are not added through AWS Organizations. */

 var params = {
  AdministratorId: "123456789012", 
  InvitationId: "7ab938c5d52d7904ad09f9e7c20cc4eb"
 };
 securityhub.acceptAdministratorInvitation(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
   }
   */
 });

Calling the acceptAdministratorInvitation operation

var params = {
  AdministratorId: 'STRING_VALUE', /* required */
  InvitationId: 'STRING_VALUE' /* required */
};
securityhub.acceptAdministratorInvitation(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • AdministratorId — (String)

      The account ID of the Security Hub administrator account that sent the invitation.

    • InvitationId — (String)

      The identifier of the invitation sent from the Security Hub administrator account.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

acceptInvitation(params = {}, callback) ⇒ AWS.Request

This method is deprecated. Instead, use AcceptAdministratorInvitation.

The Security Hub console continues to use AcceptInvitation. It will eventually change to use AcceptAdministratorInvitation. Any IAM policies that specifically control access to this function must continue to use AcceptInvitation. You should also add AcceptAdministratorInvitation to your policies to ensure that the correct permissions are in place after the console begins to use AcceptAdministratorInvitation.

Accepts the invitation to be a member account and be monitored by the Security Hub administrator account that the invitation was sent from.

This operation is only used by member accounts that are not added through Organizations.

When the member account accepts the invitation, permission is granted to the administrator account to view findings generated in the member account.

Service Reference:

Examples:

Calling the acceptInvitation operation

var params = {
  InvitationId: 'STRING_VALUE', /* required */
  MasterId: 'STRING_VALUE' /* required */
};
securityhub.acceptInvitation(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • MasterId — (String)

      The account ID of the Security Hub administrator account that sent the invitation.

    • InvitationId — (String)

      The identifier of the invitation sent from the Security Hub administrator account.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

batchDeleteAutomationRules(params = {}, callback) ⇒ AWS.Request

Deletes one or more automation rules.

Service Reference:

Examples:

To delete one or more automation rules


/* The following example deletes the specified automation rules. */

 var params = {
  AutomationRulesArns: [
     "arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
     "arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE22222"
  ]
 };
 securityhub.batchDeleteAutomationRules(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    ProcessedAutomationRules: [
       "arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111"
    ], 
    UnprocessedAutomationRules: [
       {
      ErrorCode: 500, 
      ErrorMessage: "InternalException", 
      RuleArn: "arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE22222"
     }
    ]
   }
   */
 });

Calling the batchDeleteAutomationRules operation

var params = {
  AutomationRulesArns: [ /* required */
    'STRING_VALUE',
    /* more items */
  ]
};
securityhub.batchDeleteAutomationRules(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • AutomationRulesArns — (Array<String>)

      A list of Amazon Resource Names (ARNs) for the rules that are to be deleted.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • ProcessedAutomationRules — (Array<String>)

        A list of properly processed rule ARNs.

      • UnprocessedAutomationRules — (Array<map>)

        A list of objects containing RuleArn, ErrorCode, and ErrorMessage. This parameter tells you which automation rules the request didn't delete and why.

        • RuleArn — (String)

          The Amazon Resource Name (ARN) for the unprocessed automation rule.

        • ErrorCode — (Integer)

          The error code associated with the unprocessed automation rule.

        • ErrorMessage — (String)

          An error message describing why a request didn't process a specific rule.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

batchDisableStandards(params = {}, callback) ⇒ AWS.Request

Disables the standards specified by the provided StandardsSubscriptionArns.

For more information, see Security Standards section of the Security Hub User Guide.

Service Reference:

Examples:

To disable one or more security standards


/* The following example disables a security standard in Security Hub. */

 var params = {
  StandardsSubscriptionArns: [
     "arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1"
  ]
 };
 securityhub.batchDisableStandards(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    StandardsSubscriptions: [
       {
      StandardsArn: "arn:aws:securityhub:eu-central-1::standards/pci-dss/v/3.2.1", 
      StandardsInput: {
      }, 
      StandardsStatus: "DELETING", 
      StandardsSubscriptionArn: "arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1"
     }
    ]
   }
   */
 });

Calling the batchDisableStandards operation

var params = {
  StandardsSubscriptionArns: [ /* required */
    'STRING_VALUE',
    /* more items */
  ]
};
securityhub.batchDisableStandards(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • StandardsSubscriptionArns — (Array<String>)

      The ARNs of the standards subscriptions to disable.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • StandardsSubscriptions — (Array<map>)

        The details of the standards subscriptions that were disabled.

        • StandardsSubscriptionArnrequired — (String)

          The ARN of a resource that represents your subscription to a supported standard.

        • StandardsArnrequired — (String)

          The ARN of a standard.

        • StandardsInputrequired — (map<String>)

          A key-value pair of input for the standard.

        • StandardsStatusrequired — (String)

          The status of the standard subscription.

          The status values are as follows:

          • PENDING - Standard is in the process of being enabled.

          • READY - Standard is enabled.

          • INCOMPLETE - Standard could not be enabled completely. Some controls may not be available.

          • DELETING - Standard is in the process of being disabled.

          • FAILED - Standard could not be disabled.

          Possible values include:
          • "PENDING"
          • "READY"
          • "FAILED"
          • "DELETING"
          • "INCOMPLETE"
        • StandardsStatusReason — (map)

          The reason for the current status.

          • StatusReasonCoderequired — (String)

            The reason code that represents the reason for the current status of a standard subscription.

            Possible values include:
            • "NO_AVAILABLE_CONFIGURATION_RECORDER"
            • "INTERNAL_ERROR"

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

batchEnableStandards(params = {}, callback) ⇒ AWS.Request

Enables the standards specified by the provided StandardsArn. To obtain the ARN for a standard, use the DescribeStandards operation.

For more information, see the Security Standards section of the Security Hub User Guide.

Service Reference:

Examples:

To enable security standards


/* The following example enables the security standard specified by the StandardArn. You can use this operation to enable one or more Security Hub standards. */

 var params = {
  StandardsSubscriptionRequests: [
     {
    StandardsArn: "arn:aws:securityhub:us-west-1::standards/pci-dss/v/3.2.1"
   }
  ]
 };
 securityhub.batchEnableStandards(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    StandardsSubscriptions: [
       {
      StandardsArn: "arn:aws:securityhub:us-west-1::standards/pci-dss/v/3.2.1", 
      StandardsInput: {
      }, 
      StandardsStatus: "PENDING", 
      StandardsSubscriptionArn: "arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1"
     }
    ]
   }
   */
 });

Calling the batchEnableStandards operation

var params = {
  StandardsSubscriptionRequests: [ /* required */
    {
      StandardsArn: 'STRING_VALUE', /* required */
      StandardsInput: {
        '<NonEmptyString>': 'STRING_VALUE',
        /* '<NonEmptyString>': ... */
      }
    },
    /* more items */
  ]
};
securityhub.batchEnableStandards(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • StandardsSubscriptionRequests — (Array<map>)

      The list of standards checks to enable.

      • StandardsArnrequired — (String)

        The ARN of the standard that you want to enable. To view the list of available standards and their ARNs, use the DescribeStandards operation.

      • StandardsInput — (map<String>)

        A key-value pair of input for the standard.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • StandardsSubscriptions — (Array<map>)

        The details of the standards subscriptions that were enabled.

        • StandardsSubscriptionArnrequired — (String)

          The ARN of a resource that represents your subscription to a supported standard.

        • StandardsArnrequired — (String)

          The ARN of a standard.

        • StandardsInputrequired — (map<String>)

          A key-value pair of input for the standard.

        • StandardsStatusrequired — (String)

          The status of the standard subscription.

          The status values are as follows:

          • PENDING - Standard is in the process of being enabled.

          • READY - Standard is enabled.

          • INCOMPLETE - Standard could not be enabled completely. Some controls may not be available.

          • DELETING - Standard is in the process of being disabled.

          • FAILED - Standard could not be disabled.

          Possible values include:
          • "PENDING"
          • "READY"
          • "FAILED"
          • "DELETING"
          • "INCOMPLETE"
        • StandardsStatusReason — (map)

          The reason for the current status.

          • StatusReasonCoderequired — (String)

            The reason code that represents the reason for the current status of a standard subscription.

            Possible values include:
            • "NO_AVAILABLE_CONFIGURATION_RECORDER"
            • "INTERNAL_ERROR"

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

batchGetAutomationRules(params = {}, callback) ⇒ AWS.Request

Retrieves a list of details for automation rules based on rule Amazon Resource Names (ARNs).

Service Reference:

Examples:

To update one ore more automation rules


/* The following example updates the specified automation rules. */

 var params = {
  AutomationRulesArns: [
     "arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
     "arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE22222"
  ]
 };
 securityhub.batchGetAutomationRules(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    Rules: [
       {
      Actions: [
         {
        FindingFieldsUpdate: {
         Workflow: {
          Status: "RESOLVED"
         }
        }, 
        Type: "FINDING_FIELDS_UPDATE"
       }
      ], 
      CreatedAt: <Date Representation>, 
      CreatedBy: "AROAJURBUYQQNL5OL2TIM:TEST-16MJ75L9VBK14", 
      Criteria: {
       AwsAccountId: [
          {
         Comparison: "EQUALS", 
         Value: "111122223333"
        }
       ], 
       FirstObservedAt: [
          {
         DateRange: {
          Unit: "DAYS", 
          Value: 5
         }
        }
       ], 
       Type: [
          {
         Comparison: "EQUALS", 
         Value: "Software and Configuration Checks/Industry and Regulatory Standards"
        }
       ]
      }, 
      Description: "sample rule description 1", 
      RuleArn: "arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
      RuleName: "sample-rule-name-1", 
      RuleOrder: 1, 
      RuleStatus: "ENABLED", 
      UpdatedAt: <Date Representation>
     }, 
       {
      Actions: [
         {
        FindingFieldsUpdate: {
         Workflow: {
          Status: "RESOLVED"
         }
        }, 
        Type: "FINDING_FIELDS_UPDATE"
       }
      ], 
      CreatedAt: <Date Representation>, 
      CreatedBy: "AROAJURBUYQQNL5OL2TIM:TEST-16MJ75L9VBK14", 
      Criteria: {
       ResourceType: [
          {
         Comparison: "EQUALS", 
         Value: "Ec2Instance"
        }
       ], 
       SeverityLabel: [
          {
         Comparison: "EQUALS", 
         Value: "INFORMATIONAL"
        }
       ]
      }, 
      Description: "Sample rule description 2", 
      RuleArn: "arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE22222", 
      RuleName: "sample-rule-name-2", 
      RuleOrder: 2, 
      RuleStatus: "ENABLED", 
      UpdatedAt: <Date Representation>
     }
    ]
   }
   */
 });

Calling the batchGetAutomationRules operation

var params = {
  AutomationRulesArns: [ /* required */
    'STRING_VALUE',
    /* more items */
  ]
};
securityhub.batchGetAutomationRules(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • AutomationRulesArns — (Array<String>)

      A list of rule ARNs to get details for.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • Rules — (Array<map>)

        A list of rule details for the provided rule ARNs.

        • RuleArn — (String)

          The Amazon Resource Name (ARN) of a rule.

        • RuleStatus — (String)

          Whether the rule is active after it is created. If this parameter is equal to ENABLED, Security Hub starts applying the rule to findings and finding updates after the rule is created.

          Possible values include:
          • "ENABLED"
          • "DISABLED"
        • RuleOrder — (Integer)

          An integer ranging from 1 to 1000 that represents the order in which the rule action is applied to findings. Security Hub applies rules with lower values for this parameter first.

        • RuleName — (String)

          The name of the rule.

        • Description — (String)

          A description of the rule.

        • IsTerminal — (Boolean)

          Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding matches the criteria for multiple rules, and each rule has different actions. If a rule is terminal, Security Hub applies the rule action to a finding that matches the rule criteria and doesn't evaluate other rules for the finding. By default, a rule isn't terminal.

        • Criteria — (map)

          A set of Amazon Web Services Security Finding Format finding field attributes and corresponding expected values that Security Hub uses to filter findings. If a rule is enabled and a finding matches the conditions specified in this parameter, Security Hub applies the rule action to the finding.

          • ProductArn — (Array<map>)

            The Amazon Resource Name (ARN) for a third-party product that generated a finding in Security Hub.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • AwsAccountId — (Array<map>)

            The Amazon Web Services account ID in which a finding was generated.

            Array Members: Minimum number of 1 item. Maximum number of 100 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • Id — (Array<map>)

            The product-specific identifier for a finding.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • GeneratorId — (Array<map>)

            The identifier for the solution-specific component that generated a finding.

            Array Members: Minimum number of 1 item. Maximum number of 100 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • Type — (Array<map>)

            One or more finding types in the format of namespace/category/classifier that classify a finding. For a list of namespaces, classifiers, and categories, see Types taxonomy for ASFF in the Security Hub User Guide.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • FirstObservedAt — (Array<map>)

            A timestamp that indicates when the potential security issue captured by a finding was first observed by the security findings product.

            Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Start — (String)

              A timestamp that provides the start date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • End — (String)

              A timestamp that provides the end date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • DateRange — (map)

              A date range for the date filter.

              • Value — (Integer)

                A date range value for the date filter.

              • Unit — (String)

                A date range unit for the date filter.

                Possible values include:
                • "DAYS"
          • LastObservedAt — (Array<map>)

            A timestamp that indicates when the potential security issue captured by a finding was most recently observed by the security findings product.

            Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Start — (String)

              A timestamp that provides the start date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • End — (String)

              A timestamp that provides the end date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • DateRange — (map)

              A date range for the date filter.

              • Value — (Integer)

                A date range value for the date filter.

              • Unit — (String)

                A date range unit for the date filter.

                Possible values include:
                • "DAYS"
          • CreatedAt — (Array<map>)

            A timestamp that indicates when this finding record was created.

            Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Start — (String)

              A timestamp that provides the start date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • End — (String)

              A timestamp that provides the end date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • DateRange — (map)

              A date range for the date filter.

              • Value — (Integer)

                A date range value for the date filter.

              • Unit — (String)

                A date range unit for the date filter.

                Possible values include:
                • "DAYS"
          • UpdatedAt — (Array<map>)

            A timestamp that indicates when the finding record was most recently updated.

            Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Start — (String)

              A timestamp that provides the start date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • End — (String)

              A timestamp that provides the end date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • DateRange — (map)

              A date range for the date filter.

              • Value — (Integer)

                A date range value for the date filter.

              • Unit — (String)

                A date range unit for the date filter.

                Possible values include:
                • "DAYS"
          • Confidence — (Array<map>)

            The likelihood that a finding accurately identifies the behavior or issue that it was intended to identify. Confidence is scored on a 0–100 basis using a ratio scale. A value of 0 means 0 percent confidence, and a value of 100 means 100 percent confidence. For example, a data exfiltration detection based on a statistical deviation of network traffic has low confidence because an actual exfiltration hasn't been verified. For more information, see Confidence in the Security Hub User Guide.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Gte — (Float)

              The greater-than-equal condition to be applied to a single field when querying for findings.

            • Lte — (Float)

              The less-than-equal condition to be applied to a single field when querying for findings.

            • Gt — (Float)

              The greater-than condition to be applied to a single field when querying for findings.

            • Lt — (Float)

              The less-than condition to be applied to a single field when querying for findings.

            • Eq — (Float)

              The equal-to condition to be applied to a single field when querying for findings.

          • Criticality — (Array<map>)

            The level of importance that is assigned to the resources that are associated with a finding. Criticality is scored on a 0–100 basis, using a ratio scale that supports only full integers. A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources. For more information, see Criticality in the Security Hub User Guide.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Gte — (Float)

              The greater-than-equal condition to be applied to a single field when querying for findings.

            • Lte — (Float)

              The less-than-equal condition to be applied to a single field when querying for findings.

            • Gt — (Float)

              The greater-than condition to be applied to a single field when querying for findings.

            • Lt — (Float)

              The less-than condition to be applied to a single field when querying for findings.

            • Eq — (Float)

              The equal-to condition to be applied to a single field when querying for findings.

          • Title — (Array<map>)

            A finding's title.

            Array Members: Minimum number of 1 item. Maximum number of 100 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • Description — (Array<map>)

            A finding's description.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • SourceUrl — (Array<map>)

            Provides a URL that links to a page about the current finding in the finding product.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ProductName — (Array<map>)

            Provides the name of the product that generated the finding. For control-based findings, the product name is Security Hub.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • CompanyName — (Array<map>)

            The name of the company for the product that generated the finding. For control-based findings, the company is Amazon Web Services.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • SeverityLabel — (Array<map>)

            The severity value of the finding.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceType — (Array<map>)

            The type of resource that the finding pertains to.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceId — (Array<map>)

            The identifier for the given resource type. For Amazon Web Services resources that are identified by Amazon Resource Names (ARNs), this is the ARN. For Amazon Web Services resources that lack ARNs, this is the identifier as defined by the Amazon Web Service that created the resource. For non-Amazon Web Services resources, this is a unique identifier that is associated with the resource.

            Array Members: Minimum number of 1 item. Maximum number of 100 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourcePartition — (Array<map>)

            The partition in which the resource that the finding pertains to is located. A partition is a group of Amazon Web Services Regions. Each Amazon Web Services account is scoped to one partition.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceRegion — (Array<map>)

            The Amazon Web Services Region where the resource that a finding pertains to is located.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceTags — (Array<map>)

            A list of Amazon Web Services tags associated with a resource at the time the finding was processed.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Key — (String)

              The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

            • Value — (String)

              The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

            • Comparison — (String)

              The condition to apply to the key value when filtering Security Hub findings with a map filter.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

              • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

              CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

              To search for values that don't have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

              • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

              NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

              CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceDetailsOther — (Array<map>)

            Custom fields and values about the resource that a finding pertains to.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Key — (String)

              The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

            • Value — (String)

              The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

            • Comparison — (String)

              The condition to apply to the key value when filtering Security Hub findings with a map filter.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

              • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

              CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

              To search for values that don't have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

              • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

              NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

              CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ComplianceStatus — (Array<map>)

            The result of a security check. This field is only used for findings generated from controls.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ComplianceSecurityControlId — (Array<map>)

            The security control ID for which a finding was generated. Security control IDs are the same across standards.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ComplianceAssociatedStandardsId — (Array<map>)

            The unique identifier of a standard in which a control is enabled. This field consists of the resource portion of the Amazon Resource Name (ARN) returned for a standard in the DescribeStandards API response.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • VerificationState — (Array<map>)

            Provides the veracity of a finding.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • WorkflowStatus — (Array<map>)

            Provides information about the status of the investigation into a finding.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • RecordState — (Array<map>)

            Provides the current state of a finding.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • RelatedFindingsProductArn — (Array<map>)

            The ARN for the product that generated a related finding.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • RelatedFindingsId — (Array<map>)

            The product-generated identifier for a related finding.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • NoteText — (Array<map>)

            The text of a user-defined note that's added to a finding.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • NoteUpdatedAt — (Array<map>)

            The timestamp of when the note was updated. Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Start — (String)

              A timestamp that provides the start date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • End — (String)

              A timestamp that provides the end date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • DateRange — (map)

              A date range for the date filter.

              • Value — (Integer)

                A date range value for the date filter.

              • Unit — (String)

                A date range unit for the date filter.

                Possible values include:
                • "DAYS"
          • NoteUpdatedBy — (Array<map>)

            The principal that created a note.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • UserDefinedFields — (Array<map>)

            A list of user-defined name and value string pairs added to a finding.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Key — (String)

              The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

            • Value — (String)

              The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

            • Comparison — (String)

              The condition to apply to the key value when filtering Security Hub findings with a map filter.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

              • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

              CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

              To search for values that don't have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

              • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

              NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

              CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceApplicationArn — (Array<map>)

            The Amazon Resource Name (ARN) of the application that is related to a finding.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceApplicationName — (Array<map>)

            The name of the application that is related to a finding.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • AwsAccountName — (Array<map>)

            The name of the Amazon Web Services account in which a finding was generated.

            Array Members: Minimum number of 1 item. Maximum number of 20 items.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
        • Actions — (Array<map>)

          One or more actions to update finding fields if a finding matches the defined criteria of the rule.

          • Type — (String)

            Specifies that the rule action should update the Types finding field. The Types finding field classifies findings in the format of namespace/category/classifier. For more information, see Types taxonomy for ASFF in the Security Hub User Guide.

            Possible values include:
            • "FINDING_FIELDS_UPDATE"
          • FindingFieldsUpdate — (map)

            Specifies that the automation rule action is an update to a finding field.

            • Note — (map)

              The updated note.

              • Textrequired — (String)

                The updated note text.

              • UpdatedByrequired — (String)

                The principal that updated the note.

            • Severity — (map)

              Updates to the severity information for a finding.

              • Normalized — (Integer)

                The normalized severity for the finding. This attribute is to be deprecated in favor of Label.

                If you provide Normalized and do not provide Label, Label is set automatically as follows.

                • 0 - INFORMATIONAL

                • 1–39 - LOW

                • 40–69 - MEDIUM

                • 70–89 - HIGH

                • 90–100 - CRITICAL

              • Product — (Float)

                The native severity as defined by the Amazon Web Services service or integrated partner product that generated the finding.

              • Label — (String)

                The severity value of the finding. The allowed values are the following.

                • INFORMATIONAL - No issue was found.

                • LOW - The issue does not require action on its own.

                • MEDIUM - The issue must be addressed but not urgently.

                • HIGH - The issue must be addressed as a priority.

                • CRITICAL - The issue must be remediated immediately to avoid it escalating.

                Possible values include:
                • "INFORMATIONAL"
                • "LOW"
                • "MEDIUM"
                • "HIGH"
                • "CRITICAL"
            • VerificationState — (String)

              The rule action updates the VerificationState field of a finding.

              Possible values include:
              • "UNKNOWN"
              • "TRUE_POSITIVE"
              • "FALSE_POSITIVE"
              • "BENIGN_POSITIVE"
            • Confidence — (Integer)

              The rule action updates the Confidence field of a finding.

            • Criticality — (Integer)

              The rule action updates the Criticality field of a finding.

            • Types — (Array<String>)

              The rule action updates the Types field of a finding.

            • UserDefinedFields — (map<String>)

              The rule action updates the UserDefinedFields field of a finding.

            • Workflow — (map)

              Used to update information about the investigation into the finding.

              • Status — (String)

                The status of the investigation into the finding. The workflow status is specific to an individual finding. It does not affect the generation of new findings. For example, setting the workflow status to SUPPRESSED or RESOLVED does not prevent a new finding for the same issue.

                The allowed values are the following.

                • NEW - The initial state of a finding, before it is reviewed.

                  Security Hub also resets WorkFlowStatus from NOTIFIED or RESOLVED to NEW in the following cases:

                  • The record state changes from ARCHIVED to ACTIVE.

                  • The compliance status changes from PASSED to either WARNING, FAILED, or NOT_AVAILABLE.

                • NOTIFIED - Indicates that you notified the resource owner about the security issue. Used when the initial reviewer is not the resource owner, and needs intervention from the resource owner.

                • RESOLVED - The finding was reviewed and remediated and is now considered resolved.

                • SUPPRESSED - Indicates that you reviewed the finding and do not believe that any action is needed. The finding is no longer updated.

                Possible values include:
                • "NEW"
                • "NOTIFIED"
                • "RESOLVED"
                • "SUPPRESSED"
            • RelatedFindings — (Array<map>)

              The rule action updates the RelatedFindings field of a finding.

              • ProductArnrequired — (String)

                The ARN of the product that generated a related finding.

              • Idrequired — (String)

                The product-generated identifier for a related finding.

        • CreatedAt — (Date)

          A timestamp that indicates when the rule was created.

          Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.

        • UpdatedAt — (Date)

          A timestamp that indicates when the rule was most recently updated.

          Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.

        • CreatedBy — (String)

          The principal that created a rule.

      • UnprocessedAutomationRules — (Array<map>)

        A list of objects containing RuleArn, ErrorCode, and ErrorMessage. This parameter tells you which automation rules the request didn't retrieve and why.

        • RuleArn — (String)

          The Amazon Resource Name (ARN) for the unprocessed automation rule.

        • ErrorCode — (Integer)

          The error code associated with the unprocessed automation rule.

        • ErrorMessage — (String)

          An error message describing why a request didn't process a specific rule.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

batchGetConfigurationPolicyAssociations(params = {}, callback) ⇒ AWS.Request

Returns associations between an Security Hub configuration and a batch of target accounts, organizational units, or the root. Only the Security Hub delegated administrator can invoke this operation from the home Region. A configuration can refer to a configuration policy or to a self-managed configuration.

Examples:

To get configuration associations for a batch of targets


/* This operation provides details about configuration associations for a batch of target accounts, organizational units, or the root. */

 var params = {
  ConfigurationPolicyAssociationIdentifiers: [
     {
    Target: {
     AccountId: "111122223333"
    }
   }, 
     {
    Target: {
     RootId: "r-f6g7h8i9j0example"
    }
   }
  ]
 };
 securityhub.batchGetConfigurationPolicyAssociations(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    ConfigurationPolicyAssociations: [
       {
      AssociationStatus: "SUCCESS", 
      AssociationStatusMessage: "This field is only populated for a failed association", 
      AssociationType: "INHERITED", 
      ConfigurationPolicyId: "a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
      TargetId: "111122223333", 
      TargetType: "ACCOUNT", 
      UpdatedAt: <Date Representation>
     }
    ], 
    UnprocessedConfigurationPolicyAssociations: [
       {
      ConfigurationPolicyAssociationIdentifiers: {
       Target: {
        RootId: "r-f6g7h8i9j0example"
       }
      }, 
      ErrorCode: "400", 
      ErrorReason: "You do not have sufficient access to perform this action."
     }
    ]
   }
   */
 });

Calling the batchGetConfigurationPolicyAssociations operation

var params = {
  ConfigurationPolicyAssociationIdentifiers: [ /* required */
    {
      Target: {
        AccountId: 'STRING_VALUE',
        OrganizationalUnitId: 'STRING_VALUE',
        RootId: 'STRING_VALUE'
      }
    },
    /* more items */
  ]
};
securityhub.batchGetConfigurationPolicyAssociations(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • ConfigurationPolicyAssociationIdentifiers — (Array<map>)

      Specifies one or more target account IDs, organizational unit (OU) IDs, or the root ID to retrieve associations for.

      • Target — (map)

        The target account, organizational unit, or the root.

        • AccountId — (String)

          The Amazon Web Services account ID of the target account.

        • OrganizationalUnitId — (String)

          The organizational unit ID of the target organizational unit.

        • RootId — (String)

          The ID of the organization root.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • ConfigurationPolicyAssociations — (Array<map>)

        Describes associations for the target accounts, OUs, or the root.

        • ConfigurationPolicyId — (String)

          The universally unique identifier (UUID) of the configuration policy.

        • TargetId — (String)

          The identifier of the target account, organizational unit, or the root.

        • TargetType — (String)

          Specifies whether the target is an Amazon Web Services account, organizational unit, or the root.

          Possible values include:
          • "ACCOUNT"
          • "ORGANIZATIONAL_UNIT"
        • AssociationType — (String)

          Indicates whether the association between the specified target and the configuration was directly applied by the Security Hub delegated administrator or inherited from a parent.

          Possible values include:
          • "INHERITED"
          • "APPLIED"
        • UpdatedAt — (Date)

          The date and time, in UTC and ISO 8601 format, that the configuration policy association was last updated.

        • AssociationStatus — (String)

          The current status of the association between the specified target and the configuration.

          Possible values include:
          • "PENDING"
          • "SUCCESS"
          • "FAILED"
        • AssociationStatusMessage — (String)

          The explanation for a FAILED value for AssociationStatus.

      • UnprocessedConfigurationPolicyAssociations — (Array<map>)

        An array of configuration policy associations, one for each configuration policy association identifier, that was specified in the request but couldn’t be processed due to an error.

        • ConfigurationPolicyAssociationIdentifiers — (map)

          Configuration policy association identifiers that were specified in a BatchGetConfigurationPolicyAssociations request but couldn’t be processed due to an error.

          • Target — (map)

            The target account, organizational unit, or the root.

            • AccountId — (String)

              The Amazon Web Services account ID of the target account.

            • OrganizationalUnitId — (String)

              The organizational unit ID of the target organizational unit.

            • RootId — (String)

              The ID of the organization root.

        • ErrorCode — (String)

          An HTTP status code that identifies why the configuration policy association failed.

        • ErrorReason — (String)

          A string that identifies why the configuration policy association failed.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

batchGetSecurityControls(params = {}, callback) ⇒ AWS.Request

Provides details about a batch of security controls for the current Amazon Web Services account and Amazon Web Services Region.

Service Reference:

Examples:

To get security control details


/* The following example gets details for the specified controls in the current AWS account and AWS Region. */

 var params = {
  SecurityControlIds: [
     "ACM.1", 
     "APIGateway.1"
  ]
 };
 securityhub.batchGetSecurityControls(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    SecurityControls: [
       {
      Description: "This AWS control checks whether ACM Certificates in your account are marked for expiration within a specified time period. Certificates provided by ACM are automatically renewed. ACM does not automatically renew certificates that you import.", 
      LastUpdateReason: "Stayed with default value", 
      Parameters: {
       "daysToExpiration": {
         Value: {
          Integer: 30
         }, 
         ValueType: "DEFAULT"
        }
      }, 
      RemediationUrl: "https://docs.aws.amazon.com/console/securityhub/ACM.1/remediation", 
      SecurityControlArn: "arn:aws:securityhub:us-west-2:123456789012:security-control/ACM.1", 
      SecurityControlId: "ACM.1", 
      SecurityControlStatus: "ENABLED", 
      SeverityRating: "MEDIUM", 
      Title: "Imported and ACM-issued certificates should be renewed after a specified time period", 
      UpdateStatus: "UPDATING"
     }, 
       {
      Description: "This control checks whether all stages of Amazon API Gateway REST and WebSocket APIs have logging enabled. The control fails if logging is not enabled for all methods of a stage or if loggingLevel is neither ERROR nor INFO.", 
      LastUpdateReason: "Updated control parameters to comply with internal requirements", 
      Parameters: {
       "loggingLevel": {
         Value: {
          Enum: "ERROR"
         }, 
         ValueType: "CUSTOM"
        }
      }, 
      RemediationUrl: "https://docs.aws.amazon.com/console/securityhub/APIGateway.1/remediation", 
      SecurityControlArn: "arn:aws:securityhub:us-west-2:123456789012:security-control/APIGateway.1", 
      SecurityControlId: "APIGateway.1", 
      SecurityControlStatus: "ENABLED", 
      SeverityRating: "MEDIUM", 
      Title: "API Gateway REST and WebSocket API execution logging should be enabled", 
      UpdateStatus: "UPDATING"
     }
    ]
   }
   */
 });

Calling the batchGetSecurityControls operation

var params = {
  SecurityControlIds: [ /* required */
    'STRING_VALUE',
    /* more items */
  ]
};
securityhub.batchGetSecurityControls(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • SecurityControlIds — (Array<String>)

      A list of security controls (identified with SecurityControlId, SecurityControlArn, or a mix of both parameters). The security control ID or Amazon Resource Name (ARN) is the same across standards.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • SecurityControls — (Array<map>)

        An array that returns the identifier, Amazon Resource Name (ARN), and other details about a security control. The same information is returned whether the request includes SecurityControlId or SecurityControlArn.

        • SecurityControlIdrequired — (String)

          The unique identifier of a security control across standards. Values for this field typically consist of an Amazon Web Service name and a number, such as APIGateway.3.

        • SecurityControlArnrequired — (String)

          The Amazon Resource Name (ARN) for a security control across standards, such as arn:aws:securityhub:eu-central-1:123456789012:security-control/S3.1. This parameter doesn't mention a specific standard.

        • Titlerequired — (String)

          The title of a security control.

        • Descriptionrequired — (String)

          The description of a security control across standards. This typically summarizes how Security Hub evaluates the control and the conditions under which it produces a failed finding. This parameter doesn't reference a specific standard.

        • RemediationUrlrequired — (String)

          A link to Security Hub documentation that explains how to remediate a failed finding for a security control.

        • SeverityRatingrequired — (String)

          The severity of a security control. For more information about how Security Hub determines control severity, see Assigning severity to control findings in the Security Hub User Guide.

          Possible values include:
          • "LOW"
          • "MEDIUM"
          • "HIGH"
          • "CRITICAL"
        • SecurityControlStatusrequired — (String)

          The enablement status of a security control in a specific standard.

          Possible values include:
          • "ENABLED"
          • "DISABLED"
        • UpdateStatus — (String)

          Identifies whether customizable properties of a security control are reflected in Security Hub findings. A status of READY indicates findings include the current parameter values. A status of UPDATING indicates that all findings may not include the current parameter values.

          Possible values include:
          • "READY"
          • "UPDATING"
        • Parameters — (map<map>)

          An object that identifies the name of a control parameter, its current value, and whether it has been customized.

          • ValueTyperequired — (String)

            Identifies whether a control parameter uses a custom user-defined value or subscribes to the default Security Hub behavior.

            When ValueType is set equal to DEFAULT, the default behavior can be a specific Security Hub default value, or the default behavior can be to ignore a specific parameter. When ValueType is set equal to DEFAULT, Security Hub ignores user-provided input for the Value field.

            When ValueType is set equal to CUSTOM, the Value field can't be empty.

            Possible values include:
            • "DEFAULT"
            • "CUSTOM"
          • Value — (map)

            The current value of a control parameter.

            • Integer — (Integer)

              A control parameter that is an integer.

            • IntegerList — (Array<Integer>)

              A control parameter that is a list of integers.

            • Double — (Float)

              A control parameter that is a double.

            • String — (String)

              A control parameter that is a string.

            • StringList — (Array<String>)

              A control parameter that is a list of strings.

            • Boolean — (Boolean)

              A control parameter that is a boolean.

            • Enum — (String)

              A control parameter that is an enum.

            • EnumList — (Array<String>)

              A control parameter that is a list of enums.

        • LastUpdateReason — (String)

          The most recent reason for updating the customizable properties of a security control. This differs from the UpdateReason field of the BatchUpdateStandardsControlAssociations API, which tracks the reason for updating the enablement status of a control. This field accepts alphanumeric characters in addition to white spaces, dashes, and underscores.

      • UnprocessedIds — (Array<map>)

        A security control (identified with SecurityControlId, SecurityControlArn, or a mix of both parameters) for which details cannot be returned.

        • SecurityControlIdrequired — (String)

          The control (identified with SecurityControlId, SecurityControlArn, or a mix of both parameters) for which a response couldn't be returned.

        • ErrorCoderequired — (String)

          The error code for the unprocessed security control.

          Possible values include:
          • "INVALID_INPUT"
          • "ACCESS_DENIED"
          • "NOT_FOUND"
          • "LIMIT_EXCEEDED"
        • ErrorReason — (String)

          The reason why the security control was unprocessed.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

batchGetStandardsControlAssociations(params = {}, callback) ⇒ AWS.Request

For a batch of security controls and standards, identifies whether each control is currently enabled or disabled in a standard.

Examples:

To get enablement status of a batch of controls


/* The following example retrieves the enablement status of the specified controls in the specified standards. */

 var params = {
  StandardsControlAssociationIds: [
     {
    SecurityControlId: "CloudTrail.1", 
    StandardsArn: "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0"
   }, 
     {
    SecurityControlId: "CloudWatch.12", 
    StandardsArn: "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0"
   }
  ]
 };
 securityhub.batchGetStandardsControlAssociations(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    StandardsControlAssociationDetails: [
       {
      AssociationStatus: "ENABLED", 
      RelatedRequirements: [
         "CIS AWS Foundations 2.1"
      ], 
      SecurityControlArn: "arn:aws:securityhub:us-west-2:110479873537:security-control/CloudTrail.1", 
      SecurityControlId: "CloudTrail.1", 
      StandardsArn: "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0", 
      StandardsControlDescription: "AWS CloudTrail is a web service that records AWS API calls for your account and delivers log files to you. The recorded information includes the identity of the API caller, the time of the API call, the source IP address of the API caller, the request parameters, and the response elements returned by the AWS service.", 
      StandardsControlTitle: "Ensure CloudTrail is enabled in all regions", 
      UpdatedAt: <Date Representation>
     }, 
       {
      AssociationStatus: "ENABLED", 
      RelatedRequirements: [
         "CIS AWS Foundations 3.12"
      ], 
      SecurityControlArn: "arn:aws:securityhub:us-west-2:110479873537:security-control/CloudWatch.12", 
      SecurityControlId: "CloudWatch.12", 
      StandardsArn: "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0", 
      StandardsControlDescription: "Real-time monitoring of API calls can be achieved by directing CloudTrail Logs to CloudWatch Logs and establishing corresponding metric filters and alarms. Network gateways are required to send/receive traffic to a destination outside of a VPC. It is recommended that a metric filter and alarm be established for changes to network gateways.", 
      StandardsControlTitle: "Ensure a log metric filter and alarm exist for changes to network gateways", 
      UpdatedAt: <Date Representation>
     }
    ]
   }
   */
 });

Calling the batchGetStandardsControlAssociations operation

var params = {
  StandardsControlAssociationIds: [ /* required */
    {
      SecurityControlId: 'STRING_VALUE', /* required */
      StandardsArn: 'STRING_VALUE' /* required */
    },
    /* more items */
  ]
};
securityhub.batchGetStandardsControlAssociations(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • StandardsControlAssociationIds — (Array<map>)

      An array with one or more objects that includes a security control (identified with SecurityControlId, SecurityControlArn, or a mix of both parameters) and the Amazon Resource Name (ARN) of a standard. This field is used to query the enablement status of a control in a specified standard. The security control ID or ARN is the same across standards.

      • SecurityControlIdrequired — (String)

        The unique identifier (identified with SecurityControlId, SecurityControlArn, or a mix of both parameters) of a security control across standards.

      • StandardsArnrequired — (String)

        The ARN of a standard.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • StandardsControlAssociationDetails — (Array<map>)

        Provides the enablement status of a security control in a specified standard and other details for the control in relation to the specified standard.

        • StandardsArnrequired — (String)

          The Amazon Resource Name (ARN) of a security standard.

        • SecurityControlIdrequired — (String)

          The unique identifier of a security control across standards. Values for this field typically consist of an Amazon Web Service name and a number, such as APIGateway.3.

        • SecurityControlArnrequired — (String)

          The ARN of a security control across standards, such as arn:aws:securityhub:eu-central-1:123456789012:security-control/S3.1. This parameter doesn't mention a specific standard.

        • AssociationStatusrequired — (String)

          Specifies whether a control is enabled or disabled in a specified standard.

          Possible values include:
          • "ENABLED"
          • "DISABLED"
        • RelatedRequirements — (Array<String>)

          The requirement that underlies a control in the compliance framework related to the standard.

        • UpdatedAt — (Date)

          The time at which the enablement status of the control in the specified standard was last updated.

        • UpdatedReason — (String)

          The reason for updating the enablement status of a control in a specified standard.

        • StandardsControlTitle — (String)

          The title of a control. This field may reference a specific standard.

        • StandardsControlDescription — (String)

          The description of a control. This typically summarizes how Security Hub evaluates the control and the conditions under which it produces a failed finding. This parameter may reference a specific standard.

        • StandardsControlArns — (Array<String>)

          Provides the input parameter that Security Hub uses to call the UpdateStandardsControl API. This API can be used to enable or disable a control in a specified standard.

      • UnprocessedAssociations — (Array<map>)

        A security control (identified with SecurityControlId, SecurityControlArn, or a mix of both parameters) whose enablement status in a specified standard cannot be returned.

        • StandardsControlAssociationIdrequired — (map)

          An array with one or more objects that includes a security control (identified with SecurityControlId, SecurityControlArn, or a mix of both parameters) and the Amazon Resource Name (ARN) of a standard. This parameter shows the specific controls for which the enablement status couldn't be retrieved in specified standards when calling BatchUpdateStandardsControlAssociations.

          • SecurityControlIdrequired — (String)

            The unique identifier (identified with SecurityControlId, SecurityControlArn, or a mix of both parameters) of a security control across standards.

          • StandardsArnrequired — (String)

            The ARN of a standard.

        • ErrorCoderequired — (String)

          The error code for the unprocessed standard and control association.

          Possible values include:
          • "INVALID_INPUT"
          • "ACCESS_DENIED"
          • "NOT_FOUND"
          • "LIMIT_EXCEEDED"
        • ErrorReason — (String)

          The reason why the standard and control association was unprocessed.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

batchImportFindings(params = {}, callback) ⇒ AWS.Request

Imports security findings generated by a finding provider into Security Hub. This action is requested by the finding provider to import its findings into Security Hub.

BatchImportFindings must be called by one of the following:

  • The Amazon Web Services account that is associated with a finding if you are using the default product ARN or are a partner sending findings from within a customer's Amazon Web Services account. In these cases, the identifier of the account that you are calling BatchImportFindings from needs to be the same as the AwsAccountId attribute for the finding.

  • An Amazon Web Services account that Security Hub has allow-listed for an official partner integration. In this case, you can call BatchImportFindings from the allow-listed account and send findings from different customer accounts in the same batch.

The maximum allowed size for a finding is 240 Kb. An error is returned for any finding larger than 240 Kb.

After a finding is created, BatchImportFindings cannot be used to update the following finding fields and objects, which Security Hub customers use to manage their investigation workflow.

  • Note

  • UserDefinedFields

  • VerificationState

  • Workflow

Finding providers also should not use BatchImportFindings to update the following attributes.

  • Confidence

  • Criticality

  • RelatedFindings

  • Severity

  • Types

Instead, finding providers use FindingProviderFields to provide values for these attributes.

Service Reference:

Examples:

To import security findings from a third party provider to Security Hub


/* The following example imports findings from a third party provider to Security Hub. */

 var params = {
  Findings: [
     {
    AwsAccountId: "123456789012", 
    CreatedAt: "2020-05-27T17:05:54.832Z", 
    Description: "Vulnerability in a CloudTrail trail", 
    FindingProviderFields: {
     Severity: {
      Label: "LOW", 
      Original: "10"
     }, 
     Types: [
        "Software and Configuration Checks/Vulnerabilities/CVE"
     ]
    }, 
    GeneratorId: "TestGeneratorId", 
    Id: "Id1", 
    ProductArn: "arn:aws:securityhub:us-west-1:123456789012:product/123456789012/default", 
    Resources: [
       {
      Id: "arn:aws:cloudtrail:us-west-1:123456789012:trail/TrailName", 
      Partition: "aws", 
      Region: "us-west-1", 
      Type: "AwsCloudTrailTrail"
     }
    ], 
    SchemaVersion: "2018-10-08", 
    Title: "CloudTrail trail vulnerability", 
    UpdatedAt: "2020-06-02T16:05:54.832Z"
   }
  ]
 };
 securityhub.batchImportFindings(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    FailedCount: 123, 
    FailedFindings: [
    ], 
    SuccessCount: 123
   }
   */
 });

Calling the batchImportFindings operation

var params = {
  Findings: [ /* required */
    {
      AwsAccountId: 'STRING_VALUE', /* required */
      CreatedAt: 'STRING_VALUE', /* required */
      Description: 'STRING_VALUE', /* required */
      GeneratorId: 'STRING_VALUE', /* required */
      Id: 'STRING_VALUE', /* required */
      ProductArn: 'STRING_VALUE', /* required */
      Resources: [ /* required */
        {
          Id: 'STRING_VALUE', /* required */
          Type: 'STRING_VALUE', /* required */
          ApplicationArn: 'STRING_VALUE',
          ApplicationName: 'STRING_VALUE',
          DataClassification: {
            DetailedResultsLocation: 'STRING_VALUE',
            Result: {
              AdditionalOccurrences: true || false,
              CustomDataIdentifiers: {
                Detections: [
                  {
                    Arn: 'STRING_VALUE',
                    Count: 'NUMBER_VALUE',
                    Name: 'STRING_VALUE',
                    Occurrences: {
                      Cells: [
                        {
                          CellReference: 'STRING_VALUE',
                          Column: 'NUMBER_VALUE',
                          ColumnName: 'STRING_VALUE',
                          Row: 'NUMBER_VALUE'
                        },
                        /* more items */
                      ],
                      LineRanges: [
                        {
                          End: 'NUMBER_VALUE',
                          Start: 'NUMBER_VALUE',
                          StartColumn: 'NUMBER_VALUE'
                        },
                        /* more items */
                      ],
                      OffsetRanges: [
                        {
                          End: 'NUMBER_VALUE',
                          Start: 'NUMBER_VALUE',
                          StartColumn: 'NUMBER_VALUE'
                        },
                        /* more items */
                      ],
                      Pages: [
                        {
                          LineRange: {
                            End: 'NUMBER_VALUE',
                            Start: 'NUMBER_VALUE',
                            StartColumn: 'NUMBER_VALUE'
                          },
                          OffsetRange: {
                            End: 'NUMBER_VALUE',
                            Start: 'NUMBER_VALUE',
                            StartColumn: 'NUMBER_VALUE'
                          },
                          PageNumber: 'NUMBER_VALUE'
                        },
                        /* more items */
                      ],
                      Records: [
                        {
                          JsonPath: 'STRING_VALUE',
                          RecordIndex: 'NUMBER_VALUE'
                        },
                        /* more items */
                      ]
                    }
                  },
                  /* more items */
                ],
                TotalCount: 'NUMBER_VALUE'
              },
              MimeType: 'STRING_VALUE',
              SensitiveData: [
                {
                  Category: 'STRING_VALUE',
                  Detections: [
                    {
                      Count: 'NUMBER_VALUE',
                      Occurrences: {
                        Cells: [
                          {
                            CellReference: 'STRING_VALUE',
                            Column: 'NUMBER_VALUE',
                            ColumnName: 'STRING_VALUE',
                            Row: 'NUMBER_VALUE'
                          },
                          /* more items */
                        ],
                        LineRanges: [
                          {
                            End: 'NUMBER_VALUE',
                            Start: 'NUMBER_VALUE',
                            StartColumn: 'NUMBER_VALUE'
                          },
                          /* more items */
                        ],
                        OffsetRanges: [
                          {
                            End: 'NUMBER_VALUE',
                            Start: 'NUMBER_VALUE',
                            StartColumn: 'NUMBER_VALUE'
                          },
                          /* more items */
                        ],
                        Pages: [
                          {
                            LineRange: {
                              End: 'NUMBER_VALUE',
                              Start: 'NUMBER_VALUE',
                              StartColumn: 'NUMBER_VALUE'
                            },
                            OffsetRange: {
                              End: 'NUMBER_VALUE',
                              Start: 'NUMBER_VALUE',
                              StartColumn: 'NUMBER_VALUE'
                            },
                            PageNumber: 'NUMBER_VALUE'
                          },
                          /* more items */
                        ],
                        Records: [
                          {
                            JsonPath: 'STRING_VALUE',
                            RecordIndex: 'NUMBER_VALUE'
                          },
                          /* more items */
                        ]
                      },
                      Type: 'STRING_VALUE'
                    },
                    /* more items */
                  ],
                  TotalCount: 'NUMBER_VALUE'
                },
                /* more items */
              ],
              SizeClassified: 'NUMBER_VALUE',
              Status: {
                Code: 'STRING_VALUE',
                Reason: 'STRING_VALUE'
              }
            }
          },
          Details: {
            AwsAmazonMqBroker: {
              AuthenticationStrategy: 'STRING_VALUE',
              AutoMinorVersionUpgrade: true || false,
              BrokerArn: 'STRING_VALUE',
              BrokerId: 'STRING_VALUE',
              BrokerName: 'STRING_VALUE',
              DeploymentMode: 'STRING_VALUE',
              EncryptionOptions: {
                KmsKeyId: 'STRING_VALUE',
                UseAwsOwnedKey: true || false
              },
              EngineType: 'STRING_VALUE',
              EngineVersion: 'STRING_VALUE',
              HostInstanceType: 'STRING_VALUE',
              LdapServerMetadata: {
                Hosts: [
                  'STRING_VALUE',
                  /* more items */
                ],
                RoleBase: 'STRING_VALUE',
                RoleName: 'STRING_VALUE',
                RoleSearchMatching: 'STRING_VALUE',
                RoleSearchSubtree: true || false,
                ServiceAccountUsername: 'STRING_VALUE',
                UserBase: 'STRING_VALUE',
                UserRoleName: 'STRING_VALUE',
                UserSearchMatching: 'STRING_VALUE',
                UserSearchSubtree: true || false
              },
              Logs: {
                Audit: true || false,
                AuditLogGroup: 'STRING_VALUE',
                General: true || false,
                GeneralLogGroup: 'STRING_VALUE',
                Pending: {
                  Audit: true || false,
                  General: true || false
                }
              },
              MaintenanceWindowStartTime: {
                DayOfWeek: 'STRING_VALUE',
                TimeOfDay: 'STRING_VALUE',
                TimeZone: 'STRING_VALUE'
              },
              PubliclyAccessible: true || false,
              SecurityGroups: [
                'STRING_VALUE',
                /* more items */
              ],
              StorageType: 'STRING_VALUE',
              SubnetIds: [
                'STRING_VALUE',
                /* more items */
              ],
              Users: [
                {
                  PendingChange: 'STRING_VALUE',
                  Username: 'STRING_VALUE'
                },
                /* more items */
              ]
            },
            AwsApiGatewayRestApi: {
              ApiKeySource: 'STRING_VALUE',
              BinaryMediaTypes: [
                'STRING_VALUE',
                /* more items */
              ],
              CreatedDate: 'STRING_VALUE',
              Description: 'STRING_VALUE',
              EndpointConfiguration: {
                Types: [
                  'STRING_VALUE',
                  /* more items */
                ]
              },
              Id: 'STRING_VALUE',
              MinimumCompressionSize: 'NUMBER_VALUE',
              Name: 'STRING_VALUE',
              Version: 'STRING_VALUE'
            },
            AwsApiGatewayStage: {
              AccessLogSettings: {
                DestinationArn: 'STRING_VALUE',
                Format: 'STRING_VALUE'
              },
              CacheClusterEnabled: true || false,
              CacheClusterSize: 'STRING_VALUE',
              CacheClusterStatus: 'STRING_VALUE',
              CanarySettings: {
                DeploymentId: 'STRING_VALUE',
                PercentTraffic: 'NUMBER_VALUE',
                StageVariableOverrides: {
                  '<NonEmptyString>': 'STRING_VALUE',
                  /* '<NonEmptyString>': ... */
                },
                UseStageCache: true || false
              },
              ClientCertificateId: 'STRING_VALUE',
              CreatedDate: 'STRING_VALUE',
              DeploymentId: 'STRING_VALUE',
              Description: 'STRING_VALUE',
              DocumentationVersion: 'STRING_VALUE',
              LastUpdatedDate: 'STRING_VALUE',
              MethodSettings: [
                {
                  CacheDataEncrypted: true || false,
                  CacheTtlInSeconds: 'NUMBER_VALUE',
                  CachingEnabled: true || false,
                  DataTraceEnabled: true || false,
                  HttpMethod: 'STRING_VALUE',
                  LoggingLevel: 'STRING_VALUE',
                  MetricsEnabled: true || false,
                  RequireAuthorizationForCacheControl: true || false,
                  ResourcePath: 'STRING_VALUE',
                  ThrottlingBurstLimit: 'NUMBER_VALUE',
                  ThrottlingRateLimit: 'NUMBER_VALUE',
                  UnauthorizedCacheControlHeaderStrategy: 'STRING_VALUE'
                },
                /* more items */
              ],
              StageName: 'STRING_VALUE',
              TracingEnabled: true || false,
              Variables: {
                '<NonEmptyString>': 'STRING_VALUE',
                /* '<NonEmptyString>': ... */
              },
              WebAclArn: 'STRING_VALUE'
            },
            AwsApiGatewayV2Api: {
              ApiEndpoint: 'STRING_VALUE',
              ApiId: 'STRING_VALUE',
              ApiKeySelectionExpression: 'STRING_VALUE',
              CorsConfiguration: {
                AllowCredentials: true || false,
                AllowHeaders: [
                  'STRING_VALUE',
                  /* more items */
                ],
                AllowMethods: [
                  'STRING_VALUE',
                  /* more items */
                ],
                AllowOrigins: [
                  'STRING_VALUE',
                  /* more items */
                ],
                ExposeHeaders: [
                  'STRING_VALUE',
                  /* more items */
                ],
                MaxAge: 'NUMBER_VALUE'
              },
              CreatedDate: 'STRING_VALUE',
              Description: 'STRING_VALUE',
              Name: 'STRING_VALUE',
              ProtocolType: 'STRING_VALUE',
              RouteSelectionExpression: 'STRING_VALUE',
              Version: 'STRING_VALUE'
            },
            AwsApiGatewayV2Stage: {
              AccessLogSettings: {
                DestinationArn: 'STRING_VALUE',
                Format: 'STRING_VALUE'
              },
              ApiGatewayManaged: true || false,
              AutoDeploy: true || false,
              ClientCertificateId: 'STRING_VALUE',
              CreatedDate: 'STRING_VALUE',
              DefaultRouteSettings: {
                DataTraceEnabled: true || false,
                DetailedMetricsEnabled: true || false,
                LoggingLevel: 'STRING_VALUE',
                ThrottlingBurstLimit: 'NUMBER_VALUE',
                ThrottlingRateLimit: 'NUMBER_VALUE'
              },
              DeploymentId: 'STRING_VALUE',
              Description: 'STRING_VALUE',
              LastDeploymentStatusMessage: 'STRING_VALUE',
              LastUpdatedDate: 'STRING_VALUE',
              RouteSettings: {
                DataTraceEnabled: true || false,
                DetailedMetricsEnabled: true || false,
                LoggingLevel: 'STRING_VALUE',
                ThrottlingBurstLimit: 'NUMBER_VALUE',
                ThrottlingRateLimit: 'NUMBER_VALUE'
              },
              StageName: 'STRING_VALUE',
              StageVariables: {
                '<NonEmptyString>': 'STRING_VALUE',
                /* '<NonEmptyString>': ... */
              }
            },
            AwsAppSyncGraphQlApi: {
              AdditionalAuthenticationProviders: [
                {
                  AuthenticationType: 'STRING_VALUE',
                  LambdaAuthorizerConfig: {
                    AuthorizerResultTtlInSeconds: 'NUMBER_VALUE',
                    AuthorizerUri: 'STRING_VALUE',
                    IdentityValidationExpression: 'STRING_VALUE'
                  },
                  OpenIdConnectConfig: {
                    AuthTtL: 'NUMBER_VALUE',
                    ClientId: 'STRING_VALUE',
                    IatTtL: 'NUMBER_VALUE',
                    Issuer: 'STRING_VALUE'
                  },
                  UserPoolConfig: {
                    AppIdClientRegex: 'STRING_VALUE',
                    AwsRegion: 'STRING_VALUE',
                    DefaultAction: 'STRING_VALUE',
                    UserPoolId: 'STRING_VALUE'
                  }
                },
                /* more items */
              ],
              ApiId: 'STRING_VALUE',
              Arn: 'STRING_VALUE',
              AuthenticationType: 'STRING_VALUE',
              Id: 'STRING_VALUE',
              LambdaAuthorizerConfig: {
                AuthorizerResultTtlInSeconds: 'NUMBER_VALUE',
                AuthorizerUri: 'STRING_VALUE',
                IdentityValidationExpression: 'STRING_VALUE'
              },
              LogConfig: {
                CloudWatchLogsRoleArn: 'STRING_VALUE',
                ExcludeVerboseContent: true || false,
                FieldLogLevel: 'STRING_VALUE'
              },
              Name: 'STRING_VALUE',
              OpenIdConnectConfig: {
                AuthTtL: 'NUMBER_VALUE',
                ClientId: 'STRING_VALUE',
                IatTtL: 'NUMBER_VALUE',
                Issuer: 'STRING_VALUE'
              },
              UserPoolConfig: {
                AppIdClientRegex: 'STRING_VALUE',
                AwsRegion: 'STRING_VALUE',
                DefaultAction: 'STRING_VALUE',
                UserPoolId: 'STRING_VALUE'
              },
              WafWebAclArn: 'STRING_VALUE',
              XrayEnabled: true || false
            },
            AwsAthenaWorkGroup: {
              Configuration: {
                ResultConfiguration: {
                  EncryptionConfiguration: {
                    EncryptionOption: 'STRING_VALUE',
                    KmsKey: 'STRING_VALUE'
                  }
                }
              },
              Description: 'STRING_VALUE',
              Name: 'STRING_VALUE',
              State: 'STRING_VALUE'
            },
            AwsAutoScalingAutoScalingGroup: {
              AvailabilityZones: [
                {
                  Value: 'STRING_VALUE'
                },
                /* more items */
              ],
              CapacityRebalance: true || false,
              CreatedTime: 'STRING_VALUE',
              HealthCheckGracePeriod: 'NUMBER_VALUE',
              HealthCheckType: 'STRING_VALUE',
              LaunchConfigurationName: 'STRING_VALUE',
              LaunchTemplate: {
                LaunchTemplateId: 'STRING_VALUE',
                LaunchTemplateName: 'STRING_VALUE',
                Version: 'STRING_VALUE'
              },
              LoadBalancerNames: [
                'STRING_VALUE',
                /* more items */
              ],
              MixedInstancesPolicy: {
                InstancesDistribution: {
                  OnDemandAllocationStrategy: 'STRING_VALUE',
                  OnDemandBaseCapacity: 'NUMBER_VALUE',
                  OnDemandPercentageAboveBaseCapacity: 'NUMBER_VALUE',
                  SpotAllocationStrategy: 'STRING_VALUE',
                  SpotInstancePools: 'NUMBER_VALUE',
                  SpotMaxPrice: 'STRING_VALUE'
                },
                LaunchTemplate: {
                  LaunchTemplateSpecification: {
                    LaunchTemplateId: 'STRING_VALUE',
                    LaunchTemplateName: 'STRING_VALUE',
                    Version: 'STRING_VALUE'
                  },
                  Overrides: [
                    {
                      InstanceType: 'STRING_VALUE',
                      WeightedCapacity: 'STRING_VALUE'
                    },
                    /* more items */
                  ]
                }
              }
            },
            AwsAutoScalingLaunchConfiguration: {
              AssociatePublicIpAddress: true || false,
              BlockDeviceMappings: [
                {
                  DeviceName: 'STRING_VALUE',
                  Ebs: {
                    DeleteOnTermination: true || false,
                    Encrypted: true || false,
                    Iops: 'NUMBER_VALUE',
                    SnapshotId: 'STRING_VALUE',
                    VolumeSize: 'NUMBER_VALUE',
                    VolumeType: 'STRING_VALUE'
                  },
                  NoDevice: true || false,
                  VirtualName: 'STRING_VALUE'
                },
                /* more items */
              ],
              ClassicLinkVpcId: 'STRING_VALUE',
              ClassicLinkVpcSecurityGroups: [
                'STRING_VALUE',
                /* more items */
              ],
              CreatedTime: 'STRING_VALUE',
              EbsOptimized: true || false,
              IamInstanceProfile: 'STRING_VALUE',
              ImageId: 'STRING_VALUE',
              InstanceMonitoring: {
                Enabled: true || false
              },
              InstanceType: 'STRING_VALUE',
              KernelId: 'STRING_VALUE',
              KeyName: 'STRING_VALUE',
              LaunchConfigurationName: 'STRING_VALUE',
              MetadataOptions: {
                HttpEndpoint: 'STRING_VALUE',
                HttpPutResponseHopLimit: 'NUMBER_VALUE',
                HttpTokens: 'STRING_VALUE'
              },
              PlacementTenancy: 'STRING_VALUE',
              RamdiskId: 'STRING_VALUE',
              SecurityGroups: [
                'STRING_VALUE',
                /* more items */
              ],
              SpotPrice: 'STRING_VALUE',
              UserData: 'STRING_VALUE'
            },
            AwsBackupBackupPlan: {
              BackupPlan: {
                AdvancedBackupSettings: [
                  {
                    BackupOptions: {
                      '<NonEmptyString>': 'STRING_VALUE',
                      /* '<NonEmptyString>': ... */
                    },
                    ResourceType: 'STRING_VALUE'
                  },
                  /* more items */
                ],
                BackupPlanName: 'STRING_VALUE',
                BackupPlanRule: [
                  {
                    CompletionWindowMinutes: 'NUMBER_VALUE',
                    CopyActions: [
                      {
                        DestinationBackupVaultArn: 'STRING_VALUE',
                        Lifecycle: {
                          DeleteAfterDays: 'NUMBER_VALUE',
                          MoveToColdStorageAfterDays: 'NUMBER_VALUE'
                        }
                      },
                      /* more items */
                    ],
                    EnableContinuousBackup: true || false,
                    Lifecycle: {
                      DeleteAfterDays: 'NUMBER_VALUE',
                      MoveToColdStorageAfterDays: 'NUMBER_VALUE'
                    },
                    RuleId: 'STRING_VALUE',
                    RuleName: 'STRING_VALUE',
                    ScheduleExpression: 'STRING_VALUE',
                    StartWindowMinutes: 'NUMBER_VALUE',
                    TargetBackupVault: 'STRING_VALUE'
                  },
                  /* more items */
                ]
              },
              BackupPlanArn: 'STRING_VALUE',
              BackupPlanId: 'STRING_VALUE',
              VersionId: 'STRING_VALUE'
            },
            AwsBackupBackupVault: {
              AccessPolicy: 'STRING_VALUE',
              BackupVaultArn: 'STRING_VALUE',
              BackupVaultName: 'STRING_VALUE',
              EncryptionKeyArn: 'STRING_VALUE',
              Notifications: {
                BackupVaultEvents: [
                  'STRING_VALUE',
                  /* more items */
                ],
                SnsTopicArn: 'STRING_VALUE'
              }
            },
            AwsBackupRecoveryPoint: {
              BackupSizeInBytes: 'NUMBER_VALUE',
              BackupVaultArn: 'STRING_VALUE',
              BackupVaultName: 'STRING_VALUE',
              CalculatedLifecycle: {
                DeleteAt: 'STRING_VALUE',
                MoveToColdStorageAt: 'STRING_VALUE'
              },
              CompletionDate: 'STRING_VALUE',
              CreatedBy: {
                BackupPlanArn: 'STRING_VALUE',
                BackupPlanId: 'STRING_VALUE',
                BackupPlanVersion: 'STRING_VALUE',
                BackupRuleId: 'STRING_VALUE'
              },
              CreationDate: 'STRING_VALUE',
              EncryptionKeyArn: 'STRING_VALUE',
              IamRoleArn: 'STRING_VALUE',
              IsEncrypted: true || false,
              LastRestoreTime: 'STRING_VALUE',
              Lifecycle: {
                DeleteAfterDays: 'NUMBER_VALUE',
                MoveToColdStorageAfterDays: 'NUMBER_VALUE'
              },
              RecoveryPointArn: 'STRING_VALUE',
              ResourceArn: 'STRING_VALUE',
              ResourceType: 'STRING_VALUE',
              SourceBackupVaultArn: 'STRING_VALUE',
              Status: 'STRING_VALUE',
              StatusMessage: 'STRING_VALUE',
              StorageClass: 'STRING_VALUE'
            },
            AwsCertificateManagerCertificate: {
              CertificateAuthorityArn: 'STRING_VALUE',
              CreatedAt: 'STRING_VALUE',
              DomainName: 'STRING_VALUE',
              DomainValidationOptions: [
                {
                  DomainName: 'STRING_VALUE',
                  ResourceRecord: {
                    Name: 'STRING_VALUE',
                    Type: 'STRING_VALUE',
                    Value: 'STRING_VALUE'
                  },
                  ValidationDomain: 'STRING_VALUE',
                  ValidationEmails: [
                    'STRING_VALUE',
                    /* more items */
                  ],
                  ValidationMethod: 'STRING_VALUE',
                  ValidationStatus: 'STRING_VALUE'
                },
                /* more items */
              ],
              ExtendedKeyUsages: [
                {
                  Name: 'STRING_VALUE',
                  OId: 'STRING_VALUE'
                },
                /* more items */
              ],
              FailureReason: 'STRING_VALUE',
              ImportedAt: 'STRING_VALUE',
              InUseBy: [
                'STRING_VALUE',
                /* more items */
              ],
              IssuedAt: 'STRING_VALUE',
              Issuer: 'STRING_VALUE',
              KeyAlgorithm: 'STRING_VALUE',
              KeyUsages: [
                {
                  Name: 'STRING_VALUE'
                },
                /* more items */
              ],
              NotAfter: 'STRING_VALUE',
              NotBefore: 'STRING_VALUE',
              Options: {
                CertificateTransparencyLoggingPreference: 'STRING_VALUE'
              },
              RenewalEligibility: 'STRING_VALUE',
              RenewalSummary: {
                DomainValidationOptions: [
                  {
                    DomainName: 'STRING_VALUE',
                    ResourceRecord: {
                      Name: 'STRING_VALUE',
                      Type: 'STRING_VALUE',
                      Value: 'STRING_VALUE'
                    },
                    ValidationDomain: 'STRING_VALUE',
                    ValidationEmails: [
                      'STRING_VALUE',
                      /* more items */
                    ],
                    ValidationMethod: 'STRING_VALUE',
                    ValidationStatus: 'STRING_VALUE'
                  },
                  /* more items */
                ],
                RenewalStatus: 'STRING_VALUE',
                RenewalStatusReason: 'STRING_VALUE',
                UpdatedAt: 'STRING_VALUE'
              },
              Serial: 'STRING_VALUE',
              SignatureAlgorithm: 'STRING_VALUE',
              Status: 'STRING_VALUE',
              Subject: 'STRING_VALUE',
              SubjectAlternativeNames: [
                'STRING_VALUE',
                /* more items */
              ],
              Type: 'STRING_VALUE'
            },
            AwsCloudFormationStack: {
              Capabilities: [
                'STRING_VALUE',
                /* more items */
              ],
              CreationTime: 'STRING_VALUE',
              Description: 'STRING_VALUE',
              DisableRollback: true || false,
              DriftInformation: {
                StackDriftStatus: 'STRING_VALUE'
              },
              EnableTerminationProtection: true || false,
              LastUpdatedTime: 'STRING_VALUE',
              NotificationArns: [
                'STRING_VALUE',
                /* more items */
              ],
              Outputs: [
                {
                  Description: 'STRING_VALUE',
                  OutputKey: 'STRING_VALUE',
                  OutputValue: 'STRING_VALUE'
                },
                /* more items */
              ],
              RoleArn: 'STRING_VALUE',
              StackId: 'STRING_VALUE',
              StackName: 'STRING_VALUE',
              StackStatus: 'STRING_VALUE',
              StackStatusReason: 'STRING_VALUE',
              TimeoutInMinutes: 'NUMBER_VALUE'
            },
            AwsCloudFrontDistribution: {
              CacheBehaviors: {
                Items: [
                  {
                    ViewerProtocolPolicy: 'STRING_VALUE'
                  },
                  /* more items */
                ]
              },
              DefaultCacheBehavior: {
                ViewerProtocolPolicy: 'STRING_VALUE'
              },
              DefaultRootObject: 'STRING_VALUE',
              DomainName: 'STRING_VALUE',
              ETag: 'STRING_VALUE',
              LastModifiedTime: 'STRING_VALUE',
              Logging: {
                Bucket: 'STRING_VALUE',
                Enabled: true || false,
                IncludeCookies: true || false,
                Prefix: 'STRING_VALUE'
              },
              OriginGroups: {
                Items: [
                  {
                    FailoverCriteria: {
                      StatusCodes: {
                        Items: [
                          'NUMBER_VALUE',
                          /* more items */
                        ],
                        Quantity: 'NUMBER_VALUE'
                      }
                    }
                  },
                  /* more items */
                ]
              },
              Origins: {
                Items: [
                  {
                    CustomOriginConfig: {
                      HttpPort: 'NUMBER_VALUE',
                      HttpsPort: 'NUMBER_VALUE',
                      OriginKeepaliveTimeout: 'NUMBER_VALUE',
                      OriginProtocolPolicy: 'STRING_VALUE',
                      OriginReadTimeout: 'NUMBER_VALUE',
                      OriginSslProtocols: {
                        Items: [
                          'STRING_VALUE',
                          /* more items */
                        ],
                        Quantity: 'NUMBER_VALUE'
                      }
                    },
                    DomainName: 'STRING_VALUE',
                    Id: 'STRING_VALUE',
                    OriginPath: 'STRING_VALUE',
                    S3OriginConfig: {
                      OriginAccessIdentity: 'STRING_VALUE'
                    }
                  },
                  /* more items */
                ]
              },
              Status: 'STRING_VALUE',
              ViewerCertificate: {
                AcmCertificateArn: 'STRING_VALUE',
                Certificate: 'STRING_VALUE',
                CertificateSource: 'STRING_VALUE',
                CloudFrontDefaultCertificate: true || false,
                IamCertificateId: 'STRING_VALUE',
                MinimumProtocolVersion: 'STRING_VALUE',
                SslSupportMethod: 'STRING_VALUE'
              },
              WebAclId: 'STRING_VALUE'
            },
            AwsCloudTrailTrail: {
              CloudWatchLogsLogGroupArn: 'STRING_VALUE',
              CloudWatchLogsRoleArn: 'STRING_VALUE',
              HasCustomEventSelectors: true || false,
              HomeRegion: 'STRING_VALUE',
              IncludeGlobalServiceEvents: true || false,
              IsMultiRegionTrail: true || false,
              IsOrganizationTrail: true || false,
              KmsKeyId: 'STRING_VALUE',
              LogFileValidationEnabled: true || false,
              Name: 'STRING_VALUE',
              S3BucketName: 'STRING_VALUE',
              S3KeyPrefix: 'STRING_VALUE',
              SnsTopicArn: 'STRING_VALUE',
              SnsTopicName: 'STRING_VALUE',
              TrailArn: 'STRING_VALUE'
            },
            AwsCloudWatchAlarm: {
              ActionsEnabled: true || false,
              AlarmActions: [
                'STRING_VALUE',
                /* more items */
              ],
              AlarmArn: 'STRING_VALUE',
              AlarmConfigurationUpdatedTimestamp: 'STRING_VALUE',
              AlarmDescription: 'STRING_VALUE',
              AlarmName: 'STRING_VALUE',
              ComparisonOperator: 'STRING_VALUE',
              DatapointsToAlarm: 'NUMBER_VALUE',
              Dimensions: [
                {
                  Name: 'STRING_VALUE',
                  Value: 'STRING_VALUE'
                },
                /* more items */
              ],
              EvaluateLowSampleCountPercentile: 'STRING_VALUE',
              EvaluationPeriods: 'NUMBER_VALUE',
              ExtendedStatistic: 'STRING_VALUE',
              InsufficientDataActions: [
                'STRING_VALUE',
                /* more items */
              ],
              MetricName: 'STRING_VALUE',
              Namespace: 'STRING_VALUE',
              OkActions: [
                'STRING_VALUE',
                /* more items */
              ],
              Period: 'NUMBER_VALUE',
              Statistic: 'STRING_VALUE',
              Threshold: 'NUMBER_VALUE',
              ThresholdMetricId: 'STRING_VALUE',
              TreatMissingData: 'STRING_VALUE',
              Unit: 'STRING_VALUE'
            },
            AwsCodeBuildProject: {
              Artifacts: [
                {
                  ArtifactIdentifier: 'STRING_VALUE',
                  EncryptionDisabled: true || false,
                  Location: 'STRING_VALUE',
                  Name: 'STRING_VALUE',
                  NamespaceType: 'STRING_VALUE',
                  OverrideArtifactName: true || false,
                  Packaging: 'STRING_VALUE',
                  Path: 'STRING_VALUE',
                  Type: 'STRING_VALUE'
                },
                /* more items */
              ],
              EncryptionKey: 'STRING_VALUE',
              Environment: {
                Certificate: 'STRING_VALUE',
                EnvironmentVariables: [
                  {
                    Name: 'STRING_VALUE',
                    Type: 'STRING_VALUE',
                    Value: 'STRING_VALUE'
                  },
                  /* more items */
                ],
                ImagePullCredentialsType: 'STRING_VALUE',
                PrivilegedMode: true || false,
                RegistryCredential: {
                  Credential: 'STRING_VALUE',
                  CredentialProvider: 'STRING_VALUE'
                },
                Type: 'STRING_VALUE'
              },
              LogsConfig: {
                CloudWatchLogs: {
                  GroupName: 'STRING_VALUE',
                  Status: 'STRING_VALUE',
                  StreamName: 'STRING_VALUE'
                },
                S3Logs: {
                  EncryptionDisabled: true || false,
                  Location: 'STRING_VALUE',
                  Status: 'STRING_VALUE'
                }
              },
              Name: 'STRING_VALUE',
              SecondaryArtifacts: [
                {
                  ArtifactIdentifier: 'STRING_VALUE',
                  EncryptionDisabled: true || false,
                  Location: 'STRING_VALUE',
                  Name: 'STRING_VALUE',
                  NamespaceType: 'STRING_VALUE',
                  OverrideArtifactName: true || false,
                  Packaging: 'STRING_VALUE',
                  Path: 'STRING_VALUE',
                  Type: 'STRING_VALUE'
                },
                /* more items */
              ],
              ServiceRole: 'STRING_VALUE',
              Source: {
                GitCloneDepth: 'NUMBER_VALUE',
                InsecureSsl: true || false,
                Location: 'STRING_VALUE',
                Type: 'STRING_VALUE'
              },
              VpcConfig: {
                SecurityGroupIds: [
                  'STRING_VALUE',
                  /* more items */
                ],
                Subnets: [
                  'STRING_VALUE',
                  /* more items */
                ],
                VpcId: 'STRING_VALUE'
              }
            },
            AwsDmsEndpoint: {
              CertificateArn: 'STRING_VALUE',
              DatabaseName: 'STRING_VALUE',
              EndpointArn: 'STRING_VALUE',
              EndpointIdentifier: 'STRING_VALUE',
              EndpointType: 'STRING_VALUE',
              EngineName: 'STRING_VALUE',
              ExternalId: 'STRING_VALUE',
              ExtraConnectionAttributes: 'STRING_VALUE',
              KmsKeyId: 'STRING_VALUE',
              Port: 'NUMBER_VALUE',
              ServerName: 'STRING_VALUE',
              SslMode: 'STRING_VALUE',
              Username: 'STRING_VALUE'
            },
            AwsDmsReplicationInstance: {
              AllocatedStorage: 'NUMBER_VALUE',
              AutoMinorVersionUpgrade: true || false,
              AvailabilityZone: 'STRING_VALUE',
              EngineVersion: 'STRING_VALUE',
              KmsKeyId: 'STRING_VALUE',
              MultiAZ: true || false,
              PreferredMaintenanceWindow: 'STRING_VALUE',
              PubliclyAccessible: true || false,
              ReplicationInstanceClass: 'STRING_VALUE',
              ReplicationInstanceIdentifier: 'STRING_VALUE',
              ReplicationSubnetGroup: {
                ReplicationSubnetGroupIdentifier: 'STRING_VALUE'
              },
              VpcSecurityGroups: [
                {
                  VpcSecurityGroupId: 'STRING_VALUE'
                },
                /* more items */
              ]
            },
            AwsDmsReplicationTask: {
              CdcStartPosition: 'STRING_VALUE',
              CdcStartTime: 'STRING_VALUE',
              CdcStopPosition: 'STRING_VALUE',
              Id: 'STRING_VALUE',
              MigrationType: 'STRING_VALUE',
              ReplicationInstanceArn: 'STRING_VALUE',
              ReplicationTaskIdentifier: 'STRING_VALUE',
              ReplicationTaskSettings: 'STRING_VALUE',
              ResourceIdentifier: 'STRING_VALUE',
              SourceEndpointArn: 'STRING_VALUE',
              TableMappings: 'STRING_VALUE',
              TargetEndpointArn: 'STRING_VALUE',
              TaskData: 'STRING_VALUE'
            },
            AwsDynamoDbTable: {
              AttributeDefinitions: [
                {
                  AttributeName: 'STRING_VALUE',
                  AttributeType: 'STRING_VALUE'
                },
                /* more items */
              ],
              BillingModeSummary: {
                BillingMode: 'STRING_VALUE',
                LastUpdateToPayPerRequestDateTime: 'STRING_VALUE'
              },
              CreationDateTime: 'STRING_VALUE',
              DeletionProtectionEnabled: true || false,
              GlobalSecondaryIndexes: [
                {
                  Backfilling: true || false,
                  IndexArn: 'STRING_VALUE',
                  IndexName: 'STRING_VALUE',
                  IndexSizeBytes: 'NUMBER_VALUE',
                  IndexStatus: 'STRING_VALUE',
                  ItemCount: 'NUMBER_VALUE',
                  KeySchema: [
                    {
                      AttributeName: 'STRING_VALUE',
                      KeyType: 'STRING_VALUE'
                    },
                    /* more items */
                  ],
                  Projection: {
                    NonKeyAttributes: [
                      'STRING_VALUE',
                      /* more items */
                    ],
                    ProjectionType: 'STRING_VALUE'
                  },
                  ProvisionedThroughput: {
                    LastDecreaseDateTime: 'STRING_VALUE',
                    LastIncreaseDateTime: 'STRING_VALUE',
                    NumberOfDecreasesToday: 'NUMBER_VALUE',
                    ReadCapacityUnits: 'NUMBER_VALUE',
                    WriteCapacityUnits: 'NUMBER_VALUE'
                  }
                },
                /* more items */
              ],
              GlobalTableVersion: 'STRING_VALUE',
              ItemCount: 'NUMBER_VALUE',
              KeySchema: [
                {
                  AttributeName: 'STRING_VALUE',
                  KeyType: 'STRING_VALUE'
                },
                /* more items */
              ],
              LatestStreamArn: 'STRING_VALUE',
              LatestStreamLabel: 'STRING_VALUE',
              LocalSecondaryIndexes: [
                {
                  IndexArn: 'STRING_VALUE',
                  IndexName: 'STRING_VALUE',
                  KeySchema: [
                    {
                      AttributeName: 'STRING_VALUE',
                      KeyType: 'STRING_VALUE'
                    },
                    /* more items */
                  ],
                  Projection: {
                    NonKeyAttributes: [
                      'STRING_VALUE',
                      /* more items */
                    ],
                    ProjectionType: 'STRING_VALUE'
                  }
                },
                /* more items */
              ],
              ProvisionedThroughput: {
                LastDecreaseDateTime: 'STRING_VALUE',
                LastIncreaseDateTime: 'STRING_VALUE',
                NumberOfDecreasesToday: 'NUMBER_VALUE',
                ReadCapacityUnits: 'NUMBER_VALUE',
                WriteCapacityUnits: 'NUMBER_VALUE'
              },
              Replicas: [
                {
                  GlobalSecondaryIndexes: [
                    {
                      IndexName: 'STRING_VALUE',
                      ProvisionedThroughputOverride: {
                        ReadCapacityUnits: 'NUMBER_VALUE'
                      }
                    },
                    /* more items */
                  ],
                  KmsMasterKeyId: 'STRING_VALUE',
                  ProvisionedThroughputOverride: {
                    ReadCapacityUnits: 'NUMBER_VALUE'
                  },
                  RegionName: 'STRING_VALUE',
                  ReplicaStatus: 'STRING_VALUE',
                  ReplicaStatusDescription: 'STRING_VALUE'
                },
                /* more items */
              ],
              RestoreSummary: {
                RestoreDateTime: 'STRING_VALUE',
                RestoreInProgress: true || false,
                SourceBackupArn: 'STRING_VALUE',
                SourceTableArn: 'STRING_VALUE'
              },
              SseDescription: {
                InaccessibleEncryptionDateTime: 'STRING_VALUE',
                KmsMasterKeyArn: 'STRING_VALUE',
                SseType: 'STRING_VALUE',
                Status: 'STRING_VALUE'
              },
              StreamSpecification: {
                StreamEnabled: true || false,
                StreamViewType: 'STRING_VALUE'
              },
              TableId: 'STRING_VALUE',
              TableName: 'STRING_VALUE',
              TableSizeBytes: 'NUMBER_VALUE',
              TableStatus: 'STRING_VALUE'
            },
            AwsEc2ClientVpnEndpoint: {
              AuthenticationOptions: [
                {
                  ActiveDirectory: {
                    DirectoryId: 'STRING_VALUE'
                  },
                  FederatedAuthentication: {
                    SamlProviderArn: 'STRING_VALUE',
                    SelfServiceSamlProviderArn: 'STRING_VALUE'
                  },
                  MutualAuthentication: {
                    ClientRootCertificateChain: 'STRING_VALUE'
                  },
                  Type: 'STRING_VALUE'
                },
                /* more items */
              ],
              ClientCidrBlock: 'STRING_VALUE',
              ClientConnectOptions: {
                Enabled: true || false,
                LambdaFunctionArn: 'STRING_VALUE',
                Status: {
                  Code: 'STRING_VALUE',
                  Message: 'STRING_VALUE'
                }
              },
              ClientLoginBannerOptions: {
                BannerText: 'STRING_VALUE',
                Enabled: true || false
              },
              ClientVpnEndpointId: 'STRING_VALUE',
              ConnectionLogOptions: {
                CloudwatchLogGroup: 'STRING_VALUE',
                CloudwatchLogStream: 'STRING_VALUE',
                Enabled: true || false
              },
              Description: 'STRING_VALUE',
              DnsServer: [
                'STRING_VALUE',
                /* more items */
              ],
              SecurityGroupIdSet: [
                'STRING_VALUE',
                /* more items */
              ],
              SelfServicePortalUrl: 'STRING_VALUE',
              ServerCertificateArn: 'STRING_VALUE',
              SessionTimeoutHours: 'NUMBER_VALUE',
              SplitTunnel: true || false,
              TransportProtocol: 'STRING_VALUE',
              VpcId: 'STRING_VALUE',
              VpnPort: 'NUMBER_VALUE'
            },
            AwsEc2Eip: {
              AllocationId: 'STRING_VALUE',
              AssociationId: 'STRING_VALUE',
              Domain: 'STRING_VALUE',
              InstanceId: 'STRING_VALUE',
              NetworkBorderGroup: 'STRING_VALUE',
              NetworkInterfaceId: 'STRING_VALUE',
              NetworkInterfaceOwnerId: 'STRING_VALUE',
              PrivateIpAddress: 'STRING_VALUE',
              PublicIp: 'STRING_VALUE',
              PublicIpv4Pool: 'STRING_VALUE'
            },
            AwsEc2Instance: {
              IamInstanceProfileArn: 'STRING_VALUE',
              ImageId: 'STRING_VALUE',
              IpV4Addresses: [
                'STRING_VALUE',
                /* more items */
              ],
              IpV6Addresses: [
                'STRING_VALUE',
                /* more items */
              ],
              KeyName: 'STRING_VALUE',
              LaunchedAt: 'STRING_VALUE',
              MetadataOptions: {
                HttpEndpoint: 'STRING_VALUE',
                HttpProtocolIpv6: 'STRING_VALUE',
                HttpPutResponseHopLimit: 'NUMBER_VALUE',
                HttpTokens: 'STRING_VALUE',
                InstanceMetadataTags: 'STRING_VALUE'
              },
              Monitoring: {
                State: 'STRING_VALUE'
              },
              NetworkInterfaces: [
                {
                  NetworkInterfaceId: 'STRING_VALUE'
                },
                /* more items */
              ],
              SubnetId: 'STRING_VALUE',
              Type: 'STRING_VALUE',
              VirtualizationType: 'STRING_VALUE',
              VpcId: 'STRING_VALUE'
            },
            AwsEc2LaunchTemplate: {
              DefaultVersionNumber: 'NUMBER_VALUE',
              Id: 'STRING_VALUE',
              LatestVersionNumber: 'NUMBER_VALUE',
              LaunchTemplateData: {
                BlockDeviceMappingSet: [
                  {
                    DeviceName: 'STRING_VALUE',
                    Ebs: {
                      DeleteOnTermination: true || false,
                      Encrypted: true || false,
                      Iops: 'NUMBER_VALUE',
                      KmsKeyId: 'STRING_VALUE',
                      SnapshotId: 'STRING_VALUE',
                      Throughput: 'NUMBER_VALUE',
                      VolumeSize: 'NUMBER_VALUE',
                      VolumeType: 'STRING_VALUE'
                    },
                    NoDevice: 'STRING_VALUE',
                    VirtualName: 'STRING_VALUE'
                  },
                  /* more items */
                ],
                CapacityReservationSpecification: {
                  CapacityReservationPreference: 'STRING_VALUE',
                  CapacityReservationTarget: {
                    CapacityReservationId: 'STRING_VALUE',
                    CapacityReservationResourceGroupArn: 'STRING_VALUE'
                  }
                },
                CpuOptions: {
                  CoreCount: 'NUMBER_VALUE',
                  ThreadsPerCore: 'NUMBER_VALUE'
                },
                CreditSpecification: {
                  CpuCredits: 'STRING_VALUE'
                },
                DisableApiStop: true || false,
                DisableApiTermination: true || false,
                EbsOptimized: true || false,
                ElasticGpuSpecificationSet: [
                  {
                    Type: 'STRING_VALUE'
                  },
                  /* more items */
                ],
                ElasticInferenceAcceleratorSet: [
                  {
                    Count: 'NUMBER_VALUE',
                    Type: 'STRING_VALUE'
                  },
                  /* more items */
                ],
                EnclaveOptions: {
                  Enabled: true || false
                },
                HibernationOptions: {
                  Configured: true || false
                },
                IamInstanceProfile: {
                  Arn: 'STRING_VALUE',
                  Name: 'STRING_VALUE'
                },
                ImageId: 'STRING_VALUE',
                InstanceInitiatedShutdownBehavior: 'STRING_VALUE',
                InstanceMarketOptions: {
                  MarketType: 'STRING_VALUE',
                  SpotOptions: {
                    BlockDurationMinutes: 'NUMBER_VALUE',
                    InstanceInterruptionBehavior: 'STRING_VALUE',
                    MaxPrice: 'STRING_VALUE',
                    SpotInstanceType: 'STRING_VALUE',
                    ValidUntil: 'STRING_VALUE'
                  }
                },
                InstanceRequirements: {
                  AcceleratorCount: {
                    Max: 'NUMBER_VALUE',
                    Min: 'NUMBER_VALUE'
                  },
                  AcceleratorManufacturers: [
                    'STRING_VALUE',
                    /* more items */
                  ],
                  AcceleratorNames: [
                    'STRING_VALUE',
                    /* more items */
                  ],
                  AcceleratorTotalMemoryMiB: {
                    Max: 'NUMBER_VALUE',
                    Min: 'NUMBER_VALUE'
                  },
                  AcceleratorTypes: [
                    'STRING_VALUE',
                    /* more items */
                  ],
                  BareMetal: 'STRING_VALUE',
                  BaselineEbsBandwidthMbps: {
                    Max: 'NUMBER_VALUE',
                    Min: 'NUMBER_VALUE'
                  },
                  BurstablePerformance: 'STRING_VALUE',
                  CpuManufacturers: [
                    'STRING_VALUE',
                    /* more items */
                  ],
                  ExcludedInstanceTypes: [
                    'STRING_VALUE',
                    /* more items */
                  ],
                  InstanceGenerations: [
                    'STRING_VALUE',
                    /* more items */
                  ],
                  LocalStorage: 'STRING_VALUE',
                  LocalStorageTypes: [
                    'STRING_VALUE',
                    /* more items */
                  ],
                  MemoryGiBPerVCpu: {
                    Max: 'NUMBER_VALUE',
                    Min: 'NUMBER_VALUE'
                  },
                  MemoryMiB: {
                    Max: 'NUMBER_VALUE',
                    Min: 'NUMBER_VALUE'
                  },
                  NetworkInterfaceCount: {
                    Max: 'NUMBER_VALUE',
                    Min: 'NUMBER_VALUE'
                  },
                  OnDemandMaxPricePercentageOverLowestPrice: 'NUMBER_VALUE',
                  RequireHibernateSupport: true || false,
                  SpotMaxPricePercentageOverLowestPrice: 'NUMBER_VALUE',
                  TotalLocalStorageGB: {
                    Max: 'NUMBER_VALUE',
                    Min: 'NUMBER_VALUE'
                  },
                  VCpuCount: {
                    Max: 'NUMBER_VALUE',
                    Min: 'NUMBER_VALUE'
                  }
                },
                InstanceType: 'STRING_VALUE',
                KernelId: 'STRING_VALUE',
                KeyName: 'STRING_VALUE',
                LicenseSet: [
                  {
                    LicenseConfigurationArn: 'STRING_VALUE'
                  },
                  /* more items */
                ],
                MaintenanceOptions: {
                  AutoRecovery: 'STRING_VALUE'
                },
                MetadataOptions: {
                  HttpEndpoint: 'STRING_VALUE',
                  HttpProtocolIpv6: 'STRING_VALUE',
                  HttpPutResponseHopLimit: 'NUMBER_VALUE',
                  HttpTokens: 'STRING_VALUE',
                  InstanceMetadataTags: 'STRING_VALUE'
                },
                Monitoring: {
                  Enabled: true || false
                },
                NetworkInterfaceSet: [
                  {
                    AssociateCarrierIpAddress: true || false,
                    AssociatePublicIpAddress: true || false,
                    DeleteOnTermination: true || false,
                    Description: 'STRING_VALUE',
                    DeviceIndex: 'NUMBER_VALUE',
                    Groups: [
                      'STRING_VALUE',
                      /* more items */
                    ],
                    InterfaceType: 'STRING_VALUE',
                    Ipv4PrefixCount: 'NUMBER_VALUE',
                    Ipv4Prefixes: [
                      {
                        Ipv4Prefix: 'STRING_VALUE'
                      },
                      /* more items */
                    ],
                    Ipv6AddressCount: 'NUMBER_VALUE',
                    Ipv6Addresses: [
                      {
                        Ipv6Address: 'STRING_VALUE'
                      },
                      /* more items */
                    ],
                    Ipv6PrefixCount: 'NUMBER_VALUE',
                    Ipv6Prefixes: [
                      {
                        Ipv6Prefix: 'STRING_VALUE'
                      },
                      /* more items */
                    ],
                    NetworkCardIndex: 'NUMBER_VALUE',
                    NetworkInterfaceId: 'STRING_VALUE',
                    PrivateIpAddress: 'STRING_VALUE',
                    PrivateIpAddresses: [
                      {
                        Primary: true || false,
                        PrivateIpAddress: 'STRING_VALUE'
                      },
                      /* more items */
                    ],
                    SecondaryPrivateIpAddressCount: 'NUMBER_VALUE',
                    SubnetId: 'STRING_VALUE'
                  },
                  /* more items */
                ],
                Placement: {
                  Affinity: 'STRING_VALUE',
                  AvailabilityZone: 'STRING_VALUE',
                  GroupName: 'STRING_VALUE',
                  HostId: 'STRING_VALUE',
                  HostResourceGroupArn: 'STRING_VALUE',
                  PartitionNumber: 'NUMBER_VALUE',
                  SpreadDomain: 'STRING_VALUE',
                  Tenancy: 'STRING_VALUE'
                },
                PrivateDnsNameOptions: {
                  EnableResourceNameDnsAAAARecord: true || false,
                  EnableResourceNameDnsARecord: true || false,
                  HostnameType: 'STRING_VALUE'
                },
                RamDiskId: 'STRING_VALUE',
                SecurityGroupIdSet: [
                  'STRING_VALUE',
                  /* more items */
                ],
                SecurityGroupSet: [
                  'STRING_VALUE',
                  /* more items */
                ],
                UserData: 'STRING_VALUE'
              },
              LaunchTemplateName: 'STRING_VALUE'
            },
            AwsEc2NetworkAcl: {
              Associations: [
                {
                  NetworkAclAssociationId: 'STRING_VALUE',
                  NetworkAclId: 'STRING_VALUE',
                  SubnetId: 'STRING_VALUE'
                },
                /* more items */
              ],
              Entries: [
                {
                  CidrBlock: 'STRING_VALUE',
                  Egress: true || false,
                  IcmpTypeCode: {
                    Code: 'NUMBER_VALUE',
                    Type: 'NUMBER_VALUE'
                  },
                  Ipv6CidrBlock: 'STRING_VALUE',
                  PortRange: {
                    From: 'NUMBER_VALUE',
                    To: 'NUMBER_VALUE'
                  },
                  Protocol: 'STRING_VALUE',
                  RuleAction: 'STRING_VALUE',
                  RuleNumber: 'NUMBER_VALUE'
                },
                /* more items */
              ],
              IsDefault: true || false,
              NetworkAclId: 'STRING_VALUE',
              OwnerId: 'STRING_VALUE',
              VpcId: 'STRING_VALUE'
            },
            AwsEc2NetworkInterface: {
              Attachment: {
                AttachTime: 'STRING_VALUE',
                AttachmentId: 'STRING_VALUE',
                DeleteOnTermination: true || false,
                DeviceIndex: 'NUMBER_VALUE',
                InstanceId: 'STRING_VALUE',
                InstanceOwnerId: 'STRING_VALUE',
                Status: 'STRING_VALUE'
              },
              IpV6Addresses: [
                {
                  IpV6Address: 'STRING_VALUE'
                },
                /* more items */
              ],
              NetworkInterfaceId: 'STRING_VALUE',
              PrivateIpAddresses: [
                {
                  PrivateDnsName: 'STRING_VALUE',
                  PrivateIpAddress: 'STRING_VALUE'
                },
                /* more items */
              ],
              PublicDnsName: 'STRING_VALUE',
              PublicIp: 'STRING_VALUE',
              SecurityGroups: [
                {
                  GroupId: 'STRING_VALUE',
                  GroupName: 'STRING_VALUE'
                },
                /* more items */
              ],
              SourceDestCheck: true || false
            },
            AwsEc2RouteTable: {
              AssociationSet: [
                {
                  AssociationState: {
                    State: 'STRING_VALUE',
                    StatusMessage: 'STRING_VALUE'
                  },
                  GatewayId: 'STRING_VALUE',
                  Main: true || false,
                  RouteTableAssociationId: 'STRING_VALUE',
                  RouteTableId: 'STRING_VALUE',
                  SubnetId: 'STRING_VALUE'
                },
                /* more items */
              ],
              OwnerId: 'STRING_VALUE',
              PropagatingVgwSet: [
                {
                  GatewayId: 'STRING_VALUE'
                },
                /* more items */
              ],
              RouteSet: [
                {
                  CarrierGatewayId: 'STRING_VALUE',
                  CoreNetworkArn: 'STRING_VALUE',
                  DestinationCidrBlock: 'STRING_VALUE',
                  DestinationIpv6CidrBlock: 'STRING_VALUE',
                  DestinationPrefixListId: 'STRING_VALUE',
                  EgressOnlyInternetGatewayId: 'STRING_VALUE',
                  GatewayId: 'STRING_VALUE',
                  InstanceId: 'STRING_VALUE',
                  InstanceOwnerId: 'STRING_VALUE',
                  LocalGatewayId: 'STRING_VALUE',
                  NatGatewayId: 'STRING_VALUE',
                  NetworkInterfaceId: 'STRING_VALUE',
                  Origin: 'STRING_VALUE',
                  State: 'STRING_VALUE',
                  TransitGatewayId: 'STRING_VALUE',
                  VpcPeeringConnectionId: 'STRING_VALUE'
                },
                /* more items */
              ],
              RouteTableId: 'STRING_VALUE',
              VpcId: 'STRING_VALUE'
            },
            AwsEc2SecurityGroup: {
              GroupId: 'STRING_VALUE',
              GroupName: 'STRING_VALUE',
              IpPermissions: [
                {
                  FromPort: 'NUMBER_VALUE',
                  IpProtocol: 'STRING_VALUE',
                  IpRanges: [
                    {
                      CidrIp: 'STRING_VALUE'
                    },
                    /* more items */
                  ],
                  Ipv6Ranges: [
                    {
                      CidrIpv6: 'STRING_VALUE'
                    },
                    /* more items */
                  ],
                  PrefixListIds: [
                    {
                      PrefixListId: 'STRING_VALUE'
                    },
                    /* more items */
                  ],
                  ToPort: 'NUMBER_VALUE',
                  UserIdGroupPairs: [
                    {
                      GroupId: 'STRING_VALUE',
                      GroupName: 'STRING_VALUE',
                      PeeringStatus: 'STRING_VALUE',
                      UserId: 'STRING_VALUE',
                      VpcId: 'STRING_VALUE',
                      VpcPeeringConnectionId: 'STRING_VALUE'
                    },
                    /* more items */
                  ]
                },
                /* more items */
              ],
              IpPermissionsEgress: [
                {
                  FromPort: 'NUMBER_VALUE',
                  IpProtocol: 'STRING_VALUE',
                  IpRanges: [
                    {
                      CidrIp: 'STRING_VALUE'
                    },
                    /* more items */
                  ],
                  Ipv6Ranges: [
                    {
                      CidrIpv6: 'STRING_VALUE'
                    },
                    /* more items */
                  ],
                  PrefixListIds: [
                    {
                      PrefixListId: 'STRING_VALUE'
                    },
                    /* more items */
                  ],
                  ToPort: 'NUMBER_VALUE',
                  UserIdGroupPairs: [
                    {
                      GroupId: 'STRING_VALUE',
                      GroupName: 'STRING_VALUE',
                      PeeringStatus: 'STRING_VALUE',
                      UserId: 'STRING_VALUE',
                      VpcId: 'STRING_VALUE',
                      VpcPeeringConnectionId: 'STRING_VALUE'
                    },
                    /* more items */
                  ]
                },
                /* more items */
              ],
              OwnerId: 'STRING_VALUE',
              VpcId: 'STRING_VALUE'
            },
            AwsEc2Subnet: {
              AssignIpv6AddressOnCreation: true || false,
              AvailabilityZone: 'STRING_VALUE',
              AvailabilityZoneId: 'STRING_VALUE',
              AvailableIpAddressCount: 'NUMBER_VALUE',
              CidrBlock: 'STRING_VALUE',
              DefaultForAz: true || false,
              Ipv6CidrBlockAssociationSet: [
                {
                  AssociationId: 'STRING_VALUE',
                  CidrBlockState: 'STRING_VALUE',
                  Ipv6CidrBlock: 'STRING_VALUE'
                },
                /* more items */
              ],
              MapPublicIpOnLaunch: true || false,
              OwnerId: 'STRING_VALUE',
              State: 'STRING_VALUE',
              SubnetArn: 'STRING_VALUE',
              SubnetId: 'STRING_VALUE',
              VpcId: 'STRING_VALUE'
            },
            AwsEc2TransitGateway: {
              AmazonSideAsn: 'NUMBER_VALUE',
              AssociationDefaultRouteTableId: 'STRING_VALUE',
              AutoAcceptSharedAttachments: 'STRING_VALUE',
              DefaultRouteTableAssociation: 'STRING_VALUE',
              DefaultRouteTablePropagation: 'STRING_VALUE',
              Description: 'STRING_VALUE',
              DnsSupport: 'STRING_VALUE',
              Id: 'STRING_VALUE',
              MulticastSupport: 'STRING_VALUE',
              PropagationDefaultRouteTableId: 'STRING_VALUE',
              TransitGatewayCidrBlocks: [
                'STRING_VALUE',
                /* more items */
              ],
              VpnEcmpSupport: 'STRING_VALUE'
            },
            AwsEc2Volume: {
              Attachments: [
                {
                  AttachTime: 'STRING_VALUE',
                  DeleteOnTermination: true || false,
                  InstanceId: 'STRING_VALUE',
                  Status: 'STRING_VALUE'
                },
                /* more items */
              ],
              CreateTime: 'STRING_VALUE',
              DeviceName: 'STRING_VALUE',
              Encrypted: true || false,
              KmsKeyId: 'STRING_VALUE',
              Size: 'NUMBER_VALUE',
              SnapshotId: 'STRING_VALUE',
              Status: 'STRING_VALUE',
              VolumeId: 'STRING_VALUE',
              VolumeScanStatus: 'STRING_VALUE',
              VolumeType: 'STRING_VALUE'
            },
            AwsEc2Vpc: {
              CidrBlockAssociationSet: [
                {
                  AssociationId: 'STRING_VALUE',
                  CidrBlock: 'STRING_VALUE',
                  CidrBlockState: 'STRING_VALUE'
                },
                /* more items */
              ],
              DhcpOptionsId: 'STRING_VALUE',
              Ipv6CidrBlockAssociationSet: [
                {
                  AssociationId: 'STRING_VALUE',
                  CidrBlockState: 'STRING_VALUE',
                  Ipv6CidrBlock: 'STRING_VALUE'
                },
                /* more items */
              ],
              State: 'STRING_VALUE'
            },
            AwsEc2VpcEndpointService: {
              AcceptanceRequired: true || false,
              AvailabilityZones: [
                'STRING_VALUE',
                /* more items */
              ],
              BaseEndpointDnsNames: [
                'STRING_VALUE',
                /* more items */
              ],
              GatewayLoadBalancerArns: [
                'STRING_VALUE',
                /* more items */
              ],
              ManagesVpcEndpoints: true || false,
              NetworkLoadBalancerArns: [
                'STRING_VALUE',
                /* more items */
              ],
              PrivateDnsName: 'STRING_VALUE',
              ServiceId: 'STRING_VALUE',
              ServiceName: 'STRING_VALUE',
              ServiceState: 'STRING_VALUE',
              ServiceType: [
                {
                  ServiceType: 'STRING_VALUE'
                },
                /* more items */
              ]
            },
            AwsEc2VpcPeeringConnection: {
              AccepterVpcInfo: {
                CidrBlock: 'STRING_VALUE',
                CidrBlockSet: [
                  {
                    CidrBlock: 'STRING_VALUE'
                  },
                  /* more items */
                ],
                Ipv6CidrBlockSet: [
                  {
                    Ipv6CidrBlock: 'STRING_VALUE'
                  },
                  /* more items */
                ],
                OwnerId: 'STRING_VALUE',
                PeeringOptions: {
                  AllowDnsResolutionFromRemoteVpc: true || false,
                  AllowEgressFromLocalClassicLinkToRemoteVpc: true || false,
                  AllowEgressFromLocalVpcToRemoteClassicLink: true || false
                },
                Region: 'STRING_VALUE',
                VpcId: 'STRING_VALUE'
              },
              ExpirationTime: 'STRING_VALUE',
              RequesterVpcInfo: {
                CidrBlock: 'STRING_VALUE',
                CidrBlockSet: [
                  {
                    CidrBlock: 'STRING_VALUE'
                  },
                  /* more items */
                ],
                Ipv6CidrBlockSet: [
                  {
                    Ipv6CidrBlock: 'STRING_VALUE'
                  },
                  /* more items */
                ],
                OwnerId: 'STRING_VALUE',
                PeeringOptions: {
                  AllowDnsResolutionFromRemoteVpc: true || false,
                  AllowEgressFromLocalClassicLinkToRemoteVpc: true || false,
                  AllowEgressFromLocalVpcToRemoteClassicLink: true || false
                },
                Region: 'STRING_VALUE',
                VpcId: 'STRING_VALUE'
              },
              Status: {
                Code: 'STRING_VALUE',
                Message: 'STRING_VALUE'
              },
              VpcPeeringConnectionId: 'STRING_VALUE'
            },
            AwsEc2VpnConnection: {
              Category: 'STRING_VALUE',
              CustomerGatewayConfiguration: 'STRING_VALUE',
              CustomerGatewayId: 'STRING_VALUE',
              Options: {
                StaticRoutesOnly: true || false,
                TunnelOptions: [
                  {
                    DpdTimeoutSeconds: 'NUMBER_VALUE',
                    IkeVersions: [
                      'STRING_VALUE',
                      /* more items */
                    ],
                    OutsideIpAddress: 'STRING_VALUE',
                    Phase1DhGroupNumbers: [
                      'NUMBER_VALUE',
                      /* more items */
                    ],
                    Phase1EncryptionAlgorithms: [
                      'STRING_VALUE',
                      /* more items */
                    ],
                    Phase1IntegrityAlgorithms: [
                      'STRING_VALUE',
                      /* more items */
                    ],
                    Phase1LifetimeSeconds: 'NUMBER_VALUE',
                    Phase2DhGroupNumbers: [
                      'NUMBER_VALUE',
                      /* more items */
                    ],
                    Phase2EncryptionAlgorithms: [
                      'STRING_VALUE',
                      /* more items */
                    ],
                    Phase2IntegrityAlgorithms: [
                      'STRING_VALUE',
                      /* more items */
                    ],
                    Phase2LifetimeSeconds: 'NUMBER_VALUE',
                    PreSharedKey: 'STRING_VALUE',
                    RekeyFuzzPercentage: 'NUMBER_VALUE',
                    RekeyMarginTimeSeconds: 'NUMBER_VALUE',
                    ReplayWindowSize: 'NUMBER_VALUE',
                    TunnelInsideCidr: 'STRING_VALUE'
                  },
                  /* more items */
                ]
              },
              Routes: [
                {
                  DestinationCidrBlock: 'STRING_VALUE',
                  State: 'STRING_VALUE'
                },
                /* more items */
              ],
              State: 'STRING_VALUE',
              TransitGatewayId: 'STRING_VALUE',
              Type: 'STRING_VALUE',
              VgwTelemetry: [
                {
                  AcceptedRouteCount: 'NUMBER_VALUE',
                  CertificateArn: 'STRING_VALUE',
                  LastStatusChange: 'STRING_VALUE',
                  OutsideIpAddress: 'STRING_VALUE',
                  Status: 'STRING_VALUE',
                  StatusMessage: 'STRING_VALUE'
                },
                /* more items */
              ],
              VpnConnectionId: 'STRING_VALUE',
              VpnGatewayId: 'STRING_VALUE'
            },
            AwsEcrContainerImage: {
              Architecture: 'STRING_VALUE',
              ImageDigest: 'STRING_VALUE',
              ImagePublishedAt: 'STRING_VALUE',
              ImageTags: [
                'STRING_VALUE',
                /* more items */
              ],
              RegistryId: 'STRING_VALUE',
              RepositoryName: 'STRING_VALUE'
            },
            AwsEcrRepository: {
              Arn: 'STRING_VALUE',
              ImageScanningConfiguration: {
                ScanOnPush: true || false
              },
              ImageTagMutability: 'STRING_VALUE',
              LifecyclePolicy: {
                LifecyclePolicyText: 'STRING_VALUE',
                RegistryId: 'STRING_VALUE'
              },
              RepositoryName: 'STRING_VALUE',
              RepositoryPolicyText: 'STRING_VALUE'
            },
            AwsEcsCluster: {
              ActiveServicesCount: 'NUMBER_VALUE',
              CapacityProviders: [
                'STRING_VALUE',
                /* more items */
              ],
              ClusterArn: 'STRING_VALUE',
              ClusterName: 'STRING_VALUE',
              ClusterSettings: [
                {
                  Name: 'STRING_VALUE',
                  Value: 'STRING_VALUE'
                },
                /* more items */
              ],
              Configuration: {
                ExecuteCommandConfiguration: {
                  KmsKeyId: 'STRING_VALUE',
                  LogConfiguration: {
                    CloudWatchEncryptionEnabled: true || false,
                    CloudWatchLogGroupName: 'STRING_VALUE',
                    S3BucketName: 'STRING_VALUE',
                    S3EncryptionEnabled: true || false,
                    S3KeyPrefix: 'STRING_VALUE'
                  },
                  Logging: 'STRING_VALUE'
                }
              },
              DefaultCapacityProviderStrategy: [
                {
                  Base: 'NUMBER_VALUE',
                  CapacityProvider: 'STRING_VALUE',
                  Weight: 'NUMBER_VALUE'
                },
                /* more items */
              ],
              RegisteredContainerInstancesCount: 'NUMBER_VALUE',
              RunningTasksCount: 'NUMBER_VALUE',
              Status: 'STRING_VALUE'
            },
            AwsEcsContainer: {
              Image: 'STRING_VALUE',
              MountPoints: [
                {
                  ContainerPath: 'STRING_VALUE',
                  SourceVolume: 'STRING_VALUE'
                },
                /* more items */
              ],
              Name: 'STRING_VALUE',
              Privileged: true || false
            },
            AwsEcsService: {
              CapacityProviderStrategy: [
                {
                  Base: 'NUMBER_VALUE',
                  CapacityProvider: 'STRING_VALUE',
                  Weight: 'NUMBER_VALUE'
                },
                /* more items */
              ],
              Cluster: 'STRING_VALUE',
              DeploymentConfiguration: {
                DeploymentCircuitBreaker: {
                  Enable: true || false,
                  Rollback: true || false
                },
                MaximumPercent: 'NUMBER_VALUE',
                MinimumHealthyPercent: 'NUMBER_VALUE'
              },
              DeploymentController: {
                Type: 'STRING_VALUE'
              },
              DesiredCount: 'NUMBER_VALUE',
              EnableEcsManagedTags: true || false,
              EnableExecuteCommand: true || false,
              HealthCheckGracePeriodSeconds: 'NUMBER_VALUE',
              LaunchType: 'STRING_VALUE',
              LoadBalancers: [
                {
                  ContainerName: 'STRING_VALUE',
                  ContainerPort: 'NUMBER_VALUE',
                  LoadBalancerName: 'STRING_VALUE',
                  TargetGroupArn: 'STRING_VALUE'
                },
                /* more items */
              ],
              Name: 'STRING_VALUE',
              NetworkConfiguration: {
                AwsVpcConfiguration: {
                  AssignPublicIp: 'STRING_VALUE',
                  SecurityGroups: [
                    'STRING_VALUE',
                    /* more items */
                  ],
                  Subnets: [
                    'STRING_VALUE',
                    /* more items */
                  ]
                }
              },
              PlacementConstraints: [
                {
                  Expression: 'STRING_VALUE',
                  Type: 'STRING_VALUE'
                },
                /* more items */
              ],
              PlacementStrategies: [
                {
                  Field: 'STRING_VALUE',
                  Type: 'STRING_VALUE'
                },
                /* more items */
              ],
              PlatformVersion: 'STRING_VALUE',
              PropagateTags: 'STRING_VALUE',
              Role: 'STRING_VALUE',
              SchedulingStrategy: 'STRING_VALUE',
              ServiceArn: 'STRING_VALUE',
              ServiceName: 'STRING_VALUE',
              ServiceRegistries: [
                {
                  ContainerName: 'STRING_VALUE',
                  ContainerPort: 'NUMBER_VALUE',
                  Port: 'NUMBER_VALUE',
                  RegistryArn: 'STRING_VALUE'
                },
                /* more items */
              ],
              TaskDefinition: 'STRING_VALUE'
            },
            AwsEcsTask: {
              ClusterArn: 'STRING_VALUE',
              Containers: [
                {
                  Image: 'STRING_VALUE',
                  MountPoints: [
                    {
                      ContainerPath: 'STRING_VALUE',
                      SourceVolume: 'STRING_VALUE'
                    },
                    /* more items */
                  ],
                  Name: 'STRING_VALUE',
                  Privileged: true || false
                },
                /* more items */
              ],
              CreatedAt: 'STRING_VALUE',
              Group: 'STRING_VALUE',
              StartedAt: 'STRING_VALUE',
              StartedBy: 'STRING_VALUE',
              TaskDefinitionArn: 'STRING_VALUE',
              Version: 'STRING_VALUE',
              Volumes: [
                {
                  Host: {
                    SourcePath: 'STRING_VALUE'
                  },
                  Name: 'STRING_VALUE'
                },
                /* more items */
              ]
            },
            AwsEcsTaskDefinition: {
              ContainerDefinitions: [
                {
                  Command: [
                    'STRING_VALUE',
                    /* more items */
                  ],
                  Cpu: 'NUMBER_VALUE',
                  DependsOn: [
                    {
                      Condition: 'STRING_VALUE',
                      ContainerName: 'STRING_VALUE'
                    },
                    /* more items */
                  ],
                  DisableNetworking: true || false,
                  DnsSearchDomains: [
                    'STRING_VALUE',
                    /* more items */
                  ],
                  DnsServers: [
                    'STRING_VALUE',
                    /* more items */
                  ],
                  DockerLabels: {
                    '<NonEmptyString>': 'STRING_VALUE',
                    /* '<NonEmptyString>': ... */
                  },
                  DockerSecurityOptions: [
                    'STRING_VALUE',
                    /* more items */
                  ],
                  EntryPoint: [
                    'STRING_VALUE',
                    /* more items */
                  ],
                  Environment: [
                    {
                      Name: 'STRING_VALUE',
                      Value: 'STRING_VALUE'
                    },
                    /* more items */
                  ],
                  EnvironmentFiles: [
                    {
                      Type: 'STRING_VALUE',
                      Value: 'STRING_VALUE'
                    },
                    /* more items */
                  ],
                  Essential: true || false,
                  ExtraHosts: [
                    {
                      Hostname: 'STRING_VALUE',
                      IpAddress: 'STRING_VALUE'
                    },
                    /* more items */
                  ],
                  FirelensConfiguration: {
                    Options: {
                      '<NonEmptyString>': 'STRING_VALUE',
                      /* '<NonEmptyString>': ... */
                    },
                    Type: 'STRING_VALUE'
                  },
                  HealthCheck: {
                    Command: [
                      'STRING_VALUE',
                      /* more items */
                    ],
                    Interval: 'NUMBER_VALUE',
                    Retries: 'NUMBER_VALUE',
                    StartPeriod: 'NUMBER_VALUE',
                    Timeout: 'NUMBER_VALUE'
                  },
                  Hostname: 'STRING_VALUE',
                  Image: 'STRING_VALUE',
                  Interactive: true || false,
                  Links: [
                    'STRING_VALUE',
                    /* more items */
                  ],
                  LinuxParameters: {
                    Capabilities: {
                      Add: [
                        'STRING_VALUE',
                        /* more items */
                      ],
                      Drop: [
                        'STRING_VALUE',
                        /* more items */
                      ]
                    },
                    Devices: [
                      {
                        ContainerPath: 'STRING_VALUE',
                        HostPath: 'STRING_VALUE',
                        Permissions: [
                          'STRING_VALUE',
                          /* more items */
                        ]
                      },
                      /* more items */
                    ],
                    InitProcessEnabled: true || false,
                    MaxSwap: 'NUMBER_VALUE',
                    SharedMemorySize: 'NUMBER_VALUE',
                    Swappiness: 'NUMBER_VALUE',
                    Tmpfs: [
                      {
                        ContainerPath: 'STRING_VALUE',
                        MountOptions: [
                          'STRING_VALUE',
                          /* more items */
                        ],
                        Size: 'NUMBER_VALUE'
                      },
                      /* more items */
                    ]
                  },
                  LogConfiguration: {
                    LogDriver: 'STRING_VALUE',
                    Options: {
                      '<NonEmptyString>': 'STRING_VALUE',
                      /* '<NonEmptyString>': ... */
                    },
                    SecretOptions: [
                      {
                        Name: 'STRING_VALUE',
                        ValueFrom: 'STRING_VALUE'
                      },
                      /* more items */
                    ]
                  },
                  Memory: 'NUMBER_VALUE',
                  MemoryReservation: 'NUMBER_VALUE',
                  MountPoints: [
                    {
                      ContainerPath: 'STRING_VALUE',
                      ReadOnly: true || false,
                      SourceVolume: 'STRING_VALUE'
                    },
                    /* more items */
                  ],
                  Name: 'STRING_VALUE',
                  PortMappings: [
                    {
                      ContainerPort: 'NUMBER_VALUE',
                      HostPort: 'NUMBER_VALUE',
                      Protocol: 'STRING_VALUE'
                    },
                    /* more items */
                  ],
                  Privileged: true || false,
                  PseudoTerminal: true || false,
                  ReadonlyRootFilesystem: true || false,
                  RepositoryCredentials: {
                    CredentialsParameter: 'STRING_VALUE'
                  },
                  ResourceRequirements: [
                    {
                      Type: 'STRING_VALUE',
                      Value: 'STRING_VALUE'
                    },
                    /* more items */
                  ],
                  Secrets: [
                    {
                      Name: 'STRING_VALUE',
                      ValueFrom: 'STRING_VALUE'
                    },
                    /* more items */
                  ],
                  StartTimeout: 'NUMBER_VALUE',
                  StopTimeout: 'NUMBER_VALUE',
                  SystemControls: [
                    {
                      Namespace: 'STRING_VALUE',
                      Value: 'STRING_VALUE'
                    },
                    /* more items */
                  ],
                  Ulimits: [
                    {
                      HardLimit: 'NUMBER_VALUE',
                      Name: 'STRING_VALUE',
                      SoftLimit: 'NUMBER_VALUE'
                    },
                    /* more items */
                  ],
                  User: 'STRING_VALUE',
                  VolumesFrom: [
                    {
                      ReadOnly: true || false,
                      SourceContainer: 'STRING_VALUE'
                    },
                    /* more items */
                  ],
                  WorkingDirectory: 'STRING_VALUE'
                },
                /* more items */
              ],
              Cpu: 'STRING_VALUE',
              ExecutionRoleArn: 'STRING_VALUE',
              Family: 'STRING_VALUE',
              InferenceAccelerators: [
                {
                  DeviceName: 'STRING_VALUE',
                  DeviceType: 'STRING_VALUE'
                },
                /* more items */
              ],
              IpcMode: 'STRING_VALUE',
              Memory: 'STRING_VALUE',
              NetworkMode: 'STRING_VALUE',
              PidMode: 'STRING_VALUE',
              PlacementConstraints: [
                {
                  Expression: 'STRING_VALUE',
                  Type: 'STRING_VALUE'
                },
                /* more items */
              ],
              ProxyConfiguration: {
                ContainerName: 'STRING_VALUE',
                ProxyConfigurationProperties: [
                  {
                    Name: 'STRING_VALUE',
                    Value: 'STRING_VALUE'
                  },
                  /* more items */
                ],
                Type: 'STRING_VALUE'
              },
              RequiresCompatibilities: [
                'STRING_VALUE',
                /* more items */
              ],
              Status: 'STRING_VALUE',
              TaskRoleArn: 'STRING_VALUE',
              Volumes: [
                {
                  DockerVolumeConfiguration: {
                    Autoprovision: true || false,
                    Driver: 'STRING_VALUE',
                    DriverOpts: {
                      '<NonEmptyString>': 'STRING_VALUE',
                      /* '<NonEmptyString>': ... */
                    },
                    Labels: {
                      '<NonEmptyString>': 'STRING_VALUE',
                      /* '<NonEmptyString>': ... */
                    },
                    Scope: 'STRING_VALUE'
                  },
                  EfsVolumeConfiguration: {
                    AuthorizationConfig: {
                      AccessPointId: 'STRING_VALUE',
                      Iam: 'STRING_VALUE'
                    },
                    FilesystemId: 'STRING_VALUE',
                    RootDirectory: 'STRING_VALUE',
                    TransitEncryption: 'STRING_VALUE',
                    TransitEncryptionPort: 'NUMBER_VALUE'
                  },
                  Host: {
                    SourcePath: 'STRING_VALUE'
                  },
                  Name: 'STRING_VALUE'
                },
                /* more items */
              ]
            },
            AwsEfsAccessPoint: {
              AccessPointId: 'STRING_VALUE',
              Arn: 'STRING_VALUE',
              ClientToken: 'STRING_VALUE',
              FileSystemId: 'STRING_VALUE',
              PosixUser: {
                Gid: 'STRING_VALUE',
                SecondaryGids: [
                  'STRING_VALUE',
                  /* more items */
                ],
                Uid: 'STRING_VALUE'
              },
              RootDirectory: {
                CreationInfo: {
                  OwnerGid: 'STRING_VALUE',
                  OwnerUid: 'STRING_VALUE',
                  Permissions: 'STRING_VALUE'
                },
                Path: 'STRING_VALUE'
              }
            },
            AwsEksCluster: {
              Arn: 'STRING_VALUE',
              CertificateAuthorityData: 'STRING_VALUE',
              ClusterStatus: 'STRING_VALUE',
              Endpoint: 'STRING_VALUE',
              Logging: {
                ClusterLogging: [
                  {
                    Enabled: true || false,
                    Types: [
                      'STRING_VALUE',
                      /* more items */
                    ]
                  },
                  /* more items */
                ]
              },
              Name: 'STRING_VALUE',
              ResourcesVpcConfig: {
                EndpointPublicAccess: true || false,
                SecurityGroupIds: [
                  'STRING_VALUE',
                  /* more items */
                ],
                SubnetIds: [
                  'STRING_VALUE',
                  /* more items */
                ]
              },
              RoleArn: 'STRING_VALUE',
              Version: 'STRING_VALUE'
            },
            AwsElasticBeanstalkEnvironment: {
              ApplicationName: 'STRING_VALUE',
              Cname: 'STRING_VALUE',
              DateCreated: 'STRING_VALUE',
              DateUpdated: 'STRING_VALUE',
              Description: 'STRING_VALUE',
              EndpointUrl: 'STRING_VALUE',
              EnvironmentArn: 'STRING_VALUE',
              EnvironmentId: 'STRING_VALUE',
              EnvironmentLinks: [
                {
                  EnvironmentName: 'STRING_VALUE',
                  LinkName: 'STRING_VALUE'
                },
                /* more items */
              ],
              EnvironmentName: 'STRING_VALUE',
              OptionSettings: [
                {
                  Namespace: 'STRING_VALUE',
                  OptionName: 'STRING_VALUE',
                  ResourceName: 'STRING_VALUE',
                  Value: 'STRING_VALUE'
                },
                /* more items */
              ],
              PlatformArn: 'STRING_VALUE',
              SolutionStackName: 'STRING_VALUE',
              Status: 'STRING_VALUE',
              Tier: {
                Name: 'STRING_VALUE',
                Type: 'STRING_VALUE',
                Version: 'STRING_VALUE'
              },
              VersionLabel: 'STRING_VALUE'
            },
            AwsElasticsearchDomain: {
              AccessPolicies: 'STRING_VALUE',
              DomainEndpointOptions: {
                EnforceHTTPS: true || false,
                TLSSecurityPolicy: 'STRING_VALUE'
              },
              DomainId: 'STRING_VALUE',
              DomainName: 'STRING_VALUE',
              ElasticsearchClusterConfig: {
                DedicatedMasterCount: 'NUMBER_VALUE',
                DedicatedMasterEnabled: true || false,
                DedicatedMasterType: 'STRING_VALUE',
                InstanceCount: 'NUMBER_VALUE',
                InstanceType: 'STRING_VALUE',
                ZoneAwarenessConfig: {
                  AvailabilityZoneCount: 'NUMBER_VALUE'
                },
                ZoneAwarenessEnabled: true || false
              },
              ElasticsearchVersion: 'STRING_VALUE',
              EncryptionAtRestOptions: {
                Enabled: true || false,
                KmsKeyId: 'STRING_VALUE'
              },
              Endpoint: 'STRING_VALUE',
              Endpoints: {
                '<NonEmptyString>': 'STRING_VALUE',
                /* '<NonEmptyString>': ... */
              },
              LogPublishingOptions: {
                AuditLogs: {
                  CloudWatchLogsLogGroupArn: 'STRING_VALUE',
                  Enabled: true || false
                },
                IndexSlowLogs: {
                  CloudWatchLogsLogGroupArn: 'STRING_VALUE',
                  Enabled: true || false
                },
                SearchSlowLogs: {
                  CloudWatchLogsLogGroupArn: 'STRING_VALUE',
                  Enabled: true || false
                }
              },
              NodeToNodeEncryptionOptions: {
                Enabled: true || false
              },
              ServiceSoftwareOptions: {
                AutomatedUpdateDate: 'STRING_VALUE',
                Cancellable: true || false,
                CurrentVersion: 'STRING_VALUE',
                Description: 'STRING_VALUE',
                NewVersion: 'STRING_VALUE',
                UpdateAvailable: true || false,
                UpdateStatus: 'STRING_VALUE'
              },
              VPCOptions: {
                AvailabilityZones: [
                  'STRING_VALUE',
                  /* more items */
                ],
                SecurityGroupIds: [
                  'STRING_VALUE',
                  /* more items */
                ],
                SubnetIds: [
                  'STRING_VALUE',
                  /* more items */
                ],
                VPCId: 'STRING_VALUE'
              }
            },
            AwsElbLoadBalancer: {
              AvailabilityZones: [
                'STRING_VALUE',
                /* more items */
              ],
              BackendServerDescriptions: [
                {
                  InstancePort: 'NUMBER_VALUE',
                  PolicyNames: [
                    'STRING_VALUE',
                    /* more items */
                  ]
                },
                /* more items */
              ],
              CanonicalHostedZoneName: 'STRING_VALUE',
              CanonicalHostedZoneNameID: 'STRING_VALUE',
              CreatedTime: 'STRING_VALUE',
              DnsName: 'STRING_VALUE',
              HealthCheck: {
                HealthyThreshold: 'NUMBER_VALUE',
                Interval: 'NUMBER_VALUE',
                Target: 'STRING_VALUE',
                Timeout: 'NUMBER_VALUE',
                UnhealthyThreshold: 'NUMBER_VALUE'
              },
              Instances: [
                {
                  InstanceId: 'STRING_VALUE'
                },
                /* more items */
              ],
              ListenerDescriptions: [
                {
                  Listener: {
                    InstancePort: 'NUMBER_VALUE',
                    InstanceProtocol: 'STRING_VALUE',
                    LoadBalancerPort: 'NUMBER_VALUE',
                    Protocol: 'STRING_VALUE',
                    SslCertificateId: 'STRING_VALUE'
                  },
                  PolicyNames: [
                    'STRING_VALUE',
                    /* more items */
                  ]
                },
                /* more items */
              ],
              LoadBalancerAttributes: {
                AccessLog: {
                  EmitInterval: 'NUMBER_VALUE',
                  Enabled: true || false,
                  S3BucketName: 'STRING_VALUE',
                  S3BucketPrefix: 'STRING_VALUE'
                },
                AdditionalAttributes: [
                  {
                    Key: 'STRING_VALUE',
                    Value: 'STRING_VALUE'
                  },
                  /* more items */
                ],
                ConnectionDraining: {
                  Enabled: true || false,
                  Timeout: 'NUMBER_VALUE'
                },
                ConnectionSettings: {
                  IdleTimeout: 'NUMBER_VALUE'
                },
                CrossZoneLoadBalancing: {
                  Enabled: true || false
                }
              },
              LoadBalancerName: 'STRING_VALUE',
              Policies: {
                AppCookieStickinessPolicies: [
                  {
                    CookieName: 'STRING_VALUE',
                    PolicyName: 'STRING_VALUE'
                  },
                  /* more items */
                ],
                LbCookieStickinessPolicies: [
                  {
                    CookieExpirationPeriod: 'NUMBER_VALUE',
                    PolicyName: 'STRING_VALUE'
                  },
                  /* more items */
                ],
                OtherPolicies: [
                  'STRING_VALUE',
                  /* more items */
                ]
              },
              Scheme: 'STRING_VALUE',
              SecurityGroups: [
                'STRING_VALUE',
                /* more items */
              ],
              SourceSecurityGroup: {
                GroupName: 'STRING_VALUE',
                OwnerAlias: 'STRING_VALUE'
              },
              Subnets: [
                'STRING_VALUE',
                /* more items */
              ],
              VpcId: 'STRING_VALUE'
            },
            AwsElbv2LoadBalancer: {
              AvailabilityZones: [
                {
                  SubnetId: 'STRING_VALUE',
                  ZoneName: 'STRING_VALUE'
                },
                /* more items */
              ],
              CanonicalHostedZoneId: 'STRING_VALUE',
              CreatedTime: 'STRING_VALUE',
              DNSName: 'STRING_VALUE',
              IpAddressType: 'STRING_VALUE',
              LoadBalancerAttributes: [
                {
                  Key: 'STRING_VALUE',
                  Value: 'STRING_VALUE'
                },
                /* more items */
              ],
              Scheme: 'STRING_VALUE',
              SecurityGroups: [
                'STRING_VALUE',
                /* more items */
              ],
              State: {
                Code: 'STRING_VALUE',
                Reason: 'STRING_VALUE'
              },
              Type: 'STRING_VALUE',
              VpcId: 'STRING_VALUE'
            },
            AwsEventSchemasRegistry: {
              Description: 'STRING_VALUE',
              RegistryArn: 'STRING_VALUE',
              RegistryName: 'STRING_VALUE'
            },
            AwsEventsEndpoint: {
              Arn: 'STRING_VALUE',
              Description: 'STRING_VALUE',
              EndpointId: 'STRING_VALUE',
              EndpointUrl: 'STRING_VALUE',
              EventBuses: [
                {
                  EventBusArn: 'STRING_VALUE'
                },
                /* more items */
              ],
              Name: 'STRING_VALUE',
              ReplicationConfig: {
                State: 'STRING_VALUE'
              },
              RoleArn: 'STRING_VALUE',
              RoutingConfig: {
                FailoverConfig: {
                  Primary: {
                    HealthCheck: 'STRING_VALUE'
                  },
                  Secondary: {
                    Route: 'STRING_VALUE'
                  }
                }
              },
              State: 'STRING_VALUE',
              StateReason: 'STRING_VALUE'
            },
            AwsEventsEventbus: {
              Arn: 'STRING_VALUE',
              Name: 'STRING_VALUE',
              Policy: 'STRING_VALUE'
            },
            AwsGuardDutyDetector: {
              DataSources: {
                CloudTrail: {
                  Status: 'STRING_VALUE'
                },
                DnsLogs: {
                  Status: 'STRING_VALUE'
                },
                FlowLogs: {
                  Status: 'STRING_VALUE'
                },
                Kubernetes: {
                  AuditLogs: {
                    Status: 'STRING_VALUE'
                  }
                },
                MalwareProtection: {
                  ScanEc2InstanceWithFindings: {
                    EbsVolumes: {
                      Reason: 'STRING_VALUE',
                      Status: 'STRING_VALUE'
                    }
                  },
                  ServiceRole: 'STRING_VALUE'
                },
                S3Logs: {
                  Status: 'STRING_VALUE'
                }
              },
              Features: [
                {
                  Name: 'STRING_VALUE',
                  Status: 'STRING_VALUE'
                },
                /* more items */
              ],
              FindingPublishingFrequency: 'STRING_VALUE',
              ServiceRole: 'STRING_VALUE',
              Status: 'STRING_VALUE'
            },
            AwsIamAccessKey: {
              AccessKeyId: 'STRING_VALUE',
              AccountId: 'STRING_VALUE',
              CreatedAt: 'STRING_VALUE',
              PrincipalId: 'STRING_VALUE',
              PrincipalName: 'STRING_VALUE',
              PrincipalType: 'STRING_VALUE',
              SessionContext: {
                Attributes: {
                  CreationDate: 'STRING_VALUE',
                  MfaAuthenticated: true || false
                },
                SessionIssuer: {
                  AccountId: 'STRING_VALUE',
                  Arn: 'STRING_VALUE',
                  PrincipalId: 'STRING_VALUE',
                  Type: 'STRING_VALUE',
                  UserName: 'STRING_VALUE'
                }
              },
              Status: Active | Inactive,
              UserName: 'STRING_VALUE'
            },
            AwsIamGroup: {
              AttachedManagedPolicies: [
                {
                  PolicyArn: 'STRING_VALUE',
                  PolicyName: 'STRING_VALUE'
                },
                /* more items */
              ],
              CreateDate: 'STRING_VALUE',
              GroupId: 'STRING_VALUE',
              GroupName: 'STRING_VALUE',
              GroupPolicyList: [
                {
                  PolicyName: 'STRING_VALUE'
                },
                /* more items */
              ],
              Path: 'STRING_VALUE'
            },
            AwsIamPolicy: {
              AttachmentCount: 'NUMBER_VALUE',
              CreateDate: 'STRING_VALUE',
              DefaultVersionId: 'STRING_VALUE',
              Description: 'STRING_VALUE',
              IsAttachable: true || false,
              Path: 'STRING_VALUE',
              PermissionsBoundaryUsageCount: 'NUMBER_VALUE',
              PolicyId: 'STRING_VALUE',
              PolicyName: 'STRING_VALUE',
              PolicyVersionList: [
                {
                  CreateDate: 'STRING_VALUE',
                  IsDefaultVersion: true || false,
                  VersionId: 'STRING_VALUE'
                },
                /* more items */
              ],
              UpdateDate: 'STRING_VALUE'
            },
            AwsIamRole: {
              AssumeRolePolicyDocument: 'STRING_VALUE',
              AttachedManagedPolicies: [
                {
                  PolicyArn: 'STRING_VALUE',
                  PolicyName: 'STRING_VALUE'
                },
                /* more items */
              ],
              CreateDate: 'STRING_VALUE',
              InstanceProfileList: [
                {
                  Arn: 'STRING_VALUE',
                  CreateDate: 'STRING_VALUE',
                  InstanceProfileId: 'STRING_VALUE',
                  InstanceProfileName: 'STRING_VALUE',
                  Path: 'STRING_VALUE',
                  Roles: [
                    {
                      Arn: 'STRING_VALUE',
                      AssumeRolePolicyDocument: 'STRING_VALUE',
                      CreateDate: 'STRING_VALUE',
                      Path: 'STRING_VALUE',
                      RoleId: 'STRING_VALUE',
                      RoleName: 'STRING_VALUE'
                    },
                    /* more items */
                  ]
                },
                /* more items */
              ],
              MaxSessionDuration: 'NUMBER_VALUE',
              Path: 'STRING_VALUE',
              PermissionsBoundary: {
                PermissionsBoundaryArn: 'STRING_VALUE',
                PermissionsBoundaryType: 'STRING_VALUE'
              },
              RoleId: 'STRING_VALUE',
              RoleName: 'STRING_VALUE',
              RolePolicyList: [
                {
                  PolicyName: 'STRING_VALUE'
                },
                /* more items */
              ]
            },
            AwsIamUser: {
              AttachedManagedPolicies: [
                {
                  PolicyArn: 'STRING_VALUE',
                  PolicyName: 'STRING_VALUE'
                },
                /* more items */
              ],
              CreateDate: 'STRING_VALUE',
              GroupList: [
                'STRING_VALUE',
                /* more items */
              ],
              Path: 'STRING_VALUE',
              PermissionsBoundary: {
                PermissionsBoundaryArn: 'STRING_VALUE',
                PermissionsBoundaryType: 'STRING_VALUE'
              },
              UserId: 'STRING_VALUE',
              UserName: 'STRING_VALUE',
              UserPolicyList: [
                {
                  PolicyName: 'STRING_VALUE'
                },
                /* more items */
              ]
            },
            AwsKinesisStream: {
              Arn: 'STRING_VALUE',
              Name: 'STRING_VALUE',
              RetentionPeriodHours: 'NUMBER_VALUE',
              ShardCount: 'NUMBER_VALUE',
              StreamEncryption: {
                EncryptionType: 'STRING_VALUE',
                KeyId: 'STRING_VALUE'
              }
            },
            AwsKmsKey: {
              AWSAccountId: 'STRING_VALUE',
              CreationDate: 'NUMBER_VALUE',
              Description: 'STRING_VALUE',
              KeyId: 'STRING_VALUE',
              KeyManager: 'STRING_VALUE',
              KeyRotationStatus: true || false,
              KeyState: 'STRING_VALUE',
              Origin: 'STRING_VALUE'
            },
            AwsLambdaFunction: {
              Architectures: [
                'STRING_VALUE',
                /* more items */
              ],
              Code: {
                S3Bucket: 'STRING_VALUE',
                S3Key: 'STRING_VALUE',
                S3ObjectVersion: 'STRING_VALUE',
                ZipFile: 'STRING_VALUE'
              },
              CodeSha256: 'STRING_VALUE',
              DeadLetterConfig: {
                TargetArn: 'STRING_VALUE'
              },
              Environment: {
                Error: {
                  ErrorCode: 'STRING_VALUE',
                  Message: 'STRING_VALUE'
                },
                Variables: {
                  '<NonEmptyString>': 'STRING_VALUE',
                  /* '<NonEmptyString>': ... */
                }
              },
              FunctionName: 'STRING_VALUE',
              Handler: 'STRING_VALUE',
              KmsKeyArn: 'STRING_VALUE',
              LastModified: 'STRING_VALUE',
              Layers: [
                {
                  Arn: 'STRING_VALUE',
                  CodeSize: 'NUMBER_VALUE'
                },
                /* more items */
              ],
              MasterArn: 'STRING_VALUE',
              MemorySize: 'NUMBER_VALUE',
              PackageType: 'STRING_VALUE',
              RevisionId: 'STRING_VALUE',
              Role: 'STRING_VALUE',
              Runtime: 'STRING_VALUE',
              Timeout: 'NUMBER_VALUE',
              TracingConfig: {
                Mode: 'STRING_VALUE'
              },
              Version: 'STRING_VALUE',
              VpcConfig: {
                SecurityGroupIds: [
                  'STRING_VALUE',
                  /* more items */
                ],
                SubnetIds: [
                  'STRING_VALUE',
                  /* more items */
                ],
                VpcId: 'STRING_VALUE'
              }
            },
            AwsLambdaLayerVersion: {
              CompatibleRuntimes: [
                'STRING_VALUE',
                /* more items */
              ],
              CreatedDate: 'STRING_VALUE',
              Version: 'NUMBER_VALUE'
            },
            AwsMskCluster: {
              ClusterInfo: {
                ClientAuthentication: {
                  Sasl: {
                    Iam: {
                      Enabled: true || false
                    },
                    Scram: {
                      Enabled: true || false
                    }
                  },
                  Tls: {
                    CertificateAuthorityArnList: [
                      'STRING_VALUE',
                      /* more items */
                    ],
                    Enabled: true || false
                  },
                  Unauthenticated: {
                    Enabled: true || false
                  }
                },
                ClusterName: 'STRING_VALUE',
                CurrentVersion: 'STRING_VALUE',
                EncryptionInfo: {
                  EncryptionAtRest: {
                    DataVolumeKMSKeyId: 'STRING_VALUE'
                  },
                  EncryptionInTransit: {
                    ClientBroker: 'STRING_VALUE',
                    InCluster: true || false
                  }
                },
                EnhancedMonitoring: 'STRING_VALUE',
                NumberOfBrokerNodes: 'NUMBER_VALUE'
              }
            },
            AwsNetworkFirewallFirewall: {
              DeleteProtection: true || false,
              Description: 'STRING_VALUE',
              FirewallArn: 'STRING_VALUE',
              FirewallId: 'STRING_VALUE',
              FirewallName: 'STRING_VALUE',
              FirewallPolicyArn: 'STRING_VALUE',
              FirewallPolicyChangeProtection: true || false,
              SubnetChangeProtection: true || false,
              SubnetMappings: [
                {
                  SubnetId: 'STRING_VALUE'
                },
                /* more items */
              ],
              VpcId: 'STRING_VALUE'
            },
            AwsNetworkFirewallFirewallPolicy: {
              Description: 'STRING_VALUE',
              FirewallPolicy: {
                StatefulRuleGroupReferences: [
                  {
                    ResourceArn: 'STRING_VALUE'
                  },
                  /* more items */
                ],
                StatelessCustomActions: [
                  {
                    ActionDefinition: {
                      PublishMetricAction: {
                        Dimensions: [
                          {
                            Value: 'STRING_VALUE'
                          },
                          /* more items */
                        ]
                      }
                    },
                    ActionName: 'STRING_VALUE'
                  },
                  /* more items */
                ],
                StatelessDefaultActions: [
                  'STRING_VALUE',
                  /* more items */
                ],
                StatelessFragmentDefaultActions: [
                  'STRING_VALUE',
                  /* more items */
                ],
                StatelessRuleGroupReferences: [
                  {
                    Priority: 'NUMBER_VALUE',
                    ResourceArn: 'STRING_VALUE'
                  },
                  /* more items */
                ]
              },
              FirewallPolicyArn: 'STRING_VALUE',
              FirewallPolicyId: 'STRING_VALUE',
              FirewallPolicyName: 'STRING_VALUE'
            },
            AwsNetworkFirewallRuleGroup: {
              Capacity: 'NUMBER_VALUE',
              Description: 'STRING_VALUE',
              RuleGroup: {
                RuleVariables: {
                  IpSets: {
                    Definition: [
                      'STRING_VALUE',
                      /* more items */
                    ]
                  },
                  PortSets: {
                    Definition: [
                      'STRING_VALUE',
                      /* more items */
                    ]
                  }
                },
                RulesSource: {
                  RulesSourceList: {
                    GeneratedRulesType: 'STRING_VALUE',
                    TargetTypes: [
                      'STRING_VALUE',
                      /* more items */
                    ],
                    Targets: [
                      'STRING_VALUE',
                      /* more items */
                    ]
                  },
                  RulesString: 'STRING_VALUE',
                  StatefulRules: [
                    {
                      Action: 'STRING_VALUE',
                      Header: {
                        Destination: 'STRING_VALUE',
                        DestinationPort: 'STRING_VALUE',
                        Direction: 'STRING_VALUE',
                        Protocol: 'STRING_VALUE',
                        Source: 'STRING_VALUE',
                        SourcePort: 'STRING_VALUE'
                      },
                      RuleOptions: [
                        {
                          Keyword: 'STRING_VALUE',
                          Settings: [
                            'STRING_VALUE',
                            /* more items */
                          ]
                        },
                        /* more items */
                      ]
                    },
                    /* more items */
                  ],
                  StatelessRulesAndCustomActions: {
                    CustomActions: [
                      {
                        ActionDefinition: {
                          PublishMetricAction: {
                            Dimensions: [
                              {
                                Value: 'STRING_VALUE'
                              },
                              /* more items */
                            ]
                          }
                        },
                        ActionName: 'STRING_VALUE'
                      },
                      /* more items */
                    ],
                    StatelessRules: [
                      {
                        Priority: 'NUMBER_VALUE',
                        RuleDefinition: {
                          Actions: [
                            'STRING_VALUE',
                            /* more items */
                          ],
                          MatchAttributes: {
                            DestinationPorts: [
                              {
                                FromPort: 'NUMBER_VALUE',
                                ToPort: 'NUMBER_VALUE'
                              },
                              /* more items */
                            ],
                            Destinations: [
                              {
                                AddressDefinition: 'STRING_VALUE'
                              },
                              /* more items */
                            ],
                            Protocols: [
                              'NUMBER_VALUE',
                              /* more items */
                            ],
                            SourcePorts: [
                              {
                                FromPort: 'NUMBER_VALUE',
                                ToPort: 'NUMBER_VALUE'
                              },
                              /* more items */
                            ],
                            Sources: [
                              {
                                AddressDefinition: 'STRING_VALUE'
                              },
                              /* more items */
                            ],
                            TcpFlags: [
                              {
                                Flags: [
                                  'STRING_VALUE',
                                  /* more items */
                                ],
                                Masks: [
                                  'STRING_VALUE',
                                  /* more items */
                                ]
                              },
                              /* more items */
                            ]
                          }
                        }
                      },
                      /* more items */
                    ]
                  }
                }
              },
              RuleGroupArn: 'STRING_VALUE',
              RuleGroupId: 'STRING_VALUE',
              RuleGroupName: 'STRING_VALUE',
              Type: 'STRING_VALUE'
            },
            AwsOpenSearchServiceDomain: {
              AccessPolicies: 'STRING_VALUE',
              AdvancedSecurityOptions: {
                Enabled: true || false,
                InternalUserDatabaseEnabled: true || false,
                MasterUserOptions: {
                  MasterUserArn: 'STRING_VALUE',
                  MasterUserName: 'STRING_VALUE',
                  MasterUserPassword: 'STRING_VALUE'
                }
              },
              Arn: 'STRING_VALUE',
              ClusterConfig: {
                DedicatedMasterCount: 'NUMBER_VALUE',
                DedicatedMasterEnabled: true || false,
                DedicatedMasterType: 'STRING_VALUE',
                InstanceCount: 'NUMBER_VALUE',
                InstanceType: 'STRING_VALUE',
                WarmCount: 'NUMBER_VALUE',
                WarmEnabled: true || false,
                WarmType: 'STRING_VALUE',
                ZoneAwarenessConfig: {
                  AvailabilityZoneCount: 'NUMBER_VALUE'
                },
                ZoneAwarenessEnabled: true || false
              },
              DomainEndpoint: 'STRING_VALUE',
              DomainEndpointOptions: {
                CustomEndpoint: 'STRING_VALUE',
                CustomEndpointCertificateArn: 'STRING_VALUE',
                CustomEndpointEnabled: true || false,
                EnforceHTTPS: true || false,
                TLSSecurityPolicy: 'STRING_VALUE'
              },
              DomainEndpoints: {
                '<NonEmptyString>': 'STRING_VALUE',
                /* '<NonEmptyString>': ... */
              },
              DomainName: 'STRING_VALUE',
              EncryptionAtRestOptions: {
                Enabled: true || false,
                KmsKeyId: 'STRING_VALUE'
              },
              EngineVersion: 'STRING_VALUE',
              Id: 'STRING_VALUE',
              LogPublishingOptions: {
                AuditLogs: {
                  CloudWatchLogsLogGroupArn: 'STRING_VALUE',
                  Enabled: true || false
                },
                IndexSlowLogs: {
                  CloudWatchLogsLogGroupArn: 'STRING_VALUE',
                  Enabled: true || false
                },
                SearchSlowLogs: {
                  CloudWatchLogsLogGroupArn: 'STRING_VALUE',
                  Enabled: true || false
                }
              },
              NodeToNodeEncryptionOptions: {
                Enabled: true || false
              },
              ServiceSoftwareOptions: {
                AutomatedUpdateDate: 'STRING_VALUE',
                Cancellable: true || false,
                CurrentVersion: 'STRING_VALUE',
                Description: 'STRING_VALUE',
                NewVersion: 'STRING_VALUE',
                OptionalDeployment: true || false,
                UpdateAvailable: true || false,
                UpdateStatus: 'STRING_VALUE'
              },
              VpcOptions: {
                SecurityGroupIds: [
                  'STRING_VALUE',
                  /* more items */
                ],
                SubnetIds: [
                  'STRING_VALUE',
                  /* more items */
                ]
              }
            },
            AwsRdsDbCluster: {
              ActivityStreamStatus: 'STRING_VALUE',
              AllocatedStorage: 'NUMBER_VALUE',
              AssociatedRoles: [
                {
                  RoleArn: 'STRING_VALUE',
                  Status: 'STRING_VALUE'
                },
                /* more items */
              ],
              AutoMinorVersionUpgrade: true || false,
              AvailabilityZones: [
                'STRING_VALUE',
                /* more items */
              ],
              BackupRetentionPeriod: 'NUMBER_VALUE',
              ClusterCreateTime: 'STRING_VALUE',
              CopyTagsToSnapshot: true || false,
              CrossAccountClone: true || false,
              CustomEndpoints: [
                'STRING_VALUE',
                /* more items */
              ],
              DatabaseName: 'STRING_VALUE',
              DbClusterIdentifier: 'STRING_VALUE',
              DbClusterMembers: [
                {
                  DbClusterParameterGroupStatus: 'STRING_VALUE',
                  DbInstanceIdentifier: 'STRING_VALUE',
                  IsClusterWriter: true || false,
                  PromotionTier: 'NUMBER_VALUE'
                },
                /* more items */
              ],
              DbClusterOptionGroupMemberships: [
                {
                  DbClusterOptionGroupName: 'STRING_VALUE',
                  Status: 'STRING_VALUE'
                },
                /* more items */
              ],
              DbClusterParameterGroup: 'STRING_VALUE',
              DbClusterResourceId: 'STRING_VALUE',
              DbSubnetGroup: 'STRING_VALUE',
              DeletionProtection: true || false,
              DomainMemberships: [
                {
                  Domain: 'STRING_VALUE',
                  Fqdn: 'STRING_VALUE',
                  IamRoleName: 'STRING_VALUE',
                  Status: 'STRING_VALUE'
                },
                /* more items */
              ],
              EnabledCloudWatchLogsExports: [
                'STRING_VALUE',
                /* more items */
              ],
              Endpoint: 'STRING_VALUE',
              Engine: 'STRING_VALUE',
              EngineMode: 'STRING_VALUE',
              EngineVersion: 'STRING_VALUE',
              HostedZoneId: 'STRING_VALUE',
              HttpEndpointEnabled: true || false,
              IamDatabaseAuthenticationEnabled: true || false,
              KmsKeyId: 'STRING_VALUE',
              MasterUsername: 'STRING_VALUE',
              MultiAz: true || false,
              Port: 'NUMBER_VALUE',
              PreferredBackupWindow: 'STRING_VALUE',
              PreferredMaintenanceWindow: 'STRING_VALUE',
              ReadReplicaIdentifiers: [
                'STRING_VALUE',
                /* more items */
              ],
              ReaderEndpoint: 'STRING_VALUE',
              Status: 'STRING_VALUE',
              StorageEncrypted: true || false,
              VpcSecurityGroups: [
                {
                  Status: 'STRING_VALUE',
                  VpcSecurityGroupId: 'STRING_VALUE'
                },
                /* more items */
              ]
            },
            AwsRdsDbClusterSnapshot: {
              AllocatedStorage: 'NUMBER_VALUE',
              AvailabilityZones: [
                'STRING_VALUE',
                /* more items */
              ],
              ClusterCreateTime: 'STRING_VALUE',
              DbClusterIdentifier: 'STRING_VALUE',
              DbClusterSnapshotAttributes: [
                {
                  AttributeName: 'STRING_VALUE',
                  AttributeValues: [
                    'STRING_VALUE',
                    /* more items */
                  ]
                },
                /* more items */
              ],
              DbClusterSnapshotIdentifier: 'STRING_VALUE',
              Engine: 'STRING_VALUE',
              EngineVersion: 'STRING_VALUE',
              IamDatabaseAuthenticationEnabled: true || false,
              KmsKeyId: 'STRING_VALUE',
              LicenseModel: 'STRING_VALUE',
              MasterUsername: 'STRING_VALUE',
              PercentProgress: 'NUMBER_VALUE',
              Port: 'NUMBER_VALUE',
              SnapshotCreateTime: 'STRING_VALUE',
              SnapshotType: 'STRING_VALUE',
              Status: 'STRING_VALUE',
              StorageEncrypted: true || false,
              VpcId: 'STRING_VALUE'
            },
            AwsRdsDbInstance: {
              AllocatedStorage: 'NUMBER_VALUE',
              AssociatedRoles: [
                {
                  FeatureName: 'STRING_VALUE',
                  RoleArn: 'STRING_VALUE',
                  Status: 'STRING_VALUE'
                },
                /* more items */
              ],
              AutoMinorVersionUpgrade: true || false,
              AvailabilityZone: 'STRING_VALUE',
              BackupRetentionPeriod: 'NUMBER_VALUE',
              CACertificateIdentifier: 'STRING_VALUE',
              CharacterSetName: 'STRING_VALUE',
              CopyTagsToSnapshot: true || false,
              DBClusterIdentifier: 'STRING_VALUE',
              DBInstanceClass: 'STRING_VALUE',
              DBInstanceIdentifier: 'STRING_VALUE',
              DBName: 'STRING_VALUE',
              DbInstancePort: 'NUMBER_VALUE',
              DbInstanceStatus: 'STRING_VALUE',
              DbParameterGroups: [
                {
                  DbParameterGroupName: 'STRING_VALUE',
                  ParameterApplyStatus: 'STRING_VALUE'
                },
                /* more items */
              ],
              DbSecurityGroups: [
                'STRING_VALUE',
                /* more items */
              ],
              DbSubnetGroup: {
                DbSubnetGroupArn: 'STRING_VALUE',
                DbSubnetGroupDescription: 'STRING_VALUE',
                DbSubnetGroupName: 'STRING_VALUE',
                SubnetGroupStatus: 'STRING_VALUE',
                Subnets: [
                  {
                    SubnetAvailabilityZone: {
                      Name: 'STRING_VALUE'
                    },
                    SubnetIdentifier: 'STRING_VALUE',
                    SubnetStatus: 'STRING_VALUE'
                  },
                  /* more items */
                ],
                VpcId: 'STRING_VALUE'
              },
              DbiResourceId: 'STRING_VALUE',
              DeletionProtection: true || false,
              DomainMemberships: [
                {
                  Domain: 'STRING_VALUE',
                  Fqdn: 'STRING_VALUE',
                  IamRoleName: 'STRING_VALUE',
                  Status: 'STRING_VALUE'
                },
                /* more items */
              ],
              EnabledCloudWatchLogsExports: [
                'STRING_VALUE',
                /* more items */
              ],
              Endpoint: {
                Address: 'STRING_VALUE',
                HostedZoneId: 'STRING_VALUE',
                Port: 'NUMBER_VALUE'
              },
              Engine: 'STRING_VALUE',
              EngineVersion: 'STRING_VALUE',
              EnhancedMonitoringResourceArn: 'STRING_VALUE',
              IAMDatabaseAuthenticationEnabled: true || false,
              InstanceCreateTime: 'STRING_VALUE',
              Iops: 'NUMBER_VALUE',
              KmsKeyId: 'STRING_VALUE',
              LatestRestorableTime: 'STRING_VALUE',
              LicenseModel: 'STRING_VALUE',
              ListenerEndpoint: {
                Address: 'STRING_VALUE',
                HostedZoneId: 'STRING_VALUE',
                Port: 'NUMBER_VALUE'
              },
              MasterUsername: 'STRING_VALUE',
              MaxAllocatedStorage: 'NUMBER_VALUE',
              MonitoringInterval: 'NUMBER_VALUE',
              MonitoringRoleArn: 'STRING_VALUE',
              MultiAz: true || false,
              OptionGroupMemberships: [
                {
                  OptionGroupName: 'STRING_VALUE',
                  Status: 'STRING_VALUE'
                },
                /* more items */
              ],
              PendingModifiedValues: {
                AllocatedStorage: 'NUMBER_VALUE',
                BackupRetentionPeriod: 'NUMBER_VALUE',
                CaCertificateIdentifier: 'STRING_VALUE',
                DbInstanceClass: 'STRING_VALUE',
                DbInstanceIdentifier: 'STRING_VALUE',
                DbSubnetGroupName: 'STRING_VALUE',
                EngineVersion: 'STRING_VALUE',
                Iops: 'NUMBER_VALUE',
                LicenseModel: 'STRING_VALUE',
                MasterUserPassword: 'STRING_VALUE',
                MultiAZ: true || false,
                PendingCloudWatchLogsExports: {
                  LogTypesToDisable: [
                    'STRING_VALUE',
                    /* more items */
                  ],
                  LogTypesToEnable: [
                    'STRING_VALUE',
                    /* more items */
                  ]
                },
                Port: 'NUMBER_VALUE',
                ProcessorFeatures: [
                  {
                    Name: 'STRING_VALUE',
                    Value: 'STRING_VALUE'
                  },
                  /* more items */
                ],
                StorageType: 'STRING_VALUE'
              },
              PerformanceInsightsEnabled: true || false,
              PerformanceInsightsKmsKeyId: 'STRING_VALUE',
              PerformanceInsightsRetentionPeriod: 'NUMBER_VALUE',
              PreferredBackupWindow: 'STRING_VALUE',
              PreferredMaintenanceWindow: 'STRING_VALUE',
              ProcessorFeatures: [
                {
                  Name: 'STRING_VALUE',
                  Value: 'STRING_VALUE'
                },
                /* more items */
              ],
              PromotionTier: 'NUMBER_VALUE',
              PubliclyAccessible: true || false,
              ReadReplicaDBClusterIdentifiers: [
                'STRING_VALUE',
                /* more items */
              ],
              ReadReplicaDBInstanceIdentifiers: [
                'STRING_VALUE',
                /* more items */
              ],
              ReadReplicaSourceDBInstanceIdentifier: 'STRING_VALUE',
              SecondaryAvailabilityZone: 'STRING_VALUE',
              StatusInfos: [
                {
                  Message: 'STRING_VALUE',
                  Normal: true || false,
                  Status: 'STRING_VALUE',
                  StatusType: 'STRING_VALUE'
                },
                /* more items */
              ],
              StorageEncrypted: true || false,
              StorageType: 'STRING_VALUE',
              TdeCredentialArn: 'STRING_VALUE',
              Timezone: 'STRING_VALUE',
              VpcSecurityGroups: [
                {
                  Status: 'STRING_VALUE',
                  VpcSecurityGroupId: 'STRING_VALUE'
                },
                /* more items */
              ]
            },
            AwsRdsDbSecurityGroup: {
              DbSecurityGroupArn: 'STRING_VALUE',
              DbSecurityGroupDescription: 'STRING_VALUE',
              DbSecurityGroupName: 'STRING_VALUE',
              Ec2SecurityGroups: [
                {
                  Ec2SecurityGroupId: 'STRING_VALUE',
                  Ec2SecurityGroupName: 'STRING_VALUE',
                  Ec2SecurityGroupOwnerId: 'STRING_VALUE',
                  Status: 'STRING_VALUE'
                },
                /* more items */
              ],
              IpRanges: [
                {
                  CidrIp: 'STRING_VALUE',
                  Status: 'STRING_VALUE'
                },
                /* more items */
              ],
              OwnerId: 'STRING_VALUE',
              VpcId: 'STRING_VALUE'
            },
            AwsRdsDbSnapshot: {
              AllocatedStorage: 'NUMBER_VALUE',
              AvailabilityZone: 'STRING_VALUE',
              DbInstanceIdentifier: 'STRING_VALUE',
              DbSnapshotIdentifier: 'STRING_VALUE',
              DbiResourceId: 'STRING_VALUE',
              Encrypted: true || false,
              Engine: 'STRING_VALUE',
              EngineVersion: 'STRING_VALUE',
              IamDatabaseAuthenticationEnabled: true || false,
              InstanceCreateTime: 'STRING_VALUE',
              Iops: 'NUMBER_VALUE',
              KmsKeyId: 'STRING_VALUE',
              LicenseModel: 'STRING_VALUE',
              MasterUsername: 'STRING_VALUE',
              OptionGroupName: 'STRING_VALUE',
              PercentProgress: 'NUMBER_VALUE',
              Port: 'NUMBER_VALUE',
              ProcessorFeatures: [
                {
                  Name: 'STRING_VALUE',
                  Value: 'STRING_VALUE'
                },
                /* more items */
              ],
              SnapshotCreateTime: 'STRING_VALUE',
              SnapshotType: 'STRING_VALUE',
              SourceDbSnapshotIdentifier: 'STRING_VALUE',
              SourceRegion: 'STRING_VALUE',
              Status: 'STRING_VALUE',
              StorageType: 'STRING_VALUE',
              TdeCredentialArn: 'STRING_VALUE',
              Timezone: 'STRING_VALUE',
              VpcId: 'STRING_VALUE'
            },
            AwsRdsEventSubscription: {
              CustSubscriptionId: 'STRING_VALUE',
              CustomerAwsId: 'STRING_VALUE',
              Enabled: true || false,
              EventCategoriesList: [
                'STRING_VALUE',
                /* more items */
              ],
              EventSubscriptionArn: 'STRING_VALUE',
              SnsTopicArn: 'STRING_VALUE',
              SourceIdsList: [
                'STRING_VALUE',
                /* more items */
              ],
              SourceType: 'STRING_VALUE',
              Status: 'STRING_VALUE',
              SubscriptionCreationTime: 'STRING_VALUE'
            },
            AwsRedshiftCluster: {
              AllowVersionUpgrade: true || false,
              AutomatedSnapshotRetentionPeriod: 'NUMBER_VALUE',
              AvailabilityZone: 'STRING_VALUE',
              ClusterAvailabilityStatus: 'STRING_VALUE',
              ClusterCreateTime: 'STRING_VALUE',
              ClusterIdentifier: 'STRING_VALUE',
              ClusterNodes: [
                {
                  NodeRole: 'STRING_VALUE',
                  PrivateIpAddress: 'STRING_VALUE',
                  PublicIpAddress: 'STRING_VALUE'
                },
                /* more items */
              ],
              ClusterParameterGroups: [
                {
                  ClusterParameterStatusList: [
                    {
                      ParameterApplyErrorDescription: 'STRING_VALUE',
                      ParameterApplyStatus: 'STRING_VALUE',
                      ParameterName: 'STRING_VALUE'
                    },
                    /* more items */
                  ],
                  ParameterApplyStatus: 'STRING_VALUE',
                  ParameterGroupName: 'STRING_VALUE'
                },
                /* more items */
              ],
              ClusterPublicKey: 'STRING_VALUE',
              ClusterRevisionNumber: 'STRING_VALUE',
              ClusterSecurityGroups: [
                {
                  ClusterSecurityGroupName: 'STRING_VALUE',
                  Status: 'STRING_VALUE'
                },
                /* more items */
              ],
              ClusterSnapshotCopyStatus: {
                DestinationRegion: 'STRING_VALUE',
                ManualSnapshotRetentionPeriod: 'NUMBER_VALUE',
                RetentionPeriod: 'NUMBER_VALUE',
                SnapshotCopyGrantName: 'STRING_VALUE'
              },
              ClusterStatus: 'STRING_VALUE',
              ClusterSubnetGroupName: 'STRING_VALUE',
              ClusterVersion: 'STRING_VALUE',
              DBName: 'STRING_VALUE',
              DeferredMaintenanceWindows: [
                {
                  DeferMaintenanceEndTime: 'STRING_VALUE',
                  DeferMaintenanceIdentifier: 'STRING_VALUE',
                  DeferMaintenanceStartTime: 'STRING_VALUE'
                },
                /* more items */
              ],
              ElasticIpStatus: {
                ElasticIp: 'STRING_VALUE',
                Status: 'STRING_VALUE'
              },
              ElasticResizeNumberOfNodeOptions: 'STRING_VALUE',
              Encrypted: true || false,
              Endpoint: {
                Address: 'STRING_VALUE',
                Port: 'NUMBER_VALUE'
              },
              EnhancedVpcRouting: true || false,
              ExpectedNextSnapshotScheduleTime: 'STRING_VALUE',
              ExpectedNextSnapshotScheduleTimeStatus: 'STRING_VALUE',
              HsmStatus: {
                HsmClientCertificateIdentifier: 'STRING_VALUE',
                HsmConfigurationIdentifier: 'STRING_VALUE',
                Status: 'STRING_VALUE'
              },
              IamRoles: [
                {
                  ApplyStatus: 'STRING_VALUE',
                  IamRoleArn: 'STRING_VALUE'
                },
                /* more items */
              ],
              KmsKeyId: 'STRING_VALUE',
              LoggingStatus: {
                BucketName: 'STRING_VALUE',
                LastFailureMessage: 'STRING_VALUE',
                LastFailureTime: 'STRING_VALUE',
                LastSuccessfulDeliveryTime: 'STRING_VALUE',
                LoggingEnabled: true || false,
                S3KeyPrefix: 'STRING_VALUE'
              },
              MaintenanceTrackName: 'STRING_VALUE',
              ManualSnapshotRetentionPeriod: 'NUMBER_VALUE',
              MasterUsername: 'STRING_VALUE',
              NextMaintenanceWindowStartTime: 'STRING_VALUE',
              NodeType: 'STRING_VALUE',
              NumberOfNodes: 'NUMBER_VALUE',
              PendingActions: [
                'STRING_VALUE',
                /* more items */
              ],
              PendingModifiedValues: {
                AutomatedSnapshotRetentionPeriod: 'NUMBER_VALUE',
                ClusterIdentifier: 'STRING_VALUE',
                ClusterType: 'STRING_VALUE',
                ClusterVersion: 'STRING_VALUE',
                EncryptionType: 'STRING_VALUE',
                EnhancedVpcRouting: true || false,
                MaintenanceTrackName: 'STRING_VALUE',
                MasterUserPassword: 'STRING_VALUE',
                NodeType: 'STRING_VALUE',
                NumberOfNodes: 'NUMBER_VALUE',
                PubliclyAccessible: true || false
              },
              PreferredMaintenanceWindow: 'STRING_VALUE',
              PubliclyAccessible: true || false,
              ResizeInfo: {
                AllowCancelResize: true || false,
                ResizeType: 'STRING_VALUE'
              },
              RestoreStatus: {
                CurrentRestoreRateInMegaBytesPerSecond: 'NUMBER_VALUE',
                ElapsedTimeInSeconds: 'NUMBER_VALUE',
                EstimatedTimeToCompletionInSeconds: 'NUMBER_VALUE',
                ProgressInMegaBytes: 'NUMBER_VALUE',
                SnapshotSizeInMegaBytes: 'NUMBER_VALUE',
                Status: 'STRING_VALUE'
              },
              SnapshotScheduleIdentifier: 'STRING_VALUE',
              SnapshotScheduleState: 'STRING_VALUE',
              VpcId: 'STRING_VALUE',
              VpcSecurityGroups: [
                {
                  Status: 'STRING_VALUE',
                  VpcSecurityGroupId: 'STRING_VALUE'
                },
                /* more items */
              ]
            },
            AwsRoute53HostedZone: {
              HostedZone: {
                Config: {
                  Comment: 'STRING_VALUE'
                },
                Id: 'STRING_VALUE',
                Name: 'STRING_VALUE'
              },
              NameServers: [
                'STRING_VALUE',
                /* more items */
              ],
              QueryLoggingConfig: {
                CloudWatchLogsLogGroupArn: {
                  CloudWatchLogsLogGroupArn: 'STRING_VALUE',
                  HostedZoneId: 'STRING_VALUE',
                  Id: 'STRING_VALUE'
                }
              },
              Vpcs: [
                {
                  Id: 'STRING_VALUE',
                  Region: 'STRING_VALUE'
                },
                /* more items */
              ]
            },
            AwsS3AccessPoint: {
              AccessPointArn: 'STRING_VALUE',
              Alias: 'STRING_VALUE',
              Bucket: 'STRING_VALUE',
              BucketAccountId: 'STRING_VALUE',
              Name: 'STRING_VALUE',
              NetworkOrigin: 'STRING_VALUE',
              PublicAccessBlockConfiguration: {
                BlockPublicAcls: true || false,
                BlockPublicPolicy: true || false,
                IgnorePublicAcls: true || false,
                RestrictPublicBuckets: true || false
              },
              VpcConfiguration: {
                VpcId: 'STRING_VALUE'
              }
            },
            AwsS3AccountPublicAccessBlock: {
              BlockPublicAcls: true || false,
              BlockPublicPolicy: true || false,
              IgnorePublicAcls: true || false,
              RestrictPublicBuckets: true || false
            },
            AwsS3Bucket: {
              AccessControlList: 'STRING_VALUE',
              BucketLifecycleConfiguration: {
                Rules: [
                  {
                    AbortIncompleteMultipartUpload: {
                      DaysAfterInitiation: 'NUMBER_VALUE'
                    },
                    ExpirationDate: 'STRING_VALUE',
                    ExpirationInDays: 'NUMBER_VALUE',
                    ExpiredObjectDeleteMarker: true || false,
                    Filter: {
                      Predicate: {
                        Operands: [
                          {
                            Prefix: 'STRING_VALUE',
                            Tag: {
                              Key: 'STRING_VALUE',
                              Value: 'STRING_VALUE'
                            },
                            Type: 'STRING_VALUE'
                          },
                          /* more items */
                        ],
                        Prefix: 'STRING_VALUE',
                        Tag: {
                          Key: 'STRING_VALUE',
                          Value: 'STRING_VALUE'
                        },
                        Type: 'STRING_VALUE'
                      }
                    },
                    ID: 'STRING_VALUE',
                    NoncurrentVersionExpirationInDays: 'NUMBER_VALUE',
                    NoncurrentVersionTransitions: [
                      {
                        Days: 'NUMBER_VALUE',
                        StorageClass: 'STRING_VALUE'
                      },
                      /* more items */
                    ],
                    Prefix: 'STRING_VALUE',
                    Status: 'STRING_VALUE',
                    Transitions: [
                      {
                        Date: 'STRING_VALUE',
                        Days: 'NUMBER_VALUE',
                        StorageClass: 'STRING_VALUE'
                      },
                      /* more items */
                    ]
                  },
                  /* more items */
                ]
              },
              BucketLoggingConfiguration: {
                DestinationBucketName: 'STRING_VALUE',
                LogFilePrefix: 'STRING_VALUE'
              },
              BucketNotificationConfiguration: {
                Configurations: [
                  {
                    Destination: 'STRING_VALUE',
                    Events: [
                      'STRING_VALUE',
                      /* more items */
                    ],
                    Filter: {
                      S3KeyFilter: {
                        FilterRules: [
                          {
                            Name: Prefix | Suffix,
                            Value: 'STRING_VALUE'
                          },
                          /* more items */
                        ]
                      }
                    },
                    Type: 'STRING_VALUE'
                  },
                  /* more items */
                ]
              },
              BucketVersioningConfiguration: {
                IsMfaDeleteEnabled: true || false,
                Status: 'STRING_VALUE'
              },
              BucketWebsiteConfiguration: {
                ErrorDocument: 'STRING_VALUE',
                IndexDocumentSuffix: 'STRING_VALUE',
                RedirectAllRequestsTo: {
                  Hostname: 'STRING_VALUE',
                  Protocol: 'STRING_VALUE'
                },
                RoutingRules: [
                  {
                    Condition: {
                      HttpErrorCodeReturnedEquals: 'STRING_VALUE',
                      KeyPrefixEquals: 'STRING_VALUE'
                    },
                    Redirect: {
                      Hostname: 'STRING_VALUE',
                      HttpRedirectCode: 'STRING_VALUE',
                      Protocol: 'STRING_VALUE',
                      ReplaceKeyPrefixWith: 'STRING_VALUE',
                      ReplaceKeyWith: 'STRING_VALUE'
                    }
                  },
                  /* more items */
                ]
              },
              CreatedAt: 'STRING_VALUE',
              Name: 'STRING_VALUE',
              ObjectLockConfiguration: {
                ObjectLockEnabled: 'STRING_VALUE',
                Rule: {
                  DefaultRetention: {
                    Days: 'NUMBER_VALUE',
                    Mode: 'STRING_VALUE',
                    Years: 'NUMBER_VALUE'
                  }
                }
              },
              OwnerAccountId: 'STRING_VALUE',
              OwnerId: 'STRING_VALUE',
              OwnerName: 'STRING_VALUE',
              PublicAccessBlockConfiguration: {
                BlockPublicAcls: true || false,
                BlockPublicPolicy: true || false,
                IgnorePublicAcls: true || false,
                RestrictPublicBuckets: true || false
              },
              ServerSideEncryptionConfiguration: {
                Rules: [
                  {
                    ApplyServerSideEncryptionByDefault: {
                      KMSMasterKeyID: 'STRING_VALUE',
                      SSEAlgorithm: 'STRING_VALUE'
                    }
                  },
                  /* more items */
                ]
              }
            },
            AwsS3Object: {
              ContentType: 'STRING_VALUE',
              ETag: 'STRING_VALUE',
              LastModified: 'STRING_VALUE',
              SSEKMSKeyId: 'STRING_VALUE',
              ServerSideEncryption: 'STRING_VALUE',
              VersionId: 'STRING_VALUE'
            },
            AwsSageMakerNotebookInstance: {
              AcceleratorTypes: [
                'STRING_VALUE',
                /* more items */
              ],
              AdditionalCodeRepositories: [
                'STRING_VALUE',
                /* more items */
              ],
              DefaultCodeRepository: 'STRING_VALUE',
              DirectInternetAccess: 'STRING_VALUE',
              FailureReason: 'STRING_VALUE',
              InstanceMetadataServiceConfiguration: {
                MinimumInstanceMetadataServiceVersion: 'STRING_VALUE'
              },
              InstanceType: 'STRING_VALUE',
              KmsKeyId: 'STRING_VALUE',
              NetworkInterfaceId: 'STRING_VALUE',
              NotebookInstanceArn: 'STRING_VALUE',
              NotebookInstanceLifecycleConfigName: 'STRING_VALUE',
              NotebookInstanceName: 'STRING_VALUE',
              NotebookInstanceStatus: 'STRING_VALUE',
              PlatformIdentifier: 'STRING_VALUE',
              RoleArn: 'STRING_VALUE',
              RootAccess: 'STRING_VALUE',
              SecurityGroups: [
                'STRING_VALUE',
                /* more items */
              ],
              SubnetId: 'STRING_VALUE',
              Url: 'STRING_VALUE',
              VolumeSizeInGB: 'NUMBER_VALUE'
            },
            AwsSecretsManagerSecret: {
              Deleted: true || false,
              Description: 'STRING_VALUE',
              KmsKeyId: 'STRING_VALUE',
              Name: 'STRING_VALUE',
              RotationEnabled: true || false,
              RotationLambdaArn: 'STRING_VALUE',
              RotationOccurredWithinFrequency: true || false,
              RotationRules: {
                AutomaticallyAfterDays: 'NUMBER_VALUE'
              }
            },
            AwsSnsTopic: {
              ApplicationSuccessFeedbackRoleArn: 'STRING_VALUE',
              FirehoseFailureFeedbackRoleArn: 'STRING_VALUE',
              FirehoseSuccessFeedbackRoleArn: 'STRING_VALUE',
              HttpFailureFeedbackRoleArn: 'STRING_VALUE',
              HttpSuccessFeedbackRoleArn: 'STRING_VALUE',
              KmsMasterKeyId: 'STRING_VALUE',
              Owner: 'STRING_VALUE',
              SqsFailureFeedbackRoleArn: 'STRING_VALUE',
              SqsSuccessFeedbackRoleArn: 'STRING_VALUE',
              Subscription: [
                {
                  Endpoint: 'STRING_VALUE',
                  Protocol: 'STRING_VALUE'
                },
                /* more items */
              ],
              TopicName: 'STRING_VALUE'
            },
            AwsSqsQueue: {
              DeadLetterTargetArn: 'STRING_VALUE',
              KmsDataKeyReusePeriodSeconds: 'NUMBER_VALUE',
              KmsMasterKeyId: 'STRING_VALUE',
              QueueName: 'STRING_VALUE'
            },
            AwsSsmPatchCompliance: {
              Patch: {
                ComplianceSummary: {
                  ComplianceType: 'STRING_VALUE',
                  CompliantCriticalCount: 'NUMBER_VALUE',
                  CompliantHighCount: 'NUMBER_VALUE',
                  CompliantInformationalCount: 'NUMBER_VALUE',
                  CompliantLowCount: 'NUMBER_VALUE',
                  CompliantMediumCount: 'NUMBER_VALUE',
                  CompliantUnspecifiedCount: 'NUMBER_VALUE',
                  ExecutionType: 'STRING_VALUE',
                  NonCompliantCriticalCount: 'NUMBER_VALUE',
                  NonCompliantHighCount: 'NUMBER_VALUE',
                  NonCompliantInformationalCount: 'NUMBER_VALUE',
                  NonCompliantLowCount: 'NUMBER_VALUE',
                  NonCompliantMediumCount: 'NUMBER_VALUE',
                  NonCompliantUnspecifiedCount: 'NUMBER_VALUE',
                  OverallSeverity: 'STRING_VALUE',
                  PatchBaselineId: 'STRING_VALUE',
                  PatchGroup: 'STRING_VALUE',
                  Status: 'STRING_VALUE'
                }
              }
            },
            AwsStepFunctionStateMachine: {
              Label: 'STRING_VALUE',
              LoggingConfiguration: {
                Destinations: [
                  {
                    CloudWatchLogsLogGroup: {
                      LogGroupArn: 'STRING_VALUE'
                    }
                  },
                  /* more items */
                ],
                IncludeExecutionData: true || false,
                Level: 'STRING_VALUE'
              },
              Name: 'STRING_VALUE',
              RoleArn: 'STRING_VALUE',
              StateMachineArn: 'STRING_VALUE',
              Status: 'STRING_VALUE',
              TracingConfiguration: {
                Enabled: true || false
              },
              Type: 'STRING_VALUE'
            },
            AwsWafRateBasedRule: {
              MatchPredicates: [
                {
                  DataId: 'STRING_VALUE',
                  Negated: true || false,
                  Type: 'STRING_VALUE'
                },
                /* more items */
              ],
              MetricName: 'STRING_VALUE',
              Name: 'STRING_VALUE',
              RateKey: 'STRING_VALUE',
              RateLimit: 'NUMBER_VALUE',
              RuleId: 'STRING_VALUE'
            },
            AwsWafRegionalRateBasedRule: {
              MatchPredicates: [
                {
                  DataId: 'STRING_VALUE',
                  Negated: true || false,
                  Type: 'STRING_VALUE'
                },
                /* more items */
              ],
              MetricName: 'STRING_VALUE',
              Name: 'STRING_VALUE',
              RateKey: 'STRING_VALUE',
              RateLimit: 'NUMBER_VALUE',
              RuleId: 'STRING_VALUE'
            },
            AwsWafRegionalRule: {
              MetricName: 'STRING_VALUE',
              Name: 'STRING_VALUE',
              PredicateList: [
                {
                  DataId: 'STRING_VALUE',
                  Negated: true || false,
                  Type: 'STRING_VALUE'
                },
                /* more items */
              ],
              RuleId: 'STRING_VALUE'
            },
            AwsWafRegionalRuleGroup: {
              MetricName: 'STRING_VALUE',
              Name: 'STRING_VALUE',
              RuleGroupId: 'STRING_VALUE',
              Rules: [
                {
                  Action: {
                    Type: 'STRING_VALUE'
                  },
                  Priority: 'NUMBER_VALUE',
                  RuleId: 'STRING_VALUE',
                  Type: 'STRING_VALUE'
                },
                /* more items */
              ]
            },
            AwsWafRegionalWebAcl: {
              DefaultAction: 'STRING_VALUE',
              MetricName: 'STRING_VALUE',
              Name: 'STRING_VALUE',
              RulesList: [
                {
                  Action: {
                    Type: 'STRING_VALUE'
                  },
                  OverrideAction: {
                    Type: 'STRING_VALUE'
                  },
                  Priority: 'NUMBER_VALUE',
                  RuleId: 'STRING_VALUE',
                  Type: 'STRING_VALUE'
                },
                /* more items */
              ],
              WebAclId: 'STRING_VALUE'
            },
            AwsWafRule: {
              MetricName: 'STRING_VALUE',
              Name: 'STRING_VALUE',
              PredicateList: [
                {
                  DataId: 'STRING_VALUE',
                  Negated: true || false,
                  Type: 'STRING_VALUE'
                },
                /* more items */
              ],
              RuleId: 'STRING_VALUE'
            },
            AwsWafRuleGroup: {
              MetricName: 'STRING_VALUE',
              Name: 'STRING_VALUE',
              RuleGroupId: 'STRING_VALUE',
              Rules: [
                {
                  Action: {
                    Type: 'STRING_VALUE'
                  },
                  Priority: 'NUMBER_VALUE',
                  RuleId: 'STRING_VALUE',
                  Type: 'STRING_VALUE'
                },
                /* more items */
              ]
            },
            AwsWafWebAcl: {
              DefaultAction: 'STRING_VALUE',
              Name: 'STRING_VALUE',
              Rules: [
                {
                  Action: {
                    Type: 'STRING_VALUE'
                  },
                  ExcludedRules: [
                    {
                      RuleId: 'STRING_VALUE'
                    },
                    /* more items */
                  ],
                  OverrideAction: {
                    Type: 'STRING_VALUE'
                  },
                  Priority: 'NUMBER_VALUE',
                  RuleId: 'STRING_VALUE',
                  Type: 'STRING_VALUE'
                },
                /* more items */
              ],
              WebAclId: 'STRING_VALUE'
            },
            AwsWafv2RuleGroup: {
              Arn: 'STRING_VALUE',
              Capacity: 'NUMBER_VALUE',
              Description: 'STRING_VALUE',
              Id: 'STRING_VALUE',
              Name: 'STRING_VALUE',
              Rules: [
                {
                  Action: {
                    Allow: {
                      CustomRequestHandling: {
                        InsertHeaders: [
                          {
                            Name: 'STRING_VALUE',
                            Value: 'STRING_VALUE'
                          },
                          /* more items */
                        ]
                      }
                    },
                    Block: {
                      CustomResponse: {
                        CustomResponseBodyKey: 'STRING_VALUE',
                        ResponseCode: 'NUMBER_VALUE',
                        ResponseHeaders: [
                          {
                            Name: 'STRING_VALUE',
                            Value: 'STRING_VALUE'
                          },
                          /* more items */
                        ]
                      }
                    },
                    Captcha: {
                      CustomRequestHandling: {
                        InsertHeaders: [
                          {
                            Name: 'STRING_VALUE',
                            Value: 'STRING_VALUE'
                          },
                          /* more items */
                        ]
                      }
                    },
                    Count: {
                      CustomRequestHandling: {
                        InsertHeaders: [
                          {
                            Name: 'STRING_VALUE',
                            Value: 'STRING_VALUE'
                          },
                          /* more items */
                        ]
                      }
                    }
                  },
                  Name: 'STRING_VALUE',
                  OverrideAction: 'STRING_VALUE',
                  Priority: 'NUMBER_VALUE',
                  VisibilityConfig: {
                    CloudWatchMetricsEnabled: true || false,
                    MetricName: 'STRING_VALUE',
                    SampledRequestsEnabled: true || false
                  }
                },
                /* more items */
              ],
              Scope: 'STRING_VALUE',
              VisibilityConfig: {
                CloudWatchMetricsEnabled: true || false,
                MetricName: 'STRING_VALUE',
                SampledRequestsEnabled: true || false
              }
            },
            AwsWafv2WebAcl: {
              Arn: 'STRING_VALUE',
              Capacity: 'NUMBER_VALUE',
              CaptchaConfig: {
                ImmunityTimeProperty: {
                  ImmunityTime: 'NUMBER_VALUE'
                }
              },
              DefaultAction: {
                Allow: {
                  CustomRequestHandling: {
                    InsertHeaders: [
                      {
                        Name: 'STRING_VALUE',
                        Value: 'STRING_VALUE'
                      },
                      /* more items */
                    ]
                  }
                },
                Block: {
                  CustomResponse: {
                    CustomResponseBodyKey: 'STRING_VALUE',
                    ResponseCode: 'NUMBER_VALUE',
                    ResponseHeaders: [
                      {
                        Name: 'STRING_VALUE',
                        Value: 'STRING_VALUE'
                      },
                      /* more items */
                    ]
                  }
                }
              },
              Description: 'STRING_VALUE',
              Id: 'STRING_VALUE',
              ManagedbyFirewallManager: true || false,
              Name: 'STRING_VALUE',
              Rules: [
                {
                  Action: {
                    Allow: {
                      CustomRequestHandling: {
                        InsertHeaders: [
                          {
                            Name: 'STRING_VALUE',
                            Value: 'STRING_VALUE'
                          },
                          /* more items */
                        ]
                      }
                    },
                    Block: {
                      CustomResponse: {
                        CustomResponseBodyKey: 'STRING_VALUE',
                        ResponseCode: 'NUMBER_VALUE',
                        ResponseHeaders: [
                          {
                            Name: 'STRING_VALUE',
                            Value: 'STRING_VALUE'
                          },
                          /* more items */
                        ]
                      }
                    },
                    Captcha: {
                      CustomRequestHandling: {
                        InsertHeaders: [
                          {
                            Name: 'STRING_VALUE',
                            Value: 'STRING_VALUE'
                          },
                          /* more items */
                        ]
                      }
                    },
                    Count: {
                      CustomRequestHandling: {
                        InsertHeaders: [
                          {
                            Name: 'STRING_VALUE',
                            Value: 'STRING_VALUE'
                          },
                          /* more items */
                        ]
                      }
                    }
                  },
                  Name: 'STRING_VALUE',
                  OverrideAction: 'STRING_VALUE',
                  Priority: 'NUMBER_VALUE',
                  VisibilityConfig: {
                    CloudWatchMetricsEnabled: true || false,
                    MetricName: 'STRING_VALUE',
                    SampledRequestsEnabled: true || false
                  }
                },
                /* more items */
              ],
              VisibilityConfig: {
                CloudWatchMetricsEnabled: true || false,
                MetricName: 'STRING_VALUE',
                SampledRequestsEnabled: true || false
              }
            },
            AwsXrayEncryptionConfig: {
              KeyId: 'STRING_VALUE',
              Status: 'STRING_VALUE',
              Type: 'STRING_VALUE'
            },
            Container: {
              ContainerRuntime: 'STRING_VALUE',
              ImageId: 'STRING_VALUE',
              ImageName: 'STRING_VALUE',
              LaunchedAt: 'STRING_VALUE',
              Name: 'STRING_VALUE',
              Privileged: true || false,
              VolumeMounts: [
                {
                  MountPath: 'STRING_VALUE',
                  Name: 'STRING_VALUE'
                },
                /* more items */
              ]
            },
            Other: {
              '<NonEmptyString>': 'STRING_VALUE',
              /* '<NonEmptyString>': ... */
            }
          },
          Partition: aws | aws-cn | aws-us-gov,
          Region: 'STRING_VALUE',
          ResourceRole: 'STRING_VALUE',
          Tags: {
            '<NonEmptyString>': 'STRING_VALUE',
            /* '<NonEmptyString>': ... */
          }
        },
        /* more items */
      ],
      SchemaVersion: 'STRING_VALUE', /* required */
      Title: 'STRING_VALUE', /* required */
      UpdatedAt: 'STRING_VALUE', /* required */
      Action: {
        ActionType: 'STRING_VALUE',
        AwsApiCallAction: {
          AffectedResources: {
            '<NonEmptyString>': 'STRING_VALUE',
            /* '<NonEmptyString>': ... */
          },
          Api: 'STRING_VALUE',
          CallerType: 'STRING_VALUE',
          DomainDetails: {
            Domain: 'STRING_VALUE'
          },
          FirstSeen: 'STRING_VALUE',
          LastSeen: 'STRING_VALUE',
          RemoteIpDetails: {
            City: {
              CityName: 'STRING_VALUE'
            },
            Country: {
              CountryCode: 'STRING_VALUE',
              CountryName: 'STRING_VALUE'
            },
            GeoLocation: {
              Lat: 'NUMBER_VALUE',
              Lon: 'NUMBER_VALUE'
            },
            IpAddressV4: 'STRING_VALUE',
            Organization: {
              Asn: 'NUMBER_VALUE',
              AsnOrg: 'STRING_VALUE',
              Isp: 'STRING_VALUE',
              Org: 'STRING_VALUE'
            }
          },
          ServiceName: 'STRING_VALUE'
        },
        DnsRequestAction: {
          Blocked: true || false,
          Domain: 'STRING_VALUE',
          Protocol: 'STRING_VALUE'
        },
        NetworkConnectionAction: {
          Blocked: true || false,
          ConnectionDirection: 'STRING_VALUE',
          LocalPortDetails: {
            Port: 'NUMBER_VALUE',
            PortName: 'STRING_VALUE'
          },
          Protocol: 'STRING_VALUE',
          RemoteIpDetails: {
            City: {
              CityName: 'STRING_VALUE'
            },
            Country: {
              CountryCode: 'STRING_VALUE',
              CountryName: 'STRING_VALUE'
            },
            GeoLocation: {
              Lat: 'NUMBER_VALUE',
              Lon: 'NUMBER_VALUE'
            },
            IpAddressV4: 'STRING_VALUE',
            Organization: {
              Asn: 'NUMBER_VALUE',
              AsnOrg: 'STRING_VALUE',
              Isp: 'STRING_VALUE',
              Org: 'STRING_VALUE'
            }
          },
          RemotePortDetails: {
            Port: 'NUMBER_VALUE',
            PortName: 'STRING_VALUE'
          }
        },
        PortProbeAction: {
          Blocked: true || false,
          PortProbeDetails: [
            {
              LocalIpDetails: {
                IpAddressV4: 'STRING_VALUE'
              },
              LocalPortDetails: {
                Port: 'NUMBER_VALUE',
                PortName: 'STRING_VALUE'
              },
              RemoteIpDetails: {
                City: {
                  CityName: 'STRING_VALUE'
                },
                Country: {
                  CountryCode: 'STRING_VALUE',
                  CountryName: 'STRING_VALUE'
                },
                GeoLocation: {
                  Lat: 'NUMBER_VALUE',
                  Lon: 'NUMBER_VALUE'
                },
                IpAddressV4: 'STRING_VALUE',
                Organization: {
                  Asn: 'NUMBER_VALUE',
                  AsnOrg: 'STRING_VALUE',
                  Isp: 'STRING_VALUE',
                  Org: 'STRING_VALUE'
                }
              }
            },
            /* more items */
          ]
        }
      },
      AwsAccountName: 'STRING_VALUE',
      CompanyName: 'STRING_VALUE',
      Compliance: {
        AssociatedStandards: [
          {
            StandardsId: 'STRING_VALUE'
          },
          /* more items */
        ],
        RelatedRequirements: [
          'STRING_VALUE',
          /* more items */
        ],
        SecurityControlId: 'STRING_VALUE',
        SecurityControlParameters: [
          {
            Name: 'STRING_VALUE',
            Value: [
              'STRING_VALUE',
              /* more items */
            ]
          },
          /* more items */
        ],
        Status: PASSED | WARNING | FAILED | NOT_AVAILABLE,
        StatusReasons: [
          {
            ReasonCode: 'STRING_VALUE', /* required */
            Description: 'STRING_VALUE'
          },
          /* more items */
        ]
      },
      Confidence: 'NUMBER_VALUE',
      Criticality: 'NUMBER_VALUE',
      FindingProviderFields: {
        Confidence: 'NUMBER_VALUE',
        Criticality: 'NUMBER_VALUE',
        RelatedFindings: [
          {
            Id: 'STRING_VALUE', /* required */
            ProductArn: 'STRING_VALUE' /* required */
          },
          /* more items */
        ],
        Severity: {
          Label: INFORMATIONAL | LOW | MEDIUM | HIGH | CRITICAL,
          Original: 'STRING_VALUE'
        },
        Types: [
          'STRING_VALUE',
          /* more items */
        ]
      },
      FirstObservedAt: 'STRING_VALUE',
      GeneratorDetails: {
        Description: 'STRING_VALUE',
        Labels: [
          'STRING_VALUE',
          /* more items */
        ],
        Name: 'STRING_VALUE'
      },
      LastObservedAt: 'STRING_VALUE',
      Malware: [
        {
          Name: 'STRING_VALUE', /* required */
          Path: 'STRING_VALUE',
          State: OBSERVED | REMOVAL_FAILED | REMOVED,
          Type: ADWARE | BLENDED_THREAT | BOTNET_AGENT | COIN_MINER | EXPLOIT_KIT | KEYLOGGER | MACRO | POTENTIALLY_UNWANTED | SPYWARE | RANSOMWARE | REMOTE_ACCESS | ROOTKIT | TROJAN | VIRUS | WORM
        },
        /* more items */
      ],
      Network: {
        DestinationDomain: 'STRING_VALUE',
        DestinationIpV4: 'STRING_VALUE',
        DestinationIpV6: 'STRING_VALUE',
        DestinationPort: 'NUMBER_VALUE',
        Direction: IN | OUT,
        OpenPortRange: {
          Begin: 'NUMBER_VALUE',
          End: 'NUMBER_VALUE'
        },
        Protocol: 'STRING_VALUE',
        SourceDomain: 'STRING_VALUE',
        SourceIpV4: 'STRING_VALUE',
        SourceIpV6: 'STRING_VALUE',
        SourceMac: 'STRING_VALUE',
        SourcePort: 'NUMBER_VALUE'
      },
      NetworkPath: [
        {
          ComponentId: 'STRING_VALUE',
          ComponentType: 'STRING_VALUE',
          Egress: {
            Destination: {
              Address: [
                'STRING_VALUE',
                /* more items */
              ],
              PortRanges: [
                {
                  Begin: 'NUMBER_VALUE',
                  End: 'NUMBER_VALUE'
                },
                /* more items */
              ]
            },
            Protocol: 'STRING_VALUE',
            Source: {
              Address: [
                'STRING_VALUE',
                /* more items */
              ],
              PortRanges: [
                {
                  Begin: 'NUMBER_VALUE',
                  End: 'NUMBER_VALUE'
                },
                /* more items */
              ]
            }
          },
          Ingress: {
            Destination: {
              Address: [
                'STRING_VALUE',
                /* more items */
              ],
              PortRanges: [
                {
                  Begin: 'NUMBER_VALUE',
                  End: 'NUMBER_VALUE'
                },
                /* more items */
              ]
            },
            Protocol: 'STRING_VALUE',
            Source: {
              Address: [
                'STRING_VALUE',
                /* more items */
              ],
              PortRanges: [
                {
                  Begin: 'NUMBER_VALUE',
                  End: 'NUMBER_VALUE'
                },
                /* more items */
              ]
            }
          }
        },
        /* more items */
      ],
      Note: {
        Text: 'STRING_VALUE', /* required */
        UpdatedAt: 'STRING_VALUE', /* required */
        UpdatedBy: 'STRING_VALUE' /* required */
      },
      PatchSummary: {
        Id: 'STRING_VALUE', /* required */
        FailedCount: 'NUMBER_VALUE',
        InstalledCount: 'NUMBER_VALUE',
        InstalledOtherCount: 'NUMBER_VALUE',
        InstalledPendingReboot: 'NUMBER_VALUE',
        InstalledRejectedCount: 'NUMBER_VALUE',
        MissingCount: 'NUMBER_VALUE',
        Operation: 'STRING_VALUE',
        OperationEndTime: 'STRING_VALUE',
        OperationStartTime: 'STRING_VALUE',
        RebootOption: 'STRING_VALUE'
      },
      Process: {
        LaunchedAt: 'STRING_VALUE',
        Name: 'STRING_VALUE',
        ParentPid: 'NUMBER_VALUE',
        Path: 'STRING_VALUE',
        Pid: 'NUMBER_VALUE',
        TerminatedAt: 'STRING_VALUE'
      },
      ProcessedAt: 'STRING_VALUE',
      ProductFields: {
        '<NonEmptyString>': 'STRING_VALUE',
        /* '<NonEmptyString>': ... */
      },
      ProductName: 'STRING_VALUE',
      RecordState: ACTIVE | ARCHIVED,
      Region: 'STRING_VALUE',
      RelatedFindings: [
        {
          Id: 'STRING_VALUE', /* required */
          ProductArn: 'STRING_VALUE' /* required */
        },
        /* more items */
      ],
      Remediation: {
        Recommendation: {
          Text: 'STRING_VALUE',
          Url: 'STRING_VALUE'
        }
      },
      Sample: true || false,
      Severity: {
        Label: INFORMATIONAL | LOW | MEDIUM | HIGH | CRITICAL,
        Normalized: 'NUMBER_VALUE',
        Original: 'STRING_VALUE',
        Product: 'NUMBER_VALUE'
      },
      SourceUrl: 'STRING_VALUE',
      ThreatIntelIndicators: [
        {
          Category: BACKDOOR | CARD_STEALER | COMMAND_AND_CONTROL | DROP_SITE | EXPLOIT_SITE | KEYLOGGER,
          LastObservedAt: 'STRING_VALUE',
          Source: 'STRING_VALUE',
          SourceUrl: 'STRING_VALUE',
          Type: DOMAIN | EMAIL_ADDRESS | HASH_MD5 | HASH_SHA1 | HASH_SHA256 | HASH_SHA512 | IPV4_ADDRESS | IPV6_ADDRESS | MUTEX | PROCESS | URL,
          Value: 'STRING_VALUE'
        },
        /* more items */
      ],
      Threats: [
        {
          FilePaths: [
            {
              FileName: 'STRING_VALUE',
              FilePath: 'STRING_VALUE',
              Hash: 'STRING_VALUE',
              ResourceId: 'STRING_VALUE'
            },
            /* more items */
          ],
          ItemCount: 'NUMBER_VALUE',
          Name: 'STRING_VALUE',
          Severity: 'STRING_VALUE'
        },
        /* more items */
      ],
      Types: [
        'STRING_VALUE',
        /* more items */
      ],
      UserDefinedFields: {
        '<NonEmptyString>': 'STRING_VALUE',
        /* '<NonEmptyString>': ... */
      },
      VerificationState: UNKNOWN | TRUE_POSITIVE | FALSE_POSITIVE | BENIGN_POSITIVE,
      Vulnerabilities: [
        {
          Id: 'STRING_VALUE', /* required */
          CodeVulnerabilities: [
            {
              Cwes: [
                'STRING_VALUE',
                /* more items */
              ],
              FilePath: {
                EndLine: 'NUMBER_VALUE',
                FileName: 'STRING_VALUE',
                FilePath: 'STRING_VALUE',
                StartLine: 'NUMBER_VALUE'
              },
              SourceArn: 'STRING_VALUE'
            },
            /* more items */
          ],
          Cvss: [
            {
              Adjustments: [
                {
                  Metric: 'STRING_VALUE',
                  Reason: 'STRING_VALUE'
                },
                /* more items */
              ],
              BaseScore: 'NUMBER_VALUE',
              BaseVector: 'STRING_VALUE',
              Source: 'STRING_VALUE',
              Version: 'STRING_VALUE'
            },
            /* more items */
          ],
          EpssScore: 'NUMBER_VALUE',
          ExploitAvailable: YES | NO,
          FixAvailable: YES | NO | PARTIAL,
          LastKnownExploitAt: 'STRING_VALUE',
          ReferenceUrls: [
            'STRING_VALUE',
            /* more items */
          ],
          RelatedVulnerabilities: [
            'STRING_VALUE',
            /* more items */
          ],
          Vendor: {
            Name: 'STRING_VALUE', /* required */
            Url: 'STRING_VALUE',
            VendorCreatedAt: 'STRING_VALUE',
            VendorSeverity: 'STRING_VALUE',
            VendorUpdatedAt: 'STRING_VALUE'
          },
          VulnerablePackages: [
            {
              Architecture: 'STRING_VALUE',
              Epoch: 'STRING_VALUE',
              FilePath: 'STRING_VALUE',
              FixedInVersion: 'STRING_VALUE',
              Name: 'STRING_VALUE',
              PackageManager: 'STRING_VALUE',
              Release: 'STRING_VALUE',
              Remediation: 'STRING_VALUE',
              SourceLayerArn: 'STRING_VALUE',
              SourceLayerHash: 'STRING_VALUE',
              Version: 'STRING_VALUE'
            },
            /* more items */
          ]
        },
        /* more items */
      ],
      Workflow: {
        Status: NEW | NOTIFIED | RESOLVED | SUPPRESSED
      },
      WorkflowState: NEW | ASSIGNED | IN_PROGRESS | DEFERRED | RESOLVED
    },
    /* more items */
  ]
};
securityhub.batchImportFindings(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • Findings — (Array<map>)

      A list of findings to import. To successfully import a finding, it must follow the Amazon Web Services Security Finding Format. Maximum of 100 findings per request.

      • SchemaVersionrequired — (String)

        The schema version that a finding is formatted for.

      • Idrequired — (String)

        The security findings provider-specific identifier for a finding.

      • ProductArnrequired — (String)

        The ARN generated by Security Hub that uniquely identifies a product that generates findings. This can be the ARN for a third-party product that is integrated with Security Hub, or the ARN for a custom integration.

      • ProductName — (String)

        The name of the product that generated the finding.

        Security Hub populates this attribute automatically for each finding. You cannot update this attribute with BatchImportFindings or BatchUpdateFindings. The exception to this is a custom integration.

        When you use the Security Hub console or API to filter findings by product name, you use this attribute.

      • CompanyName — (String)

        The name of the company for the product that generated the finding.

        Security Hub populates this attribute automatically for each finding. You cannot update this attribute with BatchImportFindings or BatchUpdateFindings. The exception to this is a custom integration.

        When you use the Security Hub console or API to filter findings by company name, you use this attribute.

      • Region — (String)

        The Region from which the finding was generated.

        Security Hub populates this attribute automatically for each finding. You cannot update it using BatchImportFindings or BatchUpdateFindings.

      • GeneratorIdrequired — (String)

        The identifier for the solution-specific component (a discrete unit of logic) that generated a finding. In various security findings providers' solutions, this generator can be called a rule, a check, a detector, a plugin, etc.

      • AwsAccountIdrequired — (String)

        The Amazon Web Services account ID that a finding is generated in.

      • Types — (Array<String>)

        One or more finding types in the format of namespace/category/classifier that classify a finding.

        Valid namespace values are: Software and Configuration Checks | TTPs | Effects | Unusual Behaviors | Sensitive Data Identifications

      • FirstObservedAt — (String)

        Indicates when the security findings provider first observed the potential security issue that a finding captured.

        Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

      • LastObservedAt — (String)

        Indicates when the security findings provider most recently observed the potential security issue that a finding captured.

        Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

      • CreatedAtrequired — (String)

        Indicates when the security findings provider created the potential security issue that a finding captured.

        Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

      • UpdatedAtrequired — (String)

        Indicates when the security findings provider last updated the finding record.

        Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

      • Severity — (map)

        A finding's severity.

        • Product — (Float)

          Deprecated. This attribute isn't included in findings. Instead of providing Product, provide Original.

          The native severity as defined by the Amazon Web Services service or integrated partner product that generated the finding.

        • Label — (String)

          The severity value of the finding. The allowed values are the following.

          • INFORMATIONAL - No issue was found.

          • LOW - The issue does not require action on its own.

          • MEDIUM - The issue must be addressed but not urgently.

          • HIGH - The issue must be addressed as a priority.

          • CRITICAL - The issue must be remediated immediately to avoid it escalating.

          If you provide Normalized and do not provide Label, then Label is set automatically as follows.

          • 0 - INFORMATIONAL

          • 1–39 - LOW

          • 40–69 - MEDIUM

          • 70–89 - HIGH

          • 90–100 - CRITICAL

          Possible values include:
          • "INFORMATIONAL"
          • "LOW"
          • "MEDIUM"
          • "HIGH"
          • "CRITICAL"
        • Normalized — (Integer)

          Deprecated. The normalized severity of a finding. Instead of providing Normalized, provide Label.

          If you provide Label and do not provide Normalized, then Normalized is set automatically as follows.

          • INFORMATIONAL - 0

          • LOW - 1

          • MEDIUM - 40

          • HIGH - 70

          • CRITICAL - 90

        • Original — (String)

          The native severity from the finding product that generated the finding.

      • Confidence — (Integer)

        A finding's confidence. Confidence is defined as the likelihood that a finding accurately identifies the behavior or issue that it was intended to identify.

        Confidence is scored on a 0-100 basis using a ratio scale, where 0 means zero percent confidence and 100 means 100 percent confidence.

      • Criticality — (Integer)

        The level of importance assigned to the resources associated with the finding.

        A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources.

      • Titlerequired — (String)

        A finding's title.

        Note: In this release, Title is a required property.
      • Descriptionrequired — (String)

        A finding's description.

        Note: In this release, Description is a required property.
      • Remediation — (map)

        A data type that describes the remediation options for a finding.

        • Recommendation — (map)

          A recommendation on the steps to take to remediate the issue identified by a finding.

          • Text — (String)

            Describes the recommended steps to take to remediate an issue identified in a finding.

          • Url — (String)

            A URL to a page or site that contains information about how to remediate a finding.

      • SourceUrl — (String)

        A URL that links to a page about the current finding in the security findings provider's solution.

      • ProductFields — (map<String>)

        A data type where security findings providers can include additional solution-specific details that aren't part of the defined AwsSecurityFinding format.

        Can contain up to 50 key-value pairs. For each key-value pair, the key can contain up to 128 characters, and the value can contain up to 2048 characters.

      • UserDefinedFields — (map<String>)

        A list of name/value string pairs associated with the finding. These are custom, user-defined fields added to a finding.

      • Malware — (Array<map>)

        A list of malware related to a finding.

        • Namerequired — (String)

          The name of the malware that was observed.

        • Type — (String)

          The type of the malware that was observed.

          Possible values include:
          • "ADWARE"
          • "BLENDED_THREAT"
          • "BOTNET_AGENT"
          • "COIN_MINER"
          • "EXPLOIT_KIT"
          • "KEYLOGGER"
          • "MACRO"
          • "POTENTIALLY_UNWANTED"
          • "SPYWARE"
          • "RANSOMWARE"
          • "REMOTE_ACCESS"
          • "ROOTKIT"
          • "TROJAN"
          • "VIRUS"
          • "WORM"
        • Path — (String)

          The file system path of the malware that was observed.

        • State — (String)

          The state of the malware that was observed.

          Possible values include:
          • "OBSERVED"
          • "REMOVAL_FAILED"
          • "REMOVED"
      • Network — (map)

        The details of network-related information about a finding.

        • Direction — (String)

          The direction of network traffic associated with a finding.

          Possible values include:
          • "IN"
          • "OUT"
        • Protocol — (String)

          The protocol of network-related information about a finding.

        • OpenPortRange — (map)

          The range of open ports that is present on the network.

          • Begin — (Integer)

            The first port in the port range.

          • End — (Integer)

            The last port in the port range.

        • SourceIpV4 — (String)

          The source IPv4 address of network-related information about a finding.

        • SourceIpV6 — (String)

          The source IPv6 address of network-related information about a finding.

        • SourcePort — (Integer)

          The source port of network-related information about a finding.

        • SourceDomain — (String)

          The source domain of network-related information about a finding.

        • SourceMac — (String)

          The source media access control (MAC) address of network-related information about a finding.

        • DestinationIpV4 — (String)

          The destination IPv4 address of network-related information about a finding.

        • DestinationIpV6 — (String)

          The destination IPv6 address of network-related information about a finding.

        • DestinationPort — (Integer)

          The destination port of network-related information about a finding.

        • DestinationDomain — (String)

          The destination domain of network-related information about a finding.

      • NetworkPath — (Array<map>)

        Provides information about a network path that is relevant to a finding. Each entry under NetworkPath represents a component of that path.

        • ComponentId — (String)

          The identifier of a component in the network path.

        • ComponentType — (String)

          The type of component.

        • Egress — (map)

          Information about the component that comes after the current component in the network path.

          • Protocol — (String)

            The protocol used for the component.

          • Destination — (map)

            Information about the destination of the component.

            • Address — (Array<String>)

              The IP addresses of the destination.

            • PortRanges — (Array<map>)

              A list of port ranges for the destination.

              • Begin — (Integer)

                The first port in the port range.

              • End — (Integer)

                The last port in the port range.

          • Source — (map)

            Information about the origin of the component.

            • Address — (Array<String>)

              The IP addresses of the destination.

            • PortRanges — (Array<map>)

              A list of port ranges for the destination.

              • Begin — (Integer)

                The first port in the port range.

              • End — (Integer)

                The last port in the port range.

        • Ingress — (map)

          Information about the component that comes before the current node in the network path.

          • Protocol — (String)

            The protocol used for the component.

          • Destination — (map)

            Information about the destination of the component.

            • Address — (Array<String>)

              The IP addresses of the destination.

            • PortRanges — (Array<map>)

              A list of port ranges for the destination.

              • Begin — (Integer)

                The first port in the port range.

              • End — (Integer)

                The last port in the port range.

          • Source — (map)

            Information about the origin of the component.

            • Address — (Array<String>)

              The IP addresses of the destination.

            • PortRanges — (Array<map>)

              A list of port ranges for the destination.

              • Begin — (Integer)

                The first port in the port range.

              • End — (Integer)

                The last port in the port range.

      • Process — (map)

        The details of process-related information about a finding.

        • Name — (String)

          The name of the process.

        • Path — (String)

          The path to the process executable.

        • Pid — (Integer)

          The process ID.

        • ParentPid — (Integer)

          The parent process ID. This field accepts positive integers between O and 2147483647.

        • LaunchedAt — (String)

          Indicates when the process was launched.

          Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

        • TerminatedAt — (String)

          Indicates when the process was terminated.

          Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

      • Threats — (Array<map>)

        Details about the threat detected in a security finding and the file paths that were affected by the threat.

        • Name — (String)

          The name of the threat.

        • Severity — (String)

          The severity of the threat.

        • ItemCount — (Integer)

          This total number of items in which the threat has been detected.

        • FilePaths — (Array<map>)

          Provides information about the file paths that were affected by the threat.

          • FilePath — (String)

            Path to the infected or suspicious file on the resource it was detected on.

          • FileName — (String)

            The name of the infected or suspicious file corresponding to the hash.

          • ResourceId — (String)

            The Amazon Resource Name (ARN) of the resource on which the threat was detected.

          • Hash — (String)

            The hash value for the infected or suspicious file.

      • ThreatIntelIndicators — (Array<map>)

        Threat intelligence details related to a finding.

        • Type — (String)

          The type of threat intelligence indicator.

          Possible values include:
          • "DOMAIN"
          • "EMAIL_ADDRESS"
          • "HASH_MD5"
          • "HASH_SHA1"
          • "HASH_SHA256"
          • "HASH_SHA512"
          • "IPV4_ADDRESS"
          • "IPV6_ADDRESS"
          • "MUTEX"
          • "PROCESS"
          • "URL"
        • Value — (String)

          The value of a threat intelligence indicator.

        • Category — (String)

          The category of a threat intelligence indicator.

          Possible values include:
          • "BACKDOOR"
          • "CARD_STEALER"
          • "COMMAND_AND_CONTROL"
          • "DROP_SITE"
          • "EXPLOIT_SITE"
          • "KEYLOGGER"
        • LastObservedAt — (String)

          Indicates when the most recent instance of a threat intelligence indicator was observed.

          Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

        • Source — (String)

          The source of the threat intelligence indicator.

        • SourceUrl — (String)

          The URL to the page or site where you can get more information about the threat intelligence indicator.

      • Resourcesrequired — (Array<map>)

        A set of resource data types that describe the resources that the finding refers to.

        • Typerequired — (String)

          The type of the resource that details are provided for. If possible, set Type to one of the supported resource types. For example, if the resource is an EC2 instance, then set Type to AwsEc2Instance.

          If the resource does not match any of the provided types, then set Type to Other.

        • Idrequired — (String)

          The canonical identifier for the given resource type.

        • Partition — (String)

          The canonical Amazon Web Services partition name that the Region is assigned to.

          Possible values include:
          • "aws"
          • "aws-cn"
          • "aws-us-gov"
        • Region — (String)

          The canonical Amazon Web Services external Region name where this resource is located.

        • ResourceRole — (String)

          Identifies the role of the resource in the finding. A resource is either the actor or target of the finding activity,

        • Tags — (map<String>)

          A list of Amazon Web Services tags associated with a resource at the time the finding was processed.

        • DataClassification — (map)

          Contains information about sensitive data that was detected on the resource.

          • DetailedResultsLocation — (String)

            The path to the folder or file that contains the sensitive data.

          • Result — (map)

            The details about the sensitive data that was detected on the resource.

            • MimeType — (String)

              The type of content that the finding applies to.

            • SizeClassified — (Integer)

              The total size in bytes of the affected data.

            • AdditionalOccurrences — (Boolean)

              Indicates whether there are additional occurrences of sensitive data that are not included in the finding. This occurs when the number of occurrences exceeds the maximum that can be included.

            • Status — (map)

              The current status of the sensitive data detection.

              • Code — (String)

                The code that represents the status of the sensitive data detection.

              • Reason — (String)

                A longer description of the current status of the sensitive data detection.

            • SensitiveData — (Array<map>)

              Provides details about sensitive data that was identified based on built-in configuration.

              • Category — (String)

                The category of sensitive data that was detected. For example, the category can indicate that the sensitive data involved credentials, financial information, or personal information.

              • Detections — (Array<map>)

                The list of detected instances of sensitive data.

                • Count — (Integer)

                  The total number of occurrences of sensitive data that were detected.

                • Type — (String)

                  The type of sensitive data that was detected. For example, the type might indicate that the data is an email address.

                • Occurrences — (map)

                  Details about the sensitive data that was detected.

                  • LineRanges — (Array<map>)

                    Occurrences of sensitive data detected in a non-binary text file or a Microsoft Word file. Non-binary text files include files such as HTML, XML, JSON, and TXT files.

                    • Start — (Integer)

                      The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                    • End — (Integer)

                      The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                    • StartColumn — (Integer)

                      In the line where the sensitive data starts, the column within the line where the sensitive data starts.

                  • OffsetRanges — (Array<map>)

                    Occurrences of sensitive data detected in a binary text file.

                    • Start — (Integer)

                      The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                    • End — (Integer)

                      The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                    • StartColumn — (Integer)

                      In the line where the sensitive data starts, the column within the line where the sensitive data starts.

                  • Pages — (Array<map>)

                    Occurrences of sensitive data in an Adobe Portable Document Format (PDF) file.

                    • PageNumber — (Integer)

                      The page number of the page that contains the sensitive data.

                    • LineRange — (map)

                      An occurrence of sensitive data detected in a non-binary text file or a Microsoft Word file. Non-binary text files include files such as HTML, XML, JSON, and TXT files.

                      • Start — (Integer)

                        The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                      • End — (Integer)

                        The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                      • StartColumn — (Integer)

                        In the line where the sensitive data starts, the column within the line where the sensitive data starts.

                    • OffsetRange — (map)

                      An occurrence of sensitive data detected in a binary text file.

                      • Start — (Integer)

                        The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                      • End — (Integer)

                        The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                      • StartColumn — (Integer)

                        In the line where the sensitive data starts, the column within the line where the sensitive data starts.

                  • Records — (Array<map>)

                    Occurrences of sensitive data in an Apache Avro object container or an Apache Parquet file.

                    • JsonPath — (String)

                      The path, as a JSONPath expression, to the field in the record that contains the data. If the field name is longer than 20 characters, it is truncated. If the path is longer than 250 characters, it is truncated.

                    • RecordIndex — (Integer)

                      The record index, starting from 0, for the record that contains the data.

                  • Cells — (Array<map>)

                    Occurrences of sensitive data detected in Microsoft Excel workbooks, comma-separated value (CSV) files, or tab-separated value (TSV) files.

                    • Column — (Integer)

                      The column number of the column that contains the data. For a Microsoft Excel workbook, the column number corresponds to the alphabetical column identifiers. For example, a value of 1 for Column corresponds to the A column in the workbook.

                    • Row — (Integer)

                      The row number of the row that contains the data.

                    • ColumnName — (String)

                      The name of the column that contains the data.

                    • CellReference — (String)

                      For a Microsoft Excel workbook, provides the location of the cell, as an absolute cell reference, that contains the data. For example, Sheet2!C5 for cell C5 on Sheet2.

              • TotalCount — (Integer)

                The total number of occurrences of sensitive data.

            • CustomDataIdentifiers — (map)

              Provides details about sensitive data that was identified based on customer-defined configuration.

              • Detections — (Array<map>)

                The list of detected instances of sensitive data.

                • Count — (Integer)

                  The total number of occurrences of sensitive data that were detected.

                • Arn — (String)

                  The ARN of the custom identifier that was used to detect the sensitive data.

                • Name — (String)

                  he name of the custom identifier that detected the sensitive data.

                • Occurrences — (map)

                  Details about the sensitive data that was detected.

                  • LineRanges — (Array<map>)

                    Occurrences of sensitive data detected in a non-binary text file or a Microsoft Word file. Non-binary text files include files such as HTML, XML, JSON, and TXT files.

                    • Start — (Integer)

                      The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                    • End — (Integer)

                      The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                    • StartColumn — (Integer)

                      In the line where the sensitive data starts, the column within the line where the sensitive data starts.

                  • OffsetRanges — (Array<map>)

                    Occurrences of sensitive data detected in a binary text file.

                    • Start — (Integer)

                      The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                    • End — (Integer)

                      The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                    • StartColumn — (Integer)

                      In the line where the sensitive data starts, the column within the line where the sensitive data starts.

                  • Pages — (Array<map>)

                    Occurrences of sensitive data in an Adobe Portable Document Format (PDF) file.

                    • PageNumber — (Integer)

                      The page number of the page that contains the sensitive data.

                    • LineRange — (map)

                      An occurrence of sensitive data detected in a non-binary text file or a Microsoft Word file. Non-binary text files include files such as HTML, XML, JSON, and TXT files.

                      • Start — (Integer)

                        The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                      • End — (Integer)

                        The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                      • StartColumn — (Integer)

                        In the line where the sensitive data starts, the column within the line where the sensitive data starts.

                    • OffsetRange — (map)

                      An occurrence of sensitive data detected in a binary text file.

                      • Start — (Integer)

                        The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                      • End — (Integer)

                        The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                      • StartColumn — (Integer)

                        In the line where the sensitive data starts, the column within the line where the sensitive data starts.

                  • Records — (Array<map>)

                    Occurrences of sensitive data in an Apache Avro object container or an Apache Parquet file.

                    • JsonPath — (String)

                      The path, as a JSONPath expression, to the field in the record that contains the data. If the field name is longer than 20 characters, it is truncated. If the path is longer than 250 characters, it is truncated.

                    • RecordIndex — (Integer)

                      The record index, starting from 0, for the record that contains the data.

                  • Cells — (Array<map>)

                    Occurrences of sensitive data detected in Microsoft Excel workbooks, comma-separated value (CSV) files, or tab-separated value (TSV) files.

                    • Column — (Integer)

                      The column number of the column that contains the data. For a Microsoft Excel workbook, the column number corresponds to the alphabetical column identifiers. For example, a value of 1 for Column corresponds to the A column in the workbook.

                    • Row — (Integer)

                      The row number of the row that contains the data.

                    • ColumnName — (String)

                      The name of the column that contains the data.

                    • CellReference — (String)

                      For a Microsoft Excel workbook, provides the location of the cell, as an absolute cell reference, that contains the data. For example, Sheet2!C5 for cell C5 on Sheet2.

              • TotalCount — (Integer)

                The total number of occurrences of sensitive data.

        • Details — (map)

          Additional details about the resource related to a finding.

          • AwsAutoScalingAutoScalingGroup — (map)

            Details for an autoscaling group.

            • LaunchConfigurationName — (String)

              The name of the launch configuration.

            • LoadBalancerNames — (Array<String>)

              The list of load balancers associated with the group.

            • HealthCheckType — (String)

              The service to use for the health checks. Valid values are EC2 or ELB.

            • HealthCheckGracePeriod — (Integer)

              The amount of time, in seconds, that Amazon EC2 Auto Scaling waits before it checks the health status of an EC2 instance that has come into service.

            • CreatedTime — (String)

              Indicates when the auto scaling group was created.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • MixedInstancesPolicy — (map)

              The mixed instances policy for the automatic scaling group.

              • InstancesDistribution — (map)

                The instances distribution. The instances distribution specifies the distribution of On-Demand Instances and Spot Instances, the maximum price to pay for Spot Instances, and how the Auto Scaling group allocates instance types to fulfill On-Demand and Spot capacity.

                • OnDemandAllocationStrategy — (String)

                  How to allocate instance types to fulfill On-Demand capacity. The valid value is prioritized.

                • OnDemandBaseCapacity — (Integer)

                  The minimum amount of the Auto Scaling group's capacity that must be fulfilled by On-Demand Instances.

                • OnDemandPercentageAboveBaseCapacity — (Integer)

                  The percentage of On-Demand Instances and Spot Instances for additional capacity beyond OnDemandBaseCapacity.

                • SpotAllocationStrategy — (String)

                  How to allocate instances across Spot Instance pools. Valid values are as follows:

                  • lowest-price

                  • capacity-optimized

                  • capacity-optimized-prioritized

                • SpotInstancePools — (Integer)

                  The number of Spot Instance pools across which to allocate your Spot Instances.

                • SpotMaxPrice — (String)

                  The maximum price per unit hour that you are willing to pay for a Spot Instance.

              • LaunchTemplate — (map)

                The launch template to use and the instance types (overrides) to use to provision EC2 instances to fulfill On-Demand and Spot capacities.

                • LaunchTemplateSpecification — (map)

                  The launch template to use for a mixed instances policy.

                  • LaunchTemplateId — (String)

                    The identifier of the launch template. You must specify either LaunchTemplateId or LaunchTemplateName.

                  • LaunchTemplateName — (String)

                    The name of the launch template. You must specify either LaunchTemplateId or LaunchTemplateName.

                  • Version — (String)

                    Identifies the version of the launch template. You can specify a version identifier, or use the values $Latest or $Default.

                • Overrides — (Array<map>)

                  Property values to use to override the values in the launch template.

                  • InstanceType — (String)

                    The instance type. For example, m3.xlarge.

                  • WeightedCapacity — (String)

                    The number of capacity units provided by the specified instance type in terms of virtual CPUs, memory, storage, throughput, or other relative performance characteristic.

            • AvailabilityZones — (Array<map>)

              The list of Availability Zones for the automatic scaling group.

              • Value — (String)

                The name of the Availability Zone.

            • LaunchTemplate — (map)

              The launch template to use.

              • LaunchTemplateId — (String)

                The identifier of the launch template. You must specify either LaunchTemplateId or LaunchTemplateName.

              • LaunchTemplateName — (String)

                The name of the launch template. You must specify either LaunchTemplateId or LaunchTemplateName.

              • Version — (String)

                Identifies the version of the launch template. You can specify a version identifier, or use the values $Latest or $Default.

            • CapacityRebalance — (Boolean)

              Indicates whether capacity rebalancing is enabled.

          • AwsCodeBuildProject — (map)

            Details for an CodeBuild project.

            • EncryptionKey — (String)

              The KMS key used to encrypt the build output artifacts.

              You can specify either the ARN of the KMS key or, if available, the KMS key alias (using the format alias/alias-name).

            • Artifacts — (Array<map>)

              Information about the build artifacts for the CodeBuild project.

              • ArtifactIdentifier — (String)

                An identifier for the artifact definition.

              • EncryptionDisabled — (Boolean)

                Indicates whether to disable encryption on the artifact. Only valid when Type is S3.

              • Location — (String)

                Only used when Type is S3. The name of the S3 bucket where the artifact is located.

              • Name — (String)

                Only used when Type is S3. The name of the artifact. Used with NamepaceType and Path to determine the pattern for storing the artifact.

              • NamespaceType — (String)

                Only used when Type is S3. The value to use for the namespace. Used with Name and Path to determine the pattern for storing the artifact.

              • OverrideArtifactName — (Boolean)

                Whether the name specified in the buildspec file overrides the artifact name.

              • Packaging — (String)

                Only used when Type is S3. The type of output artifact to create.

              • Path — (String)

                Only used when Type is S3. The path to the artifact. Used with Name and NamespaceType to determine the pattern for storing the artifact.

              • Type — (String)

                The type of build artifact.

            • Environment — (map)

              Information about the build environment for this build project.

              • Certificate — (String)

                The certificate to use with this build project.

              • EnvironmentVariables — (Array<map>)

                A set of environment variables to make available to builds for the build project.

                • Name — (String)

                  The name of the environment variable.

                • Type — (String)

                  The type of environment variable.

                • Value — (String)

                  The value of the environment variable.

              • PrivilegedMode — (Boolean)

                Whether to allow the Docker daemon to run inside a Docker container. Set to true if the build project is used to build Docker images.

              • ImagePullCredentialsType — (String)

                The type of credentials CodeBuild uses to pull images in your build.

                Valid values:

                • CODEBUILD specifies that CodeBuild uses its own credentials. This requires that you modify your ECR repository policy to trust the CodeBuild service principal.

                • SERVICE_ROLE specifies that CodeBuild uses your build project's service role.

                When you use a cross-account or private registry image, you must use SERVICE_ROLE credentials. When you use an CodeBuild curated image, you must use CODEBUILD credentials.

              • RegistryCredential — (map)

                The credentials for access to a private registry.

                • Credential — (String)

                  The ARN or name of credentials created using Secrets Manager.

                  Note: The credential can use the name of the credentials only if they exist in your current Amazon Web Services Region.
                • CredentialProvider — (String)

                  The service that created the credentials to access a private Docker registry.

                  The valid value, SECRETS_MANAGER, is for Secrets Manager.

              • Type — (String)

                The type of build environment to use for related builds.

                The environment type ARM_CONTAINER is available only in Regions US East (N. Virginia), US East (Ohio), US West (Oregon), Europe (Ireland), Asia Pacific (Mumbai), Asia Pacific (Tokyo), Asia Pacific (Sydney), and Europe (Frankfurt).

                The environment type LINUX_CONTAINER with compute type build.general1.2xlarge is available only in Regions US East (N. Virginia), US East (N. Virginia), US West (Oregon), Canada (Central), Europe (Ireland), Europe (London), Europe (Frankfurt), Asia Pacific (Tokyo), Asia Pacific (Seoul), Asia Pacific (Singapore), Asia Pacific (Sydney), China (Beijing), and China (Ningxia).

                The environment type LINUX_GPU_CONTAINER is available only in Regions US East (N. Virginia), US East (N. Virginia), US West (Oregon), Canada (Central), Europe (Ireland), Europe (London), Europe (Frankfurt), Asia Pacific (Tokyo), Asia Pacific (Seoul), Asia Pacific (Singapore), Asia Pacific (Sydney), China (Beijing), and China (Ningxia).

                Valid values: WINDOWS_CONTAINER | LINUX_CONTAINER | LINUX_GPU_CONTAINER | ARM_CONTAINER

            • Name — (String)

              The name of the build project.

            • Source — (map)

              Information about the build input source code for this build project.

              • Type — (String)

                The type of repository that contains the source code to be built. Valid values are:

                • BITBUCKET - The source code is in a Bitbucket repository.

                • CODECOMMIT - The source code is in an CodeCommit repository.

                • CODEPIPELINE - The source code settings are specified in the source action of a pipeline in CodePipeline.

                • GITHUB - The source code is in a GitHub repository.

                • GITHUB_ENTERPRISE - The source code is in a GitHub Enterprise repository.

                • NO_SOURCE - The project does not have input source code.

                • S3 - The source code is in an S3 input bucket.

              • Location — (String)

                Information about the location of the source code to be built.

                Valid values include:

                • For source code settings that are specified in the source action of a pipeline in CodePipeline, location should not be specified. If it is specified, CodePipeline ignores it. This is because CodePipeline uses the settings in a pipeline's source action instead of this value.

                • For source code in an CodeCommit repository, the HTTPS clone URL to the repository that contains the source code and the build spec file (for example, https://git-codecommit.region-ID.amazonaws.com/v1/repos/repo-name ).

                • For source code in an S3 input bucket, one of the following.

                  • The path to the ZIP file that contains the source code (for example, bucket-name/path/to/object-name.zip).

                  • The path to the folder that contains the source code (for example, bucket-name/path/to/source-code/folder/).

                • For source code in a GitHub repository, the HTTPS clone URL to the repository that contains the source and the build spec file.

                • For source code in a Bitbucket repository, the HTTPS clone URL to the repository that contains the source and the build spec file.

              • GitCloneDepth — (Integer)

                Information about the Git clone depth for the build project.

              • InsecureSsl — (Boolean)

                Whether to ignore SSL warnings while connecting to the project source code.

            • ServiceRole — (String)

              The ARN of the IAM role that enables CodeBuild to interact with dependent Amazon Web Services services on behalf of the Amazon Web Services account.

            • LogsConfig — (map)

              Information about logs for the build project.

              • CloudWatchLogs — (map)

                Information about CloudWatch Logs for the build project.

                • GroupName — (String)

                  The group name of the logs in CloudWatch Logs.

                • Status — (String)

                  The current status of the logs in CloudWatch Logs for a build project.

                • StreamName — (String)

                  The prefix of the stream name of the CloudWatch Logs.

              • S3Logs — (map)

                Information about logs built to an S3 bucket for a build project.

                • EncryptionDisabled — (Boolean)

                  Whether to disable encryption of the S3 build log output.

                • Location — (String)

                  The ARN of the S3 bucket and the path prefix for S3 logs.

                • Status — (String)

                  The current status of the S3 build logs.

            • VpcConfig — (map)

              Information about the VPC configuration that CodeBuild accesses.

              • VpcId — (String)

                The ID of the VPC.

              • Subnets — (Array<String>)

                A list of one or more subnet IDs in your VPC.

              • SecurityGroupIds — (Array<String>)

                A list of one or more security group IDs in your VPC.

            • SecondaryArtifacts — (Array<map>)

              Information about the secondary artifacts for the CodeBuild project.

              • ArtifactIdentifier — (String)

                An identifier for the artifact definition.

              • EncryptionDisabled — (Boolean)

                Indicates whether to disable encryption on the artifact. Only valid when Type is S3.

              • Location — (String)

                Only used when Type is S3. The name of the S3 bucket where the artifact is located.

              • Name — (String)

                Only used when Type is S3. The name of the artifact. Used with NamepaceType and Path to determine the pattern for storing the artifact.

              • NamespaceType — (String)

                Only used when Type is S3. The value to use for the namespace. Used with Name and Path to determine the pattern for storing the artifact.

              • OverrideArtifactName — (Boolean)

                Whether the name specified in the buildspec file overrides the artifact name.

              • Packaging — (String)

                Only used when Type is S3. The type of output artifact to create.

              • Path — (String)

                Only used when Type is S3. The path to the artifact. Used with Name and NamespaceType to determine the pattern for storing the artifact.

              • Type — (String)

                The type of build artifact.

          • AwsCloudFrontDistribution — (map)

            Details about a CloudFront distribution.

            • CacheBehaviors — (map)

              Provides information about the cache configuration for the distribution.

              • Items — (Array<map>)

                The cache behaviors for the distribution.

                • ViewerProtocolPolicy — (String)

                  The protocol that viewers can use to access the files in an origin. You can specify the following options:

                  • allow-all - Viewers can use HTTP or HTTPS.

                  • redirect-to-https - CloudFront responds to HTTP requests with an HTTP status code of 301 (Moved Permanently) and the HTTPS URL. The viewer then uses the new URL to resubmit.

                  • https-only - CloudFront responds to HTTP request with an HTTP status code of 403 (Forbidden).

            • DefaultCacheBehavior — (map)

              The default cache behavior for the configuration.

              • ViewerProtocolPolicy — (String)

                The protocol that viewers can use to access the files in an origin. You can specify the following options:

                • allow-all - Viewers can use HTTP or HTTPS.

                • redirect-to-https - CloudFront responds to HTTP requests with an HTTP status code of 301 (Moved Permanently) and the HTTPS URL. The viewer then uses the new URL to resubmit.

                • https-only - CloudFront responds to HTTP request with an HTTP status code of 403 (Forbidden).

            • DefaultRootObject — (String)

              The object that CloudFront sends in response to requests from the origin (for example, index.html) when a viewer requests the root URL for the distribution (http://www.example.com) instead of an object in your distribution (http://www.example.com/product-description.html).

            • DomainName — (String)

              The domain name corresponding to the distribution.

            • ETag — (String)

              The entity tag is a hash of the object.

            • LastModifiedTime — (String)

              Indicates when that the distribution was last modified.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • Logging — (map)

              A complex type that controls whether access logs are written for the distribution.

              • Bucket — (String)

                The S3 bucket to store the access logs in.

              • Enabled — (Boolean)

                With this field, you can enable or disable the selected distribution.

              • IncludeCookies — (Boolean)

                Specifies whether you want CloudFront to include cookies in access logs.

              • Prefix — (String)

                An optional string that you want CloudFront to use as a prefix to the access log filenames for this distribution.

            • Origins — (map)

              A complex type that contains information about origins for this distribution.

              • Items — (Array<map>)

                A complex type that contains origins or origin groups for this distribution.

                • DomainName — (String)

                  Amazon S3 origins: The DNS name of the S3 bucket from which you want CloudFront to get objects for this origin.

                • Id — (String)

                  A unique identifier for the origin or origin group.

                • OriginPath — (String)

                  An optional element that causes CloudFront to request your content from a directory in your Amazon S3 bucket or your custom origin.

                • S3OriginConfig — (map)

                  An origin that is an S3 bucket that is not configured with static website hosting.

                  • OriginAccessIdentity — (String)

                    The CloudFront origin access identity to associate with the origin.

                • CustomOriginConfig — (map)

                  An origin that is not an Amazon S3 bucket, with one exception. If the Amazon S3 bucket is configured with static website hosting, use this attribute. If the Amazon S3 bucket is not configured with static website hosting, use the S3OriginConfig type instead.

                  • HttpPort — (Integer)

                    The HTTP port that CloudFront uses to connect to the origin.

                  • HttpsPort — (Integer)

                    The HTTPS port that CloudFront uses to connect to the origin.

                  • OriginKeepaliveTimeout — (Integer)

                    Specifies how long, in seconds, CloudFront persists its connection to the origin.

                  • OriginProtocolPolicy — (String)

                    Specifies the protocol (HTTP or HTTPS) that CloudFront uses to connect to the origin.

                  • OriginReadTimeout — (Integer)

                    Specifies how long, in seconds, CloudFront waits for a response from the origin.

                  • OriginSslProtocols — (map)

                    Specifies the minimum SSL/TLS protocol that CloudFront uses when connecting to your origin over HTTPS.

                    • Items — (Array<String>)

                      A list that contains allowed SSL/TLS protocols for this distribution.

                    • Quantity — (Integer)

                      The number of SSL/TLS protocols that you want to allow CloudFront to use when establishing an HTTPS connection with this origin.

            • OriginGroups — (map)

              Provides information about the origin groups in the distribution.

              • Items — (Array<map>)

                The list of origin groups.

                • FailoverCriteria — (map)

                  Provides the criteria for an origin group to fail over.

                  • StatusCodes — (map)

                    Information about the status codes that cause an origin group to fail over.

                    • Items — (Array<Integer>)

                      The list of status code values that can cause a failover to the next origin.

                    • Quantity — (Integer)

                      The number of status codes that can cause a failover.

            • ViewerCertificate — (map)

              Provides information about the TLS/SSL configuration that the distribution uses to communicate with viewers.

              • AcmCertificateArn — (String)

                The ARN of the ACM certificate. Used if the certificate is stored in ACM. If you provide an ACM certificate ARN, you must also provide MinimumCertificateVersion and SslSupportMethod.

              • Certificate — (String)

                The identifier of the certificate. Note that in CloudFront, this attribute is deprecated.

              • CertificateSource — (String)

                The source of the certificate identified by Certificate. Note that in CloudFront, this attribute is deprecated.

              • CloudFrontDefaultCertificate — (Boolean)

                Whether the distribution uses the CloudFront domain name. If set to false, then you provide either AcmCertificateArn or IamCertificateId.

              • IamCertificateId — (String)

                The identifier of the IAM certificate. Used if the certificate is stored in IAM. If you provide IamCertificateId, then you also must provide MinimumProtocolVersion and SslSupportMethod.

              • MinimumProtocolVersion — (String)

                The security policy that CloudFront uses for HTTPS connections with viewers. If SslSupportMethod is sni-only, then MinimumProtocolVersion must be TLSv1 or higher.

              • SslSupportMethod — (String)

                The viewers that the distribution accepts HTTPS connections from.

            • Status — (String)

              Indicates the current status of the distribution.

            • WebAclId — (String)

              A unique identifier that specifies the WAF web ACL, if any, to associate with this distribution.

          • AwsEc2Instance — (map)

            Details about an EC2 instance related to a finding.

            • Type — (String)

              The instance type of the instance.

            • ImageId — (String)

              The Amazon Machine Image (AMI) ID of the instance.

            • IpV4Addresses — (Array<String>)

              The IPv4 addresses associated with the instance.

            • IpV6Addresses — (Array<String>)

              The IPv6 addresses associated with the instance.

            • KeyName — (String)

              The key name associated with the instance.

            • IamInstanceProfileArn — (String)

              The IAM profile ARN of the instance.

            • VpcId — (String)

              The identifier of the VPC that the instance was launched in.

            • SubnetId — (String)

              The identifier of the subnet that the instance was launched in.

            • LaunchedAt — (String)

              Indicates when the instance was launched.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • NetworkInterfaces — (Array<map>)

              The identifiers of the network interfaces for the EC2 instance. The details for each network interface are in a corresponding AwsEc2NetworkInterfacesDetails object.

              • NetworkInterfaceId — (String)

                The identifier of the network interface. The details are in a corresponding AwsEc2NetworkInterfacesDetails object.

            • VirtualizationType — (String)

              The virtualization type of the Amazon Machine Image (AMI) required to launch the instance.

            • MetadataOptions — (map)

              Details about the metadata options for the Amazon EC2 instance.

              • HttpEndpoint — (String)

                Enables or disables the HTTP metadata endpoint on the instance.

              • HttpProtocolIpv6 — (String)

                Enables or disables the IPv6 endpoint for the instance metadata service.

              • HttpPutResponseHopLimit — (Integer)

                The desired HTTP PUT response hop limit for instance metadata requests. The larger the number, the further instance metadata requests can travel.

              • HttpTokens — (String)

                The state of token usage for your instance metadata requests.

              • InstanceMetadataTags — (String)

                Specifies whether to allow access to instance tags from the instance metadata.

            • Monitoring — (map)

              Describes the type of monitoring that’s turned on for an instance.

              • State — (String)

                Indicates whether detailed monitoring is turned on. Otherwise, basic monitoring is turned on.

          • AwsEc2NetworkInterface — (map)

            Details for an EC2 network interface.

            • Attachment — (map)

              The network interface attachment.

              • AttachTime — (String)

                Indicates when the attachment initiated.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • AttachmentId — (String)

                The identifier of the network interface attachment

              • DeleteOnTermination — (Boolean)

                Indicates whether the network interface is deleted when the instance is terminated.

              • DeviceIndex — (Integer)

                The device index of the network interface attachment on the instance.

              • InstanceId — (String)

                The ID of the instance.

              • InstanceOwnerId — (String)

                The Amazon Web Services account ID of the owner of the instance.

              • Status — (String)

                The attachment state.

                Valid values: attaching | attached | detaching | detached

            • NetworkInterfaceId — (String)

              The ID of the network interface.

            • SecurityGroups — (Array<map>)

              Security groups for the network interface.

              • GroupName — (String)

                The name of the security group.

              • GroupId — (String)

                The ID of the security group.

            • SourceDestCheck — (Boolean)

              Indicates whether traffic to or from the instance is validated.

            • IpV6Addresses — (Array<map>)

              The IPv6 addresses associated with the network interface.

              • IpV6Address — (String)

                The IPV6 address.

            • PrivateIpAddresses — (Array<map>)

              The private IPv4 addresses associated with the network interface.

              • PrivateIpAddress — (String)

                The IP address.

              • PrivateDnsName — (String)

                The private DNS name for the IP address.

            • PublicDnsName — (String)

              The public DNS name of the network interface.

            • PublicIp — (String)

              The address of the Elastic IP address bound to the network interface.

          • AwsEc2SecurityGroup — (map)

            Details for an EC2 security group.

            • GroupName — (String)

              The name of the security group.

            • GroupId — (String)

              The ID of the security group.

            • OwnerId — (String)

              The Amazon Web Services account ID of the owner of the security group.

            • VpcId — (String)

              [VPC only] The ID of the VPC for the security group.

            • IpPermissions — (Array<map>)

              The inbound rules associated with the security group.

              • IpProtocol — (String)

                The IP protocol name (tcp, udp, icmp, icmpv6) or number.

                [VPC only] Use -1 to specify all protocols.

                When authorizing security group rules, specifying -1 or a protocol number other than tcp, udp, icmp, or icmpv6 allows traffic on all ports, regardless of any port range you specify.

                For tcp, udp, and icmp, you must specify a port range.

                For icmpv6, the port range is optional. If you omit the port range, traffic for all types and codes is allowed.

              • FromPort — (Integer)

                The start of the port range for the TCP and UDP protocols, or an ICMP/ICMPv6 type number.

                A value of -1 indicates all ICMP/ICMPv6 types. If you specify all ICMP/ICMPv6 types, you must specify all codes.

              • ToPort — (Integer)

                The end of the port range for the TCP and UDP protocols, or an ICMP/ICMPv6 code.

                A value of -1 indicates all ICMP/ICMPv6 codes. If you specify all ICMP/ICMPv6 types, you must specify all codes.

              • UserIdGroupPairs — (Array<map>)

                The security group and Amazon Web Services account ID pairs.

                • GroupId — (String)

                  The ID of the security group.

                • GroupName — (String)

                  The name of the security group.

                • PeeringStatus — (String)

                  The status of a VPC peering connection, if applicable.

                • UserId — (String)

                  The ID of an Amazon Web Services account.

                  For a referenced security group in another VPC, the account ID of the referenced security group is returned in the response. If the referenced security group is deleted, this value is not returned.

                  [EC2-Classic] Required when adding or removing rules that reference a security group in another VPC.

                • VpcId — (String)

                  The ID of the VPC for the referenced security group, if applicable.

                • VpcPeeringConnectionId — (String)

                  The ID of the VPC peering connection, if applicable.

              • IpRanges — (Array<map>)

                The IPv4 ranges.

                • CidrIp — (String)

                  The IPv4 CIDR range. You can specify either a CIDR range or a source security group, but not both. To specify a single IPv4 address, use the /32 prefix length.

              • Ipv6Ranges — (Array<map>)

                The IPv6 ranges.

                • CidrIpv6 — (String)

                  The IPv6 CIDR range. You can specify either a CIDR range or a source security group, but not both. To specify a single IPv6 address, use the /128 prefix length.

              • PrefixListIds — (Array<map>)

                [VPC only] The prefix list IDs for an Amazon Web Services service. With outbound rules, this is the Amazon Web Services service to access through a VPC endpoint from instances associated with the security group.

                • PrefixListId — (String)

                  The ID of the prefix.

            • IpPermissionsEgress — (Array<map>)

              [VPC only] The outbound rules associated with the security group.

              • IpProtocol — (String)

                The IP protocol name (tcp, udp, icmp, icmpv6) or number.

                [VPC only] Use -1 to specify all protocols.

                When authorizing security group rules, specifying -1 or a protocol number other than tcp, udp, icmp, or icmpv6 allows traffic on all ports, regardless of any port range you specify.

                For tcp, udp, and icmp, you must specify a port range.

                For icmpv6, the port range is optional. If you omit the port range, traffic for all types and codes is allowed.

              • FromPort — (Integer)

                The start of the port range for the TCP and UDP protocols, or an ICMP/ICMPv6 type number.

                A value of -1 indicates all ICMP/ICMPv6 types. If you specify all ICMP/ICMPv6 types, you must specify all codes.

              • ToPort — (Integer)

                The end of the port range for the TCP and UDP protocols, or an ICMP/ICMPv6 code.

                A value of -1 indicates all ICMP/ICMPv6 codes. If you specify all ICMP/ICMPv6 types, you must specify all codes.

              • UserIdGroupPairs — (Array<map>)

                The security group and Amazon Web Services account ID pairs.

                • GroupId — (String)

                  The ID of the security group.

                • GroupName — (String)

                  The name of the security group.

                • PeeringStatus — (String)

                  The status of a VPC peering connection, if applicable.

                • UserId — (String)

                  The ID of an Amazon Web Services account.

                  For a referenced security group in another VPC, the account ID of the referenced security group is returned in the response. If the referenced security group is deleted, this value is not returned.

                  [EC2-Classic] Required when adding or removing rules that reference a security group in another VPC.

                • VpcId — (String)

                  The ID of the VPC for the referenced security group, if applicable.

                • VpcPeeringConnectionId — (String)

                  The ID of the VPC peering connection, if applicable.

              • IpRanges — (Array<map>)

                The IPv4 ranges.

                • CidrIp — (String)

                  The IPv4 CIDR range. You can specify either a CIDR range or a source security group, but not both. To specify a single IPv4 address, use the /32 prefix length.

              • Ipv6Ranges — (Array<map>)

                The IPv6 ranges.

                • CidrIpv6 — (String)

                  The IPv6 CIDR range. You can specify either a CIDR range or a source security group, but not both. To specify a single IPv6 address, use the /128 prefix length.

              • PrefixListIds — (Array<map>)

                [VPC only] The prefix list IDs for an Amazon Web Services service. With outbound rules, this is the Amazon Web Services service to access through a VPC endpoint from instances associated with the security group.

                • PrefixListId — (String)

                  The ID of the prefix.

          • AwsEc2Volume — (map)

            Details for an Amazon EC2 volume.

            • CreateTime — (String)

              Indicates when the volume was created.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • DeviceName — (String)

              The device name for the volume that is attached to the instance.

            • Encrypted — (Boolean)

              Specifies whether the volume is encrypted.

            • Size — (Integer)

              The size of the volume, in GiBs.

            • SnapshotId — (String)

              The snapshot from which the volume was created.

            • Status — (String)

              The volume state. Valid values are as follows:

              • available

              • creating

              • deleted

              • deleting

              • error

              • in-use

            • KmsKeyId — (String)

              The ARN of the KMS key that was used to protect the volume encryption key for the volume.

            • Attachments — (Array<map>)

              The volume attachments.

              • AttachTime — (String)

                The datetime when the attachment initiated.

              • DeleteOnTermination — (Boolean)

                Whether the EBS volume is deleted when the EC2 instance is terminated.

              • InstanceId — (String)

                The identifier of the EC2 instance.

              • Status — (String)

                The attachment state of the volume. Valid values are as follows:

                • attaching

                • attached

                • busy

                • detaching

                • detached

            • VolumeId — (String)

              The ID of the volume.

            • VolumeType — (String)

              The volume type.

            • VolumeScanStatus — (String)

              Indicates whether the volume was scanned or skipped.

          • AwsEc2Vpc — (map)

            Details for an Amazon EC2 VPC.

            • CidrBlockAssociationSet — (Array<map>)

              Information about the IPv4 CIDR blocks associated with the VPC.

              • AssociationId — (String)

                The association ID for the IPv4 CIDR block.

              • CidrBlock — (String)

                The IPv4 CIDR block.

              • CidrBlockState — (String)

                Information about the state of the IPv4 CIDR block.

            • Ipv6CidrBlockAssociationSet — (Array<map>)

              Information about the IPv6 CIDR blocks associated with the VPC.

              • AssociationId — (String)

                The association ID for the IPv6 CIDR block.

              • Ipv6CidrBlock — (String)

                The IPv6 CIDR block.

              • CidrBlockState — (String)

                Information about the state of the CIDR block. Valid values are as follows:

                • associating

                • associated

                • disassociating

                • disassociated

                • failed

                • failing

            • DhcpOptionsId — (String)

              The identifier of the set of Dynamic Host Configuration Protocol (DHCP) options that are associated with the VPC. If the default options are associated with the VPC, then this is default.

            • State — (String)

              The current state of the VPC. Valid values are available or pending.

          • AwsEc2Eip — (map)

            Details about an Elastic IP address.

            • InstanceId — (String)

              The identifier of the EC2 instance.

            • PublicIp — (String)

              A public IP address that is associated with the EC2 instance.

            • AllocationId — (String)

              The identifier that Amazon Web Services assigns to represent the allocation of the Elastic IP address for use with Amazon VPC.

            • AssociationId — (String)

              The identifier that represents the association of the Elastic IP address with an EC2 instance.

            • Domain — (String)

              The domain in which to allocate the address.

              If the address is for use with EC2 instances in a VPC, then Domain is vpc. Otherwise, Domain is standard.

            • PublicIpv4Pool — (String)

              The identifier of an IP address pool. This parameter allows Amazon EC2 to select an IP address from the address pool.

            • NetworkBorderGroup — (String)

              The name of the location from which the Elastic IP address is advertised.

            • NetworkInterfaceId — (String)

              The identifier of the network interface.

            • NetworkInterfaceOwnerId — (String)

              The Amazon Web Services account ID of the owner of the network interface.

            • PrivateIpAddress — (String)

              The private IP address that is associated with the Elastic IP address.

          • AwsEc2Subnet — (map)

            Details about a subnet in Amazon EC2.

            • AssignIpv6AddressOnCreation — (Boolean)

              Whether to assign an IPV6 address to a network interface that is created in this subnet.

            • AvailabilityZone — (String)

              The Availability Zone for the subnet.

            • AvailabilityZoneId — (String)

              The identifier of the Availability Zone for the subnet.

            • AvailableIpAddressCount — (Integer)

              The number of available IPV4 addresses in the subnet. Does not include addresses for stopped instances.

            • CidrBlock — (String)

              The IPV4 CIDR block that is assigned to the subnet.

            • DefaultForAz — (Boolean)

              Whether this subnet is the default subnet for the Availability Zone.

            • MapPublicIpOnLaunch — (Boolean)

              Whether instances in this subnet receive a public IP address.

            • OwnerId — (String)

              The identifier of the Amazon Web Services account that owns the subnet.

            • State — (String)

              The current state of the subnet. Valid values are available or pending.

            • SubnetArn — (String)

              The ARN of the subnet.

            • SubnetId — (String)

              The identifier of the subnet.

            • VpcId — (String)

              The identifier of the VPC that contains the subnet.

            • Ipv6CidrBlockAssociationSet — (Array<map>)

              The IPV6 CIDR blocks that are associated with the subnet.

              • AssociationId — (String)

                The association ID for the IPv6 CIDR block.

              • Ipv6CidrBlock — (String)

                The IPv6 CIDR block.

              • CidrBlockState — (String)

                Information about the state of the CIDR block. Valid values are as follows:

                • associating

                • associated

                • disassociating

                • disassociated

                • failed

                • failing

          • AwsEc2NetworkAcl — (map)

            Details about an EC2 network access control list (ACL).

            • IsDefault — (Boolean)

              Whether this is the default network ACL for the VPC.

            • NetworkAclId — (String)

              The identifier of the network ACL.

            • OwnerId — (String)

              The identifier of the Amazon Web Services account that owns the network ACL.

            • VpcId — (String)

              The identifier of the VPC for the network ACL.

            • Associations — (Array<map>)

              Associations between the network ACL and subnets.

              • NetworkAclAssociationId — (String)

                The identifier of the association between the network ACL and the subnet.

              • NetworkAclId — (String)

                The identifier of the network ACL.

              • SubnetId — (String)

                The identifier of the subnet that is associated with the network ACL.

            • Entries — (Array<map>)

              The set of rules in the network ACL.

              • CidrBlock — (String)

                The IPV4 network range for which to deny or allow access.

              • Egress — (Boolean)

                Whether the rule is an egress rule. An egress rule is a rule that applies to traffic that leaves the subnet.

              • IcmpTypeCode — (map)

                The Internet Control Message Protocol (ICMP) type and code for which to deny or allow access.

                • Code — (Integer)

                  The ICMP code for which to deny or allow access. To deny or allow all codes, use the value -1.

                • Type — (Integer)

                  The ICMP type for which to deny or allow access. To deny or allow all types, use the value -1.

              • Ipv6CidrBlock — (String)

                The IPV6 network range for which to deny or allow access.

              • PortRange — (map)

                For TCP or UDP protocols, the range of ports that the rule applies to.

                • From — (Integer)

                  The first port in the port range.

                • To — (Integer)

                  The last port in the port range.

              • Protocol — (String)

                The protocol that the rule applies to. To deny or allow access to all protocols, use the value -1.

              • RuleAction — (String)

                Whether the rule is used to allow access or deny access.

              • RuleNumber — (Integer)

                The rule number. The rules are processed in order by their number.

          • AwsElbv2LoadBalancer — (map)

            Details about a load balancer.

            • AvailabilityZones — (Array<map>)

              The Availability Zones for the load balancer.

              • ZoneName — (String)

                The name of the Availability Zone.

              • SubnetId — (String)

                The ID of the subnet. You can specify one subnet per Availability Zone.

            • CanonicalHostedZoneId — (String)

              The ID of the Amazon Route 53 hosted zone associated with the load balancer.

            • CreatedTime — (String)

              Indicates when the load balancer was created.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • DNSName — (String)

              The public DNS name of the load balancer.

            • IpAddressType — (String)

              The type of IP addresses used by the subnets for your load balancer. The possible values are ipv4 (for IPv4 addresses) and dualstack (for IPv4 and IPv6 addresses).

            • Scheme — (String)

              The nodes of an Internet-facing load balancer have public IP addresses.

            • SecurityGroups — (Array<String>)

              The IDs of the security groups for the load balancer.

            • State — (map)

              The state of the load balancer.

              • Code — (String)

                The state code. The initial state of the load balancer is provisioning.

                After the load balancer is fully set up and ready to route traffic, its state is active.

                If the load balancer could not be set up, its state is failed.

              • Reason — (String)

                A description of the state.

            • Type — (String)

              The type of load balancer.

            • VpcId — (String)

              The ID of the VPC for the load balancer.

            • LoadBalancerAttributes — (Array<map>)

              Attributes of the load balancer.

              • Key — (String)

                The name of the load balancer attribute.

              • Value — (String)

                The value of the load balancer attribute.

          • AwsElasticBeanstalkEnvironment — (map)

            Details about an Elastic Beanstalk environment.

            • ApplicationName — (String)

              The name of the application that is associated with the environment.

            • Cname — (String)

              The URL to the CNAME for this environment.

            • DateCreated — (String)

              The creation date for this environment.

            • DateUpdated — (String)

              The date when this environment was last modified.

            • Description — (String)

              A description of the environment.

            • EndpointUrl — (String)

              For load-balanced, autoscaling environments, the URL to the load balancer. For single-instance environments, the IP address of the instance.

            • EnvironmentArn — (String)

              The ARN of the environment.

            • EnvironmentId — (String)

              The identifier of the environment.

            • EnvironmentLinks — (Array<map>)

              Links to other environments in the same group.

              • EnvironmentName — (String)

                The name of the linked environment.

              • LinkName — (String)

                The name of the environment link.

            • EnvironmentName — (String)

              The name of the environment.

            • OptionSettings — (Array<map>)

              The configuration setting for the environment.

              • Namespace — (String)

                The type of resource that the configuration option is associated with.

              • OptionName — (String)

                The name of the option.

              • ResourceName — (String)

                The name of the resource.

              • Value — (String)

                The value of the configuration setting.

            • PlatformArn — (String)

              The ARN of the platform version for the environment.

            • SolutionStackName — (String)

              The name of the solution stack that is deployed with the environment.

            • Status — (String)

              The current operational status of the environment. Valid values are as follows:

              • Aborting

              • Launching

              • LinkingFrom

              • LinkingTo

              • Ready

              • Terminated

              • Terminating

              • Updating

            • Tier — (map)

              The tier of the environment.

              • Name — (String)

                The name of the environment tier. Valid values are WebServer or Worker.

              • Type — (String)

                The type of environment tier. Valid values are Standard or SQS/HTTP.

              • Version — (String)

                The version of the environment tier.

            • VersionLabel — (String)

              The application version of the environment.

          • AwsElasticsearchDomain — (map)

            Details for an Elasticsearch domain.

            • AccessPolicies — (String)

              IAM policy document specifying the access policies for the new Elasticsearch domain.

            • DomainEndpointOptions — (map)

              Additional options for the domain endpoint.

              • EnforceHTTPS — (Boolean)

                Whether to require that all traffic to the domain arrive over HTTPS.

              • TLSSecurityPolicy — (String)

                The TLS security policy to apply to the HTTPS endpoint of the OpenSearch domain.

                Valid values:

                • Policy-Min-TLS-1-0-2019-07, which supports TLSv1.0 and higher

                • Policy-Min-TLS-1-2-2019-07, which only supports TLSv1.2

            • DomainId — (String)

              Unique identifier for an Elasticsearch domain.

            • DomainName — (String)

              Name of an Elasticsearch domain.

              Domain names are unique across all domains owned by the same account within an Amazon Web Services Region.

              Domain names must start with a lowercase letter and must be between 3 and 28 characters.

              Valid characters are a-z (lowercase only), 0-9, and – (hyphen).

            • Endpoint — (String)

              Domain-specific endpoint used to submit index, search, and data upload requests to an Elasticsearch domain.

              The endpoint is a service URL.

            • Endpoints — (map<String>)

              The key-value pair that exists if the Elasticsearch domain uses VPC endpoints.

            • ElasticsearchVersion — (String)

              OpenSearch version.

            • ElasticsearchClusterConfig — (map)

              Information about an OpenSearch cluster configuration.

              • DedicatedMasterCount — (Integer)

                The number of instances to use for the master node. If this attribute is specified, then DedicatedMasterEnabled must be true.

              • DedicatedMasterEnabled — (Boolean)

                Whether to use a dedicated master node for the Elasticsearch domain. A dedicated master node performs cluster management tasks, but doesn't hold data or respond to data upload requests.

              • DedicatedMasterType — (String)

                The hardware configuration of the computer that hosts the dedicated master node. A sample value is m3.medium.elasticsearch. If this attribute is specified, then DedicatedMasterEnabled must be true.

                For a list of valid values, see Supported instance types in Amazon OpenSearch Service in the Amazon OpenSearch Service Developer Guide.

              • InstanceCount — (Integer)

                The number of data nodes to use in the Elasticsearch domain.

              • InstanceType — (String)

                The instance type for your data nodes. For example, m3.medium.elasticsearch.

                For a list of valid values, see Supported instance types in Amazon OpenSearch Service in the Amazon OpenSearch Service Developer Guide.

              • ZoneAwarenessConfig — (map)

                Configuration options for zone awareness. Provided if ZoneAwarenessEnabled is true.

                • AvailabilityZoneCount — (Integer)

                  he number of Availability Zones that the domain uses. Valid values are 2 and 3. The default is 2.

              • ZoneAwarenessEnabled — (Boolean)

                Whether to enable zone awareness for the Elasticsearch domain. When zone awareness is enabled, OpenSearch allocates the cluster's nodes and replica index shards across Availability Zones in the same Region. This prevents data loss and minimizes downtime if a node or data center fails.

            • EncryptionAtRestOptions — (map)

              Details about the configuration for encryption at rest.

              • Enabled — (Boolean)

                Whether encryption at rest is enabled.

              • KmsKeyId — (String)

                The KMS key ID. Takes the form 1a2a3a4-1a2a-3a4a-5a6a-1a2a3a4a5a6a.

            • LogPublishingOptions — (map)

              Configures the CloudWatch Logs to publish for the Elasticsearch domain.

              • IndexSlowLogs — (map)

                Configures the OpenSearch index logs publishing.

                • CloudWatchLogsLogGroupArn — (String)

                  The ARN of the CloudWatch Logs group to publish the logs to.

                • Enabled — (Boolean)

                  Whether the log publishing is enabled.

              • SearchSlowLogs — (map)

                Configures the OpenSearch search slow log publishing.

                • CloudWatchLogsLogGroupArn — (String)

                  The ARN of the CloudWatch Logs group to publish the logs to.

                • Enabled — (Boolean)

                  Whether the log publishing is enabled.

              • AuditLogs — (map)

                The log configuration.

                • CloudWatchLogsLogGroupArn — (String)

                  The ARN of the CloudWatch Logs group to publish the logs to.

                • Enabled — (Boolean)

                  Whether the log publishing is enabled.

            • NodeToNodeEncryptionOptions — (map)

              Details about the configuration for node-to-node encryption.

              • Enabled — (Boolean)

                Whether node-to-node encryption is enabled.

            • ServiceSoftwareOptions — (map)

              Information about the status of a domain relative to the latest service software.

              • AutomatedUpdateDate — (String)

                The epoch time when the deployment window closes for required updates. After this time, Amazon OpenSearch Service schedules the software upgrade automatically.

              • Cancellable — (Boolean)

                Whether a request to update the domain can be canceled.

              • CurrentVersion — (String)

                The version of the service software that is currently installed on the domain.

              • Description — (String)

                A more detailed description of the service software status.

              • NewVersion — (String)

                The most recent version of the service software.

              • UpdateAvailable — (Boolean)

                Whether a service software update is available for the domain.

              • UpdateStatus — (String)

                The status of the service software update. Valid values are as follows:

                • COMPLETED

                • ELIGIBLE

                • IN_PROGRESS

                • NOT_ELIGIBLE

                • PENDING_UPDATE

            • VPCOptions — (map)

              Information that OpenSearch derives based on VPCOptions for the domain.

              • AvailabilityZones — (Array<String>)

                The list of Availability Zones associated with the VPC subnets.

              • SecurityGroupIds — (Array<String>)

                The list of security group IDs associated with the VPC endpoints for the domain.

              • SubnetIds — (Array<String>)

                A list of subnet IDs associated with the VPC endpoints for the domain.

              • VPCId — (String)

                ID for the VPC.

          • AwsS3Bucket — (map)

            Details about an S3 bucket related to a finding.

            • OwnerId — (String)

              The canonical user ID of the owner of the S3 bucket.

            • OwnerName — (String)

              The display name of the owner of the S3 bucket.

            • OwnerAccountId — (String)

              The Amazon Web Services account identifier of the account that owns the S3 bucket.

            • CreatedAt — (String)

              Indicates when the S3 bucket was created.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • ServerSideEncryptionConfiguration — (map)

              The encryption rules that are applied to the S3 bucket.

              • Rules — (Array<map>)

                The encryption rules that are applied to the S3 bucket.

                • ApplyServerSideEncryptionByDefault — (map)

                  Specifies the default server-side encryption to apply to new objects in the bucket. If a PUT object request doesn't specify any server-side encryption, this default encryption is applied.

                  • SSEAlgorithm — (String)

                    Server-side encryption algorithm to use for the default encryption. Valid values are aws: kms or AES256.

                  • KMSMasterKeyID — (String)

                    KMS key ID to use for the default encryption.

            • BucketLifecycleConfiguration — (map)

              The lifecycle configuration for objects in the specified bucket.

              • Rules — (Array<map>)

                The lifecycle rules.

                • AbortIncompleteMultipartUpload — (map)

                  How Amazon S3 responds when a multipart upload is incomplete. Specifically, provides a number of days before Amazon S3 cancels the entire upload.

                  • DaysAfterInitiation — (Integer)

                    The number of days after which Amazon S3 cancels an incomplete multipart upload.

                • ExpirationDate — (String)

                  The date when objects are moved or deleted.

                  Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

                • ExpirationInDays — (Integer)

                  The length in days of the lifetime for objects that are subject to the rule.

                • ExpiredObjectDeleteMarker — (Boolean)

                  Whether Amazon S3 removes a delete marker that has no noncurrent versions. If set to true, the delete marker is expired. If set to false, the policy takes no action.

                  If you provide ExpiredObjectDeleteMarker, you cannot provide ExpirationInDays or ExpirationDate.

                • Filter — (map)

                  Identifies the objects that a rule applies to.

                  • Predicate — (map)

                    The configuration for the filter.

                    • Operands — (Array<map>)

                      The values to use for the filter.

                      • Prefix — (String)

                        Prefix text for matching objects.

                      • Tag — (map)

                        A tag that is assigned to matching objects.

                        • Key — (String)

                          The tag key.

                        • Value — (String)

                          The tag value.

                      • Type — (String)

                        The type of filter value. Valid values are LifecyclePrefixPredicate or LifecycleTagPredicate.

                    • Prefix — (String)

                      A prefix filter.

                    • Tag — (map)

                      A tag filter.

                      • Key — (String)

                        The tag key.

                      • Value — (String)

                        The tag value

                    • Type — (String)

                      Whether to use AND or OR to join the operands. Valid values are LifecycleAndOperator or LifecycleOrOperator.

                • ID — (String)

                  The unique identifier of the rule.

                • NoncurrentVersionExpirationInDays — (Integer)

                  The number of days that an object is noncurrent before Amazon S3 can perform the associated action.

                • NoncurrentVersionTransitions — (Array<map>)

                  Transition rules that describe when noncurrent objects transition to a specified storage class.

                  • Days — (Integer)

                    The number of days that an object is noncurrent before Amazon S3 can perform the associated action.

                  • StorageClass — (String)

                    The class of storage to change the object to after the object is noncurrent for the specified number of days.

                • Prefix — (String)

                  A prefix that identifies one or more objects that the rule applies to.

                • Status — (String)

                  The current status of the rule. Indicates whether the rule is currently being applied.

                • Transitions — (Array<map>)

                  Transition rules that indicate when objects transition to a specified storage class.

                  • Date — (String)

                    A date on which to transition objects to the specified storage class. If you provide Date, you cannot provide Days.

                    Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

                  • Days — (Integer)

                    The number of days after which to transition the object to the specified storage class. If you provide Days, you cannot provide Date.

                  • StorageClass — (String)

                    The storage class to transition the object to. Valid values are as follows:

                    • DEEP_ARCHIVE

                    • GLACIER

                    • INTELLIGENT_TIERING

                    • ONEZONE_IA

                    • STANDARD_IA

            • PublicAccessBlockConfiguration — (map)

              Provides information about the Amazon S3 Public Access Block configuration for the S3 bucket.

              • BlockPublicAcls — (Boolean)

                Indicates whether to reject calls to update an S3 bucket if the calls include a public access control list (ACL).

              • BlockPublicPolicy — (Boolean)

                Indicates whether to reject calls to update the access policy for an S3 bucket or access point if the policy allows public access.

              • IgnorePublicAcls — (Boolean)

                Indicates whether Amazon S3 ignores public ACLs that are associated with an S3 bucket.

              • RestrictPublicBuckets — (Boolean)

                Indicates whether to restrict access to an access point or S3 bucket that has a public policy to only Amazon Web Services service principals and authorized users within the S3 bucket owner's account.

            • AccessControlList — (String)

              The access control list for the S3 bucket.

            • BucketLoggingConfiguration — (map)

              The logging configuration for the S3 bucket.

              • DestinationBucketName — (String)

                The name of the S3 bucket where log files for the S3 bucket are stored.

              • LogFilePrefix — (String)

                The prefix added to log files for the S3 bucket.

            • BucketWebsiteConfiguration — (map)

              The website configuration parameters for the S3 bucket.

              • ErrorDocument — (String)

                The name of the error document for the website.

              • IndexDocumentSuffix — (String)

                The name of the index document for the website.

              • RedirectAllRequestsTo — (map)

                The redirect behavior for requests to the website.

                • Hostname — (String)

                  The name of the host to redirect requests to.

                • Protocol — (String)

                  The protocol to use when redirecting requests. By default, this field uses the same protocol as the original request. Valid values are http or https.

              • RoutingRules — (Array<map>)

                The rules for applying redirects for requests to the website.

                • Condition — (map)

                  Provides the condition that must be met in order to apply the routing rule.

                  • HttpErrorCodeReturnedEquals — (String)

                    Indicates to redirect the request if the HTTP error code matches this value.

                  • KeyPrefixEquals — (String)

                    Indicates to redirect the request if the key prefix matches this value.

                • Redirect — (map)

                  Provides the rules to redirect the request if the condition in Condition is met.

                  • Hostname — (String)

                    The host name to use in the redirect request.

                  • HttpRedirectCode — (String)

                    The HTTP redirect code to use in the response.

                  • Protocol — (String)

                    The protocol to use to redirect the request. By default, uses the protocol from the original request.

                  • ReplaceKeyPrefixWith — (String)

                    The object key prefix to use in the redirect request.

                    Cannot be provided if ReplaceKeyWith is present.

                  • ReplaceKeyWith — (String)

                    The specific object key to use in the redirect request.

                    Cannot be provided if ReplaceKeyPrefixWith is present.

            • BucketNotificationConfiguration — (map)

              The notification configuration for the S3 bucket.

              • Configurations — (Array<map>)

                Configurations for S3 bucket notifications.

                • Events — (Array<String>)

                  The list of events that trigger a notification.

                • Filter — (map)

                  The filters that determine which S3 buckets generate notifications.

                  • S3KeyFilter — (map)

                    Details for an Amazon S3 filter.

                    • FilterRules — (Array<map>)

                      The filter rules for the filter.

                      • Name — (String)

                        Indicates whether the filter is based on the prefix or suffix of the Amazon S3 key.

                        Possible values include:
                        • "Prefix"
                        • "Suffix"
                      • Value — (String)

                        The filter value.

                • Destination — (String)

                  The ARN of the Lambda function, Amazon SQS queue, or Amazon SNS topic that generates the notification.

                • Type — (String)

                  Indicates the type of notification. Notifications can be generated using Lambda functions, Amazon SQS queues, or Amazon SNS topics, with corresponding valid values as follows:

                  • LambdaConfiguration

                  • QueueConfiguration

                  • TopicConfiguration

            • BucketVersioningConfiguration — (map)

              The versioning state of an S3 bucket.

              • IsMfaDeleteEnabled — (Boolean)

                Specifies whether MFA delete is currently enabled in the S3 bucket versioning configuration. If the S3 bucket was never configured with MFA delete, then this attribute is not included.

              • Status — (String)

                The versioning status of the S3 bucket. Valid values are Enabled or Suspended.

            • ObjectLockConfiguration — (map)

              Specifies which rule Amazon S3 applies by default to every new object placed in the bucket.

              • ObjectLockEnabled — (String)

                Indicates whether the bucket has an Object Lock configuration enabled.

              • Rule — (map)

                Specifies the Object Lock rule for the specified object.

                • DefaultRetention — (map)

                  The default Object Lock retention mode and period that you want to apply to new objects placed in the specified bucket.

                  • Days — (Integer)

                    The number of days that you want to specify for the default retention period.

                  • Mode — (String)

                    The default Object Lock retention mode you want to apply to new objects placed in the specified bucket.

                  • Years — (Integer)

                    The number of years that you want to specify for the default retention period.

            • Name — (String)

              The name of the bucket.

          • AwsS3AccountPublicAccessBlock — (map)

            Details about the Amazon S3 Public Access Block configuration for an account.

            • BlockPublicAcls — (Boolean)

              Indicates whether to reject calls to update an S3 bucket if the calls include a public access control list (ACL).

            • BlockPublicPolicy — (Boolean)

              Indicates whether to reject calls to update the access policy for an S3 bucket or access point if the policy allows public access.

            • IgnorePublicAcls — (Boolean)

              Indicates whether Amazon S3 ignores public ACLs that are associated with an S3 bucket.

            • RestrictPublicBuckets — (Boolean)

              Indicates whether to restrict access to an access point or S3 bucket that has a public policy to only Amazon Web Services service principals and authorized users within the S3 bucket owner's account.

          • AwsS3Object — (map)

            Details about an S3 object related to a finding.

            • LastModified — (String)

              Indicates when the object was last modified.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • ETag — (String)

              The opaque identifier assigned by a web server to a specific version of a resource found at a URL.

            • VersionId — (String)

              The version of the object.

            • ContentType — (String)

              A standard MIME type describing the format of the object data.

            • ServerSideEncryption — (String)

              If the object is stored using server-side encryption, the value of the server-side encryption algorithm used when storing this object in Amazon S3.

            • SSEKMSKeyId — (String)

              The identifier of the KMS symmetric customer managed key that was used for the object.

          • AwsSecretsManagerSecret — (map)

            Details about a Secrets Manager secret.

            • RotationRules — (map)

              Defines the rotation schedule for the secret.

              • AutomaticallyAfterDays — (Integer)

                The number of days after the previous rotation to rotate the secret.

            • RotationOccurredWithinFrequency — (Boolean)

              Whether the rotation occurred within the specified rotation frequency.

            • KmsKeyId — (String)

              The ARN, Key ID, or alias of the KMS key used to encrypt the SecretString or SecretBinary values for versions of this secret.

            • RotationEnabled — (Boolean)

              Whether rotation is enabled.

            • RotationLambdaArn — (String)

              The ARN of the Lambda function that rotates the secret.

            • Deleted — (Boolean)

              Whether the secret is deleted.

            • Name — (String)

              The name of the secret.

            • Description — (String)

              The user-provided description of the secret.

          • AwsIamAccessKey — (map)

            Details about an IAM access key related to a finding.

            • UserName — (String)

              The user associated with the IAM access key related to a finding.

              The UserName parameter has been replaced with the PrincipalName parameter because access keys can also be assigned to principals that are not IAM users.

            • Status — (String)

              The status of the IAM access key related to a finding.

              Possible values include:
              • "Active"
              • "Inactive"
            • CreatedAt — (String)

              Indicates when the IAM access key was created.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • PrincipalId — (String)

              The ID of the principal associated with an access key.

            • PrincipalType — (String)

              The type of principal associated with an access key.

            • PrincipalName — (String)

              The name of the principal.

            • AccountId — (String)

              The Amazon Web Services account ID of the account for the key.

            • AccessKeyId — (String)

              The identifier of the access key.

            • SessionContext — (map)

              Information about the session that the key was used for.

              • Attributes — (map)

                Attributes of the session that the key was used for.

                • MfaAuthenticated — (Boolean)

                  Indicates whether the session used multi-factor authentication (MFA).

                • CreationDate — (String)

                  Indicates when the session was created.

                  Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • SessionIssuer — (map)

                Information about the entity that created the session.

                • Type — (String)

                  The type of principal (user, role, or group) that created the session.

                • PrincipalId — (String)

                  The principal ID of the principal (user, role, or group) that created the session.

                • Arn — (String)

                  The ARN of the session.

                • AccountId — (String)

                  The identifier of the Amazon Web Services account that created the session.

                • UserName — (String)

                  The name of the principal that created the session.

          • AwsIamUser — (map)

            Details about an IAM user.

            • AttachedManagedPolicies — (Array<map>)

              A list of the managed policies that are attached to the user.

              • PolicyName — (String)

                The name of the policy.

              • PolicyArn — (String)

                The ARN of the policy.

            • CreateDate — (String)

              Indicates when the user was created.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • GroupList — (Array<String>)

              A list of IAM groups that the user belongs to.

            • Path — (String)

              The path to the user.

            • PermissionsBoundary — (map)

              The permissions boundary for the user.

              • PermissionsBoundaryArn — (String)

                The ARN of the policy used to set the permissions boundary.

              • PermissionsBoundaryType — (String)

                The usage type for the permissions boundary.

            • UserId — (String)

              The unique identifier for the user.

            • UserName — (String)

              The name of the user.

            • UserPolicyList — (Array<map>)

              The list of inline policies that are embedded in the user.

              • PolicyName — (String)

                The name of the policy.

          • AwsIamPolicy — (map)

            Details about an IAM permissions policy.

            • AttachmentCount — (Integer)

              The number of users, groups, and roles that the policy is attached to.

            • CreateDate — (String)

              When the policy was created.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • DefaultVersionId — (String)

              The identifier of the default version of the policy.

            • Description — (String)

              A description of the policy.

            • IsAttachable — (Boolean)

              Whether the policy can be attached to a user, group, or role.

            • Path — (String)

              The path to the policy.

            • PermissionsBoundaryUsageCount — (Integer)

              The number of users and roles that use the policy to set the permissions boundary.

            • PolicyId — (String)

              The unique identifier of the policy.

            • PolicyName — (String)

              The name of the policy.

            • PolicyVersionList — (Array<map>)

              List of versions of the policy.

              • VersionId — (String)

                The identifier of the policy version.

              • IsDefaultVersion — (Boolean)

                Whether the version is the default version.

              • CreateDate — (String)

                Indicates when the version was created.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • UpdateDate — (String)

              When the policy was most recently updated.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

          • AwsApiGatewayV2Stage — (map)

            Provides information about a version 2 stage for Amazon API Gateway.

            • ClientCertificateId — (String)

              The identifier of a client certificate for a stage. Supported only for WebSocket API calls.

            • CreatedDate — (String)

              Indicates when the stage was created.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • Description — (String)

              The description of the stage.

            • DefaultRouteSettings — (map)

              Default route settings for the stage.

              • DetailedMetricsEnabled — (Boolean)

                Indicates whether detailed metrics are enabled.

              • LoggingLevel — (String)

                The logging level. The logging level affects the log entries that are pushed to CloudWatch Logs. Supported only for WebSocket APIs.

                If the logging level is ERROR, then the logs only include error-level entries.

                If the logging level is INFO, then the logs include both ERROR events and extra informational events.

                Valid values: OFF | ERROR | INFO

              • DataTraceEnabled — (Boolean)

                Indicates whether data trace logging is enabled. Data trace logging affects the log entries that are pushed to CloudWatch Logs. Supported only for WebSocket APIs.

              • ThrottlingBurstLimit — (Integer)

                The throttling burst limit.

              • ThrottlingRateLimit — (Float)

                The throttling rate limit.

            • DeploymentId — (String)

              The identifier of the deployment that the stage is associated with.

            • LastUpdatedDate — (String)

              Indicates when the stage was most recently updated.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • RouteSettings — (map)

              The route settings for the stage.

              • DetailedMetricsEnabled — (Boolean)

                Indicates whether detailed metrics are enabled.

              • LoggingLevel — (String)

                The logging level. The logging level affects the log entries that are pushed to CloudWatch Logs. Supported only for WebSocket APIs.

                If the logging level is ERROR, then the logs only include error-level entries.

                If the logging level is INFO, then the logs include both ERROR events and extra informational events.

                Valid values: OFF | ERROR | INFO

              • DataTraceEnabled — (Boolean)

                Indicates whether data trace logging is enabled. Data trace logging affects the log entries that are pushed to CloudWatch Logs. Supported only for WebSocket APIs.

              • ThrottlingBurstLimit — (Integer)

                The throttling burst limit.

              • ThrottlingRateLimit — (Float)

                The throttling rate limit.

            • StageName — (String)

              The name of the stage.

            • StageVariables — (map<String>)

              A map that defines the stage variables for the stage.

              Variable names can have alphanumeric and underscore characters.

              Variable values can contain the following characters:

              • Uppercase and lowercase letters

              • Numbers

              • Special characters -._~:/?#&=,

            • AccessLogSettings — (map)

              Information about settings for logging access for the stage.

              • Format — (String)

                A single-line format of the access logs of data, as specified by selected $context variables. The format must include at least $context.requestId.

              • DestinationArn — (String)

                The ARN of the CloudWatch Logs log group that receives the access logs.

            • AutoDeploy — (Boolean)

              Indicates whether updates to an API automatically trigger a new deployment.

            • LastDeploymentStatusMessage — (String)

              The status of the last deployment of a stage. Supported only if the stage has automatic deployment enabled.

            • ApiGatewayManaged — (Boolean)

              Indicates whether the stage is managed by API Gateway.

          • AwsApiGatewayV2Api — (map)

            Provides information about a version 2 API in Amazon API Gateway.

            • ApiEndpoint — (String)

              The URI of the API.

              Uses the format <api-id>.execute-api.<region>.amazonaws.com

              The stage name is typically appended to the URI to form a complete path to a deployed API stage.

            • ApiId — (String)

              The identifier of the API.

            • ApiKeySelectionExpression — (String)

              An API key selection expression. Supported only for WebSocket APIs.

            • CreatedDate — (String)

              Indicates when the API was created.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • Description — (String)

              A description of the API.

            • Version — (String)

              The version identifier for the API.

            • Name — (String)

              The name of the API.

            • ProtocolType — (String)

              The API protocol for the API.

              Valid values: WEBSOCKET | HTTP

            • RouteSelectionExpression — (String)

              The route selection expression for the API.

              For HTTP APIs, must be ${request.method} ${request.path}. This is the default value for HTTP APIs.

              For WebSocket APIs, there is no default value.

            • CorsConfiguration — (map)

              A cross-origin resource sharing (CORS) configuration. Supported only for HTTP APIs.

              • AllowOrigins — (Array<String>)

                The allowed origins for CORS requests.

              • AllowCredentials — (Boolean)

                Indicates whether the CORS request includes credentials.

              • ExposeHeaders — (Array<String>)

                The exposed headers for CORS requests.

              • MaxAge — (Integer)

                The number of seconds for which the browser caches preflight request results.

              • AllowMethods — (Array<String>)

                The allowed methods for CORS requests.

              • AllowHeaders — (Array<String>)

                The allowed headers for CORS requests.

          • AwsDynamoDbTable — (map)

            Details about a DynamoDB table.

            • AttributeDefinitions — (Array<map>)

              A list of attribute definitions for the table.

              • AttributeName — (String)

                The name of the attribute.

              • AttributeType — (String)

                The type of the attribute.

            • BillingModeSummary — (map)

              Information about the billing for read/write capacity on the table.

              • BillingMode — (String)

                The method used to charge for read and write throughput and to manage capacity.

              • LastUpdateToPayPerRequestDateTime — (String)

                If the billing mode is PAY_PER_REQUEST, indicates when the billing mode was set to that value.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • CreationDateTime — (String)

              Indicates when the table was created.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • GlobalSecondaryIndexes — (Array<map>)

              List of global secondary indexes for the table.

              • Backfilling — (Boolean)

                Whether the index is currently backfilling.

              • IndexArn — (String)

                The ARN of the index.

              • IndexName — (String)

                The name of the index.

              • IndexSizeBytes — (Integer)

                The total size in bytes of the index.

              • IndexStatus — (String)

                The current status of the index.

                • ACTIVE

                • CREATING

                • DELETING

                • UPDATING

              • ItemCount — (Integer)

                The number of items in the index.

              • KeySchema — (Array<map>)

                The key schema for the index.

                • AttributeName — (String)

                  The name of the key schema attribute.

                • KeyType — (String)

                  The type of key used for the key schema attribute. Valid values are HASH or RANGE.

              • Projection — (map)

                Attributes that are copied from the table into an index.

                • NonKeyAttributes — (Array<String>)

                  The nonkey attributes that are projected into the index. For each attribute, provide the attribute name.

                • ProjectionType — (String)

                  The types of attributes that are projected into the index. Valid values are as follows:

                  • ALL

                  • INCLUDE

                  • KEYS_ONLY

              • ProvisionedThroughput — (map)

                Information about the provisioned throughput settings for the indexes.

                • LastDecreaseDateTime — (String)

                  Indicates when the provisioned throughput was last decreased.

                  Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

                • LastIncreaseDateTime — (String)

                  Indicates when the provisioned throughput was last increased.

                  Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

                • NumberOfDecreasesToday — (Integer)

                  The number of times during the current UTC calendar day that the provisioned throughput was decreased.

                • ReadCapacityUnits — (Integer)

                  The maximum number of strongly consistent reads consumed per second before DynamoDB returns a ThrottlingException.

                • WriteCapacityUnits — (Integer)

                  The maximum number of writes consumed per second before DynamoDB returns a ThrottlingException.

            • GlobalTableVersion — (String)

              The version of global tables being used.

            • ItemCount — (Integer)

              The number of items in the table.

            • KeySchema — (Array<map>)

              The primary key structure for the table.

              • AttributeName — (String)

                The name of the key schema attribute.

              • KeyType — (String)

                The type of key used for the key schema attribute. Valid values are HASH or RANGE.

            • LatestStreamArn — (String)

              The ARN of the latest stream for the table.

            • LatestStreamLabel — (String)

              The label of the latest stream. The label is not a unique identifier.

            • LocalSecondaryIndexes — (Array<map>)

              The list of local secondary indexes for the table.

              • IndexArn — (String)

                The ARN of the index.

              • IndexName — (String)

                The name of the index.

              • KeySchema — (Array<map>)

                The complete key schema for the index.

                • AttributeName — (String)

                  The name of the key schema attribute.

                • KeyType — (String)

                  The type of key used for the key schema attribute. Valid values are HASH or RANGE.

              • Projection — (map)

                Attributes that are copied from the table into the index. These are in addition to the primary key attributes and index key attributes, which are automatically projected.

                • NonKeyAttributes — (Array<String>)

                  The nonkey attributes that are projected into the index. For each attribute, provide the attribute name.

                • ProjectionType — (String)

                  The types of attributes that are projected into the index. Valid values are as follows:

                  • ALL

                  • INCLUDE

                  • KEYS_ONLY

            • ProvisionedThroughput — (map)

              Information about the provisioned throughput for the table.

              • LastDecreaseDateTime — (String)

                Indicates when the provisioned throughput was last decreased.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • LastIncreaseDateTime — (String)

                Indicates when the provisioned throughput was last increased.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • NumberOfDecreasesToday — (Integer)

                The number of times during the current UTC calendar day that the provisioned throughput was decreased.

              • ReadCapacityUnits — (Integer)

                The maximum number of strongly consistent reads consumed per second before DynamoDB returns a ThrottlingException.

              • WriteCapacityUnits — (Integer)

                The maximum number of writes consumed per second before DynamoDB returns a ThrottlingException.

            • Replicas — (Array<map>)

              The list of replicas of this table.

              • GlobalSecondaryIndexes — (Array<map>)

                List of global secondary indexes for the replica.

                • IndexName — (String)

                  The name of the index.

                • ProvisionedThroughputOverride — (map)

                  Replica-specific configuration for the provisioned throughput for the index.

                  • ReadCapacityUnits — (Integer)

                    The read capacity units for the replica.

              • KmsMasterKeyId — (String)

                The identifier of the KMS key that will be used for KMS encryption for the replica.

              • ProvisionedThroughputOverride — (map)

                Replica-specific configuration for the provisioned throughput.

                • ReadCapacityUnits — (Integer)

                  The read capacity units for the replica.

              • RegionName — (String)

                The name of the Region where the replica is located.

              • ReplicaStatus — (String)

                The current status of the replica. Valid values are as follows:

                • ACTIVE

                • CREATING

                • CREATION_FAILED

                • DELETING

                • UPDATING

              • ReplicaStatusDescription — (String)

                Detailed information about the replica status.

            • RestoreSummary — (map)

              Information about the restore for the table.

              • SourceBackupArn — (String)

                The ARN of the source backup from which the table was restored.

              • SourceTableArn — (String)

                The ARN of the source table for the backup.

              • RestoreDateTime — (String)

                Indicates the point in time that the table was restored to.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • RestoreInProgress — (Boolean)

                Whether a restore is currently in progress.

            • SseDescription — (map)

              Information about the server-side encryption for the table.

              • InaccessibleEncryptionDateTime — (String)

                If the key is inaccessible, the date and time when DynamoDB detected that the key was inaccessible.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • Status — (String)

                The status of the server-side encryption.

              • SseType — (String)

                The type of server-side encryption.

              • KmsMasterKeyArn — (String)

                The ARN of the KMS key that is used for the KMS encryption.

            • StreamSpecification — (map)

              The current DynamoDB Streams configuration for the table.

              • StreamEnabled — (Boolean)

                Indicates whether DynamoDB Streams is enabled on the table.

              • StreamViewType — (String)

                Determines the information that is written to the table.

            • TableId — (String)

              The identifier of the table.

            • TableName — (String)

              The name of the table.

            • TableSizeBytes — (Integer)

              The total size of the table in bytes.

            • TableStatus — (String)

              The current status of the table. Valid values are as follows:

              • ACTIVE

              • ARCHIVED

              • ARCHIVING

              • CREATING

              • DELETING

              • INACCESSIBLE_ENCRYPTION_CREDENTIALS

              • UPDATING

            • DeletionProtectionEnabled — (Boolean)

              Indicates whether deletion protection is to be enabled (true) or disabled (false) on the table.

          • AwsApiGatewayStage — (map)

            Provides information about a version 1 Amazon API Gateway stage.

            • DeploymentId — (String)

              The identifier of the deployment that the stage points to.

            • ClientCertificateId — (String)

              The identifier of the client certificate for the stage.

            • StageName — (String)

              The name of the stage.

            • Description — (String)

              A description of the stage.

            • CacheClusterEnabled — (Boolean)

              Indicates whether a cache cluster is enabled for the stage.

            • CacheClusterSize — (String)

              If a cache cluster is enabled, the size of the cache cluster.

            • CacheClusterStatus — (String)

              If a cache cluster is enabled, the status of the cache cluster.

            • MethodSettings — (Array<map>)

              Defines the method settings for the stage.

              • MetricsEnabled — (Boolean)

                Indicates whether CloudWatch metrics are enabled for the method.

              • LoggingLevel — (String)

                The logging level for this method. The logging level affects the log entries that are pushed to CloudWatch Logs.

                If the logging level is ERROR, then the logs only include error-level entries.

                If the logging level is INFO, then the logs include both ERROR events and extra informational events.

                Valid values: OFF | ERROR | INFO

              • DataTraceEnabled — (Boolean)

                Indicates whether data trace logging is enabled for the method. Data trace logging affects the log entries that are pushed to CloudWatch Logs.

              • ThrottlingBurstLimit — (Integer)

                The throttling burst limit for the method.

              • ThrottlingRateLimit — (Float)

                The throttling rate limit for the method.

              • CachingEnabled — (Boolean)

                Indicates whether responses are cached and returned for requests. For responses to be cached, a cache cluster must be enabled on the stage.

              • CacheTtlInSeconds — (Integer)

                Specifies the time to live (TTL), in seconds, for cached responses. The higher the TTL, the longer the response is cached.

              • CacheDataEncrypted — (Boolean)

                Indicates whether the cached responses are encrypted.

              • RequireAuthorizationForCacheControl — (Boolean)

                Indicates whether authorization is required for a cache invalidation request.

              • UnauthorizedCacheControlHeaderStrategy — (String)

                Indicates how to handle unauthorized requests for cache invalidation.

                Valid values: FAIL_WITH_403 | SUCCEED_WITH_RESPONSE_HEADER | SUCCEED_WITHOUT_RESPONSE_HEADER

              • HttpMethod — (String)

                The HTTP method. You can use an asterisk (*) as a wildcard to apply method settings to multiple methods.

              • ResourcePath — (String)

                The resource path for this method. Forward slashes (/) are encoded as ~1 . The initial slash must include a forward slash.

                For example, the path value /resource/subresource must be encoded as /~1resource~1subresource.

                To specify the root path, use only a slash (/). You can use an asterisk (*) as a wildcard to apply method settings to multiple methods.

            • Variables — (map<String>)

              A map that defines the stage variables for the stage.

              Variable names can have alphanumeric and underscore characters.

              Variable values can contain the following characters:

              • Uppercase and lowercase letters

              • Numbers

              • Special characters -._~:/?#&=,

            • DocumentationVersion — (String)

              The version of the API documentation that is associated with the stage.

            • AccessLogSettings — (map)

              Settings for logging access for the stage.

              • Format — (String)

                A single-line format of the access logs of data, as specified by selected $context variables. The format must include at least $context.requestId.

              • DestinationArn — (String)

                The ARN of the CloudWatch Logs log group that receives the access logs.

            • CanarySettings — (map)

              Information about settings for canary deployment in the stage.

              • PercentTraffic — (Float)

                The percentage of traffic that is diverted to a canary deployment.

              • DeploymentId — (String)

                The deployment identifier for the canary deployment.

              • StageVariableOverrides — (map<String>)

                Stage variables that are overridden in the canary release deployment. The variables include new stage variables that are introduced in the canary.

                Each variable is represented as a string-to-string map between the stage variable name and the variable value.

              • UseStageCache — (Boolean)

                Indicates whether the canary deployment uses the stage cache.

            • TracingEnabled — (Boolean)

              Indicates whether active tracing with X-Ray is enabled for the stage.

            • CreatedDate — (String)

              Indicates when the stage was created.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • LastUpdatedDate — (String)

              Indicates when the stage was most recently updated.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • WebAclArn — (String)

              The ARN of the web ACL associated with the stage.

          • AwsApiGatewayRestApi — (map)

            Provides information about a REST API in version 1 of Amazon API Gateway.

            • Id — (String)

              The identifier of the REST API.

            • Name — (String)

              The name of the REST API.

            • Description — (String)

              A description of the REST API.

            • CreatedDate — (String)

              Indicates when the API was created.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • Version — (String)

              The version identifier for the REST API.

            • BinaryMediaTypes — (Array<String>)

              The list of binary media types supported by the REST API.

            • MinimumCompressionSize — (Integer)

              The minimum size in bytes of a payload before compression is enabled.

              If null, then compression is disabled.

              If 0, then all payloads are compressed.

            • ApiKeySource — (String)

              The source of the API key for metering requests according to a usage plan.

              HEADER indicates whether to read the API key from the X-API-Key header of a request.

              AUTHORIZER indicates whether to read the API key from the UsageIdentifierKey from a custom authorizer.

            • EndpointConfiguration — (map)

              The endpoint configuration of the REST API.

              • Types — (Array<String>)

                A list of endpoint types for the REST API.

                For an edge-optimized API, the endpoint type is EDGE. For a Regional API, the endpoint type is REGIONAL. For a private API, the endpoint type is PRIVATE.

          • AwsCloudTrailTrail — (map)

            Provides details about a CloudTrail trail.

            • CloudWatchLogsLogGroupArn — (String)

              The ARN of the log group that CloudTrail logs are delivered to.

            • CloudWatchLogsRoleArn — (String)

              The ARN of the role that the CloudWatch Events endpoint assumes when it writes to the log group.

            • HasCustomEventSelectors — (Boolean)

              Indicates whether the trail has custom event selectors.

            • HomeRegion — (String)

              The Region where the trail was created.

            • IncludeGlobalServiceEvents — (Boolean)

              Indicates whether the trail publishes events from global services such as IAM to the log files.

            • IsMultiRegionTrail — (Boolean)

              Indicates whether the trail applies only to the current Region or to all Regions.

            • IsOrganizationTrail — (Boolean)

              Whether the trail is created for all accounts in an organization in Organizations, or only for the current Amazon Web Services account.

            • KmsKeyId — (String)

              The KMS key ID to use to encrypt the logs.

            • LogFileValidationEnabled — (Boolean)

              Indicates whether CloudTrail log file validation is enabled.

            • Name — (String)

              The name of the trail.

            • S3BucketName — (String)

              The name of the S3 bucket where the log files are published.

            • S3KeyPrefix — (String)

              The S3 key prefix. The key prefix is added after the name of the S3 bucket where the log files are published.

            • SnsTopicArn — (String)

              The ARN of the SNS topic that is used for notifications of log file delivery.

            • SnsTopicName — (String)

              The name of the SNS topic that is used for notifications of log file delivery.

            • TrailArn — (String)

              The ARN of the trail.

          • AwsSsmPatchCompliance — (map)

            Provides information about the state of a patch on an instance based on the patch baseline that was used to patch the instance.

            • Patch — (map)

              Information about the status of a patch.

              • ComplianceSummary — (map)

                The compliance status details for the patch.

                • Status — (String)

                  The current patch compliance status. Valid values are as follows:

                  • COMPLIANT

                  • NON_COMPLIANT

                  • UNSPECIFIED_DATA

                • CompliantCriticalCount — (Integer)

                  For the patches that are compliant, the number that have a severity of CRITICAL.

                • CompliantHighCount — (Integer)

                  For the patches that are compliant, the number that have a severity of HIGH.

                • CompliantMediumCount — (Integer)

                  For the patches that are compliant, the number that have a severity of MEDIUM.

                • ExecutionType — (String)

                  The type of execution that was used determine compliance.

                • NonCompliantCriticalCount — (Integer)

                  For the patch items that are noncompliant, the number of items that have a severity of CRITICAL.

                • CompliantInformationalCount — (Integer)

                  For the patches that are compliant, the number that have a severity of INFORMATIONAL.

                • NonCompliantInformationalCount — (Integer)

                  For the patches that are noncompliant, the number that have a severity of INFORMATIONAL.

                • CompliantUnspecifiedCount — (Integer)

                  For the patches that are compliant, the number that have a severity of UNSPECIFIED.

                • NonCompliantLowCount — (Integer)

                  For the patches that are noncompliant, the number that have a severity of LOW.

                • NonCompliantHighCount — (Integer)

                  For the patches that are noncompliant, the number that have a severity of HIGH.

                • CompliantLowCount — (Integer)

                  For the patches that are compliant, the number that have a severity of LOW.

                • ComplianceType — (String)

                  The type of resource for which the compliance was determined. For AwsSsmPatchCompliance, ComplianceType is Patch.

                • PatchBaselineId — (String)

                  The identifier of the patch baseline. The patch baseline lists the patches that are approved for installation.

                • OverallSeverity — (String)

                  The highest severity for the patches. Valid values are as follows:

                  • CRITICAL

                  • HIGH

                  • MEDIUM

                  • LOW

                  • INFORMATIONAL

                  • UNSPECIFIED

                • NonCompliantMediumCount — (Integer)

                  For the patches that are noncompliant, the number that have a severity of MEDIUM.

                • NonCompliantUnspecifiedCount — (Integer)

                  For the patches that are noncompliant, the number that have a severity of UNSPECIFIED.

                • PatchGroup — (String)

                  The identifier of the patch group for which compliance was determined. A patch group uses tags to group EC2 instances that should have the same patch compliance.

          • AwsCertificateManagerCertificate — (map)

            Provides details about an Certificate Manager certificate.

            • CertificateAuthorityArn — (String)

              The ARN of the private certificate authority (CA) that will be used to issue the certificate.

            • CreatedAt — (String)

              Indicates when the certificate was requested.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • DomainName — (String)

              The fully qualified domain name (FQDN), such as www.example.com, that is secured by the certificate.

            • DomainValidationOptions — (Array<map>)

              Contains information about the initial validation of each domain name that occurs as a result of the RequestCertificate request.

              Only provided if the certificate type is AMAZON_ISSUED.

              • DomainName — (String)

                A fully qualified domain name (FQDN) in the certificate.

              • ResourceRecord — (map)

                The CNAME record that is added to the DNS database for domain validation.

                • Name — (String)

                  The name of the resource.

                • Type — (String)

                  The type of resource.

                • Value — (String)

                  The value of the resource.

              • ValidationDomain — (String)

                The domain name that Certificate Manager uses to send domain validation emails.

              • ValidationEmails — (Array<String>)

                A list of email addresses that Certificate Manager uses to send domain validation emails.

              • ValidationMethod — (String)

                The method used to validate the domain name.

              • ValidationStatus — (String)

                The validation status of the domain name.

            • ExtendedKeyUsages — (Array<map>)

              Contains a list of Extended Key Usage X.509 v3 extension objects. Each object specifies a purpose for which the certificate public key can be used and consists of a name and an object identifier (OID).

              • Name — (String)

                The name of an extension value. Indicates the purpose for which the certificate public key can be used.

              • OId — (String)

                An object identifier (OID) for the extension value.

                The format is numbers separated by periods.

            • FailureReason — (String)

              For a failed certificate request, the reason for the failure.

              Valid values: NO_AVAILABLE_CONTACTS | ADDITIONAL_VERIFICATION_REQUIRED | DOMAIN_NOT_ALLOWED | INVALID_PUBLIC_DOMAIN | DOMAIN_VALIDATION_DENIED | CAA_ERROR | PCA_LIMIT_EXCEEDED | PCA_INVALID_ARN | PCA_INVALID_STATE | PCA_REQUEST_FAILED | PCA_NAME_CONSTRAINTS_VALIDATION | PCA_RESOURCE_NOT_FOUND | PCA_INVALID_ARGS | PCA_INVALID_DURATION | PCA_ACCESS_DENIED | SLR_NOT_FOUND | OTHER

            • ImportedAt — (String)

              Indicates when the certificate was imported. Provided if the certificate type is IMPORTED.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • InUseBy — (Array<String>)

              The list of ARNs for the Amazon Web Services resources that use the certificate.

            • IssuedAt — (String)

              Indicates when the certificate was issued. Provided if the certificate type is AMAZON_ISSUED.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • Issuer — (String)

              The name of the certificate authority that issued and signed the certificate.

            • KeyAlgorithm — (String)

              The algorithm that was used to generate the public-private key pair.

              Valid values: RSA_2048 | RSA_1024 | RSA_4096 | EC_prime256v1 | EC_secp384r1 | EC_secp521r1

            • KeyUsages — (Array<map>)

              A list of key usage X.509 v3 extension objects.

              • Name — (String)

                The key usage extension name.

            • NotAfter — (String)

              The time after which the certificate becomes invalid.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • NotBefore — (String)

              The time before which the certificate is not valid.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • Options — (map)

              Provides a value that specifies whether to add the certificate to a transparency log.

              • CertificateTransparencyLoggingPreference — (String)

                Whether to add the certificate to a transparency log.

                Valid values: DISABLED | ENABLED

            • RenewalEligibility — (String)

              Whether the certificate is eligible for renewal.

              Valid values: ELIGIBLE | INELIGIBLE

            • RenewalSummary — (map)

              Information about the status of the Certificate Manager managed renewal for the certificate. Provided only when the certificate type is AMAZON_ISSUED.

              • DomainValidationOptions — (Array<map>)

                Information about the validation of each domain name in the certificate, as it pertains to Certificate Manager managed renewal. Provided only when the certificate type is AMAZON_ISSUED.

                • DomainName — (String)

                  A fully qualified domain name (FQDN) in the certificate.

                • ResourceRecord — (map)

                  The CNAME record that is added to the DNS database for domain validation.

                  • Name — (String)

                    The name of the resource.

                  • Type — (String)

                    The type of resource.

                  • Value — (String)

                    The value of the resource.

                • ValidationDomain — (String)

                  The domain name that Certificate Manager uses to send domain validation emails.

                • ValidationEmails — (Array<String>)

                  A list of email addresses that Certificate Manager uses to send domain validation emails.

                • ValidationMethod — (String)

                  The method used to validate the domain name.

                • ValidationStatus — (String)

                  The validation status of the domain name.

              • RenewalStatus — (String)

                The status of the Certificate Manager managed renewal of the certificate.

                Valid values: PENDING_AUTO_RENEWAL | PENDING_VALIDATION | SUCCESS | FAILED

              • RenewalStatusReason — (String)

                The reason that a renewal request was unsuccessful. This attribute is used only when RenewalStatus is FAILED.

                Valid values: NO_AVAILABLE_CONTACTS | ADDITIONAL_VERIFICATION_REQUIRED | DOMAIN_NOT_ALLOWED | INVALID_PUBLIC_DOMAIN | DOMAIN_VALIDATION_DENIED | CAA_ERROR | PCA_LIMIT_EXCEEDED | PCA_INVALID_ARN | PCA_INVALID_STATE | PCA_REQUEST_FAILED | PCA_NAME_CONSTRAINTS_VALIDATION | PCA_RESOURCE_NOT_FOUND | PCA_INVALID_ARGS | PCA_INVALID_DURATION | PCA_ACCESS_DENIED | SLR_NOT_FOUND | OTHER

              • UpdatedAt — (String)

                Indicates when the renewal summary was last updated.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • Serial — (String)

              The serial number of the certificate.

            • SignatureAlgorithm — (String)

              The algorithm that was used to sign the certificate.

            • Status — (String)

              The status of the certificate.

              Valid values: PENDING_VALIDATION | ISSUED | INACTIVE | EXPIRED | VALIDATION_TIMED_OUT | REVOKED | FAILED

            • Subject — (String)

              The name of the entity that is associated with the public key contained in the certificate.

            • SubjectAlternativeNames — (Array<String>)

              One or more domain names (subject alternative names) included in the certificate. This list contains the domain names that are bound to the public key that is contained in the certificate.

              The subject alternative names include the canonical domain name (CN) of the certificate and additional domain names that can be used to connect to the website.

            • Type — (String)

              The source of the certificate. For certificates that Certificate Manager provides, Type is AMAZON_ISSUED. For certificates that are imported with ImportCertificate, Type is IMPORTED.

              Valid values: IMPORTED | AMAZON_ISSUED | PRIVATE

          • AwsRedshiftCluster — (map)

            Contains details about an Amazon Redshift cluster.

            • AllowVersionUpgrade — (Boolean)

              Indicates whether major version upgrades are applied automatically to the cluster during the maintenance window.

            • AutomatedSnapshotRetentionPeriod — (Integer)

              The number of days that automatic cluster snapshots are retained.

            • AvailabilityZone — (String)

              The name of the Availability Zone in which the cluster is located.

            • ClusterAvailabilityStatus — (String)

              The availability status of the cluster for queries. Possible values are the following:

              • Available - The cluster is available for queries.

              • Unavailable - The cluster is not available for queries.

              • Maintenance - The cluster is intermittently available for queries due to maintenance activities.

              • Modifying -The cluster is intermittently available for queries due to changes that modify the cluster.

              • Failed - The cluster failed and is not available for queries.

            • ClusterCreateTime — (String)

              Indicates when the cluster was created.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • ClusterIdentifier — (String)

              The unique identifier of the cluster.

            • ClusterNodes — (Array<map>)

              The nodes in the cluster.

              • NodeRole — (String)

                The role of the node. A node might be a leader node or a compute node.

              • PrivateIpAddress — (String)

                The private IP address of the node.

              • PublicIpAddress — (String)

                The public IP address of the node.

            • ClusterParameterGroups — (Array<map>)

              The list of cluster parameter groups that are associated with this cluster.

              • ClusterParameterStatusList — (Array<map>)

                The list of parameter statuses.

                • ParameterName — (String)

                  The name of the parameter.

                • ParameterApplyStatus — (String)

                  The status of the parameter. Indicates whether the parameter is in sync with the database, waiting for a cluster reboot, or encountered an error when it was applied.

                  Valid values: in-sync | pending-reboot | applying | invalid-parameter | apply-deferred | apply-error | unknown-error

                • ParameterApplyErrorDescription — (String)

                  The error that prevented the parameter from being applied to the database.

              • ParameterApplyStatus — (String)

                The status of updates to the parameters.

              • ParameterGroupName — (String)

                The name of the parameter group.

            • ClusterPublicKey — (String)

              The public key for the cluster.

            • ClusterRevisionNumber — (String)

              The specific revision number of the database in the cluster.

            • ClusterSecurityGroups — (Array<map>)

              A list of cluster security groups that are associated with the cluster.

              • ClusterSecurityGroupName — (String)

                The name of the cluster security group.

              • Status — (String)

                The status of the cluster security group.

            • ClusterSnapshotCopyStatus — (map)

              Information about the destination Region and retention period for the cross-Region snapshot copy.

              • DestinationRegion — (String)

                The destination Region that snapshots are automatically copied to when cross-Region snapshot copy is enabled.

              • ManualSnapshotRetentionPeriod — (Integer)

                The number of days that manual snapshots are retained in the destination Region after they are copied from a source Region.

                If the value is -1, then the manual snapshot is retained indefinitely.

                Valid values: Either -1 or an integer between 1 and 3,653

              • RetentionPeriod — (Integer)

                The number of days to retain automated snapshots in the destination Region after they are copied from a source Region.

              • SnapshotCopyGrantName — (String)

                The name of the snapshot copy grant.

            • ClusterStatus — (String)

              The current status of the cluster.

              Valid values: available | available, prep-for-resize | available, resize-cleanup | cancelling-resize | creating | deleting | final-snapshot | hardware-failure | incompatible-hsm | incompatible-network | incompatible-parameters | incompatible-restore | modifying | paused | rebooting | renaming | resizing | rotating-keys | storage-full | updating-hsm

            • ClusterSubnetGroupName — (String)

              The name of the subnet group that is associated with the cluster. This parameter is valid only when the cluster is in a VPC.

            • ClusterVersion — (String)

              The version ID of the Amazon Redshift engine that runs on the cluster.

            • DBName — (String)

              The name of the initial database that was created when the cluster was created.

              The same name is returned for the life of the cluster.

              If an initial database is not specified, a database named devdev is created by default.

            • DeferredMaintenanceWindows — (Array<map>)

              List of time windows during which maintenance was deferred.

              • DeferMaintenanceEndTime — (String)

                The end of the time window for which maintenance was deferred.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • DeferMaintenanceIdentifier — (String)

                The identifier of the maintenance window.

              • DeferMaintenanceStartTime — (String)

                The start of the time window for which maintenance was deferred.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • ElasticIpStatus — (map)

              Information about the status of the Elastic IP (EIP) address.

              • ElasticIp — (String)

                The elastic IP address for the cluster.

              • Status — (String)

                The status of the elastic IP address.

            • ElasticResizeNumberOfNodeOptions — (String)

              The number of nodes that you can use the elastic resize method to resize the cluster to.

            • Encrypted — (Boolean)

              Indicates whether the data in the cluster is encrypted at rest.

            • Endpoint — (map)

              The connection endpoint.

              • Address — (String)

                The DNS address of the cluster.

              • Port — (Integer)

                The port that the database engine listens on.

            • EnhancedVpcRouting — (Boolean)

              Indicates whether to create the cluster with enhanced VPC routing enabled.

            • ExpectedNextSnapshotScheduleTime — (String)

              Indicates when the next snapshot is expected to be taken. The cluster must have a valid snapshot schedule and have backups enabled.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • ExpectedNextSnapshotScheduleTimeStatus — (String)

              The status of the next expected snapshot.

              Valid values: OnTrack | Pending

            • HsmStatus — (map)

              Information about whether the Amazon Redshift cluster finished applying any changes to hardware security module (HSM) settings that were specified in a modify cluster command.

              • HsmClientCertificateIdentifier — (String)

                The name of the HSM client certificate that the Amazon Redshift cluster uses to retrieve the data encryption keys that are stored in an HSM.

              • HsmConfigurationIdentifier — (String)

                The name of the HSM configuration that contains the information that the Amazon Redshift cluster can use to retrieve and store keys in an HSM.

              • Status — (String)

                Indicates whether the Amazon Redshift cluster has finished applying any HSM settings changes specified in a modify cluster command.

                Type: String

                Valid values: active | applying

            • IamRoles — (Array<map>)

              A list of IAM roles that the cluster can use to access other Amazon Web Services services.

              • ApplyStatus — (String)

                The status of the IAM role's association with the cluster.

                Valid values: in-sync | adding | removing

              • IamRoleArn — (String)

                The ARN of the IAM role.

            • KmsKeyId — (String)

              The identifier of the KMS encryption key that is used to encrypt data in the cluster.

            • MaintenanceTrackName — (String)

              The name of the maintenance track for the cluster.

            • ManualSnapshotRetentionPeriod — (Integer)

              The default number of days to retain a manual snapshot.

              If the value is -1, the snapshot is retained indefinitely.

              This setting doesn't change the retention period of existing snapshots.

              Valid values: Either -1 or an integer between 1 and 3,653

            • MasterUsername — (String)

              The master user name for the cluster. This name is used to connect to the database that is specified in as the value of DBName.

            • NextMaintenanceWindowStartTime — (String)

              Indicates the start of the next maintenance window.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • NodeType — (String)

              The node type for the nodes in the cluster.

            • NumberOfNodes — (Integer)

              The number of compute nodes in the cluster.

            • PendingActions — (Array<String>)

              A list of cluster operations that are waiting to start.

            • PendingModifiedValues — (map)

              A list of changes to the cluster that are currently pending.

              • AutomatedSnapshotRetentionPeriod — (Integer)

                The pending or in-progress change to the automated snapshot retention period.

              • ClusterIdentifier — (String)

                The pending or in-progress change to the identifier for the cluster.

              • ClusterType — (String)

                The pending or in-progress change to the cluster type.

              • ClusterVersion — (String)

                The pending or in-progress change to the service version.

              • EncryptionType — (String)

                The encryption type for a cluster.

              • EnhancedVpcRouting — (Boolean)

                Indicates whether to create the cluster with enhanced VPC routing enabled.

              • MaintenanceTrackName — (String)

                The name of the maintenance track that the cluster changes to during the next maintenance window.

              • MasterUserPassword — (String)

                The pending or in-progress change to the master user password for the cluster.

              • NodeType — (String)

                The pending or in-progress change to the cluster's node type.

              • NumberOfNodes — (Integer)

                The pending or in-progress change to the number of nodes in the cluster.

              • PubliclyAccessible — (Boolean)

                The pending or in-progress change to whether the cluster can be connected to from the public network.

            • PreferredMaintenanceWindow — (String)

              The weekly time range, in Universal Coordinated Time (UTC), during which system maintenance can occur.

              Format: <day>:HH:MM-<day>:HH:MM

              For the day values, use mon | tue | wed | thu | fri | sat | sun

              For example, sun:09:32-sun:10:02

            • PubliclyAccessible — (Boolean)

              Whether the cluster can be accessed from a public network.

            • ResizeInfo — (map)

              Information about the resize operation for the cluster.

              • AllowCancelResize — (Boolean)

                Indicates whether the resize operation can be canceled.

              • ResizeType — (String)

                The type of resize operation.

                Valid values: ClassicResize

            • RestoreStatus — (map)

              Information about the status of a cluster restore action. Only applies to a cluster that was created by restoring a snapshot.

              • CurrentRestoreRateInMegaBytesPerSecond — (Float)

                The number of megabytes per second being transferred from the backup storage. Returns the average rate for a completed backup.

                This field is only updated when you restore to DC2 and DS2 node types.

              • ElapsedTimeInSeconds — (Integer)

                The amount of time an in-progress restore has been running, or the amount of time it took a completed restore to finish.

                This field is only updated when you restore to DC2 and DS2 node types.

              • EstimatedTimeToCompletionInSeconds — (Integer)

                The estimate of the time remaining before the restore is complete. Returns 0 for a completed restore.

                This field is only updated when you restore to DC2 and DS2 node types.

              • ProgressInMegaBytes — (Integer)

                The number of megabytes that were transferred from snapshot storage.

                This field is only updated when you restore to DC2 and DS2 node types.

              • SnapshotSizeInMegaBytes — (Integer)

                The size of the set of snapshot data that was used to restore the cluster.

                This field is only updated when you restore to DC2 and DS2 node types.

              • Status — (String)

                The status of the restore action.

                Valid values: starting | restoring | completed | failed

            • SnapshotScheduleIdentifier — (String)

              A unique identifier for the cluster snapshot schedule.

            • SnapshotScheduleState — (String)

              The current state of the cluster snapshot schedule.

              Valid values: MODIFYING | ACTIVE | FAILED

            • VpcId — (String)

              The identifier of the VPC that the cluster is in, if the cluster is in a VPC.

            • VpcSecurityGroups — (Array<map>)

              The list of VPC security groups that the cluster belongs to, if the cluster is in a VPC.

              • Status — (String)

                The status of the VPC security group.

              • VpcSecurityGroupId — (String)

                The identifier of the VPC security group.

            • LoggingStatus — (map)

              Information about the logging status of the cluster.

              • BucketName — (String)

                The name of the S3 bucket where the log files are stored.

              • LastFailureMessage — (String)

                The message indicating that the logs failed to be delivered.

              • LastFailureTime — (String)

                The last time when logs failed to be delivered.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • LastSuccessfulDeliveryTime — (String)

                The last time that logs were delivered successfully.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • LoggingEnabled — (Boolean)

                Indicates whether logging is enabled.

              • S3KeyPrefix — (String)

                Provides the prefix applied to the log file names.

          • AwsElbLoadBalancer — (map)

            Contains details about a Classic Load Balancer.

            • AvailabilityZones — (Array<String>)

              The list of Availability Zones for the load balancer.

            • BackendServerDescriptions — (Array<map>)

              Information about the configuration of the EC2 instances.

              • InstancePort — (Integer)

                The port on which the EC2 instance is listening.

              • PolicyNames — (Array<String>)

                The names of the policies that are enabled for the EC2 instance.

            • CanonicalHostedZoneName — (String)

              The name of the Amazon Route 53 hosted zone for the load balancer.

            • CanonicalHostedZoneNameID — (String)

              The ID of the Amazon Route 53 hosted zone for the load balancer.

            • CreatedTime — (String)

              Indicates when the load balancer was created.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • DnsName — (String)

              The DNS name of the load balancer.

            • HealthCheck — (map)

              Information about the health checks that are conducted on the load balancer.

              • HealthyThreshold — (Integer)

                The number of consecutive health check successes required before the instance is moved to the Healthy state.

              • Interval — (Integer)

                The approximate interval, in seconds, between health checks of an individual instance.

              • Target — (String)

                The instance that is being checked. The target specifies the protocol and port. The available protocols are TCP, SSL, HTTP, and HTTPS. The range of valid ports is 1 through 65535.

                For the HTTP and HTTPS protocols, the target also specifies the ping path.

                For the TCP protocol, the target is specified as TCP: <port> .

                For the SSL protocol, the target is specified as SSL.<port> .

                For the HTTP and HTTPS protocols, the target is specified as <protocol>:<port>/<path to ping> .

              • Timeout — (Integer)

                The amount of time, in seconds, during which no response means a failed health check.

              • UnhealthyThreshold — (Integer)

                The number of consecutive health check failures that must occur before the instance is moved to the Unhealthy state.

            • Instances — (Array<map>)

              List of EC2 instances for the load balancer.

              • InstanceId — (String)

                The instance identifier.

            • ListenerDescriptions — (Array<map>)

              The policies that are enabled for the load balancer listeners.

              • Listener — (map)

                Information about the listener.

                • InstancePort — (Integer)

                  The port on which the instance is listening.

                • InstanceProtocol — (String)

                  The protocol to use to route traffic to instances.

                  Valid values: HTTP | HTTPS | TCP | SSL

                • LoadBalancerPort — (Integer)

                  The port on which the load balancer is listening.

                  On EC2-VPC, you can specify any port from the range 1-65535.

                  On EC2-Classic, you can specify any port from the following list: 25, 80, 443, 465, 587, 1024-65535.

                • Protocol — (String)

                  The load balancer transport protocol to use for routing.

                  Valid values: HTTP | HTTPS | TCP | SSL

                • SslCertificateId — (String)

                  The ARN of the server certificate.

              • PolicyNames — (Array<String>)

                The policies enabled for the listener.

            • LoadBalancerAttributes — (map)

              The attributes for a load balancer.

              • AccessLog — (map)

                Information about the access log configuration for the load balancer.

                If the access log is enabled, the load balancer captures detailed information about all requests. It delivers the information to a specified S3 bucket.

                • EmitInterval — (Integer)

                  The interval in minutes for publishing the access logs.

                  You can publish access logs either every 5 minutes or every 60 minutes.

                • Enabled — (Boolean)

                  Indicates whether access logs are enabled for the load balancer.

                • S3BucketName — (String)

                  The name of the S3 bucket where the access logs are stored.

                • S3BucketPrefix — (String)

                  The logical hierarchy that was created for the S3 bucket.

                  If a prefix is not provided, the log is placed at the root level of the bucket.

              • ConnectionDraining — (map)

                Information about the connection draining configuration for the load balancer.

                If connection draining is enabled, the load balancer allows existing requests to complete before it shifts traffic away from a deregistered or unhealthy instance.

                • Enabled — (Boolean)

                  Indicates whether connection draining is enabled for the load balancer.

                • Timeout — (Integer)

                  The maximum time, in seconds, to keep the existing connections open before deregistering the instances.

              • ConnectionSettings — (map)

                Connection settings for the load balancer.

                If an idle timeout is configured, the load balancer allows connections to remain idle for the specified duration. When a connection is idle, no data is sent over the connection.

                • IdleTimeout — (Integer)

                  The time, in seconds, that the connection can be idle (no data is sent over the connection) before it is closed by the load balancer.

              • CrossZoneLoadBalancing — (map)

                Cross-zone load balancing settings for the load balancer.

                If cross-zone load balancing is enabled, the load balancer routes the request traffic evenly across all instances regardless of the Availability Zones.

                • Enabled — (Boolean)

                  Indicates whether cross-zone load balancing is enabled for the load balancer.

              • AdditionalAttributes — (Array<map>)

                Any additional attributes for a load balancer.

                • Key — (String)

                  The name of the attribute.

                • Value — (String)

                  The value of the attribute.

            • LoadBalancerName — (String)

              The name of the load balancer.

            • Policies — (map)

              The policies for a load balancer.

              • AppCookieStickinessPolicies — (Array<map>)

                The stickiness policies that are created using CreateAppCookieStickinessPolicy.

                • CookieName — (String)

                  The name of the application cookie used for stickiness.

                • PolicyName — (String)

                  The mnemonic name for the policy being created. The name must be unique within the set of policies for the load balancer.

              • LbCookieStickinessPolicies — (Array<map>)

                The stickiness policies that are created using CreateLBCookieStickinessPolicy.

                • CookieExpirationPeriod — (Integer)

                  The amount of time, in seconds, after which the cookie is considered stale. If an expiration period is not specified, the stickiness session lasts for the duration of the browser session.

                • PolicyName — (String)

                  The name of the policy. The name must be unique within the set of policies for the load balancer.

              • OtherPolicies — (Array<String>)

                The policies other than the stickiness policies.

            • Scheme — (String)

              The type of load balancer. Only provided if the load balancer is in a VPC.

              If Scheme is internet-facing, the load balancer has a public DNS name that resolves to a public IP address.

              If Scheme is internal, the load balancer has a public DNS name that resolves to a private IP address.

            • SecurityGroups — (Array<String>)

              The security groups for the load balancer. Only provided if the load balancer is in a VPC.

            • SourceSecurityGroup — (map)

              Information about the security group for the load balancer. This is the security group that is used for inbound rules.

              • GroupName — (String)

                The name of the security group.

              • OwnerAlias — (String)

                The owner of the security group.

            • Subnets — (Array<String>)

              The list of subnet identifiers for the load balancer.

            • VpcId — (String)

              The identifier of the VPC for the load balancer.

          • AwsIamGroup — (map)

            Contains details about an IAM group.

            • AttachedManagedPolicies — (Array<map>)

              A list of the managed policies that are attached to the IAM group.

              • PolicyName — (String)

                The name of the policy.

              • PolicyArn — (String)

                The ARN of the policy.

            • CreateDate — (String)

              Indicates when the IAM group was created.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • GroupId — (String)

              The identifier of the IAM group.

            • GroupName — (String)

              The name of the IAM group.

            • GroupPolicyList — (Array<map>)

              The list of inline policies that are embedded in the group.

              • PolicyName — (String)

                The name of the policy.

            • Path — (String)

              The path to the group.

          • AwsIamRole — (map)

            Details about an IAM role.

            • AssumeRolePolicyDocument — (String)

              The trust policy that grants permission to assume the role.

            • AttachedManagedPolicies — (Array<map>)

              The list of the managed policies that are attached to the role.

              • PolicyName — (String)

                The name of the policy.

              • PolicyArn — (String)

                The ARN of the policy.

            • CreateDate — (String)

              Indicates when the role was created.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • InstanceProfileList — (Array<map>)

              The list of instance profiles that contain this role.

              • Arn — (String)

                The ARN of the instance profile.

              • CreateDate — (String)

                Indicates when the instance profile was created.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • InstanceProfileId — (String)

                The identifier of the instance profile.

              • InstanceProfileName — (String)

                The name of the instance profile.

              • Path — (String)

                The path to the instance profile.

              • Roles — (Array<map>)

                The roles associated with the instance profile.

                • Arn — (String)

                  The ARN of the role.

                • AssumeRolePolicyDocument — (String)

                  The policy that grants an entity permission to assume the role.

                • CreateDate — (String)

                  Indicates when the role was created.

                  Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

                • Path — (String)

                  The path to the role.

                • RoleId — (String)

                  The identifier of the role.

                • RoleName — (String)

                  The name of the role.

            • PermissionsBoundary — (map)

              Information about the policy used to set the permissions boundary for an IAM principal.

              • PermissionsBoundaryArn — (String)

                The ARN of the policy used to set the permissions boundary.

              • PermissionsBoundaryType — (String)

                The usage type for the permissions boundary.

            • RoleId — (String)

              The stable and unique string identifying the role.

            • RoleName — (String)

              The friendly name that identifies the role.

            • RolePolicyList — (Array<map>)

              The list of inline policies that are embedded in the role.

              • PolicyName — (String)

                The name of the policy.

            • MaxSessionDuration — (Integer)

              The maximum session duration (in seconds) that you want to set for the specified role.

            • Path — (String)

              The path to the role.

          • AwsKmsKey — (map)

            Details about an KMS key.

            • AWSAccountId — (String)

              The twelve-digit account ID of the Amazon Web Services account that owns the KMS key.

            • CreationDate — (Float)

              Indicates when the KMS key was created.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • KeyId — (String)

              The globally unique identifier for the KMS key.

            • KeyManager — (String)

              The manager of the KMS key. KMS keys in your Amazon Web Services account are either customer managed or Amazon Web Services managed.

            • KeyState — (String)

              The state of the KMS key. Valid values are as follows:

              • Disabled

              • Enabled

              • PendingDeletion

              • PendingImport

              • Unavailable

            • Origin — (String)

              The source of the KMS key material.

              When this value is AWS_KMS, KMS created the key material.

              When this value is EXTERNAL, the key material was imported from your existing key management infrastructure or the KMS key lacks key material.

              When this value is AWS_CLOUDHSM, the key material was created in the CloudHSM cluster associated with a custom key store.

            • Description — (String)

              A description of the KMS key.

            • KeyRotationStatus — (Boolean)

              Whether the key has key rotation enabled.

          • AwsLambdaFunction — (map)

            Details about a Lambda function.

            • Code — (map)

              An AwsLambdaFunctionCode object.

              • S3Bucket — (String)

                An Amazon S3 bucket in the same Amazon Web Services Region as your function. The bucket can be in a different Amazon Web Services account.

              • S3Key — (String)

                The Amazon S3 key of the deployment package.

              • S3ObjectVersion — (String)

                For versioned objects, the version of the deployment package object to use.

              • ZipFile — (String)

                The base64-encoded contents of the deployment package. Amazon Web Services SDK and Amazon Web Services CLI clients handle the encoding for you.

            • CodeSha256 — (String)

              The SHA256 hash of the function's deployment package.

            • DeadLetterConfig — (map)

              The function's dead letter queue.

              • TargetArn — (String)

                The ARN of an SQS queue or SNS topic.

            • Environment — (map)

              The function's environment variables.

              • Variables — (map<String>)

                Environment variable key-value pairs.

              • Error — (map)

                An AwsLambdaFunctionEnvironmentError object.

                • ErrorCode — (String)

                  The error code.

                • Message — (String)

                  The error message.

            • FunctionName — (String)

              The name of the function.

            • Handler — (String)

              The function that Lambda calls to begin executing your function.

            • KmsKeyArn — (String)

              The KMS key that is used to encrypt the function's environment variables. This key is only returned if you've configured a customer managed customer managed key.

            • LastModified — (String)

              Indicates when the function was last updated.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • Layers — (Array<map>)

              The function's layers.

              • Arn — (String)

                The ARN of the function layer.

              • CodeSize — (Integer)

                The size of the layer archive in bytes.

            • MasterArn — (String)

              For Lambda@Edge functions, the ARN of the master function.

            • MemorySize — (Integer)

              The memory that is allocated to the function.

            • RevisionId — (String)

              The latest updated revision of the function or alias.

            • Role — (String)

              The function's execution role.

            • Runtime — (String)

              The runtime environment for the Lambda function.

            • Timeout — (Integer)

              The amount of time that Lambda allows a function to run before stopping it.

            • TracingConfig — (map)

              The function's X-Ray tracing configuration.

              • Mode — (String)

                The tracing mode.

            • VpcConfig — (map)

              The function's networking configuration.

              • SecurityGroupIds — (Array<String>)

                A list of VPC security groups IDs.

              • SubnetIds — (Array<String>)

                A list of VPC subnet IDs.

              • VpcId — (String)

                The ID of the VPC.

            • Version — (String)

              The version of the Lambda function.

            • Architectures — (Array<String>)

              The instruction set architecture that the function uses. Valid values are x86_64 or arm64.

            • PackageType — (String)

              The type of deployment package that's used to deploy the function code to Lambda. Set to Image for a container image and Zip for a .zip file archive.

          • AwsLambdaLayerVersion — (map)

            Details for a Lambda layer version.

            • Version — (Integer)

              The version number.

            • CompatibleRuntimes — (Array<String>)

              The layer's compatible runtimes. Maximum number of five items.

              Valid values: nodejs10.x | nodejs12.x | java8 | java11 | python2.7 | python3.6 | python3.7 | python3.8 | dotnetcore1.0 | dotnetcore2.1 | go1.x | ruby2.5 | provided

            • CreatedDate — (String)

              Indicates when the version was created.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

          • AwsRdsDbInstance — (map)

            Details about an Amazon RDS database instance.

            • AssociatedRoles — (Array<map>)

              The IAM roles associated with the DB instance.

              • RoleArn — (String)

                The ARN of the IAM role that is associated with the DB instance.

              • FeatureName — (String)

                The name of the feature associated with the IAM role.

              • Status — (String)

                Describes the state of the association between the IAM role and the DB instance. The Status property returns one of the following values:

                • ACTIVE - The IAM role ARN is associated with the DB instance and can be used to access other Amazon Web Services services on your behalf.

                • PENDING - The IAM role ARN is being associated with the DB instance.

                • INVALID - The IAM role ARN is associated with the DB instance. But the DB instance is unable to assume the IAM role in order to access other Amazon Web Services services on your behalf.

            • CACertificateIdentifier — (String)

              The identifier of the CA certificate for this DB instance.

            • DBClusterIdentifier — (String)

              If the DB instance is a member of a DB cluster, contains the name of the DB cluster that the DB instance is a member of.

            • DBInstanceIdentifier — (String)

              Contains a user-supplied database identifier. This identifier is the unique key that identifies a DB instance.

            • DBInstanceClass — (String)

              Contains the name of the compute and memory capacity class of the DB instance.

            • DbInstancePort — (Integer)

              Specifies the port that the DB instance listens on. If the DB instance is part of a DB cluster, this can be a different port than the DB cluster port.

            • DbiResourceId — (String)

              The Amazon Web Services Region-unique, immutable identifier for the DB instance. This identifier is found in CloudTrail log entries whenever the KMS key for the DB instance is accessed.

            • DBName — (String)

              The meaning of this parameter differs according to the database engine you use.

              MySQL, MariaDB, SQL Server, PostgreSQL

              Contains the name of the initial database of this instance that was provided at create time, if one was specified when the DB instance was created. This same name is returned for the life of the DB instance.

              Oracle

              Contains the Oracle System ID (SID) of the created DB instance. Not shown when the returned parameters do not apply to an Oracle DB instance.

            • DeletionProtection — (Boolean)

              Indicates whether the DB instance has deletion protection enabled.

              When deletion protection is enabled, the database cannot be deleted.

            • Endpoint — (map)

              Specifies the connection endpoint.

              • Address — (String)

                Specifies the DNS address of the DB instance.

              • Port — (Integer)

                Specifies the port that the database engine is listening on.

              • HostedZoneId — (String)

                Specifies the ID that Amazon Route 53 assigns when you create a hosted zone.

            • Engine — (String)

              Provides the name of the database engine to use for this DB instance.

            • EngineVersion — (String)

              Indicates the database engine version.

            • IAMDatabaseAuthenticationEnabled — (Boolean)

              True if mapping of IAM accounts to database accounts is enabled, and otherwise false.

              IAM database authentication can be enabled for the following database engines.

              • For MySQL 5.6, minor version 5.6.34 or higher

              • For MySQL 5.7, minor version 5.7.16 or higher

              • Aurora 5.6 or higher

            • InstanceCreateTime — (String)

              Indicates when the DB instance was created.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • KmsKeyId — (String)

              If StorageEncrypted is true, the KMS key identifier for the encrypted DB instance.

            • PubliclyAccessible — (Boolean)

              Specifies the accessibility options for the DB instance.

              A value of true specifies an Internet-facing instance with a publicly resolvable DNS name, which resolves to a public IP address.

              A value of false specifies an internal instance with a DNS name that resolves to a private IP address.

            • StorageEncrypted — (Boolean)

              Specifies whether the DB instance is encrypted.

            • TdeCredentialArn — (String)

              The ARN from the key store with which the instance is associated for TDE encryption.

            • VpcSecurityGroups — (Array<map>)

              A list of VPC security groups that the DB instance belongs to.

              • VpcSecurityGroupId — (String)

                The name of the VPC security group.

              • Status — (String)

                The status of the VPC security group.

            • MultiAz — (Boolean)

              Whether the DB instance is a multiple Availability Zone deployment.

            • EnhancedMonitoringResourceArn — (String)

              The ARN of the CloudWatch Logs log stream that receives the enhanced monitoring metrics data for the DB instance.

            • DbInstanceStatus — (String)

              The current status of the DB instance.

            • MasterUsername — (String)

              The master user name of the DB instance.

            • AllocatedStorage — (Integer)

              The amount of storage (in gigabytes) to initially allocate for the DB instance.

            • PreferredBackupWindow — (String)

              The range of time each day when automated backups are created, if automated backups are enabled.

              Uses the format HH:MM-HH:MM. For example, 04:52-05:22.

            • BackupRetentionPeriod — (Integer)

              The number of days for which to retain automated backups.

            • DbSecurityGroups — (Array<String>)

              A list of the DB security groups to assign to the DB instance.

            • DbParameterGroups — (Array<map>)

              A list of the DB parameter groups to assign to the DB instance.

              • DbParameterGroupName — (String)

                The name of the parameter group.

              • ParameterApplyStatus — (String)

                The status of parameter updates.

            • AvailabilityZone — (String)

              The Availability Zone where the DB instance will be created.

            • DbSubnetGroup — (map)

              Information about the subnet group that is associated with the DB instance.

              • DbSubnetGroupName — (String)

                The name of the subnet group.

              • DbSubnetGroupDescription — (String)

                The description of the subnet group.

              • VpcId — (String)

                The VPC ID of the subnet group.

              • SubnetGroupStatus — (String)

                The status of the subnet group.

              • Subnets — (Array<map>)

                A list of subnets in the subnet group.

                • SubnetIdentifier — (String)

                  The identifier of a subnet in the subnet group.

                • SubnetAvailabilityZone — (map)

                  Information about the Availability Zone for a subnet in the subnet group.

                  • Name — (String)

                    The name of the Availability Zone for a subnet in the subnet group.

                • SubnetStatus — (String)

                  The status of a subnet in the subnet group.

              • DbSubnetGroupArn — (String)

                The ARN of the subnet group.

            • PreferredMaintenanceWindow — (String)

              The weekly time range during which system maintenance can occur, in Universal Coordinated Time (UTC).

              Uses the format <day>:HH:MM-<day>:HH:MM.

              For the day values, use mon|tue|wed|thu|fri|sat|sun.

              For example, sun:09:32-sun:10:02.

            • PendingModifiedValues — (map)

              Changes to the DB instance that are currently pending.

              • DbInstanceClass — (String)

                The new DB instance class for the DB instance.

              • AllocatedStorage — (Integer)

                The new value of the allocated storage for the DB instance.

              • MasterUserPassword — (String)

                The new master user password for the DB instance.

              • Port — (Integer)

                The new port for the DB instance.

              • BackupRetentionPeriod — (Integer)

                The new backup retention period for the DB instance.

              • MultiAZ — (Boolean)

                Indicates that a single Availability Zone DB instance is changing to a multiple Availability Zone deployment.

              • EngineVersion — (String)

                The new engine version for the DB instance.

              • LicenseModel — (String)

                The new license model value for the DB instance.

              • Iops — (Integer)

                The new provisioned IOPS value for the DB instance.

              • DbInstanceIdentifier — (String)

                The new DB instance identifier for the DB instance.

              • StorageType — (String)

                The new storage type for the DB instance.

              • CaCertificateIdentifier — (String)

                The new CA certificate identifier for the DB instance.

              • DbSubnetGroupName — (String)

                The name of the new subnet group for the DB instance.

              • PendingCloudWatchLogsExports — (map)

                A list of log types that are being enabled or disabled.

                • LogTypesToEnable — (Array<String>)

                  A list of log types that are being enabled.

                • LogTypesToDisable — (Array<String>)

                  A list of log types that are being disabled.

              • ProcessorFeatures — (Array<map>)

                Processor features that are being updated.

                • Name — (String)

                  The name of the processor feature. Valid values are coreCount or threadsPerCore.

                • Value — (String)

                  The value of the processor feature.

            • LatestRestorableTime — (String)

              Specifies the latest time to which a database can be restored with point-in-time restore.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • AutoMinorVersionUpgrade — (Boolean)

              Indicates whether minor version patches are applied automatically.

            • ReadReplicaSourceDBInstanceIdentifier — (String)

              If this DB instance is a read replica, contains the identifier of the source DB instance.

            • ReadReplicaDBInstanceIdentifiers — (Array<String>)

              List of identifiers of the read replicas associated with this DB instance.

            • ReadReplicaDBClusterIdentifiers — (Array<String>)

              List of identifiers of Aurora DB clusters to which the RDS DB instance is replicated as a read replica.

            • LicenseModel — (String)

              License model information for this DB instance.

            • Iops — (Integer)

              Specifies the provisioned IOPS (I/O operations per second) for this DB instance.

            • OptionGroupMemberships — (Array<map>)

              The list of option group memberships for this DB instance.

              • OptionGroupName — (String)

                The name of the option group.

              • Status — (String)

                The status of the option group membership.

            • CharacterSetName — (String)

              The name of the character set that this DB instance is associated with.

            • SecondaryAvailabilityZone — (String)

              For a DB instance with multi-Availability Zone support, the name of the secondary Availability Zone.

            • StatusInfos — (Array<map>)

              The status of a read replica. If the instance isn't a read replica, this is empty.

              • StatusType — (String)

                The type of status. For a read replica, the status type is read replication.

              • Normal — (Boolean)

                Whether the read replica instance is operating normally.

              • Status — (String)

                The status of the read replica instance.

              • Message — (String)

                If the read replica is currently in an error state, provides the error details.

            • StorageType — (String)

              The storage type for the DB instance.

            • DomainMemberships — (Array<map>)

              The Active Directory domain membership records associated with the DB instance.

              • Domain — (String)

                The identifier of the Active Directory domain.

              • Status — (String)

                The status of the Active Directory Domain membership for the DB instance.

              • Fqdn — (String)

                The fully qualified domain name of the Active Directory domain.

              • IamRoleName — (String)

                The name of the IAM role to use when making API calls to the Directory Service.

            • CopyTagsToSnapshot — (Boolean)

              Whether to copy resource tags to snapshots of the DB instance.

            • MonitoringInterval — (Integer)

              The interval, in seconds, between points when enhanced monitoring metrics are collected for the DB instance.

            • MonitoringRoleArn — (String)

              The ARN for the IAM role that permits Amazon RDS to send enhanced monitoring metrics to CloudWatch Logs.

            • PromotionTier — (Integer)

              The order in which to promote an Aurora replica to the primary instance after a failure of the existing primary instance.

            • Timezone — (String)

              The time zone of the DB instance.

            • PerformanceInsightsEnabled — (Boolean)

              Indicates whether Performance Insights is enabled for the DB instance.

            • PerformanceInsightsKmsKeyId — (String)

              The identifier of the KMS key used to encrypt the Performance Insights data.

            • PerformanceInsightsRetentionPeriod — (Integer)

              The number of days to retain Performance Insights data.

            • EnabledCloudWatchLogsExports — (Array<String>)

              A list of log types that this DB instance is configured to export to CloudWatch Logs.

            • ProcessorFeatures — (Array<map>)

              The number of CPU cores and the number of threads per core for the DB instance class of the DB instance.

              • Name — (String)

                The name of the processor feature. Valid values are coreCount or threadsPerCore.

              • Value — (String)

                The value of the processor feature.

            • ListenerEndpoint — (map)

              Specifies the connection endpoint.

              • Address — (String)

                Specifies the DNS address of the DB instance.

              • Port — (Integer)

                Specifies the port that the database engine is listening on.

              • HostedZoneId — (String)

                Specifies the ID that Amazon Route 53 assigns when you create a hosted zone.

            • MaxAllocatedStorage — (Integer)

              The upper limit to which Amazon RDS can automatically scale the storage of the DB instance.

          • AwsSnsTopic — (map)

            Details about an SNS topic.

            • KmsMasterKeyId — (String)

              The ID of an Amazon Web Services managed key for Amazon SNS or a customer managed key.

            • Subscription — (Array<map>)

              Subscription is an embedded property that describes the subscription endpoints of an Amazon SNS topic.

              • Endpoint — (String)

                The subscription's endpoint (format depends on the protocol).

              • Protocol — (String)

                The subscription's protocol.

            • TopicName — (String)

              The name of the Amazon SNS topic.

            • Owner — (String)

              The subscription's owner.

            • SqsSuccessFeedbackRoleArn — (String)

              Indicates successful message delivery status for an Amazon SNS topic that is subscribed to an Amazon SQS endpoint.

            • SqsFailureFeedbackRoleArn — (String)

              Indicates failed message delivery status for an Amazon SNS topic that is subscribed to an Amazon SQS endpoint.

            • ApplicationSuccessFeedbackRoleArn — (String)

              Indicates failed message delivery status for an Amazon SNS topic that is subscribed to a platform application endpoint.

            • FirehoseSuccessFeedbackRoleArn — (String)

              Indicates successful message delivery status for an Amazon SNS topic that is subscribed to an Amazon Kinesis Data Firehose endpoint.

            • FirehoseFailureFeedbackRoleArn — (String)

              Indicates failed message delivery status for an Amazon SNS topic that is subscribed to an Amazon Kinesis Data Firehose endpoint.

            • HttpSuccessFeedbackRoleArn — (String)

              Indicates successful message delivery status for an Amazon SNS topic that is subscribed to an HTTP endpoint.

            • HttpFailureFeedbackRoleArn — (String)

              Indicates failed message delivery status for an Amazon SNS topic that is subscribed to an HTTP endpoint.

          • AwsSqsQueue — (map)

            Details about an SQS queue.

            • KmsDataKeyReusePeriodSeconds — (Integer)

              The length of time, in seconds, for which Amazon SQS can reuse a data key to encrypt or decrypt messages before calling KMS again.

            • KmsMasterKeyId — (String)

              The ID of an Amazon Web Services managed key for Amazon SQS or a custom KMS key.

            • QueueName — (String)

              The name of the new queue.

            • DeadLetterTargetArn — (String)

              The ARN of the dead-letter queue to which Amazon SQS moves messages after the value of maxReceiveCount is exceeded.

          • AwsWafWebAcl — (map)

            Details for an WAF web ACL.

            • Name — (String)

              A friendly name or description of the web ACL. You can't change the name of a web ACL after you create it.

            • DefaultAction — (String)

              The action to perform if none of the rules contained in the web ACL match.

            • Rules — (Array<map>)

              An array that contains the action for each rule in a web ACL, the priority of the rule, and the ID of the rule.

              • Action — (map)

                Specifies the action that CloudFront or WAF takes when a web request matches the conditions in the rule.

                • Type — (String)

                  Specifies how you want WAF to respond to requests that match the settings in a rule.

                  Valid settings include the following:

                  • ALLOW - WAF allows requests

                  • BLOCK - WAF blocks requests

                  • COUNT - WAF increments a counter of the requests that match all of the conditions in the rule. WAF then continues to inspect the web request based on the remaining rules in the web ACL. You can't specify COUNT for the default action for a web ACL.

              • ExcludedRules — (Array<map>)

                Rules to exclude from a rule group.

                • RuleId — (String)

                  The unique identifier for the rule to exclude from the rule group.

              • OverrideAction — (map)

                Use the OverrideAction to test your RuleGroup.

                Any rule in a RuleGroup can potentially block a request. If you set the OverrideAction to None, the RuleGroup blocks a request if any individual rule in the RuleGroup matches the request and is configured to block that request.

                However, if you first want to test the RuleGroup, set the OverrideAction to Count. The RuleGroup then overrides any block action specified by individual rules contained within the group. Instead of blocking matching requests, those requests are counted.

                ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a web ACL. In this case you do not use ActivatedRule Action. For all other update requests, ActivatedRule Action is used instead of ActivatedRule OverrideAction.

                • Type — (String)

                  COUNT overrides the action specified by the individual rule within a RuleGroup .

                  If set to NONE, the rule's action takes place.

              • Priority — (Integer)

                Specifies the order in which the rules in a web ACL are evaluated. Rules with a lower value for Priority are evaluated before rules with a higher value. The value must be a unique integer. If you add multiple rules to a web ACL, the values do not need to be consecutive.

              • RuleId — (String)

                The identifier for a rule.

              • Type — (String)

                The rule type.

                Valid values: REGULAR | RATE_BASED | GROUP

                The default is REGULAR.

            • WebAclId — (String)

              A unique identifier for a web ACL.

          • AwsRdsDbSnapshot — (map)

            Details about an Amazon RDS database snapshot.

            • DbSnapshotIdentifier — (String)

              The name or ARN of the DB snapshot that is used to restore the DB instance.

            • DbInstanceIdentifier — (String)

              A name for the DB instance.

            • SnapshotCreateTime — (String)

              When the snapshot was taken in Coordinated Universal Time (UTC).

            • Engine — (String)

              The name of the database engine to use for this DB instance. Valid values are as follows:

              • aurora

              • aurora-mysql

              • aurora-postgresql

              • c

              • mariadb

              • mysql

              • oracle-ee

              • oracle-se

              • oracle-se1

              • oracle-se2

              • sqlserver-ee

              • sqlserver-ex

              • sqlserver-se

              • sqlserver-web

            • AllocatedStorage — (Integer)

              The amount of storage (in gigabytes) to be initially allocated for the database instance.

            • Status — (String)

              The status of this DB snapshot.

            • Port — (Integer)

              The port that the database engine was listening on at the time of the snapshot.

            • AvailabilityZone — (String)

              Specifies the name of the Availability Zone in which the DB instance was located at the time of the DB snapshot.

            • VpcId — (String)

              The VPC ID associated with the DB snapshot.

            • InstanceCreateTime — (String)

              Specifies the time in Coordinated Universal Time (UTC) when the DB instance, from which the snapshot was taken, was created.

            • MasterUsername — (String)

              The master user name for the DB snapshot.

            • EngineVersion — (String)

              The version of the database engine.

            • LicenseModel — (String)

              License model information for the restored DB instance.

            • SnapshotType — (String)

              The type of the DB snapshot.

            • Iops — (Integer)

              The provisioned IOPS (I/O operations per second) value of the DB instance at the time of the snapshot.

            • OptionGroupName — (String)

              The option group name for the DB snapshot.

            • PercentProgress — (Integer)

              The percentage of the estimated data that has been transferred.

            • SourceRegion — (String)

              The Amazon Web Services Region that the DB snapshot was created in or copied from.

            • SourceDbSnapshotIdentifier — (String)

              The DB snapshot ARN that the DB snapshot was copied from.

            • StorageType — (String)

              The storage type associated with the DB snapshot. Valid values are as follows:

              • gp2

              • io1

              • standard

            • TdeCredentialArn — (String)

              The ARN from the key store with which to associate the instance for TDE encryption.

            • Encrypted — (Boolean)

              Whether the DB snapshot is encrypted.

            • KmsKeyId — (String)

              If Encrypted is true, the KMS key identifier for the encrypted DB snapshot.

            • Timezone — (String)

              The time zone of the DB snapshot.

            • IamDatabaseAuthenticationEnabled — (Boolean)

              Whether mapping of IAM accounts to database accounts is enabled.

            • ProcessorFeatures — (Array<map>)

              The number of CPU cores and the number of threads per core for the DB instance class of the DB instance.

              • Name — (String)

                The name of the processor feature. Valid values are coreCount or threadsPerCore.

              • Value — (String)

                The value of the processor feature.

            • DbiResourceId — (String)

              The identifier for the source DB instance.

          • AwsRdsDbClusterSnapshot — (map)

            Details about an Amazon RDS database cluster snapshot.

            • AvailabilityZones — (Array<String>)

              A list of Availability Zones where instances in the DB cluster can be created.

            • SnapshotCreateTime — (String)

              Indicates when the snapshot was taken.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • Engine — (String)

              The name of the database engine that you want to use for this DB instance.

            • AllocatedStorage — (Integer)

              Specifies the allocated storage size in gibibytes (GiB).

            • Status — (String)

              The status of this DB cluster snapshot.

            • Port — (Integer)

              The port number on which the DB instances in the DB cluster accept connections.

            • VpcId — (String)

              The VPC ID that is associated with the DB cluster snapshot.

            • ClusterCreateTime — (String)

              Indicates when the DB cluster was created, in Universal Coordinated Time (UTC).

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • MasterUsername — (String)

              The name of the master user for the DB cluster.

            • EngineVersion — (String)

              The version of the database engine to use.

            • LicenseModel — (String)

              The license model information for this DB cluster snapshot.

            • SnapshotType — (String)

              The type of DB cluster snapshot.

            • PercentProgress — (Integer)

              Specifies the percentage of the estimated data that has been transferred.

            • StorageEncrypted — (Boolean)

              Whether the DB cluster is encrypted.

            • KmsKeyId — (String)

              The ARN of the KMS master key that is used to encrypt the database instances in the DB cluster.

            • DbClusterIdentifier — (String)

              The DB cluster identifier.

            • DbClusterSnapshotIdentifier — (String)

              The identifier of the DB cluster snapshot.

            • IamDatabaseAuthenticationEnabled — (Boolean)

              Whether mapping of IAM accounts to database accounts is enabled.

            • DbClusterSnapshotAttributes — (Array<map>)

              Contains the name and values of a manual DB cluster snapshot attribute.

              • AttributeName — (String)

                The name of the manual DB cluster snapshot attribute. The attribute named restore refers to the list of Amazon Web Services accounts that have permission to copy or restore the manual DB cluster snapshot.

              • AttributeValues — (Array<String>)

                The value(s) for the manual DB cluster snapshot attribute. If the AttributeName field is set to restore, then this element returns a list of IDs of the Amazon Web Services accounts that are authorized to copy or restore the manual DB cluster snapshot. If a value of all is in the list, then the manual DB cluster snapshot is public and available for any Amazon Web Services account to copy or restore.

          • AwsRdsDbCluster — (map)

            Details about an Amazon RDS database cluster.

            • AllocatedStorage — (Integer)

              For all database engines except Aurora, specifies the allocated storage size in gibibytes (GiB).

            • AvailabilityZones — (Array<String>)

              A list of Availability Zones (AZs) where instances in the DB cluster can be created.

            • BackupRetentionPeriod — (Integer)

              The number of days for which automated backups are retained.

            • DatabaseName — (String)

              The name of the database.

            • Status — (String)

              The current status of this DB cluster.

            • Endpoint — (String)

              The connection endpoint for the primary instance of the DB cluster.

            • ReaderEndpoint — (String)

              The reader endpoint for the DB cluster.

            • CustomEndpoints — (Array<String>)

              A list of custom endpoints for the DB cluster.

            • MultiAz — (Boolean)

              Whether the DB cluster has instances in multiple Availability Zones.

            • Engine — (String)

              The name of the database engine to use for this DB cluster. Valid values are as follows:

              • aurora

              • aurora-mysql

              • aurora-postgresql

            • EngineVersion — (String)

              The version number of the database engine to use.

            • Port — (Integer)

              The port number on which the DB instances in the DB cluster accept connections.

            • MasterUsername — (String)

              The name of the master user for the DB cluster.

            • PreferredBackupWindow — (String)

              The range of time each day when automated backups are created, if automated backups are enabled.

              Uses the format HH:MM-HH:MM. For example, 04:52-05:22.

            • PreferredMaintenanceWindow — (String)

              The weekly time range during which system maintenance can occur, in Universal Coordinated Time (UTC).

              Uses the format <day>:HH:MM-<day>:HH:MM.

              For the day values, use mon|tue|wed|thu|fri|sat|sun.

              For example, sun:09:32-sun:10:02.

            • ReadReplicaIdentifiers — (Array<String>)

              The identifiers of the read replicas that are associated with this DB cluster.

            • VpcSecurityGroups — (Array<map>)

              A list of VPC security groups that the DB cluster belongs to.

              • VpcSecurityGroupId — (String)

                The name of the VPC security group.

              • Status — (String)

                The status of the VPC security group.

            • HostedZoneId — (String)

              Specifies the identifier that Amazon Route 53 assigns when you create a hosted zone.

            • StorageEncrypted — (Boolean)

              Whether the DB cluster is encrypted.

            • KmsKeyId — (String)

              The ARN of the KMS master key that is used to encrypt the database instances in the DB cluster.

            • DbClusterResourceId — (String)

              The identifier of the DB cluster. The identifier must be unique within each Amazon Web Services Region and is immutable.

            • AssociatedRoles — (Array<map>)

              A list of the IAM roles that are associated with the DB cluster.

              • RoleArn — (String)

                The ARN of the IAM role.

              • Status — (String)

                The status of the association between the IAM role and the DB cluster. Valid values are as follows:

                • ACTIVE

                • INVALID

                • PENDING

            • ClusterCreateTime — (String)

              Indicates when the DB cluster was created, in Universal Coordinated Time (UTC).

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • EnabledCloudWatchLogsExports — (Array<String>)

              A list of log types that this DB cluster is configured to export to CloudWatch Logs.

            • EngineMode — (String)

              The database engine mode of the DB cluster.Valid values are as follows:

              • global

              • multimaster

              • parallelquery

              • provisioned

              • serverless

            • DeletionProtection — (Boolean)

              Whether the DB cluster has deletion protection enabled.

            • HttpEndpointEnabled — (Boolean)

              Whether the HTTP endpoint for an Aurora Serverless DB cluster is enabled.

            • ActivityStreamStatus — (String)

              The status of the database activity stream. Valid values are as follows:

              • started

              • starting

              • stopped

              • stopping

            • CopyTagsToSnapshot — (Boolean)

              Whether tags are copied from the DB cluster to snapshots of the DB cluster.

            • CrossAccountClone — (Boolean)

              Whether the DB cluster is a clone of a DB cluster owned by a different Amazon Web Services account.

            • DomainMemberships — (Array<map>)

              The Active Directory domain membership records that are associated with the DB cluster.

              • Domain — (String)

                The identifier of the Active Directory domain.

              • Status — (String)

                The status of the Active Directory Domain membership for the DB instance.

              • Fqdn — (String)

                The fully qualified domain name of the Active Directory domain.

              • IamRoleName — (String)

                The name of the IAM role to use when making API calls to the Directory Service.

            • DbClusterParameterGroup — (String)

              The name of the DB cluster parameter group for the DB cluster.

            • DbSubnetGroup — (String)

              The subnet group that is associated with the DB cluster, including the name, description, and subnets in the subnet group.

            • DbClusterOptionGroupMemberships — (Array<map>)

              The list of option group memberships for this DB cluster.

              • DbClusterOptionGroupName — (String)

                The name of the DB cluster option group.

              • Status — (String)

                The status of the DB cluster option group.

            • DbClusterIdentifier — (String)

              The DB cluster identifier that the user assigned to the cluster. This identifier is the unique key that identifies a DB cluster.

            • DbClusterMembers — (Array<map>)

              The list of instances that make up the DB cluster.

              • IsClusterWriter — (Boolean)

                Whether the cluster member is the primary instance for the DB cluster.

              • PromotionTier — (Integer)

                Specifies the order in which an Aurora replica is promoted to the primary instance when the existing primary instance fails.

              • DbInstanceIdentifier — (String)

                The instance identifier for this member of the DB cluster.

              • DbClusterParameterGroupStatus — (String)

                The status of the DB cluster parameter group for this member of the DB cluster.

            • IamDatabaseAuthenticationEnabled — (Boolean)

              Whether the mapping of IAM accounts to database accounts is enabled.

            • AutoMinorVersionUpgrade — (Boolean)

              Indicates if minor version upgrades are automatically applied to the cluster.

          • AwsEcsCluster — (map)

            Details about an Amazon ECS cluster.

            • ClusterArn — (String)

              The Amazon Resource Name (ARN) that identifies the cluster.

            • ActiveServicesCount — (Integer)

              The number of services that are running on the cluster in an ACTIVE state. You can view these services with the Amazon ECS ListServices API operation.

            • CapacityProviders — (Array<String>)

              The short name of one or more capacity providers to associate with the cluster.

            • ClusterSettings — (Array<map>)

              The setting to use to create the cluster. Specifically used to configure whether to enable CloudWatch Container Insights for the cluster.

              • Name — (String)

                The name of the setting. The valid value is containerInsights.

              • Value — (String)

                The value of the setting. Valid values are disabled or enabled.

            • Configuration — (map)

              The run command configuration for the cluster.

              • ExecuteCommandConfiguration — (map)

                Contains the run command configuration for the cluster.

                • KmsKeyId — (String)

                  The identifier of the KMS key that is used to encrypt the data between the local client and the container.

                • LogConfiguration — (map)

                  The log configuration for the results of the run command actions. Required if Logging is NONE.

                  • CloudWatchEncryptionEnabled — (Boolean)

                    Whether to enable encryption on the CloudWatch logs.

                  • CloudWatchLogGroupName — (String)

                    The name of the CloudWatch log group to send the logs to.

                  • S3BucketName — (String)

                    The name of the S3 bucket to send logs to.

                  • S3EncryptionEnabled — (Boolean)

                    Whether to encrypt the logs that are sent to the S3 bucket.

                  • S3KeyPrefix — (String)

                    Identifies the folder in the S3 bucket to send the logs to.

                • Logging — (String)

                  The log setting to use for redirecting logs for run command results.

            • DefaultCapacityProviderStrategy — (Array<map>)

              The default capacity provider strategy for the cluster. The default capacity provider strategy is used when services or tasks are run without a specified launch type or capacity provider strategy.

              • Base — (Integer)

                The minimum number of tasks to run on the specified capacity provider.

              • CapacityProvider — (String)

                The name of the capacity provider.

              • Weight — (Integer)

                The relative percentage of the total number of tasks launched that should use the capacity provider.

            • ClusterName — (String)

              A name that you use to identify your cluster.

            • RegisteredContainerInstancesCount — (Integer)

              The number of container instances registered into the cluster. This includes container instances in both ACTIVE and DRAINING status.

            • RunningTasksCount — (Integer)

              The number of tasks in the cluster that are in the RUNNING state.

            • Status — (String)

              The status of the cluster.

          • AwsEcsContainer — (map)

            Provides information about a Docker container that's part of a task.

            • Name — (String)

              The name of the container.

            • Image — (String)

              The image used for the container.

            • MountPoints — (Array<map>)

              The mount points for data volumes in your container.

              • SourceVolume — (String)

                The name of the volume to mount. Must be a volume name referenced in the name parameter of task definition volume.

              • ContainerPath — (String)

                The path on the container to mount the host volume at.

            • Privileged — (Boolean)

              When this parameter is true, the container is given elevated privileges on the host container instance (similar to the root user).

          • AwsEcsTaskDefinition — (map)

            Details about a task definition. A task definition describes the container and volume definitions of an Amazon Elastic Container Service task.

            • ContainerDefinitions — (Array<map>)

              The container definitions that describe the containers that make up the task.

              • Command — (Array<String>)

                The command that is passed to the container.

              • Cpu — (Integer)

                The number of CPU units reserved for the container.

              • DependsOn — (Array<map>)

                The dependencies that are defined for container startup and shutdown.

                • Condition — (String)

                  The dependency condition of the dependent container. Indicates the required status of the dependent container before the current container can start. Valid values are as follows:

                  • COMPLETE

                  • HEALTHY

                  • SUCCESS

                  • START

                • ContainerName — (String)

                  The name of the dependent container.

              • DisableNetworking — (Boolean)

                Whether to disable networking within the container.

              • DnsSearchDomains — (Array<String>)

                A list of DNS search domains that are presented to the container.

              • DnsServers — (Array<String>)

                A list of DNS servers that are presented to the container.

              • DockerLabels — (map<String>)

                A key-value map of labels to add to the container.

              • DockerSecurityOptions — (Array<String>)

                A list of strings to provide custom labels for SELinux and AppArmor multi-level security systems.

              • EntryPoint — (Array<String>)

                The entry point that is passed to the container.

              • Environment — (Array<map>)

                The environment variables to pass to a container.

                • Name — (String)

                  The name of the environment variable.

                • Value — (String)

                  The value of the environment variable.

              • EnvironmentFiles — (Array<map>)

                A list of files containing the environment variables to pass to a container.

                • Type — (String)

                  The type of environment file. The valid value is s3.

                • Value — (String)

                  The ARN of the S3 object that contains the environment variable file.

              • Essential — (Boolean)

                Whether the container is essential. All tasks must have at least one essential container.

              • ExtraHosts — (Array<map>)

                A list of hostnames and IP address mappings to append to the /etc/hosts file on the container.

                • Hostname — (String)

                  The hostname to use in the /etc/hosts entry.

                • IpAddress — (String)

                  The IP address to use in the /etc/hosts entry.

              • FirelensConfiguration — (map)

                The FireLens configuration for the container. Specifies and configures a log router for container logs.

                • Options — (map<String>)

                  The options to use to configure the log router.

                  The valid option keys are as follows:

                  • enable-ecs-log-metadata. The value can be true or false.

                  • config-file-type. The value can be s3 or file.

                  • config-file-value. The value is either an S3 ARN or a file path.

                • Type — (String)

                  The log router to use. Valid values are fluentbit or fluentd.

              • HealthCheck — (map)

                The container health check command and associated configuration parameters for the container.

                • Command — (Array<String>)

                  The command that the container runs to determine whether it is healthy.

                • Interval — (Integer)

                  The time period in seconds between each health check execution. The default value is 30 seconds.

                • Retries — (Integer)

                  The number of times to retry a failed health check before the container is considered unhealthy. The default value is 3.

                • StartPeriod — (Integer)

                  The optional grace period in seconds that allows containers time to bootstrap before failed health checks count towards the maximum number of retries.

                • Timeout — (Integer)

                  The time period in seconds to wait for a health check to succeed before it is considered a failure. The default value is 5.

              • Hostname — (String)

                The hostname to use for the container.

              • Image — (String)

                The image used to start the container.

              • Interactive — (Boolean)

                If set to true, then containerized applications can be deployed that require stdin or a tty to be allocated.

              • Links — (Array<String>)

                A list of links for the container in the form container_name:alias . Allows containers to communicate with each other without the need for port mappings.

              • LinuxParameters — (map)

                Linux-specific modifications that are applied to the container, such as Linux kernel capabilities.

                • Capabilities — (map)

                  The Linux capabilities for the container that are added to or dropped from the default configuration provided by Docker.

                  • Add — (Array<String>)

                    The Linux capabilities for the container that are added to the default configuration provided by Docker. Valid values are as follows:

                    Valid values: "ALL" | "AUDIT_CONTROL" | "AUDIT_WRITE" | "BLOCK_SUSPEND" | "CHOWN" | "DAC_OVERRIDE" | "DAC_READ_SEARCH" | "FOWNER" | "FSETID" | "IPC_LOCK" | "IPC_OWNER" | "KILL" | "LEASE" | "LINUX_IMMUTABLE" | "MAC_ADMIN" | "MAC_OVERRIDE" | "MKNOD" | "NET_ADMIN" | "NET_BIND_SERVICE" | "NET_BROADCAST" | "NET_RAW" | "SETFCAP" | "SETGID" | "SETPCAP" | "SETUID" | "SYS_ADMIN" | "SYS_BOOT" | "SYS_CHROOT" | "SYS_MODULE" | "SYS_NICE" | "SYS_PACCT" | "SYS_PTRACE" | "SYS_RAWIO" | "SYS_RESOURCE" | "SYS_TIME" | "SYS_TTY_CONFIG" | "SYSLOG" | "WAKE_ALARM"

                  • Drop — (Array<String>)

                    The Linux capabilities for the container that are dropped from the default configuration provided by Docker.

                    Valid values: "ALL" | "AUDIT_CONTROL" | "AUDIT_WRITE" | "BLOCK_SUSPEND" | "CHOWN" | "DAC_OVERRIDE" | "DAC_READ_SEARCH" | "FOWNER" | "FSETID" | "IPC_LOCK" | "IPC_OWNER" | "KILL" | "LEASE" | "LINUX_IMMUTABLE" | "MAC_ADMIN" | "MAC_OVERRIDE" | "MKNOD" | "NET_ADMIN" | "NET_BIND_SERVICE" | "NET_BROADCAST" | "NET_RAW" | "SETFCAP" | "SETGID" | "SETPCAP" | "SETUID" | "SYS_ADMIN" | "SYS_BOOT" | "SYS_CHROOT" | "SYS_MODULE" | "SYS_NICE" | "SYS_PACCT" | "SYS_PTRACE" | "SYS_RAWIO" | "SYS_RESOURCE" | "SYS_TIME" | "SYS_TTY_CONFIG" | "SYSLOG" | "WAKE_ALARM"

                • Devices — (Array<map>)

                  The host devices to expose to the container.

                  • ContainerPath — (String)

                    The path inside the container at which to expose the host device.

                  • HostPath — (String)

                    The path for the device on the host container instance.

                  • Permissions — (Array<String>)

                    The explicit permissions to provide to the container for the device. By default, the container has permissions for read, write, and mknod for the device.

                • InitProcessEnabled — (Boolean)

                  Whether to run an init process inside the container that forwards signals and reaps processes.

                • MaxSwap — (Integer)

                  The total amount of swap memory (in MiB) that a container can use.

                • SharedMemorySize — (Integer)

                  The value for the size (in MiB) of the /dev/shm volume.

                • Swappiness — (Integer)

                  Configures the container's memory swappiness behavior. Determines how aggressively pages are swapped. The higher the value, the more aggressive the swappiness. The default is 60.

                • Tmpfs — (Array<map>)

                  The container path, mount options, and size (in MiB) of the tmpfs mount.

                  • ContainerPath — (String)

                    The absolute file path where the tmpfs volume is to be mounted.

                  • MountOptions — (Array<String>)

                    The list of tmpfs volume mount options.

                    Valid values: "defaults" | "ro" | "rw" | "suid" | "nosuid" | "dev" | "nodev" | "exec" | "noexec" | "sync" | "async" | "dirsync" | "remount" | "mand" | "nomand" | "atime" | "noatime" | "diratime" | "nodiratime" | "bind" | "rbind" | "unbindable" | "runbindable" | "private" | "rprivate" | "shared" | "rshared" | "slave" | "rslave" | "relatime" | "norelatime" | "strictatime" | "nostrictatime" | "mode" | "uid" | "gid" | "nr_inodes" | "nr_blocks" | "mpol"

                  • Size — (Integer)

                    The maximum size (in MiB) of the tmpfs volume.

              • LogConfiguration — (map)

                The log configuration specification for the container.

                • LogDriver — (String)

                  The log driver to use for the container.

                  Valid values on Fargate are as follows:

                  • awsfirelens

                  • awslogs

                  • splunk

                  Valid values on Amazon EC2 are as follows:

                  • awsfirelens

                  • awslogs

                  • fluentd

                  • gelf

                  • journald

                  • json-file

                  • logentries

                  • splunk

                  • syslog

                • Options — (map<String>)

                  The configuration options to send to the log driver. Requires version 1.19 of the Docker Remote API or greater on your container instance.

                • SecretOptions — (Array<map>)

                  The secrets to pass to the log configuration.

                  • Name — (String)

                    The name of the secret.

                  • ValueFrom — (String)

                    The secret to expose to the container.

                    The value is either the full ARN of the Secrets Manager secret or the full ARN of the parameter in the Systems Manager Parameter Store.

              • Memory — (Integer)

                The amount (in MiB) of memory to present to the container. If the container attempts to exceed the memory specified here, the container is shut down. The total amount of memory reserved for all containers within a task must be lower than the task memory value, if one is specified.

              • MemoryReservation — (Integer)

                The soft limit (in MiB) of memory to reserve for the container.

              • MountPoints — (Array<map>)

                The mount points for the data volumes in the container.

                • ContainerPath — (String)

                  The path on the container to mount the host volume at.

                • ReadOnly — (Boolean)

                  Whether the container has read-only access to the volume.

                • SourceVolume — (String)

                  The name of the volume to mount. Must match the name of a volume listed in VolumeDetails for the task definition.

              • Name — (String)

                The name of the container.

              • PortMappings — (Array<map>)

                The list of port mappings for the container.

                • ContainerPort — (Integer)

                  The port number on the container that is bound to the user-specified or automatically assigned host port.

                • HostPort — (Integer)

                  The port number on the container instance to reserve for the container.

                • Protocol — (String)

                  The protocol used for the port mapping. The default is tcp.

              • Privileged — (Boolean)

                Whether the container is given elevated privileges on the host container instance. The elevated privileges are similar to the root user.

              • PseudoTerminal — (Boolean)

                Whether to allocate a TTY to the container.

              • ReadonlyRootFilesystem — (Boolean)

                Whether the container is given read-only access to its root file system.

              • RepositoryCredentials — (map)

                The private repository authentication credentials to use.

                • CredentialsParameter — (String)

                  The ARN of the secret that contains the private repository credentials.

              • ResourceRequirements — (Array<map>)

                The type and amount of a resource to assign to a container. The only supported resource is a GPU.

                • Type — (String)

                  The type of resource to assign to a container. Valid values are GPU or InferenceAccelerator.

                • Value — (String)

                  The value for the specified resource type.

                  For GPU, the value is the number of physical GPUs the Amazon ECS container agent reserves for the container.

                  For InferenceAccelerator, the value should match the DeviceName attribute of an entry in InferenceAccelerators.

              • Secrets — (Array<map>)

                The secrets to pass to the container.

                • Name — (String)

                  The name of the secret.

                • ValueFrom — (String)

                  The secret to expose to the container. The value is either the full ARN of the Secrets Manager secret or the full ARN of the parameter in the Systems Manager Parameter Store.

              • StartTimeout — (Integer)

                The number of seconds to wait before giving up on resolving dependencies for a container.

              • StopTimeout — (Integer)

                The number of seconds to wait before the container is stopped if it doesn't shut down normally on its own.

              • SystemControls — (Array<map>)

                A list of namespaced kernel parameters to set in the container.

                • Namespace — (String)

                  The namespaced kernel parameter for which to set a value.

                • Value — (String)

                  The value of the parameter.

              • Ulimits — (Array<map>)

                A list of ulimits to set in the container.

                • HardLimit — (Integer)

                  The hard limit for the ulimit type.

                • Name — (String)

                  The type of the ulimit. Valid values are as follows:

                  • core

                  • cpu

                  • data

                  • fsize

                  • locks

                  • memlock

                  • msgqueue

                  • nice

                  • nofile

                  • nproc

                  • rss

                  • rtprio

                  • rttime

                  • sigpending

                  • stack

                • SoftLimit — (Integer)

                  The soft limit for the ulimit type.

              • User — (String)

                The user to use inside the container.

                The value can use one of the following formats.

                • user

                • user : group

                • uid

                • uid : gid

                • user : gid

                • uid : group

              • VolumesFrom — (Array<map>)

                Data volumes to mount from another container.

                • ReadOnly — (Boolean)

                  Whether the container has read-only access to the volume.

                • SourceContainer — (String)

                  The name of another container within the same task definition from which to mount volumes.

              • WorkingDirectory — (String)

                The working directory in which to run commands inside the container.

            • Cpu — (String)

              The number of CPU units used by the task.Valid values are as follows:

              • 256 (.25 vCPU)

              • 512 (.5 vCPU)

              • 1024 (1 vCPU)

              • 2048 (2 vCPU)

              • 4096 (4 vCPU)

            • ExecutionRoleArn — (String)

              The ARN of the task execution role that grants the container agent permission to make API calls on behalf of the container user.

            • Family — (String)

              The name of a family that this task definition is registered to.

            • InferenceAccelerators — (Array<map>)

              The Elastic Inference accelerators to use for the containers in the task.

              • DeviceName — (String)

                The Elastic Inference accelerator device name.

              • DeviceType — (String)

                The Elastic Inference accelerator type to use.

            • IpcMode — (String)

              The inter-process communication (IPC) resource namespace to use for the containers in the task. Valid values are as follows:

              • host

              • none

              • task

            • Memory — (String)

              The amount (in MiB) of memory used by the task.

              For tasks that are hosted on Amazon EC2, you can provide a task-level memory value or a container-level memory value. For tasks that are hosted on Fargate, you must use one of the specified values in the Amazon Elastic Container Service Developer Guide , which determines your range of supported values for the Cpu and Memory parameters.

            • NetworkMode — (String)

              The Docker networking mode to use for the containers in the task. Valid values are as follows:

              • awsvpc

              • bridge

              • host

              • none

            • PidMode — (String)

              The process namespace to use for the containers in the task. Valid values are host or task.

            • PlacementConstraints — (Array<map>)

              The placement constraint objects to use for tasks.

              • Expression — (String)

                A cluster query language expression to apply to the constraint.

              • Type — (String)

                The type of constraint.

            • ProxyConfiguration — (map)

              The configuration details for the App Mesh proxy.

              • ContainerName — (String)

                The name of the container that will serve as the App Mesh proxy.

              • ProxyConfigurationProperties — (Array<map>)

                The set of network configuration parameters to provide to the Container Network Interface (CNI) plugin, specified as key-value pairs.

                • Name — (String)

                  The name of the property.

                • Value — (String)

                  The value of the property.

              • Type — (String)

                The proxy type.

            • RequiresCompatibilities — (Array<String>)

              The task launch types that the task definition was validated against.

            • TaskRoleArn — (String)

              The short name or ARN of the IAM role that grants containers in the task permission to call Amazon Web Services API operations on your behalf.

            • Volumes — (Array<map>)

              The data volume definitions for the task.

              • DockerVolumeConfiguration — (map)

                Information about a Docker volume.

                • Autoprovision — (Boolean)

                  Whether to create the Docker volume automatically if it does not already exist.

                • Driver — (String)

                  The Docker volume driver to use.

                • DriverOpts — (map<String>)

                  A map of Docker driver-specific options that are passed through.

                • Labels — (map<String>)

                  Custom metadata to add to the Docker volume.

                • Scope — (String)

                  The scope for the Docker volume that determines its lifecycle. Docker volumes that are scoped to a task are provisioned automatically when the task starts and destroyed when the task stops. Docker volumes that are shared persist after the task stops. Valid values are shared or task.

              • EfsVolumeConfiguration — (map)

                Information about the Amazon Elastic File System file system that is used for task storage.

                • AuthorizationConfig — (map)

                  The authorization configuration details for the Amazon EFS file system.

                  • AccessPointId — (String)

                    The Amazon EFS access point identifier to use.

                  • Iam — (String)

                    Whether to use the Amazon ECS task IAM role defined in a task definition when mounting the Amazon EFS file system.

                • FilesystemId — (String)

                  The Amazon EFS file system identifier to use.

                • RootDirectory — (String)

                  The directory within the Amazon EFS file system to mount as the root directory inside the host.

                • TransitEncryption — (String)

                  Whether to enable encryption for Amazon EFS data in transit between the Amazon ECS host and the Amazon EFS server.

                • TransitEncryptionPort — (Integer)

                  The port to use when sending encrypted data between the Amazon ECS host and the Amazon EFS server.

              • Host — (map)

                Information about a bind mount host volume.

                • SourcePath — (String)

                  The path on the host container instance that is presented to the container.

              • Name — (String)

                The name of the data volume.

            • Status — (String)

              The status of the task definition.

          • Container — (map)

            Details about a container resource related to a finding.

            • ContainerRuntime — (String)

              The runtime of the container.

            • Name — (String)

              The name of the container related to a finding.

            • ImageId — (String)

              The identifier of the container image related to a finding.

            • ImageName — (String)

              The name of the container image related to a finding.

            • LaunchedAt — (String)

              Indicates when the container started.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • VolumeMounts — (Array<map>)

              Provides information about the mounting of a volume in a container.

              • Name — (String)

                The name of the volume.

              • MountPath — (String)

                The path in the container at which the volume should be mounted.

            • Privileged — (Boolean)

              When this parameter is true, the container is given elevated privileges on the host container instance (similar to the root user).

          • Other — (map<String>)

            Details about a resource that are not available in a type-specific details object. Use the Other object in the following cases.

            • The type-specific object does not contain all of the fields that you want to populate. In this case, first use the type-specific object to populate those fields. Use the Other object to populate the fields that are missing from the type-specific object.

            • The resource type does not have a corresponding object. This includes resources for which the type is Other.

          • AwsRdsEventSubscription — (map)

            Details about an RDS event notification subscription.

            • CustSubscriptionId — (String)

              The identifier of the account that is associated with the event notification subscription.

            • CustomerAwsId — (String)

              The identifier of the event notification subscription.

            • Enabled — (Boolean)

              Whether the event notification subscription is enabled.

            • EventCategoriesList — (Array<String>)

              The list of event categories for the event notification subscription.

            • EventSubscriptionArn — (String)

              The ARN of the event notification subscription.

            • SnsTopicArn — (String)

              The ARN of the SNS topic to post the event notifications to.

            • SourceIdsList — (Array<String>)

              A list of source identifiers for the event notification subscription.

            • SourceType — (String)

              The source type for the event notification subscription.

            • Status — (String)

              The status of the event notification subscription.

              Valid values: creating | modifying | deleting | active | no-permission | topic-not-exist

            • SubscriptionCreationTime — (String)

              The datetime when the event notification subscription was created.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

          • AwsEcsService — (map)

            Details about a service within an ECS cluster.

            • CapacityProviderStrategy — (Array<map>)

              The capacity provider strategy that the service uses.

              • Base — (Integer)

                The minimum number of tasks to run on the capacity provider. Only one strategy item can specify a value for Base.

                The value must be between 0 and 100000.

              • CapacityProvider — (String)

                The short name of the capacity provider.

              • Weight — (Integer)

                The relative percentage of the total number of tasks that should use the capacity provider.

                If no weight is specified, the default value is 0. At least one capacity provider must have a weight greater than 0.

                The value can be between 0 and 1000.

            • Cluster — (String)

              The ARN of the cluster that hosts the service.

            • DeploymentConfiguration — (map)

              Deployment parameters for the service. Includes the number of tasks that run and the order in which to start and stop tasks.

              • DeploymentCircuitBreaker — (map)

                Determines whether a service deployment fails if a service cannot reach a steady state.

                • Enable — (Boolean)

                  Whether to enable the deployment circuit breaker logic for the service.

                • Rollback — (Boolean)

                  Whether to roll back the service if a service deployment fails. If rollback is enabled, when a service deployment fails, the service is rolled back to the last deployment that completed successfully.

              • MaximumPercent — (Integer)

                For a service that uses the rolling update (ECS) deployment type, the maximum number of tasks in a service that are allowed in the RUNNING or PENDING state during a deployment, and for tasks that use the EC2 launch type, when any container instances are in the DRAINING state. Provided as a percentage of the desired number of tasks. The default value is 200%.

                For a service that uses the blue/green (CODE_DEPLOY) or EXTERNAL deployment types, and tasks that use the EC2 launch type, the maximum number of tasks in the service that remain in the RUNNING state while the container instances are in the DRAINING state.

                For the Fargate launch type, the maximum percent value is not used.

              • MinimumHealthyPercent — (Integer)

                For a service that uses the rolling update (ECS) deployment type, the minimum number of tasks in a service that must remain in the RUNNING state during a deployment, and while any container instances are in the DRAINING state if the service contains tasks using the EC2 launch type. Expressed as a percentage of the desired number of tasks. The default value is 100%.

                For a service that uses the blue/green (CODE_DEPLOY) or EXTERNAL deployment types and tasks that use the EC2 launch type, the minimum number of the tasks in the service that remain in the RUNNING state while the container instances are in the DRAINING state.

                For the Fargate launch type, the minimum healthy percent value is not used.

            • DeploymentController — (map)

              Contains the deployment controller type that the service uses.

              • Type — (String)

                The rolling update (ECS) deployment type replaces the current running version of the container with the latest version.

                The blue/green (CODE_DEPLOY) deployment type uses the blue/green deployment model that is powered by CodeDeploy. This deployment model a new deployment of a service can be verified before production traffic is sent to it.

                The external (EXTERNAL) deployment type allows the use of any third-party deployment controller for full control over the deployment process for an Amazon ECS service.

                Valid values: ECS | CODE_DEPLOY | EXTERNAL

            • DesiredCount — (Integer)

              The number of instantiations of the task definition to run on the service.

            • EnableEcsManagedTags — (Boolean)

              Whether to enable Amazon ECS managed tags for the tasks in the service.

            • EnableExecuteCommand — (Boolean)

              Whether the execute command functionality is enabled for the service.

            • HealthCheckGracePeriodSeconds — (Integer)

              After a task starts, the amount of time in seconds that the Amazon ECS service scheduler ignores unhealthy Elastic Load Balancing target health checks.

            • LaunchType — (String)

              The launch type that the service uses.

              Valid values: EC2 | FARGATE | EXTERNAL

            • LoadBalancers — (Array<map>)

              Information about the load balancers that the service uses.

              • ContainerName — (String)

                The name of the container to associate with the load balancer.

              • ContainerPort — (Integer)

                The port on the container to associate with the load balancer. This port must correspond to a containerPort in the task definition the tasks in the service are using. For tasks that use the EC2 launch type, the container instance they are launched on must allow ingress traffic on the hostPort of the port mapping.

              • LoadBalancerName — (String)

                The name of the load balancer to associate with the Amazon ECS service or task set.

                Only specified when using a Classic Load Balancer. For an Application Load Balancer or a Network Load Balancer, the load balancer name is omitted.

              • TargetGroupArn — (String)

                The ARN of the Elastic Load Balancing target group or groups associated with a service or task set.

                Only specified when using an Application Load Balancer or a Network Load Balancer. For a Classic Load Balancer, the target group ARN is omitted.

            • Name — (String)

              The name of the service.

            • NetworkConfiguration — (map)

              For tasks that use the awsvpc networking mode, the VPC subnet and security group configuration.

              • AwsVpcConfiguration — (map)

                The VPC subnet and security group configuration.

                • AssignPublicIp — (String)

                  Whether the task's elastic network interface receives a public IP address. The default value is DISABLED.

                  Valid values: ENABLED | DISABLED

                • SecurityGroups — (Array<String>)

                  The IDs of the security groups associated with the task or service.

                  You can provide up to five security groups.

                • Subnets — (Array<String>)

                  The IDs of the subnets associated with the task or service.

                  You can provide up to 16 subnets.

            • PlacementConstraints — (Array<map>)

              The placement constraints for the tasks in the service.

              • Expression — (String)

                A cluster query language expression to apply to the constraint. You cannot specify an expression if the constraint type is distinctInstance.

              • Type — (String)

                The type of constraint. Use distinctInstance to run each task in a particular group on a different container instance. Use memberOf to restrict the selection to a group of valid candidates.

                Valid values: distinctInstance | memberOf

            • PlacementStrategies — (Array<map>)

              Information about how tasks for the service are placed.

              • Field — (String)

                The field to apply the placement strategy against.

                For the spread placement strategy, valid values are instanceId (or host, which has the same effect), or any platform or custom attribute that is applied to a container instance, such as attribute:ecs.availability-zone.

                For the binpack placement strategy, valid values are cpu and memory.

                For the random placement strategy, this attribute is not used.

              • Type — (String)

                The type of placement strategy.

                The random placement strategy randomly places tasks on available candidates.

                The spread placement strategy spreads placement across available candidates evenly based on the value of Field.

                The binpack strategy places tasks on available candidates that have the least available amount of the resource that is specified in Field.

                Valid values: random | spread | binpack

            • PlatformVersion — (String)

              The platform version on which to run the service. Only specified for tasks that are hosted on Fargate. If a platform version is not specified, the LATEST platform version is used by default.

            • PropagateTags — (String)

              Indicates whether to propagate the tags from the task definition to the task or from the service to the task. If no value is provided, then tags are not propagated.

              Valid values: TASK_DEFINITION | SERVICE

            • Role — (String)

              The ARN of the IAM role that is associated with the service. The role allows the Amazon ECS container agent to register container instances with an Elastic Load Balancing load balancer.

            • SchedulingStrategy — (String)

              The scheduling strategy to use for the service.

              The REPLICA scheduling strategy places and maintains the desired number of tasks across the cluster. By default, the service scheduler spreads tasks across Availability Zones. Task placement strategies and constraints are used to customize task placement decisions.

              The DAEMON scheduling strategy deploys exactly one task on each active container instance that meets all of the task placement constraints that are specified in the cluster. The service scheduler also evaluates the task placement constraints for running tasks and stops tasks that do not meet the placement constraints.

              Valid values: REPLICA | DAEMON

            • ServiceArn — (String)

              The ARN of the service.

            • ServiceName — (String)

              The name of the service.

              The name can contain up to 255 characters. It can use letters, numbers, underscores, and hyphens.

            • ServiceRegistries — (Array<map>)

              Information about the service discovery registries to assign to the service.

              • ContainerName — (String)

                The container name value to use for the service discovery service.

                If the task definition uses the bridge or host network mode, you must specify ContainerName and ContainerPort.

                If the task definition uses the awsvpc network mode and a type SRV DNS record, you must specify either ContainerName and ContainerPort, or Port , but not both.

              • ContainerPort — (Integer)

                The port value to use for the service discovery service.

                If the task definition uses the bridge or host network mode, you must specify ContainerName and ContainerPort.

                If the task definition uses the awsvpc network mode and a type SRV DNS record, you must specify either ContainerName and ContainerPort, or Port , but not both.

              • Port — (Integer)

                The port value to use for a service discovery service that specifies an SRV record. This field can be used if both the awsvpcawsvpc network mode and SRV records are used.

              • RegistryArn — (String)

                The ARN of the service registry.

            • TaskDefinition — (String)

              The task definition to use for tasks in the service.

          • AwsAutoScalingLaunchConfiguration — (map)

            Provides details about a launch configuration.

            • AssociatePublicIpAddress — (Boolean)

              For Auto Scaling groups that run in a VPC, specifies whether to assign a public IP address to the group's instances.

            • BlockDeviceMappings — (Array<map>)

              Specifies the block devices for the instance.

              • DeviceName — (String)

                The device name that is exposed to the EC2 instance. For example, /dev/sdh or xvdh.

              • Ebs — (map)

                Parameters that are used to automatically set up Amazon EBS volumes when an instance is launched.

                • DeleteOnTermination — (Boolean)

                  Whether to delete the volume when the instance is terminated.

                • Encrypted — (Boolean)

                  Whether to encrypt the volume.

                • Iops — (Integer)

                  The number of input/output (I/O) operations per second (IOPS) to provision for the volume.

                  Only supported for gp3 or io1 volumes. Required for io1 volumes. Not used with standard, gp2, st1, or sc1 volumes.

                • SnapshotId — (String)

                  The snapshot ID of the volume to use.

                  You must specify either VolumeSize or SnapshotId.

                • VolumeSize — (Integer)

                  The volume size, in GiBs. The following are the supported volumes sizes for each volume type:

                  • gp2 and gp3: 1-16,384

                  • io1: 4-16,384

                  • st1 and sc1: 125-16,384

                  • standard: 1-1,024

                  You must specify either SnapshotId or VolumeSize. If you specify both SnapshotId and VolumeSize, the volume size must be equal or greater than the size of the snapshot.

                • VolumeType — (String)

                  The volume type. Valid values are as follows:

                  • gp2

                  • gp3

                  • io1

                  • sc1

                  • st1

                  • standard

              • NoDevice — (Boolean)

                Whether to suppress the device that is included in the block device mapping of the Amazon Machine Image (AMI).

                If NoDevice is true, then you cannot specify Ebs.>

              • VirtualName — (String)

                The name of the virtual device (for example, ephemeral0).

                You can provide either VirtualName or Ebs, but not both.

            • ClassicLinkVpcId — (String)

              The identifier of a ClassicLink-enabled VPC that EC2-Classic instances are linked to.

            • ClassicLinkVpcSecurityGroups — (Array<String>)

              The identifiers of one or more security groups for the VPC that is specified in ClassicLinkVPCId.

            • CreatedTime — (String)

              The creation date and time for the launch configuration.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • EbsOptimized — (Boolean)

              Whether the launch configuration is optimized for Amazon EBS I/O.

            • IamInstanceProfile — (String)

              The name or the ARN of the instance profile associated with the IAM role for the instance. The instance profile contains the IAM role.

            • ImageId — (String)

              The identifier of the Amazon Machine Image (AMI) that is used to launch EC2 instances.

            • InstanceMonitoring — (map)

              Indicates the type of monitoring for instances in the group.

              • Enabled — (Boolean)

                If set to true, then instances in the group launch with detailed monitoring.

                If set to false, then instances in the group launch with basic monitoring.

            • InstanceType — (String)

              The instance type for the instances.

            • KernelId — (String)

              The identifier of the kernel associated with the AMI.

            • KeyName — (String)

              The name of the key pair.

            • LaunchConfigurationName — (String)

              The name of the launch configuration.

            • PlacementTenancy — (String)

              The tenancy of the instance. An instance with dedicated tenancy runs on isolated, single-tenant hardware and can only be launched into a VPC.

            • RamdiskId — (String)

              The identifier of the RAM disk associated with the AMI.

            • SecurityGroups — (Array<String>)

              The security groups to assign to the instances in the Auto Scaling group.

            • SpotPrice — (String)

              The maximum hourly price to be paid for any Spot Instance that is launched to fulfill the request.

            • UserData — (String)

              The user data to make available to the launched EC2 instances. Must be base64-encoded text.

            • MetadataOptions — (map)

              The metadata options for the instances.

              • HttpEndpoint — (String)

                Enables or disables the HTTP metadata endpoint on your instances. By default, the metadata endpoint is enabled.

              • HttpPutResponseHopLimit — (Integer)

                The HTTP PUT response hop limit for instance metadata requests. The larger the number, the further instance metadata requests can travel.

              • HttpTokens — (String)

                Indicates whether token usage is required or optional for metadata requests. By default, token usage is optional.

          • AwsEc2VpnConnection — (map)

            Details about an Amazon EC2 VPN connection.

            • VpnConnectionId — (String)

              The identifier of the VPN connection.

            • State — (String)

              The current state of the VPN connection. Valid values are as follows:

              • available

              • deleted

              • deleting

              • pending

            • CustomerGatewayId — (String)

              The identifier of the customer gateway that is at your end of the VPN connection.

            • CustomerGatewayConfiguration — (String)

              The configuration information for the VPN connection's customer gateway, in the native XML format.

            • Type — (String)

              The type of VPN connection.

            • VpnGatewayId — (String)

              The identifier of the virtual private gateway that is at the Amazon Web Services side of the VPN connection.

            • Category — (String)

              The category of the VPN connection. VPN indicates an Amazon Web Services VPN connection. VPN-Classic indicates an Amazon Web Services Classic VPN connection.

            • VgwTelemetry — (Array<map>)

              Information about the VPN tunnel.

              • AcceptedRouteCount — (Integer)

                The number of accepted routes.

              • CertificateArn — (String)

                The ARN of the VPN tunnel endpoint certificate.

              • LastStatusChange — (String)

                The date and time of the last change in status.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • OutsideIpAddress — (String)

                The Internet-routable IP address of the virtual private gateway's outside interface.

              • Status — (String)

                The status of the VPN tunnel. Valid values are DOWN or UP.

              • StatusMessage — (String)

                If an error occurs, a description of the error.

            • Options — (map)

              The VPN connection options.

              • StaticRoutesOnly — (Boolean)

                Whether the VPN connection uses static routes only.

              • TunnelOptions — (Array<map>)

                The VPN tunnel options.

                • DpdTimeoutSeconds — (Integer)

                  The number of seconds after which a Dead Peer Detection (DPD) timeout occurs.

                • IkeVersions — (Array<String>)

                  The Internet Key Exchange (IKE) versions that are permitted for the VPN tunnel.

                • OutsideIpAddress — (String)

                  The external IP address of the VPN tunnel.

                • Phase1DhGroupNumbers — (Array<Integer>)

                  The permitted Diffie-Hellman group numbers for the VPN tunnel for phase 1 IKE negotiations.

                • Phase1EncryptionAlgorithms — (Array<String>)

                  The permitted encryption algorithms for the VPN tunnel for phase 1 IKE negotiations.

                • Phase1IntegrityAlgorithms — (Array<String>)

                  The permitted integrity algorithms for the VPN tunnel for phase 1 IKE negotiations.

                • Phase1LifetimeSeconds — (Integer)

                  The lifetime for phase 1 of the IKE negotiation, in seconds.

                • Phase2DhGroupNumbers — (Array<Integer>)

                  The permitted Diffie-Hellman group numbers for the VPN tunnel for phase 2 IKE negotiations.

                • Phase2EncryptionAlgorithms — (Array<String>)

                  The permitted encryption algorithms for the VPN tunnel for phase 2 IKE negotiations.

                • Phase2IntegrityAlgorithms — (Array<String>)

                  The permitted integrity algorithms for the VPN tunnel for phase 2 IKE negotiations.

                • Phase2LifetimeSeconds — (Integer)

                  The lifetime for phase 2 of the IKE negotiation, in seconds.

                • PreSharedKey — (String)

                  The preshared key to establish initial authentication between the virtual private gateway and the customer gateway.

                • RekeyFuzzPercentage — (Integer)

                  The percentage of the rekey window, which is determined by RekeyMarginTimeSeconds during which the rekey time is randomly selected.

                • RekeyMarginTimeSeconds — (Integer)

                  The margin time, in seconds, before the phase 2 lifetime expires, during which the Amazon Web Services side of the VPN connection performs an IKE rekey.

                • ReplayWindowSize — (Integer)

                  The number of packets in an IKE replay window.

                • TunnelInsideCidr — (String)

                  The range of inside IPv4 addresses for the tunnel.

            • Routes — (Array<map>)

              The static routes that are associated with the VPN connection.

              • DestinationCidrBlock — (String)

                The CIDR block associated with the local subnet of the customer data center.

              • State — (String)

                The current state of the static route.

            • TransitGatewayId — (String)

              The identifier of the transit gateway that is associated with the VPN connection.

          • AwsEcrContainerImage — (map)

            Information about an Amazon ECR image.

            • RegistryId — (String)

              The Amazon Web Services account identifier that is associated with the registry that the image belongs to.

            • RepositoryName — (String)

              The name of the repository that the image belongs to.

            • Architecture — (String)

              The architecture of the image. Valid values are as follows:

              • arm64

              • i386

              • x86_64

            • ImageDigest — (String)

              The sha256 digest of the image manifest.

            • ImageTags — (Array<String>)

              The list of tags that are associated with the image.

            • ImagePublishedAt — (String)

              The date and time when the image was pushed to the repository.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

          • AwsOpenSearchServiceDomain — (map)

            Details about an Amazon OpenSearch Service domain.

            • Arn — (String)

              The ARN of the OpenSearch Service domain.

            • AccessPolicies — (String)

              IAM policy document that specifies the access policies for the OpenSearch Service domain.

            • DomainName — (String)

              The name of the endpoint.

            • Id — (String)

              The identifier of the domain.

            • DomainEndpoint — (String)

              The domain endpoint.

            • EngineVersion — (String)

              The version of the domain engine.

            • EncryptionAtRestOptions — (map)

              Details about the configuration for encryption at rest.

              • Enabled — (Boolean)

                Whether encryption at rest is enabled.

              • KmsKeyId — (String)

                The KMS key ID.

            • NodeToNodeEncryptionOptions — (map)

              Details about the configuration for node-to-node encryption.

              • Enabled — (Boolean)

                Whether node-to-node encryption is enabled.

            • ServiceSoftwareOptions — (map)

              Information about the status of a domain relative to the latest service software.

              • AutomatedUpdateDate — (String)

                The epoch time when the deployment window closes for required updates. After this time, OpenSearch Service schedules the software upgrade automatically.

              • Cancellable — (Boolean)

                Whether a request to update the domain can be canceled.

              • CurrentVersion — (String)

                The version of the service software that is currently installed on the domain.

              • Description — (String)

                A more detailed description of the service software status.

              • NewVersion — (String)

                The most recent version of the service software.

              • UpdateAvailable — (Boolean)

                Whether a service software update is available for the domain.

              • UpdateStatus — (String)

                The status of the service software update. Valid values are as follows:

                • COMPLETED

                • ELIGIBLE

                • IN_PROGRESS

                • NOT_ELIGIBLE

                • PENDING_UPDATE

              • OptionalDeployment — (Boolean)

                Whether the service software update is optional.

            • ClusterConfig — (map)

              Details about the configuration of an OpenSearch cluster.

              • InstanceCount — (Integer)

                The number of data nodes to use in the OpenSearch domain.

              • WarmEnabled — (Boolean)

                Whether UltraWarm is enabled.

              • WarmCount — (Integer)

                The number of UltraWarm instances.

              • DedicatedMasterEnabled — (Boolean)

                Whether to use a dedicated master node for the OpenSearch domain. A dedicated master node performs cluster management tasks, but does not hold data or respond to data upload requests.

              • ZoneAwarenessConfig — (map)

                Configuration options for zone awareness. Provided if ZoneAwarenessEnabled is true.

                • AvailabilityZoneCount — (Integer)

                  The number of Availability Zones that the domain uses. Valid values are 2 or 3. The default is 2.

              • DedicatedMasterCount — (Integer)

                The number of instances to use for the master node. If this attribute is specified, then DedicatedMasterEnabled must be true.

              • InstanceType — (String)

                The instance type for your data nodes.

                For a list of valid values, see Supported instance types in Amazon OpenSearch Service in the Amazon OpenSearch Service Developer Guide.

              • WarmType — (String)

                The type of UltraWarm instance.

              • ZoneAwarenessEnabled — (Boolean)

                Whether to enable zone awareness for the OpenSearch domain. When zone awareness is enabled, OpenSearch Service allocates the cluster's nodes and replica index shards across Availability Zones (AZs) in the same Region. This prevents data loss and minimizes downtime if a node or data center fails.

              • DedicatedMasterType — (String)

                The hardware configuration of the computer that hosts the dedicated master node.

                If this attribute is specified, then DedicatedMasterEnabled must be true.

            • DomainEndpointOptions — (map)

              Additional options for the domain endpoint.

              • CustomEndpointCertificateArn — (String)

                The ARN for the security certificate. The certificate is managed in ACM.

              • CustomEndpointEnabled — (Boolean)

                Whether to enable a custom endpoint for the domain.

              • EnforceHTTPS — (Boolean)

                Whether to require that all traffic to the domain arrive over HTTPS.

              • CustomEndpoint — (String)

                The fully qualified URL for the custom endpoint.

              • TLSSecurityPolicy — (String)

                The TLS security policy to apply to the HTTPS endpoint of the OpenSearch domain.

            • VpcOptions — (map)

              Information that OpenSearch Service derives based on VPCOptions for the domain.

              • SecurityGroupIds — (Array<String>)

                The list of security group IDs that are associated with the VPC endpoints for the domain.

              • SubnetIds — (Array<String>)

                A list of subnet IDs that are associated with the VPC endpoints for the domain.

            • LogPublishingOptions — (map)

              Configures the CloudWatch Logs to publish for the OpenSearch domain.

              • IndexSlowLogs — (map)

                Configures the OpenSearch index logs publishing.

                • CloudWatchLogsLogGroupArn — (String)

                  The ARN of the CloudWatch Logs group to publish the logs to.

                • Enabled — (Boolean)

                  Whether the log publishing is enabled.

              • SearchSlowLogs — (map)

                Configures the OpenSearch search slow log publishing.

                • CloudWatchLogsLogGroupArn — (String)

                  The ARN of the CloudWatch Logs group to publish the logs to.

                • Enabled — (Boolean)

                  Whether the log publishing is enabled.

              • AuditLogs — (map)

                Configures the OpenSearch audit logs publishing.

                • CloudWatchLogsLogGroupArn — (String)

                  The ARN of the CloudWatch Logs group to publish the logs to.

                • Enabled — (Boolean)

                  Whether the log publishing is enabled.

            • DomainEndpoints — (map<String>)

              The domain endpoints. Used if the OpenSearch domain resides in a VPC.

              This is a map of key-value pairs. The key is always vpc. The value is the endpoint.

            • AdvancedSecurityOptions — (map)

              Specifies options for fine-grained access control.

              • Enabled — (Boolean)

                Enables fine-grained access control.

              • InternalUserDatabaseEnabled — (Boolean)

                Enables the internal user database.

              • MasterUserOptions — (map)

                Specifies information about the master user of the domain.

                • MasterUserArn — (String)

                  The Amazon Resource Name (ARN) for the master user.

                • MasterUserName — (String)

                  The username for the master user.

                • MasterUserPassword — (String)

                  The password for the master user.

          • AwsEc2VpcEndpointService — (map)

            Details about the service configuration for a VPC endpoint service.

            • AcceptanceRequired — (Boolean)

              Whether requests from other Amazon Web Services accounts to create an endpoint to the service must first be accepted.

            • AvailabilityZones — (Array<String>)

              The Availability Zones where the service is available.

            • BaseEndpointDnsNames — (Array<String>)

              The DNS names for the service.

            • ManagesVpcEndpoints — (Boolean)

              Whether the service manages its VPC endpoints.

            • GatewayLoadBalancerArns — (Array<String>)

              The ARNs of the Gateway Load Balancers for the service.

            • NetworkLoadBalancerArns — (Array<String>)

              The ARNs of the Network Load Balancers for the service.

            • PrivateDnsName — (String)

              The private DNS name for the service.

            • ServiceId — (String)

              The identifier of the service.

            • ServiceName — (String)

              The name of the service.

            • ServiceState — (String)

              The current state of the service. Valid values are as follows:

              • Available

              • Deleted

              • Deleting

              • Failed

              • Pending

            • ServiceType — (Array<map>)

              The types for the service.

              • ServiceType — (String)

                The type of service.

          • AwsXrayEncryptionConfig — (map)

            Information about the encryption configuration for X-Ray.

            • KeyId — (String)

              The identifier of the KMS key that is used for encryption. Provided if Type is KMS.

            • Status — (String)

              The current status of the encryption configuration. Valid values are ACTIVE or UPDATING.

              When Status is equal to UPDATING, X-Ray might use both the old and new encryption.

            • Type — (String)

              The type of encryption. KMS indicates that the encryption uses KMS keys. NONE indicates the default encryption.

          • AwsWafRateBasedRule — (map)

            Details about a rate-based rule for global resources.

            • MetricName — (String)

              The name of the metrics for the rate-based rule.

            • Name — (String)

              The name of the rate-based rule.

            • RateKey — (String)

              The field that WAF uses to determine whether requests are likely arriving from single source and are subject to rate monitoring.

            • RateLimit — (Integer)

              The maximum number of requests that have an identical value for the field specified in RateKey that are allowed within a five-minute period. If the number of requests exceeds RateLimit and the other predicates specified in the rule are met, WAF triggers the action for the rule.

            • RuleId — (String)

              The unique identifier for the rate-based rule.

            • MatchPredicates — (Array<map>)

              The predicates to include in the rate-based rule.

              • DataId — (String)

                The unique identifier for the predicate.

              • Negated — (Boolean)

                If set to true, then the rule actions are performed on requests that match the predicate settings.

                If set to false, then the rule actions are performed on all requests except those that match the predicate settings.

              • Type — (String)

                The type of predicate. Valid values are as follows:

                • ByteMatch

                • GeoMatch

                • IPMatch

                • RegexMatch

                • SizeConstraint

                • SqlInjectionMatch

                • XssMatch

          • AwsWafRegionalRateBasedRule — (map)

            Details about a rate-based rule for Regional resources.

            • MetricName — (String)

              The name of the metrics for the rate-based rule.

            • Name — (String)

              The name of the rate-based rule.

            • RateKey — (String)

              The field that WAF uses to determine whether requests are likely arriving from single source and are subject to rate monitoring.

            • RateLimit — (Integer)

              The maximum number of requests that have an identical value for the field specified in RateKey that are allowed within a five-minute period. If the number of requests exceeds RateLimit and the other predicates specified in the rule are met, WAF triggers the action for the rule.

            • RuleId — (String)

              The unique identifier for the rate-based rule.

            • MatchPredicates — (Array<map>)

              The predicates to include in the rate-based rule.

              • DataId — (String)

                The unique identifier for the predicate.

              • Negated — (Boolean)

                If set to true, then the rule actions are performed on requests that match the predicate settings.

                If set to false, then the rule actions are performed on all requests except those that match the predicate settings.

              • Type — (String)

                The type of predicate. Valid values are as follows:

                • ByteMatch

                • GeoMatch

                • IPMatch

                • RegexMatch

                • SizeConstraint

                • SqlInjectionMatch

                • XssMatch

          • AwsEcrRepository — (map)

            Information about an Amazon Elastic Container Registry repository.

            • Arn — (String)

              The ARN of the repository.

            • ImageScanningConfiguration — (map)

              The image scanning configuration for a repository.

              • ScanOnPush — (Boolean)

                Whether to scan images after they are pushed to a repository.

            • ImageTagMutability — (String)

              The tag mutability setting for the repository. Valid values are IMMUTABLE or MUTABLE.

            • LifecyclePolicy — (map)

              Information about the lifecycle policy for the repository.

              • LifecyclePolicyText — (String)

                The text of the lifecycle policy.

              • RegistryId — (String)

                The Amazon Web Services account identifier that is associated with the registry that contains the repository.

            • RepositoryName — (String)

              The name of the repository.

            • RepositoryPolicyText — (String)

              The text of the repository policy.

          • AwsEksCluster — (map)

            Details about an Amazon EKS cluster.

            • Arn — (String)

              The ARN of the cluster.

            • CertificateAuthorityData — (String)

              The certificate authority data for the cluster.

            • ClusterStatus — (String)

              The status of the cluster. Valid values are as follows:

              • ACTIVE

              • CREATING

              • DELETING

              • FAILED

              • PENDING

              • UPDATING

            • Endpoint — (String)

              The endpoint for the Amazon EKS API server.

            • Name — (String)

              The name of the cluster.

            • ResourcesVpcConfig — (map)

              The VPC configuration used by the cluster control plane.

              • SecurityGroupIds — (Array<String>)

                The security groups that are associated with the cross-account elastic network interfaces that are used to allow communication between your nodes and the Amazon EKS control plane.

              • SubnetIds — (Array<String>)

                The subnets that are associated with the cluster.

              • EndpointPublicAccess — (Boolean)

                Indicates whether the Amazon EKS public API server endpoint is turned on. If the Amazon EKS public API server endpoint is turned off, your cluster's Kubernetes API server can only receive requests that originate from within the cluster VPC.

            • RoleArn — (String)

              The ARN of the IAM role that provides permissions for the Amazon EKS control plane to make calls to Amazon Web Services API operations on your behalf.

            • Version — (String)

              The Amazon EKS server version for the cluster.

            • Logging — (map)

              The logging configuration for the cluster.

              • ClusterLogging — (Array<map>)

                Cluster logging configurations.

                • Enabled — (Boolean)

                  Whether the logging types that are listed in Types are enabled.

                • Types — (Array<String>)

                  A list of logging types. Valid values are as follows:

                  • api

                  • audit

                  • authenticator

                  • controllerManager

                  • scheduler

          • AwsNetworkFirewallFirewallPolicy — (map)

            Details about an Network Firewall firewall policy.

            • FirewallPolicy — (map)

              The firewall policy configuration.

              • StatefulRuleGroupReferences — (Array<map>)

                The stateful rule groups that are used in the firewall policy.

                • ResourceArn — (String)

                  The ARN of the stateful rule group.

              • StatelessCustomActions — (Array<map>)

                The custom action definitions that are available to use in the firewall policy's StatelessDefaultActions setting.

                • ActionDefinition — (map)

                  The definition of the custom action.

                  • PublishMetricAction — (map)

                    Information about metrics to publish to CloudWatch.

                    • Dimensions — (Array<map>)

                      Defines CloudWatch dimension values to publish.

                      • Value — (String)

                        The value to use for the custom metric dimension.

                • ActionName — (String)

                  The name of the custom action.

              • StatelessDefaultActions — (Array<String>)

                The actions to take on a packet if it doesn't match any of the stateless rules in the policy.

                You must specify a standard action (aws:pass, aws:drop, aws:forward_to_sfe), and can optionally include a custom action from StatelessCustomActions.

              • StatelessFragmentDefaultActions — (Array<String>)

                The actions to take on a fragmented UDP packet if it doesn't match any of the stateless rules in the policy.

                You must specify a standard action (aws:pass, aws:drop, aws:forward_to_sfe), and can optionally include a custom action from StatelessCustomActions.

              • StatelessRuleGroupReferences — (Array<map>)

                The stateless rule groups that are used in the firewall policy.

                • Priority — (Integer)

                  The order in which to run the stateless rule group.

                • ResourceArn — (String)

                  The ARN of the stateless rule group.

            • FirewallPolicyArn — (String)

              The ARN of the firewall policy.

            • FirewallPolicyId — (String)

              The identifier of the firewall policy.

            • FirewallPolicyName — (String)

              The name of the firewall policy.

            • Description — (String)

              A description of the firewall policy.

          • AwsNetworkFirewallFirewall — (map)

            Details about an Network Firewall firewall.

            • DeleteProtection — (Boolean)

              Whether the firewall is protected from deletion. If set to true, then the firewall cannot be deleted.

            • Description — (String)

              A description of the firewall.

            • FirewallArn — (String)

              The ARN of the firewall.

            • FirewallId — (String)

              The identifier of the firewall.

            • FirewallName — (String)

              A descriptive name of the firewall.

            • FirewallPolicyArn — (String)

              The ARN of the firewall policy.

            • FirewallPolicyChangeProtection — (Boolean)

              Whether the firewall is protected from a change to the firewall policy. If set to true, you cannot associate a different policy with the firewall.

            • SubnetChangeProtection — (Boolean)

              Whether the firewall is protected from a change to the subnet associations. If set to true, you cannot map different subnets to the firewall.

            • SubnetMappings — (Array<map>)

              The public subnets that Network Firewall uses for the firewall. Each subnet must belong to a different Availability Zone.

              • SubnetId — (String)

                The identifier of the subnet

            • VpcId — (String)

              The identifier of the VPC where the firewall is used.

          • AwsNetworkFirewallRuleGroup — (map)

            Details about an Network Firewall rule group.

            • Capacity — (Integer)

              The maximum number of operating resources that this rule group can use.

            • Description — (String)

              A description of the rule group.

            • RuleGroup — (map)

              Details about the rule group.

              • RuleVariables — (map)

                Additional settings to use in the specified rules.

                • IpSets — (map)

                  A list of IP addresses and address ranges, in CIDR notation.

                  • Definition — (Array<String>)

                    The list of IP addresses and ranges.

                • PortSets — (map)

                  A list of port ranges.

                  • Definition — (Array<String>)

                    The list of port ranges.

              • RulesSource — (map)

                The rules and actions for the rule group.

                For stateful rule groups, can contain RulesString, RulesSourceList, or StatefulRules.

                For stateless rule groups, contains StatelessRulesAndCustomActions.

                • RulesSourceList — (map)

                  Stateful inspection criteria for a domain list rule group. A domain list rule group determines access by specific protocols to specific domains.

                  • GeneratedRulesType — (String)

                    Indicates whether to allow or deny access to the domains listed in Targets.

                  • TargetTypes — (Array<String>)

                    The protocols that you want to inspect. Specify LS_SNI for HTTPS. Specify HTTP_HOST for HTTP. You can specify either or both.

                  • Targets — (Array<String>)

                    The domains that you want to inspect for in your traffic flows. You can provide full domain names, or use the '.' prefix as a wildcard. For example, .example.com matches all domains that end with example.com.

                • RulesString — (String)

                  Stateful inspection criteria, provided in Suricata compatible intrusion prevention system (IPS) rules.

                • StatefulRules — (Array<map>)

                  Suricata rule specifications.

                  • Action — (String)

                    Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria.

                  • Header — (map)

                    The stateful inspection criteria for the rule.

                    • Destination — (String)

                      The destination IP address or address range to inspect for, in CIDR notation. To match with any address, specify ANY.

                    • DestinationPort — (String)

                      The destination port to inspect for. You can specify an individual port, such as 1994. You also can specify a port range, such as 1990:1994. To match with any port, specify ANY.

                    • Direction — (String)

                      The direction of traffic flow to inspect. If set to ANY, the inspection matches bidirectional traffic, both from the source to the destination and from the destination to the source. If set to FORWARD, the inspection only matches traffic going from the source to the destination.

                    • Protocol — (String)

                      The protocol to inspect for. To inspector for all protocols, use IP.

                    • Source — (String)

                      The source IP address or address range to inspect for, in CIDR notation. To match with any address, specify ANY.

                    • SourcePort — (String)

                      The source port to inspect for. You can specify an individual port, such as 1994. You also can specify a port range, such as 1990:1994. To match with any port, specify ANY.

                  • RuleOptions — (Array<map>)

                    Additional options for the rule.

                    • Keyword — (String)

                      A keyword to look for.

                    • Settings — (Array<String>)

                      A list of settings.

                • StatelessRulesAndCustomActions — (map)

                  The stateless rules and custom actions used by a stateless rule group.

                  • CustomActions — (Array<map>)

                    Custom actions for the rule group.

                    • ActionDefinition — (map)

                      The definition of a custom action.

                      • PublishMetricAction — (map)

                        Information about metrics to publish to CloudWatch.

                        • Dimensions — (Array<map>)

                          Defines CloudWatch dimension values to publish.

                          • Value — (String)

                            The value to use for the custom metric dimension.

                    • ActionName — (String)

                      A descriptive name of the custom action.

                  • StatelessRules — (Array<map>)

                    Stateless rules for the rule group.

                    • Priority — (Integer)

                      Indicates the order in which to run this rule relative to all of the rules in the stateless rule group.

                    • RuleDefinition — (map)

                      Provides the definition of the stateless rule.

                      • Actions — (Array<String>)

                        The actions to take on a packet that matches one of the stateless rule definition's match attributes. You must specify a standard action (aws:pass, aws:drop, or aws:forward_to_sfe). You can then add custom actions.

                      • MatchAttributes — (map)

                        The criteria for Network Firewall to use to inspect an individual packet in a stateless rule inspection.

                        • DestinationPorts — (Array<map>)

                          A list of port ranges to specify the destination ports to inspect for.

                          • FromPort — (Integer)

                            The starting port value for the port range.

                          • ToPort — (Integer)

                            The ending port value for the port range.

                        • Destinations — (Array<map>)

                          The destination IP addresses and address ranges to inspect for, in CIDR notation.

                          • AddressDefinition — (String)

                            An IP address or a block of IP addresses.

                        • Protocols — (Array<Integer>)

                          The protocols to inspect for.

                        • SourcePorts — (Array<map>)

                          A list of port ranges to specify the source ports to inspect for.

                          • FromPort — (Integer)

                            The starting port value for the port range.

                          • ToPort — (Integer)

                            The ending port value for the port range.

                        • Sources — (Array<map>)

                          The source IP addresses and address ranges to inspect for, in CIDR notation.

                          • AddressDefinition — (String)

                            An IP address or a block of IP addresses.

                        • TcpFlags — (Array<map>)

                          The TCP flags and masks to inspect for.

                          • Flags — (Array<String>)

                            Defines the flags from the Masks setting that must be set in order for the packet to match. Flags that are listed must be set. Flags that are not listed must not be set.

                          • Masks — (Array<String>)

                            The set of flags to consider in the inspection. If not specified, then all flags are inspected.

            • RuleGroupArn — (String)

              The ARN of the rule group.

            • RuleGroupId — (String)

              The identifier of the rule group.

            • RuleGroupName — (String)

              The descriptive name of the rule group.

            • Type — (String)

              The type of rule group. A rule group can be stateful or stateless.

          • AwsRdsDbSecurityGroup — (map)

            Details about an Amazon RDS DB security group.

            • DbSecurityGroupArn — (String)

              The ARN for the DB security group.

            • DbSecurityGroupDescription — (String)

              Provides the description of the DB security group.

            • DbSecurityGroupName — (String)

              Specifies the name of the DB security group.

            • Ec2SecurityGroups — (Array<map>)

              Contains a list of EC2 security groups.

              • Ec2SecurityGroupId — (String)

                Specifies the ID for the EC2 security group.

              • Ec2SecurityGroupName — (String)

                Specifies the name of the EC2 security group.

              • Ec2SecurityGroupOwnerId — (String)

                Provides the Amazon Web Services ID of the owner of the EC2 security group.

              • Status — (String)

                Provides the status of the EC2 security group.

            • IpRanges — (Array<map>)

              Contains a list of IP ranges.

              • CidrIp — (String)

                Specifies the IP range.

              • Status — (String)

                Specifies the status of the IP range.

            • OwnerId — (String)

              Provides the Amazon Web Services ID of the owner of a specific DB security group.

            • VpcId — (String)

              Provides VPC ID associated with the DB security group.

          • AwsKinesisStream — (map)

            Details about an Amazon Kinesis data stream.

            • Name — (String)

              The name of the Kinesis stream. If you don't specify a name, CloudFront generates a unique physical ID and uses that ID for the stream name.

            • Arn — (String)

              The Amazon Resource Name (ARN) of the Kinesis data stream.

            • StreamEncryption — (map)

              When specified, enables or updates server-side encryption using an KMS key for a specified stream. Removing this property from your stack template and updating your stack disables encryption.

              • EncryptionType — (String)

                The encryption type to use.

              • KeyId — (String)

                The globally unique identifier for the customer-managed KMS key to use for encryption.

            • ShardCount — (Integer)

              The number of shards that the stream uses.

            • RetentionPeriodHours — (Integer)

              The number of hours for the data records that are stored in shards to remain accessible.

          • AwsEc2TransitGateway — (map)

            Details about an Amazon EC2 transit gateway that interconnects your virtual private clouds (VPC) and on-premises networks.

            • Id — (String)

              The ID of the transit gateway.

            • Description — (String)

              The description of the transit gateway.

            • DefaultRouteTablePropagation — (String)

              Turn on or turn off automatic propagation of routes to the default propagation route table.

            • AutoAcceptSharedAttachments — (String)

              Turn on or turn off automatic acceptance of attachment requests.

            • DefaultRouteTableAssociation — (String)

              Turn on or turn off automatic association with the default association route table.

            • TransitGatewayCidrBlocks — (Array<String>)

              The transit gateway Classless Inter-Domain Routing (CIDR) blocks.

            • AssociationDefaultRouteTableId — (String)

              The ID of the default association route table.

            • PropagationDefaultRouteTableId — (String)

              The ID of the default propagation route table.

            • VpnEcmpSupport — (String)

              Turn on or turn off Equal Cost Multipath Protocol (ECMP) support.

            • DnsSupport — (String)

              Turn on or turn off DNS support.

            • MulticastSupport — (String)

              Indicates whether multicast is supported on the transit gateway.

            • AmazonSideAsn — (Integer)

              A private Autonomous System Number (ASN) for the Amazon side of a BGP session.

          • AwsEfsAccessPoint — (map)

            Details about an Amazon EFS access point. An access point is an application-specific view into an EFS file system that applies an operating system user and group, and a file system path, to any file system request made through the access point.

            • AccessPointId — (String)

              The ID of the Amazon EFS access point.

            • Arn — (String)

              The Amazon Resource Name (ARN) of the Amazon EFS access point.

            • ClientToken — (String)

              The opaque string specified in the request to ensure idempotent creation.

            • FileSystemId — (String)

              The ID of the Amazon EFS file system that the access point applies to.

            • PosixUser — (map)

              The full POSIX identity, including the user ID, group ID, and secondary group IDs on the access point, that is used for all file operations by NFS clients using the access point.

              • Gid — (String)

                The POSIX group ID used for all file system operations using this access point.

              • SecondaryGids — (Array<String>)

                Secondary POSIX group IDs used for all file system operations using this access point.

              • Uid — (String)

                The POSIX user ID used for all file system operations using this access point.

            • RootDirectory — (map)

              The directory on the Amazon EFS file system that the access point exposes as the root directory to NFS clients using the access point.

              • CreationInfo — (map)

                Specifies the POSIX IDs and permissions to apply to the access point's root directory.

                • OwnerGid — (String)

                  Specifies the POSIX group ID to apply to the root directory.

                • OwnerUid — (String)

                  Specifies the POSIX user ID to apply to the root directory.

                • Permissions — (String)

                  Specifies the POSIX permissions to apply to the root directory, in the format of an octal number representing the file's mode bits.

              • Path — (String)

                Specifies the path on the Amazon EFS file system to expose as the root directory to NFS clients using the access point to access the EFS file system. A path can have up to four subdirectories. If the specified path does not exist, you are required to provide CreationInfo.

          • AwsCloudFormationStack — (map)

            Details about an CloudFormation stack. A stack is a collection of Amazon Web Services resources that you can manage as a single unit.

            • Capabilities — (Array<String>)

              The capabilities allowed in the stack.

            • CreationTime — (String)

              The time at which the stack was created.

            • Description — (String)

              A user-defined description associated with the stack.

            • DisableRollback — (Boolean)

              Boolean to enable or disable rollback on stack creation failures.

            • DriftInformation — (map)

              Information about whether a stack's actual configuration differs, or has drifted, from its expected configuration, as defined in the stack template and any values specified as template parameters.

              • StackDriftStatus — (String)

                Status of the stack's actual configuration compared to its expected template configuration.

            • EnableTerminationProtection — (Boolean)

              Whether termination protection is enabled for the stack.

            • LastUpdatedTime — (String)

              The time the nested stack was last updated. This field will only be returned if the stack has been updated at least once.

            • NotificationArns — (Array<String>)

              The Amazon Resource Names (ARNs) of the Amazon SNS topic to which stack-related events are published.

            • Outputs — (Array<map>)

              A list of output structures.

              • Description — (String)

                A user-defined description associated with the output.

              • OutputKey — (String)

                The key associated with the output.

              • OutputValue — (String)

                The value associated with the output.

            • RoleArn — (String)

              The ARN of an IAM role that's associated with the stack.

            • StackId — (String)

              Unique identifier of the stack.

            • StackName — (String)

              The name associated with the stack.

            • StackStatus — (String)

              Current status of the stack.

            • StackStatusReason — (String)

              Success or failure message associated with the stack status.

            • TimeoutInMinutes — (Integer)

              The length of time, in minutes, that CloudFormation waits for the nested stack to reach the CREATE_COMPLETE state.

          • AwsCloudWatchAlarm — (map)

            Details about an Amazon CloudWatch alarm. An alarm allows you to monitor and receive alerts about your Amazon Web Services resources and applications across multiple Regions.

            • ActionsEnabled — (Boolean)

              Indicates whether actions should be executed during any changes to the alarm state.

            • AlarmActions — (Array<String>)

              The list of actions, specified as Amazon Resource Names (ARNs) to execute when this alarm transitions into an ALARM state from any other state.

            • AlarmArn — (String)

              The ARN of the alarm.

            • AlarmConfigurationUpdatedTimestamp — (String)

              The time stamp of the last update to the alarm configuration.

            • AlarmDescription — (String)

              The description of the alarm.

            • AlarmName — (String)

              The name of the alarm. If you don't specify a name, CloudFront generates a unique physical ID and uses that ID for the alarm name.

            • ComparisonOperator — (String)

              The arithmetic operation to use when comparing the specified statistic and threshold. The specified statistic value is used as the first operand.

            • DatapointsToAlarm — (Integer)

              The number of datapoints that must be breaching to trigger the alarm.

            • Dimensions — (Array<map>)

              The dimensions for the metric associated with the alarm.

              • Name — (String)

                The name of a dimension.

              • Value — (String)

                The value of a dimension.

            • EvaluateLowSampleCountPercentile — (String)

              Used only for alarms based on percentiles. If ignore, the alarm state does not change during periods with too few data points to be statistically significant. If evaluate or this parameter is not used, the alarm is always evaluated and possibly changes state no matter how many data points are available.

            • EvaluationPeriods — (Integer)

              The number of periods over which data is compared to the specified threshold.

            • ExtendedStatistic — (String)

              The percentile statistic for the metric associated with the alarm.

            • InsufficientDataActions — (Array<String>)

              The actions to execute when this alarm transitions to the INSUFFICIENT_DATA state from any other state. Each action is specified as an ARN.

            • MetricName — (String)

              The name of the metric associated with the alarm. This is required for an alarm based on a metric. For an alarm based on a math expression, you use Metrics instead and you can't specify MetricName.

            • Namespace — (String)

              The namespace of the metric associated with the alarm. This is required for an alarm based on a metric. For an alarm based on a math expression, you can't specify Namespace and you use Metrics instead.

            • OkActions — (Array<String>)

              The actions to execute when this alarm transitions to the OK state from any other state. Each action is specified as an ARN.

            • Period — (Integer)

              The period, in seconds, over which the statistic is applied. This is required for an alarm based on a metric.

            • Statistic — (String)

              The statistic for the metric associated with the alarm, other than percentile. For percentile statistics, use ExtendedStatistic.

              For an alarm based on a metric, you must specify either Statistic or ExtendedStatistic but not both.

              For an alarm based on a math expression, you can't specify Statistic. Instead, you use Metrics.

            • Threshold — (Float)

              The value to compare with the specified statistic.

            • ThresholdMetricId — (String)

              n an alarm based on an anomaly detection model, this is the ID of the ANOMALY_DETECTION_BAND function used as the threshold for the alarm.

            • TreatMissingData — (String)

              Sets how this alarm is to handle missing data points.

            • Unit — (String)

              The unit of the metric associated with the alarm.

          • AwsEc2VpcPeeringConnection — (map)

            Details about an Amazon EC2 VPC peering connection. A VPC peering connection is a networking connection between two VPCs that enables you to route traffic between them privately.

            • AccepterVpcInfo — (map)

              Information about the accepter VPC.

              • CidrBlock — (String)

                The IPv4 CIDR block for the VPC.

              • CidrBlockSet — (Array<map>)

                Information about the IPv4 CIDR blocks for the VPC.

                • CidrBlock — (String)

                  The IPv4 CIDR block for the VPC.

              • Ipv6CidrBlockSet — (Array<map>)

                The IPv6 CIDR block for the VPC.

                • Ipv6CidrBlock — (String)

                  The IPv6 CIDR block for the VPC.

              • OwnerId — (String)

                The ID of the Amazon Web Services account that owns the VPC.

              • PeeringOptions — (map)

                Information about the VPC peering connection options for the accepter or requester VPC.

                • AllowDnsResolutionFromRemoteVpc — (Boolean)

                  Indicates whether a local VPC can resolve public DNS hostnames to private IP addresses when queried from instances in a peer VPC.

                • AllowEgressFromLocalClassicLinkToRemoteVpc — (Boolean)

                  Indicates whether a local ClassicLink connection can communicate with the peer VPC over the VPC peering connection.

                • AllowEgressFromLocalVpcToRemoteClassicLink — (Boolean)

                  Indicates whether a local VPC can communicate with a ClassicLink connection in the peer VPC over the VPC peering connection.

              • Region — (String)

                The Amazon Web Services Region in which the VPC is located.

              • VpcId — (String)

                The ID of the VPC.

            • ExpirationTime — (String)

              The time at which an unaccepted VPC peering connection will expire.

            • RequesterVpcInfo — (map)

              Information about the requester VPC.

              • CidrBlock — (String)

                The IPv4 CIDR block for the VPC.

              • CidrBlockSet — (Array<map>)

                Information about the IPv4 CIDR blocks for the VPC.

                • CidrBlock — (String)

                  The IPv4 CIDR block for the VPC.

              • Ipv6CidrBlockSet — (Array<map>)

                The IPv6 CIDR block for the VPC.

                • Ipv6CidrBlock — (String)

                  The IPv6 CIDR block for the VPC.

              • OwnerId — (String)

                The ID of the Amazon Web Services account that owns the VPC.

              • PeeringOptions — (map)

                Information about the VPC peering connection options for the accepter or requester VPC.

                • AllowDnsResolutionFromRemoteVpc — (Boolean)

                  Indicates whether a local VPC can resolve public DNS hostnames to private IP addresses when queried from instances in a peer VPC.

                • AllowEgressFromLocalClassicLinkToRemoteVpc — (Boolean)

                  Indicates whether a local ClassicLink connection can communicate with the peer VPC over the VPC peering connection.

                • AllowEgressFromLocalVpcToRemoteClassicLink — (Boolean)

                  Indicates whether a local VPC can communicate with a ClassicLink connection in the peer VPC over the VPC peering connection.

              • Region — (String)

                The Amazon Web Services Region in which the VPC is located.

              • VpcId — (String)

                The ID of the VPC.

            • Status — (map)

              The status of the VPC peering connection.

              • Code — (String)

                The status of the VPC peering connection.

              • Message — (String)

                A message that provides more information about the status, if applicable.

            • VpcPeeringConnectionId — (String)

              The ID of the VPC peering connection.

          • AwsWafRegionalRuleGroup — (map)

            Details about an WAF rule group for Regional resources.

            • MetricName — (String)

              A name for the metrics for this rule group.

            • Name — (String)

              The descriptive name of the rule group.

            • RuleGroupId — (String)

              The ID of the rule group.

            • Rules — (Array<map>)

              Provides information about the rule statements used to identify the web requests that you want to allow, block, or count.

              • Action — (map)

                The action that WAF should take on a web request when it matches the criteria defined in the rule.

                • Type — (String)

                  Specifies the ByteMatchSet, IPSet, SqlInjectionMatchSet, XssMatchSet, RegexMatchSet, GeoMatchSet, and SizeConstraintSet objects that you want to add to a rule and, for each object, indicates whether you want to negate the settings.

              • Priority — (Integer)

                If you define more than one rule in a web ACL, WAF evaluates each request against the rules in order based on the value of Priority.

              • RuleId — (String)

                The ID for a rule.

              • Type — (String)

                The type of rule in the rule group.

          • AwsWafRegionalRule — (map)

            Details about an WAF rule for Regional resources.

            • MetricName — (String)

              A name for the metrics for the rule.

            • Name — (String)

              A descriptive name for the rule.

            • PredicateList — (Array<map>)

              Specifies the ByteMatchSet, IPSet, SqlInjectionMatchSet, XssMatchSet, RegexMatchSet, GeoMatchSet, and SizeConstraintSet objects that you want to add to a rule and, for each object, indicates whether you want to negate the settings.

              • DataId — (String)

                A unique identifier for a predicate in a rule, such as ByteMatchSetId or IPSetId.

              • Negated — (Boolean)

                Specifies if you want WAF to allow, block, or count requests based on the settings in the ByteMatchSet, IPSet, SqlInjectionMatchSet, XssMatchSet, RegexMatchSet, GeoMatchSet, or SizeConstraintSet.

              • Type — (String)

                The type of predicate in a rule, such as ByteMatch or IPSet.

            • RuleId — (String)

              The ID of the rule.

          • AwsWafRegionalWebAcl — (map)

            Details about an WAF web access control list (web ACL) for Regional resources.

            • DefaultAction — (String)

              The action to perform if none of the rules contained in the web ACL match.

            • MetricName — (String)

              A name for the metrics for this web ACL.

            • Name — (String)

              A descriptive name for the web ACL.

            • RulesList — (Array<map>)

              An array that contains the action for each rule in a web ACL, the priority of the rule, and the ID of the rule.

              • Action — (map)

                The action that WAF takes when a web request matches all conditions in the rule, such as allow, block, or count the request.

                • Type — (String)

                  For actions that are associated with a rule, the action that WAF takes when a web request matches all conditions in a rule.

              • OverrideAction — (map)

                Overrides the rule evaluation result in the rule group.

                • Type — (String)

                  Overrides the rule evaluation result in the rule group.

              • Priority — (Integer)

                The order in which WAF evaluates the rules in a web ACL.

              • RuleId — (String)

                The ID of an WAF Regional rule to associate with a web ACL.

              • Type — (String)

                For actions that are associated with a rule, the action that WAF takes when a web request matches all conditions in a rule.

            • WebAclId — (String)

              The ID of the web ACL.

          • AwsWafRule — (map)

            Details about an WAF rule for global resources.

            • MetricName — (String)

              The name of the metrics for this rule.

            • Name — (String)

              A descriptive name for the rule.

            • PredicateList — (Array<map>)

              Specifies the ByteMatchSet, IPSet, SqlInjectionMatchSet, XssMatchSet, RegexMatchSet, GeoMatchSet, and SizeConstraintSet objects that you want to add to a rule and, for each object, indicates whether you want to negate the settings.

              • DataId — (String)

                A unique identifier for a predicate in a rule, such as ByteMatchSetId or IPSetId.

              • Negated — (Boolean)

                Specifies if you want WAF to allow, block, or count requests based on the settings in the ByteMatchSet, IPSet, SqlInjectionMatchSet, XssMatchSet, RegexMatchSet, GeoMatchSet, or SizeConstraintSet.

              • Type — (String)

                The type of predicate in a rule, such as ByteMatch or IPSet.

            • RuleId — (String)

              The ID of the WAF rule.

          • AwsWafRuleGroup — (map)

            Details about an WAF rule group for global resources.

            • MetricName — (String)

              The name of the metrics for this rule group.

            • Name — (String)

              The name of the rule group.

            • RuleGroupId — (String)

              The ID of the rule group.

            • Rules — (Array<map>)

              Provides information about the rules attached to the rule group. These rules identify the web requests that you want to allow, block, or count.

              • Action — (map)

                Provides information about what action WAF should take on a web request when it matches the criteria defined in the rule.

                • Type — (String)

                  The action that WAF should take on a web request when it matches the rule's statement.

              • Priority — (Integer)

                If you define more than one rule in a web ACL, WAF evaluates each request against the rules in order based on the value of Priority.

              • RuleId — (String)

                The rule ID for a rule.

              • Type — (String)

                The type of rule.

          • AwsEcsTask — (map)

            Details about a task in a cluster.

            • ClusterArn — (String)

              The Amazon Resource Name (ARN) of the cluster that hosts the task.

            • TaskDefinitionArn — (String)

              The ARN of the task definition that creates the task.

            • Version — (String)

              The version counter for the task.

            • CreatedAt — (String)

              The Unix timestamp for the time when the task was created. More specifically, it's for the time when the task entered the PENDING state.

            • StartedAt — (String)

              The Unix timestamp for the time when the task started. More specifically, it's for the time when the task transitioned from the PENDING state to the RUNNING state.

            • StartedBy — (String)

              The tag specified when a task is started. If an Amazon ECS service started the task, the startedBy parameter contains the deployment ID of that service.

            • Group — (String)

              The name of the task group that's associated with the task.

            • Volumes — (Array<map>)

              Details about the data volume that is used in a task definition.

              • Name — (String)

                The name of the volume. Up to 255 letters (uppercase and lowercase), numbers, underscores, and hyphens are allowed. This name is referenced in the sourceVolume parameter of container definition mountPoints.

              • Host — (map)

                This parameter is specified when you use bind mount host volumes. The contents of the host parameter determine whether your bind mount host volume persists on the host container instance and where it's stored.

                • SourcePath — (String)

                  When the host parameter is used, specify a sourcePath to declare the path on the host container instance that's presented to the container.

            • Containers — (Array<map>)

              The containers that are associated with the task.

              • Name — (String)

                The name of the container.

              • Image — (String)

                The image used for the container.

              • MountPoints — (Array<map>)

                The mount points for data volumes in your container.

                • SourceVolume — (String)

                  The name of the volume to mount. Must be a volume name referenced in the name parameter of task definition volume.

                • ContainerPath — (String)

                  The path on the container to mount the host volume at.

              • Privileged — (Boolean)

                When this parameter is true, the container is given elevated privileges on the host container instance (similar to the root user).

          • AwsBackupBackupVault — (map)

            Provides details about an Backup backup vault.

            • BackupVaultArn — (String)

              An Amazon Resource Name (ARN) that uniquely identifies a backup vault.

            • BackupVaultName — (String)

              The name of a logical container where backups are stored. Backup vaults are identified by names that are unique to the Amazon Web Services account used to create them and the Amazon Web Services Region where they are created. They consist of lowercase letters, numbers, and hyphens.

            • EncryptionKeyArn — (String)

              The unique ARN associated with the server-side encryption key. You can specify a key to encrypt your backups from services that support full Backup management. If you do not specify a key, Backup creates an KMS key for you by default.

            • Notifications — (map)

              The Amazon SNS event notifications for the specified backup vault.

              • BackupVaultEvents — (Array<String>)

                An array of events that indicate the status of jobs to back up resources to the backup vault. The following events are supported:

                • BACKUP_JOB_STARTED | BACKUP_JOB_COMPLETED

                • COPY_JOB_STARTED | COPY_JOB_SUCCESSFUL | COPY_JOB_FAILED

                • RESTORE_JOB_STARTED | RESTORE_JOB_COMPLETED | RECOVERY_POINT_MODIFIED

                • S3_BACKUP_OBJECT_FAILED | S3_RESTORE_OBJECT_FAILED

              • SnsTopicArn — (String)

                The Amazon Resource Name (ARN) that uniquely identifies the Amazon SNS topic for a backup vault's events.

            • AccessPolicy — (String)

              A resource-based policy that is used to manage access permissions on the target backup vault.

          • AwsBackupBackupPlan — (map)

            Provides details about an Backup backup plan.

            • BackupPlan — (map)

              Uniquely identifies the backup plan to be associated with the selection of resources.

              • BackupPlanName — (String)

                The display name of a backup plan.

              • AdvancedBackupSettings — (Array<map>)

                A list of backup options for each resource type.

                • BackupOptions — (map<String>)

                  Specifies the backup option for a selected resource. This option is only available for Windows Volume Shadow Copy Service (VSS) backup jobs. Valid values are as follows:

                  • Set to WindowsVSS: enabled to enable the WindowsVSS backup option and create a Windows VSS backup.

                  • Set to WindowsVSS: disabled to create a regular backup. The WindowsVSS option is not enabled by default.

                • ResourceType — (String)

                  The name of a resource type. The only supported resource type is Amazon EC2 instances with Windows VSS.

                  The only valid value is EC2.

              • BackupPlanRule — (Array<map>)

                An array of BackupRule objects, each of which specifies a scheduled task that is used to back up a selection of resources.

                • TargetBackupVault — (String)

                  The name of a logical container where backups are stored. Backup vaults are identified by names that are unique to the Amazon Web Services account used to create them and the Amazon Web Services Region where they are created. They consist of letters, numbers, and hyphens.

                • StartWindowMinutes — (Integer)

                  A value in minutes after a backup is scheduled before a job will be canceled if it doesn't start successfully.

                • ScheduleExpression — (String)

                  A cron expression in UTC specifying when Backup initiates a backup job.

                • RuleName — (String)

                  A display name for a backup rule. Must contain 1 to 50 alphanumeric or '-_.' characters.

                • RuleId — (String)

                  Uniquely identifies a rule that is used to schedule the backup of a selection of resources.

                • EnableContinuousBackup — (Boolean)

                  Specifies whether Backup creates continuous backups capable of point-in-time restore (PITR).

                • CompletionWindowMinutes — (Integer)

                  A value in minutes after a backup job is successfully started before it must be completed, or it is canceled by Backup.

                • CopyActions — (Array<map>)

                  An array of CopyAction objects, each of which contains details of the copy operation.

                  • DestinationBackupVaultArn — (String)

                    An Amazon Resource Name (ARN) that uniquely identifies the destination backup vault for the copied backup.

                  • Lifecycle — (map)

                    Defines when a protected resource is transitioned to cold storage and when it expires. Backup transitions and expires backups automatically according to the lifecycle that you define. If you do not specify a lifecycle, Backup applies the lifecycle policy of the source backup to the destination backup.

                    Backups transitioned to cold storage must be stored in cold storage for a minimum of 90 days.

                    • DeleteAfterDays — (Integer)

                      Specifies the number of days after creation that a recovery point is deleted. Must be greater than 90 days plus MoveToColdStorageAfterDays.

                    • MoveToColdStorageAfterDays — (Integer)

                      Specifies the number of days after creation that a recovery point is moved to cold storage.

                • Lifecycle — (map)

                  Defines when a protected resource is transitioned to cold storage and when it expires. Backup transitions and expires backups automatically according to the lifecycle that you define. If you do not specify a lifecycle, Backup applies the lifecycle policy of the source backup to the destination backup.

                  Backups transitioned to cold storage must be stored in cold storage for a minimum of 90 days.

                  • DeleteAfterDays — (Integer)

                    Specifies the number of days after creation that a recovery point is deleted. Must be greater than 90 days plus MoveToColdStorageAfterDays.

                  • MoveToColdStorageAfterDays — (Integer)

                    Specifies the number of days after creation that a recovery point is moved to cold storage.

            • BackupPlanArn — (String)

              An Amazon Resource Name (ARN) that uniquely identifies the backup plan.

            • BackupPlanId — (String)

              A unique ID for the backup plan.

            • VersionId — (String)

              Unique, randomly generated, Unicode, UTF-8 encoded strings. Version IDs cannot be edited.

          • AwsBackupRecoveryPoint — (map)

            Provides details about an Backup backup, or recovery point.

            • BackupSizeInBytes — (Integer)

              The size, in bytes, of a backup.

            • BackupVaultArn — (String)

              An Amazon Resource Name (ARN) that uniquely identifies a backup vault.

            • BackupVaultName — (String)

              The name of a logical container where backups are stored. Backup vaults are identified by names that are unique to the Amazon Web Services account used to create them and the Amazon Web Services Region where they are created. They consist of lowercase letters, numbers, and hyphens.

            • CalculatedLifecycle — (map)

              A CalculatedLifecycle object containing DeleteAt and MoveToColdStorageAt timestamps.

              • DeleteAt — (String)

                Specifies the number of days after creation that a recovery point is deleted. Must be greater than 90 days plus MoveToColdStorageAfterDays.

              • MoveToColdStorageAt — (String)

                Specifies the number of days after creation that a recovery point is moved to cold storage.

            • CompletionDate — (String)

              The date and time that a job to create a recovery point is completed, in Unix format and UTC. The value of CompletionDate is accurate to milliseconds. For example, the value 1516925490.087 represents Friday, January 26, 2018 12:11:30.087 AM.

            • CreatedBy — (map)

              Contains identifying information about the creation of a recovery point, including the BackupPlanArn, BackupPlanId, BackupPlanVersion, and BackupRuleId of the backup plan that is used to create it.

              • BackupPlanArn — (String)

                An Amazon Resource Name (ARN) that uniquely identifies a backup plan.

              • BackupPlanId — (String)

                Uniquely identifies a backup plan.

              • BackupPlanVersion — (String)

                Unique, randomly generated, Unicode, UTF-8 encoded strings that are at most 1,024 bytes long. Version IDs cannot be edited.

              • BackupRuleId — (String)

                Uniquely identifies a rule used to schedule the backup of a selection of resources.

            • CreationDate — (String)

              The date and time a recovery point is created, in Unix format and UTC. The value of CreationDate is accurate to milliseconds. For example, the value 1516925490.087 represents Friday, January 26, 2018 12:11:30.087 AM.

            • EncryptionKeyArn — (String)

              The ARN for the server-side encryption key that is used to protect your backups.

            • IamRoleArn — (String)

              Specifies the IAM role ARN used to create the target recovery point

            • IsEncrypted — (Boolean)

              A Boolean value that is returned as TRUE if the specified recovery point is encrypted, or FALSE if the recovery point is not encrypted.

            • LastRestoreTime — (String)

              The date and time that a recovery point was last restored, in Unix format and UTC. The value of LastRestoreTime is accurate to milliseconds. For example, the value 1516925490.087 represents Friday, January 26, 2018 12:11:30.087 AM.

            • Lifecycle — (map)

              The lifecycle defines when a protected resource is transitioned to cold storage and when it expires. Backup transitions and expires backups automatically according to the lifecycle that you define

              • DeleteAfterDays — (Integer)

                Specifies the number of days after creation that a recovery point is deleted. Must be greater than 90 days plus MoveToColdStorageAfterDays.

              • MoveToColdStorageAfterDays — (Integer)

                Specifies the number of days after creation that a recovery point is moved to cold storage.

            • RecoveryPointArn — (String)

              An ARN that uniquely identifies a recovery point.

            • ResourceArn — (String)

              An ARN that uniquely identifies a resource. The format of the ARN depends on the resource type.

            • ResourceType — (String)

              The type of Amazon Web Services resource saved as a recovery point, such as an Amazon EBS volume or an Amazon RDS database.

            • SourceBackupVaultArn — (String)

              The ARN for the backup vault where the recovery point was originally copied from. If the recovery point is restored to the same account, this value will be null.

            • Status — (String)

              A status code specifying the state of the recovery point. Valid values are as follows:

              • COMPLETED

              • DELETING

              • EXPIRED

              • PARTIAL

            • StatusMessage — (String)

              A message explaining the reason of the recovery point deletion failure.

            • StorageClass — (String)

              Specifies the storage class of the recovery point. Valid values are as follows:

              • COLD

              • DELETED

              • WARM

          • AwsEc2LaunchTemplate — (map)

            Specifies the properties for creating an Amazon Elastic Compute Cloud (Amazon EC2) launch template.

            • LaunchTemplateName — (String)

              A name for the launch template.

            • Id — (String)

              An ID for the launch template.

            • LaunchTemplateData — (map)

              The information to include in the launch template.

              • BlockDeviceMappingSet — (Array<map>)

                Information about a block device mapping for an Amazon EC2 launch template.

                • DeviceName — (String)

                  The device name.

                • Ebs — (map)

                  Parameters used to automatically set up Amazon EBS volumes when the instance is launched.

                  • DeleteOnTermination — (Boolean)

                    Indicates whether the EBS volume is deleted on instance termination.

                  • Encrypted — (Boolean)

                    Indicates whether the EBS volume is encrypted. Encrypted volumes can only be attached to instances that support Amazon EBS encryption. If you're creating a volume from a snapshot, you can't specify an encryption value.

                  • Iops — (Integer)

                    The number of I/O operations per second (IOPS).

                  • KmsKeyId — (String)

                    The Amazon Resource Name (ARN) of the symmetric Key Management Service (KMS) customer managed key used for encryption.

                  • SnapshotId — (String)

                    The ID of the EBS snapshot.

                  • Throughput — (Integer)

                    The throughput to provision for a gp3 volume, with a maximum of 1,000 MiB/s.

                  • VolumeSize — (Integer)

                    The size of the volume, in GiBs. You must specify either a snapshot ID or a volume size.

                  • VolumeType — (String)

                    The volume type.

                • NoDevice — (String)

                  Omits the device from the block device mapping when an empty string is specified.

                • VirtualName — (String)

                  The virtual device name (ephemeralN). Instance store volumes are numbered starting from 0. An instance type with 2 available instance store volumes can specify mappings for ephemeral0 and ephemeral1. The number of available instance store volumes depends on the instance type.

              • CapacityReservationSpecification — (map)

                Specifies an instance's Capacity Reservation targeting option. You can specify only one option at a time.

                • CapacityReservationPreference — (String)

                  Indicates the instance's Capacity Reservation preferences. If equal to open, the instance can run in any open Capacity Reservation that has matching attributes (instance type, platform, Availability Zone). If equal to none, the instance avoids running in a Capacity Reservation even if one is available. The instance runs in On-Demand capacity.

                • CapacityReservationTarget — (map)

                  Specifies a target Capacity Reservation.

                  • CapacityReservationId — (String)

                    The ID of the Capacity Reservation in which to run the instance.

                  • CapacityReservationResourceGroupArn — (String)

                    The Amazon Resource Name (ARN) of the Capacity Reservation resource group in which to run the instance.

              • CpuOptions — (map)

                Specifies the CPU options for an instance. For more information, see Optimize CPU options in the Amazon Elastic Compute Cloud User Guide.

                • CoreCount — (Integer)

                  The number of CPU cores for the instance.

                • ThreadsPerCore — (Integer)

                  The number of threads per CPU core. A value of 1 disables multithreading for the instance, The default value is 2.

              • CreditSpecification — (map)

                Specifies the credit option for CPU usage of a T2, T3, or T3a instance.

                • CpuCredits — (String)

                  The credit option for CPU usage of a T instance.

              • DisableApiStop — (Boolean)

                Indicates whether to enable the instance for stop protection. For more information, see Enable stop protection in the Amazon EC2 User Guide.

              • DisableApiTermination — (Boolean)

                If you set this parameter to true, you can't terminate the instance using the Amazon EC2 console, CLI, or API. If set to true, you can.

              • EbsOptimized — (Boolean)

                Indicates whether the instance is optimized for Amazon EBS I/O.

              • ElasticGpuSpecificationSet — (Array<map>)

                Provides details about Elastic Graphics accelerators to associate with the instance.

                • Type — (String)

                  The type of Elastic Graphics accelerator.

              • ElasticInferenceAcceleratorSet — (Array<map>)

                The Amazon Elastic Inference accelerator for the instance.

                • Count — (Integer)

                  The number of Elastic Inference accelerators to attach to the instance.

                • Type — (String)

                  The type of Elastic Inference accelerator.

              • EnclaveOptions — (map)

                Indicates whether the Amazon EC2 instance is enabled for Amazon Web Services Nitro Enclaves.

                • Enabled — (Boolean)

                  If this parameter is set to true, the instance is enabled for Amazon Web Services Nitro Enclaves.

              • HibernationOptions — (map)

                Specifies whether your Amazon EC2 instance is configured for hibernation.

                • Configured — (Boolean)

                  If you set this parameter to true, the instance is enabled for hibernation.

              • IamInstanceProfile — (map)

                The name or Amazon Resource Name (ARN) of an IAM instance profile.

                • Arn — (String)

                  The Amazon Resource Name (ARN) of the instance profile.

                • Name — (String)

                  The name of the instance profile.

              • ImageId — (String)

                The ID of the Amazon Machine Image (AMI).

              • InstanceInitiatedShutdownBehavior — (String)

                Provides the options for specifying the instance initiated shutdown behavior.

              • InstanceMarketOptions — (map)

                Specifies the market (purchasing) option for an instance.

                • MarketType — (String)

                  The market type.

                • SpotOptions — (map)

                  The options for Spot Instances.

                  • BlockDurationMinutes — (Integer)

                    Deprecated.

                  • InstanceInterruptionBehavior — (String)

                    The behavior when a Spot Instance is interrupted.

                  • MaxPrice — (String)

                    The maximum hourly price you're willing to pay for the Spot Instances.

                  • SpotInstanceType — (String)

                    The Spot Instance request type.

                  • ValidUntil — (String)

                    The end date of the request, in UTC format (YYYY-MM-DDTHH:MM:SSZ), for persistent requests.

              • InstanceRequirements — (map)

                The attributes for the instance types. When you specify instance attributes, Amazon EC2 will identify instance types with these attributes. If you specify InstanceRequirements, you can't specify InstanceType.

                • AcceleratorCount — (map)

                  The minimum and maximum number of accelerators (GPUs, FPGAs, or Amazon Web Services Inferentia chips) on an instance.

                  • Max — (Integer)

                    The maximum number of accelerators. If this parameter isn't specified, there's no maximum limit. To exclude accelerator-enabled instance types, set Max to 0.

                  • Min — (Integer)

                    The minimum number of accelerators. If this parameter isn't specified, there's no minimum limit.

                • AcceleratorManufacturers — (Array<String>)

                  Indicates whether instance types must have accelerators by specific manufacturers.

                • AcceleratorNames — (Array<String>)

                  The accelerators that must be on the instance type.

                • AcceleratorTotalMemoryMiB — (map)

                  The minimum and maximum amount of total accelerator memory, in MiB.

                  • Max — (Integer)

                    The maximum amount of memory, in MiB. If this parameter isn't specified, there's no maximum limit.

                  • Min — (Integer)

                    The minimum amount of memory, in MiB. If 0 is specified, there's no maximum limit.

                • AcceleratorTypes — (Array<String>)

                  The accelerator types that must be on the instance type.

                • BareMetal — (String)

                  Indicates whether bare metal instance types must be included, excluded, or required.

                • BaselineEbsBandwidthMbps — (map)

                  The minimum and maximum baseline bandwidth to Amazon EBS, in Mbps. For more information, see Amazon EBS optimized instances in the Amazon EC2 User Guide.

                  • Max — (Integer)

                    The maximum baseline bandwidth, in Mbps. If this parameter is omitted, there's no maximum limit.

                  • Min — (Integer)

                    The minimum baseline bandwidth, in Mbps. If this parameter is omitted, there's no minimum limit.

                • BurstablePerformance — (String)

                  Indicates whether burstable performance T instance types are included, excluded, or required. For more information, Burstable performance instances in the Amazon EC2 User Guide.

                • CpuManufacturers — (Array<String>)

                  The CPU manufacturers to include.

                • ExcludedInstanceTypes — (Array<String>)

                  The instance types to exclude.

                • InstanceGenerations — (Array<String>)

                  Indicates whether current or previous generation instance types are included.

                • LocalStorage — (String)

                  Indicates whether instance types with instance store volumes are included, excluded, or required. For more information, see Amazon EC2 instance store in the Amazon EC2 User Guide.

                • LocalStorageTypes — (Array<String>)

                  The type of local storage that is required.

                • MemoryGiBPerVCpu — (map)

                  The minimum and maximum amount of memory per vCPU, in GiB.

                  • Max — (Float)

                    The maximum amount of memory per vCPU, in GiB. If this parameter is omitted, there's no maximum limit.

                  • Min — (Float)

                    The minimum amount of memory per vCPU, in GiB. If this parameter is omitted, there's no maximum limit.

                • MemoryMiB — (map)

                  The minimum and maximum amount of memory, in MiB.

                  • Max — (Integer)

                    The maximum amount of memory, in MiB.

                  • Min — (Integer)

                    The minimum amount of memory, in MiB.

                • NetworkInterfaceCount — (map)

                  The minimum and maximum number of network interfaces.

                  • Max — (Integer)

                    The maximum number of network interfaces.

                  • Min — (Integer)

                    The minimum number of network interfaces.

                • OnDemandMaxPricePercentageOverLowestPrice — (Integer)

                  The price protection threshold for On-Demand Instances. This is the maximum you'll pay for an On-Demand Instance, expressed as a percentage above the least expensive current generation M, C, or R instance type with your specified attributes. When Amazon EC2 selects instance types with your attributes, it excludes instance types priced above your threshold.

                  The parameter accepts an integer, which Amazon EC2 interprets as a percentage.

                  A high value, such as 999999, turns off price protection.

                • RequireHibernateSupport — (Boolean)

                  Indicates whether instance types must support hibernation for On-Demand Instances.

                • SpotMaxPricePercentageOverLowestPrice — (Integer)

                  The price protection threshold for Spot Instances. This is the maximum you'll pay for a Spot Instance, expressed as a percentage above the least expensive current generation M, C, or R instance type with your specified attributes. When Amazon EC2 selects instance types with your attributes, it excludes instance types priced above your threshold.

                  The parameter accepts an integer, which Amazon EC2 interprets as a percentage.

                  A high value, such as 999999, turns off price protection.

                • TotalLocalStorageGB — (map)

                  The minimum and maximum amount of total local storage, in GB.

                  • Max — (Float)

                    The maximum amount of total local storage, in GB.

                  • Min — (Float)

                    The minimum amount of total local storage, in GB.

                • VCpuCount — (map)

                  The minimum and maximum number of vCPUs.

                  • Max — (Integer)

                    The maximum number of vCPUs.

                  • Min — (Integer)

                    The minimum number of vCPUs.

              • InstanceType — (String)

                The instance type. For more information, see Instance types in the Amazon EC2 User Guide. If you specify InstanceType, you can't specify InstanceRequirements.

              • KernelId — (String)

                The ID of the kernel.

              • KeyName — (String)

                The name of the key pair that allows users to connect to the instance.

              • LicenseSet — (Array<map>)

                Specifies a license configuration for an instance.

                • LicenseConfigurationArn — (String)

                  The Amazon Resource Name (ARN) of the license configuration.

              • MaintenanceOptions — (map)

                The maintenance options of your instance.

                • AutoRecovery — (String)

                  Disables the automatic recovery behavior of your instance or sets it to default.

              • MetadataOptions — (map)

                The metadata options for the instance. For more information, see Instance metadata and user data in the Amazon EC2 User Guide.

                • HttpEndpoint — (String)

                  Enables or disables the HTTP metadata endpoint on your instances. If the parameter is not specified, the default state is enabled, and you won't be able to access your instance metadata.

                • HttpProtocolIpv6 — (String)

                  Enables or disables the IPv6 endpoint for the instance metadata service.

                • HttpTokens — (String)

                  The state of token usage for your instance metadata requests.

                • HttpPutResponseHopLimit — (Integer)

                  The desired HTTP PUT response hop limit for instance metadata requests. The larger the number, the further instance metadata requests can travel.

                • InstanceMetadataTags — (String)

                  When set to enabled, this parameter allows access to instance tags from the instance metadata. When set to disabled, it turns off access to instance tags from the instance metadata. For more information, see Work with instance tags in instance metadata in the Amazon EC2 User Guide.

              • Monitoring — (map)

                The monitoring for the instance.

              • NetworkInterfaceSet — (Array<map>)

                Specifies the parameters for a network interface that is attached to the instance.

                • AssociateCarrierIpAddress — (Boolean)

                  Indicates whether to associate a Carrier IP address with eth0 for a new network interface. You use this option when you launch an instance in a Wavelength Zone and want to associate a Carrier IP address with the network interface. For more information, see Carrier IP address in the Wavelength Developer Guide.

                • AssociatePublicIpAddress — (Boolean)

                  Associates a public IPv4 address with eth0 for a new network interface.

                • DeleteOnTermination — (Boolean)

                  Indicates whether the network interface is deleted when the instance is terminated.

                • Description — (String)

                  A description for the network interface.

                • DeviceIndex — (Integer)

                  The device index for the network interface attachment.

                • Groups — (Array<String>)

                  The IDs of one or more security groups.

                • InterfaceType — (String)

                  The type of network interface.

                • Ipv4PrefixCount — (Integer)

                  The number of IPv4 prefixes to be automatically assigned to the network interface. You cannot use this option if you use the Ipv4Prefixes option.

                • Ipv4Prefixes — (Array<map>)

                  One or more IPv4 prefixes to be assigned to the network interface. You cannot use this option if you use the Ipv4PrefixCount option.

                • Ipv6AddressCount — (Integer)

                  The number of IPv6 addresses to assign to a network interface. Amazon EC2 automatically selects the IPv6 addresses from the subnet range. You can't use this option if you use Ipv6Addresses.

                • Ipv6Addresses — (Array<map>)

                  One or more specific IPv6 addresses from the IPv6 CIDR block range of your subnet. You can't use this option if you use Ipv6AddressCount.

                  • Ipv6Address — (String)

                    One or more specific IPv6 addresses from the IPv6 CIDR block range of your subnet.

                • Ipv6PrefixCount — (Integer)

                  The number of IPv6 prefixes to be automatically assigned to the network interface. You cannot use this option if you use the Ipv6Prefix option.

                • Ipv6Prefixes — (Array<map>)

                  One or more IPv6 prefixes to be assigned to the network interface. You cannot use this option if you use the Ipv6PrefixCount option.

                  • Ipv6Prefix — (String)

                    The IPv6 prefix.

                • NetworkCardIndex — (Integer)

                  The index of the network card. Some instance types support multiple network cards. The primary network interface must be assigned to network card index 0. The default is network card index 0.

                • NetworkInterfaceId — (String)

                  The ID of the network interface.

                • PrivateIpAddress — (String)

                  The primary private IPv4 address of the network interface.

                • PrivateIpAddresses — (Array<map>)

                  One or more private IPv4 addresses.

                  • Primary — (Boolean)

                    Indicates whether the private IPv4 address is the primary private IPv4 address. Only one IPv4 address can be designated as primary.

                  • PrivateIpAddress — (String)

                    The private IPv4 address.

                • SecondaryPrivateIpAddressCount — (Integer)

                  The number of secondary private IPv4 addresses to assign to a network interface.

                • SubnetId — (String)

                  The ID of the subnet for the network interface.

              • Placement — (map)

                Specifies the placement of an instance.

                • Affinity — (String)

                  The affinity setting for an instance on an EC2 Dedicated Host.

                • AvailabilityZone — (String)

                  The Availability Zone for the instance.

                • GroupName — (String)

                  The name of the placement group for the instance.

                • HostId — (String)

                  The ID of the Dedicated Host for the instance.

                • HostResourceGroupArn — (String)

                  The Amazon Resource Name (ARN) of the host resource group in which to launch the instances.

                • PartitionNumber — (Integer)

                  The number of the partition the instance should launch in.

                • SpreadDomain — (String)

                  Reserved for future use.

                • Tenancy — (String)

                  The tenancy of the instance (if the instance is running in a VPC). An instance with a tenancy of dedicated runs on single-tenant hardware.

              • PrivateDnsNameOptions — (map)

                The options for the instance hostname.

                • EnableResourceNameDnsAAAARecord — (Boolean)

                  Indicates whether to respond to DNS queries for instance hostnames with DNS AAAA records.

                • EnableResourceNameDnsARecord — (Boolean)

                  Indicates whether to respond to DNS queries for instance hostnames with DNS A records.

                • HostnameType — (String)

                  The type of hostname for EC2 instances.

              • RamDiskId — (String)

                The ID of the RAM disk.

              • SecurityGroupIdSet — (Array<String>)

                One or more security group IDs.

              • SecurityGroupSet — (Array<String>)

                One or more security group names. For a nondefault VPC, you must use security group IDs instead. You cannot specify both a security group ID and security name in the same request.

              • UserData — (String)

                The user data to make available to the instance.

            • DefaultVersionNumber — (Integer)

              The default version of the launch template.

            • LatestVersionNumber — (Integer)

              The latest version of the launch template.

          • AwsSageMakerNotebookInstance — (map)

            Provides details about an Amazon SageMaker notebook instance.

            • AcceleratorTypes — (Array<String>)

              A list of Amazon Elastic Inference instance types to associate with the notebook instance. Currently, only one instance type can be associated with a notebook instance.

            • AdditionalCodeRepositories — (Array<String>)

              An array of up to three Git repositories associated with the notebook instance. These can be either the names of Git repositories stored as resources in your account, or the URL of Git repositories in CodeCommit or in any other Git repository. These repositories are cloned at the same level as the default repository of your notebook instance. For more information, see Associating Git repositories with SageMaker notebook instances in the Amazon SageMaker Developer Guide.

            • DefaultCodeRepository — (String)

              The Git repository associated with the notebook instance as its default code repository. This can be either the name of a Git repository stored as a resource in your account, or the URL of a Git repository in CodeCommit or in any other Git repository. When you open a notebook instance, it opens in the directory that contains this repository. For more information, see Associating Git repositories with SageMaker notebook instances in the Amazon SageMaker Developer Guide.

            • DirectInternetAccess — (String)

              Sets whether SageMaker provides internet access to the notebook instance. If you set this to Disabled, this notebook instance is able to access resources only in your VPC, and is not be able to connect to SageMaker training and endpoint services unless you configure a Network Address Translation (NAT) Gateway in your VPC.

            • FailureReason — (String)

              If status of the instance is Failed, the reason it failed.

            • InstanceMetadataServiceConfiguration — (map)

              Information on the IMDS configuration of the notebook instance.

              • MinimumInstanceMetadataServiceVersion — (String)

                Indicates the minimum IMDS version that the notebook instance supports.

            • InstanceType — (String)

              The type of machine learning (ML) compute instance to launch for the notebook instance.

            • KmsKeyId — (String)

              The Amazon Resource Name (ARN) of an Key Management Service (KMS) key that SageMaker uses to encrypt data on the storage volume attached to your notebook instance. The KMS key you provide must be enabled. For information, see Enabling and disabling keys in the Key Management Service Developer Guide.

            • NetworkInterfaceId — (String)

              The network interface ID that SageMaker created when the instance was created.

            • NotebookInstanceArn — (String)

              The Amazon Resource Name (ARN) of the notebook instance.

            • NotebookInstanceLifecycleConfigName — (String)

              The name of a notebook instance lifecycle configuration.

            • NotebookInstanceName — (String)

              The name of the new notebook instance.

            • NotebookInstanceStatus — (String)

              The status of the notebook instance.

            • PlatformIdentifier — (String)

              The platform identifier of the notebook instance runtime environment.

            • RoleArn — (String)

              The Amazon Resource Name (ARN) of the IAM role associated with the instance.

            • RootAccess — (String)

              Whether root access is enabled or disabled for users of the notebook instance.

            • SecurityGroups — (Array<String>)

              The VPC security group IDs.

            • SubnetId — (String)

              The ID of the VPC subnet to which you have a connectivity from your ML compute instance.

            • Url — (String)

              The URL that you use to connect to the Jupyter notebook that is running in your notebook instance.

            • VolumeSizeInGB — (Integer)

              The size, in GB, of the ML storage volume to attach to the notebook instance.

          • AwsWafv2WebAcl — (map)

            Details about an WAFv2 web Access Control List (ACL).

            • Name — (String)

              The name of the web ACL.

            • Arn — (String)

              The Amazon Resource Name (ARN) of the web ACL that you want to associate with the resource.

            • ManagedbyFirewallManager — (Boolean)

              Indicates whether this web ACL is managed by Firewall Manager.

            • Id — (String)

              A unique identifier for the web ACL.

            • Capacity — (Integer)

              The web ACL capacity units (WCUs) currently being used by this web ACL.

            • CaptchaConfig — (map)

              Specifies how WAF should handle CAPTCHA evaluations for rules that don't have their own CaptchaConfig settings.

              • ImmunityTimeProperty — (map)

                Determines how long a CAPTCHA timestamp in the token remains valid after the client successfully solves a CAPTCHA puzzle.

                • ImmunityTime — (Integer)

                  The amount of time, in seconds, that a CAPTCHA or challenge timestamp is considered valid by WAF.

            • DefaultAction — (map)

              The action to perform if none of the Rules contained in the web ACL match.

              • Allow — (map)

                Specifies that WAF should allow requests by default.

                • CustomRequestHandling — (map)

                  Defines custom handling for the web request. For information about customizing web requests and responses, see Customizing web requests and responses in WAF in the WAF Developer Guide..

                  • InsertHeaders — (Array<map>)

                    The HTTP headers to insert into the request.

                    • Name — (String)

                      The name of the custom header.

                    • Value — (String)

                      The value of the custom header.

              • Block — (map)

                Specifies that WAF should block requests by default.

                • CustomResponse — (map)

                  Defines a custom response for the web request. For information, see Customizing web requests and responses in WAF in the WAF Developer Guide..

                  • CustomResponseBodyKey — (String)

                    References the response body that you want WAF to return to the web request client. You can define a custom response for a rule action or a default web ACL action that is set to block.

                  • ResponseCode — (Integer)

                    The HTTP status code to return to the client. For a list of status codes that you can use in your custom responses, see Supported status codes for custom response in the WAF Developer Guide.

                  • ResponseHeaders — (Array<map>)

                    The HTTP headers to use in the response.

                    • Name — (String)

                      The name of the custom header.

                    • Value — (String)

                      The value of the custom header.

            • Description — (String)

              A description of the web ACL that helps with identification.

            • Rules — (Array<map>)

              The Rule statements used to identify the web requests that you want to allow, block, or count. Each rule includes one top-level statement that WAF uses to identify matching web requests, and parameters that govern how WAF handles them.

              • Action — (map)

                The action that WAF should take on a web request when it matches the rule statement. Settings at the web ACL level can override the rule action setting.

                • Allow — (map)

                  Instructs WAF to allow the web request.

                  • CustomRequestHandling — (map)

                    Defines custom handling for the web request. For information about customizing web requests and responses, see Customizing web requests and responses in WAF in the WAF Developer Guide..

                    • InsertHeaders — (Array<map>)

                      The HTTP headers to insert into the request.

                      • Name — (String)

                        The name of the custom header.

                      • Value — (String)

                        The value of the custom header.

                • Block — (map)

                  Instructs WAF to block the web request.

                  • CustomResponse — (map)

                    Defines a custom response for the web request. For information, see Customizing web requests and responses in WAF in the WAF Developer Guide..

                    • CustomResponseBodyKey — (String)

                      References the response body that you want WAF to return to the web request client. You can define a custom response for a rule action or a default web ACL action that is set to block.

                    • ResponseCode — (Integer)

                      The HTTP status code to return to the client. For a list of status codes that you can use in your custom responses, see Supported status codes for custom response in the WAF Developer Guide.

                    • ResponseHeaders — (Array<map>)

                      The HTTP headers to use in the response.

                      • Name — (String)

                        The name of the custom header.

                      • Value — (String)

                        The value of the custom header.

                • Captcha — (map)

                  Instructs WAF to run a CAPTCHA check against the web request.

                  • CustomRequestHandling — (map)

                    Defines custom handling for the web request, used when the CAPTCHA inspection determines that the request's token is valid and unexpired. For more information, see Customizing web requests and responses in WAF in the WAF Developer Guide..

                    • InsertHeaders — (Array<map>)

                      The HTTP headers to insert into the request.

                      • Name — (String)

                        The name of the custom header.

                      • Value — (String)

                        The value of the custom header.

                • Count — (map)

                  Instructs WAF to count the web request and then continue evaluating the request using the remaining rules in the web ACL.

                  • CustomRequestHandling — (map)

                    Defines custom handling for the web request. For more information, see Customizing web requests and responses in WAF in the WAF Developer Guide..

                    • InsertHeaders — (Array<map>)

                      The HTTP headers to insert into the request.

                      • Name — (String)

                        The name of the custom header.

                      • Value — (String)

                        The value of the custom header.

              • Name — (String)

                The name of the rule.

              • OverrideAction — (String)

                The action to use in the place of the action that results from the rule group evaluation.

              • Priority — (Integer)

                If you define more than one Rule in a WebACL, WAF evaluates each request against the Rules in order based on the value of Priority. WAF processes rules with lower priority first. The priorities don't need to be consecutive, but they must all be different.

              • VisibilityConfig — (map)

                Defines and enables Amazon CloudWatch metrics and web request sample collection.

                • CloudWatchMetricsEnabled — (Boolean)

                  A boolean indicating whether the associated resource sends metrics to Amazon CloudWatch. For the list of available metrics, see WAF metrics and dimensions in the WAF Developer Guide.

                • MetricName — (String)

                  A name of the Amazon CloudWatch metric.

                • SampledRequestsEnabled — (Boolean)

                  A boolean indicating whether WAF should store a sampling of the web requests that match the rules. You can view the sampled requests through the WAF console.

            • VisibilityConfig — (map)

              Defines and enables Amazon CloudWatch metrics and web request sample collection.

              • CloudWatchMetricsEnabled — (Boolean)

                A boolean indicating whether the associated resource sends metrics to Amazon CloudWatch. For the list of available metrics, see WAF metrics and dimensions in the WAF Developer Guide.

              • MetricName — (String)

                A name of the Amazon CloudWatch metric.

              • SampledRequestsEnabled — (Boolean)

                A boolean indicating whether WAF should store a sampling of the web requests that match the rules. You can view the sampled requests through the WAF console.

          • AwsWafv2RuleGroup — (map)

            Details about an WAFv2 rule group.

            • Capacity — (Integer)

              The web ACL capacity units (WCUs) required for this rule group.

            • Description — (String)

              A description of the rule group that helps with identification.

            • Id — (String)

              A unique identifier for the rule group.

            • Name — (String)

              The name of the rule group. You cannot change the name of a rule group after you create it.

            • Arn — (String)

              The Amazon Resource Name (ARN) of the entity.

            • Rules — (Array<map>)

              The Rule statements used to identify the web requests that you want to allow, block, or count. Each rule includes one top-level statement that WAF uses to identify matching web requests, and parameters that govern how WAF handles them.

              • Action — (map)

                The action that WAF should take on a web request when it matches the rule statement. Settings at the web ACL level can override the rule action setting.

                • Allow — (map)

                  Instructs WAF to allow the web request.

                  • CustomRequestHandling — (map)

                    Defines custom handling for the web request. For information about customizing web requests and responses, see Customizing web requests and responses in WAF in the WAF Developer Guide..

                    • InsertHeaders — (Array<map>)

                      The HTTP headers to insert into the request.

                      • Name — (String)

                        The name of the custom header.

                      • Value — (String)

                        The value of the custom header.

                • Block — (map)

                  Instructs WAF to block the web request.

                  • CustomResponse — (map)

                    Defines a custom response for the web request. For information, see Customizing web requests and responses in WAF in the WAF Developer Guide..

                    • CustomResponseBodyKey — (String)

                      References the response body that you want WAF to return to the web request client. You can define a custom response for a rule action or a default web ACL action that is set to block.

                    • ResponseCode — (Integer)

                      The HTTP status code to return to the client. For a list of status codes that you can use in your custom responses, see Supported status codes for custom response in the WAF Developer Guide.

                    • ResponseHeaders — (Array<map>)

                      The HTTP headers to use in the response.

                      • Name — (String)

                        The name of the custom header.

                      • Value — (String)

                        The value of the custom header.

                • Captcha — (map)

                  Instructs WAF to run a CAPTCHA check against the web request.

                  • CustomRequestHandling — (map)

                    Defines custom handling for the web request, used when the CAPTCHA inspection determines that the request's token is valid and unexpired. For more information, see Customizing web requests and responses in WAF in the WAF Developer Guide..

                    • InsertHeaders — (Array<map>)

                      The HTTP headers to insert into the request.

                      • Name — (String)

                        The name of the custom header.

                      • Value — (String)

                        The value of the custom header.

                • Count — (map)

                  Instructs WAF to count the web request and then continue evaluating the request using the remaining rules in the web ACL.

                  • CustomRequestHandling — (map)

                    Defines custom handling for the web request. For more information, see Customizing web requests and responses in WAF in the WAF Developer Guide..

                    • InsertHeaders — (Array<map>)

                      The HTTP headers to insert into the request.

                      • Name — (String)

                        The name of the custom header.

                      • Value — (String)

                        The value of the custom header.

              • Name — (String)

                The name of the rule.

              • OverrideAction — (String)

                The action to use in the place of the action that results from the rule group evaluation.

              • Priority — (Integer)

                If you define more than one Rule in a WebACL, WAF evaluates each request against the Rules in order based on the value of Priority. WAF processes rules with lower priority first. The priorities don't need to be consecutive, but they must all be different.

              • VisibilityConfig — (map)

                Defines and enables Amazon CloudWatch metrics and web request sample collection.

                • CloudWatchMetricsEnabled — (Boolean)

                  A boolean indicating whether the associated resource sends metrics to Amazon CloudWatch. For the list of available metrics, see WAF metrics and dimensions in the WAF Developer Guide.

                • MetricName — (String)

                  A name of the Amazon CloudWatch metric.

                • SampledRequestsEnabled — (Boolean)

                  A boolean indicating whether WAF should store a sampling of the web requests that match the rules. You can view the sampled requests through the WAF console.

            • Scope — (String)

              Specifies whether the rule group is for an Amazon CloudFront distribution or for a regional application. A regional application can be an Application Load Balancer (ALB), an Amazon API Gateway REST API, an AppSync GraphQL API, or an Amazon Cognito user pool.

            • VisibilityConfig — (map)

              Defines and enables Amazon CloudWatch metrics and web request sample collection.

              • CloudWatchMetricsEnabled — (Boolean)

                A boolean indicating whether the associated resource sends metrics to Amazon CloudWatch. For the list of available metrics, see WAF metrics and dimensions in the WAF Developer Guide.

              • MetricName — (String)

                A name of the Amazon CloudWatch metric.

              • SampledRequestsEnabled — (Boolean)

                A boolean indicating whether WAF should store a sampling of the web requests that match the rules. You can view the sampled requests through the WAF console.

          • AwsEc2RouteTable — (map)

            Provides details about a route table. A route table contains a set of rules, called routes, that determine where to direct network traffic from your subnet or gateway.

            • AssociationSet — (Array<map>)

              The associations between a route table and one or more subnets or a gateway.

              • AssociationState — (map)

                The state of the association between a route table and a subnet or gateway.

                • State — (String)

                  The state of the association.

                • StatusMessage — (String)

                  The status message, if applicable.

              • GatewayId — (String)

                The ID of the internet gateway or virtual private gateway.

              • Main — (Boolean)

                Indicates whether this is the main route table.

              • RouteTableAssociationId — (String)

                The ID of the association.

              • RouteTableId — (String)

                The ID of the route table.

              • SubnetId — (String)

                The ID of the subnet. A subnet ID is not returned for an implicit association.

            • OwnerId — (String)

              The ID of the Amazon Web Services account that owns the route table.

            • PropagatingVgwSet — (Array<map>)

              Describes a virtual private gateway propagating route.

              • GatewayId — (String)

                The ID of the virtual private gateway.

            • RouteTableId — (String)

              The ID of the route table.

            • RouteSet — (Array<map>)

              The routes in the route table.

              • CarrierGatewayId — (String)

                The ID of the carrier gateway.

              • CoreNetworkArn — (String)

                The Amazon Resource Name (ARN) of the core network.

              • DestinationCidrBlock — (String)

                The IPv4 CIDR block used for the destination match.

              • DestinationIpv6CidrBlock — (String)

                The IPv6 CIDR block used for the destination match.

              • DestinationPrefixListId — (String)

                The prefix of the destination Amazon Web Service.

              • EgressOnlyInternetGatewayId — (String)

                The ID of the egress-only internet gateway.

              • GatewayId — (String)

                The ID of a gateway attached to your VPC.

              • InstanceId — (String)

                The ID of a NAT instance in your VPC.

              • InstanceOwnerId — (String)

                The ID of the Amazon Web Services account that owns the instance.

              • LocalGatewayId — (String)

                The ID of the local gateway.

              • NatGatewayId — (String)

                The ID of a NAT gateway.

              • NetworkInterfaceId — (String)

                The ID of the network interface.

              • Origin — (String)

                Describes how the route was created.

              • State — (String)

                The state of the route.

              • TransitGatewayId — (String)

                The ID of a transit gateway.

              • VpcPeeringConnectionId — (String)

                The ID of a VPC peering connection.

            • VpcId — (String)

              The ID of the virtual private cloud (VPC).

          • AwsAmazonMqBroker — (map)

            Provides details about AppSync message broker. A message broker allows software applications and components to communicate using various programming languages, operating systems, and formal messaging protocols.

            • AuthenticationStrategy — (String)

              The authentication strategy used to secure the broker. The default is SIMPLE.

            • AutoMinorVersionUpgrade — (Boolean)

              Whether automatically upgrade new minor versions for brokers, as new versions are released and supported by Amazon MQ. Automatic upgrades occur during the scheduled maintenance window of the broker or after a manual broker reboot.

            • BrokerArn — (String)

              The Amazon Resource Name (ARN) of the broker.

            • BrokerName — (String)

              The broker's name.

            • DeploymentMode — (String)

              The broker's deployment mode.

            • EncryptionOptions — (map)

              Encryption options for the broker. Doesn’t apply to RabbitMQ brokers.

              • KmsKeyId — (String)

                The KMS key that’s used to encrypt your data at rest. If not provided, Amazon MQ will use a default KMS key to encrypt your data.

              • UseAwsOwnedKey — (Boolean)

                Specifies that an KMS key should be used for at-rest encryption. Set to true by default if no value is provided (for example, for RabbitMQ brokers).

            • EngineType — (String)

              The type of broker engine.

            • EngineVersion — (String)

              The version of the broker engine.

            • HostInstanceType — (String)

              The broker's instance type.

            • BrokerId — (String)

              The unique ID that Amazon MQ generates for the broker.

            • LdapServerMetadata — (map)

              The metadata of the Lightweight Directory Access Protocol (LDAP) server used to authenticate and authorize connections to the broker. This is an optional failover server.

              • Hosts — (Array<String>)

                Specifies the location of the LDAP server, such as Amazon Web Services Directory Service for Microsoft Active Directory.

              • RoleBase — (String)

                The distinguished name of the node in the directory information tree (DIT) to search for roles or groups.

              • RoleName — (String)

                The group name attribute in a role entry whose value is the name of that role.

              • RoleSearchMatching — (String)

                The LDAP search filter used to find roles within the roleBase.

              • RoleSearchSubtree — (Boolean)

                The directory search scope for the role. If set to true, the scope is to search the entire subtree.

              • ServiceAccountUsername — (String)

                A username for the service account, which is an account in your LDAP server that has access to initiate a connection.

              • UserBase — (String)

                Selects a particular subtree of the directory information tree (DIT) to search for user entries.

              • UserRoleName — (String)

                The name of the LDAP attribute in the user's directory entry for the user's group membership.

              • UserSearchMatching — (String)

                The LDAP search filter used to find users within the userBase.

              • UserSearchSubtree — (Boolean)

                The directory search scope for the user. If set to true, the scope is to search the entire subtree.

            • Logs — (map)

              Turns on Amazon CloudWatch logging for brokers.

              • Audit — (Boolean)

                Activates audit logging. Every user management action made using JMX or the ActiveMQ Web Console is logged. Doesn't apply to RabbitMQ brokers.

              • General — (Boolean)

                Activates general logging.

              • AuditLogGroup — (String)

                The location of the CloudWatch Logs log group where audit logs are sent.

              • GeneralLogGroup — (String)

                The location of the CloudWatch Logs log group where general logs are sent.

              • Pending — (map)

                The list of information about logs that are to be turned on for the specified broker.

                • Audit — (Boolean)

                  Activates audit logging. Every user management action made using JMX or the ActiveMQ Web Console is logged. Doesn't apply to RabbitMQ brokers.

                • General — (Boolean)

                  Activates general logging.

            • MaintenanceWindowStartTime — (map)

              The scheduled time period (UTC) during which Amazon MQ begins to apply pending updates or patches to the broker.

              • DayOfWeek — (String)

                The day of the week on which the maintenance window falls.

              • TimeOfDay — (String)

                The time, in 24-hour format, on which the maintenance window falls.

              • TimeZone — (String)

                The time zone in either the Country/City format or the UTC offset format. UTC is the default format.

            • PubliclyAccessible — (Boolean)

              Permits connections from applications outside of the VPC that hosts the broker's subnets.

            • SecurityGroups — (Array<String>)

              The list of rules (one minimum, 125 maximum) that authorize connections to brokers.

            • StorageType — (String)

              The broker's storage type.

            • SubnetIds — (Array<String>)

              The list of groups that define which subnets and IP ranges the broker can use from different Availability Zones.

            • Users — (Array<map>)

              The list of all broker usernames for the specified broker. Doesn't apply to RabbitMQ brokers.

              • PendingChange — (String)

                The type of change pending for the broker user.

              • Username — (String)

                The username of the broker user.

          • AwsAppSyncGraphQlApi — (map)

            Provides details about an AppSync Graph QL API, which lets you query multiple databases, microservices, and APIs from a single GraphQL endpoint.

            • ApiId — (String)

              The unique identifier for the API.

            • Id — (String)

              The unique identifier for the API.

            • OpenIdConnectConfig — (map)

              Specifies the authorization configuration for using an OpenID Connect compliant service with an AppSync GraphQL API endpoint.

              • AuthTtL — (Integer)

                The number of milliseconds that a token is valid after being authenticated.

              • ClientId — (String)

                The client identifier of the relying party at the OpenID identity provider. This identifier is typically obtained when the relying party is registered with the OpenID identity provider. You can specify a regular expression so that AppSync can validate against multiple client identifiers at a time.

              • IatTtL — (Integer)

                The number of milliseconds that a token is valid after it's issued to a user.

              • Issuer — (String)

                The issuer for the OIDC configuration. The issuer returned by discovery must exactly match the value of iss in the ID token.

            • Name — (String)

              The API name.

            • LambdaAuthorizerConfig — (map)

              Specifies the configuration for Lambda function authorization.

              • AuthorizerResultTtlInSeconds — (Integer)

                The number of seconds a response should be cached for. The default is 5 minutes (300 seconds).

              • AuthorizerUri — (String)

                The Amazon Resource Name (ARN) of the Lambda function to be called for authorization. This can be a standard Lambda ARN, a version ARN (.../v3), or an alias ARN.

              • IdentityValidationExpression — (String)

                A regular expression for validation of tokens before the Lambda function is called.

            • XrayEnabled — (Boolean)

              Indicates whether to use X-Ray tracing for the GraphQL API.

            • Arn — (String)

              The Amazon Resource Name (ARN) of the API.

            • UserPoolConfig — (map)

              The Amazon Cognito user pools configuration.

              • AppIdClientRegex — (String)

                A regular expression for validating the incoming Amazon Cognito user pools app client ID. If this value isn't set, no filtering is applied.

              • AwsRegion — (String)

                The Amazon Web Services Region in which the user pool was created.

              • DefaultAction — (String)

                The action that you want your GraphQL API to take when a request that uses Amazon Cognito user pools authentication doesn't match the Amazon Cognito user pools configuration.

              • UserPoolId — (String)

                The user pool ID.

            • AuthenticationType — (String)

              The type of security configuration for your GraphQL API: API key, Identity and Access Management (IAM), OpenID Connect (OIDC), Amazon Cognito user pools, or Lambda.

            • LogConfig — (map)

              The Amazon CloudWatch Logs configuration.

              • CloudWatchLogsRoleArn — (String)

                The Amazon Resource Name (ARN) of the service role that AppSync assumes to publish to CloudWatch Logs in your account.

              • ExcludeVerboseContent — (Boolean)

                Set to TRUE to exclude sections that contain information such as headers, context, and evaluated mapping templates, regardless of logging level.

              • FieldLogLevel — (String)

                The field logging level.

            • AdditionalAuthenticationProviders — (Array<map>)

              A list of additional authentication providers for the GraphQL API.

              • AuthenticationType — (String)

                The type of security configuration for your GraphQL API: API key, Identity and Access Management (IAM), OpenID Connect (OIDC), Amazon Cognito user pools, or Lambda.

              • LambdaAuthorizerConfig — (map)

                The configuration for Lambda function authorization.

                • AuthorizerResultTtlInSeconds — (Integer)

                  The number of seconds a response should be cached for. The default is 5 minutes (300 seconds).

                • AuthorizerUri — (String)

                  The Amazon Resource Name (ARN) of the Lambda function to be called for authorization. This can be a standard Lambda ARN, a version ARN (.../v3), or an alias ARN.

                • IdentityValidationExpression — (String)

                  A regular expression for validation of tokens before the Lambda function is called.

              • OpenIdConnectConfig — (map)

                The OpenID Connect configuration.

                • AuthTtL — (Integer)

                  The number of milliseconds that a token is valid after being authenticated.

                • ClientId — (String)

                  The client identifier of the relying party at the OpenID identity provider. This identifier is typically obtained when the relying party is registered with the OpenID identity provider. You can specify a regular expression so that AppSync can validate against multiple client identifiers at a time.

                • IatTtL — (Integer)

                  The number of milliseconds that a token is valid after it's issued to a user.

                • Issuer — (String)

                  The issuer for the OIDC configuration. The issuer returned by discovery must exactly match the value of iss in the ID token.

              • UserPoolConfig — (map)

                The Amazon Cognito user pools configuration.

                • AppIdClientRegex — (String)

                  A regular expression for validating the incoming Amazon Cognito user pools app client ID. If this value isn't set, no filtering is applied.

                • AwsRegion — (String)

                  The Amazon Web Services Region in which the user pool was created.

                • DefaultAction — (String)

                  The action that you want your GraphQL API to take when a request that uses Amazon Cognito user pools authentication doesn't match the Amazon Cognito user pools configuration.

                • UserPoolId — (String)

                  The user pool ID.

            • WafWebAclArn — (String)

              The Amazon Resource Name (ARN) of the WAF web access control list (web ACL) associated with this GraphQL API, if one exists.

          • AwsEventSchemasRegistry — (map)

            A schema defines the structure of events that are sent to Amazon EventBridge. Schema registries are containers for schemas. They collect and organize schemas so that your schemas are in logical groups.

            • Description — (String)

              A description of the registry to be created.

            • RegistryArn — (String)

              The Amazon Resource Name (ARN) of the registry.

            • RegistryName — (String)

              The name of the schema registry.

          • AwsGuardDutyDetector — (map)

            Provides details about an Amazon GuardDuty detector. A detector is an object that represents the GuardDuty service. A detector is required for GuardDuty to become operational.

            • DataSources — (map)

              Describes which data sources are activated for the detector.

              • CloudTrail — (map)

                An object that contains information on the status of CloudTrail as a data source for the detector.

                • Status — (String)

                  Specifies whether CloudTrail is activated as a data source for the detector.

              • DnsLogs — (map)

                An object that contains information on the status of DNS logs as a data source for the detector.

                • Status — (String)

                  Describes whether DNS logs is enabled as a data source for the detector.

              • FlowLogs — (map)

                An object that contains information on the status of VPC Flow Logs as a data source for the detector.

                • Status — (String)

                  Describes whether VPC Flow Logs are activated as a data source for the detector.

              • Kubernetes — (map)

                An object that contains information on the status of Kubernetes data sources for the detector.

                • AuditLogs — (map)

                  Describes whether Kubernetes audit logs are activated as a data source for the detector.

                  • Status — (String)

                    Describes whether Kubernetes audit logs are activated as a data source for the detector.

              • MalwareProtection — (map)

                An object that contains information on the status of Malware Protection as a data source for the detector.

                • ScanEc2InstanceWithFindings — (map)

                  Describes the configuration of Malware Protection for EC2 instances with findings.

                  • EbsVolumes — (map)

                    Describes the configuration of scanning EBS volumes (Malware Protection) as a data source.

                    • Reason — (String)

                      Specifies the reason why scanning EBS volumes (Malware Protection) isn’t activated as a data source.

                    • Status — (String)

                      Describes whether scanning EBS volumes is activated as a data source for the detector.

                • ServiceRole — (String)

                  The GuardDuty Malware Protection service role.

              • S3Logs — (map)

                An object that contains information on the status of S3 Data event logs as a data source for the detector.

                • Status — (String)

                  A value that describes whether S3 data event logs are automatically enabled for new members of an organization.

            • Features — (Array<map>)

              Describes which features are activated for the detector.

              • Name — (String)

                Indicates the name of the feature that is activated for the detector.

              • Status — (String)

                Indicates the status of the feature that is activated for the detector.

            • FindingPublishingFrequency — (String)

              The publishing frequency of the finding.

            • ServiceRole — (String)

              The GuardDuty service role.

            • Status — (String)

              The activation status of the detector.

          • AwsStepFunctionStateMachine — (map)

            Provides details about an Step Functions state machine, which is a workflow consisting of a series of event-driven steps.

            • Label — (String)

              A user-defined or an auto-generated string that identifies a Map state. This parameter is present only if the stateMachineArn specified in input is a qualified state machine ARN.

            • LoggingConfiguration — (map)

              Used to set CloudWatch Logs options.

              • Destinations — (Array<map>)

                An array of objects that describes where your execution history events will be logged.

                • CloudWatchLogsLogGroup — (map)

                  An object describing a CloudWatch Logs log group. For more information, see Amazon Web Services::Logs::LogGroup in the CloudFormation User Guide.

                  • LogGroupArn — (String)

                    The ARN (ends with :*) of the CloudWatch Logs log group to which you want your logs emitted.

              • IncludeExecutionData — (Boolean)

                Determines whether execution data is included in your log. When set to false, data is excluded.

              • Level — (String)

                Defines which category of execution history events are logged.

            • Name — (String)

              The name of the state machine.

            • RoleArn — (String)

              The Amazon Resource Name (ARN) of the IAM role used when creating this state machine.

            • StateMachineArn — (String)

              The ARN that identifies the state machine.

            • Status — (String)

              The current status of the state machine.

            • TracingConfiguration — (map)

              Specifies whether X-Ray tracing is enabled.

              • Enabled — (Boolean)

                When set to true, X-Ray tracing is enabled.

            • Type — (String)

              The type of the state machine (STANDARD or EXPRESS).

          • AwsAthenaWorkGroup — (map)

            Provides information about an Amazon Athena workgroup. A workgroup helps you separate users, teams, applications, or workloads. It also helps you set limits on data processing and track costs.

            • Name — (String)

              The workgroup name.

            • Description — (String)

              The workgroup description.

            • State — (String)

              Whether the workgroup is enabled or disabled.

            • Configuration — (map)

              The configuration of the workgroup, which includes the location in Amazon Simple Storage Service (Amazon S3) where query results are stored, the encryption option, if any, used for query results, whether Amazon CloudWatch metrics are enabled for the workgroup, and the limit for the amount of bytes scanned (cutoff) per query, if it is specified.

              • ResultConfiguration — (map)

                The location in Amazon S3 where query and calculation results are stored and the encryption option, if any, used for query and calculation results. These are known as client-side settings. If workgroup settings override client-side settings, then the query uses the workgroup settings.

                • EncryptionConfiguration — (map)

                  Specifies the method used to encrypt the user’s data stores in the Athena workgroup.

                  • EncryptionOption — (String)

                    Indicates whether Amazon Simple Storage Service (Amazon S3) server-side encryption with Amazon S3 managed keys (SSE_S3), server-side encryption with KMS keys (SSE_KMS), or client-side encryption with KMS customer managed keys (CSE_KMS) is used.

                  • KmsKey — (String)

                    For SSE_KMS and CSE_KMS, this is the KMS key Amazon Resource Name (ARN) or ID.

          • AwsEventsEventbus — (map)

            Provides details about Amazon EventBridge event bus for an endpoint. An event bus is a router that receives events and delivers them to zero or more destinations, or targets.

            • Arn — (String)

              The Amazon Resource Name (ARN) of the account permitted to write events to the current account.

            • Name — (String)

              The name of the event bus.

            • Policy — (String)

              The policy that enables the external account to send events to your account.

          • AwsDmsEndpoint — (map)

            Provides details about an Database Migration Service (DMS) endpoint. An endpoint provides connection, data store type, and location information about your data store.

            • CertificateArn — (String)

              The Amazon Resource Name (ARN) for the SSL certificate that encrypts connections between the DMS endpoint and the replication instance.

            • DatabaseName — (String)

              The name of the endpoint database.

            • EndpointArn — (String)

              The Amazon Resource Name (ARN) of the endpoint.

            • EndpointIdentifier — (String)

              The database endpoint identifier.

            • EndpointType — (String)

              The type of endpoint. Valid values are source and target.

            • EngineName — (String)

              The type of engine for the endpoint, depending on the EndpointType value.

            • ExternalId — (String)

              A value that can be used for cross-account validation.

            • ExtraConnectionAttributes — (String)

              Additional attributes associated with the connection.

            • KmsKeyId — (String)

              An DMS key identifier that is used to encrypt the connection parameters for the endpoint. If you don't specify a value for the KmsKeyId parameter, then DMS uses your default encryption key. KMS creates the default encryption key for your Amazon Web Services account. Your Amazon Web Services account has a different default encryption key for each Amazon Web Services Region.

            • Port — (Integer)

              The port used to access the endpoint.

            • ServerName — (String)

              The name of the server where the endpoint database resides.

            • SslMode — (String)

              The SSL mode used to connect to the endpoint. The default is none.

            • Username — (String)

              The user name to be used to log in to the endpoint database.

          • AwsEventsEndpoint — (map)

            Provides details about an Amazon EventBridge global endpoint. The endpoint can improve your application’s availability by making it Regional-fault tolerant.

            • Arn — (String)

              The Amazon Resource Name (ARN) of the endpoint.

            • Description — (String)

              A description of the endpoint.

            • EndpointId — (String)

              The URL subdomain of the endpoint. For example, if EndpointUrl is https://abcde.veo.endpoints.event.amazonaws.com, then the EndpointId is abcde.veo.

            • EndpointUrl — (String)

              The URL of the endpoint.

            • EventBuses — (Array<map>)

              The event buses being used by the endpoint.

              • EventBusArn — (String)

                The Amazon Resource Name (ARN) of the event bus that the endpoint is associated with.

            • Name — (String)

              The name of the endpoint.

            • ReplicationConfig — (map)

              Whether event replication was enabled or disabled for this endpoint. The default state is ENABLED, which means you must supply a RoleArn. If you don't have a RoleArn or you don't want event replication enabled, set the state to DISABLED.

              • State — (String)

                The state of event replication.

            • RoleArn — (String)

              The ARN of the role used by event replication for the endpoint.

            • RoutingConfig — (map)

              The routing configuration of the endpoint.

              • FailoverConfig — (map)

                The failover configuration for an endpoint. This includes what triggers failover and what happens when it's triggered.

                • Primary — (map)

                  The main Region of the endpoint.

                  • HealthCheck — (String)

                    The Amazon Resource Name (ARN) of the health check used by the endpoint to determine whether failover is triggered.

                • Secondary — (map)

                  The Region that events are routed to when failover is triggered or event replication is enabled.

                  • Route — (String)

                    Defines the secondary Region.

            • State — (String)

              The current state of the endpoint.

            • StateReason — (String)

              The reason the endpoint is in its current state.

          • AwsDmsReplicationTask — (map)

            Provides details about an DMS replication task. A replication task moves a set of data from the source endpoint to the target endpoint.

            • CdcStartPosition — (String)

              Indicates when you want a change data capture (CDC) operation to start. CCdcStartPosition or CCdcStartTime specifies when you want a CDC operation to start. Only a value for one of these fields is included.

            • CdcStartTime — (String)

              Indicates the start time for a CDC operation. CdcStartPosition or CCdcStartTime specifies when you want a CDC operation to start. Only a value for one of these fields is included.

            • CdcStopPosition — (String)

              Indicates when you want a CDC operation to stop. The value can be either server time or commit time.

            • MigrationType — (String)

              The migration type.

            • Id — (String)

              The identifier of the replication task.

            • ResourceIdentifier — (String)

              A display name for the resource identifier at the end of the EndpointArn response parameter. If you don't specify a ResourceIdentifier value, DMS generates a default identifier value for the end of EndpointArn.

            • ReplicationInstanceArn — (String)

              The Amazon Resource Name (ARN) of a replication instance.

            • ReplicationTaskIdentifier — (String)

              The user-defined replication task identifier or name.

            • ReplicationTaskSettings — (String)

              The settings for the replication task.

            • SourceEndpointArn — (String)

              The ARN of the source endpoint.

            • TableMappings — (String)

              The table mappings for the replication task, in JSON format.

            • TargetEndpointArn — (String)

              The ARN of the target endpoint.

            • TaskData — (String)

              Supplemental information that the task requires to migrate the data for certain source and target endpoints.

          • AwsDmsReplicationInstance — (map)

            Provides details about an DMS replication instance. DMS uses a replication instance to connect to your source data store, read the source data, and format the data for consumption by the target data store.

            • AllocatedStorage — (Integer)

              The amount of storage (in gigabytes) that is allocated for the replication instance.

            • AutoMinorVersionUpgrade — (Boolean)

              Indicates whether minor engine upgrades are applied automatically to the replication instance during the maintenance window.

            • AvailabilityZone — (String)

              The Availability Zone that the replication instance is created in. The default value is a random, system-chosen Availability Zone in the endpoint's Amazon Web Services Region, such as us-east-1d.

            • EngineVersion — (String)

              The engine version number of the replication instance. If an engine version number is not specified when a replication instance is created, the default is the latest engine version available.

            • KmsKeyId — (String)

              An KMS key identifier that is used to encrypt the data on the replication instance. If you don't specify a value for the KmsKeyId parameter, DMS uses your default encryption key. KMS creates the default encryption key for your Amazon Web Services account. Your Amazon Web Services account has a different default encryption key for each Amazon Web Services Region.

            • MultiAZ — (Boolean)

              Specifies whether the replication instance is deployed across multiple Availability Zones (AZs). You can't set the AvailabilityZone parameter if the MultiAZ parameter is set to true.

            • PreferredMaintenanceWindow — (String)

              The maintenance window times for the replication instance. Upgrades to the replication instance are performed during this time.

            • PubliclyAccessible — (Boolean)

              Specifies the accessibility options for the replication instance. A value of true represents an instance with a public IP address. A value of false represents an instance with a private IP address. The default value is true.

            • ReplicationInstanceClass — (String)

              The compute and memory capacity of the replication instance as defined for the specified replication instance class.

            • ReplicationInstanceIdentifier — (String)

              The replication instance identifier.

            • ReplicationSubnetGroup — (map)

              The subnet group for the replication instance.

              • ReplicationSubnetGroupIdentifier — (String)

                The identifier of the replication subnet group.

            • VpcSecurityGroups — (Array<map>)

              The virtual private cloud (VPC) security group for the replication instance.

              • VpcSecurityGroupId — (String)

                The identifier of the VPC security group that’s associated with the replication instance.

          • AwsRoute53HostedZone — (map)

            Provides details about an Amazon Route 53 hosted zone, including the four name servers assigned to the hosted zone. A hosted zone represents a collection of records that can be managed together, belonging to a single parent domain name.

            • HostedZone — (map)

              An object that contains information about the specified hosted zone.

              • Id — (String)

                The ID that Route 53 assigns to the hosted zone when you create it.

              • Name — (String)

                The name of the domain. For public hosted zones, this is the name that you have registered with your DNS registrar.

              • Config — (map)

                An object that includes the Comment element.

                • Comment — (String)

                  Any comments that you include about the hosted zone.

            • Vpcs — (Array<map>)

              An object that contains information about the Amazon Virtual Private Clouds (Amazon VPCs) that are associated with the specified hosted zone.

              • Id — (String)

                The identifier of an Amazon VPC.

              • Region — (String)

                The Amazon Web Services Region that an Amazon VPC was created in.

            • NameServers — (Array<String>)

              An object that contains a list of the authoritative name servers for a hosted zone or for a reusable delegation set.

            • QueryLoggingConfig — (map)

              An array that contains one QueryLoggingConfig element for each DNS query logging configuration that is associated with the current Amazon Web Services account.

              • CloudWatchLogsLogGroupArn — (map)

                The Amazon Resource Name (ARN) of the Amazon CloudWatch Logs log group that Route 53 is publishing logs to.

                • CloudWatchLogsLogGroupArn — (String)

                  The ARN of the CloudWatch Logs log group that Route 53 is publishing logs to.

                • HostedZoneId — (String)

                  The ID of the hosted zone that CloudWatch Logs is logging queries for.

                • Id — (String)

                  The ID for a DNS query logging configuration.

          • AwsMskCluster — (map)

            Provides details about an Amazon Managed Streaming for Apache Kafka (Amazon MSK) cluster.

            • ClusterInfo — (map)

              Provides information about a cluster.

              • EncryptionInfo — (map)

                Includes encryption-related information, such as the KMS key used for encrypting data at rest and whether you want Amazon MSK to encrypt your data in transit.

                • EncryptionInTransit — (map)

                  The settings for encrypting data in transit.

                  • InCluster — (Boolean)

                    When set to true, it indicates that data communication among the broker nodes of the cluster is encrypted. When set to false, the communication happens in plain text. The default value is true.

                  • ClientBroker — (String)

                    Indicates the encryption setting for data in transit between clients and brokers.

                • EncryptionAtRest — (map)

                  The data-volume encryption details. You can't update encryption at rest settings for existing clusters.

                  • DataVolumeKMSKeyId — (String)

                    The Amazon Resource Name (ARN) of the KMS key for encrypting data at rest. If you don't specify a KMS key, MSK creates one for you and uses it.

              • CurrentVersion — (String)

                The current version of the cluster.

              • NumberOfBrokerNodes — (Integer)

                The number of broker nodes in the cluster.

              • ClusterName — (String)

                The name of the cluster.

              • ClientAuthentication — (map)

                Provides information for different modes of client authentication.

                • Sasl — (map)

                  Provides details for client authentication using SASL.

                  • Iam — (map)

                    Provides details for SASL client authentication using IAM.

                    • Enabled — (Boolean)

                      Indicates whether SASL/IAM authentication is enabled or not.

                  • Scram — (map)

                    Details for SASL client authentication using SCRAM.

                    • Enabled — (Boolean)

                      Indicates whether SASL/SCRAM authentication is enabled or not.

                • Unauthenticated — (map)

                  Provides details for allowing no client authentication.

                  • Enabled — (Boolean)

                    Indicates whether unauthenticated is allowed or not.

                • Tls — (map)

                  Provides details for client authentication using TLS.

                  • CertificateAuthorityArnList — (Array<String>)

                    List of Amazon Web Services Private CA Amazon Resource Names (ARNs). Amazon Web Services Private CA enables creation of private certificate authority (CA) hierarchies, including root and subordinate CAs, without the investment and maintenance costs of operating an on-premises CA.

                  • Enabled — (Boolean)

                    Indicates whether TLS authentication is enabled or not.

              • EnhancedMonitoring — (String)

                Specifies the level of monitoring for the cluster.

          • AwsS3AccessPoint — (map)

            Provides details about an Amazon Simple Storage Service (Amazon S3) access point. S3 access points are named network endpoints that are attached to S3 buckets that you can use to perform S3 object operations.

            • AccessPointArn — (String)

              The Amazon Resource Name (ARN) of the access point.

            • Alias — (String)

              The name or alias of the access point.

            • Bucket — (String)

              The name of the S3 bucket associated with the specified access point.

            • BucketAccountId — (String)

              The Amazon Web Services account ID associated with the S3 bucket associated with this access point.

            • Name — (String)

              The name of the specified access point.

            • NetworkOrigin — (String)

              Indicates whether this access point allows access from the public internet.

            • PublicAccessBlockConfiguration — (map)

              provides information about the Amazon S3 Public Access Block configuration for accounts.

              • BlockPublicAcls — (Boolean)

                Indicates whether to reject calls to update an S3 bucket if the calls include a public access control list (ACL).

              • BlockPublicPolicy — (Boolean)

                Indicates whether to reject calls to update the access policy for an S3 bucket or access point if the policy allows public access.

              • IgnorePublicAcls — (Boolean)

                Indicates whether Amazon S3 ignores public ACLs that are associated with an S3 bucket.

              • RestrictPublicBuckets — (Boolean)

                Indicates whether to restrict access to an access point or S3 bucket that has a public policy to only Amazon Web Services service principals and authorized users within the S3 bucket owner's account.

            • VpcConfiguration — (map)

              Contains the virtual private cloud (VPC) configuration for the specified access point.

              • VpcId — (String)

                If this field is specified, this access point will only allow connections from the specified VPC ID.

          • AwsEc2ClientVpnEndpoint — (map)

            Provides details about an Client VPN endpoint. A Client VPN endpoint is the resource that you create and configure to enable and manage client VPN sessions. It's the termination point for all client VPN sessions.

            • ClientVpnEndpointId — (String)

              The ID of the Client VPN endpoint.

            • Description — (String)

              A brief description of the endpoint.

            • ClientCidrBlock — (String)

              The IPv4 address range, in CIDR notation, from which client IP addresses are assigned.

            • DnsServer — (Array<String>)

              Information about the DNS servers to be used for DNS resolution.

            • SplitTunnel — (Boolean)

              Indicates whether split-tunnel is enabled in the Client VPN endpoint.

            • TransportProtocol — (String)

              The transport protocol used by the Client VPN endpoint.

            • VpnPort — (Integer)

              The port number for the Client VPN endpoint.

            • ServerCertificateArn — (String)

              The Amazon Resource Name (ARN) of the server certificate.

            • AuthenticationOptions — (Array<map>)

              Information about the authentication method used by the Client VPN endpoint.

              • Type — (String)

                The authentication type used.

              • ActiveDirectory — (map)

                Information about the Active Directory, if applicable. With Active Directory authentication, clients are authenticated against existing Active Directory groups.

                • DirectoryId — (String)

                  The ID of the Active Directory used for authentication.

              • MutualAuthentication — (map)

                Information about the authentication certificates, if applicable.

                • ClientRootCertificateChain — (String)

                  The Amazon Resource Name (ARN) of the client certificate.

              • FederatedAuthentication — (map)

                Information about the IAM SAML identity provider, if applicable.

                • SamlProviderArn — (String)

                  The Amazon Resource Name (ARN) of the IAM SAML identity provider.

                • SelfServiceSamlProviderArn — (String)

                  The Amazon Resource Name (ARN) of the IAM SAML identity provider for the self-service portal.

            • ConnectionLogOptions — (map)

              Information about the client connection logging options for the Client VPN endpoint.

              • Enabled — (Boolean)

                Indicates whether client connection logging is enabled for the Client VPN endpoint.

              • CloudwatchLogGroup — (String)

                The name of the Amazon CloudWatch Logs log group to which connection logging data is published.

              • CloudwatchLogStream — (String)

                The name of the Amazon CloudWatch Logs log stream to which connection logging data is published.

            • SecurityGroupIdSet — (Array<String>)

              The IDs of the security groups for the target network.

            • VpcId — (String)

              The ID of the VPC.

            • SelfServicePortalUrl — (String)

              The URL of the self-service portal.

            • ClientConnectOptions — (map)

              The options for managing connection authorization for new client connections.

              • Enabled — (Boolean)

                Indicates whether client connect options are enabled.

              • LambdaFunctionArn — (String)

                The Amazon Resource Name (ARN) of the Lambda function used for connection authorization.

              • Status — (map)

                The status of any updates to the client connect options.

                • Code — (String)

                  The status code.

                • Message — (String)

                  The status message.

            • SessionTimeoutHours — (Integer)

              The maximum VPN session duration time in hours.

            • ClientLoginBannerOptions — (map)

              Options for enabling a customizable text banner that will be displayed on Amazon Web Services provided clients when a VPN session is established.

              • Enabled — (Boolean)

                Current state of text banner feature.

              • BannerText — (String)

                Customizable text that will be displayed in a banner on Amazon Web Services provided clients when a VPN session is established.

        • ApplicationName — (String)

          The name of the application that is related to a finding.

        • ApplicationArn — (String)

          The Amazon Resource Name (ARN) of the application that is related to a finding.

      • Compliance — (map)

        This data type is exclusive to findings that are generated as the result of a check run against a specific rule in a supported security standard, such as CIS Amazon Web Services Foundations. Contains security standard-related finding details.

        • Status — (String)

          The result of a standards check.

          The valid values for Status are as follows.

            • PASSED - Standards check passed for all evaluated resources.

            • WARNING - Some information is missing or this check is not supported for your configuration.

            • FAILED - Standards check failed for at least one evaluated resource.

            • NOT_AVAILABLE - Check could not be performed due to a service outage, API error, or because the result of the Config evaluation was NOT_APPLICABLE. If the Config evaluation result was NOT_APPLICABLE, then after 3 days, Security Hub automatically archives the finding.

          Possible values include:
          • "PASSED"
          • "WARNING"
          • "FAILED"
          • "NOT_AVAILABLE"
        • RelatedRequirements — (Array<String>)

          For a control, the industry or regulatory framework requirements that are related to the control. The check for that control is aligned with these requirements.

        • StatusReasons — (Array<map>)

          For findings generated from controls, a list of reasons behind the value of Status. For the list of status reason codes and their meanings, see Standards-related information in the ASFF in the Security Hub User Guide.

          • ReasonCoderequired — (String)

            A code that represents a reason for the control status. For the list of status reason codes and their meanings, see Standards-related information in the ASFF in the Security Hub User Guide.

          • Description — (String)

            The corresponding description for the status reason code.

        • SecurityControlId — (String)

          The unique identifier of a control across standards. Values for this field typically consist of an Amazon Web Service and a number, such as APIGateway.5.

        • AssociatedStandards — (Array<map>)

          The enabled security standards in which a security control is currently enabled.

          • StandardsId — (String)

            The unique identifier of a standard in which a control is enabled. This field consists of the resource portion of the Amazon Resource Name (ARN) returned for a standard in the DescribeStandards API response.

        • SecurityControlParameters — (Array<map>)

          An object that includes security control parameter names and values.

          • Name — (String)

            The name of a

          • Value — (Array<String>)

            The current value of a control parameter.

      • VerificationState — (String)

        Indicates the veracity of a finding.

        Possible values include:
        • "UNKNOWN"
        • "TRUE_POSITIVE"
        • "FALSE_POSITIVE"
        • "BENIGN_POSITIVE"
      • WorkflowState — (String)

        The workflow state of a finding.

        Possible values include:
        • "NEW"
        • "ASSIGNED"
        • "IN_PROGRESS"
        • "DEFERRED"
        • "RESOLVED"
      • Workflow — (map)

        Provides information about the status of the investigation into a finding.

        • Status — (String)

          The status of the investigation into the finding. The workflow status is specific to an individual finding. It does not affect the generation of new findings. For example, setting the workflow status to SUPPRESSED or RESOLVED does not prevent a new finding for the same issue.

          The allowed values are the following.

          • NEW - The initial state of a finding, before it is reviewed.

            Security Hub also resets the workflow status from NOTIFIED or RESOLVED to NEW in the following cases:

            • RecordState changes from ARCHIVED to ACTIVE.

            • ComplianceStatus changes from PASSED to either WARNING, FAILED, or NOT_AVAILABLE.

          • NOTIFIED - Indicates that you notified the resource owner about the security issue. Used when the initial reviewer is not the resource owner, and needs intervention from the resource owner.

          • SUPPRESSED - Indicates that you reviewed the finding and do not believe that any action is needed. The finding is no longer updated.

          • RESOLVED - The finding was reviewed and remediated and is now considered resolved.

          Possible values include:
          • "NEW"
          • "NOTIFIED"
          • "RESOLVED"
          • "SUPPRESSED"
      • RecordState — (String)

        The record state of a finding.

        Possible values include:
        • "ACTIVE"
        • "ARCHIVED"
      • RelatedFindings — (Array<map>)

        A list of related findings.

        • ProductArnrequired — (String)

          The ARN of the product that generated a related finding.

        • Idrequired — (String)

          The product-generated identifier for a related finding.

      • Note — (map)

        A user-defined note added to a finding.

        • Textrequired — (String)

          The text of a note.

        • UpdatedByrequired — (String)

          The principal that created a note.

        • UpdatedAtrequired — (String)

          The timestamp of when the note was updated.

          Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

      • Vulnerabilities — (Array<map>)

        Provides a list of vulnerabilities associated with the findings.

        • Idrequired — (String)

          The identifier of the vulnerability.

        • VulnerablePackages — (Array<map>)

          List of software packages that have the vulnerability.

          • Name — (String)

            The name of the software package.

          • Version — (String)

            The version of the software package.

          • Epoch — (String)

            The epoch of the software package.

          • Release — (String)

            The release of the software package.

          • Architecture — (String)

            The architecture used for the software package.

          • PackageManager — (String)

            The source of the package.

          • FilePath — (String)

            The file system path to the package manager inventory file.

          • FixedInVersion — (String)

            The version of the software package in which the vulnerability has been resolved.

          • Remediation — (String)

            Describes the actions a customer can take to resolve the vulnerability in the software package.

          • SourceLayerHash — (String)

            The source layer hash of the vulnerable package.

          • SourceLayerArn — (String)

            The Amazon Resource Name (ARN) of the source layer.

        • Cvss — (Array<map>)

          CVSS scores from the advisory related to the vulnerability.

          • Version — (String)

            The version of CVSS for the CVSS score.

          • BaseScore — (Float)

            The base CVSS score.

          • BaseVector — (String)

            The base scoring vector for the CVSS score.

          • Source — (String)

            The origin of the original CVSS score and vector.

          • Adjustments — (Array<map>)

            Adjustments to the CVSS metrics.

            • Metric — (String)

              The metric to adjust.

            • Reason — (String)

              The reason for the adjustment.

        • RelatedVulnerabilities — (Array<String>)

          List of vulnerabilities that are related to this vulnerability.

        • Vendor — (map)

          Information about the vendor that generates the vulnerability report.

          • Namerequired — (String)

            The name of the vendor.

          • Url — (String)

            The URL of the vulnerability advisory.

          • VendorSeverity — (String)

            The severity that the vendor assigned to the vulnerability.

          • VendorCreatedAt — (String)

            Indicates when the vulnerability advisory was created.

            Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

          • VendorUpdatedAt — (String)

            Indicates when the vulnerability advisory was last updated.

            Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

        • ReferenceUrls — (Array<String>)

          A list of URLs that provide additional information about the vulnerability.

        • FixAvailable — (String)

          Specifies if all vulnerable packages in a finding have a value for FixedInVersion and Remediation. This field is evaluated for each vulnerability Id based on the number of vulnerable packages that have a value for both FixedInVersion and Remediation. Valid values are as follows:

          • YES if all vulnerable packages have a value for both FixedInVersion and Remediation

          • NO if no vulnerable packages have a value for FixedInVersion and Remediation

          • PARTIAL otherwise

          Possible values include:
          • "YES"
          • "NO"
          • "PARTIAL"
        • EpssScore — (Float)

          The Exploit Prediction Scoring System (EPSS) score for a finding.

        • ExploitAvailable — (String)

          Whether an exploit is available for a finding.

          Possible values include:
          • "YES"
          • "NO"
        • LastKnownExploitAt — (String)

          The date and time of the last exploit associated with a finding discovered in your environment.

        • CodeVulnerabilities — (Array<map>)

          The vulnerabilities found in your Lambda function code. This field pertains to findings that Security Hub receives from Amazon Inspector.

          • Cwes — (Array<String>)

            The Common Weakness Enumeration (CWE) item associated with the detected code vulnerability.

          • FilePath — (map)

            Provides details about where a code vulnerability is located in your Lambda function.

            • EndLine — (Integer)

              The line number of the last line of code in which the vulnerability is located.

            • FileName — (String)

              The name of the file in which the code vulnerability is located.

            • FilePath — (String)

              The file path to the code in which the vulnerability is located.

            • StartLine — (Integer)

              The line number of the first line of code in which the vulnerability is located.

          • SourceArn — (String)

            The Amazon Resource Name (ARN) of the Lambda layer in which the code vulnerability is located.

      • PatchSummary — (map)

        Provides an overview of the patch compliance status for an instance against a selected compliance standard.

        • Idrequired — (String)

          The identifier of the compliance standard that was used to determine the patch compliance status.

        • InstalledCount — (Integer)

          The number of patches from the compliance standard that were installed successfully.

        • MissingCount — (Integer)

          The number of patches that are part of the compliance standard but are not installed. The count includes patches that failed to install.

        • FailedCount — (Integer)

          The number of patches from the compliance standard that failed to install.

        • InstalledOtherCount — (Integer)

          The number of installed patches that are not part of the compliance standard.

        • InstalledRejectedCount — (Integer)

          The number of patches that are installed but are also on a list of patches that the customer rejected.

        • InstalledPendingReboot — (Integer)

          The number of patches that were applied, but that require the instance to be rebooted in order to be marked as installed.

        • OperationStartTime — (String)

          Indicates when the operation started.

          Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

        • OperationEndTime — (String)

          Indicates when the operation completed.

          Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

        • RebootOption — (String)

          The reboot option specified for the instance.

        • Operation — (String)

          The type of patch operation performed. For Patch Manager, the values are SCAN and INSTALL.

      • Action — (map)

        Provides details about an action that affects or that was taken on a resource.

        • ActionType — (String)

          The type of action that was detected. The possible action types are:

          • NETWORK_CONNECTION

          • AWS_API_CALL

          • DNS_REQUEST

          • PORT_PROBE

        • NetworkConnectionAction — (map)

          Included if ActionType is NETWORK_CONNECTION. Provides details about the network connection that was detected.

          • ConnectionDirection — (String)

            The direction of the network connection request (IN or OUT).

          • RemoteIpDetails — (map)

            Information about the remote IP address that issued the network connection request.

            • IpAddressV4 — (String)

              The IP address.

            • Organization — (map)

              The internet service provider (ISP) organization associated with the remote IP address.

              • Asn — (Integer)

                The Autonomous System Number (ASN) of the internet provider

              • AsnOrg — (String)

                The name of the organization that registered the ASN.

              • Isp — (String)

                The ISP information for the internet provider.

              • Org — (String)

                The name of the internet provider.

            • Country — (map)

              The country where the remote IP address is located.

              • CountryCode — (String)

                The 2-letter ISO 3166 country code for the country.

              • CountryName — (String)

                The name of the country.

            • City — (map)

              The city where the remote IP address is located.

              • CityName — (String)

                The name of the city.

            • GeoLocation — (map)

              The coordinates of the location of the remote IP address.

              • Lon — (Float)

                The longitude of the location.

              • Lat — (Float)

                The latitude of the location.

          • RemotePortDetails — (map)

            Information about the port on the remote IP address.

            • Port — (Integer)

              The number of the port.

            • PortName — (String)

              The port name of the remote connection.

          • LocalPortDetails — (map)

            Information about the port on the EC2 instance.

            • Port — (Integer)

              The number of the port.

            • PortName — (String)

              The port name of the local connection.

          • Protocol — (String)

            The protocol used to make the network connection request.

          • Blocked — (Boolean)

            Indicates whether the network connection attempt was blocked.

        • AwsApiCallAction — (map)

          Included if ActionType is AWS_API_CALL. Provides details about the API call that was detected.

          • Api — (String)

            The name of the API method that was issued.

          • ServiceName — (String)

            The name of the Amazon Web Services service that the API method belongs to.

          • CallerType — (String)

            Indicates whether the API call originated from a remote IP address (remoteip) or from a DNS domain (domain).

          • RemoteIpDetails — (map)

            Provided if CallerType is remoteIp. Provides information about the remote IP address that the API call originated from.

            • IpAddressV4 — (String)

              The IP address.

            • Organization — (map)

              The internet service provider (ISP) organization associated with the remote IP address.

              • Asn — (Integer)

                The Autonomous System Number (ASN) of the internet provider

              • AsnOrg — (String)

                The name of the organization that registered the ASN.

              • Isp — (String)

                The ISP information for the internet provider.

              • Org — (String)

                The name of the internet provider.

            • Country — (map)

              The country where the remote IP address is located.

              • CountryCode — (String)

                The 2-letter ISO 3166 country code for the country.

              • CountryName — (String)

                The name of the country.

            • City — (map)

              The city where the remote IP address is located.

              • CityName — (String)

                The name of the city.

            • GeoLocation — (map)

              The coordinates of the location of the remote IP address.

              • Lon — (Float)

                The longitude of the location.

              • Lat — (Float)

                The latitude of the location.

          • DomainDetails — (map)

            Provided if CallerType is domain. Provides information about the DNS domain that the API call originated from.

            • Domain — (String)

              The name of the DNS domain that issued the API call.

          • AffectedResources — (map<String>)

            Identifies the resources that were affected by the API call.

          • FirstSeen — (String)

            An ISO8601-formatted timestamp that indicates when the API call was first observed.

            A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

          • LastSeen — (String)

            An ISO8601-formatted timestamp that indicates when the API call was most recently observed.

            A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DnsRequestAction — (map)

          Included if ActionType is DNS_REQUEST. Provides details about the DNS request that was detected.

          • Domain — (String)

            The DNS domain that is associated with the DNS request.

          • Protocol — (String)

            The protocol that was used for the DNS request.

          • Blocked — (Boolean)

            Indicates whether the DNS request was blocked.

        • PortProbeAction — (map)

          Included if ActionType is PORT_PROBE. Provides details about the port probe that was detected.

          • PortProbeDetails — (Array<map>)

            Information about the ports affected by the port probe.

            • LocalPortDetails — (map)

              Provides information about the port that was scanned.

              • Port — (Integer)

                The number of the port.

              • PortName — (String)

                The port name of the local connection.

            • LocalIpDetails — (map)

              Provides information about the IP address where the scanned port is located.

              • IpAddressV4 — (String)

                The IP address.

            • RemoteIpDetails — (map)

              Provides information about the remote IP address that performed the scan.

              • IpAddressV4 — (String)

                The IP address.

              • Organization — (map)

                The internet service provider (ISP) organization associated with the remote IP address.

                • Asn — (Integer)

                  The Autonomous System Number (ASN) of the internet provider

                • AsnOrg — (String)

                  The name of the organization that registered the ASN.

                • Isp — (String)

                  The ISP information for the internet provider.

                • Org — (String)

                  The name of the internet provider.

              • Country — (map)

                The country where the remote IP address is located.

                • CountryCode — (String)

                  The 2-letter ISO 3166 country code for the country.

                • CountryName — (String)

                  The name of the country.

              • City — (map)

                The city where the remote IP address is located.

                • CityName — (String)

                  The name of the city.

              • GeoLocation — (map)

                The coordinates of the location of the remote IP address.

                • Lon — (Float)

                  The longitude of the location.

                • Lat — (Float)

                  The latitude of the location.

          • Blocked — (Boolean)

            Indicates whether the port probe was blocked.

      • FindingProviderFields — (map)

        In a BatchImportFindings request, finding providers use FindingProviderFields to provide and update their own values for confidence, criticality, related findings, severity, and types.

        • Confidence — (Integer)

          A finding's confidence. Confidence is defined as the likelihood that a finding accurately identifies the behavior or issue that it was intended to identify.

          Confidence is scored on a 0-100 basis using a ratio scale, where 0 means zero percent confidence and 100 means 100 percent confidence.

        • Criticality — (Integer)

          The level of importance assigned to the resources associated with the finding.

          A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources.

        • RelatedFindings — (Array<map>)

          A list of findings that are related to the current finding.

          • ProductArnrequired — (String)

            The ARN of the product that generated a related finding.

          • Idrequired — (String)

            The product-generated identifier for a related finding.

        • Severity — (map)

          The severity of a finding.

          • Label — (String)

            The severity label assigned to the finding by the finding provider.

            Possible values include:
            • "INFORMATIONAL"
            • "LOW"
            • "MEDIUM"
            • "HIGH"
            • "CRITICAL"
          • Original — (String)

            The finding provider's original value for the severity.

        • Types — (Array<String>)

          One or more finding types in the format of namespace/category/classifier that classify a finding.

          Valid namespace values are: Software and Configuration Checks | TTPs | Effects | Unusual Behaviors | Sensitive Data Identifications

      • Sample — (Boolean)

        Indicates whether the finding is a sample finding.

      • GeneratorDetails — (map)

        Provides metadata for the Amazon CodeGuru detector associated with a finding. This field pertains to findings that relate to Lambda functions. Amazon Inspector identifies policy violations and vulnerabilities in Lambda function code based on internal detectors developed in collaboration with Amazon CodeGuru. Security Hub receives those findings.

        • Name — (String)

          The name of the detector used to identify the code vulnerability.

        • Description — (String)

          The description of the detector used to identify the code vulnerability.

        • Labels — (Array<String>)

          An array of tags used to identify the detector associated with the finding.

      • ProcessedAt — (String)

        An ISO8601-formatted timestamp that indicates when Security Hub received a finding and begins to process it.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

      • AwsAccountName — (String)

        The name of the Amazon Web Services account from which a finding was generated.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • FailedCount — (Integer)

        The number of findings that failed to import.

      • SuccessCount — (Integer)

        The number of findings that were successfully imported.

      • FailedFindings — (Array<map>)

        The list of findings that failed to import.

        • Idrequired — (String)

          The identifier of the finding that could not be updated.

        • ErrorCoderequired — (String)

          The code of the error returned by the BatchImportFindings operation.

        • ErrorMessagerequired — (String)

          The message of the error returned by the BatchImportFindings operation.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

batchUpdateAutomationRules(params = {}, callback) ⇒ AWS.Request

Updates one or more automation rules based on rule Amazon Resource Names (ARNs) and input parameters.

Service Reference:

Examples:

To update one ore more automation rules


/* The following example updates the specified automation rules. */

 var params = {
  UpdateAutomationRulesRequestItems: [
     {
    RuleArn: "arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
    RuleOrder: 15, 
    RuleStatus: "ENABLED"
   }, 
     {
    RuleArn: "arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE22222", 
    RuleStatus: "DISABLED"
   }
  ]
 };
 securityhub.batchUpdateAutomationRules(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    ProcessedAutomationRules: [
       "arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
       "arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE22222"
    ]
   }
   */
 });

Calling the batchUpdateAutomationRules operation

var params = {
  UpdateAutomationRulesRequestItems: [ /* required */
    {
      RuleArn: 'STRING_VALUE', /* required */
      Actions: [
        {
          FindingFieldsUpdate: {
            Confidence: 'NUMBER_VALUE',
            Criticality: 'NUMBER_VALUE',
            Note: {
              Text: 'STRING_VALUE', /* required */
              UpdatedBy: 'STRING_VALUE' /* required */
            },
            RelatedFindings: [
              {
                Id: 'STRING_VALUE', /* required */
                ProductArn: 'STRING_VALUE' /* required */
              },
              /* more items */
            ],
            Severity: {
              Label: INFORMATIONAL | LOW | MEDIUM | HIGH | CRITICAL,
              Normalized: 'NUMBER_VALUE',
              Product: 'NUMBER_VALUE'
            },
            Types: [
              'STRING_VALUE',
              /* more items */
            ],
            UserDefinedFields: {
              '<NonEmptyString>': 'STRING_VALUE',
              /* '<NonEmptyString>': ... */
            },
            VerificationState: UNKNOWN | TRUE_POSITIVE | FALSE_POSITIVE | BENIGN_POSITIVE,
            Workflow: {
              Status: NEW | NOTIFIED | RESOLVED | SUPPRESSED
            }
          },
          Type: FINDING_FIELDS_UPDATE
        },
        /* more items */
      ],
      Criteria: {
        AwsAccountId: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        AwsAccountName: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        CompanyName: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        ComplianceAssociatedStandardsId: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        ComplianceSecurityControlId: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        ComplianceStatus: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        Confidence: [
          {
            Eq: 'NUMBER_VALUE',
            Gt: 'NUMBER_VALUE',
            Gte: 'NUMBER_VALUE',
            Lt: 'NUMBER_VALUE',
            Lte: 'NUMBER_VALUE'
          },
          /* more items */
        ],
        CreatedAt: [
          {
            DateRange: {
              Unit: DAYS,
              Value: 'NUMBER_VALUE'
            },
            End: 'STRING_VALUE',
            Start: 'STRING_VALUE'
          },
          /* more items */
        ],
        Criticality: [
          {
            Eq: 'NUMBER_VALUE',
            Gt: 'NUMBER_VALUE',
            Gte: 'NUMBER_VALUE',
            Lt: 'NUMBER_VALUE',
            Lte: 'NUMBER_VALUE'
          },
          /* more items */
        ],
        Description: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        FirstObservedAt: [
          {
            DateRange: {
              Unit: DAYS,
              Value: 'NUMBER_VALUE'
            },
            End: 'STRING_VALUE',
            Start: 'STRING_VALUE'
          },
          /* more items */
        ],
        GeneratorId: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        Id: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        LastObservedAt: [
          {
            DateRange: {
              Unit: DAYS,
              Value: 'NUMBER_VALUE'
            },
            End: 'STRING_VALUE',
            Start: 'STRING_VALUE'
          },
          /* more items */
        ],
        NoteText: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        NoteUpdatedAt: [
          {
            DateRange: {
              Unit: DAYS,
              Value: 'NUMBER_VALUE'
            },
            End: 'STRING_VALUE',
            Start: 'STRING_VALUE'
          },
          /* more items */
        ],
        NoteUpdatedBy: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        ProductArn: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        ProductName: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        RecordState: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        RelatedFindingsId: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        RelatedFindingsProductArn: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        ResourceApplicationArn: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        ResourceApplicationName: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        ResourceDetailsOther: [
          {
            Comparison: EQUALS | NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Key: 'STRING_VALUE',
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        ResourceId: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        ResourcePartition: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        ResourceRegion: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        ResourceTags: [
          {
            Comparison: EQUALS | NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Key: 'STRING_VALUE',
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        ResourceType: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        SeverityLabel: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        SourceUrl: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        Title: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        Type: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        UpdatedAt: [
          {
            DateRange: {
              Unit: DAYS,
              Value: 'NUMBER_VALUE'
            },
            End: 'STRING_VALUE',
            Start: 'STRING_VALUE'
          },
          /* more items */
        ],
        UserDefinedFields: [
          {
            Comparison: EQUALS | NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Key: 'STRING_VALUE',
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        VerificationState: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ],
        WorkflowStatus: [
          {
            Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
            Value: 'STRING_VALUE'
          },
          /* more items */
        ]
      },
      Description: 'STRING_VALUE',
      IsTerminal: true || false,
      RuleName: 'STRING_VALUE',
      RuleOrder: 'NUMBER_VALUE',
      RuleStatus: ENABLED | DISABLED
    },
    /* more items */
  ]
};
securityhub.batchUpdateAutomationRules(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • UpdateAutomationRulesRequestItems — (Array<map>)

      An array of ARNs for the rules that are to be updated. Optionally, you can also include RuleStatus and RuleOrder.

      • RuleArnrequired — (String)

        The Amazon Resource Name (ARN) for the rule.

      • RuleStatus — (String)

        Whether the rule is active after it is created. If this parameter is equal to ENABLED, Security Hub starts applying the rule to findings and finding updates after the rule is created. To change the value of this parameter after creating a rule, use BatchUpdateAutomationRules .

        Possible values include:
        • "ENABLED"
        • "DISABLED"
      • RuleOrder — (Integer)

        An integer ranging from 1 to 1000 that represents the order in which the rule action is applied to findings. Security Hub applies rules with lower values for this parameter first.

      • Description — (String)

        A description of the rule.

      • RuleName — (String)

        The name of the rule.

      • IsTerminal — (Boolean)

        Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding matches the criteria for multiple rules, and each rule has different actions. If a rule is terminal, Security Hub applies the rule action to a finding that matches the rule criteria and doesn't evaluate other rules for the finding. By default, a rule isn't terminal.

      • Criteria — (map)

        A set of ASFF finding field attributes and corresponding expected values that Security Hub uses to filter findings. If a rule is enabled and a finding matches the conditions specified in this parameter, Security Hub applies the rule action to the finding.

        • ProductArn — (Array<map>)

          The Amazon Resource Name (ARN) for a third-party product that generated a finding in Security Hub.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • AwsAccountId — (Array<map>)

          The Amazon Web Services account ID in which a finding was generated.

          Array Members: Minimum number of 1 item. Maximum number of 100 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • Id — (Array<map>)

          The product-specific identifier for a finding.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • GeneratorId — (Array<map>)

          The identifier for the solution-specific component that generated a finding.

          Array Members: Minimum number of 1 item. Maximum number of 100 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • Type — (Array<map>)

          One or more finding types in the format of namespace/category/classifier that classify a finding. For a list of namespaces, classifiers, and categories, see Types taxonomy for ASFF in the Security Hub User Guide.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • FirstObservedAt — (Array<map>)

          A timestamp that indicates when the potential security issue captured by a finding was first observed by the security findings product.

          Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Start — (String)

            A timestamp that provides the start date for the date filter.

            A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

          • End — (String)

            A timestamp that provides the end date for the date filter.

            A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

          • DateRange — (map)

            A date range for the date filter.

            • Value — (Integer)

              A date range value for the date filter.

            • Unit — (String)

              A date range unit for the date filter.

              Possible values include:
              • "DAYS"
        • LastObservedAt — (Array<map>)

          A timestamp that indicates when the potential security issue captured by a finding was most recently observed by the security findings product.

          Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Start — (String)

            A timestamp that provides the start date for the date filter.

            A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

          • End — (String)

            A timestamp that provides the end date for the date filter.

            A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

          • DateRange — (map)

            A date range for the date filter.

            • Value — (Integer)

              A date range value for the date filter.

            • Unit — (String)

              A date range unit for the date filter.

              Possible values include:
              • "DAYS"
        • CreatedAt — (Array<map>)

          A timestamp that indicates when this finding record was created.

          Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Start — (String)

            A timestamp that provides the start date for the date filter.

            A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

          • End — (String)

            A timestamp that provides the end date for the date filter.

            A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

          • DateRange — (map)

            A date range for the date filter.

            • Value — (Integer)

              A date range value for the date filter.

            • Unit — (String)

              A date range unit for the date filter.

              Possible values include:
              • "DAYS"
        • UpdatedAt — (Array<map>)

          A timestamp that indicates when the finding record was most recently updated.

          Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Start — (String)

            A timestamp that provides the start date for the date filter.

            A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

          • End — (String)

            A timestamp that provides the end date for the date filter.

            A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

          • DateRange — (map)

            A date range for the date filter.

            • Value — (Integer)

              A date range value for the date filter.

            • Unit — (String)

              A date range unit for the date filter.

              Possible values include:
              • "DAYS"
        • Confidence — (Array<map>)

          The likelihood that a finding accurately identifies the behavior or issue that it was intended to identify. Confidence is scored on a 0–100 basis using a ratio scale. A value of 0 means 0 percent confidence, and a value of 100 means 100 percent confidence. For example, a data exfiltration detection based on a statistical deviation of network traffic has low confidence because an actual exfiltration hasn't been verified. For more information, see Confidence in the Security Hub User Guide.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Gte — (Float)

            The greater-than-equal condition to be applied to a single field when querying for findings.

          • Lte — (Float)

            The less-than-equal condition to be applied to a single field when querying for findings.

          • Gt — (Float)

            The greater-than condition to be applied to a single field when querying for findings.

          • Lt — (Float)

            The less-than condition to be applied to a single field when querying for findings.

          • Eq — (Float)

            The equal-to condition to be applied to a single field when querying for findings.

        • Criticality — (Array<map>)

          The level of importance that is assigned to the resources that are associated with a finding. Criticality is scored on a 0–100 basis, using a ratio scale that supports only full integers. A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources. For more information, see Criticality in the Security Hub User Guide.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Gte — (Float)

            The greater-than-equal condition to be applied to a single field when querying for findings.

          • Lte — (Float)

            The less-than-equal condition to be applied to a single field when querying for findings.

          • Gt — (Float)

            The greater-than condition to be applied to a single field when querying for findings.

          • Lt — (Float)

            The less-than condition to be applied to a single field when querying for findings.

          • Eq — (Float)

            The equal-to condition to be applied to a single field when querying for findings.

        • Title — (Array<map>)

          A finding's title.

          Array Members: Minimum number of 1 item. Maximum number of 100 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • Description — (Array<map>)

          A finding's description.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • SourceUrl — (Array<map>)

          Provides a URL that links to a page about the current finding in the finding product.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • ProductName — (Array<map>)

          Provides the name of the product that generated the finding. For control-based findings, the product name is Security Hub.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • CompanyName — (Array<map>)

          The name of the company for the product that generated the finding. For control-based findings, the company is Amazon Web Services.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • SeverityLabel — (Array<map>)

          The severity value of the finding.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • ResourceType — (Array<map>)

          The type of resource that the finding pertains to.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • ResourceId — (Array<map>)

          The identifier for the given resource type. For Amazon Web Services resources that are identified by Amazon Resource Names (ARNs), this is the ARN. For Amazon Web Services resources that lack ARNs, this is the identifier as defined by the Amazon Web Service that created the resource. For non-Amazon Web Services resources, this is a unique identifier that is associated with the resource.

          Array Members: Minimum number of 1 item. Maximum number of 100 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • ResourcePartition — (Array<map>)

          The partition in which the resource that the finding pertains to is located. A partition is a group of Amazon Web Services Regions. Each Amazon Web Services account is scoped to one partition.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • ResourceRegion — (Array<map>)

          The Amazon Web Services Region where the resource that a finding pertains to is located.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • ResourceTags — (Array<map>)

          A list of Amazon Web Services tags associated with a resource at the time the finding was processed.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Key — (String)

            The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

          • Value — (String)

            The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

          • Comparison — (String)

            The condition to apply to the key value when filtering Security Hub findings with a map filter.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

            • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

            CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

            To search for values that don't have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

            • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

            NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

            CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • ResourceDetailsOther — (Array<map>)

          Custom fields and values about the resource that a finding pertains to.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Key — (String)

            The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

          • Value — (String)

            The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

          • Comparison — (String)

            The condition to apply to the key value when filtering Security Hub findings with a map filter.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

            • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

            CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

            To search for values that don't have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

            • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

            NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

            CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • ComplianceStatus — (Array<map>)

          The result of a security check. This field is only used for findings generated from controls.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • ComplianceSecurityControlId — (Array<map>)

          The security control ID for which a finding was generated. Security control IDs are the same across standards.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • ComplianceAssociatedStandardsId — (Array<map>)

          The unique identifier of a standard in which a control is enabled. This field consists of the resource portion of the Amazon Resource Name (ARN) returned for a standard in the DescribeStandards API response.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • VerificationState — (Array<map>)

          Provides the veracity of a finding.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • WorkflowStatus — (Array<map>)

          Provides information about the status of the investigation into a finding.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • RecordState — (Array<map>)

          Provides the current state of a finding.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • RelatedFindingsProductArn — (Array<map>)

          The ARN for the product that generated a related finding.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • RelatedFindingsId — (Array<map>)

          The product-generated identifier for a related finding.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • NoteText — (Array<map>)

          The text of a user-defined note that's added to a finding.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • NoteUpdatedAt — (Array<map>)

          The timestamp of when the note was updated. Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Start — (String)

            A timestamp that provides the start date for the date filter.

            A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

          • End — (String)

            A timestamp that provides the end date for the date filter.

            A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

          • DateRange — (map)

            A date range for the date filter.

            • Value — (Integer)

              A date range value for the date filter.

            • Unit — (String)

              A date range unit for the date filter.

              Possible values include:
              • "DAYS"
        • NoteUpdatedBy — (Array<map>)

          The principal that created a note.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • UserDefinedFields — (Array<map>)

          A list of user-defined name and value string pairs added to a finding.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Key — (String)

            The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

          • Value — (String)

            The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

          • Comparison — (String)

            The condition to apply to the key value when filtering Security Hub findings with a map filter.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

            • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

            CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

            To search for values that don't have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

            • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

            NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

            CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • ResourceApplicationArn — (Array<map>)

          The Amazon Resource Name (ARN) of the application that is related to a finding.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • ResourceApplicationName — (Array<map>)

          The name of the application that is related to a finding.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
        • AwsAccountName — (Array<map>)

          The name of the Amazon Web Services account in which a finding was generated.

          Array Members: Minimum number of 1 item. Maximum number of 20 items.

          • Value — (String)

            The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

          • Comparison — (String)

            The condition to apply to a string value when filtering Security Hub findings.

            To search for values that have the filter value, use one of the following comparison operators:

            • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

            • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

            • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

            CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

            To search for values that don’t have the filter value, use one of the following comparison operators:

            • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

            • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

            • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

            NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

            You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

            You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

            For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

            • ResourceType PREFIX AwsIam

            • ResourceType PREFIX AwsEc2

            • ResourceType NOT_EQUALS AwsIamPolicy

            • ResourceType NOT_EQUALS AwsEc2NetworkInterface

            CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

            Possible values include:
            • "EQUALS"
            • "PREFIX"
            • "NOT_EQUALS"
            • "PREFIX_NOT_EQUALS"
            • "CONTAINS"
            • "NOT_CONTAINS"
      • Actions — (Array<map>)

        One or more actions to update finding fields if a finding matches the conditions specified in Criteria.

        • Type — (String)

          Specifies that the rule action should update the Types finding field. The Types finding field classifies findings in the format of namespace/category/classifier. For more information, see Types taxonomy for ASFF in the Security Hub User Guide.

          Possible values include:
          • "FINDING_FIELDS_UPDATE"
        • FindingFieldsUpdate — (map)

          Specifies that the automation rule action is an update to a finding field.

          • Note — (map)

            The updated note.

            • Textrequired — (String)

              The updated note text.

            • UpdatedByrequired — (String)

              The principal that updated the note.

          • Severity — (map)

            Updates to the severity information for a finding.

            • Normalized — (Integer)

              The normalized severity for the finding. This attribute is to be deprecated in favor of Label.

              If you provide Normalized and do not provide Label, Label is set automatically as follows.

              • 0 - INFORMATIONAL

              • 1–39 - LOW

              • 40–69 - MEDIUM

              • 70–89 - HIGH

              • 90–100 - CRITICAL

            • Product — (Float)

              The native severity as defined by the Amazon Web Services service or integrated partner product that generated the finding.

            • Label — (String)

              The severity value of the finding. The allowed values are the following.

              • INFORMATIONAL - No issue was found.

              • LOW - The issue does not require action on its own.

              • MEDIUM - The issue must be addressed but not urgently.

              • HIGH - The issue must be addressed as a priority.

              • CRITICAL - The issue must be remediated immediately to avoid it escalating.

              Possible values include:
              • "INFORMATIONAL"
              • "LOW"
              • "MEDIUM"
              • "HIGH"
              • "CRITICAL"
          • VerificationState — (String)

            The rule action updates the VerificationState field of a finding.

            Possible values include:
            • "UNKNOWN"
            • "TRUE_POSITIVE"
            • "FALSE_POSITIVE"
            • "BENIGN_POSITIVE"
          • Confidence — (Integer)

            The rule action updates the Confidence field of a finding.

          • Criticality — (Integer)

            The rule action updates the Criticality field of a finding.

          • Types — (Array<String>)

            The rule action updates the Types field of a finding.

          • UserDefinedFields — (map<String>)

            The rule action updates the UserDefinedFields field of a finding.

          • Workflow — (map)

            Used to update information about the investigation into the finding.

            • Status — (String)

              The status of the investigation into the finding. The workflow status is specific to an individual finding. It does not affect the generation of new findings. For example, setting the workflow status to SUPPRESSED or RESOLVED does not prevent a new finding for the same issue.

              The allowed values are the following.

              • NEW - The initial state of a finding, before it is reviewed.

                Security Hub also resets WorkFlowStatus from NOTIFIED or RESOLVED to NEW in the following cases:

                • The record state changes from ARCHIVED to ACTIVE.

                • The compliance status changes from PASSED to either WARNING, FAILED, or NOT_AVAILABLE.

              • NOTIFIED - Indicates that you notified the resource owner about the security issue. Used when the initial reviewer is not the resource owner, and needs intervention from the resource owner.

              • RESOLVED - The finding was reviewed and remediated and is now considered resolved.

              • SUPPRESSED - Indicates that you reviewed the finding and do not believe that any action is needed. The finding is no longer updated.

              Possible values include:
              • "NEW"
              • "NOTIFIED"
              • "RESOLVED"
              • "SUPPRESSED"
          • RelatedFindings — (Array<map>)

            The rule action updates the RelatedFindings field of a finding.

            • ProductArnrequired — (String)

              The ARN of the product that generated a related finding.

            • Idrequired — (String)

              The product-generated identifier for a related finding.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • ProcessedAutomationRules — (Array<String>)

        A list of properly processed rule ARNs.

      • UnprocessedAutomationRules — (Array<map>)

        A list of objects containing RuleArn, ErrorCode, and ErrorMessage. This parameter tells you which automation rules the request didn't update and why.

        • RuleArn — (String)

          The Amazon Resource Name (ARN) for the unprocessed automation rule.

        • ErrorCode — (Integer)

          The error code associated with the unprocessed automation rule.

        • ErrorMessage — (String)

          An error message describing why a request didn't process a specific rule.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

batchUpdateFindings(params = {}, callback) ⇒ AWS.Request

Used by Security Hub customers to update information about their investigation into a finding. Requested by administrator accounts or member accounts. Administrator accounts can update findings for their account and their member accounts. Member accounts can update findings for their account.

Updates from BatchUpdateFindings do not affect the value of UpdatedAt for a finding.

Administrator and member accounts can use BatchUpdateFindings to update the following finding fields and objects.

  • Confidence

  • Criticality

  • Note

  • RelatedFindings

  • Severity

  • Types

  • UserDefinedFields

  • VerificationState

  • Workflow

You can configure IAM policies to restrict access to fields and field values. For example, you might not want member accounts to be able to suppress findings or change the finding severity. See Configuring access to BatchUpdateFindings in the Security Hub User Guide.

Service Reference:

Examples:

To update Security Hub findings


/* The following example updates Security Hub findings. The finding identifier parameter specifies which findings to update. Only specific finding fields can be updated with this operation. */

 var params = {
  Confidence: 80, 
  Criticality: 80, 
  FindingIdentifiers: [
     {
    Id: "arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1/PCI.Lambda.2/finding/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
    ProductArn: "arn:aws:securityhub:us-west-1::product/aws/securityhub"
   }, 
     {
    Id: "arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1/PCI.Lambda.2/finding/a1b2c3d4-5678-90ab-cdef-EXAMPLE22222", 
    ProductArn: "arn:aws:securityhub:us-west-1::product/aws/securityhub"
   }
  ], 
  Note: {
   Text: "Known issue that is not a risk.", 
   UpdatedBy: "user1"
  }, 
  RelatedFindings: [
     {
    Id: "arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1/PCI.Lambda.2/finding/a1b2c3d4-5678-90ab-cdef-EXAMPLE33333", 
    ProductArn: "arn:aws:securityhub:us-west-1::product/aws/securityhub"
   }
  ], 
  Severity: {
   Label: "LOW"
  }, 
  Types: [
     "Software and Configuration Checks/Vulnerabilities/CVE"
  ], 
  UserDefinedFields: {
   "reviewedByCio": "true"
  }, 
  VerificationState: "TRUE_POSITIVE", 
  Workflow: {
   Status: "RESOLVED"
  }
 };
 securityhub.batchUpdateFindings(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    ProcessedFindings: [
       {
      Id: "arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1/PCI.Lambda.2/finding/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
      ProductArn: "arn:aws:securityhub:us-west-1::product/aws/securityhub"
     }, 
       {
      Id: "arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1/PCI.Lambda.2/finding/a1b2c3d4-5678-90ab-cdef-EXAMPLE22222", 
      ProductArn: "arn:aws:securityhub:us-west-1::product/aws/securityhub"
     }
    ], 
    UnprocessedFindings: [
    ]
   }
   */
 });

Calling the batchUpdateFindings operation

var params = {
  FindingIdentifiers: [ /* required */
    {
      Id: 'STRING_VALUE', /* required */
      ProductArn: 'STRING_VALUE' /* required */
    },
    /* more items */
  ],
  Confidence: 'NUMBER_VALUE',
  Criticality: 'NUMBER_VALUE',
  Note: {
    Text: 'STRING_VALUE', /* required */
    UpdatedBy: 'STRING_VALUE' /* required */
  },
  RelatedFindings: [
    {
      Id: 'STRING_VALUE', /* required */
      ProductArn: 'STRING_VALUE' /* required */
    },
    /* more items */
  ],
  Severity: {
    Label: INFORMATIONAL | LOW | MEDIUM | HIGH | CRITICAL,
    Normalized: 'NUMBER_VALUE',
    Product: 'NUMBER_VALUE'
  },
  Types: [
    'STRING_VALUE',
    /* more items */
  ],
  UserDefinedFields: {
    '<NonEmptyString>': 'STRING_VALUE',
    /* '<NonEmptyString>': ... */
  },
  VerificationState: UNKNOWN | TRUE_POSITIVE | FALSE_POSITIVE | BENIGN_POSITIVE,
  Workflow: {
    Status: NEW | NOTIFIED | RESOLVED | SUPPRESSED
  }
};
securityhub.batchUpdateFindings(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • FindingIdentifiers — (Array<map>)

      The list of findings to update. BatchUpdateFindings can be used to update up to 100 findings at a time.

      For each finding, the list provides the finding identifier and the ARN of the finding provider.

      • Idrequired — (String)

        The identifier of the finding that was specified by the finding provider.

      • ProductArnrequired — (String)

        The ARN generated by Security Hub that uniquely identifies a product that generates findings. This can be the ARN for a third-party product that is integrated with Security Hub, or the ARN for a custom integration.

    • Note — (map)

      The updated note.

      • Textrequired — (String)

        The updated note text.

      • UpdatedByrequired — (String)

        The principal that updated the note.

    • Severity — (map)

      Used to update the finding severity.

      • Normalized — (Integer)

        The normalized severity for the finding. This attribute is to be deprecated in favor of Label.

        If you provide Normalized and do not provide Label, Label is set automatically as follows.

        • 0 - INFORMATIONAL

        • 1–39 - LOW

        • 40–69 - MEDIUM

        • 70–89 - HIGH

        • 90–100 - CRITICAL

      • Product — (Float)

        The native severity as defined by the Amazon Web Services service or integrated partner product that generated the finding.

      • Label — (String)

        The severity value of the finding. The allowed values are the following.

        • INFORMATIONAL - No issue was found.

        • LOW - The issue does not require action on its own.

        • MEDIUM - The issue must be addressed but not urgently.

        • HIGH - The issue must be addressed as a priority.

        • CRITICAL - The issue must be remediated immediately to avoid it escalating.

        Possible values include:
        • "INFORMATIONAL"
        • "LOW"
        • "MEDIUM"
        • "HIGH"
        • "CRITICAL"
    • VerificationState — (String)

      Indicates the veracity of a finding.

      The available values for VerificationState are as follows.

      • UNKNOWN – The default disposition of a security finding

      • TRUE_POSITIVE – The security finding is confirmed

      • FALSE_POSITIVE – The security finding was determined to be a false alarm

      • BENIGN_POSITIVE – A special case of TRUE_POSITIVE where the finding doesn't pose any threat, is expected, or both

      Possible values include:
      • "UNKNOWN"
      • "TRUE_POSITIVE"
      • "FALSE_POSITIVE"
      • "BENIGN_POSITIVE"
    • Confidence — (Integer)

      The updated value for the finding confidence. Confidence is defined as the likelihood that a finding accurately identifies the behavior or issue that it was intended to identify.

      Confidence is scored on a 0-100 basis using a ratio scale, where 0 means zero percent confidence and 100 means 100 percent confidence.

    • Criticality — (Integer)

      The updated value for the level of importance assigned to the resources associated with the findings.

      A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources.

    • Types — (Array<String>)

      One or more finding types in the format of namespace/category/classifier that classify a finding.

      Valid namespace values are as follows.

      • Software and Configuration Checks

      • TTPs

      • Effects

      • Unusual Behaviors

      • Sensitive Data Identifications

    • UserDefinedFields — (map<String>)

      A list of name/value string pairs associated with the finding. These are custom, user-defined fields added to a finding.

    • Workflow — (map)

      Used to update the workflow status of a finding.

      The workflow status indicates the progress of the investigation into the finding.

      • Status — (String)

        The status of the investigation into the finding. The workflow status is specific to an individual finding. It does not affect the generation of new findings. For example, setting the workflow status to SUPPRESSED or RESOLVED does not prevent a new finding for the same issue.

        The allowed values are the following.

        • NEW - The initial state of a finding, before it is reviewed.

          Security Hub also resets WorkFlowStatus from NOTIFIED or RESOLVED to NEW in the following cases:

          • The record state changes from ARCHIVED to ACTIVE.

          • The compliance status changes from PASSED to either WARNING, FAILED, or NOT_AVAILABLE.

        • NOTIFIED - Indicates that you notified the resource owner about the security issue. Used when the initial reviewer is not the resource owner, and needs intervention from the resource owner.

        • RESOLVED - The finding was reviewed and remediated and is now considered resolved.

        • SUPPRESSED - Indicates that you reviewed the finding and do not believe that any action is needed. The finding is no longer updated.

        Possible values include:
        • "NEW"
        • "NOTIFIED"
        • "RESOLVED"
        • "SUPPRESSED"
    • RelatedFindings — (Array<map>)

      A list of findings that are related to the updated findings.

      • ProductArnrequired — (String)

        The ARN of the product that generated a related finding.

      • Idrequired — (String)

        The product-generated identifier for a related finding.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • ProcessedFindings — (Array<map>)

        The list of findings that were updated successfully.

        • Idrequired — (String)

          The identifier of the finding that was specified by the finding provider.

        • ProductArnrequired — (String)

          The ARN generated by Security Hub that uniquely identifies a product that generates findings. This can be the ARN for a third-party product that is integrated with Security Hub, or the ARN for a custom integration.

      • UnprocessedFindings — (Array<map>)

        The list of findings that were not updated.

        • FindingIdentifierrequired — (map)

          The identifier of the finding that was not updated.

          • Idrequired — (String)

            The identifier of the finding that was specified by the finding provider.

          • ProductArnrequired — (String)

            The ARN generated by Security Hub that uniquely identifies a product that generates findings. This can be the ARN for a third-party product that is integrated with Security Hub, or the ARN for a custom integration.

        • ErrorCoderequired — (String)

          The code associated with the error. Possible values are:

          • ConcurrentUpdateError - Another request attempted to update the finding while this request was being processed. This error may also occur if you call BatchUpdateFindings and BatchImportFindings at the same time.

          • DuplicatedFindingIdentifier - The request included two or more findings with the same FindingIdentifier.

          • FindingNotFound - The FindingIdentifier included in the request did not match an existing finding.

          • FindingSizeExceeded - The finding size was greater than the permissible value of 240 KB.

          • InternalFailure - An internal service failure occurred when updating the finding.

          • InvalidInput - The finding update contained an invalid value that did not satisfy the Amazon Web Services Security Finding Format syntax.

        • ErrorMessagerequired — (String)

          The message associated with the error. Possible values are:

          • Concurrent finding updates detected

          • Finding Identifier is duplicated

          • Finding Not Found

          • Finding size exceeded 240 KB

          • Internal service failure

          • Invalid Input

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

batchUpdateStandardsControlAssociations(params = {}, callback) ⇒ AWS.Request

For a batch of security controls and standards, this operation updates the enablement status of a control in a standard.

Examples:

To update enablement status of a batch of controls


/* The following example disables CloudWatch.12 in CIS AWS Foundations Benchmark v1.2.0. The example returns an error for CloudTrail.1 because an invalid standard ARN is provided. */

 var params = {
  StandardsControlAssociationUpdates: [
     {
    AssociationStatus: "DISABLED", 
    SecurityControlId: "CloudTrail.1", 
    StandardsArn: "arn:aws:securityhub:::ruleset/sample-standard/v/1.1.0", 
    UpdatedReason: "Not relevant to environment"
   }, 
     {
    AssociationStatus: "DISABLED", 
    SecurityControlId: "CloudWatch.12", 
    StandardsArn: "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0", 
    UpdatedReason: "Not relevant to environment"
   }
  ]
 };
 securityhub.batchUpdateStandardsControlAssociations(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    UnprocessedAssociationUpdates: [
       {
      ErrorCode: "INVALID_INPUT", 
      ErrorReason: "Invalid Standards Arn: 'arn:aws:securityhub:::ruleset/sample-standard/v/1.1.0'", 
      StandardsControlAssociationUpdate: {
       AssociationStatus: "DISABLED", 
       SecurityControlId: "CloudTrail.1", 
       StandardsArn: "arn:aws:securityhub:::ruleset/sample-standard/v/1.1.0", 
       UpdatedReason: "Test Reason"
      }
     }
    ]
   }
   */
 });

Calling the batchUpdateStandardsControlAssociations operation

var params = {
  StandardsControlAssociationUpdates: [ /* required */
    {
      AssociationStatus: ENABLED | DISABLED, /* required */
      SecurityControlId: 'STRING_VALUE', /* required */
      StandardsArn: 'STRING_VALUE', /* required */
      UpdatedReason: 'STRING_VALUE'
    },
    /* more items */
  ]
};
securityhub.batchUpdateStandardsControlAssociations(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • StandardsControlAssociationUpdates — (Array<map>)

      Updates the enablement status of a security control in a specified standard.

      • StandardsArnrequired — (String)

        The Amazon Resource Name (ARN) of the standard in which you want to update the control's enablement status.

      • SecurityControlIdrequired — (String)

        The unique identifier for the security control whose enablement status you want to update.

      • AssociationStatusrequired — (String)

        The desired enablement status of the control in the standard.

        Possible values include:
        • "ENABLED"
        • "DISABLED"
      • UpdatedReason — (String)

        The reason for updating the control's enablement status in the standard.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • UnprocessedAssociationUpdates — (Array<map>)

        A security control (identified with SecurityControlId, SecurityControlArn, or a mix of both parameters) whose enablement status in a specified standard couldn't be updated.

        • StandardsControlAssociationUpdaterequired — (map)

          An array of control and standard associations for which an update failed when calling BatchUpdateStandardsControlAssociations.

          • StandardsArnrequired — (String)

            The Amazon Resource Name (ARN) of the standard in which you want to update the control's enablement status.

          • SecurityControlIdrequired — (String)

            The unique identifier for the security control whose enablement status you want to update.

          • AssociationStatusrequired — (String)

            The desired enablement status of the control in the standard.

            Possible values include:
            • "ENABLED"
            • "DISABLED"
          • UpdatedReason — (String)

            The reason for updating the control's enablement status in the standard.

        • ErrorCoderequired — (String)

          The error code for the unprocessed update of the control's enablement status in the specified standard.

          Possible values include:
          • "INVALID_INPUT"
          • "ACCESS_DENIED"
          • "NOT_FOUND"
          • "LIMIT_EXCEEDED"
        • ErrorReason — (String)

          The reason why a control's enablement status in the specified standard couldn't be updated.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

createActionTarget(params = {}, callback) ⇒ AWS.Request

Creates a custom action target in Security Hub.

You can use custom actions on findings and insights in Security Hub to trigger target actions in Amazon CloudWatch Events.

Service Reference:

Examples:

To create a custom action target


/* The following example creates a custom action target in Security Hub. Custom actions on findings and insights automatically trigger actions in Amazon CloudWatch Events. */

 var params = {
  Description: "Action to send the finding for remediation tracking", 
  Id: "Remediation", 
  Name: "Send to remediation"
 };
 securityhub.createActionTarget(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    ActionTargetArn: "arn:aws:securityhub:us-west-1:123456789012:action/custom/Remediation"
   }
   */
 });

Calling the createActionTarget operation

var params = {
  Description: 'STRING_VALUE', /* required */
  Id: 'STRING_VALUE', /* required */
  Name: 'STRING_VALUE' /* required */
};
securityhub.createActionTarget(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • Name — (String)

      The name of the custom action target. Can contain up to 20 characters.

    • Description — (String)

      The description for the custom action target.

    • Id — (String)

      The ID for the custom action target. Can contain up to 20 alphanumeric characters.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • ActionTargetArn — (String)

        The Amazon Resource Name (ARN) for the custom action target.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

createAutomationRule(params = {}, callback) ⇒ AWS.Request

Creates an automation rule based on input parameters.

Service Reference:

Examples:

To create an automation rule


/* The following example creates an automation rule. */

 var params = {
  Actions: [
     {
    FindingFieldsUpdate: {
     Note: {
      Text: "This is a critical S3 bucket, please look into this ASAP", 
      UpdatedBy: "test-user"
     }, 
     Severity: {
      Label: "CRITICAL"
     }
    }, 
    Type: "FINDING_FIELDS_UPDATE"
   }
  ], 
  Criteria: {
   ComplianceStatus: [
      {
     Comparison: "EQUALS", 
     Value: "FAILED"
    }
   ], 
   ProductName: [
      {
     Comparison: "EQUALS", 
     Value: "Security Hub"
    }
   ], 
   RecordState: [
      {
     Comparison: "EQUALS", 
     Value: "ACTIVE"
    }
   ], 
   ResourceId: [
      {
     Comparison: "EQUALS", 
     Value: "arn:aws:s3:::examplebucket/developers/design_info.doc"
    }
   ], 
   WorkflowStatus: [
      {
     Comparison: "EQUALS", 
     Value: "NEW"
    }
   ]
  }, 
  Description: "Elevate finding severity to Critical for important resources", 
  IsTerminal: false, 
  RuleName: "Elevate severity for important resources", 
  RuleOrder: 1, 
  RuleStatus: "ENABLED", 
  Tags: {
   "important-resources-rule": "s3-bucket"
  }
 };
 securityhub.createAutomationRule(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    RuleArn: "arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111"
   }
   */
 });

Calling the createAutomationRule operation

var params = {
  Actions: [ /* required */
    {
      FindingFieldsUpdate: {
        Confidence: 'NUMBER_VALUE',
        Criticality: 'NUMBER_VALUE',
        Note: {
          Text: 'STRING_VALUE', /* required */
          UpdatedBy: 'STRING_VALUE' /* required */
        },
        RelatedFindings: [
          {
            Id: 'STRING_VALUE', /* required */
            ProductArn: 'STRING_VALUE' /* required */
          },
          /* more items */
        ],
        Severity: {
          Label: INFORMATIONAL | LOW | MEDIUM | HIGH | CRITICAL,
          Normalized: 'NUMBER_VALUE',
          Product: 'NUMBER_VALUE'
        },
        Types: [
          'STRING_VALUE',
          /* more items */
        ],
        UserDefinedFields: {
          '<NonEmptyString>': 'STRING_VALUE',
          /* '<NonEmptyString>': ... */
        },
        VerificationState: UNKNOWN | TRUE_POSITIVE | FALSE_POSITIVE | BENIGN_POSITIVE,
        Workflow: {
          Status: NEW | NOTIFIED | RESOLVED | SUPPRESSED
        }
      },
      Type: FINDING_FIELDS_UPDATE
    },
    /* more items */
  ],
  Criteria: { /* required */
    AwsAccountId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    AwsAccountName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    CompanyName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ComplianceAssociatedStandardsId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ComplianceSecurityControlId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ComplianceStatus: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Confidence: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    CreatedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    Criticality: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    Description: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    FirstObservedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    GeneratorId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Id: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    LastObservedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    NoteText: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NoteUpdatedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    NoteUpdatedBy: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProductArn: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProductName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    RecordState: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    RelatedFindingsId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    RelatedFindingsProductArn: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceApplicationArn: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceApplicationName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceDetailsOther: [
      {
        Comparison: EQUALS | NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Key: 'STRING_VALUE',
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourcePartition: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceRegion: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceTags: [
      {
        Comparison: EQUALS | NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Key: 'STRING_VALUE',
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceType: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    SeverityLabel: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    SourceUrl: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Title: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Type: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    UpdatedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    UserDefinedFields: [
      {
        Comparison: EQUALS | NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Key: 'STRING_VALUE',
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    VerificationState: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    WorkflowStatus: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ]
  },
  Description: 'STRING_VALUE', /* required */
  RuleName: 'STRING_VALUE', /* required */
  RuleOrder: 'NUMBER_VALUE', /* required */
  IsTerminal: true || false,
  RuleStatus: ENABLED | DISABLED,
  Tags: {
    '<TagKey>': 'STRING_VALUE',
    /* '<TagKey>': ... */
  }
};
securityhub.createAutomationRule(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • Tags — (map<String>)

      User-defined tags associated with an automation rule.

    • RuleStatus — (String)

      Whether the rule is active after it is created. If this parameter is equal to ENABLED, Security Hub starts applying the rule to findings and finding updates after the rule is created. To change the value of this parameter after creating a rule, use BatchUpdateAutomationRules .

      Possible values include:
      • "ENABLED"
      • "DISABLED"
    • RuleOrder — (Integer)

      An integer ranging from 1 to 1000 that represents the order in which the rule action is applied to findings. Security Hub applies rules with lower values for this parameter first.

    • RuleName — (String)

      The name of the rule.

    • Description — (String)

      A description of the rule.

    • IsTerminal — (Boolean)

      Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding matches the criteria for multiple rules, and each rule has different actions. If a rule is terminal, Security Hub applies the rule action to a finding that matches the rule criteria and doesn't evaluate other rules for the finding. By default, a rule isn't terminal.

    • Criteria — (map)

      A set of ASFF finding field attributes and corresponding expected values that Security Hub uses to filter findings. If a rule is enabled and a finding matches the conditions specified in this parameter, Security Hub applies the rule action to the finding.

      • ProductArn — (Array<map>)

        The Amazon Resource Name (ARN) for a third-party product that generated a finding in Security Hub.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • AwsAccountId — (Array<map>)

        The Amazon Web Services account ID in which a finding was generated.

        Array Members: Minimum number of 1 item. Maximum number of 100 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Id — (Array<map>)

        The product-specific identifier for a finding.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • GeneratorId — (Array<map>)

        The identifier for the solution-specific component that generated a finding.

        Array Members: Minimum number of 1 item. Maximum number of 100 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Type — (Array<map>)

        One or more finding types in the format of namespace/category/classifier that classify a finding. For a list of namespaces, classifiers, and categories, see Types taxonomy for ASFF in the Security Hub User Guide.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • FirstObservedAt — (Array<map>)

        A timestamp that indicates when the potential security issue captured by a finding was first observed by the security findings product.

        Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • LastObservedAt — (Array<map>)

        A timestamp that indicates when the potential security issue captured by a finding was most recently observed by the security findings product.

        Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • CreatedAt — (Array<map>)

        A timestamp that indicates when this finding record was created.

        Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • UpdatedAt — (Array<map>)

        A timestamp that indicates when the finding record was most recently updated.

        Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • Confidence — (Array<map>)

        The likelihood that a finding accurately identifies the behavior or issue that it was intended to identify. Confidence is scored on a 0–100 basis using a ratio scale. A value of 0 means 0 percent confidence, and a value of 100 means 100 percent confidence. For example, a data exfiltration detection based on a statistical deviation of network traffic has low confidence because an actual exfiltration hasn't been verified. For more information, see Confidence in the Security Hub User Guide.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • Criticality — (Array<map>)

        The level of importance that is assigned to the resources that are associated with a finding. Criticality is scored on a 0–100 basis, using a ratio scale that supports only full integers. A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources. For more information, see Criticality in the Security Hub User Guide.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • Title — (Array<map>)

        A finding's title.

        Array Members: Minimum number of 1 item. Maximum number of 100 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Description — (Array<map>)

        A finding's description.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • SourceUrl — (Array<map>)

        Provides a URL that links to a page about the current finding in the finding product.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ProductName — (Array<map>)

        Provides the name of the product that generated the finding. For control-based findings, the product name is Security Hub.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • CompanyName — (Array<map>)

        The name of the company for the product that generated the finding. For control-based findings, the company is Amazon Web Services.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • SeverityLabel — (Array<map>)

        The severity value of the finding.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceType — (Array<map>)

        The type of resource that the finding pertains to.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceId — (Array<map>)

        The identifier for the given resource type. For Amazon Web Services resources that are identified by Amazon Resource Names (ARNs), this is the ARN. For Amazon Web Services resources that lack ARNs, this is the identifier as defined by the Amazon Web Service that created the resource. For non-Amazon Web Services resources, this is a unique identifier that is associated with the resource.

        Array Members: Minimum number of 1 item. Maximum number of 100 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourcePartition — (Array<map>)

        The partition in which the resource that the finding pertains to is located. A partition is a group of Amazon Web Services Regions. Each Amazon Web Services account is scoped to one partition.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceRegion — (Array<map>)

        The Amazon Web Services Region where the resource that a finding pertains to is located.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceTags — (Array<map>)

        A list of Amazon Web Services tags associated with a resource at the time the finding was processed.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Key — (String)

          The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

        • Value — (String)

          The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

        • Comparison — (String)

          The condition to apply to the key value when filtering Security Hub findings with a map filter.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

          • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

          CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

          To search for values that don't have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

          • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

          NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

          CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceDetailsOther — (Array<map>)

        Custom fields and values about the resource that a finding pertains to.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Key — (String)

          The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

        • Value — (String)

          The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

        • Comparison — (String)

          The condition to apply to the key value when filtering Security Hub findings with a map filter.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

          • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

          CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

          To search for values that don't have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

          • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

          NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

          CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ComplianceStatus — (Array<map>)

        The result of a security check. This field is only used for findings generated from controls.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ComplianceSecurityControlId — (Array<map>)

        The security control ID for which a finding was generated. Security control IDs are the same across standards.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ComplianceAssociatedStandardsId — (Array<map>)

        The unique identifier of a standard in which a control is enabled. This field consists of the resource portion of the Amazon Resource Name (ARN) returned for a standard in the DescribeStandards API response.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • VerificationState — (Array<map>)

        Provides the veracity of a finding.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • WorkflowStatus — (Array<map>)

        Provides information about the status of the investigation into a finding.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • RecordState — (Array<map>)

        Provides the current state of a finding.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • RelatedFindingsProductArn — (Array<map>)

        The ARN for the product that generated a related finding.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • RelatedFindingsId — (Array<map>)

        The product-generated identifier for a related finding.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NoteText — (Array<map>)

        The text of a user-defined note that's added to a finding.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NoteUpdatedAt — (Array<map>)

        The timestamp of when the note was updated. Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • NoteUpdatedBy — (Array<map>)

        The principal that created a note.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • UserDefinedFields — (Array<map>)

        A list of user-defined name and value string pairs added to a finding.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Key — (String)

          The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

        • Value — (String)

          The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

        • Comparison — (String)

          The condition to apply to the key value when filtering Security Hub findings with a map filter.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

          • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

          CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

          To search for values that don't have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

          • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

          NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

          CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceApplicationArn — (Array<map>)

        The Amazon Resource Name (ARN) of the application that is related to a finding.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceApplicationName — (Array<map>)

        The name of the application that is related to a finding.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • AwsAccountName — (Array<map>)

        The name of the Amazon Web Services account in which a finding was generated.

        Array Members: Minimum number of 1 item. Maximum number of 20 items.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
    • Actions — (Array<map>)

      One or more actions to update finding fields if a finding matches the conditions specified in Criteria.

      • Type — (String)

        Specifies that the rule action should update the Types finding field. The Types finding field classifies findings in the format of namespace/category/classifier. For more information, see Types taxonomy for ASFF in the Security Hub User Guide.

        Possible values include:
        • "FINDING_FIELDS_UPDATE"
      • FindingFieldsUpdate — (map)

        Specifies that the automation rule action is an update to a finding field.

        • Note — (map)

          The updated note.

          • Textrequired — (String)

            The updated note text.

          • UpdatedByrequired — (String)

            The principal that updated the note.

        • Severity — (map)

          Updates to the severity information for a finding.

          • Normalized — (Integer)

            The normalized severity for the finding. This attribute is to be deprecated in favor of Label.

            If you provide Normalized and do not provide Label, Label is set automatically as follows.

            • 0 - INFORMATIONAL

            • 1–39 - LOW

            • 40–69 - MEDIUM

            • 70–89 - HIGH

            • 90–100 - CRITICAL

          • Product — (Float)

            The native severity as defined by the Amazon Web Services service or integrated partner product that generated the finding.

          • Label — (String)

            The severity value of the finding. The allowed values are the following.

            • INFORMATIONAL - No issue was found.

            • LOW - The issue does not require action on its own.

            • MEDIUM - The issue must be addressed but not urgently.

            • HIGH - The issue must be addressed as a priority.

            • CRITICAL - The issue must be remediated immediately to avoid it escalating.

            Possible values include:
            • "INFORMATIONAL"
            • "LOW"
            • "MEDIUM"
            • "HIGH"
            • "CRITICAL"
        • VerificationState — (String)

          The rule action updates the VerificationState field of a finding.

          Possible values include:
          • "UNKNOWN"
          • "TRUE_POSITIVE"
          • "FALSE_POSITIVE"
          • "BENIGN_POSITIVE"
        • Confidence — (Integer)

          The rule action updates the Confidence field of a finding.

        • Criticality — (Integer)

          The rule action updates the Criticality field of a finding.

        • Types — (Array<String>)

          The rule action updates the Types field of a finding.

        • UserDefinedFields — (map<String>)

          The rule action updates the UserDefinedFields field of a finding.

        • Workflow — (map)

          Used to update information about the investigation into the finding.

          • Status — (String)

            The status of the investigation into the finding. The workflow status is specific to an individual finding. It does not affect the generation of new findings. For example, setting the workflow status to SUPPRESSED or RESOLVED does not prevent a new finding for the same issue.

            The allowed values are the following.

            • NEW - The initial state of a finding, before it is reviewed.

              Security Hub also resets WorkFlowStatus from NOTIFIED or RESOLVED to NEW in the following cases:

              • The record state changes from ARCHIVED to ACTIVE.

              • The compliance status changes from PASSED to either WARNING, FAILED, or NOT_AVAILABLE.

            • NOTIFIED - Indicates that you notified the resource owner about the security issue. Used when the initial reviewer is not the resource owner, and needs intervention from the resource owner.

            • RESOLVED - The finding was reviewed and remediated and is now considered resolved.

            • SUPPRESSED - Indicates that you reviewed the finding and do not believe that any action is needed. The finding is no longer updated.

            Possible values include:
            • "NEW"
            • "NOTIFIED"
            • "RESOLVED"
            • "SUPPRESSED"
        • RelatedFindings — (Array<map>)

          The rule action updates the RelatedFindings field of a finding.

          • ProductArnrequired — (String)

            The ARN of the product that generated a related finding.

          • Idrequired — (String)

            The product-generated identifier for a related finding.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • RuleArn — (String)

        The Amazon Resource Name (ARN) of the automation rule that you created.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

createConfigurationPolicy(params = {}, callback) ⇒ AWS.Request

Creates a configuration policy with the defined configuration. Only the Security Hub delegated administrator can invoke this operation from the home Region.

Service Reference:

Examples:

To create a configuration policy


/* This operation creates a configuration policy in Security Hub. */

 var params = {
  ConfigurationPolicy: {
   SecurityHub: {
    EnabledStandardIdentifiers: [
       "arn:aws:securityhub:us-east-1::standards/aws-foundational-security-best-practices/v/1.0.0", 
       "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0"
    ], 
    SecurityControlsConfiguration: {
     DisabledSecurityControlIdentifiers: [
        "CloudWatch.1"
     ], 
     SecurityControlCustomParameters: [
        {
       Parameters: {
        "daysToExpiration": {
          Value: {
           Integer: 14
          }, 
          ValueType: "CUSTOM"
         }
       }, 
       SecurityControlId: "ACM.1"
      }
     ]
    }, 
    ServiceEnabled: true
   }
  }, 
  Description: "Configuration policy for testing FSBP and CIS", 
  Name: "TestConfigurationPolicy"
 };
 securityhub.createConfigurationPolicy(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    Arn: "arn:aws:securityhub:us-east-1:123456789012:configuration-policy/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
    ConfigurationPolicy: {
     SecurityHub: {
      EnabledStandardIdentifiers: [
         "arn:aws:securityhub:us-east-1::standards/aws-foundational-security-best-practices/v/1.0.0", 
         "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0"
      ], 
      SecurityControlsConfiguration: {
       DisabledSecurityControlIdentifiers: [
          "CloudWatch.1"
       ], 
       SecurityControlCustomParameters: [
          {
         Parameters: {
          "daysToExpiration": {
            Value: {
             Integer: 14
            }, 
            ValueType: "CUSTOM"
           }
         }, 
         SecurityControlId: "ACM.1"
        }
       ]
      }, 
      ServiceEnabled: true
     }
    }, 
    CreatedAt: <Date Representation>, 
    Description: "Configuration policy for testing FSBP and CIS", 
    Id: "a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
    Name: "TestConfigurationPolicy", 
    UpdatedAt: <Date Representation>
   }
   */
 });

Calling the createConfigurationPolicy operation

var params = {
  ConfigurationPolicy: { /* required */
    SecurityHub: {
      EnabledStandardIdentifiers: [
        'STRING_VALUE',
        /* more items */
      ],
      SecurityControlsConfiguration: {
        DisabledSecurityControlIdentifiers: [
          'STRING_VALUE',
          /* more items */
        ],
        EnabledSecurityControlIdentifiers: [
          'STRING_VALUE',
          /* more items */
        ],
        SecurityControlCustomParameters: [
          {
            Parameters: {
              '<NonEmptyString>': {
                ValueType: DEFAULT | CUSTOM, /* required */
                Value: {
                  Boolean: true || false,
                  Double: 'NUMBER_VALUE',
                  Enum: 'STRING_VALUE',
                  EnumList: [
                    'STRING_VALUE',
                    /* more items */
                  ],
                  Integer: 'NUMBER_VALUE',
                  IntegerList: [
                    'NUMBER_VALUE',
                    /* more items */
                  ],
                  String: 'STRING_VALUE',
                  StringList: [
                    'STRING_VALUE',
                    /* more items */
                  ]
                }
              },
              /* '<NonEmptyString>': ... */
            },
            SecurityControlId: 'STRING_VALUE'
          },
          /* more items */
        ]
      },
      ServiceEnabled: true || false
    }
  },
  Name: 'STRING_VALUE', /* required */
  Description: 'STRING_VALUE',
  Tags: {
    '<TagKey>': 'STRING_VALUE',
    /* '<TagKey>': ... */
  }
};
securityhub.createConfigurationPolicy(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • Name — (String)

      The name of the configuration policy. Alphanumeric characters and the following ASCII characters are permitted: -, ., !, *, /.

    • Description — (String)

      The description of the configuration policy.

    • ConfigurationPolicy — (map)

      An object that defines how Security Hub is configured. It includes whether Security Hub is enabled or disabled, a list of enabled security standards, a list of enabled or disabled security controls, and a list of custom parameter values for specified controls. If you provide a list of security controls that are enabled in the configuration policy, Security Hub disables all other controls (including newly released controls). If you provide a list of security controls that are disabled in the configuration policy, Security Hub enables all other controls (including newly released controls).

      • SecurityHub — (map)

        The Amazon Web Service that the configuration policy applies to.

        • ServiceEnabled — (Boolean)

          Indicates whether Security Hub is enabled in the policy.

        • EnabledStandardIdentifiers — (Array<String>)

          A list that defines which security standards are enabled in the configuration policy.

        • SecurityControlsConfiguration — (map)

          An object that defines which security controls are enabled in the configuration policy. The enablement status of a control is aligned across all of the enabled standards in an account.

          • EnabledSecurityControlIdentifiers — (Array<String>)

            A list of security controls that are enabled in the configuration policy. Security Hub disables all other controls (including newly released controls) other than the listed controls.

          • DisabledSecurityControlIdentifiers — (Array<String>)

            A list of security controls that are disabled in the configuration policy. Security Hub enables all other controls (including newly released controls) other than the listed controls.

          • SecurityControlCustomParameters — (Array<map>)

            A list of security controls and control parameter values that are included in a configuration policy.

            • SecurityControlId — (String)

              The ID of the security control.

            • Parameters — (map<map>)

              An object that specifies parameter values for a control in a configuration policy.

              • ValueTyperequired — (String)

                Identifies whether a control parameter uses a custom user-defined value or subscribes to the default Security Hub behavior.

                When ValueType is set equal to DEFAULT, the default behavior can be a specific Security Hub default value, or the default behavior can be to ignore a specific parameter. When ValueType is set equal to DEFAULT, Security Hub ignores user-provided input for the Value field.

                When ValueType is set equal to CUSTOM, the Value field can't be empty.

                Possible values include:
                • "DEFAULT"
                • "CUSTOM"
              • Value — (map)

                The current value of a control parameter.

                • Integer — (Integer)

                  A control parameter that is an integer.

                • IntegerList — (Array<Integer>)

                  A control parameter that is a list of integers.

                • Double — (Float)

                  A control parameter that is a double.

                • String — (String)

                  A control parameter that is a string.

                • StringList — (Array<String>)

                  A control parameter that is a list of strings.

                • Boolean — (Boolean)

                  A control parameter that is a boolean.

                • Enum — (String)

                  A control parameter that is an enum.

                • EnumList — (Array<String>)

                  A control parameter that is a list of enums.

    • Tags — (map<String>)

      User-defined tags associated with a configuration policy. For more information, see Tagging Security Hub resources in the Security Hub user guide.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • Arn — (String)

        The Amazon Resource Name (ARN) of the configuration policy.

      • Id — (String)

        The universally unique identifier (UUID) of the configuration policy.

      • Name — (String)

        The name of the configuration policy.

      • Description — (String)

        The description of the configuration policy.

      • UpdatedAt — (Date)

        The date and time, in UTC and ISO 8601 format, that the configuration policy was last updated.

      • CreatedAt — (Date)

        The date and time, in UTC and ISO 8601 format, that the configuration policy was created.

      • ConfigurationPolicy — (map)

        An object that defines how Security Hub is configured. It includes whether Security Hub is enabled or disabled, a list of enabled security standards, a list of enabled or disabled security controls, and a list of custom parameter values for specified controls. If the request included a list of security controls that are enabled in the configuration policy, Security Hub disables all other controls (including newly released controls). If the request included a list of security controls that are disabled in the configuration policy, Security Hub enables all other controls (including newly released controls).

        • SecurityHub — (map)

          The Amazon Web Service that the configuration policy applies to.

          • ServiceEnabled — (Boolean)

            Indicates whether Security Hub is enabled in the policy.

          • EnabledStandardIdentifiers — (Array<String>)

            A list that defines which security standards are enabled in the configuration policy.

          • SecurityControlsConfiguration — (map)

            An object that defines which security controls are enabled in the configuration policy. The enablement status of a control is aligned across all of the enabled standards in an account.

            • EnabledSecurityControlIdentifiers — (Array<String>)

              A list of security controls that are enabled in the configuration policy. Security Hub disables all other controls (including newly released controls) other than the listed controls.

            • DisabledSecurityControlIdentifiers — (Array<String>)

              A list of security controls that are disabled in the configuration policy. Security Hub enables all other controls (including newly released controls) other than the listed controls.

            • SecurityControlCustomParameters — (Array<map>)

              A list of security controls and control parameter values that are included in a configuration policy.

              • SecurityControlId — (String)

                The ID of the security control.

              • Parameters — (map<map>)

                An object that specifies parameter values for a control in a configuration policy.

                • ValueTyperequired — (String)

                  Identifies whether a control parameter uses a custom user-defined value or subscribes to the default Security Hub behavior.

                  When ValueType is set equal to DEFAULT, the default behavior can be a specific Security Hub default value, or the default behavior can be to ignore a specific parameter. When ValueType is set equal to DEFAULT, Security Hub ignores user-provided input for the Value field.

                  When ValueType is set equal to CUSTOM, the Value field can't be empty.

                  Possible values include:
                  • "DEFAULT"
                  • "CUSTOM"
                • Value — (map)

                  The current value of a control parameter.

                  • Integer — (Integer)

                    A control parameter that is an integer.

                  • IntegerList — (Array<Integer>)

                    A control parameter that is a list of integers.

                  • Double — (Float)

                    A control parameter that is a double.

                  • String — (String)

                    A control parameter that is a string.

                  • StringList — (Array<String>)

                    A control parameter that is a list of strings.

                  • Boolean — (Boolean)

                    A control parameter that is a boolean.

                  • Enum — (String)

                    A control parameter that is an enum.

                  • EnumList — (Array<String>)

                    A control parameter that is a list of enums.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

createFindingAggregator(params = {}, callback) ⇒ AWS.Request

Used to enable finding aggregation. Must be called from the aggregation Region.

For more details about cross-Region replication, see Configuring finding aggregation in the Security Hub User Guide.

Service Reference:

Examples:

To enable cross-Region aggregation


/* The following example creates a finding aggregator. This is required to enable cross-Region aggregation. */

 var params = {
  RegionLinkingMode: "SPECIFIED_REGIONS", 
  Regions: [
     "us-west-1", 
     "us-west-2"
  ]
 };
 securityhub.createFindingAggregator(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    FindingAggregationRegion: "us-east-1", 
    FindingAggregatorArn: "arn:aws:securityhub:us-east-1:222222222222:finding-aggregator/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
    RegionLinkingMode: "SPECIFIED_REGIONS", 
    Regions: [
       "us-west-1", 
       "us-west-2"
    ]
   }
   */
 });

Calling the createFindingAggregator operation

var params = {
  RegionLinkingMode: 'STRING_VALUE', /* required */
  Regions: [
    'STRING_VALUE',
    /* more items */
  ]
};
securityhub.createFindingAggregator(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • RegionLinkingMode — (String)

      Indicates whether to aggregate findings from all of the available Regions in the current partition. Also determines whether to automatically aggregate findings from new Regions as Security Hub supports them and you opt into them.

      The selected option also determines how to use the Regions provided in the Regions list.

      The options are as follows:

      • ALL_REGIONS - Indicates to aggregate findings from all of the Regions where Security Hub is enabled. When you choose this option, Security Hub also automatically aggregates findings from new Regions as Security Hub supports them and you opt into them.

      • ALL_REGIONS_EXCEPT_SPECIFIED - Indicates to aggregate findings from all of the Regions where Security Hub is enabled, except for the Regions listed in the Regions parameter. When you choose this option, Security Hub also automatically aggregates findings from new Regions as Security Hub supports them and you opt into them.

      • SPECIFIED_REGIONS - Indicates to aggregate findings only from the Regions listed in the Regions parameter. Security Hub does not automatically aggregate findings from new Regions.

    • Regions — (Array<String>)

      If RegionLinkingMode is ALL_REGIONS_EXCEPT_SPECIFIED, then this is a space-separated list of Regions that do not aggregate findings to the aggregation Region.

      If RegionLinkingMode is SPECIFIED_REGIONS, then this is a space-separated list of Regions that do aggregate findings to the aggregation Region.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • FindingAggregatorArn — (String)

        The ARN of the finding aggregator. You use the finding aggregator ARN to retrieve details for, update, and stop finding aggregation.

      • FindingAggregationRegion — (String)

        The aggregation Region.

      • RegionLinkingMode — (String)

        Indicates whether to link all Regions, all Regions except for a list of excluded Regions, or a list of included Regions.

      • Regions — (Array<String>)

        The list of excluded Regions or included Regions.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

createInsight(params = {}, callback) ⇒ AWS.Request

Creates a custom insight in Security Hub. An insight is a consolidation of findings that relate to a security issue that requires attention or remediation.

To group the related findings in the insight, use the GroupByAttribute.

Service Reference:

Examples:

To create a custom insight


/* The following example creates a custom insight in Security Hub. An insight is a collection of findings that relate to a security issue. */

 var params = {
  Filters: {
   ResourceType: [
      {
     Comparison: "EQUALS", 
     Value: "AwsIamRole"
    }
   ], 
   SeverityLabel: [
      {
     Comparison: "EQUALS", 
     Value: "CRITICAL"
    }
   ]
  }, 
  GroupByAttribute: "ResourceId", 
  Name: "Critical role findings"
 };
 securityhub.createInsight(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    InsightArn: "arn:aws:securityhub:us-west-1:123456789012:insight/123456789012/custom/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111"
   }
   */
 });

Calling the createInsight operation

var params = {
  Filters: { /* required */
    AwsAccountId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    AwsAccountName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    CompanyName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ComplianceAssociatedStandardsId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ComplianceSecurityControlId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ComplianceSecurityControlParametersName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ComplianceSecurityControlParametersValue: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ComplianceStatus: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Confidence: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    CreatedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    Criticality: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    Description: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsConfidence: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsCriticality: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsRelatedFindingsId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsRelatedFindingsProductArn: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsSeverityLabel: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsSeverityOriginal: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsTypes: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    FirstObservedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    GeneratorId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Id: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Keyword: [
      {
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    LastObservedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    MalwareName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    MalwarePath: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    MalwareState: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    MalwareType: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkDestinationDomain: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkDestinationIpV4: [
      {
        Cidr: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkDestinationIpV6: [
      {
        Cidr: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkDestinationPort: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    NetworkDirection: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkProtocol: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkSourceDomain: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkSourceIpV4: [
      {
        Cidr: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkSourceIpV6: [
      {
        Cidr: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkSourceMac: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkSourcePort: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    NoteText: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NoteUpdatedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    NoteUpdatedBy: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProcessLaunchedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProcessName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProcessParentPid: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    ProcessPath: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProcessPid: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    ProcessTerminatedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProductArn: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProductFields: [
      {
        Comparison: EQUALS | NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Key: 'STRING_VALUE',
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProductName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    RecommendationText: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    RecordState: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Region: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    RelatedFindingsId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    RelatedFindingsProductArn: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceApplicationArn: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceApplicationName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceIamInstanceProfileArn: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceImageId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceIpV4Addresses: [
      {
        Cidr: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceIpV6Addresses: [
      {
        Cidr: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceKeyName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceLaunchedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceSubnetId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceType: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceVpcId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsIamAccessKeyCreatedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsIamAccessKeyPrincipalName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsIamAccessKeyStatus: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsIamAccessKeyUserName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsIamUserUserName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsS3BucketOwnerId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsS3BucketOwnerName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceContainerImageId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceContainerImageName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceContainerLaunchedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceContainerName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceDetailsOther: [
      {
        Comparison: EQUALS | NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Key: 'STRING_VALUE',
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourcePartition: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceRegion: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceTags: [
      {
        Comparison: EQUALS | NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Key: 'STRING_VALUE',
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceType: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Sample: [
      {
        Value: true || false
      },
      /* more items */
    ],
    SeverityLabel: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    SeverityNormalized: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    SeverityProduct: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    SourceUrl: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ThreatIntelIndicatorCategory: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ThreatIntelIndicatorLastObservedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    ThreatIntelIndicatorSource: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ThreatIntelIndicatorSourceUrl: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ThreatIntelIndicatorType: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ThreatIntelIndicatorValue: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Title: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Type: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    UpdatedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    UserDefinedFields: [
      {
        Comparison: EQUALS | NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Key: 'STRING_VALUE',
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    VerificationState: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    VulnerabilitiesExploitAvailable: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    VulnerabilitiesFixAvailable: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    WorkflowState: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    WorkflowStatus: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ]
  },
  GroupByAttribute: 'STRING_VALUE', /* required */
  Name: 'STRING_VALUE' /* required */
};
securityhub.createInsight(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • Name — (String)

      The name of the custom insight to create.

    • Filters — (map)

      One or more attributes used to filter the findings included in the insight. The insight only includes findings that match the criteria defined in the filters.

      • ProductArn — (Array<map>)

        The ARN generated by Security Hub that uniquely identifies a third-party company (security findings provider) after this provider's product (solution that generates findings) is registered with Security Hub.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • AwsAccountId — (Array<map>)

        The Amazon Web Services account ID in which a finding is generated.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Id — (Array<map>)

        The security findings provider-specific identifier for a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • GeneratorId — (Array<map>)

        The identifier for the solution-specific component (a discrete unit of logic) that generated a finding. In various security findings providers' solutions, this generator can be called a rule, a check, a detector, a plugin, etc.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Region — (Array<map>)

        The Region from which the finding was generated.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Type — (Array<map>)

        A finding type in the format of namespace/category/classifier that classifies a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • FirstObservedAt — (Array<map>)

        An ISO8601-formatted timestamp that indicates when the security findings provider first observed the potential security issue that a finding captured.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • LastObservedAt — (Array<map>)

        An ISO8601-formatted timestamp that indicates when the security findings provider most recently observed the potential security issue that a finding captured.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • CreatedAt — (Array<map>)

        An ISO8601-formatted timestamp that indicates when the security findings provider captured the potential security issue that a finding captured.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • UpdatedAt — (Array<map>)

        An ISO8601-formatted timestamp that indicates when the security findings provider last updated the finding record.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • SeverityProduct — (Array<map>)

        The native severity as defined by the security findings provider's solution that generated the finding.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • SeverityNormalized — (Array<map>)

        The normalized severity of a finding.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • SeverityLabel — (Array<map>)

        The label of a finding's severity.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Confidence — (Array<map>)

        A finding's confidence. Confidence is defined as the likelihood that a finding accurately identifies the behavior or issue that it was intended to identify.

        Confidence is scored on a 0-100 basis using a ratio scale, where 0 means zero percent confidence and 100 means 100 percent confidence.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • Criticality — (Array<map>)

        The level of importance assigned to the resources associated with the finding.

        A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • Title — (Array<map>)

        A finding's title.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Description — (Array<map>)

        A finding's description.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • RecommendationText — (Array<map>)

        The recommendation of what to do about the issue described in a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • SourceUrl — (Array<map>)

        A URL that links to a page about the current finding in the security findings provider's solution.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ProductFields — (Array<map>)

        A data type where security findings providers can include additional solution-specific details that aren't part of the defined AwsSecurityFinding format.

        • Key — (String)

          The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

        • Value — (String)

          The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

        • Comparison — (String)

          The condition to apply to the key value when filtering Security Hub findings with a map filter.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

          • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

          CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

          To search for values that don't have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

          • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

          NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

          CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ProductName — (Array<map>)

        The name of the solution (product) that generates findings.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • CompanyName — (Array<map>)

        The name of the findings provider (company) that owns the solution (product) that generates findings.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • UserDefinedFields — (Array<map>)

        A list of name/value string pairs associated with the finding. These are custom, user-defined fields added to a finding.

        • Key — (String)

          The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

        • Value — (String)

          The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

        • Comparison — (String)

          The condition to apply to the key value when filtering Security Hub findings with a map filter.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

          • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

          CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

          To search for values that don't have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

          • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

          NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

          CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • MalwareName — (Array<map>)

        The name of the malware that was observed.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • MalwareType — (Array<map>)

        The type of the malware that was observed.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • MalwarePath — (Array<map>)

        The filesystem path of the malware that was observed.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • MalwareState — (Array<map>)

        The state of the malware that was observed.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NetworkDirection — (Array<map>)

        Indicates the direction of network traffic associated with a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NetworkProtocol — (Array<map>)

        The protocol of network-related information about a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NetworkSourceIpV4 — (Array<map>)

        The source IPv4 address of network-related information about a finding.

        • Cidr — (String)

          A finding's CIDR value.

      • NetworkSourceIpV6 — (Array<map>)

        The source IPv6 address of network-related information about a finding.

        • Cidr — (String)

          A finding's CIDR value.

      • NetworkSourcePort — (Array<map>)

        The source port of network-related information about a finding.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • NetworkSourceDomain — (Array<map>)

        The source domain of network-related information about a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NetworkSourceMac — (Array<map>)

        The source media access control (MAC) address of network-related information about a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NetworkDestinationIpV4 — (Array<map>)

        The destination IPv4 address of network-related information about a finding.

        • Cidr — (String)

          A finding's CIDR value.

      • NetworkDestinationIpV6 — (Array<map>)

        The destination IPv6 address of network-related information about a finding.

        • Cidr — (String)

          A finding's CIDR value.

      • NetworkDestinationPort — (Array<map>)

        The destination port of network-related information about a finding.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • NetworkDestinationDomain — (Array<map>)

        The destination domain of network-related information about a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ProcessName — (Array<map>)

        The name of the process.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ProcessPath — (Array<map>)

        The path to the process executable.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ProcessPid — (Array<map>)

        The process ID.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • ProcessParentPid — (Array<map>)

        The parent process ID. This field accepts positive integers between O and 2147483647.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • ProcessLaunchedAt — (Array<map>)

        A timestamp that identifies when the process was launched.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • ProcessTerminatedAt — (Array<map>)

        A timestamp that identifies when the process was terminated.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • ThreatIntelIndicatorType — (Array<map>)

        The type of a threat intelligence indicator.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ThreatIntelIndicatorValue — (Array<map>)

        The value of a threat intelligence indicator.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ThreatIntelIndicatorCategory — (Array<map>)

        The category of a threat intelligence indicator.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ThreatIntelIndicatorLastObservedAt — (Array<map>)

        A timestamp that identifies the last observation of a threat intelligence indicator.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • ThreatIntelIndicatorSource — (Array<map>)

        The source of the threat intelligence.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ThreatIntelIndicatorSourceUrl — (Array<map>)

        The URL for more details from the source of the threat intelligence.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceType — (Array<map>)

        Specifies the type of the resource that details are provided for.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceId — (Array<map>)

        The canonical identifier for the given resource type.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourcePartition — (Array<map>)

        The canonical Amazon Web Services partition name that the Region is assigned to.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceRegion — (Array<map>)

        The canonical Amazon Web Services external Region name where this resource is located.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceTags — (Array<map>)

        A list of Amazon Web Services tags associated with a resource at the time the finding was processed.

        • Key — (String)

          The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

        • Value — (String)

          The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

        • Comparison — (String)

          The condition to apply to the key value when filtering Security Hub findings with a map filter.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

          • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

          CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

          To search for values that don't have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

          • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

          NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

          CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceType — (Array<map>)

        The instance type of the instance.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceImageId — (Array<map>)

        The Amazon Machine Image (AMI) ID of the instance.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceIpV4Addresses — (Array<map>)

        The IPv4 addresses associated with the instance.

        • Cidr — (String)

          A finding's CIDR value.

      • ResourceAwsEc2InstanceIpV6Addresses — (Array<map>)

        The IPv6 addresses associated with the instance.

        • Cidr — (String)

          A finding's CIDR value.

      • ResourceAwsEc2InstanceKeyName — (Array<map>)

        The key name associated with the instance.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceIamInstanceProfileArn — (Array<map>)

        The IAM profile ARN of the instance.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceVpcId — (Array<map>)

        The identifier of the VPC that the instance was launched in.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceSubnetId — (Array<map>)

        The identifier of the subnet that the instance was launched in.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceLaunchedAt — (Array<map>)

        The date and time the instance was launched.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • ResourceAwsS3BucketOwnerId — (Array<map>)

        The canonical user ID of the owner of the S3 bucket.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsS3BucketOwnerName — (Array<map>)

        The display name of the owner of the S3 bucket.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsIamAccessKeyUserName — (Array<map>)

        The user associated with the IAM access key related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsIamAccessKeyPrincipalName — (Array<map>)

        The name of the principal that is associated with an IAM access key.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsIamAccessKeyStatus — (Array<map>)

        The status of the IAM access key related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsIamAccessKeyCreatedAt — (Array<map>)

        The creation date/time of the IAM access key related to a finding.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • ResourceAwsIamUserUserName — (Array<map>)

        The name of an IAM user.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceContainerName — (Array<map>)

        The name of the container related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceContainerImageId — (Array<map>)

        The identifier of the image related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceContainerImageName — (Array<map>)

        The name of the image related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceContainerLaunchedAt — (Array<map>)

        A timestamp that identifies when the container was started.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • ResourceDetailsOther — (Array<map>)

        The details of a resource that doesn't have a specific subfield for the resource type defined.

        • Key — (String)

          The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

        • Value — (String)

          The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

        • Comparison — (String)

          The condition to apply to the key value when filtering Security Hub findings with a map filter.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

          • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

          CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

          To search for values that don't have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

          • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

          NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

          CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ComplianceStatus — (Array<map>)

        Exclusive to findings that are generated as the result of a check run against a specific rule in a supported standard, such as CIS Amazon Web Services Foundations. Contains security standard-related finding details.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • VerificationState — (Array<map>)

        The veracity of a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • WorkflowState — (Array<map>)

        The workflow state of a finding.

        Note that this field is deprecated. To search for a finding based on its workflow status, use WorkflowStatus.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • WorkflowStatus — (Array<map>)

        The status of the investigation into a finding. Allowed values are the following.

        • NEW - The initial state of a finding, before it is reviewed.

          Security Hub also resets the workflow status from NOTIFIED or RESOLVED to NEW in the following cases:

          • RecordState changes from ARCHIVED to ACTIVE.

          • Compliance.Status changes from PASSED to either WARNING, FAILED, or NOT_AVAILABLE.

        • NOTIFIED - Indicates that the resource owner has been notified about the security issue. Used when the initial reviewer is not the resource owner, and needs intervention from the resource owner.

          If one of the following occurs, the workflow status is changed automatically from NOTIFIED to NEW:

          • RecordState changes from ARCHIVED to ACTIVE.

          • Compliance.Status changes from PASSED to FAILED, WARNING, or NOT_AVAILABLE.

        • SUPPRESSED - Indicates that you reviewed the finding and do not believe that any action is needed.

          The workflow status of a SUPPRESSED finding does not change if RecordState changes from ARCHIVED to ACTIVE.

        • RESOLVED - The finding was reviewed and remediated and is now considered resolved.

          The finding remains RESOLVED unless one of the following occurs:

          • RecordState changes from ARCHIVED to ACTIVE.

          • Compliance.Status changes from PASSED to FAILED, WARNING, or NOT_AVAILABLE.

          In those cases, the workflow status is automatically reset to NEW.

          For findings from controls, if Compliance.Status is PASSED, then Security Hub automatically sets the workflow status to RESOLVED.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • RecordState — (Array<map>)

        The updated record state for the finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • RelatedFindingsProductArn — (Array<map>)

        The ARN of the solution that generated a related finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • RelatedFindingsId — (Array<map>)

        The solution-generated identifier for a related finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NoteText — (Array<map>)

        The text of a note.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NoteUpdatedAt — (Array<map>)

        The timestamp of when the note was updated.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • NoteUpdatedBy — (Array<map>)

        The principal that created a note.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Keyword — (Array<map>)

        A keyword for a finding.

        • Value — (String)

          A value for the keyword.

      • FindingProviderFieldsConfidence — (Array<map>)

        The finding provider value for the finding confidence. Confidence is defined as the likelihood that a finding accurately identifies the behavior or issue that it was intended to identify.

        Confidence is scored on a 0-100 basis using a ratio scale, where 0 means zero percent confidence and 100 means 100 percent confidence.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • FindingProviderFieldsCriticality — (Array<map>)

        The finding provider value for the level of importance assigned to the resources associated with the findings.

        A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • FindingProviderFieldsRelatedFindingsId — (Array<map>)

        The finding identifier of a related finding that is identified by the finding provider.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • FindingProviderFieldsRelatedFindingsProductArn — (Array<map>)

        The ARN of the solution that generated a related finding that is identified by the finding provider.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • FindingProviderFieldsSeverityLabel — (Array<map>)

        The finding provider value for the severity label.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • FindingProviderFieldsSeverityOriginal — (Array<map>)

        The finding provider's original value for the severity.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • FindingProviderFieldsTypes — (Array<map>)

        One or more finding types that the finding provider assigned to the finding. Uses the format of namespace/category/classifier that classify a finding.

        Valid namespace values are: Software and Configuration Checks | TTPs | Effects | Unusual Behaviors | Sensitive Data Identifications

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Sample — (Array<map>)

        Indicates whether or not sample findings are included in the filter results.

        • Value — (Boolean)

          The value of the boolean.

      • ComplianceSecurityControlId — (Array<map>)

        The unique identifier of a control across standards. Values for this field typically consist of an Amazon Web Service and a number, such as APIGateway.5.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ComplianceAssociatedStandardsId — (Array<map>)

        The unique identifier of a standard in which a control is enabled. This field consists of the resource portion of the Amazon Resource Name (ARN) returned for a standard in the DescribeStandards API response.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • VulnerabilitiesExploitAvailable — (Array<map>)

        Indicates whether a software vulnerability in your environment has a known exploit. You can filter findings by this field only if you use Security Hub and Amazon Inspector.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • VulnerabilitiesFixAvailable — (Array<map>)

        Indicates whether a vulnerability is fixed in a newer version of the affected software packages. You can filter findings by this field only if you use Security Hub and Amazon Inspector.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ComplianceSecurityControlParametersName — (Array<map>)

        The name of a security control parameter.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ComplianceSecurityControlParametersValue — (Array<map>)

        The current value of a security control parameter.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • AwsAccountName — (Array<map>)

        The name of the Amazon Web Services account in which a finding is generated.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceApplicationName — (Array<map>)

        The name of the application that is related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceApplicationArn — (Array<map>)

        The ARN of the application that is related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
    • GroupByAttribute — (String)

      The attribute used to group the findings for the insight. The grouping attribute identifies the type of item that the insight applies to. For example, if an insight is grouped by resource identifier, then the insight produces a list of resource identifiers.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • InsightArn — (String)

        The ARN of the insight created.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

createMembers(params = {}, callback) ⇒ AWS.Request

Creates a member association in Security Hub between the specified accounts and the account used to make the request, which is the administrator account. If you are integrated with Organizations, then the administrator account is designated by the organization management account.

CreateMembers is always used to add accounts that are not organization members.

For accounts that are managed using Organizations, CreateMembers is only used in the following cases:

  • Security Hub is not configured to automatically add new organization accounts.

  • The account was disassociated or deleted in Security Hub.

This action can only be used by an account that has Security Hub enabled. To enable Security Hub, you can use the EnableSecurityHub operation.

For accounts that are not organization members, you create the account association and then send an invitation to the member account. To send the invitation, you use the InviteMembers operation. If the account owner accepts the invitation, the account becomes a member account in Security Hub.

Accounts that are managed using Organizations do not receive an invitation. They automatically become a member account in Security Hub.

  • If the organization account does not have Security Hub enabled, then Security Hub and the default standards are automatically enabled. Note that Security Hub cannot be enabled automatically for the organization management account. The organization management account must enable Security Hub before the administrator account enables it as a member account.

  • For organization accounts that already have Security Hub enabled, Security Hub does not make any other changes to those accounts. It does not change their enabled standards or controls.

A permissions policy is added that permits the administrator account to view the findings generated in the member account.

To remove the association between the administrator and member accounts, use the DisassociateFromMasterAccount or DisassociateMembers operation.

Service Reference:

Examples:

To add a member account


/* The following example creates a member association between the specified accounts and the administrator account (the account that makes the request). This operation is used to add accounts that aren't part of an organization. */

 var params = {
  AccountDetails: [
     {
    AccountId: "123456789012"
   }, 
     {
    AccountId: "111122223333"
   }
  ]
 };
 securityhub.createMembers(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    UnprocessedAccounts: [
    ]
   }
   */
 });

Calling the createMembers operation

var params = {
  AccountDetails: [ /* required */
    {
      AccountId: 'STRING_VALUE', /* required */
      Email: 'STRING_VALUE'
    },
    /* more items */
  ]
};
securityhub.createMembers(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • AccountDetails — (Array<map>)

      The list of accounts to associate with the Security Hub administrator account. For each account, the list includes the account ID and optionally the email address.

      • AccountIdrequired — (String)

        The ID of an Amazon Web Services account.

      • Email — (String)

        The email of an Amazon Web Services account.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • UnprocessedAccounts — (Array<map>)

        The list of Amazon Web Services accounts that were not processed. For each account, the list includes the account ID and the email address.

        • AccountId — (String)

          An Amazon Web Services account ID of the account that was not processed.

        • ProcessingResult — (String)

          The reason that the account was not processed.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

declineInvitations(params = {}, callback) ⇒ AWS.Request

Declines invitations to become a member account.

A prospective member account uses this operation to decline an invitation to become a member.

This operation is only called by member accounts that aren't part of an organization. Organization accounts don't receive invitations.

Service Reference:

Examples:

To decline invitation to become a member account


/* The following example declines an invitation from the Security Hub administrator account to become a member account. The invited account makes the request. */

 var params = {
  AccountIds: [
     "123456789012", 
     "111122223333"
  ]
 };
 securityhub.declineInvitations(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    UnprocessedAccounts: [
    ]
   }
   */
 });

Calling the declineInvitations operation

var params = {
  AccountIds: [ /* required */
    'STRING_VALUE',
    /* more items */
  ]
};
securityhub.declineInvitations(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • AccountIds — (Array<String>)

      The list of prospective member account IDs for which to decline an invitation.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • UnprocessedAccounts — (Array<map>)

        The list of Amazon Web Services accounts that were not processed. For each account, the list includes the account ID and the email address.

        • AccountId — (String)

          An Amazon Web Services account ID of the account that was not processed.

        • ProcessingResult — (String)

          The reason that the account was not processed.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

deleteActionTarget(params = {}, callback) ⇒ AWS.Request

Deletes a custom action target from Security Hub.

Deleting a custom action target does not affect any findings or insights that were already sent to Amazon CloudWatch Events using the custom action.

Service Reference:

Examples:

To delete a custom action target


/* The following example deletes a custom action target that triggers target actions in Amazon CloudWatch Events. Deleting a custom action target doesn't affect findings or insights that were already sent to CloudWatch Events based on the custom action. */

 var params = {
  ActionTargetArn: "arn:aws:securityhub:us-west-1:123456789012:action/custom/Remediation"
 };
 securityhub.deleteActionTarget(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    ActionTargetArn: "arn:aws:securityhub:us-west-1:123456789012:action/custom/Remediation"
   }
   */
 });

Calling the deleteActionTarget operation

var params = {
  ActionTargetArn: 'STRING_VALUE' /* required */
};
securityhub.deleteActionTarget(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • ActionTargetArn — (String)

      The Amazon Resource Name (ARN) of the custom action target to delete.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • ActionTargetArn — (String)

        The ARN of the custom action target that was deleted.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

deleteConfigurationPolicy(params = {}, callback) ⇒ AWS.Request

Deletes a configuration policy. Only the Security Hub delegated administrator can invoke this operation from the home Region. For the deletion to succeed, you must first disassociate a configuration policy from target accounts, organizational units, or the root by invoking the StartConfigurationPolicyDisassociation operation.

Service Reference:

Examples:

To delete a configuration policy


/* This operation deletes the specified configuration policy. */

 var params = {
  Identifier: "arn:aws:securityhub:us-east-1:123456789012:configuration-policy/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111"
 };
 securityhub.deleteConfigurationPolicy(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
   }
   */
 });

Calling the deleteConfigurationPolicy operation

var params = {
  Identifier: 'STRING_VALUE' /* required */
};
securityhub.deleteConfigurationPolicy(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • Identifier — (String)

      The Amazon Resource Name (ARN) or universally unique identifier (UUID) of the configuration policy.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

deleteFindingAggregator(params = {}, callback) ⇒ AWS.Request

Deletes a finding aggregator. When you delete the finding aggregator, you stop finding aggregation.

When you stop finding aggregation, findings that were already aggregated to the aggregation Region are still visible from the aggregation Region. New findings and finding updates are not aggregated.

Service Reference:

Examples:

To delete a finding aggregator


/* The following example deletes a finding aggregator in Security Hub. Deleting the finding aggregator stops cross-Region aggregation. This operation produces no output. */

 var params = {
  FindingAggregatorArn: "arn:aws:securityhub:us-east-1:123456789012:finding-aggregator/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111"
 };
 securityhub.deleteFindingAggregator(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
   }
   */
 });

Calling the deleteFindingAggregator operation

var params = {
  FindingAggregatorArn: 'STRING_VALUE' /* required */
};
securityhub.deleteFindingAggregator(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • FindingAggregatorArn — (String)

      The ARN of the finding aggregator to delete. To obtain the ARN, use ListFindingAggregators.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

deleteInsight(params = {}, callback) ⇒ AWS.Request

Deletes the insight specified by the InsightArn.

Service Reference:

Examples:

To delete a custom insight


/* The following example deletes a custom insight in Security Hub. */

 var params = {
  InsightArn: "arn:aws:securityhub:us-west-1:123456789012:insight/123456789012/custom/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111"
 };
 securityhub.deleteInsight(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    InsightArn: "arn:aws:securityhub:eu-central-1:123456789012:insight/123456789012/custom/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111"
   }
   */
 });

Calling the deleteInsight operation

var params = {
  InsightArn: 'STRING_VALUE' /* required */
};
securityhub.deleteInsight(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • InsightArn — (String)

      The ARN of the insight to delete.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • InsightArn — (String)

        The ARN of the insight that was deleted.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

deleteInvitations(params = {}, callback) ⇒ AWS.Request

Deletes invitations received by the Amazon Web Services account to become a member account.

A Security Hub administrator account can use this operation to delete invitations sent to one or more member accounts.

This operation is only used to delete invitations that are sent to member accounts that aren't part of an organization. Organization accounts don't receive invitations.

Service Reference:

Examples:

To delete a custom insight


/* The following example deletes an invitation sent by the Security Hub administrator account to a prospective member account. This operation is used only for invitations sent to accounts that aren't part of an organization. Organization accounts don't receive invitations. */

 var params = {
  AccountIds: [
     "123456789012"
  ]
 };
 securityhub.deleteInvitations(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    UnprocessedAccounts: [
    ]
   }
   */
 });

Calling the deleteInvitations operation

var params = {
  AccountIds: [ /* required */
    'STRING_VALUE',
    /* more items */
  ]
};
securityhub.deleteInvitations(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • AccountIds — (Array<String>)

      The list of member account IDs that received the invitations you want to delete.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • UnprocessedAccounts — (Array<map>)

        The list of Amazon Web Services accounts for which the invitations were not deleted. For each account, the list includes the account ID and the email address.

        • AccountId — (String)

          An Amazon Web Services account ID of the account that was not processed.

        • ProcessingResult — (String)

          The reason that the account was not processed.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

deleteMembers(params = {}, callback) ⇒ AWS.Request

Deletes the specified member accounts from Security Hub.

You can invoke this API only to delete accounts that became members through invitation. You can't invoke this API to delete accounts that belong to an Organizations organization.

Service Reference:

Examples:

To delete a member account


/* The following example deletes the specified member account from Security Hub. This operation can be used to delete member accounts that are part of an organization or that were invited manually. */

 var params = {
  AccountIds: [
     "123456789111", 
     "123456789222"
  ]
 };
 securityhub.deleteMembers(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    UnprocessedAccounts: [
    ]
   }
   */
 });

Calling the deleteMembers operation

var params = {
  AccountIds: [ /* required */
    'STRING_VALUE',
    /* more items */
  ]
};
securityhub.deleteMembers(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • AccountIds — (Array<String>)

      The list of account IDs for the member accounts to delete.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • UnprocessedAccounts — (Array<map>)

        The list of Amazon Web Services accounts that were not deleted. For each account, the list includes the account ID and the email address.

        • AccountId — (String)

          An Amazon Web Services account ID of the account that was not processed.

        • ProcessingResult — (String)

          The reason that the account was not processed.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

describeActionTargets(params = {}, callback) ⇒ AWS.Request

Returns a list of the custom action targets in Security Hub in your account.

Service Reference:

Examples:

To return custom action targets


/* The following example returns a list of custom action targets. You use custom actions on findings and insights in Security Hub to trigger target actions in Amazon CloudWatch Events. */

 var params = {
  ActionTargetArns: [
     "arn:aws:securityhub:us-west-1:123456789012:action/custom/Remediation"
  ]
 };
 securityhub.describeActionTargets(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    ActionTargets: [
       {
      ActionTargetArn: "arn:aws:securityhub:us-west-1:123456789012:action/custom/Remediation", 
      Description: "Action to send the finding for remediation tracking", 
      Name: "Send to remediation"
     }
    ]
   }
   */
 });

Calling the describeActionTargets operation

var params = {
  ActionTargetArns: [
    'STRING_VALUE',
    /* more items */
  ],
  MaxResults: 'NUMBER_VALUE',
  NextToken: 'STRING_VALUE'
};
securityhub.describeActionTargets(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • ActionTargetArns — (Array<String>)

      A list of custom action target ARNs for the custom action targets to retrieve.

    • NextToken — (String)

      The token that is required for pagination. On your first call to the DescribeActionTargets operation, set the value of this parameter to NULL.

      For subsequent calls to the operation, to continue listing data, set the value of this parameter to the value returned from the previous response.

    • MaxResults — (Integer)

      The maximum number of results to return.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • ActionTargets — (Array<map>)

        A list of ActionTarget objects. Each object includes the ActionTargetArn, Description, and Name of a custom action target available in Security Hub.

        • ActionTargetArnrequired — (String)

          The ARN for the target action.

        • Namerequired — (String)

          The name of the action target.

        • Descriptionrequired — (String)

          The description of the target action.

      • NextToken — (String)

        The pagination token to use to request the next page of results.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

describeHub(params = {}, callback) ⇒ AWS.Request

Returns details about the Hub resource in your account, including the HubArn and the time when you enabled Security Hub.

Service Reference:

Examples:

To return details about Hub resource


/* The following example returns details about the Hub resource in the calling account. The Hub resource represents the implementation of  the AWS Security Hub service in the calling account. */

 var params = {
  HubArn: "arn:aws:securityhub:us-west-1:123456789012:hub/default"
 };
 securityhub.describeHub(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    AutoEnableControls: true, 
    ControlFindingGenerator: "SECURITY_CONTROL", 
    HubArn: "arn:aws:securityhub:us-west-1:123456789012:hub/default", 
    SubscribedAt: "2019-11-19T23:15:10.046Z"
   }
   */
 });

Calling the describeHub operation

var params = {
  HubArn: 'STRING_VALUE'
};
securityhub.describeHub(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • HubArn — (String)

      The ARN of the Hub resource to retrieve.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • HubArn — (String)

        The ARN of the Hub resource that was retrieved.

      • SubscribedAt — (String)

        The date and time when Security Hub was enabled in the account.

      • AutoEnableControls — (Boolean)

        Whether to automatically enable new controls when they are added to standards that are enabled.

        If set to true, then new controls for enabled standards are enabled automatically. If set to false, then new controls are not enabled.

      • ControlFindingGenerator — (String)

        Specifies whether the calling account has consolidated control findings turned on. If the value for this field is set to SECURITY_CONTROL, Security Hub generates a single finding for a control check even when the check applies to multiple enabled standards.

        If the value for this field is set to STANDARD_CONTROL, Security Hub generates separate findings for a control check when the check applies to multiple enabled standards.

        The value for this field in a member account matches the value in the administrator account. For accounts that aren't part of an organization, the default value of this field is SECURITY_CONTROL if you enabled Security Hub on or after February 23, 2023.

        Possible values include:
        • "STANDARD_CONTROL"
        • "SECURITY_CONTROL"

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

describeOrganizationConfiguration(params = {}, callback) ⇒ AWS.Request

Returns information about the way your organization is configured in Security Hub. Only the Security Hub administrator account can invoke this operation.

Examples:

To get information about organization configuration


/* This operation provides information about the way your organization is configured in Security Hub. Only a Security Hub administrator account can invoke this operation. */

 var params = {
 };
 securityhub.describeOrganizationConfiguration(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    AutoEnable: false, 
    AutoEnableStandards: "NONE", 
    MemberAccountLimitReached: false, 
    OrganizationConfiguration: {
     ConfigurationType: "CENTRAL", 
     Status: "ENABLED"
    }
   }
   */
 });

Calling the describeOrganizationConfiguration operation

var params = {
};
securityhub.describeOrganizationConfiguration(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • AutoEnable — (Boolean)

        Whether to automatically enable Security Hub in new member accounts when they join the organization.

        If set to true, then Security Hub is automatically enabled in new accounts. If set to false, then Security Hub isn't enabled in new accounts automatically. The default value is false.

        If the ConfigurationType of your organization is set to CENTRAL, then this field is set to false and can't be changed in the home Region and linked Regions. However, in that case, the delegated administrator can create a configuration policy in which Security Hub is enabled and associate the policy with new organization accounts.

      • MemberAccountLimitReached — (Boolean)

        Whether the maximum number of allowed member accounts are already associated with the Security Hub administrator account.

      • AutoEnableStandards — (String)

        Whether to automatically enable Security Hub default standards in new member accounts when they join the organization.

        If equal to DEFAULT, then Security Hub default standards are automatically enabled for new member accounts. If equal to NONE, then default standards are not automatically enabled for new member accounts. The default value of this parameter is equal to DEFAULT.

        If the ConfigurationType of your organization is set to CENTRAL, then this field is set to NONE and can't be changed in the home Region and linked Regions. However, in that case, the delegated administrator can create a configuration policy in which specific security standards are enabled and associate the policy with new organization accounts.

        Possible values include:
        • "NONE"
        • "DEFAULT"
      • OrganizationConfiguration — (map)

        Provides information about the way an organization is configured in Security Hub.

        • ConfigurationType — (String)

          Indicates whether the organization uses local or central configuration.

          If you use local configuration, the Security Hub delegated administrator can set AutoEnable to true and AutoEnableStandards to DEFAULT. This automatically enables Security Hub and default security standards in new organization accounts. These new account settings must be set separately in each Amazon Web Services Region, and settings may be different in each Region.

          If you use central configuration, the delegated administrator can create configuration policies. Configuration policies can be used to configure Security Hub, security standards, and security controls in multiple accounts and Regions. If you want new organization accounts to use a specific configuration, you can create a configuration policy and associate it with the root or specific organizational units (OUs). New accounts will inherit the policy from the root or their assigned OU.

          Possible values include:
          • "CENTRAL"
          • "LOCAL"
        • Status — (String)

          Describes whether central configuration could be enabled as the ConfigurationType for the organization. If your ConfigurationType is local configuration, then the value of Status is always ENABLED.

          Possible values include:
          • "PENDING"
          • "ENABLED"
          • "FAILED"
        • StatusMessage — (String)

          Provides an explanation if the value of Status is equal to FAILED when ConfigurationType is equal to CENTRAL.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

describeProducts(params = {}, callback) ⇒ AWS.Request

Returns information about product integrations in Security Hub.

You can optionally provide an integration ARN. If you provide an integration ARN, then the results only include that integration.

If you do not provide an integration ARN, then the results include all of the available product integrations.

Service Reference:

Examples:

To get information about Security Hub integrations


/* The following example returns details about AWS services and third-party products that Security Hub integrates with. */

 var params = {
  MaxResults: 1, 
  NextToken: "NULL", 
  ProductArn: "arn:aws:securityhub:us-east-1:517716713836:product/crowdstrike/crowdstrike-falcon"
 };
 securityhub.describeProducts(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    NextToken: "U2FsdGVkX18vvPlOqb7RDrWRWVFBJI46MOIAb+nZmRJmR15NoRi2gm13sdQEn3O/pq/78dGs+bKpgA+7HMPHO0qX33/zoRI+uIG/F9yLNhcOrOWzFUdy36JcXLQji3Rpnn/cD1SVkGA98qI3zPOSDg==", 
    Products: [
       {
      ActivationUrl: "https://falcon.crowdstrike.com/support/documentation", 
      Categories: [
         "Endpoint Detection and Response (EDR)", 
         "AV Scanning and Sandboxing", 
         "Threat Intelligence Feeds and Reports", 
         "Endpoint Forensics", 
         "Network Forensics"
      ], 
      CompanyName: "CrowdStrike", 
      Description: "CrowdStrike Falcon's single lightweight sensor unifies next-gen antivirus, endpoint detection and response, and 24/7 managed hunting, via the cloud.", 
      IntegrationTypes: [
         "SEND_FINDINGS_TO_SECURITY_HUB"
      ], 
      MarketplaceUrl: "https://aws.amazon.com/marketplace/seller-profile?id=a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
      ProductArn: "arn:aws:securityhub:us-east-1:517716713836:product/crowdstrike/crowdstrike-falcon", 
      ProductName: "CrowdStrike Falcon", 
      ProductSubscriptionResourcePolicy: "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"123456789333\"},\"Action\":[\"securityhub:BatchImportFindings\"],\"Resource\":\"arn:aws:securityhub:us-west-1:123456789012:product-subscription/crowdstrike/crowdstrike-falcon\",\"Condition\":{\"StringEquals\":{\"securityhub:TargetAccount\":\"123456789012\"}}},{\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"123456789012\"},\"Action\":[\"securityhub:BatchImportFindings\"],\"Resource\":\"arn:aws:securityhub:us-west-1:123456789333:product/crowdstrike/crowdstrike-falcon\",\"Condition\":{\"StringEquals\":{\"securityhub:TargetAccount\":\"123456789012\"}}}]}"
     }
    ]
   }
   */
 });

Calling the describeProducts operation

var params = {
  MaxResults: 'NUMBER_VALUE',
  NextToken: 'STRING_VALUE',
  ProductArn: 'STRING_VALUE'
};
securityhub.describeProducts(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • NextToken — (String)

      The token that is required for pagination. On your first call to the DescribeProducts operation, set the value of this parameter to NULL.

      For subsequent calls to the operation, to continue listing data, set the value of this parameter to the value returned from the previous response.

    • MaxResults — (Integer)

      The maximum number of results to return.

    • ProductArn — (String)

      The ARN of the integration to return.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • Products — (Array<map>)

        A list of products, including details for each product.

        • ProductArnrequired — (String)

          The ARN assigned to the product.

        • ProductName — (String)

          The name of the product.

        • CompanyName — (String)

          The name of the company that provides the product.

        • Description — (String)

          A description of the product.

        • Categories — (Array<String>)

          The categories assigned to the product.

        • IntegrationTypes — (Array<String>)

          The types of integration that the product supports. Available values are the following.

          • SEND_FINDINGS_TO_SECURITY_HUB - The integration sends findings to Security Hub.

          • RECEIVE_FINDINGS_FROM_SECURITY_HUB - The integration receives findings from Security Hub.

          • UPDATE_FINDINGS_IN_SECURITY_HUB - The integration does not send new findings to Security Hub, but does make updates to the findings that it receives from Security Hub.

        • MarketplaceUrl — (String)

          For integrations with Amazon Web Services services, the Amazon Web Services Console URL from which to activate the service.

          For integrations with third-party products, the Amazon Web Services Marketplace URL from which to subscribe to or purchase the product.

        • ActivationUrl — (String)

          The URL to the service or product documentation about the integration with Security Hub, including how to activate the integration.

        • ProductSubscriptionResourcePolicy — (String)

          The resource policy associated with the product.

      • NextToken — (String)

        The pagination token to use to request the next page of results.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

describeStandards(params = {}, callback) ⇒ AWS.Request

Returns a list of the available standards in Security Hub.

For each standard, the results include the standard ARN, the name, and a description.

Service Reference:

Examples:

To get available Security Hub standards


/* The following example returns a list of available security standards in Security Hub. */

 var params = {
 };
 securityhub.describeStandards(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    Standards: [
       {
      Description: "The AWS Foundational Security Best Practices standard is a set of automated security checks that detect when AWS accounts and deployed resources do not align to security best practices. The standard is defined by AWS security experts. This curated set of controls helps improve your security posture in AWS, and cover AWS's most popular and foundational services.", 
      EnabledByDefault: true, 
      Name: "AWS Foundational Security Best Practices v1.0.0", 
      StandardsArn: "arn:aws:securityhub:us-west-1::standards/aws-foundational-security-best-practices/v/1.0.0"
     }, 
       {
      Description: "The Center for Internet Security (CIS) AWS Foundations Benchmark v1.2.0 is a set of security configuration best practices for AWS. This Security Hub standard automatically checks for your compliance readiness against a subset of CIS requirements.", 
      EnabledByDefault: true, 
      Name: "CIS AWS Foundations Benchmark v1.2.0", 
      StandardsArn: "arn:aws:securityhub:us-west-1::ruleset/cis-aws-foundations-benchmark/v/1.2.0"
     }, 
       {
      Description: "The Center for Internet Security (CIS) AWS Foundations Benchmark v1.4.0 is a set of security configuration best practices for AWS. This Security Hub standard automatically checks for your compliance readiness against a subset of CIS requirements.", 
      EnabledByDefault: false, 
      Name: "CIS AWS Foundations Benchmark v1.4.0", 
      StandardsArn: "arn:aws::securityhub:us-west-1::standards/cis-aws-foundations-benchmark/v/1.4.0"
     }, 
       {
      Description: "The Payment Card Industry Data Security Standard (PCI DSS) v3.2.1 is an information security standard for entities that store, process, and/or transmit cardholder data. This Security Hub standard automatically checks for your compliance readiness against a subset of PCI DSS requirements.", 
      EnabledByDefault: false, 
      Name: "PCI DSS v3.2.1", 
      StandardsArn: "arn:aws:securityhub:us-west-1::standards/pci-dss/v/3.2.1"
     }
    ]
   }
   */
 });

Calling the describeStandards operation

var params = {
  MaxResults: 'NUMBER_VALUE',
  NextToken: 'STRING_VALUE'
};
securityhub.describeStandards(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • NextToken — (String)

      The token that is required for pagination. On your first call to the DescribeStandards operation, set the value of this parameter to NULL.

      For subsequent calls to the operation, to continue listing data, set the value of this parameter to the value returned from the previous response.

    • MaxResults — (Integer)

      The maximum number of standards to return.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • Standards — (Array<map>)

        A list of available standards.

        • StandardsArn — (String)

          The ARN of a standard.

        • Name — (String)

          The name of the standard.

        • Description — (String)

          A description of the standard.

        • EnabledByDefault — (Boolean)

          Whether the standard is enabled by default. When Security Hub is enabled from the console, if a standard is enabled by default, the check box for that standard is selected by default.

          When Security Hub is enabled using the EnableSecurityHub API operation, the standard is enabled by default unless EnableDefaultStandards is set to false.

        • StandardsManagedBy — (map)

          Provides details about the management of a standard.

          • Company — (String)

            An identifier for the company that manages a specific security standard. For existing standards, the value is equal to Amazon Web Services.

          • Product — (String)

            An identifier for the product that manages a specific security standard. For existing standards, the value is equal to the Amazon Web Services service that manages the standard.

      • NextToken — (String)

        The pagination token to use to request the next page of results.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

describeStandardsControls(params = {}, callback) ⇒ AWS.Request

Returns a list of security standards controls.

For each control, the results include information about whether it is currently enabled, the severity, and a link to remediation information.

Service Reference:

Examples:

To get a list of controls for a security standard


/* The following example returns a list of security controls and control details that apply to a specified security standard. The list includes controls that are enabled and disabled in the standard. */

 var params = {
  MaxResults: 2, 
  NextToken: "NULL", 
  StandardsSubscriptionArn: "arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1"
 };
 securityhub.describeStandardsControls(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    Controls: [
       {
      ControlId: "PCI.AutoScaling.1", 
      ControlStatus: "ENABLED", 
      ControlStatusUpdatedAt: <Date Representation>, 
      Description: "This AWS control checks whether your Auto Scaling groups that are associated with a load balancer are using Elastic Load Balancing health checks.", 
      RelatedRequirements: [
         "PCI DSS 2.2"
      ], 
      RemediationUrl: "https://docs.aws.amazon.com/console/securityhub/PCI.AutoScaling.1/remediation", 
      SeverityRating: "LOW", 
      StandardsControlArn: "arn:aws:securityhub:us-west-1:123456789012:control/pci-dss/v/3.2.1/PCI.AutoScaling.1", 
      Title: "Auto scaling groups associated with a load balancer should use health checks"
     }, 
       {
      ControlId: "PCI.CW.1", 
      ControlStatus: "ENABLED", 
      ControlStatusUpdatedAt: <Date Representation>, 
      Description: "This control checks for the CloudWatch metric filters using the following pattern { $.userIdentity.type = \"Root\" && $.userIdentity.invokedBy NOT EXISTS && $.eventType != \"AwsServiceEvent\" } It checks that the log group name is configured for use with active multi-region CloudTrail, that there is at least one Event Selector for a Trail with IncludeManagementEvents set to true and ReadWriteType set to All, and that there is at least one active subscriber to an SNS topic associated with the alarm.", 
      RelatedRequirements: [
         "PCI DSS 7.2.1"
      ], 
      RemediationUrl: "https://docs.aws.amazon.com/console/securityhub/PCI.CW.1/remediation", 
      SeverityRating: "MEDIUM", 
      StandardsControlArn: "arn:aws:securityhub:us-west-1:123456789012:control/pci-dss/v/3.2.1/PCI.CW.1", 
      Title: "A log metric filter and alarm should exist for usage of the \"root\" user"
     }
    ], 
    NextToken: "U2FsdGVkX1+eNkPoZHVl11ip5HUYQPWSWZGmftcmJiHL8JoKEsCDuaKayiPDyLK+LiTkShveoOdvfxXCkOBaGhohIXhsIedN+LSjQV/l7kfCfJcq4PziNC1N9xe9aq2pjlLVZnznTfSImrodT5bRNHe4fELCQq/z+5ka+5Lzmc11axcwTd5lKgQyQqmUVoeriHZhyIiBgWKf7oNYdBVG8OEortVWvSkoUTt+B2ThcnC7l43kI0UNxlkZ6sc64AsW"
   }
   */
 });

Calling the describeStandardsControls operation

var params = {
  StandardsSubscriptionArn: 'STRING_VALUE', /* required */
  MaxResults: 'NUMBER_VALUE',
  NextToken: 'STRING_VALUE'
};
securityhub.describeStandardsControls(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • StandardsSubscriptionArn — (String)

      The ARN of a resource that represents your subscription to a supported standard. To get the subscription ARNs of the standards you have enabled, use the GetEnabledStandards operation.

    • NextToken — (String)

      The token that is required for pagination. On your first call to the DescribeStandardsControls operation, set the value of this parameter to NULL.

      For subsequent calls to the operation, to continue listing data, set the value of this parameter to the value returned from the previous response.

    • MaxResults — (Integer)

      The maximum number of security standard controls to return.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • Controls — (Array<map>)

        A list of security standards controls.

        • StandardsControlArn — (String)

          The ARN of the security standard control.

        • ControlStatus — (String)

          The current status of the security standard control. Indicates whether the control is enabled or disabled. Security Hub does not check against disabled controls.

          Possible values include:
          • "ENABLED"
          • "DISABLED"
        • DisabledReason — (String)

          The reason provided for the most recent change in status for the control.

        • ControlStatusUpdatedAt — (Date)

          The date and time that the status of the security standard control was most recently updated.

        • ControlId — (String)

          The identifier of the security standard control.

        • Title — (String)

          The title of the security standard control.

        • Description — (String)

          The longer description of the security standard control. Provides information about what the control is checking for.

        • RemediationUrl — (String)

          A link to remediation information for the control in the Security Hub user documentation.

        • SeverityRating — (String)

          The severity of findings generated from this security standard control.

          The finding severity is based on an assessment of how easy it would be to compromise Amazon Web Services resources if the issue is detected.

          Possible values include:
          • "LOW"
          • "MEDIUM"
          • "HIGH"
          • "CRITICAL"
        • RelatedRequirements — (Array<String>)

          The list of requirements that are related to this control.

      • NextToken — (String)

        The pagination token to use to request the next page of results.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

disableImportFindingsForProduct(params = {}, callback) ⇒ AWS.Request

Disables the integration of the specified product with Security Hub. After the integration is disabled, findings from that product are no longer sent to Security Hub.

Service Reference:

Examples:

To end a Security Hub integration


/* The following example ends an integration between Security Hub and the specified product that sends findings to Security Hub. After the integration ends, the product no longer sends findings to Security  Hub. */

 var params = {
  ProductSubscriptionArn: "arn:aws:securityhub:us-east-1:517716713836:product/crowdstrike/crowdstrike-falcon"
 };
 securityhub.disableImportFindingsForProduct(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
   }
   */
 });

Calling the disableImportFindingsForProduct operation

var params = {
  ProductSubscriptionArn: 'STRING_VALUE' /* required */
};
securityhub.disableImportFindingsForProduct(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • ProductSubscriptionArn — (String)

      The ARN of the integrated product to disable the integration for.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

disableOrganizationAdminAccount(params = {}, callback) ⇒ AWS.Request

Disables a Security Hub administrator account. Can only be called by the organization management account.

Service Reference:

Examples:

To remove a Security Hub administrator account


/* The following example removes the Security Hub administrator account in the Region from which the operation was executed. This operation doesn't remove the delegated administrator account in AWS Organizations. */

 var params = {
  AdminAccountId: "123456789012"
 };
 securityhub.disableOrganizationAdminAccount(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
   }
   */
 });

Calling the disableOrganizationAdminAccount operation

var params = {
  AdminAccountId: 'STRING_VALUE' /* required */
};
securityhub.disableOrganizationAdminAccount(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • AdminAccountId — (String)

      The Amazon Web Services account identifier of the Security Hub administrator account.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

disableSecurityHub(params = {}, callback) ⇒ AWS.Request

Disables Security Hub in your account only in the current Amazon Web Services Region. To disable Security Hub in all Regions, you must submit one request per Region where you have enabled Security Hub.

You can't disable Security Hub in an account that is currently the Security Hub administrator.

When you disable Security Hub, your existing findings and insights and any Security Hub configuration settings are deleted after 90 days and cannot be recovered. Any standards that were enabled are disabled, and your administrator and member account associations are removed.

If you want to save your existing findings, you must export them before you disable Security Hub.

Service Reference:

Examples:

To deactivate Security Hub


/* The following example deactivates Security Hub for the current account and Region. */

 var params = {
 };
 securityhub.disableSecurityHub(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
   }
   */
 });

Calling the disableSecurityHub operation

var params = {
};
securityhub.disableSecurityHub(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

disassociateFromAdministratorAccount(params = {}, callback) ⇒ AWS.Request

Disassociates the current Security Hub member account from the associated administrator account.

This operation is only used by accounts that are not part of an organization. For organization accounts, only the administrator account can disassociate a member account.

Examples:

To disassociate requesting account from administrator account


/* The following example dissociates the requesting account from its associated administrator account. */

 var params = {
 };
 securityhub.disassociateFromAdministratorAccount(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
   }
   */
 });

Calling the disassociateFromAdministratorAccount operation

var params = {
};
securityhub.disassociateFromAdministratorAccount(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

disassociateFromMasterAccount(params = {}, callback) ⇒ AWS.Request

This method is deprecated. Instead, use DisassociateFromAdministratorAccount.

The Security Hub console continues to use DisassociateFromMasterAccount. It will eventually change to use DisassociateFromAdministratorAccount. Any IAM policies that specifically control access to this function must continue to use DisassociateFromMasterAccount. You should also add DisassociateFromAdministratorAccount to your policies to ensure that the correct permissions are in place after the console begins to use DisassociateFromAdministratorAccount.

Disassociates the current Security Hub member account from the associated administrator account.

This operation is only used by accounts that are not part of an organization. For organization accounts, only the administrator account can disassociate a member account.

Service Reference:

Examples:

Calling the disassociateFromMasterAccount operation

var params = {
};
securityhub.disassociateFromMasterAccount(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

disassociateMembers(params = {}, callback) ⇒ AWS.Request

Disassociates the specified member accounts from the associated administrator account.

Can be used to disassociate both accounts that are managed using Organizations and accounts that were invited manually.

Service Reference:

Examples:

To disassociate member accounts from administrator account


/* The following example dissociates the specified member accounts from the associated administrator account. */

 var params = {
  AccountIds: [
     "123456789012", 
     "111122223333"
  ]
 };
 securityhub.disassociateMembers(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
   }
   */
 });

Calling the disassociateMembers operation

var params = {
  AccountIds: [ /* required */
    'STRING_VALUE',
    /* more items */
  ]
};
securityhub.disassociateMembers(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • AccountIds — (Array<String>)

      The account IDs of the member accounts to disassociate from the administrator account.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

enableImportFindingsForProduct(params = {}, callback) ⇒ AWS.Request

Enables the integration of a partner product with Security Hub. Integrated products send findings to Security Hub.

When you enable a product integration, a permissions policy that grants permission for the product to send findings to Security Hub is applied.

Service Reference:

Examples:

To activate an integration


/* The following example activates an integration between Security Hub and a third party partner product that sends findings to Security Hub. */

 var params = {
  ProductArn: "arn:aws:securityhub:us-east-1:517716713836:product/crowdstrike/crowdstrike-falcon"
 };
 securityhub.enableImportFindingsForProduct(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    ProductSubscriptionArn: "arn:aws:securityhub:us-east-1:517716713836:product-subscription/crowdstrike/crowdstrike-falcon"
   }
   */
 });

Calling the enableImportFindingsForProduct operation

var params = {
  ProductArn: 'STRING_VALUE' /* required */
};
securityhub.enableImportFindingsForProduct(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • ProductArn — (String)

      The ARN of the product to enable the integration for.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • ProductSubscriptionArn — (String)

        The ARN of your subscription to the product to enable integrations for.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

enableOrganizationAdminAccount(params = {}, callback) ⇒ AWS.Request

Designates the Security Hub administrator account for an organization. Can only be called by the organization management account.

Service Reference:

Examples:

To designate a Security Hub administrator


/* The following example designates the specified account as the Security Hub administrator account. The requesting account must be the organization management account. */

 var params = {
  AdminAccountId: "123456789012"
 };
 securityhub.enableOrganizationAdminAccount(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
   }
   */
 });

Calling the enableOrganizationAdminAccount operation

var params = {
  AdminAccountId: 'STRING_VALUE' /* required */
};
securityhub.enableOrganizationAdminAccount(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • AdminAccountId — (String)

      The Amazon Web Services account identifier of the account to designate as the Security Hub administrator account.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

enableSecurityHub(params = {}, callback) ⇒ AWS.Request

Enables Security Hub for your account in the current Region or the Region you specify in the request.

When you enable Security Hub, you grant to Security Hub the permissions necessary to gather findings from other services that are integrated with Security Hub.

When you use the EnableSecurityHub operation to enable Security Hub, you also automatically enable the following standards:

  • Center for Internet Security (CIS) Amazon Web Services Foundations Benchmark v1.2.0

  • Amazon Web Services Foundational Security Best Practices

Other standards are not automatically enabled.

To opt out of automatically enabled standards, set EnableDefaultStandards to false.

After you enable Security Hub, to enable a standard, use the BatchEnableStandards operation. To disable a standard, use the BatchDisableStandards operation.

To learn more, see the setup information in the Security Hub User Guide.

Service Reference:

Examples:

To activate Security Hub


/* The following example activates the Security Hub service in the requesting AWS account. The service is activated in the current AWS Region or the Region that you specify in the request. Some standards are automatically turned on in your account unless you opt out. To determine which standards are automatically turned on, see the Security Hub documentation. */

 var params = {
  EnableDefaultStandards: true, 
  Tags: {
   "Department": "Security"
  }
 };
 securityhub.enableSecurityHub(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
   }
   */
 });

Calling the enableSecurityHub operation

var params = {
  ControlFindingGenerator: STANDARD_CONTROL | SECURITY_CONTROL,
  EnableDefaultStandards: true || false,
  Tags: {
    '<TagKey>': 'STRING_VALUE',
    /* '<TagKey>': ... */
  }
};
securityhub.enableSecurityHub(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • Tags — (map<String>)

      The tags to add to the hub resource when you enable Security Hub.

    • EnableDefaultStandards — (Boolean)

      Whether to enable the security standards that Security Hub has designated as automatically enabled. If you do not provide a value for EnableDefaultStandards, it is set to true. To not enable the automatically enabled standards, set EnableDefaultStandards to false.

    • ControlFindingGenerator — (String)

      This field, used when enabling Security Hub, specifies whether the calling account has consolidated control findings turned on. If the value for this field is set to SECURITY_CONTROL, Security Hub generates a single finding for a control check even when the check applies to multiple enabled standards.

      If the value for this field is set to STANDARD_CONTROL, Security Hub generates separate findings for a control check when the check applies to multiple enabled standards.

      The value for this field in a member account matches the value in the administrator account. For accounts that aren't part of an organization, the default value of this field is SECURITY_CONTROL if you enabled Security Hub on or after February 23, 2023.

      Possible values include:
      • "STANDARD_CONTROL"
      • "SECURITY_CONTROL"

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

getAdministratorAccount(params = {}, callback) ⇒ AWS.Request

Provides the details for the Security Hub administrator account for the current member account.

Can be used by both member accounts that are managed using Organizations and accounts that were invited manually.

Service Reference:

Examples:

To get details about the Security Hub administrator account


/* The following example provides details about the Security Hub administrator account for the requesting member account. */

 var params = {
 };
 securityhub.getAdministratorAccount(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    Administrator: {
     AccountId: "123456789012", 
     InvitationId: "7ab938c5d52d7904ad09f9e7c20cc4eb", 
     InvitedAt: <Date Representation>, 
     MemberStatus: "ASSOCIATED"
    }
   }
   */
 });

Calling the getAdministratorAccount operation

var params = {
};
securityhub.getAdministratorAccount(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • Administrator — (map)

        Details about an invitation.

        • AccountId — (String)

          The account ID of the Security Hub administrator account that the invitation was sent from.

        • InvitationId — (String)

          The ID of the invitation sent to the member account.

        • InvitedAt — (Date)

          The timestamp of when the invitation was sent.

        • MemberStatus — (String)

          The current status of the association between the member and administrator accounts.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

getConfigurationPolicy(params = {}, callback) ⇒ AWS.Request

Provides information about a configuration policy. Only the Security Hub delegated administrator can invoke this operation from the home Region.

Service Reference:

Examples:

To get details about a configuration policy


/* This operation provides details about the specified configuration policy. */

 var params = {
  Identifier: "arn:aws:securityhub:us-east-1:123456789012:configuration-policy/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111"
 };
 securityhub.getConfigurationPolicy(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    Arn: "arn:aws:securityhub:us-east-1:123456789012:configuration-policy/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
    ConfigurationPolicy: {
     SecurityHub: {
      EnabledStandardIdentifiers: [
         "arn:aws:securityhub:us-east-1::standards/aws-foundational-security-best-practices/v/1.0.0", 
         "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0"
      ], 
      SecurityControlsConfiguration: {
       DisabledSecurityControlIdentifiers: [
          "CloudWatch.1"
       ], 
       SecurityControlCustomParameters: [
          {
         Parameters: {
          "daysToExpiration": {
            Value: {
             Integer: 14
            }, 
            ValueType: "CUSTOM"
           }
         }, 
         SecurityControlId: "ACM.1"
        }
       ]
      }, 
      ServiceEnabled: true
     }
    }, 
    CreatedAt: <Date Representation>, 
    Description: "Configuration policy for testing FSBP and CIS", 
    Id: "a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
    Name: "TestConfigurationPolicy", 
    UpdatedAt: <Date Representation>
   }
   */
 });

Calling the getConfigurationPolicy operation

var params = {
  Identifier: 'STRING_VALUE' /* required */
};
securityhub.getConfigurationPolicy(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • Identifier — (String)

      The Amazon Resource Name (ARN) or universally unique identifier (UUID) of the configuration policy.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • Arn — (String)

        The ARN of the configuration policy.

      • Id — (String)

        The UUID of the configuration policy.

      • Name — (String)

        The name of the configuration policy.

      • Description — (String)

        The description of the configuration policy.

      • UpdatedAt — (Date)

        The date and time, in UTC and ISO 8601 format, that the configuration policy was last updated.

      • CreatedAt — (Date)

        The date and time, in UTC and ISO 8601 format, that the configuration policy was created.

      • ConfigurationPolicy — (map)

        An object that defines how Security Hub is configured. It includes whether Security Hub is enabled or disabled, a list of enabled security standards, a list of enabled or disabled security controls, and a list of custom parameter values for specified controls. If the policy includes a list of security controls that are enabled, Security Hub disables all other controls (including newly released controls). If the policy includes a list of security controls that are disabled, Security Hub enables all other controls (including newly released controls).

        • SecurityHub — (map)

          The Amazon Web Service that the configuration policy applies to.

          • ServiceEnabled — (Boolean)

            Indicates whether Security Hub is enabled in the policy.

          • EnabledStandardIdentifiers — (Array<String>)

            A list that defines which security standards are enabled in the configuration policy.

          • SecurityControlsConfiguration — (map)

            An object that defines which security controls are enabled in the configuration policy. The enablement status of a control is aligned across all of the enabled standards in an account.

            • EnabledSecurityControlIdentifiers — (Array<String>)

              A list of security controls that are enabled in the configuration policy. Security Hub disables all other controls (including newly released controls) other than the listed controls.

            • DisabledSecurityControlIdentifiers — (Array<String>)

              A list of security controls that are disabled in the configuration policy. Security Hub enables all other controls (including newly released controls) other than the listed controls.

            • SecurityControlCustomParameters — (Array<map>)

              A list of security controls and control parameter values that are included in a configuration policy.

              • SecurityControlId — (String)

                The ID of the security control.

              • Parameters — (map<map>)

                An object that specifies parameter values for a control in a configuration policy.

                • ValueTyperequired — (String)

                  Identifies whether a control parameter uses a custom user-defined value or subscribes to the default Security Hub behavior.

                  When ValueType is set equal to DEFAULT, the default behavior can be a specific Security Hub default value, or the default behavior can be to ignore a specific parameter. When ValueType is set equal to DEFAULT, Security Hub ignores user-provided input for the Value field.

                  When ValueType is set equal to CUSTOM, the Value field can't be empty.

                  Possible values include:
                  • "DEFAULT"
                  • "CUSTOM"
                • Value — (map)

                  The current value of a control parameter.

                  • Integer — (Integer)

                    A control parameter that is an integer.

                  • IntegerList — (Array<Integer>)

                    A control parameter that is a list of integers.

                  • Double — (Float)

                    A control parameter that is a double.

                  • String — (String)

                    A control parameter that is a string.

                  • StringList — (Array<String>)

                    A control parameter that is a list of strings.

                  • Boolean — (Boolean)

                    A control parameter that is a boolean.

                  • Enum — (String)

                    A control parameter that is an enum.

                  • EnumList — (Array<String>)

                    A control parameter that is a list of enums.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

getConfigurationPolicyAssociation(params = {}, callback) ⇒ AWS.Request

Returns the association between a configuration and a target account, organizational unit, or the root. The configuration can be a configuration policy or self-managed behavior. Only the Security Hub delegated administrator can invoke this operation from the home Region.

Examples:

To get details about a configuration association


/* This operation provides details about configuration associations for a specific target account, organizational unit, or the root. */

 var params = {
  Target: {
   AccountId: "111122223333"
  }
 };
 securityhub.getConfigurationPolicyAssociation(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    AssociationStatus: "FAILED", 
    AssociationStatusMessage: "Configuration Policy a1b2c3d4-5678-90ab-cdef-EXAMPLE11111 couldn’t be applied to account 111122223333 in us-east-1 Region. Retry your request.", 
    AssociationType: "INHERITED", 
    ConfigurationPolicyId: "a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
    TargetId: "111122223333", 
    TargetType: "ACCOUNT", 
    UpdatedAt: <Date Representation>
   }
   */
 });

Calling the getConfigurationPolicyAssociation operation

var params = {
  Target: { /* required */
    AccountId: 'STRING_VALUE',
    OrganizationalUnitId: 'STRING_VALUE',
    RootId: 'STRING_VALUE'
  }
};
securityhub.getConfigurationPolicyAssociation(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • Target — (map)

      The target account ID, organizational unit ID, or the root ID to retrieve the association for.

      • AccountId — (String)

        The Amazon Web Services account ID of the target account.

      • OrganizationalUnitId — (String)

        The organizational unit ID of the target organizational unit.

      • RootId — (String)

        The ID of the organization root.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • ConfigurationPolicyId — (String)

        The universally unique identifier (UUID) of a configuration policy. For self-managed behavior, the value is SELF_MANAGED_SECURITY_HUB.

      • TargetId — (String)

        The target account ID, organizational unit ID, or the root ID for which the association is retrieved.

      • TargetType — (String)

        Specifies whether the target is an Amazon Web Services account, organizational unit, or the organization root.

        Possible values include:
        • "ACCOUNT"
        • "ORGANIZATIONAL_UNIT"
      • AssociationType — (String)

        Indicates whether the association between the specified target and the configuration was directly applied by the Security Hub delegated administrator or inherited from a parent.

        Possible values include:
        • "INHERITED"
        • "APPLIED"
      • UpdatedAt — (Date)

        The date and time, in UTC and ISO 8601 format, that the configuration policy association was last updated.

      • AssociationStatus — (String)

        The current status of the association between the specified target and the configuration.

        Possible values include:
        • "PENDING"
        • "SUCCESS"
        • "FAILED"
      • AssociationStatusMessage — (String)

        The explanation for a FAILED value for AssociationStatus.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

getEnabledStandards(params = {}, callback) ⇒ AWS.Request

Returns a list of the standards that are currently enabled.

Service Reference:

Examples:

To return a list of enabled standards


/* The following example returns a list of Security Hub standards that are currently enabled in your account.   */

 var params = {
  StandardsSubscriptionArns: [
     "arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1"
  ]
 };
 securityhub.getEnabledStandards(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    StandardsSubscriptions: [
       {
      StandardsArn: "arn:aws:securityhub:us-west-1::standards/pci-dss/v/3.2.1", 
      StandardsInput: {
      }, 
      StandardsStatus: "READY", 
      StandardsSubscriptionArn: "arn:aws:securityhub:us-west-1:123456789012:subscription/pci-dss/v/3.2.1"
     }
    ]
   }
   */
 });

Calling the getEnabledStandards operation

var params = {
  MaxResults: 'NUMBER_VALUE',
  NextToken: 'STRING_VALUE',
  StandardsSubscriptionArns: [
    'STRING_VALUE',
    /* more items */
  ]
};
securityhub.getEnabledStandards(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • StandardsSubscriptionArns — (Array<String>)

      The list of the standards subscription ARNs for the standards to retrieve.

    • NextToken — (String)

      The token that is required for pagination. On your first call to the GetEnabledStandards operation, set the value of this parameter to NULL.

      For subsequent calls to the operation, to continue listing data, set the value of this parameter to the value returned from the previous response.

    • MaxResults — (Integer)

      The maximum number of results to return in the response.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • StandardsSubscriptions — (Array<map>)

        The list of StandardsSubscriptions objects that include information about the enabled standards.

        • StandardsSubscriptionArnrequired — (String)

          The ARN of a resource that represents your subscription to a supported standard.

        • StandardsArnrequired — (String)

          The ARN of a standard.

        • StandardsInputrequired — (map<String>)

          A key-value pair of input for the standard.

        • StandardsStatusrequired — (String)

          The status of the standard subscription.

          The status values are as follows:

          • PENDING - Standard is in the process of being enabled.

          • READY - Standard is enabled.

          • INCOMPLETE - Standard could not be enabled completely. Some controls may not be available.

          • DELETING - Standard is in the process of being disabled.

          • FAILED - Standard could not be disabled.

          Possible values include:
          • "PENDING"
          • "READY"
          • "FAILED"
          • "DELETING"
          • "INCOMPLETE"
        • StandardsStatusReason — (map)

          The reason for the current status.

          • StatusReasonCoderequired — (String)

            The reason code that represents the reason for the current status of a standard subscription.

            Possible values include:
            • "NO_AVAILABLE_CONFIGURATION_RECORDER"
            • "INTERNAL_ERROR"
      • NextToken — (String)

        The pagination token to use to request the next page of results.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

getFindingAggregator(params = {}, callback) ⇒ AWS.Request

Returns the current finding aggregation configuration.

Service Reference:

Examples:

To get cross-Region aggregation details


/* The following example returns cross-Region aggregation details for the requesting account.  */

 var params = {
  FindingAggregatorArn: "arn:aws:securityhub:us-east-1:123456789012:finding-aggregator/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111"
 };
 securityhub.getFindingAggregator(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    FindingAggregationRegion: "us-east-1", 
    FindingAggregatorArn: "arn:aws:securityhub:us-east-1:123456789012:finding-aggregator/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
    RegionLinkingMode: "SPECIFIED_REGIONS", 
    Regions: [
       "us-west-1", 
       "us-west-2"
    ]
   }
   */
 });

Calling the getFindingAggregator operation

var params = {
  FindingAggregatorArn: 'STRING_VALUE' /* required */
};
securityhub.getFindingAggregator(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • FindingAggregatorArn — (String)

      The ARN of the finding aggregator to return details for. To obtain the ARN, use ListFindingAggregators.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • FindingAggregatorArn — (String)

        The ARN of the finding aggregator.

      • FindingAggregationRegion — (String)

        The aggregation Region.

      • RegionLinkingMode — (String)

        Indicates whether to link all Regions, all Regions except for a list of excluded Regions, or a list of included Regions.

      • Regions — (Array<String>)

        The list of excluded Regions or included Regions.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

getFindingHistory(params = {}, callback) ⇒ AWS.Request

Returns history for a Security Hub finding in the last 90 days. The history includes changes made to any fields in the Amazon Web Services Security Finding Format (ASFF).

Service Reference:

Examples:

To get finding history


/* The following example retrieves the history of the specified finding during the specified time frame. If the time frame permits, Security Hub returns finding history for the last 90 days. */

 var params = {
  EndTime: <Date Representation>, 
  FindingIdentifier: {
   Id: "a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
   ProductArn: "arn:aws:securityhub:us-west-2:123456789012:product/123456789012/default"
  }, 
  MaxResults: 2, 
  StartTime: <Date Representation>
 };
 securityhub.getFindingHistory(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    Records: [
       {
      FindingCreated: false, 
      FindingIdentifier: {
       Id: "a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
       ProductArn: "arn:aws:securityhub:us-west-2:123456789012:product/123456789012/default"
      }, 
      UpdateSource: {
       Identity: "arn:aws:iam::444455556666:role/Admin", 
       Type: "BATCH_UPDATE_FINDINGS"
      }, 
      UpdateTime: <Date Representation>, 
      Updates: [
         {
        NewValue: "MEDIUM", 
        OldValue: "HIGH", 
        UpdatedField: "Severity"
       }
      ]
     }
    ]
   }
   */
 });

Calling the getFindingHistory operation

var params = {
  FindingIdentifier: { /* required */
    Id: 'STRING_VALUE', /* required */
    ProductArn: 'STRING_VALUE' /* required */
  },
  EndTime: new Date || 'Wed Dec 31 1969 16:00:00 GMT-0800 (PST)' || 123456789,
  MaxResults: 'NUMBER_VALUE',
  NextToken: 'STRING_VALUE',
  StartTime: new Date || 'Wed Dec 31 1969 16:00:00 GMT-0800 (PST)' || 123456789
};
securityhub.getFindingHistory(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • FindingIdentifier — (map)

      Identifies which finding to get the finding history for.

      • Idrequired — (String)

        The identifier of the finding that was specified by the finding provider.

      • ProductArnrequired — (String)

        The ARN generated by Security Hub that uniquely identifies a product that generates findings. This can be the ARN for a third-party product that is integrated with Security Hub, or the ARN for a custom integration.

    • StartTime — (Date)

      An ISO 8601-formatted timestamp that indicates the start time of the requested finding history. A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

      If you provide values for both StartTime and EndTime, Security Hub returns finding history for the specified time period. If you provide a value for StartTime but not for EndTime, Security Hub returns finding history from the StartTime to the time at which the API is called. If you provide a value for EndTime but not for StartTime, Security Hub returns finding history from the CreatedAt timestamp of the finding to the EndTime. If you provide neither StartTime nor EndTime, Security Hub returns finding history from the CreatedAt timestamp of the finding to the time at which the API is called. In all of these scenarios, the response is limited to 100 results, and the maximum time period is limited to 90 days.

    • EndTime — (Date)

      An ISO 8601-formatted timestamp that indicates the end time of the requested finding history. A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

      If you provide values for both StartTime and EndTime, Security Hub returns finding history for the specified time period. If you provide a value for StartTime but not for EndTime, Security Hub returns finding history from the StartTime to the time at which the API is called. If you provide a value for EndTime but not for StartTime, Security Hub returns finding history from the CreatedAt timestamp of the finding to the EndTime. If you provide neither StartTime nor EndTime, Security Hub returns finding history from the CreatedAt timestamp of the finding to the time at which the API is called. In all of these scenarios, the response is limited to 100 results, and the maximum time period is limited to 90 days.

    • NextToken — (String)

      A token for pagination purposes. Provide NULL as the initial value. In subsequent requests, provide the token included in the response to get up to an additional 100 results of finding history. If you don’t provide NextToken, Security Hub returns up to 100 results of finding history for each request.

    • MaxResults — (Integer)

      The maximum number of results to be returned. If you don’t provide it, Security Hub returns up to 100 results of finding history.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • Records — (Array<map>)

        A list of events that altered the specified finding during the specified time period.

        • FindingIdentifier — (map)

          Identifies which finding to get the finding history for.

          • Idrequired — (String)

            The identifier of the finding that was specified by the finding provider.

          • ProductArnrequired — (String)

            The ARN generated by Security Hub that uniquely identifies a product that generates findings. This can be the ARN for a third-party product that is integrated with Security Hub, or the ARN for a custom integration.

        • UpdateTime — (Date)

          An ISO 8601-formatted timestamp that indicates when Security Hub processed the updated finding record.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • FindingCreated — (Boolean)

          Identifies whether the event marks the creation of a new finding. A value of True means that the finding is newly created. A value of False means that the finding isn’t newly created.

        • UpdateSource — (map)

          Identifies the source of the event that changed the finding. For example, an integrated Amazon Web Service or third-party partner integration may call BatchImportFindings , or an Security Hub customer may call BatchUpdateFindings .

          • Type — (String)

            Describes the type of finding change event, such as a call to BatchImportFindings (by an integrated Amazon Web Service or third party partner integration) or BatchUpdateFindings (by a Security Hub customer).

            Possible values include:
            • "BATCH_UPDATE_FINDINGS"
            • "BATCH_IMPORT_FINDINGS"
          • Identity — (String)

            The identity of the source that initiated the finding change event. For example, the Amazon Resource Name (ARN) of a partner that calls BatchImportFindings or of a customer that calls BatchUpdateFindings.

        • Updates — (Array<map>)

          An array of objects that provides details about the finding change event, including the Amazon Web Services Security Finding Format (ASFF) field that changed, the value of the field before the change, and the value of the field after the change.

          • UpdatedField — (String)

            The ASFF field that changed during the finding change event.

          • OldValue — (String)

            The value of the ASFF field before the finding change event.

          • NewValue — (String)

            The value of the ASFF field after the finding change event. To preserve storage and readability, Security Hub omits this value if FindingHistoryRecord exceeds database limits.

        • NextToken — (String)

          A token for pagination purposes. Provide this token in the subsequent request to GetFindingsHistory to get up to an additional 100 results of history for the same finding that you specified in your initial request.

      • NextToken — (String)

        A token for pagination purposes. Provide this token in the subsequent request to GetFindingsHistory to get up to an additional 100 results of history for the same finding that you specified in your initial request.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

getFindings(params = {}, callback) ⇒ AWS.Request

Returns a list of findings that match the specified criteria.

If finding aggregation is enabled, then when you call GetFindings from the aggregation Region, the results include all of the matching findings from both the aggregation Region and the linked Regions.

Service Reference:

Examples:

To get a list of findings


/* The following example returns a filtered and sorted list of Security Hub findings. */

 var params = {
  Filters: {
   AwsAccountId: [
      {
     Comparison: "PREFIX", 
     Value: "123456789012"
    }
   ]
  }, 
  MaxResults: 1
 };
 securityhub.getFindings(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    Findings: [
       {
      AwsAccountId: "123456789012", 
      CompanyName: "AWS", 
      Compliance: {
       AssociatedStandards: [
          {
         StandardsId: "standards/aws-foundational-security-best-practices/v/1.0.0"
        }, 
          {
         StandardsId: "standards/pci-dss/v/3.2.1"
        }, 
          {
         StandardsId: "ruleset/cis-aws-foundations-benchmark/v/1.2.0"
        }, 
          {
         StandardsId: "standards/cis-aws-foundations-benchmark/v/1.4.0"
        }, 
          {
         StandardsId: "standards/service-managed-aws-control-tower/v/1.0.0"
        }
       ], 
       RelatedRequirements: [
          "PCI DSS v3.2.1/3.4", 
          "CIS AWS Foundations Benchmark v1.2.0/2.7", 
          "CIS AWS Foundations Benchmark v1.4.0/3.7"
       ], 
       SecurityControlId: "CloudTrail.2", 
       Status: "FAILED"
      }, 
      CreatedAt: "2022-10-06T02:18:23.076Z", 
      Description: "This AWS control checks whether AWS CloudTrail is configured to use the server side encryption (SSE) AWS Key Management Service (AWS KMS) customer master key (CMK) encryption. The check will pass if the KmsKeyId is defined.", 
      FindingProviderFields: {
       Severity: {
        Label: "MEDIUM", 
        Original: "MEDIUM"
       }, 
       Types: [
          "Software and Configuration Checks/Industry and Regulatory Standards"
       ]
      }, 
      FirstObservedAt: "2022-10-06T02:18:23.076Z", 
      GeneratorId: "security-control/CloudTrail.2", 
      Id: "arn:aws:securityhub:us-east-2:123456789012:security-control/CloudTrail.2/finding/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
      LastObservedAt: "2022-10-28T16:10:06.956Z", 
      ProductArn: "arn:aws:securityhub:us-east-2::product/aws/securityhub", 
      ProductFields: {
       "RelatedAWSResources:0/name": "securityhub-cloud-trail-encryption-enabled-fe95bf3f", 
       "RelatedAWSResources:0/type": "AWS::Config::ConfigRule", 
       "Resources:0/Id": "arn:aws:cloudtrail:us-east-2:123456789012:trail/AWSMacieTrail-DO-NOT-EDIT", 
       "aws/securityhub/CompanyName": "AWS", 
       "aws/securityhub/FindingId": "arn:aws:securityhub:us-east-2::product/aws/securityhub/arn:aws:securityhub:us-east-2:123456789012:security-control/CloudTrail.2/finding/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
       "aws/securityhub/ProductName": "Security Hub"
      }, 
      ProductName: "Security Hub", 
      RecordState: "ACTIVE", 
      Region: "us-east-2", 
      Remediation: {
       Recommendation: {
        Text: "For directions on how to correct this issue, consult the AWS Security Hub controls documentation.", 
        Url: "https://docs.aws.amazon.com/console/securityhub/CloudTrail.2/remediation"
       }
      }, 
      Resources: [
         {
        Id: "arn:aws:cloudtrail:us-east-2:123456789012:trail/AWSMacieTrail-DO-NOT-EDIT", 
        Partition: "aws", 
        Region: "us-east-2", 
        Type: "AwsCloudTrailTrail"
       }
      ], 
      SchemaVersion: "2018-10-08", 
      Severity: {
       Label: "MEDIUM", 
       Normalized: 40, 
       Original: "MEDIUM"
      }, 
      Title: "CloudTrail should have encryption at-rest enabled", 
      Types: [
         "Software and Configuration Checks/Industry and Regulatory Standards"
      ], 
      UpdatedAt: "2022-10-28T16:10:00.093Z", 
      Workflow: {
       Status: "NEW"
      }, 
      WorkflowState: "NEW"
     }
    ]
   }
   */
 });

Calling the getFindings operation

var params = {
  Filters: {
    AwsAccountId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    AwsAccountName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    CompanyName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ComplianceAssociatedStandardsId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ComplianceSecurityControlId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ComplianceSecurityControlParametersName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ComplianceSecurityControlParametersValue: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ComplianceStatus: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Confidence: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    CreatedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    Criticality: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    Description: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsConfidence: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsCriticality: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsRelatedFindingsId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsRelatedFindingsProductArn: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsSeverityLabel: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsSeverityOriginal: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsTypes: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    FirstObservedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    GeneratorId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Id: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Keyword: [
      {
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    LastObservedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    MalwareName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    MalwarePath: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    MalwareState: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    MalwareType: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkDestinationDomain: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkDestinationIpV4: [
      {
        Cidr: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkDestinationIpV6: [
      {
        Cidr: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkDestinationPort: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    NetworkDirection: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkProtocol: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkSourceDomain: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkSourceIpV4: [
      {
        Cidr: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkSourceIpV6: [
      {
        Cidr: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkSourceMac: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkSourcePort: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    NoteText: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NoteUpdatedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    NoteUpdatedBy: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProcessLaunchedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProcessName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProcessParentPid: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    ProcessPath: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProcessPid: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    ProcessTerminatedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProductArn: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProductFields: [
      {
        Comparison: EQUALS | NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Key: 'STRING_VALUE',
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProductName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    RecommendationText: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    RecordState: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Region: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    RelatedFindingsId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    RelatedFindingsProductArn: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceApplicationArn: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceApplicationName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceIamInstanceProfileArn: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceImageId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceIpV4Addresses: [
      {
        Cidr: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceIpV6Addresses: [
      {
        Cidr: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceKeyName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceLaunchedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceSubnetId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceType: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceVpcId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsIamAccessKeyCreatedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsIamAccessKeyPrincipalName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsIamAccessKeyStatus: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsIamAccessKeyUserName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsIamUserUserName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsS3BucketOwnerId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsS3BucketOwnerName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceContainerImageId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceContainerImageName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceContainerLaunchedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceContainerName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceDetailsOther: [
      {
        Comparison: EQUALS | NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Key: 'STRING_VALUE',
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourcePartition: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceRegion: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceTags: [
      {
        Comparison: EQUALS | NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Key: 'STRING_VALUE',
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceType: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Sample: [
      {
        Value: true || false
      },
      /* more items */
    ],
    SeverityLabel: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    SeverityNormalized: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    SeverityProduct: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    SourceUrl: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ThreatIntelIndicatorCategory: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ThreatIntelIndicatorLastObservedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    ThreatIntelIndicatorSource: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ThreatIntelIndicatorSourceUrl: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ThreatIntelIndicatorType: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ThreatIntelIndicatorValue: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Title: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Type: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    UpdatedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    UserDefinedFields: [
      {
        Comparison: EQUALS | NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Key: 'STRING_VALUE',
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    VerificationState: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    VulnerabilitiesExploitAvailable: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    VulnerabilitiesFixAvailable: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    WorkflowState: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    WorkflowStatus: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ]
  },
  MaxResults: 'NUMBER_VALUE',
  NextToken: 'STRING_VALUE',
  SortCriteria: [
    {
      Field: 'STRING_VALUE',
      SortOrder: asc | desc
    },
    /* more items */
  ]
};
securityhub.getFindings(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • Filters — (map)

      The finding attributes used to define a condition to filter the returned findings.

      You can filter by up to 10 finding attributes. For each attribute, you can provide up to 20 filter values.

      Note that in the available filter fields, WorkflowState is deprecated. To search for a finding based on its workflow status, use WorkflowStatus.

      • ProductArn — (Array<map>)

        The ARN generated by Security Hub that uniquely identifies a third-party company (security findings provider) after this provider's product (solution that generates findings) is registered with Security Hub.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • AwsAccountId — (Array<map>)

        The Amazon Web Services account ID in which a finding is generated.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Id — (Array<map>)

        The security findings provider-specific identifier for a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • GeneratorId — (Array<map>)

        The identifier for the solution-specific component (a discrete unit of logic) that generated a finding. In various security findings providers' solutions, this generator can be called a rule, a check, a detector, a plugin, etc.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Region — (Array<map>)

        The Region from which the finding was generated.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Type — (Array<map>)

        A finding type in the format of namespace/category/classifier that classifies a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • FirstObservedAt — (Array<map>)

        An ISO8601-formatted timestamp that indicates when the security findings provider first observed the potential security issue that a finding captured.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • LastObservedAt — (Array<map>)

        An ISO8601-formatted timestamp that indicates when the security findings provider most recently observed the potential security issue that a finding captured.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • CreatedAt — (Array<map>)

        An ISO8601-formatted timestamp that indicates when the security findings provider captured the potential security issue that a finding captured.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • UpdatedAt — (Array<map>)

        An ISO8601-formatted timestamp that indicates when the security findings provider last updated the finding record.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • SeverityProduct — (Array<map>)

        The native severity as defined by the security findings provider's solution that generated the finding.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • SeverityNormalized — (Array<map>)

        The normalized severity of a finding.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • SeverityLabel — (Array<map>)

        The label of a finding's severity.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Confidence — (Array<map>)

        A finding's confidence. Confidence is defined as the likelihood that a finding accurately identifies the behavior or issue that it was intended to identify.

        Confidence is scored on a 0-100 basis using a ratio scale, where 0 means zero percent confidence and 100 means 100 percent confidence.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • Criticality — (Array<map>)

        The level of importance assigned to the resources associated with the finding.

        A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • Title — (Array<map>)

        A finding's title.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Description — (Array<map>)

        A finding's description.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • RecommendationText — (Array<map>)

        The recommendation of what to do about the issue described in a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • SourceUrl — (Array<map>)

        A URL that links to a page about the current finding in the security findings provider's solution.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ProductFields — (Array<map>)

        A data type where security findings providers can include additional solution-specific details that aren't part of the defined AwsSecurityFinding format.

        • Key — (String)

          The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

        • Value — (String)

          The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

        • Comparison — (String)

          The condition to apply to the key value when filtering Security Hub findings with a map filter.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

          • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

          CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

          To search for values that don't have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

          • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

          NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

          CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ProductName — (Array<map>)

        The name of the solution (product) that generates findings.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • CompanyName — (Array<map>)

        The name of the findings provider (company) that owns the solution (product) that generates findings.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • UserDefinedFields — (Array<map>)

        A list of name/value string pairs associated with the finding. These are custom, user-defined fields added to a finding.

        • Key — (String)

          The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

        • Value — (String)

          The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

        • Comparison — (String)

          The condition to apply to the key value when filtering Security Hub findings with a map filter.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

          • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

          CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

          To search for values that don't have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

          • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

          NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

          CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • MalwareName — (Array<map>)

        The name of the malware that was observed.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • MalwareType — (Array<map>)

        The type of the malware that was observed.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • MalwarePath — (Array<map>)

        The filesystem path of the malware that was observed.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • MalwareState — (Array<map>)

        The state of the malware that was observed.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NetworkDirection — (Array<map>)

        Indicates the direction of network traffic associated with a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NetworkProtocol — (Array<map>)

        The protocol of network-related information about a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NetworkSourceIpV4 — (Array<map>)

        The source IPv4 address of network-related information about a finding.

        • Cidr — (String)

          A finding's CIDR value.

      • NetworkSourceIpV6 — (Array<map>)

        The source IPv6 address of network-related information about a finding.

        • Cidr — (String)

          A finding's CIDR value.

      • NetworkSourcePort — (Array<map>)

        The source port of network-related information about a finding.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • NetworkSourceDomain — (Array<map>)

        The source domain of network-related information about a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NetworkSourceMac — (Array<map>)

        The source media access control (MAC) address of network-related information about a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NetworkDestinationIpV4 — (Array<map>)

        The destination IPv4 address of network-related information about a finding.

        • Cidr — (String)

          A finding's CIDR value.

      • NetworkDestinationIpV6 — (Array<map>)

        The destination IPv6 address of network-related information about a finding.

        • Cidr — (String)

          A finding's CIDR value.

      • NetworkDestinationPort — (Array<map>)

        The destination port of network-related information about a finding.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • NetworkDestinationDomain — (Array<map>)

        The destination domain of network-related information about a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ProcessName — (Array<map>)

        The name of the process.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ProcessPath — (Array<map>)

        The path to the process executable.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ProcessPid — (Array<map>)

        The process ID.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • ProcessParentPid — (Array<map>)

        The parent process ID. This field accepts positive integers between O and 2147483647.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • ProcessLaunchedAt — (Array<map>)

        A timestamp that identifies when the process was launched.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • ProcessTerminatedAt — (Array<map>)

        A timestamp that identifies when the process was terminated.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • ThreatIntelIndicatorType — (Array<map>)

        The type of a threat intelligence indicator.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ThreatIntelIndicatorValue — (Array<map>)

        The value of a threat intelligence indicator.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ThreatIntelIndicatorCategory — (Array<map>)

        The category of a threat intelligence indicator.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ThreatIntelIndicatorLastObservedAt — (Array<map>)

        A timestamp that identifies the last observation of a threat intelligence indicator.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • ThreatIntelIndicatorSource — (Array<map>)

        The source of the threat intelligence.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ThreatIntelIndicatorSourceUrl — (Array<map>)

        The URL for more details from the source of the threat intelligence.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceType — (Array<map>)

        Specifies the type of the resource that details are provided for.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceId — (Array<map>)

        The canonical identifier for the given resource type.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourcePartition — (Array<map>)

        The canonical Amazon Web Services partition name that the Region is assigned to.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceRegion — (Array<map>)

        The canonical Amazon Web Services external Region name where this resource is located.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceTags — (Array<map>)

        A list of Amazon Web Services tags associated with a resource at the time the finding was processed.

        • Key — (String)

          The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

        • Value — (String)

          The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

        • Comparison — (String)

          The condition to apply to the key value when filtering Security Hub findings with a map filter.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

          • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

          CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

          To search for values that don't have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

          • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

          NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

          CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceType — (Array<map>)

        The instance type of the instance.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceImageId — (Array<map>)

        The Amazon Machine Image (AMI) ID of the instance.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceIpV4Addresses — (Array<map>)

        The IPv4 addresses associated with the instance.

        • Cidr — (String)

          A finding's CIDR value.

      • ResourceAwsEc2InstanceIpV6Addresses — (Array<map>)

        The IPv6 addresses associated with the instance.

        • Cidr — (String)

          A finding's CIDR value.

      • ResourceAwsEc2InstanceKeyName — (Array<map>)

        The key name associated with the instance.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceIamInstanceProfileArn — (Array<map>)

        The IAM profile ARN of the instance.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceVpcId — (Array<map>)

        The identifier of the VPC that the instance was launched in.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceSubnetId — (Array<map>)

        The identifier of the subnet that the instance was launched in.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceLaunchedAt — (Array<map>)

        The date and time the instance was launched.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • ResourceAwsS3BucketOwnerId — (Array<map>)

        The canonical user ID of the owner of the S3 bucket.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsS3BucketOwnerName — (Array<map>)

        The display name of the owner of the S3 bucket.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsIamAccessKeyUserName — (Array<map>)

        The user associated with the IAM access key related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsIamAccessKeyPrincipalName — (Array<map>)

        The name of the principal that is associated with an IAM access key.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsIamAccessKeyStatus — (Array<map>)

        The status of the IAM access key related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsIamAccessKeyCreatedAt — (Array<map>)

        The creation date/time of the IAM access key related to a finding.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • ResourceAwsIamUserUserName — (Array<map>)

        The name of an IAM user.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceContainerName — (Array<map>)

        The name of the container related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceContainerImageId — (Array<map>)

        The identifier of the image related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceContainerImageName — (Array<map>)

        The name of the image related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceContainerLaunchedAt — (Array<map>)

        A timestamp that identifies when the container was started.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • ResourceDetailsOther — (Array<map>)

        The details of a resource that doesn't have a specific subfield for the resource type defined.

        • Key — (String)

          The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

        • Value — (String)

          The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

        • Comparison — (String)

          The condition to apply to the key value when filtering Security Hub findings with a map filter.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

          • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

          CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

          To search for values that don't have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

          • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

          NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

          CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ComplianceStatus — (Array<map>)

        Exclusive to findings that are generated as the result of a check run against a specific rule in a supported standard, such as CIS Amazon Web Services Foundations. Contains security standard-related finding details.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • VerificationState — (Array<map>)

        The veracity of a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • WorkflowState — (Array<map>)

        The workflow state of a finding.

        Note that this field is deprecated. To search for a finding based on its workflow status, use WorkflowStatus.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • WorkflowStatus — (Array<map>)

        The status of the investigation into a finding. Allowed values are the following.

        • NEW - The initial state of a finding, before it is reviewed.

          Security Hub also resets the workflow status from NOTIFIED or RESOLVED to NEW in the following cases:

          • RecordState changes from ARCHIVED to ACTIVE.

          • Compliance.Status changes from PASSED to either WARNING, FAILED, or NOT_AVAILABLE.

        • NOTIFIED - Indicates that the resource owner has been notified about the security issue. Used when the initial reviewer is not the resource owner, and needs intervention from the resource owner.

          If one of the following occurs, the workflow status is changed automatically from NOTIFIED to NEW:

          • RecordState changes from ARCHIVED to ACTIVE.

          • Compliance.Status changes from PASSED to FAILED, WARNING, or NOT_AVAILABLE.

        • SUPPRESSED - Indicates that you reviewed the finding and do not believe that any action is needed.

          The workflow status of a SUPPRESSED finding does not change if RecordState changes from ARCHIVED to ACTIVE.

        • RESOLVED - The finding was reviewed and remediated and is now considered resolved.

          The finding remains RESOLVED unless one of the following occurs:

          • RecordState changes from ARCHIVED to ACTIVE.

          • Compliance.Status changes from PASSED to FAILED, WARNING, or NOT_AVAILABLE.

          In those cases, the workflow status is automatically reset to NEW.

          For findings from controls, if Compliance.Status is PASSED, then Security Hub automatically sets the workflow status to RESOLVED.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • RecordState — (Array<map>)

        The updated record state for the finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • RelatedFindingsProductArn — (Array<map>)

        The ARN of the solution that generated a related finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • RelatedFindingsId — (Array<map>)

        The solution-generated identifier for a related finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NoteText — (Array<map>)

        The text of a note.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NoteUpdatedAt — (Array<map>)

        The timestamp of when the note was updated.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • NoteUpdatedBy — (Array<map>)

        The principal that created a note.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Keyword — (Array<map>)

        A keyword for a finding.

        • Value — (String)

          A value for the keyword.

      • FindingProviderFieldsConfidence — (Array<map>)

        The finding provider value for the finding confidence. Confidence is defined as the likelihood that a finding accurately identifies the behavior or issue that it was intended to identify.

        Confidence is scored on a 0-100 basis using a ratio scale, where 0 means zero percent confidence and 100 means 100 percent confidence.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • FindingProviderFieldsCriticality — (Array<map>)

        The finding provider value for the level of importance assigned to the resources associated with the findings.

        A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • FindingProviderFieldsRelatedFindingsId — (Array<map>)

        The finding identifier of a related finding that is identified by the finding provider.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • FindingProviderFieldsRelatedFindingsProductArn — (Array<map>)

        The ARN of the solution that generated a related finding that is identified by the finding provider.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • FindingProviderFieldsSeverityLabel — (Array<map>)

        The finding provider value for the severity label.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • FindingProviderFieldsSeverityOriginal — (Array<map>)

        The finding provider's original value for the severity.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • FindingProviderFieldsTypes — (Array<map>)

        One or more finding types that the finding provider assigned to the finding. Uses the format of namespace/category/classifier that classify a finding.

        Valid namespace values are: Software and Configuration Checks | TTPs | Effects | Unusual Behaviors | Sensitive Data Identifications

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Sample — (Array<map>)

        Indicates whether or not sample findings are included in the filter results.

        • Value — (Boolean)

          The value of the boolean.

      • ComplianceSecurityControlId — (Array<map>)

        The unique identifier of a control across standards. Values for this field typically consist of an Amazon Web Service and a number, such as APIGateway.5.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ComplianceAssociatedStandardsId — (Array<map>)

        The unique identifier of a standard in which a control is enabled. This field consists of the resource portion of the Amazon Resource Name (ARN) returned for a standard in the DescribeStandards API response.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • VulnerabilitiesExploitAvailable — (Array<map>)

        Indicates whether a software vulnerability in your environment has a known exploit. You can filter findings by this field only if you use Security Hub and Amazon Inspector.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • VulnerabilitiesFixAvailable — (Array<map>)

        Indicates whether a vulnerability is fixed in a newer version of the affected software packages. You can filter findings by this field only if you use Security Hub and Amazon Inspector.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ComplianceSecurityControlParametersName — (Array<map>)

        The name of a security control parameter.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ComplianceSecurityControlParametersValue — (Array<map>)

        The current value of a security control parameter.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • AwsAccountName — (Array<map>)

        The name of the Amazon Web Services account in which a finding is generated.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceApplicationName — (Array<map>)

        The name of the application that is related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceApplicationArn — (Array<map>)

        The ARN of the application that is related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
    • SortCriteria — (Array<map>)

      The finding attributes used to sort the list of returned findings.

      • Field — (String)

        The finding attribute used to sort findings.

      • SortOrder — (String)

        The order used to sort findings.

        Possible values include:
        • "asc"
        • "desc"
    • NextToken — (String)

      The token that is required for pagination. On your first call to the GetFindings operation, set the value of this parameter to NULL.

      For subsequent calls to the operation, to continue listing data, set the value of this parameter to the value returned from the previous response.

    • MaxResults — (Integer)

      The maximum number of findings to return.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • Findings — (Array<map>)

        The findings that matched the filters specified in the request.

        • SchemaVersionrequired — (String)

          The schema version that a finding is formatted for.

        • Idrequired — (String)

          The security findings provider-specific identifier for a finding.

        • ProductArnrequired — (String)

          The ARN generated by Security Hub that uniquely identifies a product that generates findings. This can be the ARN for a third-party product that is integrated with Security Hub, or the ARN for a custom integration.

        • ProductName — (String)

          The name of the product that generated the finding.

          Security Hub populates this attribute automatically for each finding. You cannot update this attribute with BatchImportFindings or BatchUpdateFindings. The exception to this is a custom integration.

          When you use the Security Hub console or API to filter findings by product name, you use this attribute.

        • CompanyName — (String)

          The name of the company for the product that generated the finding.

          Security Hub populates this attribute automatically for each finding. You cannot update this attribute with BatchImportFindings or BatchUpdateFindings. The exception to this is a custom integration.

          When you use the Security Hub console or API to filter findings by company name, you use this attribute.

        • Region — (String)

          The Region from which the finding was generated.

          Security Hub populates this attribute automatically for each finding. You cannot update it using BatchImportFindings or BatchUpdateFindings.

        • GeneratorIdrequired — (String)

          The identifier for the solution-specific component (a discrete unit of logic) that generated a finding. In various security findings providers' solutions, this generator can be called a rule, a check, a detector, a plugin, etc.

        • AwsAccountIdrequired — (String)

          The Amazon Web Services account ID that a finding is generated in.

        • Types — (Array<String>)

          One or more finding types in the format of namespace/category/classifier that classify a finding.

          Valid namespace values are: Software and Configuration Checks | TTPs | Effects | Unusual Behaviors | Sensitive Data Identifications

        • FirstObservedAt — (String)

          Indicates when the security findings provider first observed the potential security issue that a finding captured.

          Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

        • LastObservedAt — (String)

          Indicates when the security findings provider most recently observed the potential security issue that a finding captured.

          Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

        • CreatedAtrequired — (String)

          Indicates when the security findings provider created the potential security issue that a finding captured.

          Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

        • UpdatedAtrequired — (String)

          Indicates when the security findings provider last updated the finding record.

          Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

        • Severity — (map)

          A finding's severity.

          • Product — (Float)

            Deprecated. This attribute isn't included in findings. Instead of providing Product, provide Original.

            The native severity as defined by the Amazon Web Services service or integrated partner product that generated the finding.

          • Label — (String)

            The severity value of the finding. The allowed values are the following.

            • INFORMATIONAL - No issue was found.

            • LOW - The issue does not require action on its own.

            • MEDIUM - The issue must be addressed but not urgently.

            • HIGH - The issue must be addressed as a priority.

            • CRITICAL - The issue must be remediated immediately to avoid it escalating.

            If you provide Normalized and do not provide Label, then Label is set automatically as follows.

            • 0 - INFORMATIONAL

            • 1–39 - LOW

            • 40–69 - MEDIUM

            • 70–89 - HIGH

            • 90–100 - CRITICAL

            Possible values include:
            • "INFORMATIONAL"
            • "LOW"
            • "MEDIUM"
            • "HIGH"
            • "CRITICAL"
          • Normalized — (Integer)

            Deprecated. The normalized severity of a finding. Instead of providing Normalized, provide Label.

            If you provide Label and do not provide Normalized, then Normalized is set automatically as follows.

            • INFORMATIONAL - 0

            • LOW - 1

            • MEDIUM - 40

            • HIGH - 70

            • CRITICAL - 90

          • Original — (String)

            The native severity from the finding product that generated the finding.

        • Confidence — (Integer)

          A finding's confidence. Confidence is defined as the likelihood that a finding accurately identifies the behavior or issue that it was intended to identify.

          Confidence is scored on a 0-100 basis using a ratio scale, where 0 means zero percent confidence and 100 means 100 percent confidence.

        • Criticality — (Integer)

          The level of importance assigned to the resources associated with the finding.

          A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources.

        • Titlerequired — (String)

          A finding's title.

          Note: In this release, Title is a required property.
        • Descriptionrequired — (String)

          A finding's description.

          Note: In this release, Description is a required property.
        • Remediation — (map)

          A data type that describes the remediation options for a finding.

          • Recommendation — (map)

            A recommendation on the steps to take to remediate the issue identified by a finding.

            • Text — (String)

              Describes the recommended steps to take to remediate an issue identified in a finding.

            • Url — (String)

              A URL to a page or site that contains information about how to remediate a finding.

        • SourceUrl — (String)

          A URL that links to a page about the current finding in the security findings provider's solution.

        • ProductFields — (map<String>)

          A data type where security findings providers can include additional solution-specific details that aren't part of the defined AwsSecurityFinding format.

          Can contain up to 50 key-value pairs. For each key-value pair, the key can contain up to 128 characters, and the value can contain up to 2048 characters.

        • UserDefinedFields — (map<String>)

          A list of name/value string pairs associated with the finding. These are custom, user-defined fields added to a finding.

        • Malware — (Array<map>)

          A list of malware related to a finding.

          • Namerequired — (String)

            The name of the malware that was observed.

          • Type — (String)

            The type of the malware that was observed.

            Possible values include:
            • "ADWARE"
            • "BLENDED_THREAT"
            • "BOTNET_AGENT"
            • "COIN_MINER"
            • "EXPLOIT_KIT"
            • "KEYLOGGER"
            • "MACRO"
            • "POTENTIALLY_UNWANTED"
            • "SPYWARE"
            • "RANSOMWARE"
            • "REMOTE_ACCESS"
            • "ROOTKIT"
            • "TROJAN"
            • "VIRUS"
            • "WORM"
          • Path — (String)

            The file system path of the malware that was observed.

          • State — (String)

            The state of the malware that was observed.

            Possible values include:
            • "OBSERVED"
            • "REMOVAL_FAILED"
            • "REMOVED"
        • Network — (map)

          The details of network-related information about a finding.

          • Direction — (String)

            The direction of network traffic associated with a finding.

            Possible values include:
            • "IN"
            • "OUT"
          • Protocol — (String)

            The protocol of network-related information about a finding.

          • OpenPortRange — (map)

            The range of open ports that is present on the network.

            • Begin — (Integer)

              The first port in the port range.

            • End — (Integer)

              The last port in the port range.

          • SourceIpV4 — (String)

            The source IPv4 address of network-related information about a finding.

          • SourceIpV6 — (String)

            The source IPv6 address of network-related information about a finding.

          • SourcePort — (Integer)

            The source port of network-related information about a finding.

          • SourceDomain — (String)

            The source domain of network-related information about a finding.

          • SourceMac — (String)

            The source media access control (MAC) address of network-related information about a finding.

          • DestinationIpV4 — (String)

            The destination IPv4 address of network-related information about a finding.

          • DestinationIpV6 — (String)

            The destination IPv6 address of network-related information about a finding.

          • DestinationPort — (Integer)

            The destination port of network-related information about a finding.

          • DestinationDomain — (String)

            The destination domain of network-related information about a finding.

        • NetworkPath — (Array<map>)

          Provides information about a network path that is relevant to a finding. Each entry under NetworkPath represents a component of that path.

          • ComponentId — (String)

            The identifier of a component in the network path.

          • ComponentType — (String)

            The type of component.

          • Egress — (map)

            Information about the component that comes after the current component in the network path.

            • Protocol — (String)

              The protocol used for the component.

            • Destination — (map)

              Information about the destination of the component.

              • Address — (Array<String>)

                The IP addresses of the destination.

              • PortRanges — (Array<map>)

                A list of port ranges for the destination.

                • Begin — (Integer)

                  The first port in the port range.

                • End — (Integer)

                  The last port in the port range.

            • Source — (map)

              Information about the origin of the component.

              • Address — (Array<String>)

                The IP addresses of the destination.

              • PortRanges — (Array<map>)

                A list of port ranges for the destination.

                • Begin — (Integer)

                  The first port in the port range.

                • End — (Integer)

                  The last port in the port range.

          • Ingress — (map)

            Information about the component that comes before the current node in the network path.

            • Protocol — (String)

              The protocol used for the component.

            • Destination — (map)

              Information about the destination of the component.

              • Address — (Array<String>)

                The IP addresses of the destination.

              • PortRanges — (Array<map>)

                A list of port ranges for the destination.

                • Begin — (Integer)

                  The first port in the port range.

                • End — (Integer)

                  The last port in the port range.

            • Source — (map)

              Information about the origin of the component.

              • Address — (Array<String>)

                The IP addresses of the destination.

              • PortRanges — (Array<map>)

                A list of port ranges for the destination.

                • Begin — (Integer)

                  The first port in the port range.

                • End — (Integer)

                  The last port in the port range.

        • Process — (map)

          The details of process-related information about a finding.

          • Name — (String)

            The name of the process.

          • Path — (String)

            The path to the process executable.

          • Pid — (Integer)

            The process ID.

          • ParentPid — (Integer)

            The parent process ID. This field accepts positive integers between O and 2147483647.

          • LaunchedAt — (String)

            Indicates when the process was launched.

            Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

          • TerminatedAt — (String)

            Indicates when the process was terminated.

            Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

        • Threats — (Array<map>)

          Details about the threat detected in a security finding and the file paths that were affected by the threat.

          • Name — (String)

            The name of the threat.

          • Severity — (String)

            The severity of the threat.

          • ItemCount — (Integer)

            This total number of items in which the threat has been detected.

          • FilePaths — (Array<map>)

            Provides information about the file paths that were affected by the threat.

            • FilePath — (String)

              Path to the infected or suspicious file on the resource it was detected on.

            • FileName — (String)

              The name of the infected or suspicious file corresponding to the hash.

            • ResourceId — (String)

              The Amazon Resource Name (ARN) of the resource on which the threat was detected.

            • Hash — (String)

              The hash value for the infected or suspicious file.

        • ThreatIntelIndicators — (Array<map>)

          Threat intelligence details related to a finding.

          • Type — (String)

            The type of threat intelligence indicator.

            Possible values include:
            • "DOMAIN"
            • "EMAIL_ADDRESS"
            • "HASH_MD5"
            • "HASH_SHA1"
            • "HASH_SHA256"
            • "HASH_SHA512"
            • "IPV4_ADDRESS"
            • "IPV6_ADDRESS"
            • "MUTEX"
            • "PROCESS"
            • "URL"
          • Value — (String)

            The value of a threat intelligence indicator.

          • Category — (String)

            The category of a threat intelligence indicator.

            Possible values include:
            • "BACKDOOR"
            • "CARD_STEALER"
            • "COMMAND_AND_CONTROL"
            • "DROP_SITE"
            • "EXPLOIT_SITE"
            • "KEYLOGGER"
          • LastObservedAt — (String)

            Indicates when the most recent instance of a threat intelligence indicator was observed.

            Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

          • Source — (String)

            The source of the threat intelligence indicator.

          • SourceUrl — (String)

            The URL to the page or site where you can get more information about the threat intelligence indicator.

        • Resourcesrequired — (Array<map>)

          A set of resource data types that describe the resources that the finding refers to.

          • Typerequired — (String)

            The type of the resource that details are provided for. If possible, set Type to one of the supported resource types. For example, if the resource is an EC2 instance, then set Type to AwsEc2Instance.

            If the resource does not match any of the provided types, then set Type to Other.

          • Idrequired — (String)

            The canonical identifier for the given resource type.

          • Partition — (String)

            The canonical Amazon Web Services partition name that the Region is assigned to.

            Possible values include:
            • "aws"
            • "aws-cn"
            • "aws-us-gov"
          • Region — (String)

            The canonical Amazon Web Services external Region name where this resource is located.

          • ResourceRole — (String)

            Identifies the role of the resource in the finding. A resource is either the actor or target of the finding activity,

          • Tags — (map<String>)

            A list of Amazon Web Services tags associated with a resource at the time the finding was processed.

          • DataClassification — (map)

            Contains information about sensitive data that was detected on the resource.

            • DetailedResultsLocation — (String)

              The path to the folder or file that contains the sensitive data.

            • Result — (map)

              The details about the sensitive data that was detected on the resource.

              • MimeType — (String)

                The type of content that the finding applies to.

              • SizeClassified — (Integer)

                The total size in bytes of the affected data.

              • AdditionalOccurrences — (Boolean)

                Indicates whether there are additional occurrences of sensitive data that are not included in the finding. This occurs when the number of occurrences exceeds the maximum that can be included.

              • Status — (map)

                The current status of the sensitive data detection.

                • Code — (String)

                  The code that represents the status of the sensitive data detection.

                • Reason — (String)

                  A longer description of the current status of the sensitive data detection.

              • SensitiveData — (Array<map>)

                Provides details about sensitive data that was identified based on built-in configuration.

                • Category — (String)

                  The category of sensitive data that was detected. For example, the category can indicate that the sensitive data involved credentials, financial information, or personal information.

                • Detections — (Array<map>)

                  The list of detected instances of sensitive data.

                  • Count — (Integer)

                    The total number of occurrences of sensitive data that were detected.

                  • Type — (String)

                    The type of sensitive data that was detected. For example, the type might indicate that the data is an email address.

                  • Occurrences — (map)

                    Details about the sensitive data that was detected.

                    • LineRanges — (Array<map>)

                      Occurrences of sensitive data detected in a non-binary text file or a Microsoft Word file. Non-binary text files include files such as HTML, XML, JSON, and TXT files.

                      • Start — (Integer)

                        The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                      • End — (Integer)

                        The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                      • StartColumn — (Integer)

                        In the line where the sensitive data starts, the column within the line where the sensitive data starts.

                    • OffsetRanges — (Array<map>)

                      Occurrences of sensitive data detected in a binary text file.

                      • Start — (Integer)

                        The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                      • End — (Integer)

                        The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                      • StartColumn — (Integer)

                        In the line where the sensitive data starts, the column within the line where the sensitive data starts.

                    • Pages — (Array<map>)

                      Occurrences of sensitive data in an Adobe Portable Document Format (PDF) file.

                      • PageNumber — (Integer)

                        The page number of the page that contains the sensitive data.

                      • LineRange — (map)

                        An occurrence of sensitive data detected in a non-binary text file or a Microsoft Word file. Non-binary text files include files such as HTML, XML, JSON, and TXT files.

                        • Start — (Integer)

                          The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                        • End — (Integer)

                          The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                        • StartColumn — (Integer)

                          In the line where the sensitive data starts, the column within the line where the sensitive data starts.

                      • OffsetRange — (map)

                        An occurrence of sensitive data detected in a binary text file.

                        • Start — (Integer)

                          The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                        • End — (Integer)

                          The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                        • StartColumn — (Integer)

                          In the line where the sensitive data starts, the column within the line where the sensitive data starts.

                    • Records — (Array<map>)

                      Occurrences of sensitive data in an Apache Avro object container or an Apache Parquet file.

                      • JsonPath — (String)

                        The path, as a JSONPath expression, to the field in the record that contains the data. If the field name is longer than 20 characters, it is truncated. If the path is longer than 250 characters, it is truncated.

                      • RecordIndex — (Integer)

                        The record index, starting from 0, for the record that contains the data.

                    • Cells — (Array<map>)

                      Occurrences of sensitive data detected in Microsoft Excel workbooks, comma-separated value (CSV) files, or tab-separated value (TSV) files.

                      • Column — (Integer)

                        The column number of the column that contains the data. For a Microsoft Excel workbook, the column number corresponds to the alphabetical column identifiers. For example, a value of 1 for Column corresponds to the A column in the workbook.

                      • Row — (Integer)

                        The row number of the row that contains the data.

                      • ColumnName — (String)

                        The name of the column that contains the data.

                      • CellReference — (String)

                        For a Microsoft Excel workbook, provides the location of the cell, as an absolute cell reference, that contains the data. For example, Sheet2!C5 for cell C5 on Sheet2.

                • TotalCount — (Integer)

                  The total number of occurrences of sensitive data.

              • CustomDataIdentifiers — (map)

                Provides details about sensitive data that was identified based on customer-defined configuration.

                • Detections — (Array<map>)

                  The list of detected instances of sensitive data.

                  • Count — (Integer)

                    The total number of occurrences of sensitive data that were detected.

                  • Arn — (String)

                    The ARN of the custom identifier that was used to detect the sensitive data.

                  • Name — (String)

                    he name of the custom identifier that detected the sensitive data.

                  • Occurrences — (map)

                    Details about the sensitive data that was detected.

                    • LineRanges — (Array<map>)

                      Occurrences of sensitive data detected in a non-binary text file or a Microsoft Word file. Non-binary text files include files such as HTML, XML, JSON, and TXT files.

                      • Start — (Integer)

                        The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                      • End — (Integer)

                        The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                      • StartColumn — (Integer)

                        In the line where the sensitive data starts, the column within the line where the sensitive data starts.

                    • OffsetRanges — (Array<map>)

                      Occurrences of sensitive data detected in a binary text file.

                      • Start — (Integer)

                        The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                      • End — (Integer)

                        The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                      • StartColumn — (Integer)

                        In the line where the sensitive data starts, the column within the line where the sensitive data starts.

                    • Pages — (Array<map>)

                      Occurrences of sensitive data in an Adobe Portable Document Format (PDF) file.

                      • PageNumber — (Integer)

                        The page number of the page that contains the sensitive data.

                      • LineRange — (map)

                        An occurrence of sensitive data detected in a non-binary text file or a Microsoft Word file. Non-binary text files include files such as HTML, XML, JSON, and TXT files.

                        • Start — (Integer)

                          The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                        • End — (Integer)

                          The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                        • StartColumn — (Integer)

                          In the line where the sensitive data starts, the column within the line where the sensitive data starts.

                      • OffsetRange — (map)

                        An occurrence of sensitive data detected in a binary text file.

                        • Start — (Integer)

                          The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                        • End — (Integer)

                          The number of lines (for a line range) or characters (for an offset range) from the beginning of the file to the end of the sensitive data.

                        • StartColumn — (Integer)

                          In the line where the sensitive data starts, the column within the line where the sensitive data starts.

                    • Records — (Array<map>)

                      Occurrences of sensitive data in an Apache Avro object container or an Apache Parquet file.

                      • JsonPath — (String)

                        The path, as a JSONPath expression, to the field in the record that contains the data. If the field name is longer than 20 characters, it is truncated. If the path is longer than 250 characters, it is truncated.

                      • RecordIndex — (Integer)

                        The record index, starting from 0, for the record that contains the data.

                    • Cells — (Array<map>)

                      Occurrences of sensitive data detected in Microsoft Excel workbooks, comma-separated value (CSV) files, or tab-separated value (TSV) files.

                      • Column — (Integer)

                        The column number of the column that contains the data. For a Microsoft Excel workbook, the column number corresponds to the alphabetical column identifiers. For example, a value of 1 for Column corresponds to the A column in the workbook.

                      • Row — (Integer)

                        The row number of the row that contains the data.

                      • ColumnName — (String)

                        The name of the column that contains the data.

                      • CellReference — (String)

                        For a Microsoft Excel workbook, provides the location of the cell, as an absolute cell reference, that contains the data. For example, Sheet2!C5 for cell C5 on Sheet2.

                • TotalCount — (Integer)

                  The total number of occurrences of sensitive data.

          • Details — (map)

            Additional details about the resource related to a finding.

            • AwsAutoScalingAutoScalingGroup — (map)

              Details for an autoscaling group.

              • LaunchConfigurationName — (String)

                The name of the launch configuration.

              • LoadBalancerNames — (Array<String>)

                The list of load balancers associated with the group.

              • HealthCheckType — (String)

                The service to use for the health checks. Valid values are EC2 or ELB.

              • HealthCheckGracePeriod — (Integer)

                The amount of time, in seconds, that Amazon EC2 Auto Scaling waits before it checks the health status of an EC2 instance that has come into service.

              • CreatedTime — (String)

                Indicates when the auto scaling group was created.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • MixedInstancesPolicy — (map)

                The mixed instances policy for the automatic scaling group.

                • InstancesDistribution — (map)

                  The instances distribution. The instances distribution specifies the distribution of On-Demand Instances and Spot Instances, the maximum price to pay for Spot Instances, and how the Auto Scaling group allocates instance types to fulfill On-Demand and Spot capacity.

                  • OnDemandAllocationStrategy — (String)

                    How to allocate instance types to fulfill On-Demand capacity. The valid value is prioritized.

                  • OnDemandBaseCapacity — (Integer)

                    The minimum amount of the Auto Scaling group's capacity that must be fulfilled by On-Demand Instances.

                  • OnDemandPercentageAboveBaseCapacity — (Integer)

                    The percentage of On-Demand Instances and Spot Instances for additional capacity beyond OnDemandBaseCapacity.

                  • SpotAllocationStrategy — (String)

                    How to allocate instances across Spot Instance pools. Valid values are as follows:

                    • lowest-price

                    • capacity-optimized

                    • capacity-optimized-prioritized

                  • SpotInstancePools — (Integer)

                    The number of Spot Instance pools across which to allocate your Spot Instances.

                  • SpotMaxPrice — (String)

                    The maximum price per unit hour that you are willing to pay for a Spot Instance.

                • LaunchTemplate — (map)

                  The launch template to use and the instance types (overrides) to use to provision EC2 instances to fulfill On-Demand and Spot capacities.

                  • LaunchTemplateSpecification — (map)

                    The launch template to use for a mixed instances policy.

                    • LaunchTemplateId — (String)

                      The identifier of the launch template. You must specify either LaunchTemplateId or LaunchTemplateName.

                    • LaunchTemplateName — (String)

                      The name of the launch template. You must specify either LaunchTemplateId or LaunchTemplateName.

                    • Version — (String)

                      Identifies the version of the launch template. You can specify a version identifier, or use the values $Latest or $Default.

                  • Overrides — (Array<map>)

                    Property values to use to override the values in the launch template.

                    • InstanceType — (String)

                      The instance type. For example, m3.xlarge.

                    • WeightedCapacity — (String)

                      The number of capacity units provided by the specified instance type in terms of virtual CPUs, memory, storage, throughput, or other relative performance characteristic.

              • AvailabilityZones — (Array<map>)

                The list of Availability Zones for the automatic scaling group.

                • Value — (String)

                  The name of the Availability Zone.

              • LaunchTemplate — (map)

                The launch template to use.

                • LaunchTemplateId — (String)

                  The identifier of the launch template. You must specify either LaunchTemplateId or LaunchTemplateName.

                • LaunchTemplateName — (String)

                  The name of the launch template. You must specify either LaunchTemplateId or LaunchTemplateName.

                • Version — (String)

                  Identifies the version of the launch template. You can specify a version identifier, or use the values $Latest or $Default.

              • CapacityRebalance — (Boolean)

                Indicates whether capacity rebalancing is enabled.

            • AwsCodeBuildProject — (map)

              Details for an CodeBuild project.

              • EncryptionKey — (String)

                The KMS key used to encrypt the build output artifacts.

                You can specify either the ARN of the KMS key or, if available, the KMS key alias (using the format alias/alias-name).

              • Artifacts — (Array<map>)

                Information about the build artifacts for the CodeBuild project.

                • ArtifactIdentifier — (String)

                  An identifier for the artifact definition.

                • EncryptionDisabled — (Boolean)

                  Indicates whether to disable encryption on the artifact. Only valid when Type is S3.

                • Location — (String)

                  Only used when Type is S3. The name of the S3 bucket where the artifact is located.

                • Name — (String)

                  Only used when Type is S3. The name of the artifact. Used with NamepaceType and Path to determine the pattern for storing the artifact.

                • NamespaceType — (String)

                  Only used when Type is S3. The value to use for the namespace. Used with Name and Path to determine the pattern for storing the artifact.

                • OverrideArtifactName — (Boolean)

                  Whether the name specified in the buildspec file overrides the artifact name.

                • Packaging — (String)

                  Only used when Type is S3. The type of output artifact to create.

                • Path — (String)

                  Only used when Type is S3. The path to the artifact. Used with Name and NamespaceType to determine the pattern for storing the artifact.

                • Type — (String)

                  The type of build artifact.

              • Environment — (map)

                Information about the build environment for this build project.

                • Certificate — (String)

                  The certificate to use with this build project.

                • EnvironmentVariables — (Array<map>)

                  A set of environment variables to make available to builds for the build project.

                  • Name — (String)

                    The name of the environment variable.

                  • Type — (String)

                    The type of environment variable.

                  • Value — (String)

                    The value of the environment variable.

                • PrivilegedMode — (Boolean)

                  Whether to allow the Docker daemon to run inside a Docker container. Set to true if the build project is used to build Docker images.

                • ImagePullCredentialsType — (String)

                  The type of credentials CodeBuild uses to pull images in your build.

                  Valid values:

                  • CODEBUILD specifies that CodeBuild uses its own credentials. This requires that you modify your ECR repository policy to trust the CodeBuild service principal.

                  • SERVICE_ROLE specifies that CodeBuild uses your build project's service role.

                  When you use a cross-account or private registry image, you must use SERVICE_ROLE credentials. When you use an CodeBuild curated image, you must use CODEBUILD credentials.

                • RegistryCredential — (map)

                  The credentials for access to a private registry.

                  • Credential — (String)

                    The ARN or name of credentials created using Secrets Manager.

                    Note: The credential can use the name of the credentials only if they exist in your current Amazon Web Services Region.
                  • CredentialProvider — (String)

                    The service that created the credentials to access a private Docker registry.

                    The valid value, SECRETS_MANAGER, is for Secrets Manager.

                • Type — (String)

                  The type of build environment to use for related builds.

                  The environment type ARM_CONTAINER is available only in Regions US East (N. Virginia), US East (Ohio), US West (Oregon), Europe (Ireland), Asia Pacific (Mumbai), Asia Pacific (Tokyo), Asia Pacific (Sydney), and Europe (Frankfurt).

                  The environment type LINUX_CONTAINER with compute type build.general1.2xlarge is available only in Regions US East (N. Virginia), US East (N. Virginia), US West (Oregon), Canada (Central), Europe (Ireland), Europe (London), Europe (Frankfurt), Asia Pacific (Tokyo), Asia Pacific (Seoul), Asia Pacific (Singapore), Asia Pacific (Sydney), China (Beijing), and China (Ningxia).

                  The environment type LINUX_GPU_CONTAINER is available only in Regions US East (N. Virginia), US East (N. Virginia), US West (Oregon), Canada (Central), Europe (Ireland), Europe (London), Europe (Frankfurt), Asia Pacific (Tokyo), Asia Pacific (Seoul), Asia Pacific (Singapore), Asia Pacific (Sydney), China (Beijing), and China (Ningxia).

                  Valid values: WINDOWS_CONTAINER | LINUX_CONTAINER | LINUX_GPU_CONTAINER | ARM_CONTAINER

              • Name — (String)

                The name of the build project.

              • Source — (map)

                Information about the build input source code for this build project.

                • Type — (String)

                  The type of repository that contains the source code to be built. Valid values are:

                  • BITBUCKET - The source code is in a Bitbucket repository.

                  • CODECOMMIT - The source code is in an CodeCommit repository.

                  • CODEPIPELINE - The source code settings are specified in the source action of a pipeline in CodePipeline.

                  • GITHUB - The source code is in a GitHub repository.

                  • GITHUB_ENTERPRISE - The source code is in a GitHub Enterprise repository.

                  • NO_SOURCE - The project does not have input source code.

                  • S3 - The source code is in an S3 input bucket.

                • Location — (String)

                  Information about the location of the source code to be built.

                  Valid values include:

                  • For source code settings that are specified in the source action of a pipeline in CodePipeline, location should not be specified. If it is specified, CodePipeline ignores it. This is because CodePipeline uses the settings in a pipeline's source action instead of this value.

                  • For source code in an CodeCommit repository, the HTTPS clone URL to the repository that contains the source code and the build spec file (for example, https://git-codecommit.region-ID.amazonaws.com/v1/repos/repo-name ).

                  • For source code in an S3 input bucket, one of the following.

                    • The path to the ZIP file that contains the source code (for example, bucket-name/path/to/object-name.zip).

                    • The path to the folder that contains the source code (for example, bucket-name/path/to/source-code/folder/).

                  • For source code in a GitHub repository, the HTTPS clone URL to the repository that contains the source and the build spec file.

                  • For source code in a Bitbucket repository, the HTTPS clone URL to the repository that contains the source and the build spec file.

                • GitCloneDepth — (Integer)

                  Information about the Git clone depth for the build project.

                • InsecureSsl — (Boolean)

                  Whether to ignore SSL warnings while connecting to the project source code.

              • ServiceRole — (String)

                The ARN of the IAM role that enables CodeBuild to interact with dependent Amazon Web Services services on behalf of the Amazon Web Services account.

              • LogsConfig — (map)

                Information about logs for the build project.

                • CloudWatchLogs — (map)

                  Information about CloudWatch Logs for the build project.

                  • GroupName — (String)

                    The group name of the logs in CloudWatch Logs.

                  • Status — (String)

                    The current status of the logs in CloudWatch Logs for a build project.

                  • StreamName — (String)

                    The prefix of the stream name of the CloudWatch Logs.

                • S3Logs — (map)

                  Information about logs built to an S3 bucket for a build project.

                  • EncryptionDisabled — (Boolean)

                    Whether to disable encryption of the S3 build log output.

                  • Location — (String)

                    The ARN of the S3 bucket and the path prefix for S3 logs.

                  • Status — (String)

                    The current status of the S3 build logs.

              • VpcConfig — (map)

                Information about the VPC configuration that CodeBuild accesses.

                • VpcId — (String)

                  The ID of the VPC.

                • Subnets — (Array<String>)

                  A list of one or more subnet IDs in your VPC.

                • SecurityGroupIds — (Array<String>)

                  A list of one or more security group IDs in your VPC.

              • SecondaryArtifacts — (Array<map>)

                Information about the secondary artifacts for the CodeBuild project.

                • ArtifactIdentifier — (String)

                  An identifier for the artifact definition.

                • EncryptionDisabled — (Boolean)

                  Indicates whether to disable encryption on the artifact. Only valid when Type is S3.

                • Location — (String)

                  Only used when Type is S3. The name of the S3 bucket where the artifact is located.

                • Name — (String)

                  Only used when Type is S3. The name of the artifact. Used with NamepaceType and Path to determine the pattern for storing the artifact.

                • NamespaceType — (String)

                  Only used when Type is S3. The value to use for the namespace. Used with Name and Path to determine the pattern for storing the artifact.

                • OverrideArtifactName — (Boolean)

                  Whether the name specified in the buildspec file overrides the artifact name.

                • Packaging — (String)

                  Only used when Type is S3. The type of output artifact to create.

                • Path — (String)

                  Only used when Type is S3. The path to the artifact. Used with Name and NamespaceType to determine the pattern for storing the artifact.

                • Type — (String)

                  The type of build artifact.

            • AwsCloudFrontDistribution — (map)

              Details about a CloudFront distribution.

              • CacheBehaviors — (map)

                Provides information about the cache configuration for the distribution.

                • Items — (Array<map>)

                  The cache behaviors for the distribution.

                  • ViewerProtocolPolicy — (String)

                    The protocol that viewers can use to access the files in an origin. You can specify the following options:

                    • allow-all - Viewers can use HTTP or HTTPS.

                    • redirect-to-https - CloudFront responds to HTTP requests with an HTTP status code of 301 (Moved Permanently) and the HTTPS URL. The viewer then uses the new URL to resubmit.

                    • https-only - CloudFront responds to HTTP request with an HTTP status code of 403 (Forbidden).

              • DefaultCacheBehavior — (map)

                The default cache behavior for the configuration.

                • ViewerProtocolPolicy — (String)

                  The protocol that viewers can use to access the files in an origin. You can specify the following options:

                  • allow-all - Viewers can use HTTP or HTTPS.

                  • redirect-to-https - CloudFront responds to HTTP requests with an HTTP status code of 301 (Moved Permanently) and the HTTPS URL. The viewer then uses the new URL to resubmit.

                  • https-only - CloudFront responds to HTTP request with an HTTP status code of 403 (Forbidden).

              • DefaultRootObject — (String)

                The object that CloudFront sends in response to requests from the origin (for example, index.html) when a viewer requests the root URL for the distribution (http://www.example.com) instead of an object in your distribution (http://www.example.com/product-description.html).

              • DomainName — (String)

                The domain name corresponding to the distribution.

              • ETag — (String)

                The entity tag is a hash of the object.

              • LastModifiedTime — (String)

                Indicates when that the distribution was last modified.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • Logging — (map)

                A complex type that controls whether access logs are written for the distribution.

                • Bucket — (String)

                  The S3 bucket to store the access logs in.

                • Enabled — (Boolean)

                  With this field, you can enable or disable the selected distribution.

                • IncludeCookies — (Boolean)

                  Specifies whether you want CloudFront to include cookies in access logs.

                • Prefix — (String)

                  An optional string that you want CloudFront to use as a prefix to the access log filenames for this distribution.

              • Origins — (map)

                A complex type that contains information about origins for this distribution.

                • Items — (Array<map>)

                  A complex type that contains origins or origin groups for this distribution.

                  • DomainName — (String)

                    Amazon S3 origins: The DNS name of the S3 bucket from which you want CloudFront to get objects for this origin.

                  • Id — (String)

                    A unique identifier for the origin or origin group.

                  • OriginPath — (String)

                    An optional element that causes CloudFront to request your content from a directory in your Amazon S3 bucket or your custom origin.

                  • S3OriginConfig — (map)

                    An origin that is an S3 bucket that is not configured with static website hosting.

                    • OriginAccessIdentity — (String)

                      The CloudFront origin access identity to associate with the origin.

                  • CustomOriginConfig — (map)

                    An origin that is not an Amazon S3 bucket, with one exception. If the Amazon S3 bucket is configured with static website hosting, use this attribute. If the Amazon S3 bucket is not configured with static website hosting, use the S3OriginConfig type instead.

                    • HttpPort — (Integer)

                      The HTTP port that CloudFront uses to connect to the origin.

                    • HttpsPort — (Integer)

                      The HTTPS port that CloudFront uses to connect to the origin.

                    • OriginKeepaliveTimeout — (Integer)

                      Specifies how long, in seconds, CloudFront persists its connection to the origin.

                    • OriginProtocolPolicy — (String)

                      Specifies the protocol (HTTP or HTTPS) that CloudFront uses to connect to the origin.

                    • OriginReadTimeout — (Integer)

                      Specifies how long, in seconds, CloudFront waits for a response from the origin.

                    • OriginSslProtocols — (map)

                      Specifies the minimum SSL/TLS protocol that CloudFront uses when connecting to your origin over HTTPS.

                      • Items — (Array<String>)

                        A list that contains allowed SSL/TLS protocols for this distribution.

                      • Quantity — (Integer)

                        The number of SSL/TLS protocols that you want to allow CloudFront to use when establishing an HTTPS connection with this origin.

              • OriginGroups — (map)

                Provides information about the origin groups in the distribution.

                • Items — (Array<map>)

                  The list of origin groups.

                  • FailoverCriteria — (map)

                    Provides the criteria for an origin group to fail over.

                    • StatusCodes — (map)

                      Information about the status codes that cause an origin group to fail over.

                      • Items — (Array<Integer>)

                        The list of status code values that can cause a failover to the next origin.

                      • Quantity — (Integer)

                        The number of status codes that can cause a failover.

              • ViewerCertificate — (map)

                Provides information about the TLS/SSL configuration that the distribution uses to communicate with viewers.

                • AcmCertificateArn — (String)

                  The ARN of the ACM certificate. Used if the certificate is stored in ACM. If you provide an ACM certificate ARN, you must also provide MinimumCertificateVersion and SslSupportMethod.

                • Certificate — (String)

                  The identifier of the certificate. Note that in CloudFront, this attribute is deprecated.

                • CertificateSource — (String)

                  The source of the certificate identified by Certificate. Note that in CloudFront, this attribute is deprecated.

                • CloudFrontDefaultCertificate — (Boolean)

                  Whether the distribution uses the CloudFront domain name. If set to false, then you provide either AcmCertificateArn or IamCertificateId.

                • IamCertificateId — (String)

                  The identifier of the IAM certificate. Used if the certificate is stored in IAM. If you provide IamCertificateId, then you also must provide MinimumProtocolVersion and SslSupportMethod.

                • MinimumProtocolVersion — (String)

                  The security policy that CloudFront uses for HTTPS connections with viewers. If SslSupportMethod is sni-only, then MinimumProtocolVersion must be TLSv1 or higher.

                • SslSupportMethod — (String)

                  The viewers that the distribution accepts HTTPS connections from.

              • Status — (String)

                Indicates the current status of the distribution.

              • WebAclId — (String)

                A unique identifier that specifies the WAF web ACL, if any, to associate with this distribution.

            • AwsEc2Instance — (map)

              Details about an EC2 instance related to a finding.

              • Type — (String)

                The instance type of the instance.

              • ImageId — (String)

                The Amazon Machine Image (AMI) ID of the instance.

              • IpV4Addresses — (Array<String>)

                The IPv4 addresses associated with the instance.

              • IpV6Addresses — (Array<String>)

                The IPv6 addresses associated with the instance.

              • KeyName — (String)

                The key name associated with the instance.

              • IamInstanceProfileArn — (String)

                The IAM profile ARN of the instance.

              • VpcId — (String)

                The identifier of the VPC that the instance was launched in.

              • SubnetId — (String)

                The identifier of the subnet that the instance was launched in.

              • LaunchedAt — (String)

                Indicates when the instance was launched.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • NetworkInterfaces — (Array<map>)

                The identifiers of the network interfaces for the EC2 instance. The details for each network interface are in a corresponding AwsEc2NetworkInterfacesDetails object.

                • NetworkInterfaceId — (String)

                  The identifier of the network interface. The details are in a corresponding AwsEc2NetworkInterfacesDetails object.

              • VirtualizationType — (String)

                The virtualization type of the Amazon Machine Image (AMI) required to launch the instance.

              • MetadataOptions — (map)

                Details about the metadata options for the Amazon EC2 instance.

                • HttpEndpoint — (String)

                  Enables or disables the HTTP metadata endpoint on the instance.

                • HttpProtocolIpv6 — (String)

                  Enables or disables the IPv6 endpoint for the instance metadata service.

                • HttpPutResponseHopLimit — (Integer)

                  The desired HTTP PUT response hop limit for instance metadata requests. The larger the number, the further instance metadata requests can travel.

                • HttpTokens — (String)

                  The state of token usage for your instance metadata requests.

                • InstanceMetadataTags — (String)

                  Specifies whether to allow access to instance tags from the instance metadata.

              • Monitoring — (map)

                Describes the type of monitoring that’s turned on for an instance.

                • State — (String)

                  Indicates whether detailed monitoring is turned on. Otherwise, basic monitoring is turned on.

            • AwsEc2NetworkInterface — (map)

              Details for an EC2 network interface.

              • Attachment — (map)

                The network interface attachment.

                • AttachTime — (String)

                  Indicates when the attachment initiated.

                  Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

                • AttachmentId — (String)

                  The identifier of the network interface attachment

                • DeleteOnTermination — (Boolean)

                  Indicates whether the network interface is deleted when the instance is terminated.

                • DeviceIndex — (Integer)

                  The device index of the network interface attachment on the instance.

                • InstanceId — (String)

                  The ID of the instance.

                • InstanceOwnerId — (String)

                  The Amazon Web Services account ID of the owner of the instance.

                • Status — (String)

                  The attachment state.

                  Valid values: attaching | attached | detaching | detached

              • NetworkInterfaceId — (String)

                The ID of the network interface.

              • SecurityGroups — (Array<map>)

                Security groups for the network interface.

                • GroupName — (String)

                  The name of the security group.

                • GroupId — (String)

                  The ID of the security group.

              • SourceDestCheck — (Boolean)

                Indicates whether traffic to or from the instance is validated.

              • IpV6Addresses — (Array<map>)

                The IPv6 addresses associated with the network interface.

                • IpV6Address — (String)

                  The IPV6 address.

              • PrivateIpAddresses — (Array<map>)

                The private IPv4 addresses associated with the network interface.

                • PrivateIpAddress — (String)

                  The IP address.

                • PrivateDnsName — (String)

                  The private DNS name for the IP address.

              • PublicDnsName — (String)

                The public DNS name of the network interface.

              • PublicIp — (String)

                The address of the Elastic IP address bound to the network interface.

            • AwsEc2SecurityGroup — (map)

              Details for an EC2 security group.

              • GroupName — (String)

                The name of the security group.

              • GroupId — (String)

                The ID of the security group.

              • OwnerId — (String)

                The Amazon Web Services account ID of the owner of the security group.

              • VpcId — (String)

                [VPC only] The ID of the VPC for the security group.

              • IpPermissions — (Array<map>)

                The inbound rules associated with the security group.

                • IpProtocol — (String)

                  The IP protocol name (tcp, udp, icmp, icmpv6) or number.

                  [VPC only] Use -1 to specify all protocols.

                  When authorizing security group rules, specifying -1 or a protocol number other than tcp, udp, icmp, or icmpv6 allows traffic on all ports, regardless of any port range you specify.

                  For tcp, udp, and icmp, you must specify a port range.

                  For icmpv6, the port range is optional. If you omit the port range, traffic for all types and codes is allowed.

                • FromPort — (Integer)

                  The start of the port range for the TCP and UDP protocols, or an ICMP/ICMPv6 type number.

                  A value of -1 indicates all ICMP/ICMPv6 types. If you specify all ICMP/ICMPv6 types, you must specify all codes.

                • ToPort — (Integer)

                  The end of the port range for the TCP and UDP protocols, or an ICMP/ICMPv6 code.

                  A value of -1 indicates all ICMP/ICMPv6 codes. If you specify all ICMP/ICMPv6 types, you must specify all codes.

                • UserIdGroupPairs — (Array<map>)

                  The security group and Amazon Web Services account ID pairs.

                  • GroupId — (String)

                    The ID of the security group.

                  • GroupName — (String)

                    The name of the security group.

                  • PeeringStatus — (String)

                    The status of a VPC peering connection, if applicable.

                  • UserId — (String)

                    The ID of an Amazon Web Services account.

                    For a referenced security group in another VPC, the account ID of the referenced security group is returned in the response. If the referenced security group is deleted, this value is not returned.

                    [EC2-Classic] Required when adding or removing rules that reference a security group in another VPC.

                  • VpcId — (String)

                    The ID of the VPC for the referenced security group, if applicable.

                  • VpcPeeringConnectionId — (String)

                    The ID of the VPC peering connection, if applicable.

                • IpRanges — (Array<map>)

                  The IPv4 ranges.

                  • CidrIp — (String)

                    The IPv4 CIDR range. You can specify either a CIDR range or a source security group, but not both. To specify a single IPv4 address, use the /32 prefix length.

                • Ipv6Ranges — (Array<map>)

                  The IPv6 ranges.

                  • CidrIpv6 — (String)

                    The IPv6 CIDR range. You can specify either a CIDR range or a source security group, but not both. To specify a single IPv6 address, use the /128 prefix length.

                • PrefixListIds — (Array<map>)

                  [VPC only] The prefix list IDs for an Amazon Web Services service. With outbound rules, this is the Amazon Web Services service to access through a VPC endpoint from instances associated with the security group.

                  • PrefixListId — (String)

                    The ID of the prefix.

              • IpPermissionsEgress — (Array<map>)

                [VPC only] The outbound rules associated with the security group.

                • IpProtocol — (String)

                  The IP protocol name (tcp, udp, icmp, icmpv6) or number.

                  [VPC only] Use -1 to specify all protocols.

                  When authorizing security group rules, specifying -1 or a protocol number other than tcp, udp, icmp, or icmpv6 allows traffic on all ports, regardless of any port range you specify.

                  For tcp, udp, and icmp, you must specify a port range.

                  For icmpv6, the port range is optional. If you omit the port range, traffic for all types and codes is allowed.

                • FromPort — (Integer)

                  The start of the port range for the TCP and UDP protocols, or an ICMP/ICMPv6 type number.

                  A value of -1 indicates all ICMP/ICMPv6 types. If you specify all ICMP/ICMPv6 types, you must specify all codes.

                • ToPort — (Integer)

                  The end of the port range for the TCP and UDP protocols, or an ICMP/ICMPv6 code.

                  A value of -1 indicates all ICMP/ICMPv6 codes. If you specify all ICMP/ICMPv6 types, you must specify all codes.

                • UserIdGroupPairs — (Array<map>)

                  The security group and Amazon Web Services account ID pairs.

                  • GroupId — (String)

                    The ID of the security group.

                  • GroupName — (String)

                    The name of the security group.

                  • PeeringStatus — (String)

                    The status of a VPC peering connection, if applicable.

                  • UserId — (String)

                    The ID of an Amazon Web Services account.

                    For a referenced security group in another VPC, the account ID of the referenced security group is returned in the response. If the referenced security group is deleted, this value is not returned.

                    [EC2-Classic] Required when adding or removing rules that reference a security group in another VPC.

                  • VpcId — (String)

                    The ID of the VPC for the referenced security group, if applicable.

                  • VpcPeeringConnectionId — (String)

                    The ID of the VPC peering connection, if applicable.

                • IpRanges — (Array<map>)

                  The IPv4 ranges.

                  • CidrIp — (String)

                    The IPv4 CIDR range. You can specify either a CIDR range or a source security group, but not both. To specify a single IPv4 address, use the /32 prefix length.

                • Ipv6Ranges — (Array<map>)

                  The IPv6 ranges.

                  • CidrIpv6 — (String)

                    The IPv6 CIDR range. You can specify either a CIDR range or a source security group, but not both. To specify a single IPv6 address, use the /128 prefix length.

                • PrefixListIds — (Array<map>)

                  [VPC only] The prefix list IDs for an Amazon Web Services service. With outbound rules, this is the Amazon Web Services service to access through a VPC endpoint from instances associated with the security group.

                  • PrefixListId — (String)

                    The ID of the prefix.

            • AwsEc2Volume — (map)

              Details for an Amazon EC2 volume.

              • CreateTime — (String)

                Indicates when the volume was created.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • DeviceName — (String)

                The device name for the volume that is attached to the instance.

              • Encrypted — (Boolean)

                Specifies whether the volume is encrypted.

              • Size — (Integer)

                The size of the volume, in GiBs.

              • SnapshotId — (String)

                The snapshot from which the volume was created.

              • Status — (String)

                The volume state. Valid values are as follows:

                • available

                • creating

                • deleted

                • deleting

                • error

                • in-use

              • KmsKeyId — (String)

                The ARN of the KMS key that was used to protect the volume encryption key for the volume.

              • Attachments — (Array<map>)

                The volume attachments.

                • AttachTime — (String)

                  The datetime when the attachment initiated.

                • DeleteOnTermination — (Boolean)

                  Whether the EBS volume is deleted when the EC2 instance is terminated.

                • InstanceId — (String)

                  The identifier of the EC2 instance.

                • Status — (String)

                  The attachment state of the volume. Valid values are as follows:

                  • attaching

                  • attached

                  • busy

                  • detaching

                  • detached

              • VolumeId — (String)

                The ID of the volume.

              • VolumeType — (String)

                The volume type.

              • VolumeScanStatus — (String)

                Indicates whether the volume was scanned or skipped.

            • AwsEc2Vpc — (map)

              Details for an Amazon EC2 VPC.

              • CidrBlockAssociationSet — (Array<map>)

                Information about the IPv4 CIDR blocks associated with the VPC.

                • AssociationId — (String)

                  The association ID for the IPv4 CIDR block.

                • CidrBlock — (String)

                  The IPv4 CIDR block.

                • CidrBlockState — (String)

                  Information about the state of the IPv4 CIDR block.

              • Ipv6CidrBlockAssociationSet — (Array<map>)

                Information about the IPv6 CIDR blocks associated with the VPC.

                • AssociationId — (String)

                  The association ID for the IPv6 CIDR block.

                • Ipv6CidrBlock — (String)

                  The IPv6 CIDR block.

                • CidrBlockState — (String)

                  Information about the state of the CIDR block. Valid values are as follows:

                  • associating

                  • associated

                  • disassociating

                  • disassociated

                  • failed

                  • failing

              • DhcpOptionsId — (String)

                The identifier of the set of Dynamic Host Configuration Protocol (DHCP) options that are associated with the VPC. If the default options are associated with the VPC, then this is default.

              • State — (String)

                The current state of the VPC. Valid values are available or pending.

            • AwsEc2Eip — (map)

              Details about an Elastic IP address.

              • InstanceId — (String)

                The identifier of the EC2 instance.

              • PublicIp — (String)

                A public IP address that is associated with the EC2 instance.

              • AllocationId — (String)

                The identifier that Amazon Web Services assigns to represent the allocation of the Elastic IP address for use with Amazon VPC.

              • AssociationId — (String)

                The identifier that represents the association of the Elastic IP address with an EC2 instance.

              • Domain — (String)

                The domain in which to allocate the address.

                If the address is for use with EC2 instances in a VPC, then Domain is vpc. Otherwise, Domain is standard.

              • PublicIpv4Pool — (String)

                The identifier of an IP address pool. This parameter allows Amazon EC2 to select an IP address from the address pool.

              • NetworkBorderGroup — (String)

                The name of the location from which the Elastic IP address is advertised.

              • NetworkInterfaceId — (String)

                The identifier of the network interface.

              • NetworkInterfaceOwnerId — (String)

                The Amazon Web Services account ID of the owner of the network interface.

              • PrivateIpAddress — (String)

                The private IP address that is associated with the Elastic IP address.

            • AwsEc2Subnet — (map)

              Details about a subnet in Amazon EC2.

              • AssignIpv6AddressOnCreation — (Boolean)

                Whether to assign an IPV6 address to a network interface that is created in this subnet.

              • AvailabilityZone — (String)

                The Availability Zone for the subnet.

              • AvailabilityZoneId — (String)

                The identifier of the Availability Zone for the subnet.

              • AvailableIpAddressCount — (Integer)

                The number of available IPV4 addresses in the subnet. Does not include addresses for stopped instances.

              • CidrBlock — (String)

                The IPV4 CIDR block that is assigned to the subnet.

              • DefaultForAz — (Boolean)

                Whether this subnet is the default subnet for the Availability Zone.

              • MapPublicIpOnLaunch — (Boolean)

                Whether instances in this subnet receive a public IP address.

              • OwnerId — (String)

                The identifier of the Amazon Web Services account that owns the subnet.

              • State — (String)

                The current state of the subnet. Valid values are available or pending.

              • SubnetArn — (String)

                The ARN of the subnet.

              • SubnetId — (String)

                The identifier of the subnet.

              • VpcId — (String)

                The identifier of the VPC that contains the subnet.

              • Ipv6CidrBlockAssociationSet — (Array<map>)

                The IPV6 CIDR blocks that are associated with the subnet.

                • AssociationId — (String)

                  The association ID for the IPv6 CIDR block.

                • Ipv6CidrBlock — (String)

                  The IPv6 CIDR block.

                • CidrBlockState — (String)

                  Information about the state of the CIDR block. Valid values are as follows:

                  • associating

                  • associated

                  • disassociating

                  • disassociated

                  • failed

                  • failing

            • AwsEc2NetworkAcl — (map)

              Details about an EC2 network access control list (ACL).

              • IsDefault — (Boolean)

                Whether this is the default network ACL for the VPC.

              • NetworkAclId — (String)

                The identifier of the network ACL.

              • OwnerId — (String)

                The identifier of the Amazon Web Services account that owns the network ACL.

              • VpcId — (String)

                The identifier of the VPC for the network ACL.

              • Associations — (Array<map>)

                Associations between the network ACL and subnets.

                • NetworkAclAssociationId — (String)

                  The identifier of the association between the network ACL and the subnet.

                • NetworkAclId — (String)

                  The identifier of the network ACL.

                • SubnetId — (String)

                  The identifier of the subnet that is associated with the network ACL.

              • Entries — (Array<map>)

                The set of rules in the network ACL.

                • CidrBlock — (String)

                  The IPV4 network range for which to deny or allow access.

                • Egress — (Boolean)

                  Whether the rule is an egress rule. An egress rule is a rule that applies to traffic that leaves the subnet.

                • IcmpTypeCode — (map)

                  The Internet Control Message Protocol (ICMP) type and code for which to deny or allow access.

                  • Code — (Integer)

                    The ICMP code for which to deny or allow access. To deny or allow all codes, use the value -1.

                  • Type — (Integer)

                    The ICMP type for which to deny or allow access. To deny or allow all types, use the value -1.

                • Ipv6CidrBlock — (String)

                  The IPV6 network range for which to deny or allow access.

                • PortRange — (map)

                  For TCP or UDP protocols, the range of ports that the rule applies to.

                  • From — (Integer)

                    The first port in the port range.

                  • To — (Integer)

                    The last port in the port range.

                • Protocol — (String)

                  The protocol that the rule applies to. To deny or allow access to all protocols, use the value -1.

                • RuleAction — (String)

                  Whether the rule is used to allow access or deny access.

                • RuleNumber — (Integer)

                  The rule number. The rules are processed in order by their number.

            • AwsElbv2LoadBalancer — (map)

              Details about a load balancer.

              • AvailabilityZones — (Array<map>)

                The Availability Zones for the load balancer.

                • ZoneName — (String)

                  The name of the Availability Zone.

                • SubnetId — (String)

                  The ID of the subnet. You can specify one subnet per Availability Zone.

              • CanonicalHostedZoneId — (String)

                The ID of the Amazon Route 53 hosted zone associated with the load balancer.

              • CreatedTime — (String)

                Indicates when the load balancer was created.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • DNSName — (String)

                The public DNS name of the load balancer.

              • IpAddressType — (String)

                The type of IP addresses used by the subnets for your load balancer. The possible values are ipv4 (for IPv4 addresses) and dualstack (for IPv4 and IPv6 addresses).

              • Scheme — (String)

                The nodes of an Internet-facing load balancer have public IP addresses.

              • SecurityGroups — (Array<String>)

                The IDs of the security groups for the load balancer.

              • State — (map)

                The state of the load balancer.

                • Code — (String)

                  The state code. The initial state of the load balancer is provisioning.

                  After the load balancer is fully set up and ready to route traffic, its state is active.

                  If the load balancer could not be set up, its state is failed.

                • Reason — (String)

                  A description of the state.

              • Type — (String)

                The type of load balancer.

              • VpcId — (String)

                The ID of the VPC for the load balancer.

              • LoadBalancerAttributes — (Array<map>)

                Attributes of the load balancer.

                • Key — (String)

                  The name of the load balancer attribute.

                • Value — (String)

                  The value of the load balancer attribute.

            • AwsElasticBeanstalkEnvironment — (map)

              Details about an Elastic Beanstalk environment.

              • ApplicationName — (String)

                The name of the application that is associated with the environment.

              • Cname — (String)

                The URL to the CNAME for this environment.

              • DateCreated — (String)

                The creation date for this environment.

              • DateUpdated — (String)

                The date when this environment was last modified.

              • Description — (String)

                A description of the environment.

              • EndpointUrl — (String)

                For load-balanced, autoscaling environments, the URL to the load balancer. For single-instance environments, the IP address of the instance.

              • EnvironmentArn — (String)

                The ARN of the environment.

              • EnvironmentId — (String)

                The identifier of the environment.

              • EnvironmentLinks — (Array<map>)

                Links to other environments in the same group.

                • EnvironmentName — (String)

                  The name of the linked environment.

                • LinkName — (String)

                  The name of the environment link.

              • EnvironmentName — (String)

                The name of the environment.

              • OptionSettings — (Array<map>)

                The configuration setting for the environment.

                • Namespace — (String)

                  The type of resource that the configuration option is associated with.

                • OptionName — (String)

                  The name of the option.

                • ResourceName — (String)

                  The name of the resource.

                • Value — (String)

                  The value of the configuration setting.

              • PlatformArn — (String)

                The ARN of the platform version for the environment.

              • SolutionStackName — (String)

                The name of the solution stack that is deployed with the environment.

              • Status — (String)

                The current operational status of the environment. Valid values are as follows:

                • Aborting

                • Launching

                • LinkingFrom

                • LinkingTo

                • Ready

                • Terminated

                • Terminating

                • Updating

              • Tier — (map)

                The tier of the environment.

                • Name — (String)

                  The name of the environment tier. Valid values are WebServer or Worker.

                • Type — (String)

                  The type of environment tier. Valid values are Standard or SQS/HTTP.

                • Version — (String)

                  The version of the environment tier.

              • VersionLabel — (String)

                The application version of the environment.

            • AwsElasticsearchDomain — (map)

              Details for an Elasticsearch domain.

              • AccessPolicies — (String)

                IAM policy document specifying the access policies for the new Elasticsearch domain.

              • DomainEndpointOptions — (map)

                Additional options for the domain endpoint.

                • EnforceHTTPS — (Boolean)

                  Whether to require that all traffic to the domain arrive over HTTPS.

                • TLSSecurityPolicy — (String)

                  The TLS security policy to apply to the HTTPS endpoint of the OpenSearch domain.

                  Valid values:

                  • Policy-Min-TLS-1-0-2019-07, which supports TLSv1.0 and higher

                  • Policy-Min-TLS-1-2-2019-07, which only supports TLSv1.2

              • DomainId — (String)

                Unique identifier for an Elasticsearch domain.

              • DomainName — (String)

                Name of an Elasticsearch domain.

                Domain names are unique across all domains owned by the same account within an Amazon Web Services Region.

                Domain names must start with a lowercase letter and must be between 3 and 28 characters.

                Valid characters are a-z (lowercase only), 0-9, and – (hyphen).

              • Endpoint — (String)

                Domain-specific endpoint used to submit index, search, and data upload requests to an Elasticsearch domain.

                The endpoint is a service URL.

              • Endpoints — (map<String>)

                The key-value pair that exists if the Elasticsearch domain uses VPC endpoints.

              • ElasticsearchVersion — (String)

                OpenSearch version.

              • ElasticsearchClusterConfig — (map)

                Information about an OpenSearch cluster configuration.

                • DedicatedMasterCount — (Integer)

                  The number of instances to use for the master node. If this attribute is specified, then DedicatedMasterEnabled must be true.

                • DedicatedMasterEnabled — (Boolean)

                  Whether to use a dedicated master node for the Elasticsearch domain. A dedicated master node performs cluster management tasks, but doesn't hold data or respond to data upload requests.

                • DedicatedMasterType — (String)

                  The hardware configuration of the computer that hosts the dedicated master node. A sample value is m3.medium.elasticsearch. If this attribute is specified, then DedicatedMasterEnabled must be true.

                  For a list of valid values, see Supported instance types in Amazon OpenSearch Service in the Amazon OpenSearch Service Developer Guide.

                • InstanceCount — (Integer)

                  The number of data nodes to use in the Elasticsearch domain.

                • InstanceType — (String)

                  The instance type for your data nodes. For example, m3.medium.elasticsearch.

                  For a list of valid values, see Supported instance types in Amazon OpenSearch Service in the Amazon OpenSearch Service Developer Guide.

                • ZoneAwarenessConfig — (map)

                  Configuration options for zone awareness. Provided if ZoneAwarenessEnabled is true.

                  • AvailabilityZoneCount — (Integer)

                    he number of Availability Zones that the domain uses. Valid values are 2 and 3. The default is 2.

                • ZoneAwarenessEnabled — (Boolean)

                  Whether to enable zone awareness for the Elasticsearch domain. When zone awareness is enabled, OpenSearch allocates the cluster's nodes and replica index shards across Availability Zones in the same Region. This prevents data loss and minimizes downtime if a node or data center fails.

              • EncryptionAtRestOptions — (map)

                Details about the configuration for encryption at rest.

                • Enabled — (Boolean)

                  Whether encryption at rest is enabled.

                • KmsKeyId — (String)

                  The KMS key ID. Takes the form 1a2a3a4-1a2a-3a4a-5a6a-1a2a3a4a5a6a.

              • LogPublishingOptions — (map)

                Configures the CloudWatch Logs to publish for the Elasticsearch domain.

                • IndexSlowLogs — (map)

                  Configures the OpenSearch index logs publishing.

                  • CloudWatchLogsLogGroupArn — (String)

                    The ARN of the CloudWatch Logs group to publish the logs to.

                  • Enabled — (Boolean)

                    Whether the log publishing is enabled.

                • SearchSlowLogs — (map)

                  Configures the OpenSearch search slow log publishing.

                  • CloudWatchLogsLogGroupArn — (String)

                    The ARN of the CloudWatch Logs group to publish the logs to.

                  • Enabled — (Boolean)

                    Whether the log publishing is enabled.

                • AuditLogs — (map)

                  The log configuration.

                  • CloudWatchLogsLogGroupArn — (String)

                    The ARN of the CloudWatch Logs group to publish the logs to.

                  • Enabled — (Boolean)

                    Whether the log publishing is enabled.

              • NodeToNodeEncryptionOptions — (map)

                Details about the configuration for node-to-node encryption.

                • Enabled — (Boolean)

                  Whether node-to-node encryption is enabled.

              • ServiceSoftwareOptions — (map)

                Information about the status of a domain relative to the latest service software.

                • AutomatedUpdateDate — (String)

                  The epoch time when the deployment window closes for required updates. After this time, Amazon OpenSearch Service schedules the software upgrade automatically.

                • Cancellable — (Boolean)

                  Whether a request to update the domain can be canceled.

                • CurrentVersion — (String)

                  The version of the service software that is currently installed on the domain.

                • Description — (String)

                  A more detailed description of the service software status.

                • NewVersion — (String)

                  The most recent version of the service software.

                • UpdateAvailable — (Boolean)

                  Whether a service software update is available for the domain.

                • UpdateStatus — (String)

                  The status of the service software update. Valid values are as follows:

                  • COMPLETED

                  • ELIGIBLE

                  • IN_PROGRESS

                  • NOT_ELIGIBLE

                  • PENDING_UPDATE

              • VPCOptions — (map)

                Information that OpenSearch derives based on VPCOptions for the domain.

                • AvailabilityZones — (Array<String>)

                  The list of Availability Zones associated with the VPC subnets.

                • SecurityGroupIds — (Array<String>)

                  The list of security group IDs associated with the VPC endpoints for the domain.

                • SubnetIds — (Array<String>)

                  A list of subnet IDs associated with the VPC endpoints for the domain.

                • VPCId — (String)

                  ID for the VPC.

            • AwsS3Bucket — (map)

              Details about an S3 bucket related to a finding.

              • OwnerId — (String)

                The canonical user ID of the owner of the S3 bucket.

              • OwnerName — (String)

                The display name of the owner of the S3 bucket.

              • OwnerAccountId — (String)

                The Amazon Web Services account identifier of the account that owns the S3 bucket.

              • CreatedAt — (String)

                Indicates when the S3 bucket was created.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • ServerSideEncryptionConfiguration — (map)

                The encryption rules that are applied to the S3 bucket.

                • Rules — (Array<map>)

                  The encryption rules that are applied to the S3 bucket.

                  • ApplyServerSideEncryptionByDefault — (map)

                    Specifies the default server-side encryption to apply to new objects in the bucket. If a PUT object request doesn't specify any server-side encryption, this default encryption is applied.

                    • SSEAlgorithm — (String)

                      Server-side encryption algorithm to use for the default encryption. Valid values are aws: kms or AES256.

                    • KMSMasterKeyID — (String)

                      KMS key ID to use for the default encryption.

              • BucketLifecycleConfiguration — (map)

                The lifecycle configuration for objects in the specified bucket.

                • Rules — (Array<map>)

                  The lifecycle rules.

                  • AbortIncompleteMultipartUpload — (map)

                    How Amazon S3 responds when a multipart upload is incomplete. Specifically, provides a number of days before Amazon S3 cancels the entire upload.

                    • DaysAfterInitiation — (Integer)

                      The number of days after which Amazon S3 cancels an incomplete multipart upload.

                  • ExpirationDate — (String)

                    The date when objects are moved or deleted.

                    Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

                  • ExpirationInDays — (Integer)

                    The length in days of the lifetime for objects that are subject to the rule.

                  • ExpiredObjectDeleteMarker — (Boolean)

                    Whether Amazon S3 removes a delete marker that has no noncurrent versions. If set to true, the delete marker is expired. If set to false, the policy takes no action.

                    If you provide ExpiredObjectDeleteMarker, you cannot provide ExpirationInDays or ExpirationDate.

                  • Filter — (map)

                    Identifies the objects that a rule applies to.

                    • Predicate — (map)

                      The configuration for the filter.

                      • Operands — (Array<map>)

                        The values to use for the filter.

                        • Prefix — (String)

                          Prefix text for matching objects.

                        • Tag — (map)

                          A tag that is assigned to matching objects.

                          • Key — (String)

                            The tag key.

                          • Value — (String)

                            The tag value.

                        • Type — (String)

                          The type of filter value. Valid values are LifecyclePrefixPredicate or LifecycleTagPredicate.

                      • Prefix — (String)

                        A prefix filter.

                      • Tag — (map)

                        A tag filter.

                        • Key — (String)

                          The tag key.

                        • Value — (String)

                          The tag value

                      • Type — (String)

                        Whether to use AND or OR to join the operands. Valid values are LifecycleAndOperator or LifecycleOrOperator.

                  • ID — (String)

                    The unique identifier of the rule.

                  • NoncurrentVersionExpirationInDays — (Integer)

                    The number of days that an object is noncurrent before Amazon S3 can perform the associated action.

                  • NoncurrentVersionTransitions — (Array<map>)

                    Transition rules that describe when noncurrent objects transition to a specified storage class.

                    • Days — (Integer)

                      The number of days that an object is noncurrent before Amazon S3 can perform the associated action.

                    • StorageClass — (String)

                      The class of storage to change the object to after the object is noncurrent for the specified number of days.

                  • Prefix — (String)

                    A prefix that identifies one or more objects that the rule applies to.

                  • Status — (String)

                    The current status of the rule. Indicates whether the rule is currently being applied.

                  • Transitions — (Array<map>)

                    Transition rules that indicate when objects transition to a specified storage class.

                    • Date — (String)

                      A date on which to transition objects to the specified storage class. If you provide Date, you cannot provide Days.

                      Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

                    • Days — (Integer)

                      The number of days after which to transition the object to the specified storage class. If you provide Days, you cannot provide Date.

                    • StorageClass — (String)

                      The storage class to transition the object to. Valid values are as follows:

                      • DEEP_ARCHIVE

                      • GLACIER

                      • INTELLIGENT_TIERING

                      • ONEZONE_IA

                      • STANDARD_IA

              • PublicAccessBlockConfiguration — (map)

                Provides information about the Amazon S3 Public Access Block configuration for the S3 bucket.

                • BlockPublicAcls — (Boolean)

                  Indicates whether to reject calls to update an S3 bucket if the calls include a public access control list (ACL).

                • BlockPublicPolicy — (Boolean)

                  Indicates whether to reject calls to update the access policy for an S3 bucket or access point if the policy allows public access.

                • IgnorePublicAcls — (Boolean)

                  Indicates whether Amazon S3 ignores public ACLs that are associated with an S3 bucket.

                • RestrictPublicBuckets — (Boolean)

                  Indicates whether to restrict access to an access point or S3 bucket that has a public policy to only Amazon Web Services service principals and authorized users within the S3 bucket owner's account.

              • AccessControlList — (String)

                The access control list for the S3 bucket.

              • BucketLoggingConfiguration — (map)

                The logging configuration for the S3 bucket.

                • DestinationBucketName — (String)

                  The name of the S3 bucket where log files for the S3 bucket are stored.

                • LogFilePrefix — (String)

                  The prefix added to log files for the S3 bucket.

              • BucketWebsiteConfiguration — (map)

                The website configuration parameters for the S3 bucket.

                • ErrorDocument — (String)

                  The name of the error document for the website.

                • IndexDocumentSuffix — (String)

                  The name of the index document for the website.

                • RedirectAllRequestsTo — (map)

                  The redirect behavior for requests to the website.

                  • Hostname — (String)

                    The name of the host to redirect requests to.

                  • Protocol — (String)

                    The protocol to use when redirecting requests. By default, this field uses the same protocol as the original request. Valid values are http or https.

                • RoutingRules — (Array<map>)

                  The rules for applying redirects for requests to the website.

                  • Condition — (map)

                    Provides the condition that must be met in order to apply the routing rule.

                    • HttpErrorCodeReturnedEquals — (String)

                      Indicates to redirect the request if the HTTP error code matches this value.

                    • KeyPrefixEquals — (String)

                      Indicates to redirect the request if the key prefix matches this value.

                  • Redirect — (map)

                    Provides the rules to redirect the request if the condition in Condition is met.

                    • Hostname — (String)

                      The host name to use in the redirect request.

                    • HttpRedirectCode — (String)

                      The HTTP redirect code to use in the response.

                    • Protocol — (String)

                      The protocol to use to redirect the request. By default, uses the protocol from the original request.

                    • ReplaceKeyPrefixWith — (String)

                      The object key prefix to use in the redirect request.

                      Cannot be provided if ReplaceKeyWith is present.

                    • ReplaceKeyWith — (String)

                      The specific object key to use in the redirect request.

                      Cannot be provided if ReplaceKeyPrefixWith is present.

              • BucketNotificationConfiguration — (map)

                The notification configuration for the S3 bucket.

                • Configurations — (Array<map>)

                  Configurations for S3 bucket notifications.

                  • Events — (Array<String>)

                    The list of events that trigger a notification.

                  • Filter — (map)

                    The filters that determine which S3 buckets generate notifications.

                    • S3KeyFilter — (map)

                      Details for an Amazon S3 filter.

                      • FilterRules — (Array<map>)

                        The filter rules for the filter.

                        • Name — (String)

                          Indicates whether the filter is based on the prefix or suffix of the Amazon S3 key.

                          Possible values include:
                          • "Prefix"
                          • "Suffix"
                        • Value — (String)

                          The filter value.

                  • Destination — (String)

                    The ARN of the Lambda function, Amazon SQS queue, or Amazon SNS topic that generates the notification.

                  • Type — (String)

                    Indicates the type of notification. Notifications can be generated using Lambda functions, Amazon SQS queues, or Amazon SNS topics, with corresponding valid values as follows:

                    • LambdaConfiguration

                    • QueueConfiguration

                    • TopicConfiguration

              • BucketVersioningConfiguration — (map)

                The versioning state of an S3 bucket.

                • IsMfaDeleteEnabled — (Boolean)

                  Specifies whether MFA delete is currently enabled in the S3 bucket versioning configuration. If the S3 bucket was never configured with MFA delete, then this attribute is not included.

                • Status — (String)

                  The versioning status of the S3 bucket. Valid values are Enabled or Suspended.

              • ObjectLockConfiguration — (map)

                Specifies which rule Amazon S3 applies by default to every new object placed in the bucket.

                • ObjectLockEnabled — (String)

                  Indicates whether the bucket has an Object Lock configuration enabled.

                • Rule — (map)

                  Specifies the Object Lock rule for the specified object.

                  • DefaultRetention — (map)

                    The default Object Lock retention mode and period that you want to apply to new objects placed in the specified bucket.

                    • Days — (Integer)

                      The number of days that you want to specify for the default retention period.

                    • Mode — (String)

                      The default Object Lock retention mode you want to apply to new objects placed in the specified bucket.

                    • Years — (Integer)

                      The number of years that you want to specify for the default retention period.

              • Name — (String)

                The name of the bucket.

            • AwsS3AccountPublicAccessBlock — (map)

              Details about the Amazon S3 Public Access Block configuration for an account.

              • BlockPublicAcls — (Boolean)

                Indicates whether to reject calls to update an S3 bucket if the calls include a public access control list (ACL).

              • BlockPublicPolicy — (Boolean)

                Indicates whether to reject calls to update the access policy for an S3 bucket or access point if the policy allows public access.

              • IgnorePublicAcls — (Boolean)

                Indicates whether Amazon S3 ignores public ACLs that are associated with an S3 bucket.

              • RestrictPublicBuckets — (Boolean)

                Indicates whether to restrict access to an access point or S3 bucket that has a public policy to only Amazon Web Services service principals and authorized users within the S3 bucket owner's account.

            • AwsS3Object — (map)

              Details about an S3 object related to a finding.

              • LastModified — (String)

                Indicates when the object was last modified.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • ETag — (String)

                The opaque identifier assigned by a web server to a specific version of a resource found at a URL.

              • VersionId — (String)

                The version of the object.

              • ContentType — (String)

                A standard MIME type describing the format of the object data.

              • ServerSideEncryption — (String)

                If the object is stored using server-side encryption, the value of the server-side encryption algorithm used when storing this object in Amazon S3.

              • SSEKMSKeyId — (String)

                The identifier of the KMS symmetric customer managed key that was used for the object.

            • AwsSecretsManagerSecret — (map)

              Details about a Secrets Manager secret.

              • RotationRules — (map)

                Defines the rotation schedule for the secret.

                • AutomaticallyAfterDays — (Integer)

                  The number of days after the previous rotation to rotate the secret.

              • RotationOccurredWithinFrequency — (Boolean)

                Whether the rotation occurred within the specified rotation frequency.

              • KmsKeyId — (String)

                The ARN, Key ID, or alias of the KMS key used to encrypt the SecretString or SecretBinary values for versions of this secret.

              • RotationEnabled — (Boolean)

                Whether rotation is enabled.

              • RotationLambdaArn — (String)

                The ARN of the Lambda function that rotates the secret.

              • Deleted — (Boolean)

                Whether the secret is deleted.

              • Name — (String)

                The name of the secret.

              • Description — (String)

                The user-provided description of the secret.

            • AwsIamAccessKey — (map)

              Details about an IAM access key related to a finding.

              • UserName — (String)

                The user associated with the IAM access key related to a finding.

                The UserName parameter has been replaced with the PrincipalName parameter because access keys can also be assigned to principals that are not IAM users.

              • Status — (String)

                The status of the IAM access key related to a finding.

                Possible values include:
                • "Active"
                • "Inactive"
              • CreatedAt — (String)

                Indicates when the IAM access key was created.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • PrincipalId — (String)

                The ID of the principal associated with an access key.

              • PrincipalType — (String)

                The type of principal associated with an access key.

              • PrincipalName — (String)

                The name of the principal.

              • AccountId — (String)

                The Amazon Web Services account ID of the account for the key.

              • AccessKeyId — (String)

                The identifier of the access key.

              • SessionContext — (map)

                Information about the session that the key was used for.

                • Attributes — (map)

                  Attributes of the session that the key was used for.

                  • MfaAuthenticated — (Boolean)

                    Indicates whether the session used multi-factor authentication (MFA).

                  • CreationDate — (String)

                    Indicates when the session was created.

                    Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

                • SessionIssuer — (map)

                  Information about the entity that created the session.

                  • Type — (String)

                    The type of principal (user, role, or group) that created the session.

                  • PrincipalId — (String)

                    The principal ID of the principal (user, role, or group) that created the session.

                  • Arn — (String)

                    The ARN of the session.

                  • AccountId — (String)

                    The identifier of the Amazon Web Services account that created the session.

                  • UserName — (String)

                    The name of the principal that created the session.

            • AwsIamUser — (map)

              Details about an IAM user.

              • AttachedManagedPolicies — (Array<map>)

                A list of the managed policies that are attached to the user.

                • PolicyName — (String)

                  The name of the policy.

                • PolicyArn — (String)

                  The ARN of the policy.

              • CreateDate — (String)

                Indicates when the user was created.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • GroupList — (Array<String>)

                A list of IAM groups that the user belongs to.

              • Path — (String)

                The path to the user.

              • PermissionsBoundary — (map)

                The permissions boundary for the user.

                • PermissionsBoundaryArn — (String)

                  The ARN of the policy used to set the permissions boundary.

                • PermissionsBoundaryType — (String)

                  The usage type for the permissions boundary.

              • UserId — (String)

                The unique identifier for the user.

              • UserName — (String)

                The name of the user.

              • UserPolicyList — (Array<map>)

                The list of inline policies that are embedded in the user.

                • PolicyName — (String)

                  The name of the policy.

            • AwsIamPolicy — (map)

              Details about an IAM permissions policy.

              • AttachmentCount — (Integer)

                The number of users, groups, and roles that the policy is attached to.

              • CreateDate — (String)

                When the policy was created.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • DefaultVersionId — (String)

                The identifier of the default version of the policy.

              • Description — (String)

                A description of the policy.

              • IsAttachable — (Boolean)

                Whether the policy can be attached to a user, group, or role.

              • Path — (String)

                The path to the policy.

              • PermissionsBoundaryUsageCount — (Integer)

                The number of users and roles that use the policy to set the permissions boundary.

              • PolicyId — (String)

                The unique identifier of the policy.

              • PolicyName — (String)

                The name of the policy.

              • PolicyVersionList — (Array<map>)

                List of versions of the policy.

                • VersionId — (String)

                  The identifier of the policy version.

                • IsDefaultVersion — (Boolean)

                  Whether the version is the default version.

                • CreateDate — (String)

                  Indicates when the version was created.

                  Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • UpdateDate — (String)

                When the policy was most recently updated.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • AwsApiGatewayV2Stage — (map)

              Provides information about a version 2 stage for Amazon API Gateway.

              • ClientCertificateId — (String)

                The identifier of a client certificate for a stage. Supported only for WebSocket API calls.

              • CreatedDate — (String)

                Indicates when the stage was created.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • Description — (String)

                The description of the stage.

              • DefaultRouteSettings — (map)

                Default route settings for the stage.

                • DetailedMetricsEnabled — (Boolean)

                  Indicates whether detailed metrics are enabled.

                • LoggingLevel — (String)

                  The logging level. The logging level affects the log entries that are pushed to CloudWatch Logs. Supported only for WebSocket APIs.

                  If the logging level is ERROR, then the logs only include error-level entries.

                  If the logging level is INFO, then the logs include both ERROR events and extra informational events.

                  Valid values: OFF | ERROR | INFO

                • DataTraceEnabled — (Boolean)

                  Indicates whether data trace logging is enabled. Data trace logging affects the log entries that are pushed to CloudWatch Logs. Supported only for WebSocket APIs.

                • ThrottlingBurstLimit — (Integer)

                  The throttling burst limit.

                • ThrottlingRateLimit — (Float)

                  The throttling rate limit.

              • DeploymentId — (String)

                The identifier of the deployment that the stage is associated with.

              • LastUpdatedDate — (String)

                Indicates when the stage was most recently updated.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • RouteSettings — (map)

                The route settings for the stage.

                • DetailedMetricsEnabled — (Boolean)

                  Indicates whether detailed metrics are enabled.

                • LoggingLevel — (String)

                  The logging level. The logging level affects the log entries that are pushed to CloudWatch Logs. Supported only for WebSocket APIs.

                  If the logging level is ERROR, then the logs only include error-level entries.

                  If the logging level is INFO, then the logs include both ERROR events and extra informational events.

                  Valid values: OFF | ERROR | INFO

                • DataTraceEnabled — (Boolean)

                  Indicates whether data trace logging is enabled. Data trace logging affects the log entries that are pushed to CloudWatch Logs. Supported only for WebSocket APIs.

                • ThrottlingBurstLimit — (Integer)

                  The throttling burst limit.

                • ThrottlingRateLimit — (Float)

                  The throttling rate limit.

              • StageName — (String)

                The name of the stage.

              • StageVariables — (map<String>)

                A map that defines the stage variables for the stage.

                Variable names can have alphanumeric and underscore characters.

                Variable values can contain the following characters:

                • Uppercase and lowercase letters

                • Numbers

                • Special characters -._~:/?#&=,

              • AccessLogSettings — (map)

                Information about settings for logging access for the stage.

                • Format — (String)

                  A single-line format of the access logs of data, as specified by selected $context variables. The format must include at least $context.requestId.

                • DestinationArn — (String)

                  The ARN of the CloudWatch Logs log group that receives the access logs.

              • AutoDeploy — (Boolean)

                Indicates whether updates to an API automatically trigger a new deployment.

              • LastDeploymentStatusMessage — (String)

                The status of the last deployment of a stage. Supported only if the stage has automatic deployment enabled.

              • ApiGatewayManaged — (Boolean)

                Indicates whether the stage is managed by API Gateway.

            • AwsApiGatewayV2Api — (map)

              Provides information about a version 2 API in Amazon API Gateway.

              • ApiEndpoint — (String)

                The URI of the API.

                Uses the format <api-id>.execute-api.<region>.amazonaws.com

                The stage name is typically appended to the URI to form a complete path to a deployed API stage.

              • ApiId — (String)

                The identifier of the API.

              • ApiKeySelectionExpression — (String)

                An API key selection expression. Supported only for WebSocket APIs.

              • CreatedDate — (String)

                Indicates when the API was created.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • Description — (String)

                A description of the API.

              • Version — (String)

                The version identifier for the API.

              • Name — (String)

                The name of the API.

              • ProtocolType — (String)

                The API protocol for the API.

                Valid values: WEBSOCKET | HTTP

              • RouteSelectionExpression — (String)

                The route selection expression for the API.

                For HTTP APIs, must be ${request.method} ${request.path}. This is the default value for HTTP APIs.

                For WebSocket APIs, there is no default value.

              • CorsConfiguration — (map)

                A cross-origin resource sharing (CORS) configuration. Supported only for HTTP APIs.

                • AllowOrigins — (Array<String>)

                  The allowed origins for CORS requests.

                • AllowCredentials — (Boolean)

                  Indicates whether the CORS request includes credentials.

                • ExposeHeaders — (Array<String>)

                  The exposed headers for CORS requests.

                • MaxAge — (Integer)

                  The number of seconds for which the browser caches preflight request results.

                • AllowMethods — (Array<String>)

                  The allowed methods for CORS requests.

                • AllowHeaders — (Array<String>)

                  The allowed headers for CORS requests.

            • AwsDynamoDbTable — (map)

              Details about a DynamoDB table.

              • AttributeDefinitions — (Array<map>)

                A list of attribute definitions for the table.

                • AttributeName — (String)

                  The name of the attribute.

                • AttributeType — (String)

                  The type of the attribute.

              • BillingModeSummary — (map)

                Information about the billing for read/write capacity on the table.

                • BillingMode — (String)

                  The method used to charge for read and write throughput and to manage capacity.

                • LastUpdateToPayPerRequestDateTime — (String)

                  If the billing mode is PAY_PER_REQUEST, indicates when the billing mode was set to that value.

                  Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • CreationDateTime — (String)

                Indicates when the table was created.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • GlobalSecondaryIndexes — (Array<map>)

                List of global secondary indexes for the table.

                • Backfilling — (Boolean)

                  Whether the index is currently backfilling.

                • IndexArn — (String)

                  The ARN of the index.

                • IndexName — (String)

                  The name of the index.

                • IndexSizeBytes — (Integer)

                  The total size in bytes of the index.

                • IndexStatus — (String)

                  The current status of the index.

                  • ACTIVE

                  • CREATING

                  • DELETING

                  • UPDATING

                • ItemCount — (Integer)

                  The number of items in the index.

                • KeySchema — (Array<map>)

                  The key schema for the index.

                  • AttributeName — (String)

                    The name of the key schema attribute.

                  • KeyType — (String)

                    The type of key used for the key schema attribute. Valid values are HASH or RANGE.

                • Projection — (map)

                  Attributes that are copied from the table into an index.

                  • NonKeyAttributes — (Array<String>)

                    The nonkey attributes that are projected into the index. For each attribute, provide the attribute name.

                  • ProjectionType — (String)

                    The types of attributes that are projected into the index. Valid values are as follows:

                    • ALL

                    • INCLUDE

                    • KEYS_ONLY

                • ProvisionedThroughput — (map)

                  Information about the provisioned throughput settings for the indexes.

                  • LastDecreaseDateTime — (String)

                    Indicates when the provisioned throughput was last decreased.

                    Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

                  • LastIncreaseDateTime — (String)

                    Indicates when the provisioned throughput was last increased.

                    Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

                  • NumberOfDecreasesToday — (Integer)

                    The number of times during the current UTC calendar day that the provisioned throughput was decreased.

                  • ReadCapacityUnits — (Integer)

                    The maximum number of strongly consistent reads consumed per second before DynamoDB returns a ThrottlingException.

                  • WriteCapacityUnits — (Integer)

                    The maximum number of writes consumed per second before DynamoDB returns a ThrottlingException.

              • GlobalTableVersion — (String)

                The version of global tables being used.

              • ItemCount — (Integer)

                The number of items in the table.

              • KeySchema — (Array<map>)

                The primary key structure for the table.

                • AttributeName — (String)

                  The name of the key schema attribute.

                • KeyType — (String)

                  The type of key used for the key schema attribute. Valid values are HASH or RANGE.

              • LatestStreamArn — (String)

                The ARN of the latest stream for the table.

              • LatestStreamLabel — (String)

                The label of the latest stream. The label is not a unique identifier.

              • LocalSecondaryIndexes — (Array<map>)

                The list of local secondary indexes for the table.

                • IndexArn — (String)

                  The ARN of the index.

                • IndexName — (String)

                  The name of the index.

                • KeySchema — (Array<map>)

                  The complete key schema for the index.

                  • AttributeName — (String)

                    The name of the key schema attribute.

                  • KeyType — (String)

                    The type of key used for the key schema attribute. Valid values are HASH or RANGE.

                • Projection — (map)

                  Attributes that are copied from the table into the index. These are in addition to the primary key attributes and index key attributes, which are automatically projected.

                  • NonKeyAttributes — (Array<String>)

                    The nonkey attributes that are projected into the index. For each attribute, provide the attribute name.

                  • ProjectionType — (String)

                    The types of attributes that are projected into the index. Valid values are as follows:

                    • ALL

                    • INCLUDE

                    • KEYS_ONLY

              • ProvisionedThroughput — (map)

                Information about the provisioned throughput for the table.

                • LastDecreaseDateTime — (String)

                  Indicates when the provisioned throughput was last decreased.

                  Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

                • LastIncreaseDateTime — (String)

                  Indicates when the provisioned throughput was last increased.

                  Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

                • NumberOfDecreasesToday — (Integer)

                  The number of times during the current UTC calendar day that the provisioned throughput was decreased.

                • ReadCapacityUnits — (Integer)

                  The maximum number of strongly consistent reads consumed per second before DynamoDB returns a ThrottlingException.

                • WriteCapacityUnits — (Integer)

                  The maximum number of writes consumed per second before DynamoDB returns a ThrottlingException.

              • Replicas — (Array<map>)

                The list of replicas of this table.

                • GlobalSecondaryIndexes — (Array<map>)

                  List of global secondary indexes for the replica.

                  • IndexName — (String)

                    The name of the index.

                  • ProvisionedThroughputOverride — (map)

                    Replica-specific configuration for the provisioned throughput for the index.

                    • ReadCapacityUnits — (Integer)

                      The read capacity units for the replica.

                • KmsMasterKeyId — (String)

                  The identifier of the KMS key that will be used for KMS encryption for the replica.

                • ProvisionedThroughputOverride — (map)

                  Replica-specific configuration for the provisioned throughput.

                  • ReadCapacityUnits — (Integer)

                    The read capacity units for the replica.

                • RegionName — (String)

                  The name of the Region where the replica is located.

                • ReplicaStatus — (String)

                  The current status of the replica. Valid values are as follows:

                  • ACTIVE

                  • CREATING

                  • CREATION_FAILED

                  • DELETING

                  • UPDATING

                • ReplicaStatusDescription — (String)

                  Detailed information about the replica status.

              • RestoreSummary — (map)

                Information about the restore for the table.

                • SourceBackupArn — (String)

                  The ARN of the source backup from which the table was restored.

                • SourceTableArn — (String)

                  The ARN of the source table for the backup.

                • RestoreDateTime — (String)

                  Indicates the point in time that the table was restored to.

                  Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

                • RestoreInProgress — (Boolean)

                  Whether a restore is currently in progress.

              • SseDescription — (map)

                Information about the server-side encryption for the table.

                • InaccessibleEncryptionDateTime — (String)

                  If the key is inaccessible, the date and time when DynamoDB detected that the key was inaccessible.

                  Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

                • Status — (String)

                  The status of the server-side encryption.

                • SseType — (String)

                  The type of server-side encryption.

                • KmsMasterKeyArn — (String)

                  The ARN of the KMS key that is used for the KMS encryption.

              • StreamSpecification — (map)

                The current DynamoDB Streams configuration for the table.

                • StreamEnabled — (Boolean)

                  Indicates whether DynamoDB Streams is enabled on the table.

                • StreamViewType — (String)

                  Determines the information that is written to the table.

              • TableId — (String)

                The identifier of the table.

              • TableName — (String)

                The name of the table.

              • TableSizeBytes — (Integer)

                The total size of the table in bytes.

              • TableStatus — (String)

                The current status of the table. Valid values are as follows:

                • ACTIVE

                • ARCHIVED

                • ARCHIVING

                • CREATING

                • DELETING

                • INACCESSIBLE_ENCRYPTION_CREDENTIALS

                • UPDATING

              • DeletionProtectionEnabled — (Boolean)

                Indicates whether deletion protection is to be enabled (true) or disabled (false) on the table.

            • AwsApiGatewayStage — (map)

              Provides information about a version 1 Amazon API Gateway stage.

              • DeploymentId — (String)

                The identifier of the deployment that the stage points to.

              • ClientCertificateId — (String)

                The identifier of the client certificate for the stage.

              • StageName — (String)

                The name of the stage.

              • Description — (String)

                A description of the stage.

              • CacheClusterEnabled — (Boolean)

                Indicates whether a cache cluster is enabled for the stage.

              • CacheClusterSize — (String)

                If a cache cluster is enabled, the size of the cache cluster.

              • CacheClusterStatus — (String)

                If a cache cluster is enabled, the status of the cache cluster.

              • MethodSettings — (Array<map>)

                Defines the method settings for the stage.

                • MetricsEnabled — (Boolean)

                  Indicates whether CloudWatch metrics are enabled for the method.

                • LoggingLevel — (String)

                  The logging level for this method. The logging level affects the log entries that are pushed to CloudWatch Logs.

                  If the logging level is ERROR, then the logs only include error-level entries.

                  If the logging level is INFO, then the logs include both ERROR events and extra informational events.

                  Valid values: OFF | ERROR | INFO

                • DataTraceEnabled — (Boolean)

                  Indicates whether data trace logging is enabled for the method. Data trace logging affects the log entries that are pushed to CloudWatch Logs.

                • ThrottlingBurstLimit — (Integer)

                  The throttling burst limit for the method.

                • ThrottlingRateLimit — (Float)

                  The throttling rate limit for the method.

                • CachingEnabled — (Boolean)

                  Indicates whether responses are cached and returned for requests. For responses to be cached, a cache cluster must be enabled on the stage.

                • CacheTtlInSeconds — (Integer)

                  Specifies the time to live (TTL), in seconds, for cached responses. The higher the TTL, the longer the response is cached.

                • CacheDataEncrypted — (Boolean)

                  Indicates whether the cached responses are encrypted.

                • RequireAuthorizationForCacheControl — (Boolean)

                  Indicates whether authorization is required for a cache invalidation request.

                • UnauthorizedCacheControlHeaderStrategy — (String)

                  Indicates how to handle unauthorized requests for cache invalidation.

                  Valid values: FAIL_WITH_403 | SUCCEED_WITH_RESPONSE_HEADER | SUCCEED_WITHOUT_RESPONSE_HEADER

                • HttpMethod — (String)

                  The HTTP method. You can use an asterisk (*) as a wildcard to apply method settings to multiple methods.

                • ResourcePath — (String)

                  The resource path for this method. Forward slashes (/) are encoded as ~1 . The initial slash must include a forward slash.

                  For example, the path value /resource/subresource must be encoded as /~1resource~1subresource.

                  To specify the root path, use only a slash (/). You can use an asterisk (*) as a wildcard to apply method settings to multiple methods.

              • Variables — (map<String>)

                A map that defines the stage variables for the stage.

                Variable names can have alphanumeric and underscore characters.

                Variable values can contain the following characters:

                • Uppercase and lowercase letters

                • Numbers

                • Special characters -._~:/?#&=,

              • DocumentationVersion — (String)

                The version of the API documentation that is associated with the stage.

              • AccessLogSettings — (map)

                Settings for logging access for the stage.

                • Format — (String)

                  A single-line format of the access logs of data, as specified by selected $context variables. The format must include at least $context.requestId.

                • DestinationArn — (String)

                  The ARN of the CloudWatch Logs log group that receives the access logs.

              • CanarySettings — (map)

                Information about settings for canary deployment in the stage.

                • PercentTraffic — (Float)

                  The percentage of traffic that is diverted to a canary deployment.

                • DeploymentId — (String)

                  The deployment identifier for the canary deployment.

                • StageVariableOverrides — (map<String>)

                  Stage variables that are overridden in the canary release deployment. The variables include new stage variables that are introduced in the canary.

                  Each variable is represented as a string-to-string map between the stage variable name and the variable value.

                • UseStageCache — (Boolean)

                  Indicates whether the canary deployment uses the stage cache.

              • TracingEnabled — (Boolean)

                Indicates whether active tracing with X-Ray is enabled for the stage.

              • CreatedDate — (String)

                Indicates when the stage was created.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • LastUpdatedDate — (String)

                Indicates when the stage was most recently updated.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • WebAclArn — (String)

                The ARN of the web ACL associated with the stage.

            • AwsApiGatewayRestApi — (map)

              Provides information about a REST API in version 1 of Amazon API Gateway.

              • Id — (String)

                The identifier of the REST API.

              • Name — (String)

                The name of the REST API.

              • Description — (String)

                A description of the REST API.

              • CreatedDate — (String)

                Indicates when the API was created.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • Version — (String)

                The version identifier for the REST API.

              • BinaryMediaTypes — (Array<String>)

                The list of binary media types supported by the REST API.

              • MinimumCompressionSize — (Integer)

                The minimum size in bytes of a payload before compression is enabled.

                If null, then compression is disabled.

                If 0, then all payloads are compressed.

              • ApiKeySource — (String)

                The source of the API key for metering requests according to a usage plan.

                HEADER indicates whether to read the API key from the X-API-Key header of a request.

                AUTHORIZER indicates whether to read the API key from the UsageIdentifierKey from a custom authorizer.

              • EndpointConfiguration — (map)

                The endpoint configuration of the REST API.

                • Types — (Array<String>)

                  A list of endpoint types for the REST API.

                  For an edge-optimized API, the endpoint type is EDGE. For a Regional API, the endpoint type is REGIONAL. For a private API, the endpoint type is PRIVATE.

            • AwsCloudTrailTrail — (map)

              Provides details about a CloudTrail trail.

              • CloudWatchLogsLogGroupArn — (String)

                The ARN of the log group that CloudTrail logs are delivered to.

              • CloudWatchLogsRoleArn — (String)

                The ARN of the role that the CloudWatch Events endpoint assumes when it writes to the log group.

              • HasCustomEventSelectors — (Boolean)

                Indicates whether the trail has custom event selectors.

              • HomeRegion — (String)

                The Region where the trail was created.

              • IncludeGlobalServiceEvents — (Boolean)

                Indicates whether the trail publishes events from global services such as IAM to the log files.

              • IsMultiRegionTrail — (Boolean)

                Indicates whether the trail applies only to the current Region or to all Regions.

              • IsOrganizationTrail — (Boolean)

                Whether the trail is created for all accounts in an organization in Organizations, or only for the current Amazon Web Services account.

              • KmsKeyId — (String)

                The KMS key ID to use to encrypt the logs.

              • LogFileValidationEnabled — (Boolean)

                Indicates whether CloudTrail log file validation is enabled.

              • Name — (String)

                The name of the trail.

              • S3BucketName — (String)

                The name of the S3 bucket where the log files are published.

              • S3KeyPrefix — (String)

                The S3 key prefix. The key prefix is added after the name of the S3 bucket where the log files are published.

              • SnsTopicArn — (String)

                The ARN of the SNS topic that is used for notifications of log file delivery.

              • SnsTopicName — (String)

                The name of the SNS topic that is used for notifications of log file delivery.

              • TrailArn — (String)

                The ARN of the trail.

            • AwsSsmPatchCompliance — (map)

              Provides information about the state of a patch on an instance based on the patch baseline that was used to patch the instance.

              • Patch — (map)

                Information about the status of a patch.

                • ComplianceSummary — (map)

                  The compliance status details for the patch.

                  • Status — (String)

                    The current patch compliance status. Valid values are as follows:

                    • COMPLIANT

                    • NON_COMPLIANT

                    • UNSPECIFIED_DATA

                  • CompliantCriticalCount — (Integer)

                    For the patches that are compliant, the number that have a severity of CRITICAL.

                  • CompliantHighCount — (Integer)

                    For the patches that are compliant, the number that have a severity of HIGH.

                  • CompliantMediumCount — (Integer)

                    For the patches that are compliant, the number that have a severity of MEDIUM.

                  • ExecutionType — (String)

                    The type of execution that was used determine compliance.

                  • NonCompliantCriticalCount — (Integer)

                    For the patch items that are noncompliant, the number of items that have a severity of CRITICAL.

                  • CompliantInformationalCount — (Integer)

                    For the patches that are compliant, the number that have a severity of INFORMATIONAL.

                  • NonCompliantInformationalCount — (Integer)

                    For the patches that are noncompliant, the number that have a severity of INFORMATIONAL.

                  • CompliantUnspecifiedCount — (Integer)

                    For the patches that are compliant, the number that have a severity of UNSPECIFIED.

                  • NonCompliantLowCount — (Integer)

                    For the patches that are noncompliant, the number that have a severity of LOW.

                  • NonCompliantHighCount — (Integer)

                    For the patches that are noncompliant, the number that have a severity of HIGH.

                  • CompliantLowCount — (Integer)

                    For the patches that are compliant, the number that have a severity of LOW.

                  • ComplianceType — (String)

                    The type of resource for which the compliance was determined. For AwsSsmPatchCompliance, ComplianceType is Patch.

                  • PatchBaselineId — (String)

                    The identifier of the patch baseline. The patch baseline lists the patches that are approved for installation.

                  • OverallSeverity — (String)

                    The highest severity for the patches. Valid values are as follows:

                    • CRITICAL

                    • HIGH

                    • MEDIUM

                    • LOW

                    • INFORMATIONAL

                    • UNSPECIFIED

                  • NonCompliantMediumCount — (Integer)

                    For the patches that are noncompliant, the number that have a severity of MEDIUM.

                  • NonCompliantUnspecifiedCount — (Integer)

                    For the patches that are noncompliant, the number that have a severity of UNSPECIFIED.

                  • PatchGroup — (String)

                    The identifier of the patch group for which compliance was determined. A patch group uses tags to group EC2 instances that should have the same patch compliance.

            • AwsCertificateManagerCertificate — (map)

              Provides details about an Certificate Manager certificate.

              • CertificateAuthorityArn — (String)

                The ARN of the private certificate authority (CA) that will be used to issue the certificate.

              • CreatedAt — (String)

                Indicates when the certificate was requested.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • DomainName — (String)

                The fully qualified domain name (FQDN), such as www.example.com, that is secured by the certificate.

              • DomainValidationOptions — (Array<map>)

                Contains information about the initial validation of each domain name that occurs as a result of the RequestCertificate request.

                Only provided if the certificate type is AMAZON_ISSUED.

                • DomainName — (String)

                  A fully qualified domain name (FQDN) in the certificate.

                • ResourceRecord — (map)

                  The CNAME record that is added to the DNS database for domain validation.

                  • Name — (String)

                    The name of the resource.

                  • Type — (String)

                    The type of resource.

                  • Value — (String)

                    The value of the resource.

                • ValidationDomain — (String)

                  The domain name that Certificate Manager uses to send domain validation emails.

                • ValidationEmails — (Array<String>)

                  A list of email addresses that Certificate Manager uses to send domain validation emails.

                • ValidationMethod — (String)

                  The method used to validate the domain name.

                • ValidationStatus — (String)

                  The validation status of the domain name.

              • ExtendedKeyUsages — (Array<map>)

                Contains a list of Extended Key Usage X.509 v3 extension objects. Each object specifies a purpose for which the certificate public key can be used and consists of a name and an object identifier (OID).

                • Name — (String)

                  The name of an extension value. Indicates the purpose for which the certificate public key can be used.

                • OId — (String)

                  An object identifier (OID) for the extension value.

                  The format is numbers separated by periods.

              • FailureReason — (String)

                For a failed certificate request, the reason for the failure.

                Valid values: NO_AVAILABLE_CONTACTS | ADDITIONAL_VERIFICATION_REQUIRED | DOMAIN_NOT_ALLOWED | INVALID_PUBLIC_DOMAIN | DOMAIN_VALIDATION_DENIED | CAA_ERROR | PCA_LIMIT_EXCEEDED | PCA_INVALID_ARN | PCA_INVALID_STATE | PCA_REQUEST_FAILED | PCA_NAME_CONSTRAINTS_VALIDATION | PCA_RESOURCE_NOT_FOUND | PCA_INVALID_ARGS | PCA_INVALID_DURATION | PCA_ACCESS_DENIED | SLR_NOT_FOUND | OTHER

              • ImportedAt — (String)

                Indicates when the certificate was imported. Provided if the certificate type is IMPORTED.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • InUseBy — (Array<String>)

                The list of ARNs for the Amazon Web Services resources that use the certificate.

              • IssuedAt — (String)

                Indicates when the certificate was issued. Provided if the certificate type is AMAZON_ISSUED.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • Issuer — (String)

                The name of the certificate authority that issued and signed the certificate.

              • KeyAlgorithm — (String)

                The algorithm that was used to generate the public-private key pair.

                Valid values: RSA_2048 | RSA_1024 | RSA_4096 | EC_prime256v1 | EC_secp384r1 | EC_secp521r1

              • KeyUsages — (Array<map>)

                A list of key usage X.509 v3 extension objects.

                • Name — (String)

                  The key usage extension name.

              • NotAfter — (String)

                The time after which the certificate becomes invalid.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • NotBefore — (String)

                The time before which the certificate is not valid.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • Options — (map)

                Provides a value that specifies whether to add the certificate to a transparency log.

                • CertificateTransparencyLoggingPreference — (String)

                  Whether to add the certificate to a transparency log.

                  Valid values: DISABLED | ENABLED

              • RenewalEligibility — (String)

                Whether the certificate is eligible for renewal.

                Valid values: ELIGIBLE | INELIGIBLE

              • RenewalSummary — (map)

                Information about the status of the Certificate Manager managed renewal for the certificate. Provided only when the certificate type is AMAZON_ISSUED.

                • DomainValidationOptions — (Array<map>)

                  Information about the validation of each domain name in the certificate, as it pertains to Certificate Manager managed renewal. Provided only when the certificate type is AMAZON_ISSUED.

                  • DomainName — (String)

                    A fully qualified domain name (FQDN) in the certificate.

                  • ResourceRecord — (map)

                    The CNAME record that is added to the DNS database for domain validation.

                    • Name — (String)

                      The name of the resource.

                    • Type — (String)

                      The type of resource.

                    • Value — (String)

                      The value of the resource.

                  • ValidationDomain — (String)

                    The domain name that Certificate Manager uses to send domain validation emails.

                  • ValidationEmails — (Array<String>)

                    A list of email addresses that Certificate Manager uses to send domain validation emails.

                  • ValidationMethod — (String)

                    The method used to validate the domain name.

                  • ValidationStatus — (String)

                    The validation status of the domain name.

                • RenewalStatus — (String)

                  The status of the Certificate Manager managed renewal of the certificate.

                  Valid values: PENDING_AUTO_RENEWAL | PENDING_VALIDATION | SUCCESS | FAILED

                • RenewalStatusReason — (String)

                  The reason that a renewal request was unsuccessful. This attribute is used only when RenewalStatus is FAILED.

                  Valid values: NO_AVAILABLE_CONTACTS | ADDITIONAL_VERIFICATION_REQUIRED | DOMAIN_NOT_ALLOWED | INVALID_PUBLIC_DOMAIN | DOMAIN_VALIDATION_DENIED | CAA_ERROR | PCA_LIMIT_EXCEEDED | PCA_INVALID_ARN | PCA_INVALID_STATE | PCA_REQUEST_FAILED | PCA_NAME_CONSTRAINTS_VALIDATION | PCA_RESOURCE_NOT_FOUND | PCA_INVALID_ARGS | PCA_INVALID_DURATION | PCA_ACCESS_DENIED | SLR_NOT_FOUND | OTHER

                • UpdatedAt — (String)

                  Indicates when the renewal summary was last updated.

                  Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • Serial — (String)

                The serial number of the certificate.

              • SignatureAlgorithm — (String)

                The algorithm that was used to sign the certificate.

              • Status — (String)

                The status of the certificate.

                Valid values: PENDING_VALIDATION | ISSUED | INACTIVE | EXPIRED | VALIDATION_TIMED_OUT | REVOKED | FAILED

              • Subject — (String)

                The name of the entity that is associated with the public key contained in the certificate.

              • SubjectAlternativeNames — (Array<String>)

                One or more domain names (subject alternative names) included in the certificate. This list contains the domain names that are bound to the public key that is contained in the certificate.

                The subject alternative names include the canonical domain name (CN) of the certificate and additional domain names that can be used to connect to the website.

              • Type — (String)

                The source of the certificate. For certificates that Certificate Manager provides, Type is AMAZON_ISSUED. For certificates that are imported with ImportCertificate, Type is IMPORTED.

                Valid values: IMPORTED | AMAZON_ISSUED | PRIVATE

            • AwsRedshiftCluster — (map)

              Contains details about an Amazon Redshift cluster.

              • AllowVersionUpgrade — (Boolean)

                Indicates whether major version upgrades are applied automatically to the cluster during the maintenance window.

              • AutomatedSnapshotRetentionPeriod — (Integer)

                The number of days that automatic cluster snapshots are retained.

              • AvailabilityZone — (String)

                The name of the Availability Zone in which the cluster is located.

              • ClusterAvailabilityStatus — (String)

                The availability status of the cluster for queries. Possible values are the following:

                • Available - The cluster is available for queries.

                • Unavailable - The cluster is not available for queries.

                • Maintenance - The cluster is intermittently available for queries due to maintenance activities.

                • Modifying -The cluster is intermittently available for queries due to changes that modify the cluster.

                • Failed - The cluster failed and is not available for queries.

              • ClusterCreateTime — (String)

                Indicates when the cluster was created.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • ClusterIdentifier — (String)

                The unique identifier of the cluster.

              • ClusterNodes — (Array<map>)

                The nodes in the cluster.

                • NodeRole — (String)

                  The role of the node. A node might be a leader node or a compute node.

                • PrivateIpAddress — (String)

                  The private IP address of the node.

                • PublicIpAddress — (String)

                  The public IP address of the node.

              • ClusterParameterGroups — (Array<map>)

                The list of cluster parameter groups that are associated with this cluster.

                • ClusterParameterStatusList — (Array<map>)

                  The list of parameter statuses.

                  • ParameterName — (String)

                    The name of the parameter.

                  • ParameterApplyStatus — (String)

                    The status of the parameter. Indicates whether the parameter is in sync with the database, waiting for a cluster reboot, or encountered an error when it was applied.

                    Valid values: in-sync | pending-reboot | applying | invalid-parameter | apply-deferred | apply-error | unknown-error

                  • ParameterApplyErrorDescription — (String)

                    The error that prevented the parameter from being applied to the database.

                • ParameterApplyStatus — (String)

                  The status of updates to the parameters.

                • ParameterGroupName — (String)

                  The name of the parameter group.

              • ClusterPublicKey — (String)

                The public key for the cluster.

              • ClusterRevisionNumber — (String)

                The specific revision number of the database in the cluster.

              • ClusterSecurityGroups — (Array<map>)

                A list of cluster security groups that are associated with the cluster.

                • ClusterSecurityGroupName — (String)

                  The name of the cluster security group.

                • Status — (String)

                  The status of the cluster security group.

              • ClusterSnapshotCopyStatus — (map)

                Information about the destination Region and retention period for the cross-Region snapshot copy.

                • DestinationRegion — (String)

                  The destination Region that snapshots are automatically copied to when cross-Region snapshot copy is enabled.

                • ManualSnapshotRetentionPeriod — (Integer)

                  The number of days that manual snapshots are retained in the destination Region after they are copied from a source Region.

                  If the value is -1, then the manual snapshot is retained indefinitely.

                  Valid values: Either -1 or an integer between 1 and 3,653

                • RetentionPeriod — (Integer)

                  The number of days to retain automated snapshots in the destination Region after they are copied from a source Region.

                • SnapshotCopyGrantName — (String)

                  The name of the snapshot copy grant.

              • ClusterStatus — (String)

                The current status of the cluster.

                Valid values: available | available, prep-for-resize | available, resize-cleanup | cancelling-resize | creating | deleting | final-snapshot | hardware-failure | incompatible-hsm | incompatible-network | incompatible-parameters | incompatible-restore | modifying | paused | rebooting | renaming | resizing | rotating-keys | storage-full | updating-hsm

              • ClusterSubnetGroupName — (String)

                The name of the subnet group that is associated with the cluster. This parameter is valid only when the cluster is in a VPC.

              • ClusterVersion — (String)

                The version ID of the Amazon Redshift engine that runs on the cluster.

              • DBName — (String)

                The name of the initial database that was created when the cluster was created.

                The same name is returned for the life of the cluster.

                If an initial database is not specified, a database named devdev is created by default.

              • DeferredMaintenanceWindows — (Array<map>)

                List of time windows during which maintenance was deferred.

                • DeferMaintenanceEndTime — (String)

                  The end of the time window for which maintenance was deferred.

                  Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

                • DeferMaintenanceIdentifier — (String)

                  The identifier of the maintenance window.

                • DeferMaintenanceStartTime — (String)

                  The start of the time window for which maintenance was deferred.

                  Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • ElasticIpStatus — (map)

                Information about the status of the Elastic IP (EIP) address.

                • ElasticIp — (String)

                  The elastic IP address for the cluster.

                • Status — (String)

                  The status of the elastic IP address.

              • ElasticResizeNumberOfNodeOptions — (String)

                The number of nodes that you can use the elastic resize method to resize the cluster to.

              • Encrypted — (Boolean)

                Indicates whether the data in the cluster is encrypted at rest.

              • Endpoint — (map)

                The connection endpoint.

                • Address — (String)

                  The DNS address of the cluster.

                • Port — (Integer)

                  The port that the database engine listens on.

              • EnhancedVpcRouting — (Boolean)

                Indicates whether to create the cluster with enhanced VPC routing enabled.

              • ExpectedNextSnapshotScheduleTime — (String)

                Indicates when the next snapshot is expected to be taken. The cluster must have a valid snapshot schedule and have backups enabled.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • ExpectedNextSnapshotScheduleTimeStatus — (String)

                The status of the next expected snapshot.

                Valid values: OnTrack | Pending

              • HsmStatus — (map)

                Information about whether the Amazon Redshift cluster finished applying any changes to hardware security module (HSM) settings that were specified in a modify cluster command.

                • HsmClientCertificateIdentifier — (String)

                  The name of the HSM client certificate that the Amazon Redshift cluster uses to retrieve the data encryption keys that are stored in an HSM.

                • HsmConfigurationIdentifier — (String)

                  The name of the HSM configuration that contains the information that the Amazon Redshift cluster can use to retrieve and store keys in an HSM.

                • Status — (String)

                  Indicates whether the Amazon Redshift cluster has finished applying any HSM settings changes specified in a modify cluster command.

                  Type: String

                  Valid values: active | applying

              • IamRoles — (Array<map>)

                A list of IAM roles that the cluster can use to access other Amazon Web Services services.

                • ApplyStatus — (String)

                  The status of the IAM role's association with the cluster.

                  Valid values: in-sync | adding | removing

                • IamRoleArn — (String)

                  The ARN of the IAM role.

              • KmsKeyId — (String)

                The identifier of the KMS encryption key that is used to encrypt data in the cluster.

              • MaintenanceTrackName — (String)

                The name of the maintenance track for the cluster.

              • ManualSnapshotRetentionPeriod — (Integer)

                The default number of days to retain a manual snapshot.

                If the value is -1, the snapshot is retained indefinitely.

                This setting doesn't change the retention period of existing snapshots.

                Valid values: Either -1 or an integer between 1 and 3,653

              • MasterUsername — (String)

                The master user name for the cluster. This name is used to connect to the database that is specified in as the value of DBName.

              • NextMaintenanceWindowStartTime — (String)

                Indicates the start of the next maintenance window.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • NodeType — (String)

                The node type for the nodes in the cluster.

              • NumberOfNodes — (Integer)

                The number of compute nodes in the cluster.

              • PendingActions — (Array<String>)

                A list of cluster operations that are waiting to start.

              • PendingModifiedValues — (map)

                A list of changes to the cluster that are currently pending.

                • AutomatedSnapshotRetentionPeriod — (Integer)

                  The pending or in-progress change to the automated snapshot retention period.

                • ClusterIdentifier — (String)

                  The pending or in-progress change to the identifier for the cluster.

                • ClusterType — (String)

                  The pending or in-progress change to the cluster type.

                • ClusterVersion — (String)

                  The pending or in-progress change to the service version.

                • EncryptionType — (String)

                  The encryption type for a cluster.

                • EnhancedVpcRouting — (Boolean)

                  Indicates whether to create the cluster with enhanced VPC routing enabled.

                • MaintenanceTrackName — (String)

                  The name of the maintenance track that the cluster changes to during the next maintenance window.

                • MasterUserPassword — (String)

                  The pending or in-progress change to the master user password for the cluster.

                • NodeType — (String)

                  The pending or in-progress change to the cluster's node type.

                • NumberOfNodes — (Integer)

                  The pending or in-progress change to the number of nodes in the cluster.

                • PubliclyAccessible — (Boolean)

                  The pending or in-progress change to whether the cluster can be connected to from the public network.

              • PreferredMaintenanceWindow — (String)

                The weekly time range, in Universal Coordinated Time (UTC), during which system maintenance can occur.

                Format: <day>:HH:MM-<day>:HH:MM

                For the day values, use mon | tue | wed | thu | fri | sat | sun

                For example, sun:09:32-sun:10:02

              • PubliclyAccessible — (Boolean)

                Whether the cluster can be accessed from a public network.

              • ResizeInfo — (map)

                Information about the resize operation for the cluster.

                • AllowCancelResize — (Boolean)

                  Indicates whether the resize operation can be canceled.

                • ResizeType — (String)

                  The type of resize operation.

                  Valid values: ClassicResize

              • RestoreStatus — (map)

                Information about the status of a cluster restore action. Only applies to a cluster that was created by restoring a snapshot.

                • CurrentRestoreRateInMegaBytesPerSecond — (Float)

                  The number of megabytes per second being transferred from the backup storage. Returns the average rate for a completed backup.

                  This field is only updated when you restore to DC2 and DS2 node types.

                • ElapsedTimeInSeconds — (Integer)

                  The amount of time an in-progress restore has been running, or the amount of time it took a completed restore to finish.

                  This field is only updated when you restore to DC2 and DS2 node types.

                • EstimatedTimeToCompletionInSeconds — (Integer)

                  The estimate of the time remaining before the restore is complete. Returns 0 for a completed restore.

                  This field is only updated when you restore to DC2 and DS2 node types.

                • ProgressInMegaBytes — (Integer)

                  The number of megabytes that were transferred from snapshot storage.

                  This field is only updated when you restore to DC2 and DS2 node types.

                • SnapshotSizeInMegaBytes — (Integer)

                  The size of the set of snapshot data that was used to restore the cluster.

                  This field is only updated when you restore to DC2 and DS2 node types.

                • Status — (String)

                  The status of the restore action.

                  Valid values: starting | restoring | completed | failed

              • SnapshotScheduleIdentifier — (String)

                A unique identifier for the cluster snapshot schedule.

              • SnapshotScheduleState — (String)

                The current state of the cluster snapshot schedule.

                Valid values: MODIFYING | ACTIVE | FAILED

              • VpcId — (String)

                The identifier of the VPC that the cluster is in, if the cluster is in a VPC.

              • VpcSecurityGroups — (Array<map>)

                The list of VPC security groups that the cluster belongs to, if the cluster is in a VPC.

                • Status — (String)

                  The status of the VPC security group.

                • VpcSecurityGroupId — (String)

                  The identifier of the VPC security group.

              • LoggingStatus — (map)

                Information about the logging status of the cluster.

                • BucketName — (String)

                  The name of the S3 bucket where the log files are stored.

                • LastFailureMessage — (String)

                  The message indicating that the logs failed to be delivered.

                • LastFailureTime — (String)

                  The last time when logs failed to be delivered.

                  Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

                • LastSuccessfulDeliveryTime — (String)

                  The last time that logs were delivered successfully.

                  Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

                • LoggingEnabled — (Boolean)

                  Indicates whether logging is enabled.

                • S3KeyPrefix — (String)

                  Provides the prefix applied to the log file names.

            • AwsElbLoadBalancer — (map)

              Contains details about a Classic Load Balancer.

              • AvailabilityZones — (Array<String>)

                The list of Availability Zones for the load balancer.

              • BackendServerDescriptions — (Array<map>)

                Information about the configuration of the EC2 instances.

                • InstancePort — (Integer)

                  The port on which the EC2 instance is listening.

                • PolicyNames — (Array<String>)

                  The names of the policies that are enabled for the EC2 instance.

              • CanonicalHostedZoneName — (String)

                The name of the Amazon Route 53 hosted zone for the load balancer.

              • CanonicalHostedZoneNameID — (String)

                The ID of the Amazon Route 53 hosted zone for the load balancer.

              • CreatedTime — (String)

                Indicates when the load balancer was created.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • DnsName — (String)

                The DNS name of the load balancer.

              • HealthCheck — (map)

                Information about the health checks that are conducted on the load balancer.

                • HealthyThreshold — (Integer)

                  The number of consecutive health check successes required before the instance is moved to the Healthy state.

                • Interval — (Integer)

                  The approximate interval, in seconds, between health checks of an individual instance.

                • Target — (String)

                  The instance that is being checked. The target specifies the protocol and port. The available protocols are TCP, SSL, HTTP, and HTTPS. The range of valid ports is 1 through 65535.

                  For the HTTP and HTTPS protocols, the target also specifies the ping path.

                  For the TCP protocol, the target is specified as TCP: <port> .

                  For the SSL protocol, the target is specified as SSL.<port> .

                  For the HTTP and HTTPS protocols, the target is specified as <protocol>:<port>/<path to ping> .

                • Timeout — (Integer)

                  The amount of time, in seconds, during which no response means a failed health check.

                • UnhealthyThreshold — (Integer)

                  The number of consecutive health check failures that must occur before the instance is moved to the Unhealthy state.

              • Instances — (Array<map>)

                List of EC2 instances for the load balancer.

                • InstanceId — (String)

                  The instance identifier.

              • ListenerDescriptions — (Array<map>)

                The policies that are enabled for the load balancer listeners.

                • Listener — (map)

                  Information about the listener.

                  • InstancePort — (Integer)

                    The port on which the instance is listening.

                  • InstanceProtocol — (String)

                    The protocol to use to route traffic to instances.

                    Valid values: HTTP | HTTPS | TCP | SSL

                  • LoadBalancerPort — (Integer)

                    The port on which the load balancer is listening.

                    On EC2-VPC, you can specify any port from the range 1-65535.

                    On EC2-Classic, you can specify any port from the following list: 25, 80, 443, 465, 587, 1024-65535.

                  • Protocol — (String)

                    The load balancer transport protocol to use for routing.

                    Valid values: HTTP | HTTPS | TCP | SSL

                  • SslCertificateId — (String)

                    The ARN of the server certificate.

                • PolicyNames — (Array<String>)

                  The policies enabled for the listener.

              • LoadBalancerAttributes — (map)

                The attributes for a load balancer.

                • AccessLog — (map)

                  Information about the access log configuration for the load balancer.

                  If the access log is enabled, the load balancer captures detailed information about all requests. It delivers the information to a specified S3 bucket.

                  • EmitInterval — (Integer)

                    The interval in minutes for publishing the access logs.

                    You can publish access logs either every 5 minutes or every 60 minutes.

                  • Enabled — (Boolean)

                    Indicates whether access logs are enabled for the load balancer.

                  • S3BucketName — (String)

                    The name of the S3 bucket where the access logs are stored.

                  • S3BucketPrefix — (String)

                    The logical hierarchy that was created for the S3 bucket.

                    If a prefix is not provided, the log is placed at the root level of the bucket.

                • ConnectionDraining — (map)

                  Information about the connection draining configuration for the load balancer.

                  If connection draining is enabled, the load balancer allows existing requests to complete before it shifts traffic away from a deregistered or unhealthy instance.

                  • Enabled — (Boolean)

                    Indicates whether connection draining is enabled for the load balancer.

                  • Timeout — (Integer)

                    The maximum time, in seconds, to keep the existing connections open before deregistering the instances.

                • ConnectionSettings — (map)

                  Connection settings for the load balancer.

                  If an idle timeout is configured, the load balancer allows connections to remain idle for the specified duration. When a connection is idle, no data is sent over the connection.

                  • IdleTimeout — (Integer)

                    The time, in seconds, that the connection can be idle (no data is sent over the connection) before it is closed by the load balancer.

                • CrossZoneLoadBalancing — (map)

                  Cross-zone load balancing settings for the load balancer.

                  If cross-zone load balancing is enabled, the load balancer routes the request traffic evenly across all instances regardless of the Availability Zones.

                  • Enabled — (Boolean)

                    Indicates whether cross-zone load balancing is enabled for the load balancer.

                • AdditionalAttributes — (Array<map>)

                  Any additional attributes for a load balancer.

                  • Key — (String)

                    The name of the attribute.

                  • Value — (String)

                    The value of the attribute.

              • LoadBalancerName — (String)

                The name of the load balancer.

              • Policies — (map)

                The policies for a load balancer.

                • AppCookieStickinessPolicies — (Array<map>)

                  The stickiness policies that are created using CreateAppCookieStickinessPolicy.

                  • CookieName — (String)

                    The name of the application cookie used for stickiness.

                  • PolicyName — (String)

                    The mnemonic name for the policy being created. The name must be unique within the set of policies for the load balancer.

                • LbCookieStickinessPolicies — (Array<map>)

                  The stickiness policies that are created using CreateLBCookieStickinessPolicy.

                  • CookieExpirationPeriod — (Integer)

                    The amount of time, in seconds, after which the cookie is considered stale. If an expiration period is not specified, the stickiness session lasts for the duration of the browser session.

                  • PolicyName — (String)

                    The name of the policy. The name must be unique within the set of policies for the load balancer.

                • OtherPolicies — (Array<String>)

                  The policies other than the stickiness policies.

              • Scheme — (String)

                The type of load balancer. Only provided if the load balancer is in a VPC.

                If Scheme is internet-facing, the load balancer has a public DNS name that resolves to a public IP address.

                If Scheme is internal, the load balancer has a public DNS name that resolves to a private IP address.

              • SecurityGroups — (Array<String>)

                The security groups for the load balancer. Only provided if the load balancer is in a VPC.

              • SourceSecurityGroup — (map)

                Information about the security group for the load balancer. This is the security group that is used for inbound rules.

                • GroupName — (String)

                  The name of the security group.

                • OwnerAlias — (String)

                  The owner of the security group.

              • Subnets — (Array<String>)

                The list of subnet identifiers for the load balancer.

              • VpcId — (String)

                The identifier of the VPC for the load balancer.

            • AwsIamGroup — (map)

              Contains details about an IAM group.

              • AttachedManagedPolicies — (Array<map>)

                A list of the managed policies that are attached to the IAM group.

                • PolicyName — (String)

                  The name of the policy.

                • PolicyArn — (String)

                  The ARN of the policy.

              • CreateDate — (String)

                Indicates when the IAM group was created.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • GroupId — (String)

                The identifier of the IAM group.

              • GroupName — (String)

                The name of the IAM group.

              • GroupPolicyList — (Array<map>)

                The list of inline policies that are embedded in the group.

                • PolicyName — (String)

                  The name of the policy.

              • Path — (String)

                The path to the group.

            • AwsIamRole — (map)

              Details about an IAM role.

              • AssumeRolePolicyDocument — (String)

                The trust policy that grants permission to assume the role.

              • AttachedManagedPolicies — (Array<map>)

                The list of the managed policies that are attached to the role.

                • PolicyName — (String)

                  The name of the policy.

                • PolicyArn — (String)

                  The ARN of the policy.

              • CreateDate — (String)

                Indicates when the role was created.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • InstanceProfileList — (Array<map>)

                The list of instance profiles that contain this role.

                • Arn — (String)

                  The ARN of the instance profile.

                • CreateDate — (String)

                  Indicates when the instance profile was created.

                  Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

                • InstanceProfileId — (String)

                  The identifier of the instance profile.

                • InstanceProfileName — (String)

                  The name of the instance profile.

                • Path — (String)

                  The path to the instance profile.

                • Roles — (Array<map>)

                  The roles associated with the instance profile.

                  • Arn — (String)

                    The ARN of the role.

                  • AssumeRolePolicyDocument — (String)

                    The policy that grants an entity permission to assume the role.

                  • CreateDate — (String)

                    Indicates when the role was created.

                    Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

                  • Path — (String)

                    The path to the role.

                  • RoleId — (String)

                    The identifier of the role.

                  • RoleName — (String)

                    The name of the role.

              • PermissionsBoundary — (map)

                Information about the policy used to set the permissions boundary for an IAM principal.

                • PermissionsBoundaryArn — (String)

                  The ARN of the policy used to set the permissions boundary.

                • PermissionsBoundaryType — (String)

                  The usage type for the permissions boundary.

              • RoleId — (String)

                The stable and unique string identifying the role.

              • RoleName — (String)

                The friendly name that identifies the role.

              • RolePolicyList — (Array<map>)

                The list of inline policies that are embedded in the role.

                • PolicyName — (String)

                  The name of the policy.

              • MaxSessionDuration — (Integer)

                The maximum session duration (in seconds) that you want to set for the specified role.

              • Path — (String)

                The path to the role.

            • AwsKmsKey — (map)

              Details about an KMS key.

              • AWSAccountId — (String)

                The twelve-digit account ID of the Amazon Web Services account that owns the KMS key.

              • CreationDate — (Float)

                Indicates when the KMS key was created.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • KeyId — (String)

                The globally unique identifier for the KMS key.

              • KeyManager — (String)

                The manager of the KMS key. KMS keys in your Amazon Web Services account are either customer managed or Amazon Web Services managed.

              • KeyState — (String)

                The state of the KMS key. Valid values are as follows:

                • Disabled

                • Enabled

                • PendingDeletion

                • PendingImport

                • Unavailable

              • Origin — (String)

                The source of the KMS key material.

                When this value is AWS_KMS, KMS created the key material.

                When this value is EXTERNAL, the key material was imported from your existing key management infrastructure or the KMS key lacks key material.

                When this value is AWS_CLOUDHSM, the key material was created in the CloudHSM cluster associated with a custom key store.

              • Description — (String)

                A description of the KMS key.

              • KeyRotationStatus — (Boolean)

                Whether the key has key rotation enabled.

            • AwsLambdaFunction — (map)

              Details about a Lambda function.

              • Code — (map)

                An AwsLambdaFunctionCode object.

                • S3Bucket — (String)

                  An Amazon S3 bucket in the same Amazon Web Services Region as your function. The bucket can be in a different Amazon Web Services account.

                • S3Key — (String)

                  The Amazon S3 key of the deployment package.

                • S3ObjectVersion — (String)

                  For versioned objects, the version of the deployment package object to use.

                • ZipFile — (String)

                  The base64-encoded contents of the deployment package. Amazon Web Services SDK and Amazon Web Services CLI clients handle the encoding for you.

              • CodeSha256 — (String)

                The SHA256 hash of the function's deployment package.

              • DeadLetterConfig — (map)

                The function's dead letter queue.

                • TargetArn — (String)

                  The ARN of an SQS queue or SNS topic.

              • Environment — (map)

                The function's environment variables.

                • Variables — (map<String>)

                  Environment variable key-value pairs.

                • Error — (map)

                  An AwsLambdaFunctionEnvironmentError object.

                  • ErrorCode — (String)

                    The error code.

                  • Message — (String)

                    The error message.

              • FunctionName — (String)

                The name of the function.

              • Handler — (String)

                The function that Lambda calls to begin executing your function.

              • KmsKeyArn — (String)

                The KMS key that is used to encrypt the function's environment variables. This key is only returned if you've configured a customer managed customer managed key.

              • LastModified — (String)

                Indicates when the function was last updated.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • Layers — (Array<map>)

                The function's layers.

                • Arn — (String)

                  The ARN of the function layer.

                • CodeSize — (Integer)

                  The size of the layer archive in bytes.

              • MasterArn — (String)

                For Lambda@Edge functions, the ARN of the master function.

              • MemorySize — (Integer)

                The memory that is allocated to the function.

              • RevisionId — (String)

                The latest updated revision of the function or alias.

              • Role — (String)

                The function's execution role.

              • Runtime — (String)

                The runtime environment for the Lambda function.

              • Timeout — (Integer)

                The amount of time that Lambda allows a function to run before stopping it.

              • TracingConfig — (map)

                The function's X-Ray tracing configuration.

                • Mode — (String)

                  The tracing mode.

              • VpcConfig — (map)

                The function's networking configuration.

                • SecurityGroupIds — (Array<String>)

                  A list of VPC security groups IDs.

                • SubnetIds — (Array<String>)

                  A list of VPC subnet IDs.

                • VpcId — (String)

                  The ID of the VPC.

              • Version — (String)

                The version of the Lambda function.

              • Architectures — (Array<String>)

                The instruction set architecture that the function uses. Valid values are x86_64 or arm64.

              • PackageType — (String)

                The type of deployment package that's used to deploy the function code to Lambda. Set to Image for a container image and Zip for a .zip file archive.

            • AwsLambdaLayerVersion — (map)

              Details for a Lambda layer version.

              • Version — (Integer)

                The version number.

              • CompatibleRuntimes — (Array<String>)

                The layer's compatible runtimes. Maximum number of five items.

                Valid values: nodejs10.x | nodejs12.x | java8 | java11 | python2.7 | python3.6 | python3.7 | python3.8 | dotnetcore1.0 | dotnetcore2.1 | go1.x | ruby2.5 | provided

              • CreatedDate — (String)

                Indicates when the version was created.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • AwsRdsDbInstance — (map)

              Details about an Amazon RDS database instance.

              • AssociatedRoles — (Array<map>)

                The IAM roles associated with the DB instance.

                • RoleArn — (String)

                  The ARN of the IAM role that is associated with the DB instance.

                • FeatureName — (String)

                  The name of the feature associated with the IAM role.

                • Status — (String)

                  Describes the state of the association between the IAM role and the DB instance. The Status property returns one of the following values:

                  • ACTIVE - The IAM role ARN is associated with the DB instance and can be used to access other Amazon Web Services services on your behalf.

                  • PENDING - The IAM role ARN is being associated with the DB instance.

                  • INVALID - The IAM role ARN is associated with the DB instance. But the DB instance is unable to assume the IAM role in order to access other Amazon Web Services services on your behalf.

              • CACertificateIdentifier — (String)

                The identifier of the CA certificate for this DB instance.

              • DBClusterIdentifier — (String)

                If the DB instance is a member of a DB cluster, contains the name of the DB cluster that the DB instance is a member of.

              • DBInstanceIdentifier — (String)

                Contains a user-supplied database identifier. This identifier is the unique key that identifies a DB instance.

              • DBInstanceClass — (String)

                Contains the name of the compute and memory capacity class of the DB instance.

              • DbInstancePort — (Integer)

                Specifies the port that the DB instance listens on. If the DB instance is part of a DB cluster, this can be a different port than the DB cluster port.

              • DbiResourceId — (String)

                The Amazon Web Services Region-unique, immutable identifier for the DB instance. This identifier is found in CloudTrail log entries whenever the KMS key for the DB instance is accessed.

              • DBName — (String)

                The meaning of this parameter differs according to the database engine you use.

                MySQL, MariaDB, SQL Server, PostgreSQL

                Contains the name of the initial database of this instance that was provided at create time, if one was specified when the DB instance was created. This same name is returned for the life of the DB instance.

                Oracle

                Contains the Oracle System ID (SID) of the created DB instance. Not shown when the returned parameters do not apply to an Oracle DB instance.

              • DeletionProtection — (Boolean)

                Indicates whether the DB instance has deletion protection enabled.

                When deletion protection is enabled, the database cannot be deleted.

              • Endpoint — (map)

                Specifies the connection endpoint.

                • Address — (String)

                  Specifies the DNS address of the DB instance.

                • Port — (Integer)

                  Specifies the port that the database engine is listening on.

                • HostedZoneId — (String)

                  Specifies the ID that Amazon Route 53 assigns when you create a hosted zone.

              • Engine — (String)

                Provides the name of the database engine to use for this DB instance.

              • EngineVersion — (String)

                Indicates the database engine version.

              • IAMDatabaseAuthenticationEnabled — (Boolean)

                True if mapping of IAM accounts to database accounts is enabled, and otherwise false.

                IAM database authentication can be enabled for the following database engines.

                • For MySQL 5.6, minor version 5.6.34 or higher

                • For MySQL 5.7, minor version 5.7.16 or higher

                • Aurora 5.6 or higher

              • InstanceCreateTime — (String)

                Indicates when the DB instance was created.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • KmsKeyId — (String)

                If StorageEncrypted is true, the KMS key identifier for the encrypted DB instance.

              • PubliclyAccessible — (Boolean)

                Specifies the accessibility options for the DB instance.

                A value of true specifies an Internet-facing instance with a publicly resolvable DNS name, which resolves to a public IP address.

                A value of false specifies an internal instance with a DNS name that resolves to a private IP address.

              • StorageEncrypted — (Boolean)

                Specifies whether the DB instance is encrypted.

              • TdeCredentialArn — (String)

                The ARN from the key store with which the instance is associated for TDE encryption.

              • VpcSecurityGroups — (Array<map>)

                A list of VPC security groups that the DB instance belongs to.

                • VpcSecurityGroupId — (String)

                  The name of the VPC security group.

                • Status — (String)

                  The status of the VPC security group.

              • MultiAz — (Boolean)

                Whether the DB instance is a multiple Availability Zone deployment.

              • EnhancedMonitoringResourceArn — (String)

                The ARN of the CloudWatch Logs log stream that receives the enhanced monitoring metrics data for the DB instance.

              • DbInstanceStatus — (String)

                The current status of the DB instance.

              • MasterUsername — (String)

                The master user name of the DB instance.

              • AllocatedStorage — (Integer)

                The amount of storage (in gigabytes) to initially allocate for the DB instance.

              • PreferredBackupWindow — (String)

                The range of time each day when automated backups are created, if automated backups are enabled.

                Uses the format HH:MM-HH:MM. For example, 04:52-05:22.

              • BackupRetentionPeriod — (Integer)

                The number of days for which to retain automated backups.

              • DbSecurityGroups — (Array<String>)

                A list of the DB security groups to assign to the DB instance.

              • DbParameterGroups — (Array<map>)

                A list of the DB parameter groups to assign to the DB instance.

                • DbParameterGroupName — (String)

                  The name of the parameter group.

                • ParameterApplyStatus — (String)

                  The status of parameter updates.

              • AvailabilityZone — (String)

                The Availability Zone where the DB instance will be created.

              • DbSubnetGroup — (map)

                Information about the subnet group that is associated with the DB instance.

                • DbSubnetGroupName — (String)

                  The name of the subnet group.

                • DbSubnetGroupDescription — (String)

                  The description of the subnet group.

                • VpcId — (String)

                  The VPC ID of the subnet group.

                • SubnetGroupStatus — (String)

                  The status of the subnet group.

                • Subnets — (Array<map>)

                  A list of subnets in the subnet group.

                  • SubnetIdentifier — (String)

                    The identifier of a subnet in the subnet group.

                  • SubnetAvailabilityZone — (map)

                    Information about the Availability Zone for a subnet in the subnet group.

                    • Name — (String)

                      The name of the Availability Zone for a subnet in the subnet group.

                  • SubnetStatus — (String)

                    The status of a subnet in the subnet group.

                • DbSubnetGroupArn — (String)

                  The ARN of the subnet group.

              • PreferredMaintenanceWindow — (String)

                The weekly time range during which system maintenance can occur, in Universal Coordinated Time (UTC).

                Uses the format <day>:HH:MM-<day>:HH:MM.

                For the day values, use mon|tue|wed|thu|fri|sat|sun.

                For example, sun:09:32-sun:10:02.

              • PendingModifiedValues — (map)

                Changes to the DB instance that are currently pending.

                • DbInstanceClass — (String)

                  The new DB instance class for the DB instance.

                • AllocatedStorage — (Integer)

                  The new value of the allocated storage for the DB instance.

                • MasterUserPassword — (String)

                  The new master user password for the DB instance.

                • Port — (Integer)

                  The new port for the DB instance.

                • BackupRetentionPeriod — (Integer)

                  The new backup retention period for the DB instance.

                • MultiAZ — (Boolean)

                  Indicates that a single Availability Zone DB instance is changing to a multiple Availability Zone deployment.

                • EngineVersion — (String)

                  The new engine version for the DB instance.

                • LicenseModel — (String)

                  The new license model value for the DB instance.

                • Iops — (Integer)

                  The new provisioned IOPS value for the DB instance.

                • DbInstanceIdentifier — (String)

                  The new DB instance identifier for the DB instance.

                • StorageType — (String)

                  The new storage type for the DB instance.

                • CaCertificateIdentifier — (String)

                  The new CA certificate identifier for the DB instance.

                • DbSubnetGroupName — (String)

                  The name of the new subnet group for the DB instance.

                • PendingCloudWatchLogsExports — (map)

                  A list of log types that are being enabled or disabled.

                  • LogTypesToEnable — (Array<String>)

                    A list of log types that are being enabled.

                  • LogTypesToDisable — (Array<String>)

                    A list of log types that are being disabled.

                • ProcessorFeatures — (Array<map>)

                  Processor features that are being updated.

                  • Name — (String)

                    The name of the processor feature. Valid values are coreCount or threadsPerCore.

                  • Value — (String)

                    The value of the processor feature.

              • LatestRestorableTime — (String)

                Specifies the latest time to which a database can be restored with point-in-time restore.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • AutoMinorVersionUpgrade — (Boolean)

                Indicates whether minor version patches are applied automatically.

              • ReadReplicaSourceDBInstanceIdentifier — (String)

                If this DB instance is a read replica, contains the identifier of the source DB instance.

              • ReadReplicaDBInstanceIdentifiers — (Array<String>)

                List of identifiers of the read replicas associated with this DB instance.

              • ReadReplicaDBClusterIdentifiers — (Array<String>)

                List of identifiers of Aurora DB clusters to which the RDS DB instance is replicated as a read replica.

              • LicenseModel — (String)

                License model information for this DB instance.

              • Iops — (Integer)

                Specifies the provisioned IOPS (I/O operations per second) for this DB instance.

              • OptionGroupMemberships — (Array<map>)

                The list of option group memberships for this DB instance.

                • OptionGroupName — (String)

                  The name of the option group.

                • Status — (String)

                  The status of the option group membership.

              • CharacterSetName — (String)

                The name of the character set that this DB instance is associated with.

              • SecondaryAvailabilityZone — (String)

                For a DB instance with multi-Availability Zone support, the name of the secondary Availability Zone.

              • StatusInfos — (Array<map>)

                The status of a read replica. If the instance isn't a read replica, this is empty.

                • StatusType — (String)

                  The type of status. For a read replica, the status type is read replication.

                • Normal — (Boolean)

                  Whether the read replica instance is operating normally.

                • Status — (String)

                  The status of the read replica instance.

                • Message — (String)

                  If the read replica is currently in an error state, provides the error details.

              • StorageType — (String)

                The storage type for the DB instance.

              • DomainMemberships — (Array<map>)

                The Active Directory domain membership records associated with the DB instance.

                • Domain — (String)

                  The identifier of the Active Directory domain.

                • Status — (String)

                  The status of the Active Directory Domain membership for the DB instance.

                • Fqdn — (String)

                  The fully qualified domain name of the Active Directory domain.

                • IamRoleName — (String)

                  The name of the IAM role to use when making API calls to the Directory Service.

              • CopyTagsToSnapshot — (Boolean)

                Whether to copy resource tags to snapshots of the DB instance.

              • MonitoringInterval — (Integer)

                The interval, in seconds, between points when enhanced monitoring metrics are collected for the DB instance.

              • MonitoringRoleArn — (String)

                The ARN for the IAM role that permits Amazon RDS to send enhanced monitoring metrics to CloudWatch Logs.

              • PromotionTier — (Integer)

                The order in which to promote an Aurora replica to the primary instance after a failure of the existing primary instance.

              • Timezone — (String)

                The time zone of the DB instance.

              • PerformanceInsightsEnabled — (Boolean)

                Indicates whether Performance Insights is enabled for the DB instance.

              • PerformanceInsightsKmsKeyId — (String)

                The identifier of the KMS key used to encrypt the Performance Insights data.

              • PerformanceInsightsRetentionPeriod — (Integer)

                The number of days to retain Performance Insights data.

              • EnabledCloudWatchLogsExports — (Array<String>)

                A list of log types that this DB instance is configured to export to CloudWatch Logs.

              • ProcessorFeatures — (Array<map>)

                The number of CPU cores and the number of threads per core for the DB instance class of the DB instance.

                • Name — (String)

                  The name of the processor feature. Valid values are coreCount or threadsPerCore.

                • Value — (String)

                  The value of the processor feature.

              • ListenerEndpoint — (map)

                Specifies the connection endpoint.

                • Address — (String)

                  Specifies the DNS address of the DB instance.

                • Port — (Integer)

                  Specifies the port that the database engine is listening on.

                • HostedZoneId — (String)

                  Specifies the ID that Amazon Route 53 assigns when you create a hosted zone.

              • MaxAllocatedStorage — (Integer)

                The upper limit to which Amazon RDS can automatically scale the storage of the DB instance.

            • AwsSnsTopic — (map)

              Details about an SNS topic.

              • KmsMasterKeyId — (String)

                The ID of an Amazon Web Services managed key for Amazon SNS or a customer managed key.

              • Subscription — (Array<map>)

                Subscription is an embedded property that describes the subscription endpoints of an Amazon SNS topic.

                • Endpoint — (String)

                  The subscription's endpoint (format depends on the protocol).

                • Protocol — (String)

                  The subscription's protocol.

              • TopicName — (String)

                The name of the Amazon SNS topic.

              • Owner — (String)

                The subscription's owner.

              • SqsSuccessFeedbackRoleArn — (String)

                Indicates successful message delivery status for an Amazon SNS topic that is subscribed to an Amazon SQS endpoint.

              • SqsFailureFeedbackRoleArn — (String)

                Indicates failed message delivery status for an Amazon SNS topic that is subscribed to an Amazon SQS endpoint.

              • ApplicationSuccessFeedbackRoleArn — (String)

                Indicates failed message delivery status for an Amazon SNS topic that is subscribed to a platform application endpoint.

              • FirehoseSuccessFeedbackRoleArn — (String)

                Indicates successful message delivery status for an Amazon SNS topic that is subscribed to an Amazon Kinesis Data Firehose endpoint.

              • FirehoseFailureFeedbackRoleArn — (String)

                Indicates failed message delivery status for an Amazon SNS topic that is subscribed to an Amazon Kinesis Data Firehose endpoint.

              • HttpSuccessFeedbackRoleArn — (String)

                Indicates successful message delivery status for an Amazon SNS topic that is subscribed to an HTTP endpoint.

              • HttpFailureFeedbackRoleArn — (String)

                Indicates failed message delivery status for an Amazon SNS topic that is subscribed to an HTTP endpoint.

            • AwsSqsQueue — (map)

              Details about an SQS queue.

              • KmsDataKeyReusePeriodSeconds — (Integer)

                The length of time, in seconds, for which Amazon SQS can reuse a data key to encrypt or decrypt messages before calling KMS again.

              • KmsMasterKeyId — (String)

                The ID of an Amazon Web Services managed key for Amazon SQS or a custom KMS key.

              • QueueName — (String)

                The name of the new queue.

              • DeadLetterTargetArn — (String)

                The ARN of the dead-letter queue to which Amazon SQS moves messages after the value of maxReceiveCount is exceeded.

            • AwsWafWebAcl — (map)

              Details for an WAF web ACL.

              • Name — (String)

                A friendly name or description of the web ACL. You can't change the name of a web ACL after you create it.

              • DefaultAction — (String)

                The action to perform if none of the rules contained in the web ACL match.

              • Rules — (Array<map>)

                An array that contains the action for each rule in a web ACL, the priority of the rule, and the ID of the rule.

                • Action — (map)

                  Specifies the action that CloudFront or WAF takes when a web request matches the conditions in the rule.

                  • Type — (String)

                    Specifies how you want WAF to respond to requests that match the settings in a rule.

                    Valid settings include the following:

                    • ALLOW - WAF allows requests

                    • BLOCK - WAF blocks requests

                    • COUNT - WAF increments a counter of the requests that match all of the conditions in the rule. WAF then continues to inspect the web request based on the remaining rules in the web ACL. You can't specify COUNT for the default action for a web ACL.

                • ExcludedRules — (Array<map>)

                  Rules to exclude from a rule group.

                  • RuleId — (String)

                    The unique identifier for the rule to exclude from the rule group.

                • OverrideAction — (map)

                  Use the OverrideAction to test your RuleGroup.

                  Any rule in a RuleGroup can potentially block a request. If you set the OverrideAction to None, the RuleGroup blocks a request if any individual rule in the RuleGroup matches the request and is configured to block that request.

                  However, if you first want to test the RuleGroup, set the OverrideAction to Count. The RuleGroup then overrides any block action specified by individual rules contained within the group. Instead of blocking matching requests, those requests are counted.

                  ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a web ACL. In this case you do not use ActivatedRule Action. For all other update requests, ActivatedRule Action is used instead of ActivatedRule OverrideAction.

                  • Type — (String)

                    COUNT overrides the action specified by the individual rule within a RuleGroup .

                    If set to NONE, the rule's action takes place.

                • Priority — (Integer)

                  Specifies the order in which the rules in a web ACL are evaluated. Rules with a lower value for Priority are evaluated before rules with a higher value. The value must be a unique integer. If you add multiple rules to a web ACL, the values do not need to be consecutive.

                • RuleId — (String)

                  The identifier for a rule.

                • Type — (String)

                  The rule type.

                  Valid values: REGULAR | RATE_BASED | GROUP

                  The default is REGULAR.

              • WebAclId — (String)

                A unique identifier for a web ACL.

            • AwsRdsDbSnapshot — (map)

              Details about an Amazon RDS database snapshot.

              • DbSnapshotIdentifier — (String)

                The name or ARN of the DB snapshot that is used to restore the DB instance.

              • DbInstanceIdentifier — (String)

                A name for the DB instance.

              • SnapshotCreateTime — (String)

                When the snapshot was taken in Coordinated Universal Time (UTC).

              • Engine — (String)

                The name of the database engine to use for this DB instance. Valid values are as follows:

                • aurora

                • aurora-mysql

                • aurora-postgresql

                • c

                • mariadb

                • mysql

                • oracle-ee

                • oracle-se

                • oracle-se1

                • oracle-se2

                • sqlserver-ee

                • sqlserver-ex

                • sqlserver-se

                • sqlserver-web

              • AllocatedStorage — (Integer)

                The amount of storage (in gigabytes) to be initially allocated for the database instance.

              • Status — (String)

                The status of this DB snapshot.

              • Port — (Integer)

                The port that the database engine was listening on at the time of the snapshot.

              • AvailabilityZone — (String)

                Specifies the name of the Availability Zone in which the DB instance was located at the time of the DB snapshot.

              • VpcId — (String)

                The VPC ID associated with the DB snapshot.

              • InstanceCreateTime — (String)

                Specifies the time in Coordinated Universal Time (UTC) when the DB instance, from which the snapshot was taken, was created.

              • MasterUsername — (String)

                The master user name for the DB snapshot.

              • EngineVersion — (String)

                The version of the database engine.

              • LicenseModel — (String)

                License model information for the restored DB instance.

              • SnapshotType — (String)

                The type of the DB snapshot.

              • Iops — (Integer)

                The provisioned IOPS (I/O operations per second) value of the DB instance at the time of the snapshot.

              • OptionGroupName — (String)

                The option group name for the DB snapshot.

              • PercentProgress — (Integer)

                The percentage of the estimated data that has been transferred.

              • SourceRegion — (String)

                The Amazon Web Services Region that the DB snapshot was created in or copied from.

              • SourceDbSnapshotIdentifier — (String)

                The DB snapshot ARN that the DB snapshot was copied from.

              • StorageType — (String)

                The storage type associated with the DB snapshot. Valid values are as follows:

                • gp2

                • io1

                • standard

              • TdeCredentialArn — (String)

                The ARN from the key store with which to associate the instance for TDE encryption.

              • Encrypted — (Boolean)

                Whether the DB snapshot is encrypted.

              • KmsKeyId — (String)

                If Encrypted is true, the KMS key identifier for the encrypted DB snapshot.

              • Timezone — (String)

                The time zone of the DB snapshot.

              • IamDatabaseAuthenticationEnabled — (Boolean)

                Whether mapping of IAM accounts to database accounts is enabled.

              • ProcessorFeatures — (Array<map>)

                The number of CPU cores and the number of threads per core for the DB instance class of the DB instance.

                • Name — (String)

                  The name of the processor feature. Valid values are coreCount or threadsPerCore.

                • Value — (String)

                  The value of the processor feature.

              • DbiResourceId — (String)

                The identifier for the source DB instance.

            • AwsRdsDbClusterSnapshot — (map)

              Details about an Amazon RDS database cluster snapshot.

              • AvailabilityZones — (Array<String>)

                A list of Availability Zones where instances in the DB cluster can be created.

              • SnapshotCreateTime — (String)

                Indicates when the snapshot was taken.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • Engine — (String)

                The name of the database engine that you want to use for this DB instance.

              • AllocatedStorage — (Integer)

                Specifies the allocated storage size in gibibytes (GiB).

              • Status — (String)

                The status of this DB cluster snapshot.

              • Port — (Integer)

                The port number on which the DB instances in the DB cluster accept connections.

              • VpcId — (String)

                The VPC ID that is associated with the DB cluster snapshot.

              • ClusterCreateTime — (String)

                Indicates when the DB cluster was created, in Universal Coordinated Time (UTC).

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • MasterUsername — (String)

                The name of the master user for the DB cluster.

              • EngineVersion — (String)

                The version of the database engine to use.

              • LicenseModel — (String)

                The license model information for this DB cluster snapshot.

              • SnapshotType — (String)

                The type of DB cluster snapshot.

              • PercentProgress — (Integer)

                Specifies the percentage of the estimated data that has been transferred.

              • StorageEncrypted — (Boolean)

                Whether the DB cluster is encrypted.

              • KmsKeyId — (String)

                The ARN of the KMS master key that is used to encrypt the database instances in the DB cluster.

              • DbClusterIdentifier — (String)

                The DB cluster identifier.

              • DbClusterSnapshotIdentifier — (String)

                The identifier of the DB cluster snapshot.

              • IamDatabaseAuthenticationEnabled — (Boolean)

                Whether mapping of IAM accounts to database accounts is enabled.

              • DbClusterSnapshotAttributes — (Array<map>)

                Contains the name and values of a manual DB cluster snapshot attribute.

                • AttributeName — (String)

                  The name of the manual DB cluster snapshot attribute. The attribute named restore refers to the list of Amazon Web Services accounts that have permission to copy or restore the manual DB cluster snapshot.

                • AttributeValues — (Array<String>)

                  The value(s) for the manual DB cluster snapshot attribute. If the AttributeName field is set to restore, then this element returns a list of IDs of the Amazon Web Services accounts that are authorized to copy or restore the manual DB cluster snapshot. If a value of all is in the list, then the manual DB cluster snapshot is public and available for any Amazon Web Services account to copy or restore.

            • AwsRdsDbCluster — (map)

              Details about an Amazon RDS database cluster.

              • AllocatedStorage — (Integer)

                For all database engines except Aurora, specifies the allocated storage size in gibibytes (GiB).

              • AvailabilityZones — (Array<String>)

                A list of Availability Zones (AZs) where instances in the DB cluster can be created.

              • BackupRetentionPeriod — (Integer)

                The number of days for which automated backups are retained.

              • DatabaseName — (String)

                The name of the database.

              • Status — (String)

                The current status of this DB cluster.

              • Endpoint — (String)

                The connection endpoint for the primary instance of the DB cluster.

              • ReaderEndpoint — (String)

                The reader endpoint for the DB cluster.

              • CustomEndpoints — (Array<String>)

                A list of custom endpoints for the DB cluster.

              • MultiAz — (Boolean)

                Whether the DB cluster has instances in multiple Availability Zones.

              • Engine — (String)

                The name of the database engine to use for this DB cluster. Valid values are as follows:

                • aurora

                • aurora-mysql

                • aurora-postgresql

              • EngineVersion — (String)

                The version number of the database engine to use.

              • Port — (Integer)

                The port number on which the DB instances in the DB cluster accept connections.

              • MasterUsername — (String)

                The name of the master user for the DB cluster.

              • PreferredBackupWindow — (String)

                The range of time each day when automated backups are created, if automated backups are enabled.

                Uses the format HH:MM-HH:MM. For example, 04:52-05:22.

              • PreferredMaintenanceWindow — (String)

                The weekly time range during which system maintenance can occur, in Universal Coordinated Time (UTC).

                Uses the format <day>:HH:MM-<day>:HH:MM.

                For the day values, use mon|tue|wed|thu|fri|sat|sun.

                For example, sun:09:32-sun:10:02.

              • ReadReplicaIdentifiers — (Array<String>)

                The identifiers of the read replicas that are associated with this DB cluster.

              • VpcSecurityGroups — (Array<map>)

                A list of VPC security groups that the DB cluster belongs to.

                • VpcSecurityGroupId — (String)

                  The name of the VPC security group.

                • Status — (String)

                  The status of the VPC security group.

              • HostedZoneId — (String)

                Specifies the identifier that Amazon Route 53 assigns when you create a hosted zone.

              • StorageEncrypted — (Boolean)

                Whether the DB cluster is encrypted.

              • KmsKeyId — (String)

                The ARN of the KMS master key that is used to encrypt the database instances in the DB cluster.

              • DbClusterResourceId — (String)

                The identifier of the DB cluster. The identifier must be unique within each Amazon Web Services Region and is immutable.

              • AssociatedRoles — (Array<map>)

                A list of the IAM roles that are associated with the DB cluster.

                • RoleArn — (String)

                  The ARN of the IAM role.

                • Status — (String)

                  The status of the association between the IAM role and the DB cluster. Valid values are as follows:

                  • ACTIVE

                  • INVALID

                  • PENDING

              • ClusterCreateTime — (String)

                Indicates when the DB cluster was created, in Universal Coordinated Time (UTC).

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • EnabledCloudWatchLogsExports — (Array<String>)

                A list of log types that this DB cluster is configured to export to CloudWatch Logs.

              • EngineMode — (String)

                The database engine mode of the DB cluster.Valid values are as follows:

                • global

                • multimaster

                • parallelquery

                • provisioned

                • serverless

              • DeletionProtection — (Boolean)

                Whether the DB cluster has deletion protection enabled.

              • HttpEndpointEnabled — (Boolean)

                Whether the HTTP endpoint for an Aurora Serverless DB cluster is enabled.

              • ActivityStreamStatus — (String)

                The status of the database activity stream. Valid values are as follows:

                • started

                • starting

                • stopped

                • stopping

              • CopyTagsToSnapshot — (Boolean)

                Whether tags are copied from the DB cluster to snapshots of the DB cluster.

              • CrossAccountClone — (Boolean)

                Whether the DB cluster is a clone of a DB cluster owned by a different Amazon Web Services account.

              • DomainMemberships — (Array<map>)

                The Active Directory domain membership records that are associated with the DB cluster.

                • Domain — (String)

                  The identifier of the Active Directory domain.

                • Status — (String)

                  The status of the Active Directory Domain membership for the DB instance.

                • Fqdn — (String)

                  The fully qualified domain name of the Active Directory domain.

                • IamRoleName — (String)

                  The name of the IAM role to use when making API calls to the Directory Service.

              • DbClusterParameterGroup — (String)

                The name of the DB cluster parameter group for the DB cluster.

              • DbSubnetGroup — (String)

                The subnet group that is associated with the DB cluster, including the name, description, and subnets in the subnet group.

              • DbClusterOptionGroupMemberships — (Array<map>)

                The list of option group memberships for this DB cluster.

                • DbClusterOptionGroupName — (String)

                  The name of the DB cluster option group.

                • Status — (String)

                  The status of the DB cluster option group.

              • DbClusterIdentifier — (String)

                The DB cluster identifier that the user assigned to the cluster. This identifier is the unique key that identifies a DB cluster.

              • DbClusterMembers — (Array<map>)

                The list of instances that make up the DB cluster.

                • IsClusterWriter — (Boolean)

                  Whether the cluster member is the primary instance for the DB cluster.

                • PromotionTier — (Integer)

                  Specifies the order in which an Aurora replica is promoted to the primary instance when the existing primary instance fails.

                • DbInstanceIdentifier — (String)

                  The instance identifier for this member of the DB cluster.

                • DbClusterParameterGroupStatus — (String)

                  The status of the DB cluster parameter group for this member of the DB cluster.

              • IamDatabaseAuthenticationEnabled — (Boolean)

                Whether the mapping of IAM accounts to database accounts is enabled.

              • AutoMinorVersionUpgrade — (Boolean)

                Indicates if minor version upgrades are automatically applied to the cluster.

            • AwsEcsCluster — (map)

              Details about an Amazon ECS cluster.

              • ClusterArn — (String)

                The Amazon Resource Name (ARN) that identifies the cluster.

              • ActiveServicesCount — (Integer)

                The number of services that are running on the cluster in an ACTIVE state. You can view these services with the Amazon ECS ListServices API operation.

              • CapacityProviders — (Array<String>)

                The short name of one or more capacity providers to associate with the cluster.

              • ClusterSettings — (Array<map>)

                The setting to use to create the cluster. Specifically used to configure whether to enable CloudWatch Container Insights for the cluster.

                • Name — (String)

                  The name of the setting. The valid value is containerInsights.

                • Value — (String)

                  The value of the setting. Valid values are disabled or enabled.

              • Configuration — (map)

                The run command configuration for the cluster.

                • ExecuteCommandConfiguration — (map)

                  Contains the run command configuration for the cluster.

                  • KmsKeyId — (String)

                    The identifier of the KMS key that is used to encrypt the data between the local client and the container.

                  • LogConfiguration — (map)

                    The log configuration for the results of the run command actions. Required if Logging is NONE.

                    • CloudWatchEncryptionEnabled — (Boolean)

                      Whether to enable encryption on the CloudWatch logs.

                    • CloudWatchLogGroupName — (String)

                      The name of the CloudWatch log group to send the logs to.

                    • S3BucketName — (String)

                      The name of the S3 bucket to send logs to.

                    • S3EncryptionEnabled — (Boolean)

                      Whether to encrypt the logs that are sent to the S3 bucket.

                    • S3KeyPrefix — (String)

                      Identifies the folder in the S3 bucket to send the logs to.

                  • Logging — (String)

                    The log setting to use for redirecting logs for run command results.

              • DefaultCapacityProviderStrategy — (Array<map>)

                The default capacity provider strategy for the cluster. The default capacity provider strategy is used when services or tasks are run without a specified launch type or capacity provider strategy.

                • Base — (Integer)

                  The minimum number of tasks to run on the specified capacity provider.

                • CapacityProvider — (String)

                  The name of the capacity provider.

                • Weight — (Integer)

                  The relative percentage of the total number of tasks launched that should use the capacity provider.

              • ClusterName — (String)

                A name that you use to identify your cluster.

              • RegisteredContainerInstancesCount — (Integer)

                The number of container instances registered into the cluster. This includes container instances in both ACTIVE and DRAINING status.

              • RunningTasksCount — (Integer)

                The number of tasks in the cluster that are in the RUNNING state.

              • Status — (String)

                The status of the cluster.

            • AwsEcsContainer — (map)

              Provides information about a Docker container that's part of a task.

              • Name — (String)

                The name of the container.

              • Image — (String)

                The image used for the container.

              • MountPoints — (Array<map>)

                The mount points for data volumes in your container.

                • SourceVolume — (String)

                  The name of the volume to mount. Must be a volume name referenced in the name parameter of task definition volume.

                • ContainerPath — (String)

                  The path on the container to mount the host volume at.

              • Privileged — (Boolean)

                When this parameter is true, the container is given elevated privileges on the host container instance (similar to the root user).

            • AwsEcsTaskDefinition — (map)

              Details about a task definition. A task definition describes the container and volume definitions of an Amazon Elastic Container Service task.

              • ContainerDefinitions — (Array<map>)

                The container definitions that describe the containers that make up the task.

                • Command — (Array<String>)

                  The command that is passed to the container.

                • Cpu — (Integer)

                  The number of CPU units reserved for the container.

                • DependsOn — (Array<map>)

                  The dependencies that are defined for container startup and shutdown.

                  • Condition — (String)

                    The dependency condition of the dependent container. Indicates the required status of the dependent container before the current container can start. Valid values are as follows:

                    • COMPLETE

                    • HEALTHY

                    • SUCCESS

                    • START

                  • ContainerName — (String)

                    The name of the dependent container.

                • DisableNetworking — (Boolean)

                  Whether to disable networking within the container.

                • DnsSearchDomains — (Array<String>)

                  A list of DNS search domains that are presented to the container.

                • DnsServers — (Array<String>)

                  A list of DNS servers that are presented to the container.

                • DockerLabels — (map<String>)

                  A key-value map of labels to add to the container.

                • DockerSecurityOptions — (Array<String>)

                  A list of strings to provide custom labels for SELinux and AppArmor multi-level security systems.

                • EntryPoint — (Array<String>)

                  The entry point that is passed to the container.

                • Environment — (Array<map>)

                  The environment variables to pass to a container.

                  • Name — (String)

                    The name of the environment variable.

                  • Value — (String)

                    The value of the environment variable.

                • EnvironmentFiles — (Array<map>)

                  A list of files containing the environment variables to pass to a container.

                  • Type — (String)

                    The type of environment file. The valid value is s3.

                  • Value — (String)

                    The ARN of the S3 object that contains the environment variable file.

                • Essential — (Boolean)

                  Whether the container is essential. All tasks must have at least one essential container.

                • ExtraHosts — (Array<map>)

                  A list of hostnames and IP address mappings to append to the /etc/hosts file on the container.

                  • Hostname — (String)

                    The hostname to use in the /etc/hosts entry.

                  • IpAddress — (String)

                    The IP address to use in the /etc/hosts entry.

                • FirelensConfiguration — (map)

                  The FireLens configuration for the container. Specifies and configures a log router for container logs.

                  • Options — (map<String>)

                    The options to use to configure the log router.

                    The valid option keys are as follows:

                    • enable-ecs-log-metadata. The value can be true or false.

                    • config-file-type. The value can be s3 or file.

                    • config-file-value. The value is either an S3 ARN or a file path.

                  • Type — (String)

                    The log router to use. Valid values are fluentbit or fluentd.

                • HealthCheck — (map)

                  The container health check command and associated configuration parameters for the container.

                  • Command — (Array<String>)

                    The command that the container runs to determine whether it is healthy.

                  • Interval — (Integer)

                    The time period in seconds between each health check execution. The default value is 30 seconds.

                  • Retries — (Integer)

                    The number of times to retry a failed health check before the container is considered unhealthy. The default value is 3.

                  • StartPeriod — (Integer)

                    The optional grace period in seconds that allows containers time to bootstrap before failed health checks count towards the maximum number of retries.

                  • Timeout — (Integer)

                    The time period in seconds to wait for a health check to succeed before it is considered a failure. The default value is 5.

                • Hostname — (String)

                  The hostname to use for the container.

                • Image — (String)

                  The image used to start the container.

                • Interactive — (Boolean)

                  If set to true, then containerized applications can be deployed that require stdin or a tty to be allocated.

                • Links — (Array<String>)

                  A list of links for the container in the form container_name:alias . Allows containers to communicate with each other without the need for port mappings.

                • LinuxParameters — (map)

                  Linux-specific modifications that are applied to the container, such as Linux kernel capabilities.

                  • Capabilities — (map)

                    The Linux capabilities for the container that are added to or dropped from the default configuration provided by Docker.

                    • Add — (Array<String>)

                      The Linux capabilities for the container that are added to the default configuration provided by Docker. Valid values are as follows:

                      Valid values: "ALL" | "AUDIT_CONTROL" | "AUDIT_WRITE" | "BLOCK_SUSPEND" | "CHOWN" | "DAC_OVERRIDE" | "DAC_READ_SEARCH" | "FOWNER" | "FSETID" | "IPC_LOCK" | "IPC_OWNER" | "KILL" | "LEASE" | "LINUX_IMMUTABLE" | "MAC_ADMIN" | "MAC_OVERRIDE" | "MKNOD" | "NET_ADMIN" | "NET_BIND_SERVICE" | "NET_BROADCAST" | "NET_RAW" | "SETFCAP" | "SETGID" | "SETPCAP" | "SETUID" | "SYS_ADMIN" | "SYS_BOOT" | "SYS_CHROOT" | "SYS_MODULE" | "SYS_NICE" | "SYS_PACCT" | "SYS_PTRACE" | "SYS_RAWIO" | "SYS_RESOURCE" | "SYS_TIME" | "SYS_TTY_CONFIG" | "SYSLOG" | "WAKE_ALARM"

                    • Drop — (Array<String>)

                      The Linux capabilities for the container that are dropped from the default configuration provided by Docker.

                      Valid values: "ALL" | "AUDIT_CONTROL" | "AUDIT_WRITE" | "BLOCK_SUSPEND" | "CHOWN" | "DAC_OVERRIDE" | "DAC_READ_SEARCH" | "FOWNER" | "FSETID" | "IPC_LOCK" | "IPC_OWNER" | "KILL" | "LEASE" | "LINUX_IMMUTABLE" | "MAC_ADMIN" | "MAC_OVERRIDE" | "MKNOD" | "NET_ADMIN" | "NET_BIND_SERVICE" | "NET_BROADCAST" | "NET_RAW" | "SETFCAP" | "SETGID" | "SETPCAP" | "SETUID" | "SYS_ADMIN" | "SYS_BOOT" | "SYS_CHROOT" | "SYS_MODULE" | "SYS_NICE" | "SYS_PACCT" | "SYS_PTRACE" | "SYS_RAWIO" | "SYS_RESOURCE" | "SYS_TIME" | "SYS_TTY_CONFIG" | "SYSLOG" | "WAKE_ALARM"

                  • Devices — (Array<map>)

                    The host devices to expose to the container.

                    • ContainerPath — (String)

                      The path inside the container at which to expose the host device.

                    • HostPath — (String)

                      The path for the device on the host container instance.

                    • Permissions — (Array<String>)

                      The explicit permissions to provide to the container for the device. By default, the container has permissions for read, write, and mknod for the device.

                  • InitProcessEnabled — (Boolean)

                    Whether to run an init process inside the container that forwards signals and reaps processes.

                  • MaxSwap — (Integer)

                    The total amount of swap memory (in MiB) that a container can use.

                  • SharedMemorySize — (Integer)

                    The value for the size (in MiB) of the /dev/shm volume.

                  • Swappiness — (Integer)

                    Configures the container's memory swappiness behavior. Determines how aggressively pages are swapped. The higher the value, the more aggressive the swappiness. The default is 60.

                  • Tmpfs — (Array<map>)

                    The container path, mount options, and size (in MiB) of the tmpfs mount.

                    • ContainerPath — (String)

                      The absolute file path where the tmpfs volume is to be mounted.

                    • MountOptions — (Array<String>)

                      The list of tmpfs volume mount options.

                      Valid values: "defaults" | "ro" | "rw" | "suid" | "nosuid" | "dev" | "nodev" | "exec" | "noexec" | "sync" | "async" | "dirsync" | "remount" | "mand" | "nomand" | "atime" | "noatime" | "diratime" | "nodiratime" | "bind" | "rbind" | "unbindable" | "runbindable" | "private" | "rprivate" | "shared" | "rshared" | "slave" | "rslave" | "relatime" | "norelatime" | "strictatime" | "nostrictatime" | "mode" | "uid" | "gid" | "nr_inodes" | "nr_blocks" | "mpol"

                    • Size — (Integer)

                      The maximum size (in MiB) of the tmpfs volume.

                • LogConfiguration — (map)

                  The log configuration specification for the container.

                  • LogDriver — (String)

                    The log driver to use for the container.

                    Valid values on Fargate are as follows:

                    • awsfirelens

                    • awslogs

                    • splunk

                    Valid values on Amazon EC2 are as follows:

                    • awsfirelens

                    • awslogs

                    • fluentd

                    • gelf

                    • journald

                    • json-file

                    • logentries

                    • splunk

                    • syslog

                  • Options — (map<String>)

                    The configuration options to send to the log driver. Requires version 1.19 of the Docker Remote API or greater on your container instance.

                  • SecretOptions — (Array<map>)

                    The secrets to pass to the log configuration.

                    • Name — (String)

                      The name of the secret.

                    • ValueFrom — (String)

                      The secret to expose to the container.

                      The value is either the full ARN of the Secrets Manager secret or the full ARN of the parameter in the Systems Manager Parameter Store.

                • Memory — (Integer)

                  The amount (in MiB) of memory to present to the container. If the container attempts to exceed the memory specified here, the container is shut down. The total amount of memory reserved for all containers within a task must be lower than the task memory value, if one is specified.

                • MemoryReservation — (Integer)

                  The soft limit (in MiB) of memory to reserve for the container.

                • MountPoints — (Array<map>)

                  The mount points for the data volumes in the container.

                  • ContainerPath — (String)

                    The path on the container to mount the host volume at.

                  • ReadOnly — (Boolean)

                    Whether the container has read-only access to the volume.

                  • SourceVolume — (String)

                    The name of the volume to mount. Must match the name of a volume listed in VolumeDetails for the task definition.

                • Name — (String)

                  The name of the container.

                • PortMappings — (Array<map>)

                  The list of port mappings for the container.

                  • ContainerPort — (Integer)

                    The port number on the container that is bound to the user-specified or automatically assigned host port.

                  • HostPort — (Integer)

                    The port number on the container instance to reserve for the container.

                  • Protocol — (String)

                    The protocol used for the port mapping. The default is tcp.

                • Privileged — (Boolean)

                  Whether the container is given elevated privileges on the host container instance. The elevated privileges are similar to the root user.

                • PseudoTerminal — (Boolean)

                  Whether to allocate a TTY to the container.

                • ReadonlyRootFilesystem — (Boolean)

                  Whether the container is given read-only access to its root file system.

                • RepositoryCredentials — (map)

                  The private repository authentication credentials to use.

                  • CredentialsParameter — (String)

                    The ARN of the secret that contains the private repository credentials.

                • ResourceRequirements — (Array<map>)

                  The type and amount of a resource to assign to a container. The only supported resource is a GPU.

                  • Type — (String)

                    The type of resource to assign to a container. Valid values are GPU or InferenceAccelerator.

                  • Value — (String)

                    The value for the specified resource type.

                    For GPU, the value is the number of physical GPUs the Amazon ECS container agent reserves for the container.

                    For InferenceAccelerator, the value should match the DeviceName attribute of an entry in InferenceAccelerators.

                • Secrets — (Array<map>)

                  The secrets to pass to the container.

                  • Name — (String)

                    The name of the secret.

                  • ValueFrom — (String)

                    The secret to expose to the container. The value is either the full ARN of the Secrets Manager secret or the full ARN of the parameter in the Systems Manager Parameter Store.

                • StartTimeout — (Integer)

                  The number of seconds to wait before giving up on resolving dependencies for a container.

                • StopTimeout — (Integer)

                  The number of seconds to wait before the container is stopped if it doesn't shut down normally on its own.

                • SystemControls — (Array<map>)

                  A list of namespaced kernel parameters to set in the container.

                  • Namespace — (String)

                    The namespaced kernel parameter for which to set a value.

                  • Value — (String)

                    The value of the parameter.

                • Ulimits — (Array<map>)

                  A list of ulimits to set in the container.

                  • HardLimit — (Integer)

                    The hard limit for the ulimit type.

                  • Name — (String)

                    The type of the ulimit. Valid values are as follows:

                    • core

                    • cpu

                    • data

                    • fsize

                    • locks

                    • memlock

                    • msgqueue

                    • nice

                    • nofile

                    • nproc

                    • rss

                    • rtprio

                    • rttime

                    • sigpending

                    • stack

                  • SoftLimit — (Integer)

                    The soft limit for the ulimit type.

                • User — (String)

                  The user to use inside the container.

                  The value can use one of the following formats.

                  • user

                  • user : group

                  • uid

                  • uid : gid

                  • user : gid

                  • uid : group

                • VolumesFrom — (Array<map>)

                  Data volumes to mount from another container.

                  • ReadOnly — (Boolean)

                    Whether the container has read-only access to the volume.

                  • SourceContainer — (String)

                    The name of another container within the same task definition from which to mount volumes.

                • WorkingDirectory — (String)

                  The working directory in which to run commands inside the container.

              • Cpu — (String)

                The number of CPU units used by the task.Valid values are as follows:

                • 256 (.25 vCPU)

                • 512 (.5 vCPU)

                • 1024 (1 vCPU)

                • 2048 (2 vCPU)

                • 4096 (4 vCPU)

              • ExecutionRoleArn — (String)

                The ARN of the task execution role that grants the container agent permission to make API calls on behalf of the container user.

              • Family — (String)

                The name of a family that this task definition is registered to.

              • InferenceAccelerators — (Array<map>)

                The Elastic Inference accelerators to use for the containers in the task.

                • DeviceName — (String)

                  The Elastic Inference accelerator device name.

                • DeviceType — (String)

                  The Elastic Inference accelerator type to use.

              • IpcMode — (String)

                The inter-process communication (IPC) resource namespace to use for the containers in the task. Valid values are as follows:

                • host

                • none

                • task

              • Memory — (String)

                The amount (in MiB) of memory used by the task.

                For tasks that are hosted on Amazon EC2, you can provide a task-level memory value or a container-level memory value. For tasks that are hosted on Fargate, you must use one of the specified values in the Amazon Elastic Container Service Developer Guide , which determines your range of supported values for the Cpu and Memory parameters.

              • NetworkMode — (String)

                The Docker networking mode to use for the containers in the task. Valid values are as follows:

                • awsvpc

                • bridge

                • host

                • none

              • PidMode — (String)

                The process namespace to use for the containers in the task. Valid values are host or task.

              • PlacementConstraints — (Array<map>)

                The placement constraint objects to use for tasks.

                • Expression — (String)

                  A cluster query language expression to apply to the constraint.

                • Type — (String)

                  The type of constraint.

              • ProxyConfiguration — (map)

                The configuration details for the App Mesh proxy.

                • ContainerName — (String)

                  The name of the container that will serve as the App Mesh proxy.

                • ProxyConfigurationProperties — (Array<map>)

                  The set of network configuration parameters to provide to the Container Network Interface (CNI) plugin, specified as key-value pairs.

                  • Name — (String)

                    The name of the property.

                  • Value — (String)

                    The value of the property.

                • Type — (String)

                  The proxy type.

              • RequiresCompatibilities — (Array<String>)

                The task launch types that the task definition was validated against.

              • TaskRoleArn — (String)

                The short name or ARN of the IAM role that grants containers in the task permission to call Amazon Web Services API operations on your behalf.

              • Volumes — (Array<map>)

                The data volume definitions for the task.

                • DockerVolumeConfiguration — (map)

                  Information about a Docker volume.

                  • Autoprovision — (Boolean)

                    Whether to create the Docker volume automatically if it does not already exist.

                  • Driver — (String)

                    The Docker volume driver to use.

                  • DriverOpts — (map<String>)

                    A map of Docker driver-specific options that are passed through.

                  • Labels — (map<String>)

                    Custom metadata to add to the Docker volume.

                  • Scope — (String)

                    The scope for the Docker volume that determines its lifecycle. Docker volumes that are scoped to a task are provisioned automatically when the task starts and destroyed when the task stops. Docker volumes that are shared persist after the task stops. Valid values are shared or task.

                • EfsVolumeConfiguration — (map)

                  Information about the Amazon Elastic File System file system that is used for task storage.

                  • AuthorizationConfig — (map)

                    The authorization configuration details for the Amazon EFS file system.

                    • AccessPointId — (String)

                      The Amazon EFS access point identifier to use.

                    • Iam — (String)

                      Whether to use the Amazon ECS task IAM role defined in a task definition when mounting the Amazon EFS file system.

                  • FilesystemId — (String)

                    The Amazon EFS file system identifier to use.

                  • RootDirectory — (String)

                    The directory within the Amazon EFS file system to mount as the root directory inside the host.

                  • TransitEncryption — (String)

                    Whether to enable encryption for Amazon EFS data in transit between the Amazon ECS host and the Amazon EFS server.

                  • TransitEncryptionPort — (Integer)

                    The port to use when sending encrypted data between the Amazon ECS host and the Amazon EFS server.

                • Host — (map)

                  Information about a bind mount host volume.

                  • SourcePath — (String)

                    The path on the host container instance that is presented to the container.

                • Name — (String)

                  The name of the data volume.

              • Status — (String)

                The status of the task definition.

            • Container — (map)

              Details about a container resource related to a finding.

              • ContainerRuntime — (String)

                The runtime of the container.

              • Name — (String)

                The name of the container related to a finding.

              • ImageId — (String)

                The identifier of the container image related to a finding.

              • ImageName — (String)

                The name of the container image related to a finding.

              • LaunchedAt — (String)

                Indicates when the container started.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • VolumeMounts — (Array<map>)

                Provides information about the mounting of a volume in a container.

                • Name — (String)

                  The name of the volume.

                • MountPath — (String)

                  The path in the container at which the volume should be mounted.

              • Privileged — (Boolean)

                When this parameter is true, the container is given elevated privileges on the host container instance (similar to the root user).

            • Other — (map<String>)

              Details about a resource that are not available in a type-specific details object. Use the Other object in the following cases.

              • The type-specific object does not contain all of the fields that you want to populate. In this case, first use the type-specific object to populate those fields. Use the Other object to populate the fields that are missing from the type-specific object.

              • The resource type does not have a corresponding object. This includes resources for which the type is Other.

            • AwsRdsEventSubscription — (map)

              Details about an RDS event notification subscription.

              • CustSubscriptionId — (String)

                The identifier of the account that is associated with the event notification subscription.

              • CustomerAwsId — (String)

                The identifier of the event notification subscription.

              • Enabled — (Boolean)

                Whether the event notification subscription is enabled.

              • EventCategoriesList — (Array<String>)

                The list of event categories for the event notification subscription.

              • EventSubscriptionArn — (String)

                The ARN of the event notification subscription.

              • SnsTopicArn — (String)

                The ARN of the SNS topic to post the event notifications to.

              • SourceIdsList — (Array<String>)

                A list of source identifiers for the event notification subscription.

              • SourceType — (String)

                The source type for the event notification subscription.

              • Status — (String)

                The status of the event notification subscription.

                Valid values: creating | modifying | deleting | active | no-permission | topic-not-exist

              • SubscriptionCreationTime — (String)

                The datetime when the event notification subscription was created.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • AwsEcsService — (map)

              Details about a service within an ECS cluster.

              • CapacityProviderStrategy — (Array<map>)

                The capacity provider strategy that the service uses.

                • Base — (Integer)

                  The minimum number of tasks to run on the capacity provider. Only one strategy item can specify a value for Base.

                  The value must be between 0 and 100000.

                • CapacityProvider — (String)

                  The short name of the capacity provider.

                • Weight — (Integer)

                  The relative percentage of the total number of tasks that should use the capacity provider.

                  If no weight is specified, the default value is 0. At least one capacity provider must have a weight greater than 0.

                  The value can be between 0 and 1000.

              • Cluster — (String)

                The ARN of the cluster that hosts the service.

              • DeploymentConfiguration — (map)

                Deployment parameters for the service. Includes the number of tasks that run and the order in which to start and stop tasks.

                • DeploymentCircuitBreaker — (map)

                  Determines whether a service deployment fails if a service cannot reach a steady state.

                  • Enable — (Boolean)

                    Whether to enable the deployment circuit breaker logic for the service.

                  • Rollback — (Boolean)

                    Whether to roll back the service if a service deployment fails. If rollback is enabled, when a service deployment fails, the service is rolled back to the last deployment that completed successfully.

                • MaximumPercent — (Integer)

                  For a service that uses the rolling update (ECS) deployment type, the maximum number of tasks in a service that are allowed in the RUNNING or PENDING state during a deployment, and for tasks that use the EC2 launch type, when any container instances are in the DRAINING state. Provided as a percentage of the desired number of tasks. The default value is 200%.

                  For a service that uses the blue/green (CODE_DEPLOY) or EXTERNAL deployment types, and tasks that use the EC2 launch type, the maximum number of tasks in the service that remain in the RUNNING state while the container instances are in the DRAINING state.

                  For the Fargate launch type, the maximum percent value is not used.

                • MinimumHealthyPercent — (Integer)

                  For a service that uses the rolling update (ECS) deployment type, the minimum number of tasks in a service that must remain in the RUNNING state during a deployment, and while any container instances are in the DRAINING state if the service contains tasks using the EC2 launch type. Expressed as a percentage of the desired number of tasks. The default value is 100%.

                  For a service that uses the blue/green (CODE_DEPLOY) or EXTERNAL deployment types and tasks that use the EC2 launch type, the minimum number of the tasks in the service that remain in the RUNNING state while the container instances are in the DRAINING state.

                  For the Fargate launch type, the minimum healthy percent value is not used.

              • DeploymentController — (map)

                Contains the deployment controller type that the service uses.

                • Type — (String)

                  The rolling update (ECS) deployment type replaces the current running version of the container with the latest version.

                  The blue/green (CODE_DEPLOY) deployment type uses the blue/green deployment model that is powered by CodeDeploy. This deployment model a new deployment of a service can be verified before production traffic is sent to it.

                  The external (EXTERNAL) deployment type allows the use of any third-party deployment controller for full control over the deployment process for an Amazon ECS service.

                  Valid values: ECS | CODE_DEPLOY | EXTERNAL

              • DesiredCount — (Integer)

                The number of instantiations of the task definition to run on the service.

              • EnableEcsManagedTags — (Boolean)

                Whether to enable Amazon ECS managed tags for the tasks in the service.

              • EnableExecuteCommand — (Boolean)

                Whether the execute command functionality is enabled for the service.

              • HealthCheckGracePeriodSeconds — (Integer)

                After a task starts, the amount of time in seconds that the Amazon ECS service scheduler ignores unhealthy Elastic Load Balancing target health checks.

              • LaunchType — (String)

                The launch type that the service uses.

                Valid values: EC2 | FARGATE | EXTERNAL

              • LoadBalancers — (Array<map>)

                Information about the load balancers that the service uses.

                • ContainerName — (String)

                  The name of the container to associate with the load balancer.

                • ContainerPort — (Integer)

                  The port on the container to associate with the load balancer. This port must correspond to a containerPort in the task definition the tasks in the service are using. For tasks that use the EC2 launch type, the container instance they are launched on must allow ingress traffic on the hostPort of the port mapping.

                • LoadBalancerName — (String)

                  The name of the load balancer to associate with the Amazon ECS service or task set.

                  Only specified when using a Classic Load Balancer. For an Application Load Balancer or a Network Load Balancer, the load balancer name is omitted.

                • TargetGroupArn — (String)

                  The ARN of the Elastic Load Balancing target group or groups associated with a service or task set.

                  Only specified when using an Application Load Balancer or a Network Load Balancer. For a Classic Load Balancer, the target group ARN is omitted.

              • Name — (String)

                The name of the service.

              • NetworkConfiguration — (map)

                For tasks that use the awsvpc networking mode, the VPC subnet and security group configuration.

                • AwsVpcConfiguration — (map)

                  The VPC subnet and security group configuration.

                  • AssignPublicIp — (String)

                    Whether the task's elastic network interface receives a public IP address. The default value is DISABLED.

                    Valid values: ENABLED | DISABLED

                  • SecurityGroups — (Array<String>)

                    The IDs of the security groups associated with the task or service.

                    You can provide up to five security groups.

                  • Subnets — (Array<String>)

                    The IDs of the subnets associated with the task or service.

                    You can provide up to 16 subnets.

              • PlacementConstraints — (Array<map>)

                The placement constraints for the tasks in the service.

                • Expression — (String)

                  A cluster query language expression to apply to the constraint. You cannot specify an expression if the constraint type is distinctInstance.

                • Type — (String)

                  The type of constraint. Use distinctInstance to run each task in a particular group on a different container instance. Use memberOf to restrict the selection to a group of valid candidates.

                  Valid values: distinctInstance | memberOf

              • PlacementStrategies — (Array<map>)

                Information about how tasks for the service are placed.

                • Field — (String)

                  The field to apply the placement strategy against.

                  For the spread placement strategy, valid values are instanceId (or host, which has the same effect), or any platform or custom attribute that is applied to a container instance, such as attribute:ecs.availability-zone.

                  For the binpack placement strategy, valid values are cpu and memory.

                  For the random placement strategy, this attribute is not used.

                • Type — (String)

                  The type of placement strategy.

                  The random placement strategy randomly places tasks on available candidates.

                  The spread placement strategy spreads placement across available candidates evenly based on the value of Field.

                  The binpack strategy places tasks on available candidates that have the least available amount of the resource that is specified in Field.

                  Valid values: random | spread | binpack

              • PlatformVersion — (String)

                The platform version on which to run the service. Only specified for tasks that are hosted on Fargate. If a platform version is not specified, the LATEST platform version is used by default.

              • PropagateTags — (String)

                Indicates whether to propagate the tags from the task definition to the task or from the service to the task. If no value is provided, then tags are not propagated.

                Valid values: TASK_DEFINITION | SERVICE

              • Role — (String)

                The ARN of the IAM role that is associated with the service. The role allows the Amazon ECS container agent to register container instances with an Elastic Load Balancing load balancer.

              • SchedulingStrategy — (String)

                The scheduling strategy to use for the service.

                The REPLICA scheduling strategy places and maintains the desired number of tasks across the cluster. By default, the service scheduler spreads tasks across Availability Zones. Task placement strategies and constraints are used to customize task placement decisions.

                The DAEMON scheduling strategy deploys exactly one task on each active container instance that meets all of the task placement constraints that are specified in the cluster. The service scheduler also evaluates the task placement constraints for running tasks and stops tasks that do not meet the placement constraints.

                Valid values: REPLICA | DAEMON

              • ServiceArn — (String)

                The ARN of the service.

              • ServiceName — (String)

                The name of the service.

                The name can contain up to 255 characters. It can use letters, numbers, underscores, and hyphens.

              • ServiceRegistries — (Array<map>)

                Information about the service discovery registries to assign to the service.

                • ContainerName — (String)

                  The container name value to use for the service discovery service.

                  If the task definition uses the bridge or host network mode, you must specify ContainerName and ContainerPort.

                  If the task definition uses the awsvpc network mode and a type SRV DNS record, you must specify either ContainerName and ContainerPort, or Port , but not both.

                • ContainerPort — (Integer)

                  The port value to use for the service discovery service.

                  If the task definition uses the bridge or host network mode, you must specify ContainerName and ContainerPort.

                  If the task definition uses the awsvpc network mode and a type SRV DNS record, you must specify either ContainerName and ContainerPort, or Port , but not both.

                • Port — (Integer)

                  The port value to use for a service discovery service that specifies an SRV record. This field can be used if both the awsvpcawsvpc network mode and SRV records are used.

                • RegistryArn — (String)

                  The ARN of the service registry.

              • TaskDefinition — (String)

                The task definition to use for tasks in the service.

            • AwsAutoScalingLaunchConfiguration — (map)

              Provides details about a launch configuration.

              • AssociatePublicIpAddress — (Boolean)

                For Auto Scaling groups that run in a VPC, specifies whether to assign a public IP address to the group's instances.

              • BlockDeviceMappings — (Array<map>)

                Specifies the block devices for the instance.

                • DeviceName — (String)

                  The device name that is exposed to the EC2 instance. For example, /dev/sdh or xvdh.

                • Ebs — (map)

                  Parameters that are used to automatically set up Amazon EBS volumes when an instance is launched.

                  • DeleteOnTermination — (Boolean)

                    Whether to delete the volume when the instance is terminated.

                  • Encrypted — (Boolean)

                    Whether to encrypt the volume.

                  • Iops — (Integer)

                    The number of input/output (I/O) operations per second (IOPS) to provision for the volume.

                    Only supported for gp3 or io1 volumes. Required for io1 volumes. Not used with standard, gp2, st1, or sc1 volumes.

                  • SnapshotId — (String)

                    The snapshot ID of the volume to use.

                    You must specify either VolumeSize or SnapshotId.

                  • VolumeSize — (Integer)

                    The volume size, in GiBs. The following are the supported volumes sizes for each volume type:

                    • gp2 and gp3: 1-16,384

                    • io1: 4-16,384

                    • st1 and sc1: 125-16,384

                    • standard: 1-1,024

                    You must specify either SnapshotId or VolumeSize. If you specify both SnapshotId and VolumeSize, the volume size must be equal or greater than the size of the snapshot.

                  • VolumeType — (String)

                    The volume type. Valid values are as follows:

                    • gp2

                    • gp3

                    • io1

                    • sc1

                    • st1

                    • standard

                • NoDevice — (Boolean)

                  Whether to suppress the device that is included in the block device mapping of the Amazon Machine Image (AMI).

                  If NoDevice is true, then you cannot specify Ebs.>

                • VirtualName — (String)

                  The name of the virtual device (for example, ephemeral0).

                  You can provide either VirtualName or Ebs, but not both.

              • ClassicLinkVpcId — (String)

                The identifier of a ClassicLink-enabled VPC that EC2-Classic instances are linked to.

              • ClassicLinkVpcSecurityGroups — (Array<String>)

                The identifiers of one or more security groups for the VPC that is specified in ClassicLinkVPCId.

              • CreatedTime — (String)

                The creation date and time for the launch configuration.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

              • EbsOptimized — (Boolean)

                Whether the launch configuration is optimized for Amazon EBS I/O.

              • IamInstanceProfile — (String)

                The name or the ARN of the instance profile associated with the IAM role for the instance. The instance profile contains the IAM role.

              • ImageId — (String)

                The identifier of the Amazon Machine Image (AMI) that is used to launch EC2 instances.

              • InstanceMonitoring — (map)

                Indicates the type of monitoring for instances in the group.

                • Enabled — (Boolean)

                  If set to true, then instances in the group launch with detailed monitoring.

                  If set to false, then instances in the group launch with basic monitoring.

              • InstanceType — (String)

                The instance type for the instances.

              • KernelId — (String)

                The identifier of the kernel associated with the AMI.

              • KeyName — (String)

                The name of the key pair.

              • LaunchConfigurationName — (String)

                The name of the launch configuration.

              • PlacementTenancy — (String)

                The tenancy of the instance. An instance with dedicated tenancy runs on isolated, single-tenant hardware and can only be launched into a VPC.

              • RamdiskId — (String)

                The identifier of the RAM disk associated with the AMI.

              • SecurityGroups — (Array<String>)

                The security groups to assign to the instances in the Auto Scaling group.

              • SpotPrice — (String)

                The maximum hourly price to be paid for any Spot Instance that is launched to fulfill the request.

              • UserData — (String)

                The user data to make available to the launched EC2 instances. Must be base64-encoded text.

              • MetadataOptions — (map)

                The metadata options for the instances.

                • HttpEndpoint — (String)

                  Enables or disables the HTTP metadata endpoint on your instances. By default, the metadata endpoint is enabled.

                • HttpPutResponseHopLimit — (Integer)

                  The HTTP PUT response hop limit for instance metadata requests. The larger the number, the further instance metadata requests can travel.

                • HttpTokens — (String)

                  Indicates whether token usage is required or optional for metadata requests. By default, token usage is optional.

            • AwsEc2VpnConnection — (map)

              Details about an Amazon EC2 VPN connection.

              • VpnConnectionId — (String)

                The identifier of the VPN connection.

              • State — (String)

                The current state of the VPN connection. Valid values are as follows:

                • available

                • deleted

                • deleting

                • pending

              • CustomerGatewayId — (String)

                The identifier of the customer gateway that is at your end of the VPN connection.

              • CustomerGatewayConfiguration — (String)

                The configuration information for the VPN connection's customer gateway, in the native XML format.

              • Type — (String)

                The type of VPN connection.

              • VpnGatewayId — (String)

                The identifier of the virtual private gateway that is at the Amazon Web Services side of the VPN connection.

              • Category — (String)

                The category of the VPN connection. VPN indicates an Amazon Web Services VPN connection. VPN-Classic indicates an Amazon Web Services Classic VPN connection.

              • VgwTelemetry — (Array<map>)

                Information about the VPN tunnel.

                • AcceptedRouteCount — (Integer)

                  The number of accepted routes.

                • CertificateArn — (String)

                  The ARN of the VPN tunnel endpoint certificate.

                • LastStatusChange — (String)

                  The date and time of the last change in status.

                  Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

                • OutsideIpAddress — (String)

                  The Internet-routable IP address of the virtual private gateway's outside interface.

                • Status — (String)

                  The status of the VPN tunnel. Valid values are DOWN or UP.

                • StatusMessage — (String)

                  If an error occurs, a description of the error.

              • Options — (map)

                The VPN connection options.

                • StaticRoutesOnly — (Boolean)

                  Whether the VPN connection uses static routes only.

                • TunnelOptions — (Array<map>)

                  The VPN tunnel options.

                  • DpdTimeoutSeconds — (Integer)

                    The number of seconds after which a Dead Peer Detection (DPD) timeout occurs.

                  • IkeVersions — (Array<String>)

                    The Internet Key Exchange (IKE) versions that are permitted for the VPN tunnel.

                  • OutsideIpAddress — (String)

                    The external IP address of the VPN tunnel.

                  • Phase1DhGroupNumbers — (Array<Integer>)

                    The permitted Diffie-Hellman group numbers for the VPN tunnel for phase 1 IKE negotiations.

                  • Phase1EncryptionAlgorithms — (Array<String>)

                    The permitted encryption algorithms for the VPN tunnel for phase 1 IKE negotiations.

                  • Phase1IntegrityAlgorithms — (Array<String>)

                    The permitted integrity algorithms for the VPN tunnel for phase 1 IKE negotiations.

                  • Phase1LifetimeSeconds — (Integer)

                    The lifetime for phase 1 of the IKE negotiation, in seconds.

                  • Phase2DhGroupNumbers — (Array<Integer>)

                    The permitted Diffie-Hellman group numbers for the VPN tunnel for phase 2 IKE negotiations.

                  • Phase2EncryptionAlgorithms — (Array<String>)

                    The permitted encryption algorithms for the VPN tunnel for phase 2 IKE negotiations.

                  • Phase2IntegrityAlgorithms — (Array<String>)

                    The permitted integrity algorithms for the VPN tunnel for phase 2 IKE negotiations.

                  • Phase2LifetimeSeconds — (Integer)

                    The lifetime for phase 2 of the IKE negotiation, in seconds.

                  • PreSharedKey — (String)

                    The preshared key to establish initial authentication between the virtual private gateway and the customer gateway.

                  • RekeyFuzzPercentage — (Integer)

                    The percentage of the rekey window, which is determined by RekeyMarginTimeSeconds during which the rekey time is randomly selected.

                  • RekeyMarginTimeSeconds — (Integer)

                    The margin time, in seconds, before the phase 2 lifetime expires, during which the Amazon Web Services side of the VPN connection performs an IKE rekey.

                  • ReplayWindowSize — (Integer)

                    The number of packets in an IKE replay window.

                  • TunnelInsideCidr — (String)

                    The range of inside IPv4 addresses for the tunnel.

              • Routes — (Array<map>)

                The static routes that are associated with the VPN connection.

                • DestinationCidrBlock — (String)

                  The CIDR block associated with the local subnet of the customer data center.

                • State — (String)

                  The current state of the static route.

              • TransitGatewayId — (String)

                The identifier of the transit gateway that is associated with the VPN connection.

            • AwsEcrContainerImage — (map)

              Information about an Amazon ECR image.

              • RegistryId — (String)

                The Amazon Web Services account identifier that is associated with the registry that the image belongs to.

              • RepositoryName — (String)

                The name of the repository that the image belongs to.

              • Architecture — (String)

                The architecture of the image. Valid values are as follows:

                • arm64

                • i386

                • x86_64

              • ImageDigest — (String)

                The sha256 digest of the image manifest.

              • ImageTags — (Array<String>)

                The list of tags that are associated with the image.

              • ImagePublishedAt — (String)

                The date and time when the image was pushed to the repository.

                Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • AwsOpenSearchServiceDomain — (map)

              Details about an Amazon OpenSearch Service domain.

              • Arn — (String)

                The ARN of the OpenSearch Service domain.

              • AccessPolicies — (String)

                IAM policy document that specifies the access policies for the OpenSearch Service domain.

              • DomainName — (String)

                The name of the endpoint.

              • Id — (String)

                The identifier of the domain.

              • DomainEndpoint — (String)

                The domain endpoint.

              • EngineVersion — (String)

                The version of the domain engine.

              • EncryptionAtRestOptions — (map)

                Details about the configuration for encryption at rest.

                • Enabled — (Boolean)

                  Whether encryption at rest is enabled.

                • KmsKeyId — (String)

                  The KMS key ID.

              • NodeToNodeEncryptionOptions — (map)

                Details about the configuration for node-to-node encryption.

                • Enabled — (Boolean)

                  Whether node-to-node encryption is enabled.

              • ServiceSoftwareOptions — (map)

                Information about the status of a domain relative to the latest service software.

                • AutomatedUpdateDate — (String)

                  The epoch time when the deployment window closes for required updates. After this time, OpenSearch Service schedules the software upgrade automatically.

                • Cancellable — (Boolean)

                  Whether a request to update the domain can be canceled.

                • CurrentVersion — (String)

                  The version of the service software that is currently installed on the domain.

                • Description — (String)

                  A more detailed description of the service software status.

                • NewVersion — (String)

                  The most recent version of the service software.

                • UpdateAvailable — (Boolean)

                  Whether a service software update is available for the domain.

                • UpdateStatus — (String)

                  The status of the service software update. Valid values are as follows:

                  • COMPLETED

                  • ELIGIBLE

                  • IN_PROGRESS

                  • NOT_ELIGIBLE

                  • PENDING_UPDATE

                • OptionalDeployment — (Boolean)

                  Whether the service software update is optional.

              • ClusterConfig — (map)

                Details about the configuration of an OpenSearch cluster.

                • InstanceCount — (Integer)

                  The number of data nodes to use in the OpenSearch domain.

                • WarmEnabled — (Boolean)

                  Whether UltraWarm is enabled.

                • WarmCount — (Integer)

                  The number of UltraWarm instances.

                • DedicatedMasterEnabled — (Boolean)

                  Whether to use a dedicated master node for the OpenSearch domain. A dedicated master node performs cluster management tasks, but does not hold data or respond to data upload requests.

                • ZoneAwarenessConfig — (map)

                  Configuration options for zone awareness. Provided if ZoneAwarenessEnabled is true.

                  • AvailabilityZoneCount — (Integer)

                    The number of Availability Zones that the domain uses. Valid values are 2 or 3. The default is 2.

                • DedicatedMasterCount — (Integer)

                  The number of instances to use for the master node. If this attribute is specified, then DedicatedMasterEnabled must be true.

                • InstanceType — (String)

                  The instance type for your data nodes.

                  For a list of valid values, see Supported instance types in Amazon OpenSearch Service in the Amazon OpenSearch Service Developer Guide.

                • WarmType — (String)

                  The type of UltraWarm instance.

                • ZoneAwarenessEnabled — (Boolean)

                  Whether to enable zone awareness for the OpenSearch domain. When zone awareness is enabled, OpenSearch Service allocates the cluster's nodes and replica index shards across Availability Zones (AZs) in the same Region. This prevents data loss and minimizes downtime if a node or data center fails.

                • DedicatedMasterType — (String)

                  The hardware configuration of the computer that hosts the dedicated master node.

                  If this attribute is specified, then DedicatedMasterEnabled must be true.

              • DomainEndpointOptions — (map)

                Additional options for the domain endpoint.

                • CustomEndpointCertificateArn — (String)

                  The ARN for the security certificate. The certificate is managed in ACM.

                • CustomEndpointEnabled — (Boolean)

                  Whether to enable a custom endpoint for the domain.

                • EnforceHTTPS — (Boolean)

                  Whether to require that all traffic to the domain arrive over HTTPS.

                • CustomEndpoint — (String)

                  The fully qualified URL for the custom endpoint.

                • TLSSecurityPolicy — (String)

                  The TLS security policy to apply to the HTTPS endpoint of the OpenSearch domain.

              • VpcOptions — (map)

                Information that OpenSearch Service derives based on VPCOptions for the domain.

                • SecurityGroupIds — (Array<String>)

                  The list of security group IDs that are associated with the VPC endpoints for the domain.

                • SubnetIds — (Array<String>)

                  A list of subnet IDs that are associated with the VPC endpoints for the domain.

              • LogPublishingOptions — (map)

                Configures the CloudWatch Logs to publish for the OpenSearch domain.

                • IndexSlowLogs — (map)

                  Configures the OpenSearch index logs publishing.

                  • CloudWatchLogsLogGroupArn — (String)

                    The ARN of the CloudWatch Logs group to publish the logs to.

                  • Enabled — (Boolean)

                    Whether the log publishing is enabled.

                • SearchSlowLogs — (map)

                  Configures the OpenSearch search slow log publishing.

                  • CloudWatchLogsLogGroupArn — (String)

                    The ARN of the CloudWatch Logs group to publish the logs to.

                  • Enabled — (Boolean)

                    Whether the log publishing is enabled.

                • AuditLogs — (map)

                  Configures the OpenSearch audit logs publishing.

                  • CloudWatchLogsLogGroupArn — (String)

                    The ARN of the CloudWatch Logs group to publish the logs to.

                  • Enabled — (Boolean)

                    Whether the log publishing is enabled.

              • DomainEndpoints — (map<String>)

                The domain endpoints. Used if the OpenSearch domain resides in a VPC.

                This is a map of key-value pairs. The key is always vpc. The value is the endpoint.

              • AdvancedSecurityOptions — (map)

                Specifies options for fine-grained access control.

                • Enabled — (Boolean)

                  Enables fine-grained access control.

                • InternalUserDatabaseEnabled — (Boolean)

                  Enables the internal user database.

                • MasterUserOptions — (map)

                  Specifies information about the master user of the domain.

                  • MasterUserArn — (String)

                    The Amazon Resource Name (ARN) for the master user.

                  • MasterUserName — (String)

                    The username for the master user.

                  • MasterUserPassword — (String)

                    The password for the master user.

            • AwsEc2VpcEndpointService — (map)

              Details about the service configuration for a VPC endpoint service.

              • AcceptanceRequired — (Boolean)

                Whether requests from other Amazon Web Services accounts to create an endpoint to the service must first be accepted.

              • AvailabilityZones — (Array<String>)

                The Availability Zones where the service is available.

              • BaseEndpointDnsNames — (Array<String>)

                The DNS names for the service.

              • ManagesVpcEndpoints — (Boolean)

                Whether the service manages its VPC endpoints.

              • GatewayLoadBalancerArns — (Array<String>)

                The ARNs of the Gateway Load Balancers for the service.

              • NetworkLoadBalancerArns — (Array<String>)

                The ARNs of the Network Load Balancers for the service.

              • PrivateDnsName — (String)

                The private DNS name for the service.

              • ServiceId — (String)

                The identifier of the service.

              • ServiceName — (String)

                The name of the service.

              • ServiceState — (String)

                The current state of the service. Valid values are as follows:

                • Available

                • Deleted

                • Deleting

                • Failed

                • Pending

              • ServiceType — (Array<map>)

                The types for the service.

                • ServiceType — (String)

                  The type of service.

            • AwsXrayEncryptionConfig — (map)

              Information about the encryption configuration for X-Ray.

              • KeyId — (String)

                The identifier of the KMS key that is used for encryption. Provided if Type is KMS.

              • Status — (String)

                The current status of the encryption configuration. Valid values are ACTIVE or UPDATING.

                When Status is equal to UPDATING, X-Ray might use both the old and new encryption.

              • Type — (String)

                The type of encryption. KMS indicates that the encryption uses KMS keys. NONE indicates the default encryption.

            • AwsWafRateBasedRule — (map)

              Details about a rate-based rule for global resources.

              • MetricName — (String)

                The name of the metrics for the rate-based rule.

              • Name — (String)

                The name of the rate-based rule.

              • RateKey — (String)

                The field that WAF uses to determine whether requests are likely arriving from single source and are subject to rate monitoring.

              • RateLimit — (Integer)

                The maximum number of requests that have an identical value for the field specified in RateKey that are allowed within a five-minute period. If the number of requests exceeds RateLimit and the other predicates specified in the rule are met, WAF triggers the action for the rule.

              • RuleId — (String)

                The unique identifier for the rate-based rule.

              • MatchPredicates — (Array<map>)

                The predicates to include in the rate-based rule.

                • DataId — (String)

                  The unique identifier for the predicate.

                • Negated — (Boolean)

                  If set to true, then the rule actions are performed on requests that match the predicate settings.

                  If set to false, then the rule actions are performed on all requests except those that match the predicate settings.

                • Type — (String)

                  The type of predicate. Valid values are as follows:

                  • ByteMatch

                  • GeoMatch

                  • IPMatch

                  • RegexMatch

                  • SizeConstraint

                  • SqlInjectionMatch

                  • XssMatch

            • AwsWafRegionalRateBasedRule — (map)

              Details about a rate-based rule for Regional resources.

              • MetricName — (String)

                The name of the metrics for the rate-based rule.

              • Name — (String)

                The name of the rate-based rule.

              • RateKey — (String)

                The field that WAF uses to determine whether requests are likely arriving from single source and are subject to rate monitoring.

              • RateLimit — (Integer)

                The maximum number of requests that have an identical value for the field specified in RateKey that are allowed within a five-minute period. If the number of requests exceeds RateLimit and the other predicates specified in the rule are met, WAF triggers the action for the rule.

              • RuleId — (String)

                The unique identifier for the rate-based rule.

              • MatchPredicates — (Array<map>)

                The predicates to include in the rate-based rule.

                • DataId — (String)

                  The unique identifier for the predicate.

                • Negated — (Boolean)

                  If set to true, then the rule actions are performed on requests that match the predicate settings.

                  If set to false, then the rule actions are performed on all requests except those that match the predicate settings.

                • Type — (String)

                  The type of predicate. Valid values are as follows:

                  • ByteMatch

                  • GeoMatch

                  • IPMatch

                  • RegexMatch

                  • SizeConstraint

                  • SqlInjectionMatch

                  • XssMatch

            • AwsEcrRepository — (map)

              Information about an Amazon Elastic Container Registry repository.

              • Arn — (String)

                The ARN of the repository.

              • ImageScanningConfiguration — (map)

                The image scanning configuration for a repository.

                • ScanOnPush — (Boolean)

                  Whether to scan images after they are pushed to a repository.

              • ImageTagMutability — (String)

                The tag mutability setting for the repository. Valid values are IMMUTABLE or MUTABLE.

              • LifecyclePolicy — (map)

                Information about the lifecycle policy for the repository.

                • LifecyclePolicyText — (String)

                  The text of the lifecycle policy.

                • RegistryId — (String)

                  The Amazon Web Services account identifier that is associated with the registry that contains the repository.

              • RepositoryName — (String)

                The name of the repository.

              • RepositoryPolicyText — (String)

                The text of the repository policy.

            • AwsEksCluster — (map)

              Details about an Amazon EKS cluster.

              • Arn — (String)

                The ARN of the cluster.

              • CertificateAuthorityData — (String)

                The certificate authority data for the cluster.

              • ClusterStatus — (String)

                The status of the cluster. Valid values are as follows:

                • ACTIVE

                • CREATING

                • DELETING

                • FAILED

                • PENDING

                • UPDATING

              • Endpoint — (String)

                The endpoint for the Amazon EKS API server.

              • Name — (String)

                The name of the cluster.

              • ResourcesVpcConfig — (map)

                The VPC configuration used by the cluster control plane.

                • SecurityGroupIds — (Array<String>)

                  The security groups that are associated with the cross-account elastic network interfaces that are used to allow communication between your nodes and the Amazon EKS control plane.

                • SubnetIds — (Array<String>)

                  The subnets that are associated with the cluster.

                • EndpointPublicAccess — (Boolean)

                  Indicates whether the Amazon EKS public API server endpoint is turned on. If the Amazon EKS public API server endpoint is turned off, your cluster's Kubernetes API server can only receive requests that originate from within the cluster VPC.

              • RoleArn — (String)

                The ARN of the IAM role that provides permissions for the Amazon EKS control plane to make calls to Amazon Web Services API operations on your behalf.

              • Version — (String)

                The Amazon EKS server version for the cluster.

              • Logging — (map)

                The logging configuration for the cluster.

                • ClusterLogging — (Array<map>)

                  Cluster logging configurations.

                  • Enabled — (Boolean)

                    Whether the logging types that are listed in Types are enabled.

                  • Types — (Array<String>)

                    A list of logging types. Valid values are as follows:

                    • api

                    • audit

                    • authenticator

                    • controllerManager

                    • scheduler

            • AwsNetworkFirewallFirewallPolicy — (map)

              Details about an Network Firewall firewall policy.

              • FirewallPolicy — (map)

                The firewall policy configuration.

                • StatefulRuleGroupReferences — (Array<map>)

                  The stateful rule groups that are used in the firewall policy.

                  • ResourceArn — (String)

                    The ARN of the stateful rule group.

                • StatelessCustomActions — (Array<map>)

                  The custom action definitions that are available to use in the firewall policy's StatelessDefaultActions setting.

                  • ActionDefinition — (map)

                    The definition of the custom action.

                    • PublishMetricAction — (map)

                      Information about metrics to publish to CloudWatch.

                      • Dimensions — (Array<map>)

                        Defines CloudWatch dimension values to publish.

                        • Value — (String)

                          The value to use for the custom metric dimension.

                  • ActionName — (String)

                    The name of the custom action.

                • StatelessDefaultActions — (Array<String>)

                  The actions to take on a packet if it doesn't match any of the stateless rules in the policy.

                  You must specify a standard action (aws:pass, aws:drop, aws:forward_to_sfe), and can optionally include a custom action from StatelessCustomActions.

                • StatelessFragmentDefaultActions — (Array<String>)

                  The actions to take on a fragmented UDP packet if it doesn't match any of the stateless rules in the policy.

                  You must specify a standard action (aws:pass, aws:drop, aws:forward_to_sfe), and can optionally include a custom action from StatelessCustomActions.

                • StatelessRuleGroupReferences — (Array<map>)

                  The stateless rule groups that are used in the firewall policy.

                  • Priority — (Integer)

                    The order in which to run the stateless rule group.

                  • ResourceArn — (String)

                    The ARN of the stateless rule group.

              • FirewallPolicyArn — (String)

                The ARN of the firewall policy.

              • FirewallPolicyId — (String)

                The identifier of the firewall policy.

              • FirewallPolicyName — (String)

                The name of the firewall policy.

              • Description — (String)

                A description of the firewall policy.

            • AwsNetworkFirewallFirewall — (map)

              Details about an Network Firewall firewall.

              • DeleteProtection — (Boolean)

                Whether the firewall is protected from deletion. If set to true, then the firewall cannot be deleted.

              • Description — (String)

                A description of the firewall.

              • FirewallArn — (String)

                The ARN of the firewall.

              • FirewallId — (String)

                The identifier of the firewall.

              • FirewallName — (String)

                A descriptive name of the firewall.

              • FirewallPolicyArn — (String)

                The ARN of the firewall policy.

              • FirewallPolicyChangeProtection — (Boolean)

                Whether the firewall is protected from a change to the firewall policy. If set to true, you cannot associate a different policy with the firewall.

              • SubnetChangeProtection — (Boolean)

                Whether the firewall is protected from a change to the subnet associations. If set to true, you cannot map different subnets to the firewall.

              • SubnetMappings — (Array<map>)

                The public subnets that Network Firewall uses for the firewall. Each subnet must belong to a different Availability Zone.

                • SubnetId — (String)

                  The identifier of the subnet

              • VpcId — (String)

                The identifier of the VPC where the firewall is used.

            • AwsNetworkFirewallRuleGroup — (map)

              Details about an Network Firewall rule group.

              • Capacity — (Integer)

                The maximum number of operating resources that this rule group can use.

              • Description — (String)

                A description of the rule group.

              • RuleGroup — (map)

                Details about the rule group.

                • RuleVariables — (map)

                  Additional settings to use in the specified rules.

                  • IpSets — (map)

                    A list of IP addresses and address ranges, in CIDR notation.

                    • Definition — (Array<String>)

                      The list of IP addresses and ranges.

                  • PortSets — (map)

                    A list of port ranges.

                    • Definition — (Array<String>)

                      The list of port ranges.

                • RulesSource — (map)

                  The rules and actions for the rule group.

                  For stateful rule groups, can contain RulesString, RulesSourceList, or StatefulRules.

                  For stateless rule groups, contains StatelessRulesAndCustomActions.

                  • RulesSourceList — (map)

                    Stateful inspection criteria for a domain list rule group. A domain list rule group determines access by specific protocols to specific domains.

                    • GeneratedRulesType — (String)

                      Indicates whether to allow or deny access to the domains listed in Targets.

                    • TargetTypes — (Array<String>)

                      The protocols that you want to inspect. Specify LS_SNI for HTTPS. Specify HTTP_HOST for HTTP. You can specify either or both.

                    • Targets — (Array<String>)

                      The domains that you want to inspect for in your traffic flows. You can provide full domain names, or use the '.' prefix as a wildcard. For example, .example.com matches all domains that end with example.com.

                  • RulesString — (String)

                    Stateful inspection criteria, provided in Suricata compatible intrusion prevention system (IPS) rules.

                  • StatefulRules — (Array<map>)

                    Suricata rule specifications.

                    • Action — (String)

                      Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria.

                    • Header — (map)

                      The stateful inspection criteria for the rule.

                      • Destination — (String)

                        The destination IP address or address range to inspect for, in CIDR notation. To match with any address, specify ANY.

                      • DestinationPort — (String)

                        The destination port to inspect for. You can specify an individual port, such as 1994. You also can specify a port range, such as 1990:1994. To match with any port, specify ANY.

                      • Direction — (String)

                        The direction of traffic flow to inspect. If set to ANY, the inspection matches bidirectional traffic, both from the source to the destination and from the destination to the source. If set to FORWARD, the inspection only matches traffic going from the source to the destination.

                      • Protocol — (String)

                        The protocol to inspect for. To inspector for all protocols, use IP.

                      • Source — (String)

                        The source IP address or address range to inspect for, in CIDR notation. To match with any address, specify ANY.

                      • SourcePort — (String)

                        The source port to inspect for. You can specify an individual port, such as 1994. You also can specify a port range, such as 1990:1994. To match with any port, specify ANY.

                    • RuleOptions — (Array<map>)

                      Additional options for the rule.

                      • Keyword — (String)

                        A keyword to look for.

                      • Settings — (Array<String>)

                        A list of settings.

                  • StatelessRulesAndCustomActions — (map)

                    The stateless rules and custom actions used by a stateless rule group.

                    • CustomActions — (Array<map>)

                      Custom actions for the rule group.

                      • ActionDefinition — (map)

                        The definition of a custom action.

                        • PublishMetricAction — (map)

                          Information about metrics to publish to CloudWatch.

                          • Dimensions — (Array<map>)

                            Defines CloudWatch dimension values to publish.

                            • Value — (String)

                              The value to use for the custom metric dimension.

                      • ActionName — (String)

                        A descriptive name of the custom action.

                    • StatelessRules — (Array<map>)

                      Stateless rules for the rule group.

                      • Priority — (Integer)

                        Indicates the order in which to run this rule relative to all of the rules in the stateless rule group.

                      • RuleDefinition — (map)

                        Provides the definition of the stateless rule.

                        • Actions — (Array<String>)

                          The actions to take on a packet that matches one of the stateless rule definition's match attributes. You must specify a standard action (aws:pass, aws:drop, or aws:forward_to_sfe). You can then add custom actions.

                        • MatchAttributes — (map)

                          The criteria for Network Firewall to use to inspect an individual packet in a stateless rule inspection.

                          • DestinationPorts — (Array<map>)

                            A list of port ranges to specify the destination ports to inspect for.

                            • FromPort — (Integer)

                              The starting port value for the port range.

                            • ToPort — (Integer)

                              The ending port value for the port range.

                          • Destinations — (Array<map>)

                            The destination IP addresses and address ranges to inspect for, in CIDR notation.

                            • AddressDefinition — (String)

                              An IP address or a block of IP addresses.

                          • Protocols — (Array<Integer>)

                            The protocols to inspect for.

                          • SourcePorts — (Array<map>)

                            A list of port ranges to specify the source ports to inspect for.

                            • FromPort — (Integer)

                              The starting port value for the port range.

                            • ToPort — (Integer)

                              The ending port value for the port range.

                          • Sources — (Array<map>)

                            The source IP addresses and address ranges to inspect for, in CIDR notation.

                            • AddressDefinition — (String)

                              An IP address or a block of IP addresses.

                          • TcpFlags — (Array<map>)

                            The TCP flags and masks to inspect for.

                            • Flags — (Array<String>)

                              Defines the flags from the Masks setting that must be set in order for the packet to match. Flags that are listed must be set. Flags that are not listed must not be set.

                            • Masks — (Array<String>)

                              The set of flags to consider in the inspection. If not specified, then all flags are inspected.

              • RuleGroupArn — (String)

                The ARN of the rule group.

              • RuleGroupId — (String)

                The identifier of the rule group.

              • RuleGroupName — (String)

                The descriptive name of the rule group.

              • Type — (String)

                The type of rule group. A rule group can be stateful or stateless.

            • AwsRdsDbSecurityGroup — (map)

              Details about an Amazon RDS DB security group.

              • DbSecurityGroupArn — (String)

                The ARN for the DB security group.

              • DbSecurityGroupDescription — (String)

                Provides the description of the DB security group.

              • DbSecurityGroupName — (String)

                Specifies the name of the DB security group.

              • Ec2SecurityGroups — (Array<map>)

                Contains a list of EC2 security groups.

                • Ec2SecurityGroupId — (String)

                  Specifies the ID for the EC2 security group.

                • Ec2SecurityGroupName — (String)

                  Specifies the name of the EC2 security group.

                • Ec2SecurityGroupOwnerId — (String)

                  Provides the Amazon Web Services ID of the owner of the EC2 security group.

                • Status — (String)

                  Provides the status of the EC2 security group.

              • IpRanges — (Array<map>)

                Contains a list of IP ranges.

                • CidrIp — (String)

                  Specifies the IP range.

                • Status — (String)

                  Specifies the status of the IP range.

              • OwnerId — (String)

                Provides the Amazon Web Services ID of the owner of a specific DB security group.

              • VpcId — (String)

                Provides VPC ID associated with the DB security group.

            • AwsKinesisStream — (map)

              Details about an Amazon Kinesis data stream.

              • Name — (String)

                The name of the Kinesis stream. If you don't specify a name, CloudFront generates a unique physical ID and uses that ID for the stream name.

              • Arn — (String)

                The Amazon Resource Name (ARN) of the Kinesis data stream.

              • StreamEncryption — (map)

                When specified, enables or updates server-side encryption using an KMS key for a specified stream. Removing this property from your stack template and updating your stack disables encryption.

                • EncryptionType — (String)

                  The encryption type to use.

                • KeyId — (String)

                  The globally unique identifier for the customer-managed KMS key to use for encryption.

              • ShardCount — (Integer)

                The number of shards that the stream uses.

              • RetentionPeriodHours — (Integer)

                The number of hours for the data records that are stored in shards to remain accessible.

            • AwsEc2TransitGateway — (map)

              Details about an Amazon EC2 transit gateway that interconnects your virtual private clouds (VPC) and on-premises networks.

              • Id — (String)

                The ID of the transit gateway.

              • Description — (String)

                The description of the transit gateway.

              • DefaultRouteTablePropagation — (String)

                Turn on or turn off automatic propagation of routes to the default propagation route table.

              • AutoAcceptSharedAttachments — (String)

                Turn on or turn off automatic acceptance of attachment requests.

              • DefaultRouteTableAssociation — (String)

                Turn on or turn off automatic association with the default association route table.

              • TransitGatewayCidrBlocks — (Array<String>)

                The transit gateway Classless Inter-Domain Routing (CIDR) blocks.

              • AssociationDefaultRouteTableId — (String)

                The ID of the default association route table.

              • PropagationDefaultRouteTableId — (String)

                The ID of the default propagation route table.

              • VpnEcmpSupport — (String)

                Turn on or turn off Equal Cost Multipath Protocol (ECMP) support.

              • DnsSupport — (String)

                Turn on or turn off DNS support.

              • MulticastSupport — (String)

                Indicates whether multicast is supported on the transit gateway.

              • AmazonSideAsn — (Integer)

                A private Autonomous System Number (ASN) for the Amazon side of a BGP session.

            • AwsEfsAccessPoint — (map)

              Details about an Amazon EFS access point. An access point is an application-specific view into an EFS file system that applies an operating system user and group, and a file system path, to any file system request made through the access point.

              • AccessPointId — (String)

                The ID of the Amazon EFS access point.

              • Arn — (String)

                The Amazon Resource Name (ARN) of the Amazon EFS access point.

              • ClientToken — (String)

                The opaque string specified in the request to ensure idempotent creation.

              • FileSystemId — (String)

                The ID of the Amazon EFS file system that the access point applies to.

              • PosixUser — (map)

                The full POSIX identity, including the user ID, group ID, and secondary group IDs on the access point, that is used for all file operations by NFS clients using the access point.

                • Gid — (String)

                  The POSIX group ID used for all file system operations using this access point.

                • SecondaryGids — (Array<String>)

                  Secondary POSIX group IDs used for all file system operations using this access point.

                • Uid — (String)

                  The POSIX user ID used for all file system operations using this access point.

              • RootDirectory — (map)

                The directory on the Amazon EFS file system that the access point exposes as the root directory to NFS clients using the access point.

                • CreationInfo — (map)

                  Specifies the POSIX IDs and permissions to apply to the access point's root directory.

                  • OwnerGid — (String)

                    Specifies the POSIX group ID to apply to the root directory.

                  • OwnerUid — (String)

                    Specifies the POSIX user ID to apply to the root directory.

                  • Permissions — (String)

                    Specifies the POSIX permissions to apply to the root directory, in the format of an octal number representing the file's mode bits.

                • Path — (String)

                  Specifies the path on the Amazon EFS file system to expose as the root directory to NFS clients using the access point to access the EFS file system. A path can have up to four subdirectories. If the specified path does not exist, you are required to provide CreationInfo.

            • AwsCloudFormationStack — (map)

              Details about an CloudFormation stack. A stack is a collection of Amazon Web Services resources that you can manage as a single unit.

              • Capabilities — (Array<String>)

                The capabilities allowed in the stack.

              • CreationTime — (String)

                The time at which the stack was created.

              • Description — (String)

                A user-defined description associated with the stack.

              • DisableRollback — (Boolean)

                Boolean to enable or disable rollback on stack creation failures.

              • DriftInformation — (map)

                Information about whether a stack's actual configuration differs, or has drifted, from its expected configuration, as defined in the stack template and any values specified as template parameters.

                • StackDriftStatus — (String)

                  Status of the stack's actual configuration compared to its expected template configuration.

              • EnableTerminationProtection — (Boolean)

                Whether termination protection is enabled for the stack.

              • LastUpdatedTime — (String)

                The time the nested stack was last updated. This field will only be returned if the stack has been updated at least once.

              • NotificationArns — (Array<String>)

                The Amazon Resource Names (ARNs) of the Amazon SNS topic to which stack-related events are published.

              • Outputs — (Array<map>)

                A list of output structures.

                • Description — (String)

                  A user-defined description associated with the output.

                • OutputKey — (String)

                  The key associated with the output.

                • OutputValue — (String)

                  The value associated with the output.

              • RoleArn — (String)

                The ARN of an IAM role that's associated with the stack.

              • StackId — (String)

                Unique identifier of the stack.

              • StackName — (String)

                The name associated with the stack.

              • StackStatus — (String)

                Current status of the stack.

              • StackStatusReason — (String)

                Success or failure message associated with the stack status.

              • TimeoutInMinutes — (Integer)

                The length of time, in minutes, that CloudFormation waits for the nested stack to reach the CREATE_COMPLETE state.

            • AwsCloudWatchAlarm — (map)

              Details about an Amazon CloudWatch alarm. An alarm allows you to monitor and receive alerts about your Amazon Web Services resources and applications across multiple Regions.

              • ActionsEnabled — (Boolean)

                Indicates whether actions should be executed during any changes to the alarm state.

              • AlarmActions — (Array<String>)

                The list of actions, specified as Amazon Resource Names (ARNs) to execute when this alarm transitions into an ALARM state from any other state.

              • AlarmArn — (String)

                The ARN of the alarm.

              • AlarmConfigurationUpdatedTimestamp — (String)

                The time stamp of the last update to the alarm configuration.

              • AlarmDescription — (String)

                The description of the alarm.

              • AlarmName — (String)

                The name of the alarm. If you don't specify a name, CloudFront generates a unique physical ID and uses that ID for the alarm name.

              • ComparisonOperator — (String)

                The arithmetic operation to use when comparing the specified statistic and threshold. The specified statistic value is used as the first operand.

              • DatapointsToAlarm — (Integer)

                The number of datapoints that must be breaching to trigger the alarm.

              • Dimensions — (Array<map>)

                The dimensions for the metric associated with the alarm.

                • Name — (String)

                  The name of a dimension.

                • Value — (String)

                  The value of a dimension.

              • EvaluateLowSampleCountPercentile — (String)

                Used only for alarms based on percentiles. If ignore, the alarm state does not change during periods with too few data points to be statistically significant. If evaluate or this parameter is not used, the alarm is always evaluated and possibly changes state no matter how many data points are available.

              • EvaluationPeriods — (Integer)

                The number of periods over which data is compared to the specified threshold.

              • ExtendedStatistic — (String)

                The percentile statistic for the metric associated with the alarm.

              • InsufficientDataActions — (Array<String>)

                The actions to execute when this alarm transitions to the INSUFFICIENT_DATA state from any other state. Each action is specified as an ARN.

              • MetricName — (String)

                The name of the metric associated with the alarm. This is required for an alarm based on a metric. For an alarm based on a math expression, you use Metrics instead and you can't specify MetricName.

              • Namespace — (String)

                The namespace of the metric associated with the alarm. This is required for an alarm based on a metric. For an alarm based on a math expression, you can't specify Namespace and you use Metrics instead.

              • OkActions — (Array<String>)

                The actions to execute when this alarm transitions to the OK state from any other state. Each action is specified as an ARN.

              • Period — (Integer)

                The period, in seconds, over which the statistic is applied. This is required for an alarm based on a metric.

              • Statistic — (String)

                The statistic for the metric associated with the alarm, other than percentile. For percentile statistics, use ExtendedStatistic.

                For an alarm based on a metric, you must specify either Statistic or ExtendedStatistic but not both.

                For an alarm based on a math expression, you can't specify Statistic. Instead, you use Metrics.

              • Threshold — (Float)

                The value to compare with the specified statistic.

              • ThresholdMetricId — (String)

                n an alarm based on an anomaly detection model, this is the ID of the ANOMALY_DETECTION_BAND function used as the threshold for the alarm.

              • TreatMissingData — (String)

                Sets how this alarm is to handle missing data points.

              • Unit — (String)

                The unit of the metric associated with the alarm.

            • AwsEc2VpcPeeringConnection — (map)

              Details about an Amazon EC2 VPC peering connection. A VPC peering connection is a networking connection between two VPCs that enables you to route traffic between them privately.

              • AccepterVpcInfo — (map)

                Information about the accepter VPC.

                • CidrBlock — (String)

                  The IPv4 CIDR block for the VPC.

                • CidrBlockSet — (Array<map>)

                  Information about the IPv4 CIDR blocks for the VPC.

                  • CidrBlock — (String)

                    The IPv4 CIDR block for the VPC.

                • Ipv6CidrBlockSet — (Array<map>)

                  The IPv6 CIDR block for the VPC.

                  • Ipv6CidrBlock — (String)

                    The IPv6 CIDR block for the VPC.

                • OwnerId — (String)

                  The ID of the Amazon Web Services account that owns the VPC.

                • PeeringOptions — (map)

                  Information about the VPC peering connection options for the accepter or requester VPC.

                  • AllowDnsResolutionFromRemoteVpc — (Boolean)

                    Indicates whether a local VPC can resolve public DNS hostnames to private IP addresses when queried from instances in a peer VPC.

                  • AllowEgressFromLocalClassicLinkToRemoteVpc — (Boolean)

                    Indicates whether a local ClassicLink connection can communicate with the peer VPC over the VPC peering connection.

                  • AllowEgressFromLocalVpcToRemoteClassicLink — (Boolean)

                    Indicates whether a local VPC can communicate with a ClassicLink connection in the peer VPC over the VPC peering connection.

                • Region — (String)

                  The Amazon Web Services Region in which the VPC is located.

                • VpcId — (String)

                  The ID of the VPC.

              • ExpirationTime — (String)

                The time at which an unaccepted VPC peering connection will expire.

              • RequesterVpcInfo — (map)

                Information about the requester VPC.

                • CidrBlock — (String)

                  The IPv4 CIDR block for the VPC.

                • CidrBlockSet — (Array<map>)

                  Information about the IPv4 CIDR blocks for the VPC.

                  • CidrBlock — (String)

                    The IPv4 CIDR block for the VPC.

                • Ipv6CidrBlockSet — (Array<map>)

                  The IPv6 CIDR block for the VPC.

                  • Ipv6CidrBlock — (String)

                    The IPv6 CIDR block for the VPC.

                • OwnerId — (String)

                  The ID of the Amazon Web Services account that owns the VPC.

                • PeeringOptions — (map)

                  Information about the VPC peering connection options for the accepter or requester VPC.

                  • AllowDnsResolutionFromRemoteVpc — (Boolean)

                    Indicates whether a local VPC can resolve public DNS hostnames to private IP addresses when queried from instances in a peer VPC.

                  • AllowEgressFromLocalClassicLinkToRemoteVpc — (Boolean)

                    Indicates whether a local ClassicLink connection can communicate with the peer VPC over the VPC peering connection.

                  • AllowEgressFromLocalVpcToRemoteClassicLink — (Boolean)

                    Indicates whether a local VPC can communicate with a ClassicLink connection in the peer VPC over the VPC peering connection.

                • Region — (String)

                  The Amazon Web Services Region in which the VPC is located.

                • VpcId — (String)

                  The ID of the VPC.

              • Status — (map)

                The status of the VPC peering connection.

                • Code — (String)

                  The status of the VPC peering connection.

                • Message — (String)

                  A message that provides more information about the status, if applicable.

              • VpcPeeringConnectionId — (String)

                The ID of the VPC peering connection.

            • AwsWafRegionalRuleGroup — (map)

              Details about an WAF rule group for Regional resources.

              • MetricName — (String)

                A name for the metrics for this rule group.

              • Name — (String)

                The descriptive name of the rule group.

              • RuleGroupId — (String)

                The ID of the rule group.

              • Rules — (Array<map>)

                Provides information about the rule statements used to identify the web requests that you want to allow, block, or count.

                • Action — (map)

                  The action that WAF should take on a web request when it matches the criteria defined in the rule.

                  • Type — (String)

                    Specifies the ByteMatchSet, IPSet, SqlInjectionMatchSet, XssMatchSet, RegexMatchSet, GeoMatchSet, and SizeConstraintSet objects that you want to add to a rule and, for each object, indicates whether you want to negate the settings.

                • Priority — (Integer)

                  If you define more than one rule in a web ACL, WAF evaluates each request against the rules in order based on the value of Priority.

                • RuleId — (String)

                  The ID for a rule.

                • Type — (String)

                  The type of rule in the rule group.

            • AwsWafRegionalRule — (map)

              Details about an WAF rule for Regional resources.

              • MetricName — (String)

                A name for the metrics for the rule.

              • Name — (String)

                A descriptive name for the rule.

              • PredicateList — (Array<map>)

                Specifies the ByteMatchSet, IPSet, SqlInjectionMatchSet, XssMatchSet, RegexMatchSet, GeoMatchSet, and SizeConstraintSet objects that you want to add to a rule and, for each object, indicates whether you want to negate the settings.

                • DataId — (String)

                  A unique identifier for a predicate in a rule, such as ByteMatchSetId or IPSetId.

                • Negated — (Boolean)

                  Specifies if you want WAF to allow, block, or count requests based on the settings in the ByteMatchSet, IPSet, SqlInjectionMatchSet, XssMatchSet, RegexMatchSet, GeoMatchSet, or SizeConstraintSet.

                • Type — (String)

                  The type of predicate in a rule, such as ByteMatch or IPSet.

              • RuleId — (String)

                The ID of the rule.

            • AwsWafRegionalWebAcl — (map)

              Details about an WAF web access control list (web ACL) for Regional resources.

              • DefaultAction — (String)

                The action to perform if none of the rules contained in the web ACL match.

              • MetricName — (String)

                A name for the metrics for this web ACL.

              • Name — (String)

                A descriptive name for the web ACL.

              • RulesList — (Array<map>)

                An array that contains the action for each rule in a web ACL, the priority of the rule, and the ID of the rule.

                • Action — (map)

                  The action that WAF takes when a web request matches all conditions in the rule, such as allow, block, or count the request.

                  • Type — (String)

                    For actions that are associated with a rule, the action that WAF takes when a web request matches all conditions in a rule.

                • OverrideAction — (map)

                  Overrides the rule evaluation result in the rule group.

                  • Type — (String)

                    Overrides the rule evaluation result in the rule group.

                • Priority — (Integer)

                  The order in which WAF evaluates the rules in a web ACL.

                • RuleId — (String)

                  The ID of an WAF Regional rule to associate with a web ACL.

                • Type — (String)

                  For actions that are associated with a rule, the action that WAF takes when a web request matches all conditions in a rule.

              • WebAclId — (String)

                The ID of the web ACL.

            • AwsWafRule — (map)

              Details about an WAF rule for global resources.

              • MetricName — (String)

                The name of the metrics for this rule.

              • Name — (String)

                A descriptive name for the rule.

              • PredicateList — (Array<map>)

                Specifies the ByteMatchSet, IPSet, SqlInjectionMatchSet, XssMatchSet, RegexMatchSet, GeoMatchSet, and SizeConstraintSet objects that you want to add to a rule and, for each object, indicates whether you want to negate the settings.

                • DataId — (String)

                  A unique identifier for a predicate in a rule, such as ByteMatchSetId or IPSetId.

                • Negated — (Boolean)

                  Specifies if you want WAF to allow, block, or count requests based on the settings in the ByteMatchSet, IPSet, SqlInjectionMatchSet, XssMatchSet, RegexMatchSet, GeoMatchSet, or SizeConstraintSet.

                • Type — (String)

                  The type of predicate in a rule, such as ByteMatch or IPSet.

              • RuleId — (String)

                The ID of the WAF rule.

            • AwsWafRuleGroup — (map)

              Details about an WAF rule group for global resources.

              • MetricName — (String)

                The name of the metrics for this rule group.

              • Name — (String)

                The name of the rule group.

              • RuleGroupId — (String)

                The ID of the rule group.

              • Rules — (Array<map>)

                Provides information about the rules attached to the rule group. These rules identify the web requests that you want to allow, block, or count.

                • Action — (map)

                  Provides information about what action WAF should take on a web request when it matches the criteria defined in the rule.

                  • Type — (String)

                    The action that WAF should take on a web request when it matches the rule's statement.

                • Priority — (Integer)

                  If you define more than one rule in a web ACL, WAF evaluates each request against the rules in order based on the value of Priority.

                • RuleId — (String)

                  The rule ID for a rule.

                • Type — (String)

                  The type of rule.

            • AwsEcsTask — (map)

              Details about a task in a cluster.

              • ClusterArn — (String)

                The Amazon Resource Name (ARN) of the cluster that hosts the task.

              • TaskDefinitionArn — (String)

                The ARN of the task definition that creates the task.

              • Version — (String)

                The version counter for the task.

              • CreatedAt — (String)

                The Unix timestamp for the time when the task was created. More specifically, it's for the time when the task entered the PENDING state.

              • StartedAt — (String)

                The Unix timestamp for the time when the task started. More specifically, it's for the time when the task transitioned from the PENDING state to the RUNNING state.

              • StartedBy — (String)

                The tag specified when a task is started. If an Amazon ECS service started the task, the startedBy parameter contains the deployment ID of that service.

              • Group — (String)

                The name of the task group that's associated with the task.

              • Volumes — (Array<map>)

                Details about the data volume that is used in a task definition.

                • Name — (String)

                  The name of the volume. Up to 255 letters (uppercase and lowercase), numbers, underscores, and hyphens are allowed. This name is referenced in the sourceVolume parameter of container definition mountPoints.

                • Host — (map)

                  This parameter is specified when you use bind mount host volumes. The contents of the host parameter determine whether your bind mount host volume persists on the host container instance and where it's stored.

                  • SourcePath — (String)

                    When the host parameter is used, specify a sourcePath to declare the path on the host container instance that's presented to the container.

              • Containers — (Array<map>)

                The containers that are associated with the task.

                • Name — (String)

                  The name of the container.

                • Image — (String)

                  The image used for the container.

                • MountPoints — (Array<map>)

                  The mount points for data volumes in your container.

                  • SourceVolume — (String)

                    The name of the volume to mount. Must be a volume name referenced in the name parameter of task definition volume.

                  • ContainerPath — (String)

                    The path on the container to mount the host volume at.

                • Privileged — (Boolean)

                  When this parameter is true, the container is given elevated privileges on the host container instance (similar to the root user).

            • AwsBackupBackupVault — (map)

              Provides details about an Backup backup vault.

              • BackupVaultArn — (String)

                An Amazon Resource Name (ARN) that uniquely identifies a backup vault.

              • BackupVaultName — (String)

                The name of a logical container where backups are stored. Backup vaults are identified by names that are unique to the Amazon Web Services account used to create them and the Amazon Web Services Region where they are created. They consist of lowercase letters, numbers, and hyphens.

              • EncryptionKeyArn — (String)

                The unique ARN associated with the server-side encryption key. You can specify a key to encrypt your backups from services that support full Backup management. If you do not specify a key, Backup creates an KMS key for you by default.

              • Notifications — (map)

                The Amazon SNS event notifications for the specified backup vault.

                • BackupVaultEvents — (Array<String>)

                  An array of events that indicate the status of jobs to back up resources to the backup vault. The following events are supported:

                  • BACKUP_JOB_STARTED | BACKUP_JOB_COMPLETED

                  • COPY_JOB_STARTED | COPY_JOB_SUCCESSFUL | COPY_JOB_FAILED

                  • RESTORE_JOB_STARTED | RESTORE_JOB_COMPLETED | RECOVERY_POINT_MODIFIED

                  • S3_BACKUP_OBJECT_FAILED | S3_RESTORE_OBJECT_FAILED

                • SnsTopicArn — (String)

                  The Amazon Resource Name (ARN) that uniquely identifies the Amazon SNS topic for a backup vault's events.

              • AccessPolicy — (String)

                A resource-based policy that is used to manage access permissions on the target backup vault.

            • AwsBackupBackupPlan — (map)

              Provides details about an Backup backup plan.

              • BackupPlan — (map)

                Uniquely identifies the backup plan to be associated with the selection of resources.

                • BackupPlanName — (String)

                  The display name of a backup plan.

                • AdvancedBackupSettings — (Array<map>)

                  A list of backup options for each resource type.

                  • BackupOptions — (map<String>)

                    Specifies the backup option for a selected resource. This option is only available for Windows Volume Shadow Copy Service (VSS) backup jobs. Valid values are as follows:

                    • Set to WindowsVSS: enabled to enable the WindowsVSS backup option and create a Windows VSS backup.

                    • Set to WindowsVSS: disabled to create a regular backup. The WindowsVSS option is not enabled by default.

                  • ResourceType — (String)

                    The name of a resource type. The only supported resource type is Amazon EC2 instances with Windows VSS.

                    The only valid value is EC2.

                • BackupPlanRule — (Array<map>)

                  An array of BackupRule objects, each of which specifies a scheduled task that is used to back up a selection of resources.

                  • TargetBackupVault — (String)

                    The name of a logical container where backups are stored. Backup vaults are identified by names that are unique to the Amazon Web Services account used to create them and the Amazon Web Services Region where they are created. They consist of letters, numbers, and hyphens.

                  • StartWindowMinutes — (Integer)

                    A value in minutes after a backup is scheduled before a job will be canceled if it doesn't start successfully.

                  • ScheduleExpression — (String)

                    A cron expression in UTC specifying when Backup initiates a backup job.

                  • RuleName — (String)

                    A display name for a backup rule. Must contain 1 to 50 alphanumeric or '-_.' characters.

                  • RuleId — (String)

                    Uniquely identifies a rule that is used to schedule the backup of a selection of resources.

                  • EnableContinuousBackup — (Boolean)

                    Specifies whether Backup creates continuous backups capable of point-in-time restore (PITR).

                  • CompletionWindowMinutes — (Integer)

                    A value in minutes after a backup job is successfully started before it must be completed, or it is canceled by Backup.

                  • CopyActions — (Array<map>)

                    An array of CopyAction objects, each of which contains details of the copy operation.

                    • DestinationBackupVaultArn — (String)

                      An Amazon Resource Name (ARN) that uniquely identifies the destination backup vault for the copied backup.

                    • Lifecycle — (map)

                      Defines when a protected resource is transitioned to cold storage and when it expires. Backup transitions and expires backups automatically according to the lifecycle that you define. If you do not specify a lifecycle, Backup applies the lifecycle policy of the source backup to the destination backup.

                      Backups transitioned to cold storage must be stored in cold storage for a minimum of 90 days.

                      • DeleteAfterDays — (Integer)

                        Specifies the number of days after creation that a recovery point is deleted. Must be greater than 90 days plus MoveToColdStorageAfterDays.

                      • MoveToColdStorageAfterDays — (Integer)

                        Specifies the number of days after creation that a recovery point is moved to cold storage.

                  • Lifecycle — (map)

                    Defines when a protected resource is transitioned to cold storage and when it expires. Backup transitions and expires backups automatically according to the lifecycle that you define. If you do not specify a lifecycle, Backup applies the lifecycle policy of the source backup to the destination backup.

                    Backups transitioned to cold storage must be stored in cold storage for a minimum of 90 days.

                    • DeleteAfterDays — (Integer)

                      Specifies the number of days after creation that a recovery point is deleted. Must be greater than 90 days plus MoveToColdStorageAfterDays.

                    • MoveToColdStorageAfterDays — (Integer)

                      Specifies the number of days after creation that a recovery point is moved to cold storage.

              • BackupPlanArn — (String)

                An Amazon Resource Name (ARN) that uniquely identifies the backup plan.

              • BackupPlanId — (String)

                A unique ID for the backup plan.

              • VersionId — (String)

                Unique, randomly generated, Unicode, UTF-8 encoded strings. Version IDs cannot be edited.

            • AwsBackupRecoveryPoint — (map)

              Provides details about an Backup backup, or recovery point.

              • BackupSizeInBytes — (Integer)

                The size, in bytes, of a backup.

              • BackupVaultArn — (String)

                An Amazon Resource Name (ARN) that uniquely identifies a backup vault.

              • BackupVaultName — (String)

                The name of a logical container where backups are stored. Backup vaults are identified by names that are unique to the Amazon Web Services account used to create them and the Amazon Web Services Region where they are created. They consist of lowercase letters, numbers, and hyphens.

              • CalculatedLifecycle — (map)

                A CalculatedLifecycle object containing DeleteAt and MoveToColdStorageAt timestamps.

                • DeleteAt — (String)

                  Specifies the number of days after creation that a recovery point is deleted. Must be greater than 90 days plus MoveToColdStorageAfterDays.

                • MoveToColdStorageAt — (String)

                  Specifies the number of days after creation that a recovery point is moved to cold storage.

              • CompletionDate — (String)

                The date and time that a job to create a recovery point is completed, in Unix format and UTC. The value of CompletionDate is accurate to milliseconds. For example, the value 1516925490.087 represents Friday, January 26, 2018 12:11:30.087 AM.

              • CreatedBy — (map)

                Contains identifying information about the creation of a recovery point, including the BackupPlanArn, BackupPlanId, BackupPlanVersion, and BackupRuleId of the backup plan that is used to create it.

                • BackupPlanArn — (String)

                  An Amazon Resource Name (ARN) that uniquely identifies a backup plan.

                • BackupPlanId — (String)

                  Uniquely identifies a backup plan.

                • BackupPlanVersion — (String)

                  Unique, randomly generated, Unicode, UTF-8 encoded strings that are at most 1,024 bytes long. Version IDs cannot be edited.

                • BackupRuleId — (String)

                  Uniquely identifies a rule used to schedule the backup of a selection of resources.

              • CreationDate — (String)

                The date and time a recovery point is created, in Unix format and UTC. The value of CreationDate is accurate to milliseconds. For example, the value 1516925490.087 represents Friday, January 26, 2018 12:11:30.087 AM.

              • EncryptionKeyArn — (String)

                The ARN for the server-side encryption key that is used to protect your backups.

              • IamRoleArn — (String)

                Specifies the IAM role ARN used to create the target recovery point

              • IsEncrypted — (Boolean)

                A Boolean value that is returned as TRUE if the specified recovery point is encrypted, or FALSE if the recovery point is not encrypted.

              • LastRestoreTime — (String)

                The date and time that a recovery point was last restored, in Unix format and UTC. The value of LastRestoreTime is accurate to milliseconds. For example, the value 1516925490.087 represents Friday, January 26, 2018 12:11:30.087 AM.

              • Lifecycle — (map)

                The lifecycle defines when a protected resource is transitioned to cold storage and when it expires. Backup transitions and expires backups automatically according to the lifecycle that you define

                • DeleteAfterDays — (Integer)

                  Specifies the number of days after creation that a recovery point is deleted. Must be greater than 90 days plus MoveToColdStorageAfterDays.

                • MoveToColdStorageAfterDays — (Integer)

                  Specifies the number of days after creation that a recovery point is moved to cold storage.

              • RecoveryPointArn — (String)

                An ARN that uniquely identifies a recovery point.

              • ResourceArn — (String)

                An ARN that uniquely identifies a resource. The format of the ARN depends on the resource type.

              • ResourceType — (String)

                The type of Amazon Web Services resource saved as a recovery point, such as an Amazon EBS volume or an Amazon RDS database.

              • SourceBackupVaultArn — (String)

                The ARN for the backup vault where the recovery point was originally copied from. If the recovery point is restored to the same account, this value will be null.

              • Status — (String)

                A status code specifying the state of the recovery point. Valid values are as follows:

                • COMPLETED

                • DELETING

                • EXPIRED

                • PARTIAL

              • StatusMessage — (String)

                A message explaining the reason of the recovery point deletion failure.

              • StorageClass — (String)

                Specifies the storage class of the recovery point. Valid values are as follows:

                • COLD

                • DELETED

                • WARM

            • AwsEc2LaunchTemplate — (map)

              Specifies the properties for creating an Amazon Elastic Compute Cloud (Amazon EC2) launch template.

              • LaunchTemplateName — (String)

                A name for the launch template.

              • Id — (String)

                An ID for the launch template.

              • LaunchTemplateData — (map)

                The information to include in the launch template.

                • BlockDeviceMappingSet — (Array<map>)

                  Information about a block device mapping for an Amazon EC2 launch template.

                  • DeviceName — (String)

                    The device name.

                  • Ebs — (map)

                    Parameters used to automatically set up Amazon EBS volumes when the instance is launched.

                    • DeleteOnTermination — (Boolean)

                      Indicates whether the EBS volume is deleted on instance termination.

                    • Encrypted — (Boolean)

                      Indicates whether the EBS volume is encrypted. Encrypted volumes can only be attached to instances that support Amazon EBS encryption. If you're creating a volume from a snapshot, you can't specify an encryption value.

                    • Iops — (Integer)

                      The number of I/O operations per second (IOPS).

                    • KmsKeyId — (String)

                      The Amazon Resource Name (ARN) of the symmetric Key Management Service (KMS) customer managed key used for encryption.

                    • SnapshotId — (String)

                      The ID of the EBS snapshot.

                    • Throughput — (Integer)

                      The throughput to provision for a gp3 volume, with a maximum of 1,000 MiB/s.

                    • VolumeSize — (Integer)

                      The size of the volume, in GiBs. You must specify either a snapshot ID or a volume size.

                    • VolumeType — (String)

                      The volume type.

                  • NoDevice — (String)

                    Omits the device from the block device mapping when an empty string is specified.

                  • VirtualName — (String)

                    The virtual device name (ephemeralN). Instance store volumes are numbered starting from 0. An instance type with 2 available instance store volumes can specify mappings for ephemeral0 and ephemeral1. The number of available instance store volumes depends on the instance type.

                • CapacityReservationSpecification — (map)

                  Specifies an instance's Capacity Reservation targeting option. You can specify only one option at a time.

                  • CapacityReservationPreference — (String)

                    Indicates the instance's Capacity Reservation preferences. If equal to open, the instance can run in any open Capacity Reservation that has matching attributes (instance type, platform, Availability Zone). If equal to none, the instance avoids running in a Capacity Reservation even if one is available. The instance runs in On-Demand capacity.

                  • CapacityReservationTarget — (map)

                    Specifies a target Capacity Reservation.

                    • CapacityReservationId — (String)

                      The ID of the Capacity Reservation in which to run the instance.

                    • CapacityReservationResourceGroupArn — (String)

                      The Amazon Resource Name (ARN) of the Capacity Reservation resource group in which to run the instance.

                • CpuOptions — (map)

                  Specifies the CPU options for an instance. For more information, see Optimize CPU options in the Amazon Elastic Compute Cloud User Guide.

                  • CoreCount — (Integer)

                    The number of CPU cores for the instance.

                  • ThreadsPerCore — (Integer)

                    The number of threads per CPU core. A value of 1 disables multithreading for the instance, The default value is 2.

                • CreditSpecification — (map)

                  Specifies the credit option for CPU usage of a T2, T3, or T3a instance.

                  • CpuCredits — (String)

                    The credit option for CPU usage of a T instance.

                • DisableApiStop — (Boolean)

                  Indicates whether to enable the instance for stop protection. For more information, see Enable stop protection in the Amazon EC2 User Guide.

                • DisableApiTermination — (Boolean)

                  If you set this parameter to true, you can't terminate the instance using the Amazon EC2 console, CLI, or API. If set to true, you can.

                • EbsOptimized — (Boolean)

                  Indicates whether the instance is optimized for Amazon EBS I/O.

                • ElasticGpuSpecificationSet — (Array<map>)

                  Provides details about Elastic Graphics accelerators to associate with the instance.

                  • Type — (String)

                    The type of Elastic Graphics accelerator.

                • ElasticInferenceAcceleratorSet — (Array<map>)

                  The Amazon Elastic Inference accelerator for the instance.

                  • Count — (Integer)

                    The number of Elastic Inference accelerators to attach to the instance.

                  • Type — (String)

                    The type of Elastic Inference accelerator.

                • EnclaveOptions — (map)

                  Indicates whether the Amazon EC2 instance is enabled for Amazon Web Services Nitro Enclaves.

                  • Enabled — (Boolean)

                    If this parameter is set to true, the instance is enabled for Amazon Web Services Nitro Enclaves.

                • HibernationOptions — (map)

                  Specifies whether your Amazon EC2 instance is configured for hibernation.

                  • Configured — (Boolean)

                    If you set this parameter to true, the instance is enabled for hibernation.

                • IamInstanceProfile — (map)

                  The name or Amazon Resource Name (ARN) of an IAM instance profile.

                  • Arn — (String)

                    The Amazon Resource Name (ARN) of the instance profile.

                  • Name — (String)

                    The name of the instance profile.

                • ImageId — (String)

                  The ID of the Amazon Machine Image (AMI).

                • InstanceInitiatedShutdownBehavior — (String)

                  Provides the options for specifying the instance initiated shutdown behavior.

                • InstanceMarketOptions — (map)

                  Specifies the market (purchasing) option for an instance.

                  • MarketType — (String)

                    The market type.

                  • SpotOptions — (map)

                    The options for Spot Instances.

                    • BlockDurationMinutes — (Integer)

                      Deprecated.

                    • InstanceInterruptionBehavior — (String)

                      The behavior when a Spot Instance is interrupted.

                    • MaxPrice — (String)

                      The maximum hourly price you're willing to pay for the Spot Instances.

                    • SpotInstanceType — (String)

                      The Spot Instance request type.

                    • ValidUntil — (String)

                      The end date of the request, in UTC format (YYYY-MM-DDTHH:MM:SSZ), for persistent requests.

                • InstanceRequirements — (map)

                  The attributes for the instance types. When you specify instance attributes, Amazon EC2 will identify instance types with these attributes. If you specify InstanceRequirements, you can't specify InstanceType.

                  • AcceleratorCount — (map)

                    The minimum and maximum number of accelerators (GPUs, FPGAs, or Amazon Web Services Inferentia chips) on an instance.

                    • Max — (Integer)

                      The maximum number of accelerators. If this parameter isn't specified, there's no maximum limit. To exclude accelerator-enabled instance types, set Max to 0.

                    • Min — (Integer)

                      The minimum number of accelerators. If this parameter isn't specified, there's no minimum limit.

                  • AcceleratorManufacturers — (Array<String>)

                    Indicates whether instance types must have accelerators by specific manufacturers.

                  • AcceleratorNames — (Array<String>)

                    The accelerators that must be on the instance type.

                  • AcceleratorTotalMemoryMiB — (map)

                    The minimum and maximum amount of total accelerator memory, in MiB.

                    • Max — (Integer)

                      The maximum amount of memory, in MiB. If this parameter isn't specified, there's no maximum limit.

                    • Min — (Integer)

                      The minimum amount of memory, in MiB. If 0 is specified, there's no maximum limit.

                  • AcceleratorTypes — (Array<String>)

                    The accelerator types that must be on the instance type.

                  • BareMetal — (String)

                    Indicates whether bare metal instance types must be included, excluded, or required.

                  • BaselineEbsBandwidthMbps — (map)

                    The minimum and maximum baseline bandwidth to Amazon EBS, in Mbps. For more information, see Amazon EBS optimized instances in the Amazon EC2 User Guide.

                    • Max — (Integer)

                      The maximum baseline bandwidth, in Mbps. If this parameter is omitted, there's no maximum limit.

                    • Min — (Integer)

                      The minimum baseline bandwidth, in Mbps. If this parameter is omitted, there's no minimum limit.

                  • BurstablePerformance — (String)

                    Indicates whether burstable performance T instance types are included, excluded, or required. For more information, Burstable performance instances in the Amazon EC2 User Guide.

                  • CpuManufacturers — (Array<String>)

                    The CPU manufacturers to include.

                  • ExcludedInstanceTypes — (Array<String>)

                    The instance types to exclude.

                  • InstanceGenerations — (Array<String>)

                    Indicates whether current or previous generation instance types are included.

                  • LocalStorage — (String)

                    Indicates whether instance types with instance store volumes are included, excluded, or required. For more information, see Amazon EC2 instance store in the Amazon EC2 User Guide.

                  • LocalStorageTypes — (Array<String>)

                    The type of local storage that is required.

                  • MemoryGiBPerVCpu — (map)

                    The minimum and maximum amount of memory per vCPU, in GiB.

                    • Max — (Float)

                      The maximum amount of memory per vCPU, in GiB. If this parameter is omitted, there's no maximum limit.

                    • Min — (Float)

                      The minimum amount of memory per vCPU, in GiB. If this parameter is omitted, there's no maximum limit.

                  • MemoryMiB — (map)

                    The minimum and maximum amount of memory, in MiB.

                    • Max — (Integer)

                      The maximum amount of memory, in MiB.

                    • Min — (Integer)

                      The minimum amount of memory, in MiB.

                  • NetworkInterfaceCount — (map)

                    The minimum and maximum number of network interfaces.

                    • Max — (Integer)

                      The maximum number of network interfaces.

                    • Min — (Integer)

                      The minimum number of network interfaces.

                  • OnDemandMaxPricePercentageOverLowestPrice — (Integer)

                    The price protection threshold for On-Demand Instances. This is the maximum you'll pay for an On-Demand Instance, expressed as a percentage above the least expensive current generation M, C, or R instance type with your specified attributes. When Amazon EC2 selects instance types with your attributes, it excludes instance types priced above your threshold.

                    The parameter accepts an integer, which Amazon EC2 interprets as a percentage.

                    A high value, such as 999999, turns off price protection.

                  • RequireHibernateSupport — (Boolean)

                    Indicates whether instance types must support hibernation for On-Demand Instances.

                  • SpotMaxPricePercentageOverLowestPrice — (Integer)

                    The price protection threshold for Spot Instances. This is the maximum you'll pay for a Spot Instance, expressed as a percentage above the least expensive current generation M, C, or R instance type with your specified attributes. When Amazon EC2 selects instance types with your attributes, it excludes instance types priced above your threshold.

                    The parameter accepts an integer, which Amazon EC2 interprets as a percentage.

                    A high value, such as 999999, turns off price protection.

                  • TotalLocalStorageGB — (map)

                    The minimum and maximum amount of total local storage, in GB.

                    • Max — (Float)

                      The maximum amount of total local storage, in GB.

                    • Min — (Float)

                      The minimum amount of total local storage, in GB.

                  • VCpuCount — (map)

                    The minimum and maximum number of vCPUs.

                    • Max — (Integer)

                      The maximum number of vCPUs.

                    • Min — (Integer)

                      The minimum number of vCPUs.

                • InstanceType — (String)

                  The instance type. For more information, see Instance types in the Amazon EC2 User Guide. If you specify InstanceType, you can't specify InstanceRequirements.

                • KernelId — (String)

                  The ID of the kernel.

                • KeyName — (String)

                  The name of the key pair that allows users to connect to the instance.

                • LicenseSet — (Array<map>)

                  Specifies a license configuration for an instance.

                  • LicenseConfigurationArn — (String)

                    The Amazon Resource Name (ARN) of the license configuration.

                • MaintenanceOptions — (map)

                  The maintenance options of your instance.

                  • AutoRecovery — (String)

                    Disables the automatic recovery behavior of your instance or sets it to default.

                • MetadataOptions — (map)

                  The metadata options for the instance. For more information, see Instance metadata and user data in the Amazon EC2 User Guide.

                  • HttpEndpoint — (String)

                    Enables or disables the HTTP metadata endpoint on your instances. If the parameter is not specified, the default state is enabled, and you won't be able to access your instance metadata.

                  • HttpProtocolIpv6 — (String)

                    Enables or disables the IPv6 endpoint for the instance metadata service.

                  • HttpTokens — (String)

                    The state of token usage for your instance metadata requests.

                  • HttpPutResponseHopLimit — (Integer)

                    The desired HTTP PUT response hop limit for instance metadata requests. The larger the number, the further instance metadata requests can travel.

                  • InstanceMetadataTags — (String)

                    When set to enabled, this parameter allows access to instance tags from the instance metadata. When set to disabled, it turns off access to instance tags from the instance metadata. For more information, see Work with instance tags in instance metadata in the Amazon EC2 User Guide.

                • Monitoring — (map)

                  The monitoring for the instance.

                • NetworkInterfaceSet — (Array<map>)

                  Specifies the parameters for a network interface that is attached to the instance.

                  • AssociateCarrierIpAddress — (Boolean)

                    Indicates whether to associate a Carrier IP address with eth0 for a new network interface. You use this option when you launch an instance in a Wavelength Zone and want to associate a Carrier IP address with the network interface. For more information, see Carrier IP address in the Wavelength Developer Guide.

                  • AssociatePublicIpAddress — (Boolean)

                    Associates a public IPv4 address with eth0 for a new network interface.

                  • DeleteOnTermination — (Boolean)

                    Indicates whether the network interface is deleted when the instance is terminated.

                  • Description — (String)

                    A description for the network interface.

                  • DeviceIndex — (Integer)

                    The device index for the network interface attachment.

                  • Groups — (Array<String>)

                    The IDs of one or more security groups.

                  • InterfaceType — (String)

                    The type of network interface.

                  • Ipv4PrefixCount — (Integer)

                    The number of IPv4 prefixes to be automatically assigned to the network interface. You cannot use this option if you use the Ipv4Prefixes option.

                  • Ipv4Prefixes — (Array<map>)

                    One or more IPv4 prefixes to be assigned to the network interface. You cannot use this option if you use the Ipv4PrefixCount option.

                  • Ipv6AddressCount — (Integer)

                    The number of IPv6 addresses to assign to a network interface. Amazon EC2 automatically selects the IPv6 addresses from the subnet range. You can't use this option if you use Ipv6Addresses.

                  • Ipv6Addresses — (Array<map>)

                    One or more specific IPv6 addresses from the IPv6 CIDR block range of your subnet. You can't use this option if you use Ipv6AddressCount.

                    • Ipv6Address — (String)

                      One or more specific IPv6 addresses from the IPv6 CIDR block range of your subnet.

                  • Ipv6PrefixCount — (Integer)

                    The number of IPv6 prefixes to be automatically assigned to the network interface. You cannot use this option if you use the Ipv6Prefix option.

                  • Ipv6Prefixes — (Array<map>)

                    One or more IPv6 prefixes to be assigned to the network interface. You cannot use this option if you use the Ipv6PrefixCount option.

                    • Ipv6Prefix — (String)

                      The IPv6 prefix.

                  • NetworkCardIndex — (Integer)

                    The index of the network card. Some instance types support multiple network cards. The primary network interface must be assigned to network card index 0. The default is network card index 0.

                  • NetworkInterfaceId — (String)

                    The ID of the network interface.

                  • PrivateIpAddress — (String)

                    The primary private IPv4 address of the network interface.

                  • PrivateIpAddresses — (Array<map>)

                    One or more private IPv4 addresses.

                    • Primary — (Boolean)

                      Indicates whether the private IPv4 address is the primary private IPv4 address. Only one IPv4 address can be designated as primary.

                    • PrivateIpAddress — (String)

                      The private IPv4 address.

                  • SecondaryPrivateIpAddressCount — (Integer)

                    The number of secondary private IPv4 addresses to assign to a network interface.

                  • SubnetId — (String)

                    The ID of the subnet for the network interface.

                • Placement — (map)

                  Specifies the placement of an instance.

                  • Affinity — (String)

                    The affinity setting for an instance on an EC2 Dedicated Host.

                  • AvailabilityZone — (String)

                    The Availability Zone for the instance.

                  • GroupName — (String)

                    The name of the placement group for the instance.

                  • HostId — (String)

                    The ID of the Dedicated Host for the instance.

                  • HostResourceGroupArn — (String)

                    The Amazon Resource Name (ARN) of the host resource group in which to launch the instances.

                  • PartitionNumber — (Integer)

                    The number of the partition the instance should launch in.

                  • SpreadDomain — (String)

                    Reserved for future use.

                  • Tenancy — (String)

                    The tenancy of the instance (if the instance is running in a VPC). An instance with a tenancy of dedicated runs on single-tenant hardware.

                • PrivateDnsNameOptions — (map)

                  The options for the instance hostname.

                  • EnableResourceNameDnsAAAARecord — (Boolean)

                    Indicates whether to respond to DNS queries for instance hostnames with DNS AAAA records.

                  • EnableResourceNameDnsARecord — (Boolean)

                    Indicates whether to respond to DNS queries for instance hostnames with DNS A records.

                  • HostnameType — (String)

                    The type of hostname for EC2 instances.

                • RamDiskId — (String)

                  The ID of the RAM disk.

                • SecurityGroupIdSet — (Array<String>)

                  One or more security group IDs.

                • SecurityGroupSet — (Array<String>)

                  One or more security group names. For a nondefault VPC, you must use security group IDs instead. You cannot specify both a security group ID and security name in the same request.

                • UserData — (String)

                  The user data to make available to the instance.

              • DefaultVersionNumber — (Integer)

                The default version of the launch template.

              • LatestVersionNumber — (Integer)

                The latest version of the launch template.

            • AwsSageMakerNotebookInstance — (map)

              Provides details about an Amazon SageMaker notebook instance.

              • AcceleratorTypes — (Array<String>)

                A list of Amazon Elastic Inference instance types to associate with the notebook instance. Currently, only one instance type can be associated with a notebook instance.

              • AdditionalCodeRepositories — (Array<String>)

                An array of up to three Git repositories associated with the notebook instance. These can be either the names of Git repositories stored as resources in your account, or the URL of Git repositories in CodeCommit or in any other Git repository. These repositories are cloned at the same level as the default repository of your notebook instance. For more information, see Associating Git repositories with SageMaker notebook instances in the Amazon SageMaker Developer Guide.

              • DefaultCodeRepository — (String)

                The Git repository associated with the notebook instance as its default code repository. This can be either the name of a Git repository stored as a resource in your account, or the URL of a Git repository in CodeCommit or in any other Git repository. When you open a notebook instance, it opens in the directory that contains this repository. For more information, see Associating Git repositories with SageMaker notebook instances in the Amazon SageMaker Developer Guide.

              • DirectInternetAccess — (String)

                Sets whether SageMaker provides internet access to the notebook instance. If you set this to Disabled, this notebook instance is able to access resources only in your VPC, and is not be able to connect to SageMaker training and endpoint services unless you configure a Network Address Translation (NAT) Gateway in your VPC.

              • FailureReason — (String)

                If status of the instance is Failed, the reason it failed.

              • InstanceMetadataServiceConfiguration — (map)

                Information on the IMDS configuration of the notebook instance.

                • MinimumInstanceMetadataServiceVersion — (String)

                  Indicates the minimum IMDS version that the notebook instance supports.

              • InstanceType — (String)

                The type of machine learning (ML) compute instance to launch for the notebook instance.

              • KmsKeyId — (String)

                The Amazon Resource Name (ARN) of an Key Management Service (KMS) key that SageMaker uses to encrypt data on the storage volume attached to your notebook instance. The KMS key you provide must be enabled. For information, see Enabling and disabling keys in the Key Management Service Developer Guide.

              • NetworkInterfaceId — (String)

                The network interface ID that SageMaker created when the instance was created.

              • NotebookInstanceArn — (String)

                The Amazon Resource Name (ARN) of the notebook instance.

              • NotebookInstanceLifecycleConfigName — (String)

                The name of a notebook instance lifecycle configuration.

              • NotebookInstanceName — (String)

                The name of the new notebook instance.

              • NotebookInstanceStatus — (String)

                The status of the notebook instance.

              • PlatformIdentifier — (String)

                The platform identifier of the notebook instance runtime environment.

              • RoleArn — (String)

                The Amazon Resource Name (ARN) of the IAM role associated with the instance.

              • RootAccess — (String)

                Whether root access is enabled or disabled for users of the notebook instance.

              • SecurityGroups — (Array<String>)

                The VPC security group IDs.

              • SubnetId — (String)

                The ID of the VPC subnet to which you have a connectivity from your ML compute instance.

              • Url — (String)

                The URL that you use to connect to the Jupyter notebook that is running in your notebook instance.

              • VolumeSizeInGB — (Integer)

                The size, in GB, of the ML storage volume to attach to the notebook instance.

            • AwsWafv2WebAcl — (map)

              Details about an WAFv2 web Access Control List (ACL).

              • Name — (String)

                The name of the web ACL.

              • Arn — (String)

                The Amazon Resource Name (ARN) of the web ACL that you want to associate with the resource.

              • ManagedbyFirewallManager — (Boolean)

                Indicates whether this web ACL is managed by Firewall Manager.

              • Id — (String)

                A unique identifier for the web ACL.

              • Capacity — (Integer)

                The web ACL capacity units (WCUs) currently being used by this web ACL.

              • CaptchaConfig — (map)

                Specifies how WAF should handle CAPTCHA evaluations for rules that don't have their own CaptchaConfig settings.

                • ImmunityTimeProperty — (map)

                  Determines how long a CAPTCHA timestamp in the token remains valid after the client successfully solves a CAPTCHA puzzle.

                  • ImmunityTime — (Integer)

                    The amount of time, in seconds, that a CAPTCHA or challenge timestamp is considered valid by WAF.

              • DefaultAction — (map)

                The action to perform if none of the Rules contained in the web ACL match.

                • Allow — (map)

                  Specifies that WAF should allow requests by default.

                  • CustomRequestHandling — (map)

                    Defines custom handling for the web request. For information about customizing web requests and responses, see Customizing web requests and responses in WAF in the WAF Developer Guide..

                    • InsertHeaders — (Array<map>)

                      The HTTP headers to insert into the request.

                      • Name — (String)

                        The name of the custom header.

                      • Value — (String)

                        The value of the custom header.

                • Block — (map)

                  Specifies that WAF should block requests by default.

                  • CustomResponse — (map)

                    Defines a custom response for the web request. For information, see Customizing web requests and responses in WAF in the WAF Developer Guide..

                    • CustomResponseBodyKey — (String)

                      References the response body that you want WAF to return to the web request client. You can define a custom response for a rule action or a default web ACL action that is set to block.

                    • ResponseCode — (Integer)

                      The HTTP status code to return to the client. For a list of status codes that you can use in your custom responses, see Supported status codes for custom response in the WAF Developer Guide.

                    • ResponseHeaders — (Array<map>)

                      The HTTP headers to use in the response.

                      • Name — (String)

                        The name of the custom header.

                      • Value — (String)

                        The value of the custom header.

              • Description — (String)

                A description of the web ACL that helps with identification.

              • Rules — (Array<map>)

                The Rule statements used to identify the web requests that you want to allow, block, or count. Each rule includes one top-level statement that WAF uses to identify matching web requests, and parameters that govern how WAF handles them.

                • Action — (map)

                  The action that WAF should take on a web request when it matches the rule statement. Settings at the web ACL level can override the rule action setting.

                  • Allow — (map)

                    Instructs WAF to allow the web request.

                    • CustomRequestHandling — (map)

                      Defines custom handling for the web request. For information about customizing web requests and responses, see Customizing web requests and responses in WAF in the WAF Developer Guide..

                      • InsertHeaders — (Array<map>)

                        The HTTP headers to insert into the request.

                        • Name — (String)

                          The name of the custom header.

                        • Value — (String)

                          The value of the custom header.

                  • Block — (map)

                    Instructs WAF to block the web request.

                    • CustomResponse — (map)

                      Defines a custom response for the web request. For information, see Customizing web requests and responses in WAF in the WAF Developer Guide..

                      • CustomResponseBodyKey — (String)

                        References the response body that you want WAF to return to the web request client. You can define a custom response for a rule action or a default web ACL action that is set to block.

                      • ResponseCode — (Integer)

                        The HTTP status code to return to the client. For a list of status codes that you can use in your custom responses, see Supported status codes for custom response in the WAF Developer Guide.

                      • ResponseHeaders — (Array<map>)

                        The HTTP headers to use in the response.

                        • Name — (String)

                          The name of the custom header.

                        • Value — (String)

                          The value of the custom header.

                  • Captcha — (map)

                    Instructs WAF to run a CAPTCHA check against the web request.

                    • CustomRequestHandling — (map)

                      Defines custom handling for the web request, used when the CAPTCHA inspection determines that the request's token is valid and unexpired. For more information, see Customizing web requests and responses in WAF in the WAF Developer Guide..

                      • InsertHeaders — (Array<map>)

                        The HTTP headers to insert into the request.

                        • Name — (String)

                          The name of the custom header.

                        • Value — (String)

                          The value of the custom header.

                  • Count — (map)

                    Instructs WAF to count the web request and then continue evaluating the request using the remaining rules in the web ACL.

                    • CustomRequestHandling — (map)

                      Defines custom handling for the web request. For more information, see Customizing web requests and responses in WAF in the WAF Developer Guide..

                      • InsertHeaders — (Array<map>)

                        The HTTP headers to insert into the request.

                        • Name — (String)

                          The name of the custom header.

                        • Value — (String)

                          The value of the custom header.

                • Name — (String)

                  The name of the rule.

                • OverrideAction — (String)

                  The action to use in the place of the action that results from the rule group evaluation.

                • Priority — (Integer)

                  If you define more than one Rule in a WebACL, WAF evaluates each request against the Rules in order based on the value of Priority. WAF processes rules with lower priority first. The priorities don't need to be consecutive, but they must all be different.

                • VisibilityConfig — (map)

                  Defines and enables Amazon CloudWatch metrics and web request sample collection.

                  • CloudWatchMetricsEnabled — (Boolean)

                    A boolean indicating whether the associated resource sends metrics to Amazon CloudWatch. For the list of available metrics, see WAF metrics and dimensions in the WAF Developer Guide.

                  • MetricName — (String)

                    A name of the Amazon CloudWatch metric.

                  • SampledRequestsEnabled — (Boolean)

                    A boolean indicating whether WAF should store a sampling of the web requests that match the rules. You can view the sampled requests through the WAF console.

              • VisibilityConfig — (map)

                Defines and enables Amazon CloudWatch metrics and web request sample collection.

                • CloudWatchMetricsEnabled — (Boolean)

                  A boolean indicating whether the associated resource sends metrics to Amazon CloudWatch. For the list of available metrics, see WAF metrics and dimensions in the WAF Developer Guide.

                • MetricName — (String)

                  A name of the Amazon CloudWatch metric.

                • SampledRequestsEnabled — (Boolean)

                  A boolean indicating whether WAF should store a sampling of the web requests that match the rules. You can view the sampled requests through the WAF console.

            • AwsWafv2RuleGroup — (map)

              Details about an WAFv2 rule group.

              • Capacity — (Integer)

                The web ACL capacity units (WCUs) required for this rule group.

              • Description — (String)

                A description of the rule group that helps with identification.

              • Id — (String)

                A unique identifier for the rule group.

              • Name — (String)

                The name of the rule group. You cannot change the name of a rule group after you create it.

              • Arn — (String)

                The Amazon Resource Name (ARN) of the entity.

              • Rules — (Array<map>)

                The Rule statements used to identify the web requests that you want to allow, block, or count. Each rule includes one top-level statement that WAF uses to identify matching web requests, and parameters that govern how WAF handles them.

                • Action — (map)

                  The action that WAF should take on a web request when it matches the rule statement. Settings at the web ACL level can override the rule action setting.

                  • Allow — (map)

                    Instructs WAF to allow the web request.

                    • CustomRequestHandling — (map)

                      Defines custom handling for the web request. For information about customizing web requests and responses, see Customizing web requests and responses in WAF in the WAF Developer Guide..

                      • InsertHeaders — (Array<map>)

                        The HTTP headers to insert into the request.

                        • Name — (String)

                          The name of the custom header.

                        • Value — (String)

                          The value of the custom header.

                  • Block — (map)

                    Instructs WAF to block the web request.

                    • CustomResponse — (map)

                      Defines a custom response for the web request. For information, see Customizing web requests and responses in WAF in the WAF Developer Guide..

                      • CustomResponseBodyKey — (String)

                        References the response body that you want WAF to return to the web request client. You can define a custom response for a rule action or a default web ACL action that is set to block.

                      • ResponseCode — (Integer)

                        The HTTP status code to return to the client. For a list of status codes that you can use in your custom responses, see Supported status codes for custom response in the WAF Developer Guide.

                      • ResponseHeaders — (Array<map>)

                        The HTTP headers to use in the response.

                        • Name — (String)

                          The name of the custom header.

                        • Value — (String)

                          The value of the custom header.

                  • Captcha — (map)

                    Instructs WAF to run a CAPTCHA check against the web request.

                    • CustomRequestHandling — (map)

                      Defines custom handling for the web request, used when the CAPTCHA inspection determines that the request's token is valid and unexpired. For more information, see Customizing web requests and responses in WAF in the WAF Developer Guide..

                      • InsertHeaders — (Array<map>)

                        The HTTP headers to insert into the request.

                        • Name — (String)

                          The name of the custom header.

                        • Value — (String)

                          The value of the custom header.

                  • Count — (map)

                    Instructs WAF to count the web request and then continue evaluating the request using the remaining rules in the web ACL.

                    • CustomRequestHandling — (map)

                      Defines custom handling for the web request. For more information, see Customizing web requests and responses in WAF in the WAF Developer Guide..

                      • InsertHeaders — (Array<map>)

                        The HTTP headers to insert into the request.

                        • Name — (String)

                          The name of the custom header.

                        • Value — (String)

                          The value of the custom header.

                • Name — (String)

                  The name of the rule.

                • OverrideAction — (String)

                  The action to use in the place of the action that results from the rule group evaluation.

                • Priority — (Integer)

                  If you define more than one Rule in a WebACL, WAF evaluates each request against the Rules in order based on the value of Priority. WAF processes rules with lower priority first. The priorities don't need to be consecutive, but they must all be different.

                • VisibilityConfig — (map)

                  Defines and enables Amazon CloudWatch metrics and web request sample collection.

                  • CloudWatchMetricsEnabled — (Boolean)

                    A boolean indicating whether the associated resource sends metrics to Amazon CloudWatch. For the list of available metrics, see WAF metrics and dimensions in the WAF Developer Guide.

                  • MetricName — (String)

                    A name of the Amazon CloudWatch metric.

                  • SampledRequestsEnabled — (Boolean)

                    A boolean indicating whether WAF should store a sampling of the web requests that match the rules. You can view the sampled requests through the WAF console.

              • Scope — (String)

                Specifies whether the rule group is for an Amazon CloudFront distribution or for a regional application. A regional application can be an Application Load Balancer (ALB), an Amazon API Gateway REST API, an AppSync GraphQL API, or an Amazon Cognito user pool.

              • VisibilityConfig — (map)

                Defines and enables Amazon CloudWatch metrics and web request sample collection.

                • CloudWatchMetricsEnabled — (Boolean)

                  A boolean indicating whether the associated resource sends metrics to Amazon CloudWatch. For the list of available metrics, see WAF metrics and dimensions in the WAF Developer Guide.

                • MetricName — (String)

                  A name of the Amazon CloudWatch metric.

                • SampledRequestsEnabled — (Boolean)

                  A boolean indicating whether WAF should store a sampling of the web requests that match the rules. You can view the sampled requests through the WAF console.

            • AwsEc2RouteTable — (map)

              Provides details about a route table. A route table contains a set of rules, called routes, that determine where to direct network traffic from your subnet or gateway.

              • AssociationSet — (Array<map>)

                The associations between a route table and one or more subnets or a gateway.

                • AssociationState — (map)

                  The state of the association between a route table and a subnet or gateway.

                  • State — (String)

                    The state of the association.

                  • StatusMessage — (String)

                    The status message, if applicable.

                • GatewayId — (String)

                  The ID of the internet gateway or virtual private gateway.

                • Main — (Boolean)

                  Indicates whether this is the main route table.

                • RouteTableAssociationId — (String)

                  The ID of the association.

                • RouteTableId — (String)

                  The ID of the route table.

                • SubnetId — (String)

                  The ID of the subnet. A subnet ID is not returned for an implicit association.

              • OwnerId — (String)

                The ID of the Amazon Web Services account that owns the route table.

              • PropagatingVgwSet — (Array<map>)

                Describes a virtual private gateway propagating route.

                • GatewayId — (String)

                  The ID of the virtual private gateway.

              • RouteTableId — (String)

                The ID of the route table.

              • RouteSet — (Array<map>)

                The routes in the route table.

                • CarrierGatewayId — (String)

                  The ID of the carrier gateway.

                • CoreNetworkArn — (String)

                  The Amazon Resource Name (ARN) of the core network.

                • DestinationCidrBlock — (String)

                  The IPv4 CIDR block used for the destination match.

                • DestinationIpv6CidrBlock — (String)

                  The IPv6 CIDR block used for the destination match.

                • DestinationPrefixListId — (String)

                  The prefix of the destination Amazon Web Service.

                • EgressOnlyInternetGatewayId — (String)

                  The ID of the egress-only internet gateway.

                • GatewayId — (String)

                  The ID of a gateway attached to your VPC.

                • InstanceId — (String)

                  The ID of a NAT instance in your VPC.

                • InstanceOwnerId — (String)

                  The ID of the Amazon Web Services account that owns the instance.

                • LocalGatewayId — (String)

                  The ID of the local gateway.

                • NatGatewayId — (String)

                  The ID of a NAT gateway.

                • NetworkInterfaceId — (String)

                  The ID of the network interface.

                • Origin — (String)

                  Describes how the route was created.

                • State — (String)

                  The state of the route.

                • TransitGatewayId — (String)

                  The ID of a transit gateway.

                • VpcPeeringConnectionId — (String)

                  The ID of a VPC peering connection.

              • VpcId — (String)

                The ID of the virtual private cloud (VPC).

            • AwsAmazonMqBroker — (map)

              Provides details about AppSync message broker. A message broker allows software applications and components to communicate using various programming languages, operating systems, and formal messaging protocols.

              • AuthenticationStrategy — (String)

                The authentication strategy used to secure the broker. The default is SIMPLE.

              • AutoMinorVersionUpgrade — (Boolean)

                Whether automatically upgrade new minor versions for brokers, as new versions are released and supported by Amazon MQ. Automatic upgrades occur during the scheduled maintenance window of the broker or after a manual broker reboot.

              • BrokerArn — (String)

                The Amazon Resource Name (ARN) of the broker.

              • BrokerName — (String)

                The broker's name.

              • DeploymentMode — (String)

                The broker's deployment mode.

              • EncryptionOptions — (map)

                Encryption options for the broker. Doesn’t apply to RabbitMQ brokers.

                • KmsKeyId — (String)

                  The KMS key that’s used to encrypt your data at rest. If not provided, Amazon MQ will use a default KMS key to encrypt your data.

                • UseAwsOwnedKey — (Boolean)

                  Specifies that an KMS key should be used for at-rest encryption. Set to true by default if no value is provided (for example, for RabbitMQ brokers).

              • EngineType — (String)

                The type of broker engine.

              • EngineVersion — (String)

                The version of the broker engine.

              • HostInstanceType — (String)

                The broker's instance type.

              • BrokerId — (String)

                The unique ID that Amazon MQ generates for the broker.

              • LdapServerMetadata — (map)

                The metadata of the Lightweight Directory Access Protocol (LDAP) server used to authenticate and authorize connections to the broker. This is an optional failover server.

                • Hosts — (Array<String>)

                  Specifies the location of the LDAP server, such as Amazon Web Services Directory Service for Microsoft Active Directory.

                • RoleBase — (String)

                  The distinguished name of the node in the directory information tree (DIT) to search for roles or groups.

                • RoleName — (String)

                  The group name attribute in a role entry whose value is the name of that role.

                • RoleSearchMatching — (String)

                  The LDAP search filter used to find roles within the roleBase.

                • RoleSearchSubtree — (Boolean)

                  The directory search scope for the role. If set to true, the scope is to search the entire subtree.

                • ServiceAccountUsername — (String)

                  A username for the service account, which is an account in your LDAP server that has access to initiate a connection.

                • UserBase — (String)

                  Selects a particular subtree of the directory information tree (DIT) to search for user entries.

                • UserRoleName — (String)

                  The name of the LDAP attribute in the user's directory entry for the user's group membership.

                • UserSearchMatching — (String)

                  The LDAP search filter used to find users within the userBase.

                • UserSearchSubtree — (Boolean)

                  The directory search scope for the user. If set to true, the scope is to search the entire subtree.

              • Logs — (map)

                Turns on Amazon CloudWatch logging for brokers.

                • Audit — (Boolean)

                  Activates audit logging. Every user management action made using JMX or the ActiveMQ Web Console is logged. Doesn't apply to RabbitMQ brokers.

                • General — (Boolean)

                  Activates general logging.

                • AuditLogGroup — (String)

                  The location of the CloudWatch Logs log group where audit logs are sent.

                • GeneralLogGroup — (String)

                  The location of the CloudWatch Logs log group where general logs are sent.

                • Pending — (map)

                  The list of information about logs that are to be turned on for the specified broker.

                  • Audit — (Boolean)

                    Activates audit logging. Every user management action made using JMX or the ActiveMQ Web Console is logged. Doesn't apply to RabbitMQ brokers.

                  • General — (Boolean)

                    Activates general logging.

              • MaintenanceWindowStartTime — (map)

                The scheduled time period (UTC) during which Amazon MQ begins to apply pending updates or patches to the broker.

                • DayOfWeek — (String)

                  The day of the week on which the maintenance window falls.

                • TimeOfDay — (String)

                  The time, in 24-hour format, on which the maintenance window falls.

                • TimeZone — (String)

                  The time zone in either the Country/City format or the UTC offset format. UTC is the default format.

              • PubliclyAccessible — (Boolean)

                Permits connections from applications outside of the VPC that hosts the broker's subnets.

              • SecurityGroups — (Array<String>)

                The list of rules (one minimum, 125 maximum) that authorize connections to brokers.

              • StorageType — (String)

                The broker's storage type.

              • SubnetIds — (Array<String>)

                The list of groups that define which subnets and IP ranges the broker can use from different Availability Zones.

              • Users — (Array<map>)

                The list of all broker usernames for the specified broker. Doesn't apply to RabbitMQ brokers.

                • PendingChange — (String)

                  The type of change pending for the broker user.

                • Username — (String)

                  The username of the broker user.

            • AwsAppSyncGraphQlApi — (map)

              Provides details about an AppSync Graph QL API, which lets you query multiple databases, microservices, and APIs from a single GraphQL endpoint.

              • ApiId — (String)

                The unique identifier for the API.

              • Id — (String)

                The unique identifier for the API.

              • OpenIdConnectConfig — (map)

                Specifies the authorization configuration for using an OpenID Connect compliant service with an AppSync GraphQL API endpoint.

                • AuthTtL — (Integer)

                  The number of milliseconds that a token is valid after being authenticated.

                • ClientId — (String)

                  The client identifier of the relying party at the OpenID identity provider. This identifier is typically obtained when the relying party is registered with the OpenID identity provider. You can specify a regular expression so that AppSync can validate against multiple client identifiers at a time.

                • IatTtL — (Integer)

                  The number of milliseconds that a token is valid after it's issued to a user.

                • Issuer — (String)

                  The issuer for the OIDC configuration. The issuer returned by discovery must exactly match the value of iss in the ID token.

              • Name — (String)

                The API name.

              • LambdaAuthorizerConfig — (map)

                Specifies the configuration for Lambda function authorization.

                • AuthorizerResultTtlInSeconds — (Integer)

                  The number of seconds a response should be cached for. The default is 5 minutes (300 seconds).

                • AuthorizerUri — (String)

                  The Amazon Resource Name (ARN) of the Lambda function to be called for authorization. This can be a standard Lambda ARN, a version ARN (.../v3), or an alias ARN.

                • IdentityValidationExpression — (String)

                  A regular expression for validation of tokens before the Lambda function is called.

              • XrayEnabled — (Boolean)

                Indicates whether to use X-Ray tracing for the GraphQL API.

              • Arn — (String)

                The Amazon Resource Name (ARN) of the API.

              • UserPoolConfig — (map)

                The Amazon Cognito user pools configuration.

                • AppIdClientRegex — (String)

                  A regular expression for validating the incoming Amazon Cognito user pools app client ID. If this value isn't set, no filtering is applied.

                • AwsRegion — (String)

                  The Amazon Web Services Region in which the user pool was created.

                • DefaultAction — (String)

                  The action that you want your GraphQL API to take when a request that uses Amazon Cognito user pools authentication doesn't match the Amazon Cognito user pools configuration.

                • UserPoolId — (String)

                  The user pool ID.

              • AuthenticationType — (String)

                The type of security configuration for your GraphQL API: API key, Identity and Access Management (IAM), OpenID Connect (OIDC), Amazon Cognito user pools, or Lambda.

              • LogConfig — (map)

                The Amazon CloudWatch Logs configuration.

                • CloudWatchLogsRoleArn — (String)

                  The Amazon Resource Name (ARN) of the service role that AppSync assumes to publish to CloudWatch Logs in your account.

                • ExcludeVerboseContent — (Boolean)

                  Set to TRUE to exclude sections that contain information such as headers, context, and evaluated mapping templates, regardless of logging level.

                • FieldLogLevel — (String)

                  The field logging level.

              • AdditionalAuthenticationProviders — (Array<map>)

                A list of additional authentication providers for the GraphQL API.

                • AuthenticationType — (String)

                  The type of security configuration for your GraphQL API: API key, Identity and Access Management (IAM), OpenID Connect (OIDC), Amazon Cognito user pools, or Lambda.

                • LambdaAuthorizerConfig — (map)

                  The configuration for Lambda function authorization.

                  • AuthorizerResultTtlInSeconds — (Integer)

                    The number of seconds a response should be cached for. The default is 5 minutes (300 seconds).

                  • AuthorizerUri — (String)

                    The Amazon Resource Name (ARN) of the Lambda function to be called for authorization. This can be a standard Lambda ARN, a version ARN (.../v3), or an alias ARN.

                  • IdentityValidationExpression — (String)

                    A regular expression for validation of tokens before the Lambda function is called.

                • OpenIdConnectConfig — (map)

                  The OpenID Connect configuration.

                  • AuthTtL — (Integer)

                    The number of milliseconds that a token is valid after being authenticated.

                  • ClientId — (String)

                    The client identifier of the relying party at the OpenID identity provider. This identifier is typically obtained when the relying party is registered with the OpenID identity provider. You can specify a regular expression so that AppSync can validate against multiple client identifiers at a time.

                  • IatTtL — (Integer)

                    The number of milliseconds that a token is valid after it's issued to a user.

                  • Issuer — (String)

                    The issuer for the OIDC configuration. The issuer returned by discovery must exactly match the value of iss in the ID token.

                • UserPoolConfig — (map)

                  The Amazon Cognito user pools configuration.

                  • AppIdClientRegex — (String)

                    A regular expression for validating the incoming Amazon Cognito user pools app client ID. If this value isn't set, no filtering is applied.

                  • AwsRegion — (String)

                    The Amazon Web Services Region in which the user pool was created.

                  • DefaultAction — (String)

                    The action that you want your GraphQL API to take when a request that uses Amazon Cognito user pools authentication doesn't match the Amazon Cognito user pools configuration.

                  • UserPoolId — (String)

                    The user pool ID.

              • WafWebAclArn — (String)

                The Amazon Resource Name (ARN) of the WAF web access control list (web ACL) associated with this GraphQL API, if one exists.

            • AwsEventSchemasRegistry — (map)

              A schema defines the structure of events that are sent to Amazon EventBridge. Schema registries are containers for schemas. They collect and organize schemas so that your schemas are in logical groups.

              • Description — (String)

                A description of the registry to be created.

              • RegistryArn — (String)

                The Amazon Resource Name (ARN) of the registry.

              • RegistryName — (String)

                The name of the schema registry.

            • AwsGuardDutyDetector — (map)

              Provides details about an Amazon GuardDuty detector. A detector is an object that represents the GuardDuty service. A detector is required for GuardDuty to become operational.

              • DataSources — (map)

                Describes which data sources are activated for the detector.

                • CloudTrail — (map)

                  An object that contains information on the status of CloudTrail as a data source for the detector.

                  • Status — (String)

                    Specifies whether CloudTrail is activated as a data source for the detector.

                • DnsLogs — (map)

                  An object that contains information on the status of DNS logs as a data source for the detector.

                  • Status — (String)

                    Describes whether DNS logs is enabled as a data source for the detector.

                • FlowLogs — (map)

                  An object that contains information on the status of VPC Flow Logs as a data source for the detector.

                  • Status — (String)

                    Describes whether VPC Flow Logs are activated as a data source for the detector.

                • Kubernetes — (map)

                  An object that contains information on the status of Kubernetes data sources for the detector.

                  • AuditLogs — (map)

                    Describes whether Kubernetes audit logs are activated as a data source for the detector.

                    • Status — (String)

                      Describes whether Kubernetes audit logs are activated as a data source for the detector.

                • MalwareProtection — (map)

                  An object that contains information on the status of Malware Protection as a data source for the detector.

                  • ScanEc2InstanceWithFindings — (map)

                    Describes the configuration of Malware Protection for EC2 instances with findings.

                    • EbsVolumes — (map)

                      Describes the configuration of scanning EBS volumes (Malware Protection) as a data source.

                      • Reason — (String)

                        Specifies the reason why scanning EBS volumes (Malware Protection) isn’t activated as a data source.

                      • Status — (String)

                        Describes whether scanning EBS volumes is activated as a data source for the detector.

                  • ServiceRole — (String)

                    The GuardDuty Malware Protection service role.

                • S3Logs — (map)

                  An object that contains information on the status of S3 Data event logs as a data source for the detector.

                  • Status — (String)

                    A value that describes whether S3 data event logs are automatically enabled for new members of an organization.

              • Features — (Array<map>)

                Describes which features are activated for the detector.

                • Name — (String)

                  Indicates the name of the feature that is activated for the detector.

                • Status — (String)

                  Indicates the status of the feature that is activated for the detector.

              • FindingPublishingFrequency — (String)

                The publishing frequency of the finding.

              • ServiceRole — (String)

                The GuardDuty service role.

              • Status — (String)

                The activation status of the detector.

            • AwsStepFunctionStateMachine — (map)

              Provides details about an Step Functions state machine, which is a workflow consisting of a series of event-driven steps.

              • Label — (String)

                A user-defined or an auto-generated string that identifies a Map state. This parameter is present only if the stateMachineArn specified in input is a qualified state machine ARN.

              • LoggingConfiguration — (map)

                Used to set CloudWatch Logs options.

                • Destinations — (Array<map>)

                  An array of objects that describes where your execution history events will be logged.

                  • CloudWatchLogsLogGroup — (map)

                    An object describing a CloudWatch Logs log group. For more information, see Amazon Web Services::Logs::LogGroup in the CloudFormation User Guide.

                    • LogGroupArn — (String)

                      The ARN (ends with :*) of the CloudWatch Logs log group to which you want your logs emitted.

                • IncludeExecutionData — (Boolean)

                  Determines whether execution data is included in your log. When set to false, data is excluded.

                • Level — (String)

                  Defines which category of execution history events are logged.

              • Name — (String)

                The name of the state machine.

              • RoleArn — (String)

                The Amazon Resource Name (ARN) of the IAM role used when creating this state machine.

              • StateMachineArn — (String)

                The ARN that identifies the state machine.

              • Status — (String)

                The current status of the state machine.

              • TracingConfiguration — (map)

                Specifies whether X-Ray tracing is enabled.

                • Enabled — (Boolean)

                  When set to true, X-Ray tracing is enabled.

              • Type — (String)

                The type of the state machine (STANDARD or EXPRESS).

            • AwsAthenaWorkGroup — (map)

              Provides information about an Amazon Athena workgroup. A workgroup helps you separate users, teams, applications, or workloads. It also helps you set limits on data processing and track costs.

              • Name — (String)

                The workgroup name.

              • Description — (String)

                The workgroup description.

              • State — (String)

                Whether the workgroup is enabled or disabled.

              • Configuration — (map)

                The configuration of the workgroup, which includes the location in Amazon Simple Storage Service (Amazon S3) where query results are stored, the encryption option, if any, used for query results, whether Amazon CloudWatch metrics are enabled for the workgroup, and the limit for the amount of bytes scanned (cutoff) per query, if it is specified.

                • ResultConfiguration — (map)

                  The location in Amazon S3 where query and calculation results are stored and the encryption option, if any, used for query and calculation results. These are known as client-side settings. If workgroup settings override client-side settings, then the query uses the workgroup settings.

                  • EncryptionConfiguration — (map)

                    Specifies the method used to encrypt the user’s data stores in the Athena workgroup.

                    • EncryptionOption — (String)

                      Indicates whether Amazon Simple Storage Service (Amazon S3) server-side encryption with Amazon S3 managed keys (SSE_S3), server-side encryption with KMS keys (SSE_KMS), or client-side encryption with KMS customer managed keys (CSE_KMS) is used.

                    • KmsKey — (String)

                      For SSE_KMS and CSE_KMS, this is the KMS key Amazon Resource Name (ARN) or ID.

            • AwsEventsEventbus — (map)

              Provides details about Amazon EventBridge event bus for an endpoint. An event bus is a router that receives events and delivers them to zero or more destinations, or targets.

              • Arn — (String)

                The Amazon Resource Name (ARN) of the account permitted to write events to the current account.

              • Name — (String)

                The name of the event bus.

              • Policy — (String)

                The policy that enables the external account to send events to your account.

            • AwsDmsEndpoint — (map)

              Provides details about an Database Migration Service (DMS) endpoint. An endpoint provides connection, data store type, and location information about your data store.

              • CertificateArn — (String)

                The Amazon Resource Name (ARN) for the SSL certificate that encrypts connections between the DMS endpoint and the replication instance.

              • DatabaseName — (String)

                The name of the endpoint database.

              • EndpointArn — (String)

                The Amazon Resource Name (ARN) of the endpoint.

              • EndpointIdentifier — (String)

                The database endpoint identifier.

              • EndpointType — (String)

                The type of endpoint. Valid values are source and target.

              • EngineName — (String)

                The type of engine for the endpoint, depending on the EndpointType value.

              • ExternalId — (String)

                A value that can be used for cross-account validation.

              • ExtraConnectionAttributes — (String)

                Additional attributes associated with the connection.

              • KmsKeyId — (String)

                An DMS key identifier that is used to encrypt the connection parameters for the endpoint. If you don't specify a value for the KmsKeyId parameter, then DMS uses your default encryption key. KMS creates the default encryption key for your Amazon Web Services account. Your Amazon Web Services account has a different default encryption key for each Amazon Web Services Region.

              • Port — (Integer)

                The port used to access the endpoint.

              • ServerName — (String)

                The name of the server where the endpoint database resides.

              • SslMode — (String)

                The SSL mode used to connect to the endpoint. The default is none.

              • Username — (String)

                The user name to be used to log in to the endpoint database.

            • AwsEventsEndpoint — (map)

              Provides details about an Amazon EventBridge global endpoint. The endpoint can improve your application’s availability by making it Regional-fault tolerant.

              • Arn — (String)

                The Amazon Resource Name (ARN) of the endpoint.

              • Description — (String)

                A description of the endpoint.

              • EndpointId — (String)

                The URL subdomain of the endpoint. For example, if EndpointUrl is https://abcde.veo.endpoints.event.amazonaws.com, then the EndpointId is abcde.veo.

              • EndpointUrl — (String)

                The URL of the endpoint.

              • EventBuses — (Array<map>)

                The event buses being used by the endpoint.

                • EventBusArn — (String)

                  The Amazon Resource Name (ARN) of the event bus that the endpoint is associated with.

              • Name — (String)

                The name of the endpoint.

              • ReplicationConfig — (map)

                Whether event replication was enabled or disabled for this endpoint. The default state is ENABLED, which means you must supply a RoleArn. If you don't have a RoleArn or you don't want event replication enabled, set the state to DISABLED.

                • State — (String)

                  The state of event replication.

              • RoleArn — (String)

                The ARN of the role used by event replication for the endpoint.

              • RoutingConfig — (map)

                The routing configuration of the endpoint.

                • FailoverConfig — (map)

                  The failover configuration for an endpoint. This includes what triggers failover and what happens when it's triggered.

                  • Primary — (map)

                    The main Region of the endpoint.

                    • HealthCheck — (String)

                      The Amazon Resource Name (ARN) of the health check used by the endpoint to determine whether failover is triggered.

                  • Secondary — (map)

                    The Region that events are routed to when failover is triggered or event replication is enabled.

                    • Route — (String)

                      Defines the secondary Region.

              • State — (String)

                The current state of the endpoint.

              • StateReason — (String)

                The reason the endpoint is in its current state.

            • AwsDmsReplicationTask — (map)

              Provides details about an DMS replication task. A replication task moves a set of data from the source endpoint to the target endpoint.

              • CdcStartPosition — (String)

                Indicates when you want a change data capture (CDC) operation to start. CCdcStartPosition or CCdcStartTime specifies when you want a CDC operation to start. Only a value for one of these fields is included.

              • CdcStartTime — (String)

                Indicates the start time for a CDC operation. CdcStartPosition or CCdcStartTime specifies when you want a CDC operation to start. Only a value for one of these fields is included.

              • CdcStopPosition — (String)

                Indicates when you want a CDC operation to stop. The value can be either server time or commit time.

              • MigrationType — (String)

                The migration type.

              • Id — (String)

                The identifier of the replication task.

              • ResourceIdentifier — (String)

                A display name for the resource identifier at the end of the EndpointArn response parameter. If you don't specify a ResourceIdentifier value, DMS generates a default identifier value for the end of EndpointArn.

              • ReplicationInstanceArn — (String)

                The Amazon Resource Name (ARN) of a replication instance.

              • ReplicationTaskIdentifier — (String)

                The user-defined replication task identifier or name.

              • ReplicationTaskSettings — (String)

                The settings for the replication task.

              • SourceEndpointArn — (String)

                The ARN of the source endpoint.

              • TableMappings — (String)

                The table mappings for the replication task, in JSON format.

              • TargetEndpointArn — (String)

                The ARN of the target endpoint.

              • TaskData — (String)

                Supplemental information that the task requires to migrate the data for certain source and target endpoints.

            • AwsDmsReplicationInstance — (map)

              Provides details about an DMS replication instance. DMS uses a replication instance to connect to your source data store, read the source data, and format the data for consumption by the target data store.

              • AllocatedStorage — (Integer)

                The amount of storage (in gigabytes) that is allocated for the replication instance.

              • AutoMinorVersionUpgrade — (Boolean)

                Indicates whether minor engine upgrades are applied automatically to the replication instance during the maintenance window.

              • AvailabilityZone — (String)

                The Availability Zone that the replication instance is created in. The default value is a random, system-chosen Availability Zone in the endpoint's Amazon Web Services Region, such as us-east-1d.

              • EngineVersion — (String)

                The engine version number of the replication instance. If an engine version number is not specified when a replication instance is created, the default is the latest engine version available.

              • KmsKeyId — (String)

                An KMS key identifier that is used to encrypt the data on the replication instance. If you don't specify a value for the KmsKeyId parameter, DMS uses your default encryption key. KMS creates the default encryption key for your Amazon Web Services account. Your Amazon Web Services account has a different default encryption key for each Amazon Web Services Region.

              • MultiAZ — (Boolean)

                Specifies whether the replication instance is deployed across multiple Availability Zones (AZs). You can't set the AvailabilityZone parameter if the MultiAZ parameter is set to true.

              • PreferredMaintenanceWindow — (String)

                The maintenance window times for the replication instance. Upgrades to the replication instance are performed during this time.

              • PubliclyAccessible — (Boolean)

                Specifies the accessibility options for the replication instance. A value of true represents an instance with a public IP address. A value of false represents an instance with a private IP address. The default value is true.

              • ReplicationInstanceClass — (String)

                The compute and memory capacity of the replication instance as defined for the specified replication instance class.

              • ReplicationInstanceIdentifier — (String)

                The replication instance identifier.

              • ReplicationSubnetGroup — (map)

                The subnet group for the replication instance.

                • ReplicationSubnetGroupIdentifier — (String)

                  The identifier of the replication subnet group.

              • VpcSecurityGroups — (Array<map>)

                The virtual private cloud (VPC) security group for the replication instance.

                • VpcSecurityGroupId — (String)

                  The identifier of the VPC security group that’s associated with the replication instance.

            • AwsRoute53HostedZone — (map)

              Provides details about an Amazon Route 53 hosted zone, including the four name servers assigned to the hosted zone. A hosted zone represents a collection of records that can be managed together, belonging to a single parent domain name.

              • HostedZone — (map)

                An object that contains information about the specified hosted zone.

                • Id — (String)

                  The ID that Route 53 assigns to the hosted zone when you create it.

                • Name — (String)

                  The name of the domain. For public hosted zones, this is the name that you have registered with your DNS registrar.

                • Config — (map)

                  An object that includes the Comment element.

                  • Comment — (String)

                    Any comments that you include about the hosted zone.

              • Vpcs — (Array<map>)

                An object that contains information about the Amazon Virtual Private Clouds (Amazon VPCs) that are associated with the specified hosted zone.

                • Id — (String)

                  The identifier of an Amazon VPC.

                • Region — (String)

                  The Amazon Web Services Region that an Amazon VPC was created in.

              • NameServers — (Array<String>)

                An object that contains a list of the authoritative name servers for a hosted zone or for a reusable delegation set.

              • QueryLoggingConfig — (map)

                An array that contains one QueryLoggingConfig element for each DNS query logging configuration that is associated with the current Amazon Web Services account.

                • CloudWatchLogsLogGroupArn — (map)

                  The Amazon Resource Name (ARN) of the Amazon CloudWatch Logs log group that Route 53 is publishing logs to.

                  • CloudWatchLogsLogGroupArn — (String)

                    The ARN of the CloudWatch Logs log group that Route 53 is publishing logs to.

                  • HostedZoneId — (String)

                    The ID of the hosted zone that CloudWatch Logs is logging queries for.

                  • Id — (String)

                    The ID for a DNS query logging configuration.

            • AwsMskCluster — (map)

              Provides details about an Amazon Managed Streaming for Apache Kafka (Amazon MSK) cluster.

              • ClusterInfo — (map)

                Provides information about a cluster.

                • EncryptionInfo — (map)

                  Includes encryption-related information, such as the KMS key used for encrypting data at rest and whether you want Amazon MSK to encrypt your data in transit.

                  • EncryptionInTransit — (map)

                    The settings for encrypting data in transit.

                    • InCluster — (Boolean)

                      When set to true, it indicates that data communication among the broker nodes of the cluster is encrypted. When set to false, the communication happens in plain text. The default value is true.

                    • ClientBroker — (String)

                      Indicates the encryption setting for data in transit between clients and brokers.

                  • EncryptionAtRest — (map)

                    The data-volume encryption details. You can't update encryption at rest settings for existing clusters.

                    • DataVolumeKMSKeyId — (String)

                      The Amazon Resource Name (ARN) of the KMS key for encrypting data at rest. If you don't specify a KMS key, MSK creates one for you and uses it.

                • CurrentVersion — (String)

                  The current version of the cluster.

                • NumberOfBrokerNodes — (Integer)

                  The number of broker nodes in the cluster.

                • ClusterName — (String)

                  The name of the cluster.

                • ClientAuthentication — (map)

                  Provides information for different modes of client authentication.

                  • Sasl — (map)

                    Provides details for client authentication using SASL.

                    • Iam — (map)

                      Provides details for SASL client authentication using IAM.

                      • Enabled — (Boolean)

                        Indicates whether SASL/IAM authentication is enabled or not.

                    • Scram — (map)

                      Details for SASL client authentication using SCRAM.

                      • Enabled — (Boolean)

                        Indicates whether SASL/SCRAM authentication is enabled or not.

                  • Unauthenticated — (map)

                    Provides details for allowing no client authentication.

                    • Enabled — (Boolean)

                      Indicates whether unauthenticated is allowed or not.

                  • Tls — (map)

                    Provides details for client authentication using TLS.

                    • CertificateAuthorityArnList — (Array<String>)

                      List of Amazon Web Services Private CA Amazon Resource Names (ARNs). Amazon Web Services Private CA enables creation of private certificate authority (CA) hierarchies, including root and subordinate CAs, without the investment and maintenance costs of operating an on-premises CA.

                    • Enabled — (Boolean)

                      Indicates whether TLS authentication is enabled or not.

                • EnhancedMonitoring — (String)

                  Specifies the level of monitoring for the cluster.

            • AwsS3AccessPoint — (map)

              Provides details about an Amazon Simple Storage Service (Amazon S3) access point. S3 access points are named network endpoints that are attached to S3 buckets that you can use to perform S3 object operations.

              • AccessPointArn — (String)

                The Amazon Resource Name (ARN) of the access point.

              • Alias — (String)

                The name or alias of the access point.

              • Bucket — (String)

                The name of the S3 bucket associated with the specified access point.

              • BucketAccountId — (String)

                The Amazon Web Services account ID associated with the S3 bucket associated with this access point.

              • Name — (String)

                The name of the specified access point.

              • NetworkOrigin — (String)

                Indicates whether this access point allows access from the public internet.

              • PublicAccessBlockConfiguration — (map)

                provides information about the Amazon S3 Public Access Block configuration for accounts.

                • BlockPublicAcls — (Boolean)

                  Indicates whether to reject calls to update an S3 bucket if the calls include a public access control list (ACL).

                • BlockPublicPolicy — (Boolean)

                  Indicates whether to reject calls to update the access policy for an S3 bucket or access point if the policy allows public access.

                • IgnorePublicAcls — (Boolean)

                  Indicates whether Amazon S3 ignores public ACLs that are associated with an S3 bucket.

                • RestrictPublicBuckets — (Boolean)

                  Indicates whether to restrict access to an access point or S3 bucket that has a public policy to only Amazon Web Services service principals and authorized users within the S3 bucket owner's account.

              • VpcConfiguration — (map)

                Contains the virtual private cloud (VPC) configuration for the specified access point.

                • VpcId — (String)

                  If this field is specified, this access point will only allow connections from the specified VPC ID.

            • AwsEc2ClientVpnEndpoint — (map)

              Provides details about an Client VPN endpoint. A Client VPN endpoint is the resource that you create and configure to enable and manage client VPN sessions. It's the termination point for all client VPN sessions.

              • ClientVpnEndpointId — (String)

                The ID of the Client VPN endpoint.

              • Description — (String)

                A brief description of the endpoint.

              • ClientCidrBlock — (String)

                The IPv4 address range, in CIDR notation, from which client IP addresses are assigned.

              • DnsServer — (Array<String>)

                Information about the DNS servers to be used for DNS resolution.

              • SplitTunnel — (Boolean)

                Indicates whether split-tunnel is enabled in the Client VPN endpoint.

              • TransportProtocol — (String)

                The transport protocol used by the Client VPN endpoint.

              • VpnPort — (Integer)

                The port number for the Client VPN endpoint.

              • ServerCertificateArn — (String)

                The Amazon Resource Name (ARN) of the server certificate.

              • AuthenticationOptions — (Array<map>)

                Information about the authentication method used by the Client VPN endpoint.

                • Type — (String)

                  The authentication type used.

                • ActiveDirectory — (map)

                  Information about the Active Directory, if applicable. With Active Directory authentication, clients are authenticated against existing Active Directory groups.

                  • DirectoryId — (String)

                    The ID of the Active Directory used for authentication.

                • MutualAuthentication — (map)

                  Information about the authentication certificates, if applicable.

                  • ClientRootCertificateChain — (String)

                    The Amazon Resource Name (ARN) of the client certificate.

                • FederatedAuthentication — (map)

                  Information about the IAM SAML identity provider, if applicable.

                  • SamlProviderArn — (String)

                    The Amazon Resource Name (ARN) of the IAM SAML identity provider.

                  • SelfServiceSamlProviderArn — (String)

                    The Amazon Resource Name (ARN) of the IAM SAML identity provider for the self-service portal.

              • ConnectionLogOptions — (map)

                Information about the client connection logging options for the Client VPN endpoint.

                • Enabled — (Boolean)

                  Indicates whether client connection logging is enabled for the Client VPN endpoint.

                • CloudwatchLogGroup — (String)

                  The name of the Amazon CloudWatch Logs log group to which connection logging data is published.

                • CloudwatchLogStream — (String)

                  The name of the Amazon CloudWatch Logs log stream to which connection logging data is published.

              • SecurityGroupIdSet — (Array<String>)

                The IDs of the security groups for the target network.

              • VpcId — (String)

                The ID of the VPC.

              • SelfServicePortalUrl — (String)

                The URL of the self-service portal.

              • ClientConnectOptions — (map)

                The options for managing connection authorization for new client connections.

                • Enabled — (Boolean)

                  Indicates whether client connect options are enabled.

                • LambdaFunctionArn — (String)

                  The Amazon Resource Name (ARN) of the Lambda function used for connection authorization.

                • Status — (map)

                  The status of any updates to the client connect options.

                  • Code — (String)

                    The status code.

                  • Message — (String)

                    The status message.

              • SessionTimeoutHours — (Integer)

                The maximum VPN session duration time in hours.

              • ClientLoginBannerOptions — (map)

                Options for enabling a customizable text banner that will be displayed on Amazon Web Services provided clients when a VPN session is established.

                • Enabled — (Boolean)

                  Current state of text banner feature.

                • BannerText — (String)

                  Customizable text that will be displayed in a banner on Amazon Web Services provided clients when a VPN session is established.

          • ApplicationName — (String)

            The name of the application that is related to a finding.

          • ApplicationArn — (String)

            The Amazon Resource Name (ARN) of the application that is related to a finding.

        • Compliance — (map)

          This data type is exclusive to findings that are generated as the result of a check run against a specific rule in a supported security standard, such as CIS Amazon Web Services Foundations. Contains security standard-related finding details.

          • Status — (String)

            The result of a standards check.

            The valid values for Status are as follows.

              • PASSED - Standards check passed for all evaluated resources.

              • WARNING - Some information is missing or this check is not supported for your configuration.

              • FAILED - Standards check failed for at least one evaluated resource.

              • NOT_AVAILABLE - Check could not be performed due to a service outage, API error, or because the result of the Config evaluation was NOT_APPLICABLE. If the Config evaluation result was NOT_APPLICABLE, then after 3 days, Security Hub automatically archives the finding.

            Possible values include:
            • "PASSED"
            • "WARNING"
            • "FAILED"
            • "NOT_AVAILABLE"
          • RelatedRequirements — (Array<String>)

            For a control, the industry or regulatory framework requirements that are related to the control. The check for that control is aligned with these requirements.

          • StatusReasons — (Array<map>)

            For findings generated from controls, a list of reasons behind the value of Status. For the list of status reason codes and their meanings, see Standards-related information in the ASFF in the Security Hub User Guide.

            • ReasonCoderequired — (String)

              A code that represents a reason for the control status. For the list of status reason codes and their meanings, see Standards-related information in the ASFF in the Security Hub User Guide.

            • Description — (String)

              The corresponding description for the status reason code.

          • SecurityControlId — (String)

            The unique identifier of a control across standards. Values for this field typically consist of an Amazon Web Service and a number, such as APIGateway.5.

          • AssociatedStandards — (Array<map>)

            The enabled security standards in which a security control is currently enabled.

            • StandardsId — (String)

              The unique identifier of a standard in which a control is enabled. This field consists of the resource portion of the Amazon Resource Name (ARN) returned for a standard in the DescribeStandards API response.

          • SecurityControlParameters — (Array<map>)

            An object that includes security control parameter names and values.

            • Name — (String)

              The name of a

            • Value — (Array<String>)

              The current value of a control parameter.

        • VerificationState — (String)

          Indicates the veracity of a finding.

          Possible values include:
          • "UNKNOWN"
          • "TRUE_POSITIVE"
          • "FALSE_POSITIVE"
          • "BENIGN_POSITIVE"
        • WorkflowState — (String)

          The workflow state of a finding.

          Possible values include:
          • "NEW"
          • "ASSIGNED"
          • "IN_PROGRESS"
          • "DEFERRED"
          • "RESOLVED"
        • Workflow — (map)

          Provides information about the status of the investigation into a finding.

          • Status — (String)

            The status of the investigation into the finding. The workflow status is specific to an individual finding. It does not affect the generation of new findings. For example, setting the workflow status to SUPPRESSED or RESOLVED does not prevent a new finding for the same issue.

            The allowed values are the following.

            • NEW - The initial state of a finding, before it is reviewed.

              Security Hub also resets the workflow status from NOTIFIED or RESOLVED to NEW in the following cases:

              • RecordState changes from ARCHIVED to ACTIVE.

              • ComplianceStatus changes from PASSED to either WARNING, FAILED, or NOT_AVAILABLE.

            • NOTIFIED - Indicates that you notified the resource owner about the security issue. Used when the initial reviewer is not the resource owner, and needs intervention from the resource owner.

            • SUPPRESSED - Indicates that you reviewed the finding and do not believe that any action is needed. The finding is no longer updated.

            • RESOLVED - The finding was reviewed and remediated and is now considered resolved.

            Possible values include:
            • "NEW"
            • "NOTIFIED"
            • "RESOLVED"
            • "SUPPRESSED"
        • RecordState — (String)

          The record state of a finding.

          Possible values include:
          • "ACTIVE"
          • "ARCHIVED"
        • RelatedFindings — (Array<map>)

          A list of related findings.

          • ProductArnrequired — (String)

            The ARN of the product that generated a related finding.

          • Idrequired — (String)

            The product-generated identifier for a related finding.

        • Note — (map)

          A user-defined note added to a finding.

          • Textrequired — (String)

            The text of a note.

          • UpdatedByrequired — (String)

            The principal that created a note.

          • UpdatedAtrequired — (String)

            The timestamp of when the note was updated.

            Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

        • Vulnerabilities — (Array<map>)

          Provides a list of vulnerabilities associated with the findings.

          • Idrequired — (String)

            The identifier of the vulnerability.

          • VulnerablePackages — (Array<map>)

            List of software packages that have the vulnerability.

            • Name — (String)

              The name of the software package.

            • Version — (String)

              The version of the software package.

            • Epoch — (String)

              The epoch of the software package.

            • Release — (String)

              The release of the software package.

            • Architecture — (String)

              The architecture used for the software package.

            • PackageManager — (String)

              The source of the package.

            • FilePath — (String)

              The file system path to the package manager inventory file.

            • FixedInVersion — (String)

              The version of the software package in which the vulnerability has been resolved.

            • Remediation — (String)

              Describes the actions a customer can take to resolve the vulnerability in the software package.

            • SourceLayerHash — (String)

              The source layer hash of the vulnerable package.

            • SourceLayerArn — (String)

              The Amazon Resource Name (ARN) of the source layer.

          • Cvss — (Array<map>)

            CVSS scores from the advisory related to the vulnerability.

            • Version — (String)

              The version of CVSS for the CVSS score.

            • BaseScore — (Float)

              The base CVSS score.

            • BaseVector — (String)

              The base scoring vector for the CVSS score.

            • Source — (String)

              The origin of the original CVSS score and vector.

            • Adjustments — (Array<map>)

              Adjustments to the CVSS metrics.

              • Metric — (String)

                The metric to adjust.

              • Reason — (String)

                The reason for the adjustment.

          • RelatedVulnerabilities — (Array<String>)

            List of vulnerabilities that are related to this vulnerability.

          • Vendor — (map)

            Information about the vendor that generates the vulnerability report.

            • Namerequired — (String)

              The name of the vendor.

            • Url — (String)

              The URL of the vulnerability advisory.

            • VendorSeverity — (String)

              The severity that the vendor assigned to the vulnerability.

            • VendorCreatedAt — (String)

              Indicates when the vulnerability advisory was created.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

            • VendorUpdatedAt — (String)

              Indicates when the vulnerability advisory was last updated.

              Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

          • ReferenceUrls — (Array<String>)

            A list of URLs that provide additional information about the vulnerability.

          • FixAvailable — (String)

            Specifies if all vulnerable packages in a finding have a value for FixedInVersion and Remediation. This field is evaluated for each vulnerability Id based on the number of vulnerable packages that have a value for both FixedInVersion and Remediation. Valid values are as follows:

            • YES if all vulnerable packages have a value for both FixedInVersion and Remediation

            • NO if no vulnerable packages have a value for FixedInVersion and Remediation

            • PARTIAL otherwise

            Possible values include:
            • "YES"
            • "NO"
            • "PARTIAL"
          • EpssScore — (Float)

            The Exploit Prediction Scoring System (EPSS) score for a finding.

          • ExploitAvailable — (String)

            Whether an exploit is available for a finding.

            Possible values include:
            • "YES"
            • "NO"
          • LastKnownExploitAt — (String)

            The date and time of the last exploit associated with a finding discovered in your environment.

          • CodeVulnerabilities — (Array<map>)

            The vulnerabilities found in your Lambda function code. This field pertains to findings that Security Hub receives from Amazon Inspector.

            • Cwes — (Array<String>)

              The Common Weakness Enumeration (CWE) item associated with the detected code vulnerability.

            • FilePath — (map)

              Provides details about where a code vulnerability is located in your Lambda function.

              • EndLine — (Integer)

                The line number of the last line of code in which the vulnerability is located.

              • FileName — (String)

                The name of the file in which the code vulnerability is located.

              • FilePath — (String)

                The file path to the code in which the vulnerability is located.

              • StartLine — (Integer)

                The line number of the first line of code in which the vulnerability is located.

            • SourceArn — (String)

              The Amazon Resource Name (ARN) of the Lambda layer in which the code vulnerability is located.

        • PatchSummary — (map)

          Provides an overview of the patch compliance status for an instance against a selected compliance standard.

          • Idrequired — (String)

            The identifier of the compliance standard that was used to determine the patch compliance status.

          • InstalledCount — (Integer)

            The number of patches from the compliance standard that were installed successfully.

          • MissingCount — (Integer)

            The number of patches that are part of the compliance standard but are not installed. The count includes patches that failed to install.

          • FailedCount — (Integer)

            The number of patches from the compliance standard that failed to install.

          • InstalledOtherCount — (Integer)

            The number of installed patches that are not part of the compliance standard.

          • InstalledRejectedCount — (Integer)

            The number of patches that are installed but are also on a list of patches that the customer rejected.

          • InstalledPendingReboot — (Integer)

            The number of patches that were applied, but that require the instance to be rebooted in order to be marked as installed.

          • OperationStartTime — (String)

            Indicates when the operation started.

            Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

          • OperationEndTime — (String)

            Indicates when the operation completed.

            Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces, and date and time should be separated by T. For example, 2020-03-22T13:22:13.933Z.

          • RebootOption — (String)

            The reboot option specified for the instance.

          • Operation — (String)

            The type of patch operation performed. For Patch Manager, the values are SCAN and INSTALL.

        • Action — (map)

          Provides details about an action that affects or that was taken on a resource.

          • ActionType — (String)

            The type of action that was detected. The possible action types are:

            • NETWORK_CONNECTION

            • AWS_API_CALL

            • DNS_REQUEST

            • PORT_PROBE

          • NetworkConnectionAction — (map)

            Included if ActionType is NETWORK_CONNECTION. Provides details about the network connection that was detected.

            • ConnectionDirection — (String)

              The direction of the network connection request (IN or OUT).

            • RemoteIpDetails — (map)

              Information about the remote IP address that issued the network connection request.

              • IpAddressV4 — (String)

                The IP address.

              • Organization — (map)

                The internet service provider (ISP) organization associated with the remote IP address.

                • Asn — (Integer)

                  The Autonomous System Number (ASN) of the internet provider

                • AsnOrg — (String)

                  The name of the organization that registered the ASN.

                • Isp — (String)

                  The ISP information for the internet provider.

                • Org — (String)

                  The name of the internet provider.

              • Country — (map)

                The country where the remote IP address is located.

                • CountryCode — (String)

                  The 2-letter ISO 3166 country code for the country.

                • CountryName — (String)

                  The name of the country.

              • City — (map)

                The city where the remote IP address is located.

                • CityName — (String)

                  The name of the city.

              • GeoLocation — (map)

                The coordinates of the location of the remote IP address.

                • Lon — (Float)

                  The longitude of the location.

                • Lat — (Float)

                  The latitude of the location.

            • RemotePortDetails — (map)

              Information about the port on the remote IP address.

              • Port — (Integer)

                The number of the port.

              • PortName — (String)

                The port name of the remote connection.

            • LocalPortDetails — (map)

              Information about the port on the EC2 instance.

              • Port — (Integer)

                The number of the port.

              • PortName — (String)

                The port name of the local connection.

            • Protocol — (String)

              The protocol used to make the network connection request.

            • Blocked — (Boolean)

              Indicates whether the network connection attempt was blocked.

          • AwsApiCallAction — (map)

            Included if ActionType is AWS_API_CALL. Provides details about the API call that was detected.

            • Api — (String)

              The name of the API method that was issued.

            • ServiceName — (String)

              The name of the Amazon Web Services service that the API method belongs to.

            • CallerType — (String)

              Indicates whether the API call originated from a remote IP address (remoteip) or from a DNS domain (domain).

            • RemoteIpDetails — (map)

              Provided if CallerType is remoteIp. Provides information about the remote IP address that the API call originated from.

              • IpAddressV4 — (String)

                The IP address.

              • Organization — (map)

                The internet service provider (ISP) organization associated with the remote IP address.

                • Asn — (Integer)

                  The Autonomous System Number (ASN) of the internet provider

                • AsnOrg — (String)

                  The name of the organization that registered the ASN.

                • Isp — (String)

                  The ISP information for the internet provider.

                • Org — (String)

                  The name of the internet provider.

              • Country — (map)

                The country where the remote IP address is located.

                • CountryCode — (String)

                  The 2-letter ISO 3166 country code for the country.

                • CountryName — (String)

                  The name of the country.

              • City — (map)

                The city where the remote IP address is located.

                • CityName — (String)

                  The name of the city.

              • GeoLocation — (map)

                The coordinates of the location of the remote IP address.

                • Lon — (Float)

                  The longitude of the location.

                • Lat — (Float)

                  The latitude of the location.

            • DomainDetails — (map)

              Provided if CallerType is domain. Provides information about the DNS domain that the API call originated from.

              • Domain — (String)

                The name of the DNS domain that issued the API call.

            • AffectedResources — (map<String>)

              Identifies the resources that were affected by the API call.

            • FirstSeen — (String)

              An ISO8601-formatted timestamp that indicates when the API call was first observed.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • LastSeen — (String)

              An ISO8601-formatted timestamp that indicates when the API call was most recently observed.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

          • DnsRequestAction — (map)

            Included if ActionType is DNS_REQUEST. Provides details about the DNS request that was detected.

            • Domain — (String)

              The DNS domain that is associated with the DNS request.

            • Protocol — (String)

              The protocol that was used for the DNS request.

            • Blocked — (Boolean)

              Indicates whether the DNS request was blocked.

          • PortProbeAction — (map)

            Included if ActionType is PORT_PROBE. Provides details about the port probe that was detected.

            • PortProbeDetails — (Array<map>)

              Information about the ports affected by the port probe.

              • LocalPortDetails — (map)

                Provides information about the port that was scanned.

                • Port — (Integer)

                  The number of the port.

                • PortName — (String)

                  The port name of the local connection.

              • LocalIpDetails — (map)

                Provides information about the IP address where the scanned port is located.

                • IpAddressV4 — (String)

                  The IP address.

              • RemoteIpDetails — (map)

                Provides information about the remote IP address that performed the scan.

                • IpAddressV4 — (String)

                  The IP address.

                • Organization — (map)

                  The internet service provider (ISP) organization associated with the remote IP address.

                  • Asn — (Integer)

                    The Autonomous System Number (ASN) of the internet provider

                  • AsnOrg — (String)

                    The name of the organization that registered the ASN.

                  • Isp — (String)

                    The ISP information for the internet provider.

                  • Org — (String)

                    The name of the internet provider.

                • Country — (map)

                  The country where the remote IP address is located.

                  • CountryCode — (String)

                    The 2-letter ISO 3166 country code for the country.

                  • CountryName — (String)

                    The name of the country.

                • City — (map)

                  The city where the remote IP address is located.

                  • CityName — (String)

                    The name of the city.

                • GeoLocation — (map)

                  The coordinates of the location of the remote IP address.

                  • Lon — (Float)

                    The longitude of the location.

                  • Lat — (Float)

                    The latitude of the location.

            • Blocked — (Boolean)

              Indicates whether the port probe was blocked.

        • FindingProviderFields — (map)

          In a BatchImportFindings request, finding providers use FindingProviderFields to provide and update their own values for confidence, criticality, related findings, severity, and types.

          • Confidence — (Integer)

            A finding's confidence. Confidence is defined as the likelihood that a finding accurately identifies the behavior or issue that it was intended to identify.

            Confidence is scored on a 0-100 basis using a ratio scale, where 0 means zero percent confidence and 100 means 100 percent confidence.

          • Criticality — (Integer)

            The level of importance assigned to the resources associated with the finding.

            A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources.

          • RelatedFindings — (Array<map>)

            A list of findings that are related to the current finding.

            • ProductArnrequired — (String)

              The ARN of the product that generated a related finding.

            • Idrequired — (String)

              The product-generated identifier for a related finding.

          • Severity — (map)

            The severity of a finding.

            • Label — (String)

              The severity label assigned to the finding by the finding provider.

              Possible values include:
              • "INFORMATIONAL"
              • "LOW"
              • "MEDIUM"
              • "HIGH"
              • "CRITICAL"
            • Original — (String)

              The finding provider's original value for the severity.

          • Types — (Array<String>)

            One or more finding types in the format of namespace/category/classifier that classify a finding.

            Valid namespace values are: Software and Configuration Checks | TTPs | Effects | Unusual Behaviors | Sensitive Data Identifications

        • Sample — (Boolean)

          Indicates whether the finding is a sample finding.

        • GeneratorDetails — (map)

          Provides metadata for the Amazon CodeGuru detector associated with a finding. This field pertains to findings that relate to Lambda functions. Amazon Inspector identifies policy violations and vulnerabilities in Lambda function code based on internal detectors developed in collaboration with Amazon CodeGuru. Security Hub receives those findings.

          • Name — (String)

            The name of the detector used to identify the code vulnerability.

          • Description — (String)

            The description of the detector used to identify the code vulnerability.

          • Labels — (Array<String>)

            An array of tags used to identify the detector associated with the finding.

        • ProcessedAt — (String)

          An ISO8601-formatted timestamp that indicates when Security Hub received a finding and begins to process it.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • AwsAccountName — (String)

          The name of the Amazon Web Services account from which a finding was generated.

      • NextToken — (String)

        The pagination token to use to request the next page of results.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

getInsightResults(params = {}, callback) ⇒ AWS.Request

Lists the results of the Security Hub insight specified by the insight ARN.

Service Reference:

Examples:

To get the results of a Security Hub insight


/* The following example returns the results of the Security Hub insight specified by the insight ARN. */

 var params = {
  InsightArn: "arn:aws:securityhub:us-west-1:123456789012:insight/123456789012/custom/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111"
 };
 securityhub.getInsightResults(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    InsightResults: {
     GroupByAttribute: "ResourceId", 
     InsightArn: "arn:aws:securityhub:us-west-1:123456789012:insight/123456789012/custom/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
     ResultValues: [
        {
       Count: 10, 
       GroupByAttributeValue: "AWS::::Account:111122223333"
      }, 
        {
       Count: 3, 
       GroupByAttributeValue: "AWS::::Account:444455556666"
      }
     ]
    }
   }
   */
 });

Calling the getInsightResults operation

var params = {
  InsightArn: 'STRING_VALUE' /* required */
};
securityhub.getInsightResults(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • InsightArn — (String)

      The ARN of the insight for which to return results.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • InsightResults — (map)

        The insight results returned by the operation.

        • InsightArnrequired — (String)

          The ARN of the insight whose results are returned by the GetInsightResults operation.

        • GroupByAttributerequired — (String)

          The attribute that the findings are grouped by for the insight whose results are returned by the GetInsightResults operation.

        • ResultValuesrequired — (Array<map>)

          The list of insight result values returned by the GetInsightResults operation.

          • GroupByAttributeValuerequired — (String)

            The value of the attribute that the findings are grouped by for the insight whose results are returned by the GetInsightResults operation.

          • Countrequired — (Integer)

            The number of findings returned for each GroupByAttributeValue.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

getInsights(params = {}, callback) ⇒ AWS.Request

Lists and describes insights for the specified insight ARNs.

Service Reference:

Examples:

To get details of a Security Hub insight


/* The following example returns details of the Security Hub insight with the specified ARN. */

 var params = {
  InsightArns: [
     "arn:aws:securityhub:us-west-1:123456789012:insight/123456789012/custom/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111"
  ]
 };
 securityhub.getInsights(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    Insights: [
       {
      Filters: {
       ResourceType: [
          {
         Comparison: "EQUALS", 
         Value: "AwsIamRole"
        }
       ], 
       SeverityLabel: [
          {
         Comparison: "EQUALS", 
         Value: "CRITICAL"
        }
       ]
      }, 
      GroupByAttribute: "ResourceId", 
      InsightArn: "arn:aws:securityhub:us-west-1:123456789012:insight/123456789012/custom/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
      Name: "Critical role findings"
     }
    ]
   }
   */
 });

Calling the getInsights operation

var params = {
  InsightArns: [
    'STRING_VALUE',
    /* more items */
  ],
  MaxResults: 'NUMBER_VALUE',
  NextToken: 'STRING_VALUE'
};
securityhub.getInsights(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • InsightArns — (Array<String>)

      The ARNs of the insights to describe. If you do not provide any insight ARNs, then GetInsights returns all of your custom insights. It does not return any managed insights.

    • NextToken — (String)

      The token that is required for pagination. On your first call to the GetInsights operation, set the value of this parameter to NULL.

      For subsequent calls to the operation, to continue listing data, set the value of this parameter to the value returned from the previous response.

    • MaxResults — (Integer)

      The maximum number of items to return in the response.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • Insights — (Array<map>)

        The insights returned by the operation.

        • InsightArnrequired — (String)

          The ARN of a Security Hub insight.

        • Namerequired — (String)

          The name of a Security Hub insight.

        • Filtersrequired — (map)

          One or more attributes used to filter the findings included in the insight. The insight only includes findings that match the criteria defined in the filters.

          • ProductArn — (Array<map>)

            The ARN generated by Security Hub that uniquely identifies a third-party company (security findings provider) after this provider's product (solution that generates findings) is registered with Security Hub.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • AwsAccountId — (Array<map>)

            The Amazon Web Services account ID in which a finding is generated.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • Id — (Array<map>)

            The security findings provider-specific identifier for a finding.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • GeneratorId — (Array<map>)

            The identifier for the solution-specific component (a discrete unit of logic) that generated a finding. In various security findings providers' solutions, this generator can be called a rule, a check, a detector, a plugin, etc.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • Region — (Array<map>)

            The Region from which the finding was generated.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • Type — (Array<map>)

            A finding type in the format of namespace/category/classifier that classifies a finding.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • FirstObservedAt — (Array<map>)

            An ISO8601-formatted timestamp that indicates when the security findings provider first observed the potential security issue that a finding captured.

            A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • Start — (String)

              A timestamp that provides the start date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • End — (String)

              A timestamp that provides the end date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • DateRange — (map)

              A date range for the date filter.

              • Value — (Integer)

                A date range value for the date filter.

              • Unit — (String)

                A date range unit for the date filter.

                Possible values include:
                • "DAYS"
          • LastObservedAt — (Array<map>)

            An ISO8601-formatted timestamp that indicates when the security findings provider most recently observed the potential security issue that a finding captured.

            A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • Start — (String)

              A timestamp that provides the start date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • End — (String)

              A timestamp that provides the end date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • DateRange — (map)

              A date range for the date filter.

              • Value — (Integer)

                A date range value for the date filter.

              • Unit — (String)

                A date range unit for the date filter.

                Possible values include:
                • "DAYS"
          • CreatedAt — (Array<map>)

            An ISO8601-formatted timestamp that indicates when the security findings provider captured the potential security issue that a finding captured.

            A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • Start — (String)

              A timestamp that provides the start date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • End — (String)

              A timestamp that provides the end date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • DateRange — (map)

              A date range for the date filter.

              • Value — (Integer)

                A date range value for the date filter.

              • Unit — (String)

                A date range unit for the date filter.

                Possible values include:
                • "DAYS"
          • UpdatedAt — (Array<map>)

            An ISO8601-formatted timestamp that indicates when the security findings provider last updated the finding record.

            A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • Start — (String)

              A timestamp that provides the start date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • End — (String)

              A timestamp that provides the end date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • DateRange — (map)

              A date range for the date filter.

              • Value — (Integer)

                A date range value for the date filter.

              • Unit — (String)

                A date range unit for the date filter.

                Possible values include:
                • "DAYS"
          • SeverityProduct — (Array<map>)

            The native severity as defined by the security findings provider's solution that generated the finding.

            • Gte — (Float)

              The greater-than-equal condition to be applied to a single field when querying for findings.

            • Lte — (Float)

              The less-than-equal condition to be applied to a single field when querying for findings.

            • Gt — (Float)

              The greater-than condition to be applied to a single field when querying for findings.

            • Lt — (Float)

              The less-than condition to be applied to a single field when querying for findings.

            • Eq — (Float)

              The equal-to condition to be applied to a single field when querying for findings.

          • SeverityNormalized — (Array<map>)

            The normalized severity of a finding.

            • Gte — (Float)

              The greater-than-equal condition to be applied to a single field when querying for findings.

            • Lte — (Float)

              The less-than-equal condition to be applied to a single field when querying for findings.

            • Gt — (Float)

              The greater-than condition to be applied to a single field when querying for findings.

            • Lt — (Float)

              The less-than condition to be applied to a single field when querying for findings.

            • Eq — (Float)

              The equal-to condition to be applied to a single field when querying for findings.

          • SeverityLabel — (Array<map>)

            The label of a finding's severity.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • Confidence — (Array<map>)

            A finding's confidence. Confidence is defined as the likelihood that a finding accurately identifies the behavior or issue that it was intended to identify.

            Confidence is scored on a 0-100 basis using a ratio scale, where 0 means zero percent confidence and 100 means 100 percent confidence.

            • Gte — (Float)

              The greater-than-equal condition to be applied to a single field when querying for findings.

            • Lte — (Float)

              The less-than-equal condition to be applied to a single field when querying for findings.

            • Gt — (Float)

              The greater-than condition to be applied to a single field when querying for findings.

            • Lt — (Float)

              The less-than condition to be applied to a single field when querying for findings.

            • Eq — (Float)

              The equal-to condition to be applied to a single field when querying for findings.

          • Criticality — (Array<map>)

            The level of importance assigned to the resources associated with the finding.

            A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources.

            • Gte — (Float)

              The greater-than-equal condition to be applied to a single field when querying for findings.

            • Lte — (Float)

              The less-than-equal condition to be applied to a single field when querying for findings.

            • Gt — (Float)

              The greater-than condition to be applied to a single field when querying for findings.

            • Lt — (Float)

              The less-than condition to be applied to a single field when querying for findings.

            • Eq — (Float)

              The equal-to condition to be applied to a single field when querying for findings.

          • Title — (Array<map>)

            A finding's title.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • Description — (Array<map>)

            A finding's description.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • RecommendationText — (Array<map>)

            The recommendation of what to do about the issue described in a finding.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • SourceUrl — (Array<map>)

            A URL that links to a page about the current finding in the security findings provider's solution.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ProductFields — (Array<map>)

            A data type where security findings providers can include additional solution-specific details that aren't part of the defined AwsSecurityFinding format.

            • Key — (String)

              The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

            • Value — (String)

              The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

            • Comparison — (String)

              The condition to apply to the key value when filtering Security Hub findings with a map filter.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

              • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

              CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

              To search for values that don't have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

              • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

              NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

              CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ProductName — (Array<map>)

            The name of the solution (product) that generates findings.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • CompanyName — (Array<map>)

            The name of the findings provider (company) that owns the solution (product) that generates findings.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • UserDefinedFields — (Array<map>)

            A list of name/value string pairs associated with the finding. These are custom, user-defined fields added to a finding.

            • Key — (String)

              The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

            • Value — (String)

              The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

            • Comparison — (String)

              The condition to apply to the key value when filtering Security Hub findings with a map filter.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

              • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

              CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

              To search for values that don't have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

              • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

              NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

              CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • MalwareName — (Array<map>)

            The name of the malware that was observed.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • MalwareType — (Array<map>)

            The type of the malware that was observed.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • MalwarePath — (Array<map>)

            The filesystem path of the malware that was observed.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • MalwareState — (Array<map>)

            The state of the malware that was observed.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • NetworkDirection — (Array<map>)

            Indicates the direction of network traffic associated with a finding.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • NetworkProtocol — (Array<map>)

            The protocol of network-related information about a finding.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • NetworkSourceIpV4 — (Array<map>)

            The source IPv4 address of network-related information about a finding.

            • Cidr — (String)

              A finding's CIDR value.

          • NetworkSourceIpV6 — (Array<map>)

            The source IPv6 address of network-related information about a finding.

            • Cidr — (String)

              A finding's CIDR value.

          • NetworkSourcePort — (Array<map>)

            The source port of network-related information about a finding.

            • Gte — (Float)

              The greater-than-equal condition to be applied to a single field when querying for findings.

            • Lte — (Float)

              The less-than-equal condition to be applied to a single field when querying for findings.

            • Gt — (Float)

              The greater-than condition to be applied to a single field when querying for findings.

            • Lt — (Float)

              The less-than condition to be applied to a single field when querying for findings.

            • Eq — (Float)

              The equal-to condition to be applied to a single field when querying for findings.

          • NetworkSourceDomain — (Array<map>)

            The source domain of network-related information about a finding.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • NetworkSourceMac — (Array<map>)

            The source media access control (MAC) address of network-related information about a finding.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • NetworkDestinationIpV4 — (Array<map>)

            The destination IPv4 address of network-related information about a finding.

            • Cidr — (String)

              A finding's CIDR value.

          • NetworkDestinationIpV6 — (Array<map>)

            The destination IPv6 address of network-related information about a finding.

            • Cidr — (String)

              A finding's CIDR value.

          • NetworkDestinationPort — (Array<map>)

            The destination port of network-related information about a finding.

            • Gte — (Float)

              The greater-than-equal condition to be applied to a single field when querying for findings.

            • Lte — (Float)

              The less-than-equal condition to be applied to a single field when querying for findings.

            • Gt — (Float)

              The greater-than condition to be applied to a single field when querying for findings.

            • Lt — (Float)

              The less-than condition to be applied to a single field when querying for findings.

            • Eq — (Float)

              The equal-to condition to be applied to a single field when querying for findings.

          • NetworkDestinationDomain — (Array<map>)

            The destination domain of network-related information about a finding.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ProcessName — (Array<map>)

            The name of the process.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ProcessPath — (Array<map>)

            The path to the process executable.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ProcessPid — (Array<map>)

            The process ID.

            • Gte — (Float)

              The greater-than-equal condition to be applied to a single field when querying for findings.

            • Lte — (Float)

              The less-than-equal condition to be applied to a single field when querying for findings.

            • Gt — (Float)

              The greater-than condition to be applied to a single field when querying for findings.

            • Lt — (Float)

              The less-than condition to be applied to a single field when querying for findings.

            • Eq — (Float)

              The equal-to condition to be applied to a single field when querying for findings.

          • ProcessParentPid — (Array<map>)

            The parent process ID. This field accepts positive integers between O and 2147483647.

            • Gte — (Float)

              The greater-than-equal condition to be applied to a single field when querying for findings.

            • Lte — (Float)

              The less-than-equal condition to be applied to a single field when querying for findings.

            • Gt — (Float)

              The greater-than condition to be applied to a single field when querying for findings.

            • Lt — (Float)

              The less-than condition to be applied to a single field when querying for findings.

            • Eq — (Float)

              The equal-to condition to be applied to a single field when querying for findings.

          • ProcessLaunchedAt — (Array<map>)

            A timestamp that identifies when the process was launched.

            A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • Start — (String)

              A timestamp that provides the start date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • End — (String)

              A timestamp that provides the end date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • DateRange — (map)

              A date range for the date filter.

              • Value — (Integer)

                A date range value for the date filter.

              • Unit — (String)

                A date range unit for the date filter.

                Possible values include:
                • "DAYS"
          • ProcessTerminatedAt — (Array<map>)

            A timestamp that identifies when the process was terminated.

            A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • Start — (String)

              A timestamp that provides the start date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • End — (String)

              A timestamp that provides the end date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • DateRange — (map)

              A date range for the date filter.

              • Value — (Integer)

                A date range value for the date filter.

              • Unit — (String)

                A date range unit for the date filter.

                Possible values include:
                • "DAYS"
          • ThreatIntelIndicatorType — (Array<map>)

            The type of a threat intelligence indicator.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ThreatIntelIndicatorValue — (Array<map>)

            The value of a threat intelligence indicator.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ThreatIntelIndicatorCategory — (Array<map>)

            The category of a threat intelligence indicator.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ThreatIntelIndicatorLastObservedAt — (Array<map>)

            A timestamp that identifies the last observation of a threat intelligence indicator.

            • Start — (String)

              A timestamp that provides the start date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • End — (String)

              A timestamp that provides the end date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • DateRange — (map)

              A date range for the date filter.

              • Value — (Integer)

                A date range value for the date filter.

              • Unit — (String)

                A date range unit for the date filter.

                Possible values include:
                • "DAYS"
          • ThreatIntelIndicatorSource — (Array<map>)

            The source of the threat intelligence.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ThreatIntelIndicatorSourceUrl — (Array<map>)

            The URL for more details from the source of the threat intelligence.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceType — (Array<map>)

            Specifies the type of the resource that details are provided for.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceId — (Array<map>)

            The canonical identifier for the given resource type.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourcePartition — (Array<map>)

            The canonical Amazon Web Services partition name that the Region is assigned to.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceRegion — (Array<map>)

            The canonical Amazon Web Services external Region name where this resource is located.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceTags — (Array<map>)

            A list of Amazon Web Services tags associated with a resource at the time the finding was processed.

            • Key — (String)

              The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

            • Value — (String)

              The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

            • Comparison — (String)

              The condition to apply to the key value when filtering Security Hub findings with a map filter.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

              • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

              CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

              To search for values that don't have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

              • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

              NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

              CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceAwsEc2InstanceType — (Array<map>)

            The instance type of the instance.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceAwsEc2InstanceImageId — (Array<map>)

            The Amazon Machine Image (AMI) ID of the instance.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceAwsEc2InstanceIpV4Addresses — (Array<map>)

            The IPv4 addresses associated with the instance.

            • Cidr — (String)

              A finding's CIDR value.

          • ResourceAwsEc2InstanceIpV6Addresses — (Array<map>)

            The IPv6 addresses associated with the instance.

            • Cidr — (String)

              A finding's CIDR value.

          • ResourceAwsEc2InstanceKeyName — (Array<map>)

            The key name associated with the instance.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceAwsEc2InstanceIamInstanceProfileArn — (Array<map>)

            The IAM profile ARN of the instance.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceAwsEc2InstanceVpcId — (Array<map>)

            The identifier of the VPC that the instance was launched in.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceAwsEc2InstanceSubnetId — (Array<map>)

            The identifier of the subnet that the instance was launched in.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceAwsEc2InstanceLaunchedAt — (Array<map>)

            The date and time the instance was launched.

            • Start — (String)

              A timestamp that provides the start date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • End — (String)

              A timestamp that provides the end date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • DateRange — (map)

              A date range for the date filter.

              • Value — (Integer)

                A date range value for the date filter.

              • Unit — (String)

                A date range unit for the date filter.

                Possible values include:
                • "DAYS"
          • ResourceAwsS3BucketOwnerId — (Array<map>)

            The canonical user ID of the owner of the S3 bucket.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceAwsS3BucketOwnerName — (Array<map>)

            The display name of the owner of the S3 bucket.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceAwsIamAccessKeyUserName — (Array<map>)

            The user associated with the IAM access key related to a finding.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceAwsIamAccessKeyPrincipalName — (Array<map>)

            The name of the principal that is associated with an IAM access key.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceAwsIamAccessKeyStatus — (Array<map>)

            The status of the IAM access key related to a finding.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceAwsIamAccessKeyCreatedAt — (Array<map>)

            The creation date/time of the IAM access key related to a finding.

            • Start — (String)

              A timestamp that provides the start date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • End — (String)

              A timestamp that provides the end date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • DateRange — (map)

              A date range for the date filter.

              • Value — (Integer)

                A date range value for the date filter.

              • Unit — (String)

                A date range unit for the date filter.

                Possible values include:
                • "DAYS"
          • ResourceAwsIamUserUserName — (Array<map>)

            The name of an IAM user.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceContainerName — (Array<map>)

            The name of the container related to a finding.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceContainerImageId — (Array<map>)

            The identifier of the image related to a finding.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceContainerImageName — (Array<map>)

            The name of the image related to a finding.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceContainerLaunchedAt — (Array<map>)

            A timestamp that identifies when the container was started.

            A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • Start — (String)

              A timestamp that provides the start date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • End — (String)

              A timestamp that provides the end date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • DateRange — (map)

              A date range for the date filter.

              • Value — (Integer)

                A date range value for the date filter.

              • Unit — (String)

                A date range unit for the date filter.

                Possible values include:
                • "DAYS"
          • ResourceDetailsOther — (Array<map>)

            The details of a resource that doesn't have a specific subfield for the resource type defined.

            • Key — (String)

              The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

            • Value — (String)

              The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

            • Comparison — (String)

              The condition to apply to the key value when filtering Security Hub findings with a map filter.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

              • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

              CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

              To search for values that don't have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

              • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

              NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

              CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ComplianceStatus — (Array<map>)

            Exclusive to findings that are generated as the result of a check run against a specific rule in a supported standard, such as CIS Amazon Web Services Foundations. Contains security standard-related finding details.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • VerificationState — (Array<map>)

            The veracity of a finding.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • WorkflowState — (Array<map>)

            The workflow state of a finding.

            Note that this field is deprecated. To search for a finding based on its workflow status, use WorkflowStatus.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • WorkflowStatus — (Array<map>)

            The status of the investigation into a finding. Allowed values are the following.

            • NEW - The initial state of a finding, before it is reviewed.

              Security Hub also resets the workflow status from NOTIFIED or RESOLVED to NEW in the following cases:

              • RecordState changes from ARCHIVED to ACTIVE.

              • Compliance.Status changes from PASSED to either WARNING, FAILED, or NOT_AVAILABLE.

            • NOTIFIED - Indicates that the resource owner has been notified about the security issue. Used when the initial reviewer is not the resource owner, and needs intervention from the resource owner.

              If one of the following occurs, the workflow status is changed automatically from NOTIFIED to NEW:

              • RecordState changes from ARCHIVED to ACTIVE.

              • Compliance.Status changes from PASSED to FAILED, WARNING, or NOT_AVAILABLE.

            • SUPPRESSED - Indicates that you reviewed the finding and do not believe that any action is needed.

              The workflow status of a SUPPRESSED finding does not change if RecordState changes from ARCHIVED to ACTIVE.

            • RESOLVED - The finding was reviewed and remediated and is now considered resolved.

              The finding remains RESOLVED unless one of the following occurs:

              • RecordState changes from ARCHIVED to ACTIVE.

              • Compliance.Status changes from PASSED to FAILED, WARNING, or NOT_AVAILABLE.

              In those cases, the workflow status is automatically reset to NEW.

              For findings from controls, if Compliance.Status is PASSED, then Security Hub automatically sets the workflow status to RESOLVED.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • RecordState — (Array<map>)

            The updated record state for the finding.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • RelatedFindingsProductArn — (Array<map>)

            The ARN of the solution that generated a related finding.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • RelatedFindingsId — (Array<map>)

            The solution-generated identifier for a related finding.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • NoteText — (Array<map>)

            The text of a note.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • NoteUpdatedAt — (Array<map>)

            The timestamp of when the note was updated.

            • Start — (String)

              A timestamp that provides the start date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • End — (String)

              A timestamp that provides the end date for the date filter.

              A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

            • DateRange — (map)

              A date range for the date filter.

              • Value — (Integer)

                A date range value for the date filter.

              • Unit — (String)

                A date range unit for the date filter.

                Possible values include:
                • "DAYS"
          • NoteUpdatedBy — (Array<map>)

            The principal that created a note.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • Keyword — (Array<map>)

            A keyword for a finding.

            • Value — (String)

              A value for the keyword.

          • FindingProviderFieldsConfidence — (Array<map>)

            The finding provider value for the finding confidence. Confidence is defined as the likelihood that a finding accurately identifies the behavior or issue that it was intended to identify.

            Confidence is scored on a 0-100 basis using a ratio scale, where 0 means zero percent confidence and 100 means 100 percent confidence.

            • Gte — (Float)

              The greater-than-equal condition to be applied to a single field when querying for findings.

            • Lte — (Float)

              The less-than-equal condition to be applied to a single field when querying for findings.

            • Gt — (Float)

              The greater-than condition to be applied to a single field when querying for findings.

            • Lt — (Float)

              The less-than condition to be applied to a single field when querying for findings.

            • Eq — (Float)

              The equal-to condition to be applied to a single field when querying for findings.

          • FindingProviderFieldsCriticality — (Array<map>)

            The finding provider value for the level of importance assigned to the resources associated with the findings.

            A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources.

            • Gte — (Float)

              The greater-than-equal condition to be applied to a single field when querying for findings.

            • Lte — (Float)

              The less-than-equal condition to be applied to a single field when querying for findings.

            • Gt — (Float)

              The greater-than condition to be applied to a single field when querying for findings.

            • Lt — (Float)

              The less-than condition to be applied to a single field when querying for findings.

            • Eq — (Float)

              The equal-to condition to be applied to a single field when querying for findings.

          • FindingProviderFieldsRelatedFindingsId — (Array<map>)

            The finding identifier of a related finding that is identified by the finding provider.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • FindingProviderFieldsRelatedFindingsProductArn — (Array<map>)

            The ARN of the solution that generated a related finding that is identified by the finding provider.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • FindingProviderFieldsSeverityLabel — (Array<map>)

            The finding provider value for the severity label.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • FindingProviderFieldsSeverityOriginal — (Array<map>)

            The finding provider's original value for the severity.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • FindingProviderFieldsTypes — (Array<map>)

            One or more finding types that the finding provider assigned to the finding. Uses the format of namespace/category/classifier that classify a finding.

            Valid namespace values are: Software and Configuration Checks | TTPs | Effects | Unusual Behaviors | Sensitive Data Identifications

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • Sample — (Array<map>)

            Indicates whether or not sample findings are included in the filter results.

            • Value — (Boolean)

              The value of the boolean.

          • ComplianceSecurityControlId — (Array<map>)

            The unique identifier of a control across standards. Values for this field typically consist of an Amazon Web Service and a number, such as APIGateway.5.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ComplianceAssociatedStandardsId — (Array<map>)

            The unique identifier of a standard in which a control is enabled. This field consists of the resource portion of the Amazon Resource Name (ARN) returned for a standard in the DescribeStandards API response.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • VulnerabilitiesExploitAvailable — (Array<map>)

            Indicates whether a software vulnerability in your environment has a known exploit. You can filter findings by this field only if you use Security Hub and Amazon Inspector.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • VulnerabilitiesFixAvailable — (Array<map>)

            Indicates whether a vulnerability is fixed in a newer version of the affected software packages. You can filter findings by this field only if you use Security Hub and Amazon Inspector.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ComplianceSecurityControlParametersName — (Array<map>)

            The name of a security control parameter.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ComplianceSecurityControlParametersValue — (Array<map>)

            The current value of a security control parameter.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • AwsAccountName — (Array<map>)

            The name of the Amazon Web Services account in which a finding is generated.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceApplicationName — (Array<map>)

            The name of the application that is related to a finding.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
          • ResourceApplicationArn — (Array<map>)

            The ARN of the application that is related to a finding.

            • Value — (String)

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

            • Comparison — (String)

              The condition to apply to a string value when filtering Security Hub findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

              Possible values include:
              • "EQUALS"
              • "PREFIX"
              • "NOT_EQUALS"
              • "PREFIX_NOT_EQUALS"
              • "CONTAINS"
              • "NOT_CONTAINS"
        • GroupByAttributerequired — (String)

          The grouping attribute for the insight's findings. Indicates how to group the matching findings, and identifies the type of item that the insight applies to. For example, if an insight is grouped by resource identifier, then the insight produces a list of resource identifiers.

      • NextToken — (String)

        The pagination token to use to request the next page of results.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

getInvitationsCount(params = {}, callback) ⇒ AWS.Request

Returns the count of all Security Hub membership invitations that were sent to the current member account, not including the currently accepted invitation.

Service Reference:

Examples:

To get a count of membership invitations


/* The following example returns a count of invitations that the Security Hub administrator sent to the current member account, not including the currently accepted invitation.

*/

 var params = {
 };
 securityhub.getInvitationsCount(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    InvitationsCount: 3
   }
   */
 });

Calling the getInvitationsCount operation

var params = {
};
securityhub.getInvitationsCount(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • InvitationsCount — (Integer)

        The number of all membership invitations sent to this Security Hub member account, not including the currently accepted invitation.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

getMasterAccount(params = {}, callback) ⇒ AWS.Request

This method is deprecated. Instead, use GetAdministratorAccount.

The Security Hub console continues to use GetMasterAccount. It will eventually change to use GetAdministratorAccount. Any IAM policies that specifically control access to this function must continue to use GetMasterAccount. You should also add GetAdministratorAccount to your policies to ensure that the correct permissions are in place after the console begins to use GetAdministratorAccount.

Provides the details for the Security Hub administrator account for the current member account.

Can be used by both member accounts that are managed using Organizations and accounts that were invited manually.

Service Reference:

Examples:

Calling the getMasterAccount operation

var params = {
};
securityhub.getMasterAccount(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • Master — (map)

        A list of details about the Security Hub administrator account for the current member account.

        • AccountId — (String)

          The account ID of the Security Hub administrator account that the invitation was sent from.

        • InvitationId — (String)

          The ID of the invitation sent to the member account.

        • InvitedAt — (Date)

          The timestamp of when the invitation was sent.

        • MemberStatus — (String)

          The current status of the association between the member and administrator accounts.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

getMembers(params = {}, callback) ⇒ AWS.Request

Returns the details for the Security Hub member accounts for the specified account IDs.

An administrator account can be either the delegated Security Hub administrator account for an organization or an administrator account that enabled Security Hub manually.

The results include both member accounts that are managed using Organizations and accounts that were invited manually.

Service Reference:

Examples:

To get member account details


/* The following example returns details for the Security Hub member accounts with the specified AWS account IDs. An administrator account may be the delegated Security Hub administrator account for an organization or an administrator account that enabled Security Hub manually. The Security Hub administrator must call this operation. */

 var params = {
  AccountIds: [
     "444455556666", 
     "777788889999"
  ]
 };
 securityhub.getMembers(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    Members: [
       {
      AccountId: "444455556666", 
      AdministratorId: "123456789012", 
      InvitedAt: <Date Representation>, 
      MasterId: "123456789012", 
      MemberStatus: "ASSOCIATED", 
      UpdatedAt: <Date Representation>
     }, 
       {
      AccountId: "777788889999", 
      AdministratorId: "123456789012", 
      InvitedAt: <Date Representation>, 
      MasterId: "123456789012", 
      MemberStatus: "ASSOCIATED", 
      UpdatedAt: <Date Representation>
     }
    ], 
    UnprocessedAccounts: [
    ]
   }
   */
 });

Calling the getMembers operation

var params = {
  AccountIds: [ /* required */
    'STRING_VALUE',
    /* more items */
  ]
};
securityhub.getMembers(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • AccountIds — (Array<String>)

      The list of account IDs for the Security Hub member accounts to return the details for.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • Members — (Array<map>)

        The list of details about the Security Hub member accounts.

        • AccountId — (String)

          The Amazon Web Services account ID of the member account.

        • Email — (String)

          The email address of the member account.

        • MasterId — (String)

          This is replaced by AdministratorID.

          The Amazon Web Services account ID of the Security Hub administrator account associated with this member account.

        • AdministratorId — (String)

          The Amazon Web Services account ID of the Security Hub administrator account associated with this member account.

        • MemberStatus — (String)

          The status of the relationship between the member account and its administrator account.

          The status can have one of the following values:

          • Created - Indicates that the administrator account added the member account, but has not yet invited the member account.

          • Invited - Indicates that the administrator account invited the member account. The member account has not yet responded to the invitation.

          • Enabled - Indicates that the member account is currently active. For manually invited member accounts, indicates that the member account accepted the invitation.

          • Removed - Indicates that the administrator account disassociated the member account.

          • Resigned - Indicates that the member account disassociated themselves from the administrator account.

          • Deleted - Indicates that the administrator account deleted the member account.

          • AccountSuspended - Indicates that an organization account was suspended from Amazon Web Services at the same time that the administrator account tried to enable the organization account as a member account.

        • InvitedAt — (Date)

          A timestamp for the date and time when the invitation was sent to the member account.

        • UpdatedAt — (Date)

          The timestamp for the date and time when the member account was updated.

      • UnprocessedAccounts — (Array<map>)

        The list of Amazon Web Services accounts that could not be processed. For each account, the list includes the account ID and the email address.

        • AccountId — (String)

          An Amazon Web Services account ID of the account that was not processed.

        • ProcessingResult — (String)

          The reason that the account was not processed.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

getSecurityControlDefinition(params = {}, callback) ⇒ AWS.Request

Retrieves the definition of a security control. The definition includes the control title, description, Region availability, parameter definitions, and other details.

Service Reference:

Examples:

To get the definition of a security control.


/* The following example retrieves definition details for the specified security control. */

 var params = {
  SecurityControlId: "EC2.4"
 };
 securityhub.getSecurityControlDefinition(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    SecurityControlDefinition: {
     CurrentRegionAvailability: "AVAILABLE", 
     Description: "This control checks whether an Amazon EC2 instance has been stopped for longer than the allowed number of days. The control fails if an EC2 instance is stopped for longer than the maximum allowed time period. Unless you provide a custom parameter value for the maximum allowed time period, Security Hub uses a default value of 30 days.", 
     ParameterDefinitions: {
      "AllowedDays": {
        ConfigurationOptions: {
         Integer: {
          DefaultValue: 30, 
          Max: 365, 
          Min: 1
         }
        }, 
        Description: "Number of days the EC2 instance is allowed to be in a stopped state before generating a failed finding"
       }
     }, 
     RemediationUrl: "https://docs.aws.amazon.com/console/securityhub/EC2.4/remediation", 
     SecurityControlId: "EC2.4", 
     SeverityRating: "MEDIUM", 
     Title: "Stopped Amazon EC2 instances should be removed after a specified time period"
    }
   }
   */
 });

Calling the getSecurityControlDefinition operation

var params = {
  SecurityControlId: 'STRING_VALUE' /* required */
};
securityhub.getSecurityControlDefinition(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • SecurityControlId — (String)

      The ID of the security control to retrieve the definition for. This field doesn’t accept an Amazon Resource Name (ARN).

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • SecurityControlDefinition — (map)

        Provides metadata for a security control, including its unique standard-agnostic identifier, title, description, severity, availability in Amazon Web Services Regions, and a link to remediation steps.

        • SecurityControlIdrequired — (String)

          The unique identifier of a security control across standards. Values for this field typically consist of an Amazon Web Service name and a number (for example, APIGateway.3). This parameter differs from SecurityControlArn, which is a unique Amazon Resource Name (ARN) assigned to a control. The ARN references the security control ID (for example, arn:aws:securityhub:eu-central-1:123456789012:security-control/APIGateway.3).

        • Titlerequired — (String)

          The title of a security control.

        • Descriptionrequired — (String)

          The description of a security control across standards. This typically summarizes how Security Hub evaluates the control and the conditions under which it produces a failed finding. This parameter doesn't reference a specific standard.

        • RemediationUrlrequired — (String)

          A link to Security Hub documentation that explains how to remediate a failed finding for a security control.

        • SeverityRatingrequired — (String)

          The severity of a security control. For more information about how Security Hub determines control severity, see Assigning severity to control findings in the Security Hub User Guide.

          Possible values include:
          • "LOW"
          • "MEDIUM"
          • "HIGH"
          • "CRITICAL"
        • CurrentRegionAvailabilityrequired — (String)

          Specifies whether a security control is available in the current Amazon Web Services Region.

          Possible values include:
          • "AVAILABLE"
          • "UNAVAILABLE"
        • CustomizableProperties — (Array<String>)

          Security control properties that you can customize. Currently, only parameter customization is supported for select controls. An empty array is returned for controls that don’t support custom properties.

        • ParameterDefinitions — (map<map>)

          An object that provides a security control parameter name, description, and the options for customizing it. This object is excluded for a control that doesn't support custom parameters.

          • Descriptionrequired — (String)

            Description of a control parameter.

          • ConfigurationOptionsrequired — (map)

            The options for customizing a control parameter. Customization options vary based on the data type of the parameter.

            • Integer — (map)

              The options for customizing a security control parameter that is an integer.

              • DefaultValue — (Integer)

                The Security Hub default value for a control parameter that is an integer.

              • Min — (Integer)

                The minimum valid value for a control parameter that is an integer.

              • Max — (Integer)

                The maximum valid value for a control parameter that is an integer.

            • IntegerList — (map)

              The options for customizing a security control parameter that is a list of integers.

              • DefaultValue — (Array<Integer>)

                The Security Hub default value for a control parameter that is a list of integers.

              • Min — (Integer)

                The minimum valid value for a control parameter that is a list of integers.

              • Max — (Integer)

                The maximum valid value for a control parameter that is a list of integers.

              • MaxItems — (Integer)

                The maximum number of list items that an interger list control parameter can accept.

            • Double — (map)

              The options for customizing a security control parameter that is a double.

              • DefaultValue — (Float)

                The Security Hub default value for a control parameter that is a double.

              • Min — (Float)

                The minimum valid value for a control parameter that is a double.

              • Max — (Float)

                The maximum valid value for a control parameter that is a double.

            • String — (map)

              The options for customizing a security control parameter that is a string data type.

              • DefaultValue — (String)

                The Security Hub default value for a control parameter that is a string.

              • Re2Expression — (String)

                An RE2 regular expression that Security Hub uses to validate a user-provided control parameter string.

              • ExpressionDescription — (String)

                The description of the RE2 regular expression.

            • StringList — (map)

              The options for customizing a security control parameter that is a list of strings.

              • DefaultValue — (Array<String>)

                The Security Hub default value for a control parameter that is a list of strings.

              • Re2Expression — (String)

                An RE2 regular expression that Security Hub uses to validate a user-provided list of strings for a control parameter.

              • MaxItems — (Integer)

                The maximum number of list items that a string list control parameter can accept.

              • ExpressionDescription — (String)

                The description of the RE2 regular expression.

            • Boolean — (map)

              The options for customizing a security control parameter that is a boolean. For a boolean parameter, the options are true and false.

              • DefaultValue — (Boolean)

                The Security Hub default value for a boolean parameter.

            • Enum — (map)

              The options for customizing a security control parameter that is an enum.

              • DefaultValue — (String)

                The Security Hub default value for a control parameter that is an enum.

              • AllowedValues — (Array<String>)

                The valid values for a control parameter that is an enum.

            • EnumList — (map)

              The options for customizing a security control parameter that is a list of enums.

              • DefaultValue — (Array<String>)

                The Security Hub default value for a control parameter that is a list of enums.

              • MaxItems — (Integer)

                The maximum number of list items that an enum list control parameter can accept.

              • AllowedValues — (Array<String>)

                The valid values for a control parameter that is a list of enums.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

inviteMembers(params = {}, callback) ⇒ AWS.Request

Invites other Amazon Web Services accounts to become member accounts for the Security Hub administrator account that the invitation is sent from.

This operation is only used to invite accounts that do not belong to an organization. Organization accounts do not receive invitations.

Before you can use this action to invite a member, you must first use the CreateMembers action to create the member account in Security Hub.

When the account owner enables Security Hub and accepts the invitation to become a member account, the administrator account can view the findings generated from the member account.

Service Reference:

Examples:

To invite accounts to become members


/* The following example invites the specified AWS accounts to become member accounts associated with the calling Security Hub administrator account. You only use this operation to invite accounts that don't belong to an AWS Organizations organization. */

 var params = {
  AccountIds: [
     "111122223333", 
     "444455556666"
  ]
 };
 securityhub.inviteMembers(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    UnprocessedAccounts: [
    ]
   }
   */
 });

Calling the inviteMembers operation

var params = {
  AccountIds: [ /* required */
    'STRING_VALUE',
    /* more items */
  ]
};
securityhub.inviteMembers(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • AccountIds — (Array<String>)

      The list of account IDs of the Amazon Web Services accounts to invite to Security Hub as members.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • UnprocessedAccounts — (Array<map>)

        The list of Amazon Web Services accounts that could not be processed. For each account, the list includes the account ID and the email address.

        • AccountId — (String)

          An Amazon Web Services account ID of the account that was not processed.

        • ProcessingResult — (String)

          The reason that the account was not processed.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

listAutomationRules(params = {}, callback) ⇒ AWS.Request

A list of automation rules and their metadata for the calling account.

Service Reference:

Examples:

To list automation rules


/* The following example lists automation rules and rule metadata in the calling account. */

 var params = {
  MaxResults: 2, 
  NextToken: "example-token"
 };
 securityhub.listAutomationRules(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    AutomationRulesMetadata: [
       {
      CreatedAt: <Date Representation>, 
      CreatedBy: "AROAJURBUYQQNL5OL2TIM:TEST-16MJ75L9VBK14", 
      Description: "IAM.8 is a known issue and can be resolved", 
      RuleArn: "arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
      RuleName: "sample-rule-name-1", 
      RuleOrder: 1, 
      RuleStatus: "ENABLED", 
      UpdatedAt: <Date Representation>
     }, 
       {
      CreatedAt: <Date Representation>, 
      CreatedBy: "AROAJURBUYQQNL5OL2TIM:TEST-16MJ75L9VBK14", 
      Description: "Lambda.2 is a known issue and can be resolved", 
      RuleArn: "arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE22222", 
      RuleName: "sample-rule-name-2", 
      RuleOrder: 2, 
      RuleStatus: "ENABLED", 
      UpdatedAt: <Date Representation>
     }
    ], 
    NextToken: "example-token"
   }
   */
 });

Calling the listAutomationRules operation

var params = {
  MaxResults: 'NUMBER_VALUE',
  NextToken: 'STRING_VALUE'
};
securityhub.listAutomationRules(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • NextToken — (String)

      A token to specify where to start paginating the response. This is the NextToken from a previously truncated response. On your first call to the ListAutomationRules API, set the value of this parameter to NULL.

    • MaxResults — (Integer)

      The maximum number of rules to return in the response. This currently ranges from 1 to 100.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • AutomationRulesMetadata — (Array<map>)

        Metadata for rules in the calling account. The response includes rules with a RuleStatus of ENABLED and DISABLED.

        • RuleArn — (String)

          The Amazon Resource Name (ARN) for the rule.

        • RuleStatus — (String)

          Whether the rule is active after it is created. If this parameter is equal to ENABLED, Security Hub starts applying the rule to findings and finding updates after the rule is created. To change the value of this parameter after creating a rule, use BatchUpdateAutomationRules .

          Possible values include:
          • "ENABLED"
          • "DISABLED"
        • RuleOrder — (Integer)

          An integer ranging from 1 to 1000 that represents the order in which the rule action is applied to findings. Security Hub applies rules with lower values for this parameter first.

        • RuleName — (String)

          The name of the rule.

        • Description — (String)

          A description of the rule.

        • IsTerminal — (Boolean)

          Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding matches the criteria for multiple rules, and each rule has different actions. If a rule is terminal, Security Hub applies the rule action to a finding that matches the rule criteria and doesn't evaluate other rules for the finding. By default, a rule isn't terminal.

        • CreatedAt — (Date)

          A timestamp that indicates when the rule was created.

          Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.

        • UpdatedAt — (Date)

          A timestamp that indicates when the rule was most recently updated.

          Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.

        • CreatedBy — (String)

          The principal that created a rule.

      • NextToken — (String)

        A pagination token for the response.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

listConfigurationPolicies(params = {}, callback) ⇒ AWS.Request

Lists the configuration policies that the Security Hub delegated administrator has created for your organization. Only the delegated administrator can invoke this operation from the home Region.

Service Reference:

Examples:

To view a list of configuration policies


/* This operation provides a list of your configuration policies, including metadata for each policy. */

 var params = {
  MaxResults: 1, 
  NextToken: "U1FsdGVkX19nBV2zoh+Gou9NgnulLJHWpn9xnG4hqSOhvw3o2JqjI86QDxdf"
 };
 securityhub.listConfigurationPolicies(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    ConfigurationPolicySummaries: [
       {
      Arn: "arn:aws:securityhub:us-east-1:123456789012:configuration-policy/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
      Description: "Configuration policy for testing FSBP and CIS", 
      Id: "a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
      Name: "TestConfigurationPolicy", 
      ServiceEnabled: true, 
      UpdatedAt: <Date Representation>
     }
    ], 
    NextToken: "U1FsdGVkX19nBV2zoh+Gou9NgnulLJHWpn9xnG4hqSOfvw3o2JqjI86QDxef"
   }
   */
 });

Calling the listConfigurationPolicies operation

var params = {
  MaxResults: 'NUMBER_VALUE',
  NextToken: 'STRING_VALUE'
};
securityhub.listConfigurationPolicies(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • NextToken — (String)

      The NextToken value that's returned from a previous paginated ListConfigurationPolicies request where MaxResults was used but the results exceeded the value of that parameter. Pagination continues from the MaxResults was used but the results exceeded the value of that parameter. Pagination continues from the end of the previous response that returned the NextToken value. This value is null when there are no more results to return.

    • MaxResults — (Integer)

      The maximum number of results that's returned by ListConfigurationPolicies in each page of the response. When this parameter is used, ListConfigurationPolicies returns the specified number of results in a single page and a NextToken response element. You can see the remaining results of the initial request by sending another ListConfigurationPolicies request with the returned NextToken value. A valid range for MaxResults is between 1 and 100.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • ConfigurationPolicySummaries — (Array<map>)

        Provides metadata for each of your configuration policies.

        • Arn — (String)

          The Amazon Resource Name (ARN) of the configuration policy.

        • Id — (String)

          The universally unique identifier (UUID) of the configuration policy.

        • Name — (String)

          The name of the configuration policy. Alphanumeric characters and the following ASCII characters are permitted: -, ., !, *, /.

        • Description — (String)

          The description of the configuration policy.

        • UpdatedAt — (Date)

          The date and time, in UTC and ISO 8601 format, that the configuration policy was last updated.

        • ServiceEnabled — (Boolean)

          Indicates whether the service that the configuration policy applies to is enabled in the policy.

      • NextToken — (String)

        The NextToken value to include in the next ListConfigurationPolicies request. When the results of a ListConfigurationPolicies request exceed MaxResults, this value can be used to retrieve the next page of results. This value is null when there are no more results to return.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

listConfigurationPolicyAssociations(params = {}, callback) ⇒ AWS.Request

Provides information about the associations for your configuration policies and self-managed behavior. Only the Security Hub delegated administrator can invoke this operation from the home Region.

Examples:

To list configuration associations


/* This operation lists all of the associations between targets and configuration policies or self-managed behavior. Targets can include accounts, organizational units, or the root. */

 var params = {
  Filters: {
   AssociationType: "APPLIED"
  }, 
  MaxResults: 1, 
  NextToken: "U1FsdGVkX19nBV2zoh+Gou9NgnulLJHWpn9xnG4hqSOhvw3o2JqjI86QDxdf"
 };
 securityhub.listConfigurationPolicyAssociations(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    ConfigurationPolicyAssociationSummaries: [
       {
      AssociationStatus: "PENDING", 
      AssociationType: "APPLIED", 
      ConfigurationPolicyId: "a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
      TargetId: "123456789012", 
      TargetType: "ACCOUNT", 
      UpdatedAt: <Date Representation>
     }
    ], 
    NextToken: "U1FsdGVkX19nBV2zoh+Gou9NgnulLJHWpn9xnG4hqSOfvw3o2JqjI86QDxef"
   }
   */
 });

Calling the listConfigurationPolicyAssociations operation

var params = {
  Filters: {
    AssociationStatus: PENDING | SUCCESS | FAILED,
    AssociationType: INHERITED | APPLIED,
    ConfigurationPolicyId: 'STRING_VALUE'
  },
  MaxResults: 'NUMBER_VALUE',
  NextToken: 'STRING_VALUE'
};
securityhub.listConfigurationPolicyAssociations(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • NextToken — (String)

      The NextToken value that's returned from a previous paginated ListConfigurationPolicyAssociations request where MaxResults was used but the results exceeded the value of that parameter. Pagination continues from the end of the previous response that returned the NextToken value. This value is null when there are no more results to return.

    • MaxResults — (Integer)

      The maximum number of results that's returned by ListConfigurationPolicies in each page of the response. When this parameter is used, ListConfigurationPolicyAssociations returns the specified number of results in a single page and a NextToken response element. You can see the remaining results of the initial request by sending another ListConfigurationPolicyAssociations request with the returned NextToken value. A valid range for MaxResults is between 1 and 100.

    • Filters — (map)

      Options for filtering the ListConfigurationPolicyAssociations response. You can filter by the Amazon Resource Name (ARN) or universally unique identifier (UUID) of a configuration, AssociationType, or AssociationStatus.

      • ConfigurationPolicyId — (String)

        The ARN or UUID of the configuration policy.

      • AssociationType — (String)

        Indicates whether the association between a target and a configuration was directly applied by the Security Hub delegated administrator or inherited from a parent.

        Possible values include:
        • "INHERITED"
        • "APPLIED"
      • AssociationStatus — (String)

        The current status of the association between a target and a configuration policy.

        Possible values include:
        • "PENDING"
        • "SUCCESS"
        • "FAILED"

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • ConfigurationPolicyAssociationSummaries — (Array<map>)

        An object that contains the details of each configuration policy association that’s returned in a ListConfigurationPolicyAssociations request.

        • ConfigurationPolicyId — (String)

          The universally unique identifier (UUID) of the configuration policy.

        • TargetId — (String)

          The identifier of the target account, organizational unit, or the root.

        • TargetType — (String)

          Specifies whether the target is an Amazon Web Services account, organizational unit, or the root.

          Possible values include:
          • "ACCOUNT"
          • "ORGANIZATIONAL_UNIT"
        • AssociationType — (String)

          Indicates whether the association between the specified target and the configuration was directly applied by the Security Hub delegated administrator or inherited from a parent.

          Possible values include:
          • "INHERITED"
          • "APPLIED"
        • UpdatedAt — (Date)

          The date and time, in UTC and ISO 8601 format, that the configuration policy association was last updated.

        • AssociationStatus — (String)

          The current status of the association between the specified target and the configuration.

          Possible values include:
          • "PENDING"
          • "SUCCESS"
          • "FAILED"
        • AssociationStatusMessage — (String)

          The explanation for a FAILED value for AssociationStatus.

      • NextToken — (String)

        The NextToken value to include in the next ListConfigurationPolicyAssociations request. When the results of a ListConfigurationPolicyAssociations request exceed MaxResults, this value can be used to retrieve the next page of results. This value is null when there are no more results to return.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

listEnabledProductsForImport(params = {}, callback) ⇒ AWS.Request

Lists all findings-generating solutions (products) that you are subscribed to receive findings from in Security Hub.

Service Reference:

Examples:

To list ARNs for enabled integrations


/* The following example returns a list of subscription Amazon Resource Names (ARNs) for the product integrations that you have currently enabled in Security Hub. */

 var params = {
 };
 securityhub.listEnabledProductsForImport(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    ProductSubscriptions: [
       "arn:aws:securityhub:us-east-1:517716713836:product-subscription/crowdstrike/crowdstrike-falcon", 
       "arn:aws:securityhub:us-east-1::product/3coresec/3coresec"
    ]
   }
   */
 });

Calling the listEnabledProductsForImport operation

var params = {
  MaxResults: 'NUMBER_VALUE',
  NextToken: 'STRING_VALUE'
};
securityhub.listEnabledProductsForImport(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • NextToken — (String)

      The token that is required for pagination. On your first call to the ListEnabledProductsForImport operation, set the value of this parameter to NULL.

      For subsequent calls to the operation, to continue listing data, set the value of this parameter to the value returned from the previous response.

    • MaxResults — (Integer)

      The maximum number of items to return in the response.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • ProductSubscriptions — (Array<String>)

        The list of ARNs for the resources that represent your subscriptions to products.

      • NextToken — (String)

        The pagination token to use to request the next page of results.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

listFindingAggregators(params = {}, callback) ⇒ AWS.Request

If finding aggregation is enabled, then ListFindingAggregators returns the ARN of the finding aggregator. You can run this operation from any Region.

Service Reference:

Examples:

To update the enablement status of a standard control


/* The following example disables the specified control in the specified security standard. */

 var params = {
 };
 securityhub.listFindingAggregators(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    FindingAggregators: [
       {
      FindingAggregatorArn: "arn:aws:securityhub:us-east-1:222222222222:finding-aggregator/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111"
     }
    ]
   }
   */
 });

Calling the listFindingAggregators operation

var params = {
  MaxResults: 'NUMBER_VALUE',
  NextToken: 'STRING_VALUE'
};
securityhub.listFindingAggregators(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • NextToken — (String)

      The token returned with the previous set of results. Identifies the next set of results to return.

    • MaxResults — (Integer)

      The maximum number of results to return. This operation currently only returns a single result.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • FindingAggregators — (Array<map>)

        The list of finding aggregators. This operation currently only returns a single result.

        • FindingAggregatorArn — (String)

          The ARN of the finding aggregator. You use the finding aggregator ARN to retrieve details for, update, and delete the finding aggregator.

      • NextToken — (String)

        If there are more results, this is the token to provide in the next call to ListFindingAggregators.

        This operation currently only returns a single result.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

listInvitations(params = {}, callback) ⇒ AWS.Request

Lists all Security Hub membership invitations that were sent to the current Amazon Web Services account.

This operation is only used by accounts that are managed by invitation. Accounts that are managed using the integration with Organizations do not receive invitations.

Service Reference:

Examples:

To list membership invitations to calling account


/* The following example returns a list of Security Hub member invitations sent to the calling AWS account. Only accounts that are invited manually use this operation. It's not for use by accounts that are managed through AWS Organizations. */

 var params = {
 };
 securityhub.listInvitations(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    Invitations: [
       {
      AccountId: "123456789012", 
      InvitationId: "7ab938c5d52d7904ad09f9e7c20cc4eb", 
      InvitedAt: <Date Representation>, 
      MemberStatus: "ASSOCIATED"
     }
    ]
   }
   */
 });

Calling the listInvitations operation

var params = {
  MaxResults: 'NUMBER_VALUE',
  NextToken: 'STRING_VALUE'
};
securityhub.listInvitations(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • MaxResults — (Integer)

      The maximum number of items to return in the response.

    • NextToken — (String)

      The token that is required for pagination. On your first call to the ListInvitations operation, set the value of this parameter to NULL.

      For subsequent calls to the operation, to continue listing data, set the value of this parameter to the value returned from the previous response.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • Invitations — (Array<map>)

        The details of the invitations returned by the operation.

        • AccountId — (String)

          The account ID of the Security Hub administrator account that the invitation was sent from.

        • InvitationId — (String)

          The ID of the invitation sent to the member account.

        • InvitedAt — (Date)

          The timestamp of when the invitation was sent.

        • MemberStatus — (String)

          The current status of the association between the member and administrator accounts.

      • NextToken — (String)

        The pagination token to use to request the next page of results.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

listMembers(params = {}, callback) ⇒ AWS.Request

Lists details about all member accounts for the current Security Hub administrator account.

The results include both member accounts that belong to an organization and member accounts that were invited manually.

Service Reference:

Examples:

To list member account details


/* The following example returns details about member accounts for the calling Security Hub administrator account. The response includes member accounts that are managed through AWS Organizations and those that were invited manually. */

 var params = {
 };
 securityhub.listMembers(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    Members: [
       {
      AccountId: "111122223333", 
      AdministratorId: "123456789012", 
      InvitedAt: <Date Representation>, 
      MasterId: "123456789012", 
      MemberStatus: "ASSOCIATED", 
      UpdatedAt: <Date Representation>
     }, 
       {
      AccountId: "444455556666", 
      AdministratorId: "123456789012", 
      InvitedAt: <Date Representation>, 
      MasterId: "123456789012", 
      MemberStatus: "ASSOCIATED", 
      UpdatedAt: <Date Representation>
     }
    ]
   }
   */
 });

Calling the listMembers operation

var params = {
  MaxResults: 'NUMBER_VALUE',
  NextToken: 'STRING_VALUE',
  OnlyAssociated: true || false
};
securityhub.listMembers(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • OnlyAssociated — (Boolean)

      Specifies which member accounts to include in the response based on their relationship status with the administrator account. The default value is TRUE.

      If OnlyAssociated is set to TRUE, the response includes member accounts whose relationship status with the administrator account is set to ENABLED.

      If OnlyAssociated is set to FALSE, the response includes all existing member accounts.

    • MaxResults — (Integer)

      The maximum number of items to return in the response.

    • NextToken — (String)

      The token that is required for pagination. On your first call to the ListMembers operation, set the value of this parameter to NULL.

      For subsequent calls to the operation, to continue listing data, set the value of this parameter to the value returned from the previous response.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • Members — (Array<map>)

        Member details returned by the operation.

        • AccountId — (String)

          The Amazon Web Services account ID of the member account.

        • Email — (String)

          The email address of the member account.

        • MasterId — (String)

          This is replaced by AdministratorID.

          The Amazon Web Services account ID of the Security Hub administrator account associated with this member account.

        • AdministratorId — (String)

          The Amazon Web Services account ID of the Security Hub administrator account associated with this member account.

        • MemberStatus — (String)

          The status of the relationship between the member account and its administrator account.

          The status can have one of the following values:

          • Created - Indicates that the administrator account added the member account, but has not yet invited the member account.

          • Invited - Indicates that the administrator account invited the member account. The member account has not yet responded to the invitation.

          • Enabled - Indicates that the member account is currently active. For manually invited member accounts, indicates that the member account accepted the invitation.

          • Removed - Indicates that the administrator account disassociated the member account.

          • Resigned - Indicates that the member account disassociated themselves from the administrator account.

          • Deleted - Indicates that the administrator account deleted the member account.

          • AccountSuspended - Indicates that an organization account was suspended from Amazon Web Services at the same time that the administrator account tried to enable the organization account as a member account.

        • InvitedAt — (Date)

          A timestamp for the date and time when the invitation was sent to the member account.

        • UpdatedAt — (Date)

          The timestamp for the date and time when the member account was updated.

      • NextToken — (String)

        The pagination token to use to request the next page of results.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

listOrganizationAdminAccounts(params = {}, callback) ⇒ AWS.Request

Lists the Security Hub administrator accounts. Can only be called by the organization management account.

Service Reference:

Examples:

To list administrator acccounts for an organization


/* The following example lists the Security  Hub administrator accounts for an organization. Only the organization management account can call this operation. */

 var params = {
 };
 securityhub.listOrganizationAdminAccounts(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    AdminAccounts: [
       {
      AccountId: "777788889999"
     }, 
       {
      Status: "ENABLED"
     }
    ]
   }
   */
 });

Calling the listOrganizationAdminAccounts operation

var params = {
  MaxResults: 'NUMBER_VALUE',
  NextToken: 'STRING_VALUE'
};
securityhub.listOrganizationAdminAccounts(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • MaxResults — (Integer)

      The maximum number of items to return in the response.

    • NextToken — (String)

      The token that is required for pagination. On your first call to the ListOrganizationAdminAccounts operation, set the value of this parameter to NULL. For subsequent calls to the operation, to continue listing data, set the value of this parameter to the value returned from the previous response.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • AdminAccounts — (Array<map>)

        The list of Security Hub administrator accounts.

        • AccountId — (String)

          The Amazon Web Services account identifier of the Security Hub administrator account.

        • Status — (String)

          The current status of the Security Hub administrator account. Indicates whether the account is currently enabled as a Security Hub administrator.

          Possible values include:
          • "ENABLED"
          • "DISABLE_IN_PROGRESS"
      • NextToken — (String)

        The pagination token to use to request the next page of results.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

listSecurityControlDefinitions(params = {}, callback) ⇒ AWS.Request

Lists all of the security controls that apply to a specified standard.

Service Reference:

Examples:

To list security controls that apply to a standard


/* The following example lists security controls that apply to a specified Security Hub standard.  */

 var params = {
  MaxResults: 3, 
  NextToken: "NULL", 
  StandardsArn: "arn:aws:securityhub:::standards/aws-foundational-security-best-practices/v/1.0.0"
 };
 securityhub.listSecurityControlDefinitions(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    NextToken: "U2FsdGVkX1...", 
    SecurityControlDefinitions: [
       {
      CurrentRegionAvailability: "AVAILABLE", 
      CustomizableProperties: [
         "Parameters"
      ], 
      Description: "This AWS control checks whether ACM Certificates in your account are marked for expiration within a specified time period. Certificates provided by ACM are automatically renewed. ACM does not automatically renew certificates that you import.", 
      RemediationUrl: "https://docs.aws.amazon.com/console/securityhub/ACM.1/remediation", 
      SecurityControlId: "ACM.1", 
      SeverityRating: "MEDIUM", 
      Title: "Imported and ACM-issued certificates should be renewed after a specified time period"
     }, 
       {
      CurrentRegionAvailability: "AVAILABLE", 
      CustomizableProperties: [
         "Parameters"
      ], 
      Description: "This control checks whether all stages of Amazon API Gateway REST and WebSocket APIs have logging enabled. The control fails if logging is not enabled for all methods of a stage or if loggingLevel is neither ERROR nor INFO.", 
      RemediationUrl: "https://docs.aws.amazon.com/console/securityhub/APIGateway.1/remediation", 
      SecurityControlId: "APIGateway.1", 
      SeverityRating: "MEDIUM", 
      Title: "API Gateway REST and WebSocket API execution logging should be enabled"
     }, 
       {
      CurrentRegionAvailability: "AVAILABLE", 
      Description: "This control checks whether Amazon API Gateway REST API stages have SSL certificates configured that backend systems can use to authenticate that incoming requests are from the API Gateway.", 
      RemediationUrl: "https://docs.aws.amazon.com/console/securityhub/APIGateway.2/remediation", 
      SecurityControlId: "APIGateway.2", 
      SeverityRating: "MEDIUM", 
      Title: "API Gateway REST API stages should be configured to use SSL certificates for backend authentication"
     }
    ]
   }
   */
 });

Calling the listSecurityControlDefinitions operation

var params = {
  MaxResults: 'NUMBER_VALUE',
  NextToken: 'STRING_VALUE',
  StandardsArn: 'STRING_VALUE'
};
securityhub.listSecurityControlDefinitions(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • StandardsArn — (String)

      The Amazon Resource Name (ARN) of the standard that you want to view controls for.

    • NextToken — (String)

      Optional pagination parameter.

    • MaxResults — (Integer)

      An optional parameter that limits the total results of the API response to the specified number. If this parameter isn't provided in the request, the results include the first 25 security controls that apply to the specified standard. The results also include a NextToken parameter that you can use in a subsequent API call to get the next 25 controls. This repeats until all controls for the standard are returned.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • SecurityControlDefinitions — (Array<map>)

        An array of controls that apply to the specified standard.

        • SecurityControlIdrequired — (String)

          The unique identifier of a security control across standards. Values for this field typically consist of an Amazon Web Service name and a number (for example, APIGateway.3). This parameter differs from SecurityControlArn, which is a unique Amazon Resource Name (ARN) assigned to a control. The ARN references the security control ID (for example, arn:aws:securityhub:eu-central-1:123456789012:security-control/APIGateway.3).

        • Titlerequired — (String)

          The title of a security control.

        • Descriptionrequired — (String)

          The description of a security control across standards. This typically summarizes how Security Hub evaluates the control and the conditions under which it produces a failed finding. This parameter doesn't reference a specific standard.

        • RemediationUrlrequired — (String)

          A link to Security Hub documentation that explains how to remediate a failed finding for a security control.

        • SeverityRatingrequired — (String)

          The severity of a security control. For more information about how Security Hub determines control severity, see Assigning severity to control findings in the Security Hub User Guide.

          Possible values include:
          • "LOW"
          • "MEDIUM"
          • "HIGH"
          • "CRITICAL"
        • CurrentRegionAvailabilityrequired — (String)

          Specifies whether a security control is available in the current Amazon Web Services Region.

          Possible values include:
          • "AVAILABLE"
          • "UNAVAILABLE"
        • CustomizableProperties — (Array<String>)

          Security control properties that you can customize. Currently, only parameter customization is supported for select controls. An empty array is returned for controls that don’t support custom properties.

        • ParameterDefinitions — (map<map>)

          An object that provides a security control parameter name, description, and the options for customizing it. This object is excluded for a control that doesn't support custom parameters.

          • Descriptionrequired — (String)

            Description of a control parameter.

          • ConfigurationOptionsrequired — (map)

            The options for customizing a control parameter. Customization options vary based on the data type of the parameter.

            • Integer — (map)

              The options for customizing a security control parameter that is an integer.

              • DefaultValue — (Integer)

                The Security Hub default value for a control parameter that is an integer.

              • Min — (Integer)

                The minimum valid value for a control parameter that is an integer.

              • Max — (Integer)

                The maximum valid value for a control parameter that is an integer.

            • IntegerList — (map)

              The options for customizing a security control parameter that is a list of integers.

              • DefaultValue — (Array<Integer>)

                The Security Hub default value for a control parameter that is a list of integers.

              • Min — (Integer)

                The minimum valid value for a control parameter that is a list of integers.

              • Max — (Integer)

                The maximum valid value for a control parameter that is a list of integers.

              • MaxItems — (Integer)

                The maximum number of list items that an interger list control parameter can accept.

            • Double — (map)

              The options for customizing a security control parameter that is a double.

              • DefaultValue — (Float)

                The Security Hub default value for a control parameter that is a double.

              • Min — (Float)

                The minimum valid value for a control parameter that is a double.

              • Max — (Float)

                The maximum valid value for a control parameter that is a double.

            • String — (map)

              The options for customizing a security control parameter that is a string data type.

              • DefaultValue — (String)

                The Security Hub default value for a control parameter that is a string.

              • Re2Expression — (String)

                An RE2 regular expression that Security Hub uses to validate a user-provided control parameter string.

              • ExpressionDescription — (String)

                The description of the RE2 regular expression.

            • StringList — (map)

              The options for customizing a security control parameter that is a list of strings.

              • DefaultValue — (Array<String>)

                The Security Hub default value for a control parameter that is a list of strings.

              • Re2Expression — (String)

                An RE2 regular expression that Security Hub uses to validate a user-provided list of strings for a control parameter.

              • MaxItems — (Integer)

                The maximum number of list items that a string list control parameter can accept.

              • ExpressionDescription — (String)

                The description of the RE2 regular expression.

            • Boolean — (map)

              The options for customizing a security control parameter that is a boolean. For a boolean parameter, the options are true and false.

              • DefaultValue — (Boolean)

                The Security Hub default value for a boolean parameter.

            • Enum — (map)

              The options for customizing a security control parameter that is an enum.

              • DefaultValue — (String)

                The Security Hub default value for a control parameter that is an enum.

              • AllowedValues — (Array<String>)

                The valid values for a control parameter that is an enum.

            • EnumList — (map)

              The options for customizing a security control parameter that is a list of enums.

              • DefaultValue — (Array<String>)

                The Security Hub default value for a control parameter that is a list of enums.

              • MaxItems — (Integer)

                The maximum number of list items that an enum list control parameter can accept.

              • AllowedValues — (Array<String>)

                The valid values for a control parameter that is a list of enums.

      • NextToken — (String)

        A pagination parameter that's included in the response only if it was included in the request.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

listStandardsControlAssociations(params = {}, callback) ⇒ AWS.Request

Specifies whether a control is currently enabled or disabled in each enabled standard in the calling account.

Examples:

To say whether standard


/* The following example specifies whether a control is currently enabled or disabled in each enabled standard in the calling account. The response also provides other details about the control. */

 var params = {
  SecurityControlId: "S3.1"
 };
 securityhub.listStandardsControlAssociations(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    StandardsControlAssociationSummaries: [
       {
      AssociationStatus: "ENABLED", 
      RelatedRequirements: [
         "PCI DSS 1.2.1", 
         "PCI DSS 1.3.1", 
         "PCI DSS 1.3.2", 
         "PCI DSS 1.3.4", 
         "PCI DSS 1.3.6"
      ], 
      SecurityControlArn: "arn:aws:securityhub:us-west-2:110479873537:security-control/S3.1", 
      SecurityControlId: "S3.1", 
      StandardsArn: "arn:aws:securityhub:us-west-2::standards/pci-dss/v/3.2.1", 
      StandardsControlDescription: "This AWS control checks whether the following public access block settings are configured from account level: ignorePublicAcls: True, blockPublicPolicy: True, blockPublicAcls: True, restrictPublicBuckets: True.", 
      StandardsControlTitle: "S3 Block Public Access setting should be enabled", 
      UpdatedAt: <Date Representation>
     }, 
       {
      AssociationStatus: "DISABLED", 
      RelatedRequirements: [
      ], 
      SecurityControlArn: "arn:aws:securityhub:us-west-2:110479873537:security-control/S3.1", 
      SecurityControlId: "S3.1", 
      StandardsArn: "arn:aws:securityhub:us-west-2::standards/aws-foundational-security-best-practices/v/1.0.0", 
      StandardsControlDescription: "This AWS control checks whether the following public access block settings are configured from account level: ignorePublicAcls: True, blockPublicPolicy: True, blockPublicAcls: True, restrictPublicBuckets: True.", 
      StandardsControlTitle: "S3 Block Public Access setting should be enabled", 
      UpdatedAt: <Date Representation>, 
      UpdatedReason: "Not relevant to environment"
     }
    ]
   }
   */
 });

Calling the listStandardsControlAssociations operation

var params = {
  SecurityControlId: 'STRING_VALUE', /* required */
  MaxResults: 'NUMBER_VALUE',
  NextToken: 'STRING_VALUE'
};
securityhub.listStandardsControlAssociations(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • SecurityControlId — (String)

      The identifier of the control (identified with SecurityControlId, SecurityControlArn, or a mix of both parameters) that you want to determine the enablement status of in each enabled standard.

    • NextToken — (String)

      Optional pagination parameter.

    • MaxResults — (Integer)

      An optional parameter that limits the total results of the API response to the specified number. If this parameter isn't provided in the request, the results include the first 25 standard and control associations. The results also include a NextToken parameter that you can use in a subsequent API call to get the next 25 associations. This repeats until all associations for the specified control are returned. The number of results is limited by the number of supported Security Hub standards that you've enabled in the calling account.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • StandardsControlAssociationSummaries — (Array<map>)

        An array that provides the enablement status and other details for each security control that applies to each enabled standard.

        • StandardsArnrequired — (String)

          The Amazon Resource Name (ARN) of a standard.

        • SecurityControlIdrequired — (String)

          A unique standard-agnostic identifier for a control. Values for this field typically consist of an Amazon Web Service and a number, such as APIGateway.5. This field doesn't reference a specific standard.

        • SecurityControlArnrequired — (String)

          The ARN of a control, such as arn:aws:securityhub:eu-central-1:123456789012:security-control/S3.1. This parameter doesn't mention a specific standard.

        • AssociationStatusrequired — (String)

          The enablement status of a control in a specific standard.

          Possible values include:
          • "ENABLED"
          • "DISABLED"
        • RelatedRequirements — (Array<String>)

          The requirement that underlies this control in the compliance framework related to the standard.

        • UpdatedAt — (Date)

          The last time that a control's enablement status in a specified standard was updated.

        • UpdatedReason — (String)

          The reason for updating a control's enablement status in a specified standard.

        • StandardsControlTitle — (String)

          The title of a control.

        • StandardsControlDescription — (String)

          The description of a control. This typically summarizes how Security Hub evaluates the control and the conditions under which it produces a failed finding. The parameter may reference a specific standard.

      • NextToken — (String)

        A pagination parameter that's included in the response only if it was included in the request.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

listTagsForResource(params = {}, callback) ⇒ AWS.Request

Returns a list of tags associated with a resource.

Service Reference:

Examples:

To get a list of tags for a resource


/* The following example returns a list of tags associated with the specified resource. */

 var params = {
  ResourceArn: "arn:aws:securityhub:us-west-1:123456789012:hub/default"
 };
 securityhub.listTagsForResource(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    Tags: {
     "Area": "USMidwest", 
     "Department": "Operations"
    }
   }
   */
 });

Calling the listTagsForResource operation

var params = {
  ResourceArn: 'STRING_VALUE' /* required */
};
securityhub.listTagsForResource(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • ResourceArn — (String)

      The ARN of the resource to retrieve tags for.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • Tags — (map<String>)

        The tags associated with a resource.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

startConfigurationPolicyAssociation(params = {}, callback) ⇒ AWS.Request

Associates a target account, organizational unit, or the root with a specified configuration. The target can be associated with a configuration policy or self-managed behavior. Only the Security Hub delegated administrator can invoke this operation from the home Region.

Examples:

To associate a configuration with a target


/* This operation associates a configuration policy or self-managed behavior with the target account, organizational unit, or the root. */

 var params = {
  ConfigurationPolicyIdentifier: "arn:aws:securityhub:us-east-1:123456789012:configuration-policy/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
  Target: {
   AccountId: "111122223333"
  }
 };
 securityhub.startConfigurationPolicyAssociation(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    AssociationStatus: "SUCCESS", 
    AssociationStatusMessage: "This field is populated only if the association fails", 
    AssociationType: "APPLIED", 
    ConfigurationPolicyId: "a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
    TargetId: "111122223333", 
    TargetType: "ACCOUNT", 
    UpdatedAt: <Date Representation>
   }
   */
 });

Calling the startConfigurationPolicyAssociation operation

var params = {
  ConfigurationPolicyIdentifier: 'STRING_VALUE', /* required */
  Target: { /* required */
    AccountId: 'STRING_VALUE',
    OrganizationalUnitId: 'STRING_VALUE',
    RootId: 'STRING_VALUE'
  }
};
securityhub.startConfigurationPolicyAssociation(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • ConfigurationPolicyIdentifier — (String)

      The Amazon Resource Name (ARN) or universally unique identifier (UUID) of the configuration policy.

    • Target — (map)

      The identifier of the target account, organizational unit, or the root to associate with the specified configuration.

      • AccountId — (String)

        The Amazon Web Services account ID of the target account.

      • OrganizationalUnitId — (String)

        The organizational unit ID of the target organizational unit.

      • RootId — (String)

        The ID of the organization root.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • ConfigurationPolicyId — (String)

        The UUID of the configuration policy.

      • TargetId — (String)

        The identifier of the target account, organizational unit, or the organization root with which the configuration is associated.

      • TargetType — (String)

        Indicates whether the target is an Amazon Web Services account, organizational unit, or the organization root.

        Possible values include:
        • "ACCOUNT"
        • "ORGANIZATIONAL_UNIT"
      • AssociationType — (String)

        Indicates whether the association between the specified target and the configuration was directly applied by the Security Hub delegated administrator or inherited from a parent.

        Possible values include:
        • "INHERITED"
        • "APPLIED"
      • UpdatedAt — (Date)

        The date and time, in UTC and ISO 8601 format, that the configuration policy association was last updated.

      • AssociationStatus — (String)

        The current status of the association between the specified target and the configuration.

        Possible values include:
        • "PENDING"
        • "SUCCESS"
        • "FAILED"
      • AssociationStatusMessage — (String)

        An explanation for a FAILED value for AssociationStatus.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

startConfigurationPolicyDisassociation(params = {}, callback) ⇒ AWS.Request

Disassociates a target account, organizational unit, or the root from a specified configuration. When you disassociate a configuration from its target, the target inherits the configuration of the closest parent. If there’s no configuration to inherit, the target retains its settings but becomes a self-managed account. A target can be disassociated from a configuration policy or self-managed behavior. Only the Security Hub delegated administrator can invoke this operation from the home Region.

Examples:

To disassociate a configuration from a target


/* This operation disassociates a configuration policy or self-managed behavior from the target account, organizational unit, or the root. */

 var params = {
  ConfigurationPolicyIdentifier: "SELF_MANAGED_SECURITY_HUB", 
  Target: {
   RootId: "r-f6g7h8i9j0example"
  }
 };
 securityhub.startConfigurationPolicyDisassociation(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
   }
   */
 });

Calling the startConfigurationPolicyDisassociation operation

var params = {
  ConfigurationPolicyIdentifier: 'STRING_VALUE', /* required */
  Target: {
    AccountId: 'STRING_VALUE',
    OrganizationalUnitId: 'STRING_VALUE',
    RootId: 'STRING_VALUE'
  }
};
securityhub.startConfigurationPolicyDisassociation(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • Target — (map)

      The identifier of the target account, organizational unit, or the root to disassociate from the specified configuration.

      • AccountId — (String)

        The Amazon Web Services account ID of the target account.

      • OrganizationalUnitId — (String)

        The organizational unit ID of the target organizational unit.

      • RootId — (String)

        The ID of the organization root.

    • ConfigurationPolicyIdentifier — (String)

      The Amazon Resource Name (ARN) or universally unique identifier (UUID) of the configuration policy.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

tagResource(params = {}, callback) ⇒ AWS.Request

Adds one or more tags to a resource.

Service Reference:

Examples:

To tag a resource


/* The following example adds the 'Department' and 'Area' tags to the specified resource. */

 var params = {
  ResourceArn: "arn:aws:securityhub:us-west-1:123456789012:hub/default", 
  Tags: {
   "Area": "USMidwest", 
   "Department": "Operations"
  }
 };
 securityhub.tagResource(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
   }
   */
 });

Calling the tagResource operation

var params = {
  ResourceArn: 'STRING_VALUE', /* required */
  Tags: { /* required */
    '<TagKey>': 'STRING_VALUE',
    /* '<TagKey>': ... */
  }
};
securityhub.tagResource(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • ResourceArn — (String)

      The ARN of the resource to apply the tags to.

    • Tags — (map<String>)

      The tags to add to the resource. You can add up to 50 tags at a time. The tag keys can be no longer than 128 characters. The tag values can be no longer than 256 characters.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

untagResource(params = {}, callback) ⇒ AWS.Request

Removes one or more tags from a resource.

Service Reference:

Examples:

To remove tags from a resource


/* The following example removes the 'Department' tag from the specified resource. */

 var params = {
  ResourceArn: "arn:aws:securityhub:us-west-1:123456789012:hub/default", 
  TagKeys: [
     "Department"
  ]
 };
 securityhub.untagResource(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
   }
   */
 });

Calling the untagResource operation

var params = {
  ResourceArn: 'STRING_VALUE', /* required */
  TagKeys: [ /* required */
    'STRING_VALUE',
    /* more items */
  ]
};
securityhub.untagResource(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • ResourceArn — (String)

      The ARN of the resource to remove the tags from.

    • TagKeys — (Array<String>)

      The tag keys associated with the tags to remove from the resource. You can remove up to 50 tags at a time.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

updateActionTarget(params = {}, callback) ⇒ AWS.Request

Updates the name and description of a custom action target in Security Hub.

Service Reference:

Examples:

To update the name and description of a custom action target


/* The following example updates the name and description of a custom action target in Security Hub. You can create custom actions to automatically respond to Security Hub findings using Amazon EventBridge.  */

 var params = {
  ActionTargetArn: "arn:aws:securityhub:us-west-1:123456789012:action/custom/Remediation", 
  Description: "Sends specified findings to customer service chat", 
  Name: "Chat custom action"
 };
 securityhub.updateActionTarget(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
   }
   */
 });

Calling the updateActionTarget operation

var params = {
  ActionTargetArn: 'STRING_VALUE', /* required */
  Description: 'STRING_VALUE',
  Name: 'STRING_VALUE'
};
securityhub.updateActionTarget(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • ActionTargetArn — (String)

      The ARN of the custom action target to update.

    • Name — (String)

      The updated name of the custom action target.

    • Description — (String)

      The updated description for the custom action target.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

updateConfigurationPolicy(params = {}, callback) ⇒ AWS.Request

Updates a configuration policy. Only the Security Hub delegated administrator can invoke this operation from the home Region.

Service Reference:

Examples:

To update a configuration policy


/* This operation updates the specified configuration policy. */

 var params = {
  ConfigurationPolicy: {
   SecurityHub: {
    EnabledStandardIdentifiers: [
       "arn:aws:securityhub:us-east-1::standards/aws-foundational-security-best-practices/v/1.0.0", 
       "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0"
    ], 
    SecurityControlsConfiguration: {
     DisabledSecurityControlIdentifiers: [
        "CloudWatch.1", 
        "CloudWatch.2"
     ], 
     SecurityControlCustomParameters: [
        {
       Parameters: {
        "daysToExpiration": {
          Value: {
           Integer: 21
          }, 
          ValueType: "CUSTOM"
         }
       }, 
       SecurityControlId: "ACM.1"
      }
     ]
    }, 
    ServiceEnabled: true
   }
  }, 
  Description: "Updated configuration policy for testing FSBP and CIS", 
  Identifier: "arn:aws:securityhub:us-east-1:123456789012:configuration-policy/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
  Name: "TestConfigurationPolicy", 
  UpdatedReason: "Enabling ACM.2"
 };
 securityhub.updateConfigurationPolicy(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    Arn: "arn:aws:securityhub:us-east-1:123456789012:configuration-policy/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
    ConfigurationPolicy: {
     SecurityHub: {
      EnabledStandardIdentifiers: [
         "arn:aws:securityhub:us-east-1::standards/aws-foundational-security-best-practices/v/1.0.0", 
         "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0"
      ], 
      SecurityControlsConfiguration: {
       DisabledSecurityControlIdentifiers: [
          "CloudWatch.1", 
          "CloudWatch.2"
       ], 
       SecurityControlCustomParameters: [
          {
         Parameters: {
          "daysToExpiration": {
            Value: {
             Integer: 21
            }, 
            ValueType: "CUSTOM"
           }
         }, 
         SecurityControlId: "ACM.1"
        }
       ]
      }, 
      ServiceEnabled: true
     }
    }, 
    CreatedAt: <Date Representation>, 
    Description: "Updated configuration policy for testing FSBP and CIS", 
    Id: "a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
    Name: "TestConfigurationPolicy", 
    UpdatedAt: <Date Representation>
   }
   */
 });

Calling the updateConfigurationPolicy operation

var params = {
  Identifier: 'STRING_VALUE', /* required */
  ConfigurationPolicy: {
    SecurityHub: {
      EnabledStandardIdentifiers: [
        'STRING_VALUE',
        /* more items */
      ],
      SecurityControlsConfiguration: {
        DisabledSecurityControlIdentifiers: [
          'STRING_VALUE',
          /* more items */
        ],
        EnabledSecurityControlIdentifiers: [
          'STRING_VALUE',
          /* more items */
        ],
        SecurityControlCustomParameters: [
          {
            Parameters: {
              '<NonEmptyString>': {
                ValueType: DEFAULT | CUSTOM, /* required */
                Value: {
                  Boolean: true || false,
                  Double: 'NUMBER_VALUE',
                  Enum: 'STRING_VALUE',
                  EnumList: [
                    'STRING_VALUE',
                    /* more items */
                  ],
                  Integer: 'NUMBER_VALUE',
                  IntegerList: [
                    'NUMBER_VALUE',
                    /* more items */
                  ],
                  String: 'STRING_VALUE',
                  StringList: [
                    'STRING_VALUE',
                    /* more items */
                  ]
                }
              },
              /* '<NonEmptyString>': ... */
            },
            SecurityControlId: 'STRING_VALUE'
          },
          /* more items */
        ]
      },
      ServiceEnabled: true || false
    }
  },
  Description: 'STRING_VALUE',
  Name: 'STRING_VALUE',
  UpdatedReason: 'STRING_VALUE'
};
securityhub.updateConfigurationPolicy(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • Identifier — (String)

      The Amazon Resource Name (ARN) or universally unique identifier (UUID) of the configuration policy.

    • Name — (String)

      The name of the configuration policy. Alphanumeric characters and the following ASCII characters are permitted: -, ., !, *, /.

    • Description — (String)

      The description of the configuration policy.

    • UpdatedReason — (String)

      The reason for updating the configuration policy.

    • ConfigurationPolicy — (map)

      An object that defines how Security Hub is configured. It includes whether Security Hub is enabled or disabled, a list of enabled security standards, a list of enabled or disabled security controls, and a list of custom parameter values for specified controls. If you provide a list of security controls that are enabled in the configuration policy, Security Hub disables all other controls (including newly released controls). If you provide a list of security controls that are disabled in the configuration policy, Security Hub enables all other controls (including newly released controls).

      When updating a configuration policy, provide a complete list of standards that you want to enable and a complete list of controls that you want to enable or disable. The updated configuration replaces the current configuration.

      • SecurityHub — (map)

        The Amazon Web Service that the configuration policy applies to.

        • ServiceEnabled — (Boolean)

          Indicates whether Security Hub is enabled in the policy.

        • EnabledStandardIdentifiers — (Array<String>)

          A list that defines which security standards are enabled in the configuration policy.

        • SecurityControlsConfiguration — (map)

          An object that defines which security controls are enabled in the configuration policy. The enablement status of a control is aligned across all of the enabled standards in an account.

          • EnabledSecurityControlIdentifiers — (Array<String>)

            A list of security controls that are enabled in the configuration policy. Security Hub disables all other controls (including newly released controls) other than the listed controls.

          • DisabledSecurityControlIdentifiers — (Array<String>)

            A list of security controls that are disabled in the configuration policy. Security Hub enables all other controls (including newly released controls) other than the listed controls.

          • SecurityControlCustomParameters — (Array<map>)

            A list of security controls and control parameter values that are included in a configuration policy.

            • SecurityControlId — (String)

              The ID of the security control.

            • Parameters — (map<map>)

              An object that specifies parameter values for a control in a configuration policy.

              • ValueTyperequired — (String)

                Identifies whether a control parameter uses a custom user-defined value or subscribes to the default Security Hub behavior.

                When ValueType is set equal to DEFAULT, the default behavior can be a specific Security Hub default value, or the default behavior can be to ignore a specific parameter. When ValueType is set equal to DEFAULT, Security Hub ignores user-provided input for the Value field.

                When ValueType is set equal to CUSTOM, the Value field can't be empty.

                Possible values include:
                • "DEFAULT"
                • "CUSTOM"
              • Value — (map)

                The current value of a control parameter.

                • Integer — (Integer)

                  A control parameter that is an integer.

                • IntegerList — (Array<Integer>)

                  A control parameter that is a list of integers.

                • Double — (Float)

                  A control parameter that is a double.

                • String — (String)

                  A control parameter that is a string.

                • StringList — (Array<String>)

                  A control parameter that is a list of strings.

                • Boolean — (Boolean)

                  A control parameter that is a boolean.

                • Enum — (String)

                  A control parameter that is an enum.

                • EnumList — (Array<String>)

                  A control parameter that is a list of enums.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • Arn — (String)

        The ARN of the configuration policy.

      • Id — (String)

        The UUID of the configuration policy.

      • Name — (String)

        The name of the configuration policy.

      • Description — (String)

        The description of the configuration policy.

      • UpdatedAt — (Date)

        The date and time, in UTC and ISO 8601 format, that the configuration policy was last updated.

      • CreatedAt — (Date)

        The date and time, in UTC and ISO 8601 format, that the configuration policy was created.

      • ConfigurationPolicy — (map)

        An object that defines how Security Hub is configured. It includes whether Security Hub is enabled or disabled, a list of enabled security standards, a list of enabled or disabled security controls, and a list of custom parameter values for specified controls. If the request included a list of security controls that are enabled in the configuration policy, Security Hub disables all other controls (including newly released controls). If the request included a list of security controls that are disabled in the configuration policy, Security Hub enables all other controls (including newly released controls).

        • SecurityHub — (map)

          The Amazon Web Service that the configuration policy applies to.

          • ServiceEnabled — (Boolean)

            Indicates whether Security Hub is enabled in the policy.

          • EnabledStandardIdentifiers — (Array<String>)

            A list that defines which security standards are enabled in the configuration policy.

          • SecurityControlsConfiguration — (map)

            An object that defines which security controls are enabled in the configuration policy. The enablement status of a control is aligned across all of the enabled standards in an account.

            • EnabledSecurityControlIdentifiers — (Array<String>)

              A list of security controls that are enabled in the configuration policy. Security Hub disables all other controls (including newly released controls) other than the listed controls.

            • DisabledSecurityControlIdentifiers — (Array<String>)

              A list of security controls that are disabled in the configuration policy. Security Hub enables all other controls (including newly released controls) other than the listed controls.

            • SecurityControlCustomParameters — (Array<map>)

              A list of security controls and control parameter values that are included in a configuration policy.

              • SecurityControlId — (String)

                The ID of the security control.

              • Parameters — (map<map>)

                An object that specifies parameter values for a control in a configuration policy.

                • ValueTyperequired — (String)

                  Identifies whether a control parameter uses a custom user-defined value or subscribes to the default Security Hub behavior.

                  When ValueType is set equal to DEFAULT, the default behavior can be a specific Security Hub default value, or the default behavior can be to ignore a specific parameter. When ValueType is set equal to DEFAULT, Security Hub ignores user-provided input for the Value field.

                  When ValueType is set equal to CUSTOM, the Value field can't be empty.

                  Possible values include:
                  • "DEFAULT"
                  • "CUSTOM"
                • Value — (map)

                  The current value of a control parameter.

                  • Integer — (Integer)

                    A control parameter that is an integer.

                  • IntegerList — (Array<Integer>)

                    A control parameter that is a list of integers.

                  • Double — (Float)

                    A control parameter that is a double.

                  • String — (String)

                    A control parameter that is a string.

                  • StringList — (Array<String>)

                    A control parameter that is a list of strings.

                  • Boolean — (Boolean)

                    A control parameter that is a boolean.

                  • Enum — (String)

                    A control parameter that is an enum.

                  • EnumList — (Array<String>)

                    A control parameter that is a list of enums.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

updateFindingAggregator(params = {}, callback) ⇒ AWS.Request

Updates the finding aggregation configuration. Used to update the Region linking mode and the list of included or excluded Regions. You cannot use UpdateFindingAggregator to change the aggregation Region.

You must run UpdateFindingAggregator from the current aggregation Region.

Service Reference:

Examples:

To update cross-Region aggregation settings


/* The following example updates the cross-Region aggregation configuration. You use this operation to change the list of linked Regions and the treatment of new Regions. However, you cannot use this operation to change the aggregation Region. */

 var params = {
  FindingAggregatorArn: "arn:aws:securityhub:us-east-1:123456789012:finding-aggregator/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
  RegionLinkingMode: "SPECIFIED_REGIONS", 
  Regions: [
     "us-west-1", 
     "us-west-2"
  ]
 };
 securityhub.updateFindingAggregator(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
    FindingAggregationRegion: "us-east-1", 
    FindingAggregatorArn: "arn:aws:securityhub:us-east-1:123456789012:finding-aggregator/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
    RegionLinkingMode: "SPECIFIED_REGIONS", 
    Regions: [
       "us-west-1", 
       "us-west-2"
    ]
   }
   */
 });

Calling the updateFindingAggregator operation

var params = {
  FindingAggregatorArn: 'STRING_VALUE', /* required */
  RegionLinkingMode: 'STRING_VALUE', /* required */
  Regions: [
    'STRING_VALUE',
    /* more items */
  ]
};
securityhub.updateFindingAggregator(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • FindingAggregatorArn — (String)

      The ARN of the finding aggregator. To obtain the ARN, use ListFindingAggregators.

    • RegionLinkingMode — (String)

      Indicates whether to aggregate findings from all of the available Regions in the current partition. Also determines whether to automatically aggregate findings from new Regions as Security Hub supports them and you opt into them.

      The selected option also determines how to use the Regions provided in the Regions list.

      The options are as follows:

      • ALL_REGIONS - Indicates to aggregate findings from all of the Regions where Security Hub is enabled. When you choose this option, Security Hub also automatically aggregates findings from new Regions as Security Hub supports them and you opt into them.

      • ALL_REGIONS_EXCEPT_SPECIFIED - Indicates to aggregate findings from all of the Regions where Security Hub is enabled, except for the Regions listed in the Regions parameter. When you choose this option, Security Hub also automatically aggregates findings from new Regions as Security Hub supports them and you opt into them.

      • SPECIFIED_REGIONS - Indicates to aggregate findings only from the Regions listed in the Regions parameter. Security Hub does not automatically aggregate findings from new Regions.

    • Regions — (Array<String>)

      If RegionLinkingMode is ALL_REGIONS_EXCEPT_SPECIFIED, then this is a space-separated list of Regions that do not aggregate findings to the aggregation Region.

      If RegionLinkingMode is SPECIFIED_REGIONS, then this is a space-separated list of Regions that do aggregate findings to the aggregation Region.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs. The data object has the following properties:

      • FindingAggregatorArn — (String)

        The ARN of the finding aggregator.

      • FindingAggregationRegion — (String)

        The aggregation Region.

      • RegionLinkingMode — (String)

        Indicates whether to link all Regions, all Regions except for a list of excluded Regions, or a list of included Regions.

      • Regions — (Array<String>)

        The list of excluded Regions or included Regions.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

updateFindings(params = {}, callback) ⇒ AWS.Request

UpdateFindings is deprecated. Instead of UpdateFindings, use BatchUpdateFindings.

Updates the Note and RecordState of the Security Hub-aggregated findings that the filter attributes specify. Any member account that can view the finding also sees the update to the finding.

Service Reference:

Examples:

Calling the updateFindings operation

var params = {
  Filters: { /* required */
    AwsAccountId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    AwsAccountName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    CompanyName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ComplianceAssociatedStandardsId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ComplianceSecurityControlId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ComplianceSecurityControlParametersName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ComplianceSecurityControlParametersValue: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ComplianceStatus: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Confidence: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    CreatedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    Criticality: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    Description: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsConfidence: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsCriticality: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsRelatedFindingsId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsRelatedFindingsProductArn: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsSeverityLabel: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsSeverityOriginal: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsTypes: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    FirstObservedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    GeneratorId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Id: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Keyword: [
      {
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    LastObservedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    MalwareName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    MalwarePath: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    MalwareState: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    MalwareType: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkDestinationDomain: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkDestinationIpV4: [
      {
        Cidr: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkDestinationIpV6: [
      {
        Cidr: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkDestinationPort: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    NetworkDirection: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkProtocol: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkSourceDomain: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkSourceIpV4: [
      {
        Cidr: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkSourceIpV6: [
      {
        Cidr: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkSourceMac: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkSourcePort: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    NoteText: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NoteUpdatedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    NoteUpdatedBy: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProcessLaunchedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProcessName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProcessParentPid: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    ProcessPath: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProcessPid: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    ProcessTerminatedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProductArn: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProductFields: [
      {
        Comparison: EQUALS | NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Key: 'STRING_VALUE',
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProductName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    RecommendationText: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    RecordState: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Region: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    RelatedFindingsId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    RelatedFindingsProductArn: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceApplicationArn: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceApplicationName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceIamInstanceProfileArn: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceImageId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceIpV4Addresses: [
      {
        Cidr: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceIpV6Addresses: [
      {
        Cidr: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceKeyName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceLaunchedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceSubnetId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceType: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceVpcId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsIamAccessKeyCreatedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsIamAccessKeyPrincipalName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsIamAccessKeyStatus: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsIamAccessKeyUserName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsIamUserUserName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsS3BucketOwnerId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsS3BucketOwnerName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceContainerImageId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceContainerImageName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceContainerLaunchedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceContainerName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceDetailsOther: [
      {
        Comparison: EQUALS | NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Key: 'STRING_VALUE',
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourcePartition: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceRegion: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceTags: [
      {
        Comparison: EQUALS | NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Key: 'STRING_VALUE',
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceType: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Sample: [
      {
        Value: true || false
      },
      /* more items */
    ],
    SeverityLabel: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    SeverityNormalized: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    SeverityProduct: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    SourceUrl: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ThreatIntelIndicatorCategory: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ThreatIntelIndicatorLastObservedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    ThreatIntelIndicatorSource: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ThreatIntelIndicatorSourceUrl: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ThreatIntelIndicatorType: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ThreatIntelIndicatorValue: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Title: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Type: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    UpdatedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    UserDefinedFields: [
      {
        Comparison: EQUALS | NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Key: 'STRING_VALUE',
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    VerificationState: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    VulnerabilitiesExploitAvailable: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    VulnerabilitiesFixAvailable: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    WorkflowState: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    WorkflowStatus: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ]
  },
  Note: {
    Text: 'STRING_VALUE', /* required */
    UpdatedBy: 'STRING_VALUE' /* required */
  },
  RecordState: ACTIVE | ARCHIVED
};
securityhub.updateFindings(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • Filters — (map)

      A collection of attributes that specify which findings you want to update.

      • ProductArn — (Array<map>)

        The ARN generated by Security Hub that uniquely identifies a third-party company (security findings provider) after this provider's product (solution that generates findings) is registered with Security Hub.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • AwsAccountId — (Array<map>)

        The Amazon Web Services account ID in which a finding is generated.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Id — (Array<map>)

        The security findings provider-specific identifier for a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • GeneratorId — (Array<map>)

        The identifier for the solution-specific component (a discrete unit of logic) that generated a finding. In various security findings providers' solutions, this generator can be called a rule, a check, a detector, a plugin, etc.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Region — (Array<map>)

        The Region from which the finding was generated.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Type — (Array<map>)

        A finding type in the format of namespace/category/classifier that classifies a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • FirstObservedAt — (Array<map>)

        An ISO8601-formatted timestamp that indicates when the security findings provider first observed the potential security issue that a finding captured.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • LastObservedAt — (Array<map>)

        An ISO8601-formatted timestamp that indicates when the security findings provider most recently observed the potential security issue that a finding captured.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • CreatedAt — (Array<map>)

        An ISO8601-formatted timestamp that indicates when the security findings provider captured the potential security issue that a finding captured.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • UpdatedAt — (Array<map>)

        An ISO8601-formatted timestamp that indicates when the security findings provider last updated the finding record.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • SeverityProduct — (Array<map>)

        The native severity as defined by the security findings provider's solution that generated the finding.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • SeverityNormalized — (Array<map>)

        The normalized severity of a finding.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • SeverityLabel — (Array<map>)

        The label of a finding's severity.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Confidence — (Array<map>)

        A finding's confidence. Confidence is defined as the likelihood that a finding accurately identifies the behavior or issue that it was intended to identify.

        Confidence is scored on a 0-100 basis using a ratio scale, where 0 means zero percent confidence and 100 means 100 percent confidence.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • Criticality — (Array<map>)

        The level of importance assigned to the resources associated with the finding.

        A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • Title — (Array<map>)

        A finding's title.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Description — (Array<map>)

        A finding's description.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • RecommendationText — (Array<map>)

        The recommendation of what to do about the issue described in a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • SourceUrl — (Array<map>)

        A URL that links to a page about the current finding in the security findings provider's solution.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ProductFields — (Array<map>)

        A data type where security findings providers can include additional solution-specific details that aren't part of the defined AwsSecurityFinding format.

        • Key — (String)

          The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

        • Value — (String)

          The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

        • Comparison — (String)

          The condition to apply to the key value when filtering Security Hub findings with a map filter.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

          • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

          CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

          To search for values that don't have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

          • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

          NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

          CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ProductName — (Array<map>)

        The name of the solution (product) that generates findings.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • CompanyName — (Array<map>)

        The name of the findings provider (company) that owns the solution (product) that generates findings.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • UserDefinedFields — (Array<map>)

        A list of name/value string pairs associated with the finding. These are custom, user-defined fields added to a finding.

        • Key — (String)

          The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

        • Value — (String)

          The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

        • Comparison — (String)

          The condition to apply to the key value when filtering Security Hub findings with a map filter.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

          • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

          CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

          To search for values that don't have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

          • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

          NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

          CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • MalwareName — (Array<map>)

        The name of the malware that was observed.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • MalwareType — (Array<map>)

        The type of the malware that was observed.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • MalwarePath — (Array<map>)

        The filesystem path of the malware that was observed.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • MalwareState — (Array<map>)

        The state of the malware that was observed.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NetworkDirection — (Array<map>)

        Indicates the direction of network traffic associated with a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NetworkProtocol — (Array<map>)

        The protocol of network-related information about a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NetworkSourceIpV4 — (Array<map>)

        The source IPv4 address of network-related information about a finding.

        • Cidr — (String)

          A finding's CIDR value.

      • NetworkSourceIpV6 — (Array<map>)

        The source IPv6 address of network-related information about a finding.

        • Cidr — (String)

          A finding's CIDR value.

      • NetworkSourcePort — (Array<map>)

        The source port of network-related information about a finding.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • NetworkSourceDomain — (Array<map>)

        The source domain of network-related information about a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NetworkSourceMac — (Array<map>)

        The source media access control (MAC) address of network-related information about a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NetworkDestinationIpV4 — (Array<map>)

        The destination IPv4 address of network-related information about a finding.

        • Cidr — (String)

          A finding's CIDR value.

      • NetworkDestinationIpV6 — (Array<map>)

        The destination IPv6 address of network-related information about a finding.

        • Cidr — (String)

          A finding's CIDR value.

      • NetworkDestinationPort — (Array<map>)

        The destination port of network-related information about a finding.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • NetworkDestinationDomain — (Array<map>)

        The destination domain of network-related information about a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ProcessName — (Array<map>)

        The name of the process.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ProcessPath — (Array<map>)

        The path to the process executable.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ProcessPid — (Array<map>)

        The process ID.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • ProcessParentPid — (Array<map>)

        The parent process ID. This field accepts positive integers between O and 2147483647.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • ProcessLaunchedAt — (Array<map>)

        A timestamp that identifies when the process was launched.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • ProcessTerminatedAt — (Array<map>)

        A timestamp that identifies when the process was terminated.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • ThreatIntelIndicatorType — (Array<map>)

        The type of a threat intelligence indicator.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ThreatIntelIndicatorValue — (Array<map>)

        The value of a threat intelligence indicator.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ThreatIntelIndicatorCategory — (Array<map>)

        The category of a threat intelligence indicator.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ThreatIntelIndicatorLastObservedAt — (Array<map>)

        A timestamp that identifies the last observation of a threat intelligence indicator.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • ThreatIntelIndicatorSource — (Array<map>)

        The source of the threat intelligence.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ThreatIntelIndicatorSourceUrl — (Array<map>)

        The URL for more details from the source of the threat intelligence.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceType — (Array<map>)

        Specifies the type of the resource that details are provided for.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceId — (Array<map>)

        The canonical identifier for the given resource type.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourcePartition — (Array<map>)

        The canonical Amazon Web Services partition name that the Region is assigned to.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceRegion — (Array<map>)

        The canonical Amazon Web Services external Region name where this resource is located.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceTags — (Array<map>)

        A list of Amazon Web Services tags associated with a resource at the time the finding was processed.

        • Key — (String)

          The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

        • Value — (String)

          The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

        • Comparison — (String)

          The condition to apply to the key value when filtering Security Hub findings with a map filter.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

          • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

          CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

          To search for values that don't have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

          • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

          NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

          CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceType — (Array<map>)

        The instance type of the instance.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceImageId — (Array<map>)

        The Amazon Machine Image (AMI) ID of the instance.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceIpV4Addresses — (Array<map>)

        The IPv4 addresses associated with the instance.

        • Cidr — (String)

          A finding's CIDR value.

      • ResourceAwsEc2InstanceIpV6Addresses — (Array<map>)

        The IPv6 addresses associated with the instance.

        • Cidr — (String)

          A finding's CIDR value.

      • ResourceAwsEc2InstanceKeyName — (Array<map>)

        The key name associated with the instance.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceIamInstanceProfileArn — (Array<map>)

        The IAM profile ARN of the instance.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceVpcId — (Array<map>)

        The identifier of the VPC that the instance was launched in.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceSubnetId — (Array<map>)

        The identifier of the subnet that the instance was launched in.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceLaunchedAt — (Array<map>)

        The date and time the instance was launched.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • ResourceAwsS3BucketOwnerId — (Array<map>)

        The canonical user ID of the owner of the S3 bucket.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsS3BucketOwnerName — (Array<map>)

        The display name of the owner of the S3 bucket.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsIamAccessKeyUserName — (Array<map>)

        The user associated with the IAM access key related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsIamAccessKeyPrincipalName — (Array<map>)

        The name of the principal that is associated with an IAM access key.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsIamAccessKeyStatus — (Array<map>)

        The status of the IAM access key related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsIamAccessKeyCreatedAt — (Array<map>)

        The creation date/time of the IAM access key related to a finding.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • ResourceAwsIamUserUserName — (Array<map>)

        The name of an IAM user.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceContainerName — (Array<map>)

        The name of the container related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceContainerImageId — (Array<map>)

        The identifier of the image related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceContainerImageName — (Array<map>)

        The name of the image related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceContainerLaunchedAt — (Array<map>)

        A timestamp that identifies when the container was started.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • ResourceDetailsOther — (Array<map>)

        The details of a resource that doesn't have a specific subfield for the resource type defined.

        • Key — (String)

          The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

        • Value — (String)

          The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

        • Comparison — (String)

          The condition to apply to the key value when filtering Security Hub findings with a map filter.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

          • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

          CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

          To search for values that don't have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

          • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

          NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

          CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ComplianceStatus — (Array<map>)

        Exclusive to findings that are generated as the result of a check run against a specific rule in a supported standard, such as CIS Amazon Web Services Foundations. Contains security standard-related finding details.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • VerificationState — (Array<map>)

        The veracity of a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • WorkflowState — (Array<map>)

        The workflow state of a finding.

        Note that this field is deprecated. To search for a finding based on its workflow status, use WorkflowStatus.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • WorkflowStatus — (Array<map>)

        The status of the investigation into a finding. Allowed values are the following.

        • NEW - The initial state of a finding, before it is reviewed.

          Security Hub also resets the workflow status from NOTIFIED or RESOLVED to NEW in the following cases:

          • RecordState changes from ARCHIVED to ACTIVE.

          • Compliance.Status changes from PASSED to either WARNING, FAILED, or NOT_AVAILABLE.

        • NOTIFIED - Indicates that the resource owner has been notified about the security issue. Used when the initial reviewer is not the resource owner, and needs intervention from the resource owner.

          If one of the following occurs, the workflow status is changed automatically from NOTIFIED to NEW:

          • RecordState changes from ARCHIVED to ACTIVE.

          • Compliance.Status changes from PASSED to FAILED, WARNING, or NOT_AVAILABLE.

        • SUPPRESSED - Indicates that you reviewed the finding and do not believe that any action is needed.

          The workflow status of a SUPPRESSED finding does not change if RecordState changes from ARCHIVED to ACTIVE.

        • RESOLVED - The finding was reviewed and remediated and is now considered resolved.

          The finding remains RESOLVED unless one of the following occurs:

          • RecordState changes from ARCHIVED to ACTIVE.

          • Compliance.Status changes from PASSED to FAILED, WARNING, or NOT_AVAILABLE.

          In those cases, the workflow status is automatically reset to NEW.

          For findings from controls, if Compliance.Status is PASSED, then Security Hub automatically sets the workflow status to RESOLVED.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • RecordState — (Array<map>)

        The updated record state for the finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • RelatedFindingsProductArn — (Array<map>)

        The ARN of the solution that generated a related finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • RelatedFindingsId — (Array<map>)

        The solution-generated identifier for a related finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NoteText — (Array<map>)

        The text of a note.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NoteUpdatedAt — (Array<map>)

        The timestamp of when the note was updated.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • NoteUpdatedBy — (Array<map>)

        The principal that created a note.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Keyword — (Array<map>)

        A keyword for a finding.

        • Value — (String)

          A value for the keyword.

      • FindingProviderFieldsConfidence — (Array<map>)

        The finding provider value for the finding confidence. Confidence is defined as the likelihood that a finding accurately identifies the behavior or issue that it was intended to identify.

        Confidence is scored on a 0-100 basis using a ratio scale, where 0 means zero percent confidence and 100 means 100 percent confidence.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • FindingProviderFieldsCriticality — (Array<map>)

        The finding provider value for the level of importance assigned to the resources associated with the findings.

        A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • FindingProviderFieldsRelatedFindingsId — (Array<map>)

        The finding identifier of a related finding that is identified by the finding provider.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • FindingProviderFieldsRelatedFindingsProductArn — (Array<map>)

        The ARN of the solution that generated a related finding that is identified by the finding provider.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • FindingProviderFieldsSeverityLabel — (Array<map>)

        The finding provider value for the severity label.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • FindingProviderFieldsSeverityOriginal — (Array<map>)

        The finding provider's original value for the severity.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • FindingProviderFieldsTypes — (Array<map>)

        One or more finding types that the finding provider assigned to the finding. Uses the format of namespace/category/classifier that classify a finding.

        Valid namespace values are: Software and Configuration Checks | TTPs | Effects | Unusual Behaviors | Sensitive Data Identifications

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Sample — (Array<map>)

        Indicates whether or not sample findings are included in the filter results.

        • Value — (Boolean)

          The value of the boolean.

      • ComplianceSecurityControlId — (Array<map>)

        The unique identifier of a control across standards. Values for this field typically consist of an Amazon Web Service and a number, such as APIGateway.5.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ComplianceAssociatedStandardsId — (Array<map>)

        The unique identifier of a standard in which a control is enabled. This field consists of the resource portion of the Amazon Resource Name (ARN) returned for a standard in the DescribeStandards API response.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • VulnerabilitiesExploitAvailable — (Array<map>)

        Indicates whether a software vulnerability in your environment has a known exploit. You can filter findings by this field only if you use Security Hub and Amazon Inspector.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • VulnerabilitiesFixAvailable — (Array<map>)

        Indicates whether a vulnerability is fixed in a newer version of the affected software packages. You can filter findings by this field only if you use Security Hub and Amazon Inspector.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ComplianceSecurityControlParametersName — (Array<map>)

        The name of a security control parameter.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ComplianceSecurityControlParametersValue — (Array<map>)

        The current value of a security control parameter.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • AwsAccountName — (Array<map>)

        The name of the Amazon Web Services account in which a finding is generated.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceApplicationName — (Array<map>)

        The name of the application that is related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceApplicationArn — (Array<map>)

        The ARN of the application that is related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
    • Note — (map)

      The updated note for the finding.

      • Textrequired — (String)

        The updated note text.

      • UpdatedByrequired — (String)

        The principal that updated the note.

    • RecordState — (String)

      The updated record state for the finding.

      Possible values include:
      • "ACTIVE"
      • "ARCHIVED"

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

updateInsight(params = {}, callback) ⇒ AWS.Request

Updates the Security Hub insight identified by the specified insight ARN.

Service Reference:

Examples:

To update an insight


/* The following example updates the specified Security Hub insight. */

 var params = {
  Filters: {
   ResourceType: [
      {
     Comparison: "EQUALS", 
     Value: "AwsIamRole"
    }
   ], 
   SeverityLabel: [
      {
     Comparison: "EQUALS", 
     Value: "HIGH"
    }
   ]
  }, 
  InsightArn: "arn:aws:securityhub:us-west-1:123456789012:insight/123456789012/custom/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111", 
  Name: "High severity role findings"
 };
 securityhub.updateInsight(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
   }
   */
 });

Calling the updateInsight operation

var params = {
  InsightArn: 'STRING_VALUE', /* required */
  Filters: {
    AwsAccountId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    AwsAccountName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    CompanyName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ComplianceAssociatedStandardsId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ComplianceSecurityControlId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ComplianceSecurityControlParametersName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ComplianceSecurityControlParametersValue: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ComplianceStatus: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Confidence: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    CreatedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    Criticality: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    Description: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsConfidence: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsCriticality: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsRelatedFindingsId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsRelatedFindingsProductArn: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsSeverityLabel: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsSeverityOriginal: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    FindingProviderFieldsTypes: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    FirstObservedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    GeneratorId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Id: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Keyword: [
      {
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    LastObservedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    MalwareName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    MalwarePath: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    MalwareState: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    MalwareType: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkDestinationDomain: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkDestinationIpV4: [
      {
        Cidr: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkDestinationIpV6: [
      {
        Cidr: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkDestinationPort: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    NetworkDirection: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkProtocol: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkSourceDomain: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkSourceIpV4: [
      {
        Cidr: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkSourceIpV6: [
      {
        Cidr: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkSourceMac: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NetworkSourcePort: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    NoteText: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    NoteUpdatedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    NoteUpdatedBy: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProcessLaunchedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProcessName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProcessParentPid: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    ProcessPath: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProcessPid: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    ProcessTerminatedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProductArn: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProductFields: [
      {
        Comparison: EQUALS | NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Key: 'STRING_VALUE',
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ProductName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    RecommendationText: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    RecordState: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Region: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    RelatedFindingsId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    RelatedFindingsProductArn: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceApplicationArn: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceApplicationName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceIamInstanceProfileArn: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceImageId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceIpV4Addresses: [
      {
        Cidr: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceIpV6Addresses: [
      {
        Cidr: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceKeyName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceLaunchedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceSubnetId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceType: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsEc2InstanceVpcId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsIamAccessKeyCreatedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsIamAccessKeyPrincipalName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsIamAccessKeyStatus: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsIamAccessKeyUserName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsIamUserUserName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsS3BucketOwnerId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceAwsS3BucketOwnerName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceContainerImageId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceContainerImageName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceContainerLaunchedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceContainerName: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceDetailsOther: [
      {
        Comparison: EQUALS | NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Key: 'STRING_VALUE',
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceId: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourcePartition: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceRegion: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceTags: [
      {
        Comparison: EQUALS | NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Key: 'STRING_VALUE',
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ResourceType: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Sample: [
      {
        Value: true || false
      },
      /* more items */
    ],
    SeverityLabel: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    SeverityNormalized: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    SeverityProduct: [
      {
        Eq: 'NUMBER_VALUE',
        Gt: 'NUMBER_VALUE',
        Gte: 'NUMBER_VALUE',
        Lt: 'NUMBER_VALUE',
        Lte: 'NUMBER_VALUE'
      },
      /* more items */
    ],
    SourceUrl: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ThreatIntelIndicatorCategory: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ThreatIntelIndicatorLastObservedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    ThreatIntelIndicatorSource: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ThreatIntelIndicatorSourceUrl: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ThreatIntelIndicatorType: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    ThreatIntelIndicatorValue: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Title: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    Type: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    UpdatedAt: [
      {
        DateRange: {
          Unit: DAYS,
          Value: 'NUMBER_VALUE'
        },
        End: 'STRING_VALUE',
        Start: 'STRING_VALUE'
      },
      /* more items */
    ],
    UserDefinedFields: [
      {
        Comparison: EQUALS | NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Key: 'STRING_VALUE',
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    VerificationState: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    VulnerabilitiesExploitAvailable: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    VulnerabilitiesFixAvailable: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    WorkflowState: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ],
    WorkflowStatus: [
      {
        Comparison: EQUALS | PREFIX | NOT_EQUALS | PREFIX_NOT_EQUALS | CONTAINS | NOT_CONTAINS,
        Value: 'STRING_VALUE'
      },
      /* more items */
    ]
  },
  GroupByAttribute: 'STRING_VALUE',
  Name: 'STRING_VALUE'
};
securityhub.updateInsight(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • InsightArn — (String)

      The ARN of the insight that you want to update.

    • Name — (String)

      The updated name for the insight.

    • Filters — (map)

      The updated filters that define this insight.

      • ProductArn — (Array<map>)

        The ARN generated by Security Hub that uniquely identifies a third-party company (security findings provider) after this provider's product (solution that generates findings) is registered with Security Hub.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • AwsAccountId — (Array<map>)

        The Amazon Web Services account ID in which a finding is generated.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Id — (Array<map>)

        The security findings provider-specific identifier for a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • GeneratorId — (Array<map>)

        The identifier for the solution-specific component (a discrete unit of logic) that generated a finding. In various security findings providers' solutions, this generator can be called a rule, a check, a detector, a plugin, etc.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Region — (Array<map>)

        The Region from which the finding was generated.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Type — (Array<map>)

        A finding type in the format of namespace/category/classifier that classifies a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • FirstObservedAt — (Array<map>)

        An ISO8601-formatted timestamp that indicates when the security findings provider first observed the potential security issue that a finding captured.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • LastObservedAt — (Array<map>)

        An ISO8601-formatted timestamp that indicates when the security findings provider most recently observed the potential security issue that a finding captured.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • CreatedAt — (Array<map>)

        An ISO8601-formatted timestamp that indicates when the security findings provider captured the potential security issue that a finding captured.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • UpdatedAt — (Array<map>)

        An ISO8601-formatted timestamp that indicates when the security findings provider last updated the finding record.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • SeverityProduct — (Array<map>)

        The native severity as defined by the security findings provider's solution that generated the finding.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • SeverityNormalized — (Array<map>)

        The normalized severity of a finding.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • SeverityLabel — (Array<map>)

        The label of a finding's severity.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Confidence — (Array<map>)

        A finding's confidence. Confidence is defined as the likelihood that a finding accurately identifies the behavior or issue that it was intended to identify.

        Confidence is scored on a 0-100 basis using a ratio scale, where 0 means zero percent confidence and 100 means 100 percent confidence.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • Criticality — (Array<map>)

        The level of importance assigned to the resources associated with the finding.

        A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • Title — (Array<map>)

        A finding's title.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Description — (Array<map>)

        A finding's description.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • RecommendationText — (Array<map>)

        The recommendation of what to do about the issue described in a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • SourceUrl — (Array<map>)

        A URL that links to a page about the current finding in the security findings provider's solution.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ProductFields — (Array<map>)

        A data type where security findings providers can include additional solution-specific details that aren't part of the defined AwsSecurityFinding format.

        • Key — (String)

          The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

        • Value — (String)

          The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

        • Comparison — (String)

          The condition to apply to the key value when filtering Security Hub findings with a map filter.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

          • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

          CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

          To search for values that don't have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

          • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

          NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

          CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ProductName — (Array<map>)

        The name of the solution (product) that generates findings.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • CompanyName — (Array<map>)

        The name of the findings provider (company) that owns the solution (product) that generates findings.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • UserDefinedFields — (Array<map>)

        A list of name/value string pairs associated with the finding. These are custom, user-defined fields added to a finding.

        • Key — (String)

          The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

        • Value — (String)

          The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

        • Comparison — (String)

          The condition to apply to the key value when filtering Security Hub findings with a map filter.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

          • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

          CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

          To search for values that don't have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

          • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

          NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

          CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • MalwareName — (Array<map>)

        The name of the malware that was observed.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • MalwareType — (Array<map>)

        The type of the malware that was observed.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • MalwarePath — (Array<map>)

        The filesystem path of the malware that was observed.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • MalwareState — (Array<map>)

        The state of the malware that was observed.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NetworkDirection — (Array<map>)

        Indicates the direction of network traffic associated with a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NetworkProtocol — (Array<map>)

        The protocol of network-related information about a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NetworkSourceIpV4 — (Array<map>)

        The source IPv4 address of network-related information about a finding.

        • Cidr — (String)

          A finding's CIDR value.

      • NetworkSourceIpV6 — (Array<map>)

        The source IPv6 address of network-related information about a finding.

        • Cidr — (String)

          A finding's CIDR value.

      • NetworkSourcePort — (Array<map>)

        The source port of network-related information about a finding.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • NetworkSourceDomain — (Array<map>)

        The source domain of network-related information about a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NetworkSourceMac — (Array<map>)

        The source media access control (MAC) address of network-related information about a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NetworkDestinationIpV4 — (Array<map>)

        The destination IPv4 address of network-related information about a finding.

        • Cidr — (String)

          A finding's CIDR value.

      • NetworkDestinationIpV6 — (Array<map>)

        The destination IPv6 address of network-related information about a finding.

        • Cidr — (String)

          A finding's CIDR value.

      • NetworkDestinationPort — (Array<map>)

        The destination port of network-related information about a finding.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • NetworkDestinationDomain — (Array<map>)

        The destination domain of network-related information about a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ProcessName — (Array<map>)

        The name of the process.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ProcessPath — (Array<map>)

        The path to the process executable.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ProcessPid — (Array<map>)

        The process ID.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • ProcessParentPid — (Array<map>)

        The parent process ID. This field accepts positive integers between O and 2147483647.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • ProcessLaunchedAt — (Array<map>)

        A timestamp that identifies when the process was launched.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • ProcessTerminatedAt — (Array<map>)

        A timestamp that identifies when the process was terminated.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • ThreatIntelIndicatorType — (Array<map>)

        The type of a threat intelligence indicator.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ThreatIntelIndicatorValue — (Array<map>)

        The value of a threat intelligence indicator.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ThreatIntelIndicatorCategory — (Array<map>)

        The category of a threat intelligence indicator.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ThreatIntelIndicatorLastObservedAt — (Array<map>)

        A timestamp that identifies the last observation of a threat intelligence indicator.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • ThreatIntelIndicatorSource — (Array<map>)

        The source of the threat intelligence.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ThreatIntelIndicatorSourceUrl — (Array<map>)

        The URL for more details from the source of the threat intelligence.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceType — (Array<map>)

        Specifies the type of the resource that details are provided for.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceId — (Array<map>)

        The canonical identifier for the given resource type.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourcePartition — (Array<map>)

        The canonical Amazon Web Services partition name that the Region is assigned to.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceRegion — (Array<map>)

        The canonical Amazon Web Services external Region name where this resource is located.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceTags — (Array<map>)

        A list of Amazon Web Services tags associated with a resource at the time the finding was processed.

        • Key — (String)

          The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

        • Value — (String)

          The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

        • Comparison — (String)

          The condition to apply to the key value when filtering Security Hub findings with a map filter.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

          • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

          CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

          To search for values that don't have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

          • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

          NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

          CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceType — (Array<map>)

        The instance type of the instance.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceImageId — (Array<map>)

        The Amazon Machine Image (AMI) ID of the instance.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceIpV4Addresses — (Array<map>)

        The IPv4 addresses associated with the instance.

        • Cidr — (String)

          A finding's CIDR value.

      • ResourceAwsEc2InstanceIpV6Addresses — (Array<map>)

        The IPv6 addresses associated with the instance.

        • Cidr — (String)

          A finding's CIDR value.

      • ResourceAwsEc2InstanceKeyName — (Array<map>)

        The key name associated with the instance.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceIamInstanceProfileArn — (Array<map>)

        The IAM profile ARN of the instance.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceVpcId — (Array<map>)

        The identifier of the VPC that the instance was launched in.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceSubnetId — (Array<map>)

        The identifier of the subnet that the instance was launched in.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsEc2InstanceLaunchedAt — (Array<map>)

        The date and time the instance was launched.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • ResourceAwsS3BucketOwnerId — (Array<map>)

        The canonical user ID of the owner of the S3 bucket.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsS3BucketOwnerName — (Array<map>)

        The display name of the owner of the S3 bucket.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsIamAccessKeyUserName — (Array<map>)

        The user associated with the IAM access key related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsIamAccessKeyPrincipalName — (Array<map>)

        The name of the principal that is associated with an IAM access key.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsIamAccessKeyStatus — (Array<map>)

        The status of the IAM access key related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceAwsIamAccessKeyCreatedAt — (Array<map>)

        The creation date/time of the IAM access key related to a finding.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • ResourceAwsIamUserUserName — (Array<map>)

        The name of an IAM user.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceContainerName — (Array<map>)

        The name of the container related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceContainerImageId — (Array<map>)

        The identifier of the image related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceContainerImageName — (Array<map>)

        The name of the image related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceContainerLaunchedAt — (Array<map>)

        A timestamp that identifies when the container was started.

        A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • ResourceDetailsOther — (Array<map>)

        The details of a resource that doesn't have a specific subfield for the resource type defined.

        • Key — (String)

          The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

        • Value — (String)

          The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

        • Comparison — (String)

          The condition to apply to the key value when filtering Security Hub findings with a map filter.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

          • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

          CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

          To search for values that don't have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

          • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

          NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

          CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ComplianceStatus — (Array<map>)

        Exclusive to findings that are generated as the result of a check run against a specific rule in a supported standard, such as CIS Amazon Web Services Foundations. Contains security standard-related finding details.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • VerificationState — (Array<map>)

        The veracity of a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • WorkflowState — (Array<map>)

        The workflow state of a finding.

        Note that this field is deprecated. To search for a finding based on its workflow status, use WorkflowStatus.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • WorkflowStatus — (Array<map>)

        The status of the investigation into a finding. Allowed values are the following.

        • NEW - The initial state of a finding, before it is reviewed.

          Security Hub also resets the workflow status from NOTIFIED or RESOLVED to NEW in the following cases:

          • RecordState changes from ARCHIVED to ACTIVE.

          • Compliance.Status changes from PASSED to either WARNING, FAILED, or NOT_AVAILABLE.

        • NOTIFIED - Indicates that the resource owner has been notified about the security issue. Used when the initial reviewer is not the resource owner, and needs intervention from the resource owner.

          If one of the following occurs, the workflow status is changed automatically from NOTIFIED to NEW:

          • RecordState changes from ARCHIVED to ACTIVE.

          • Compliance.Status changes from PASSED to FAILED, WARNING, or NOT_AVAILABLE.

        • SUPPRESSED - Indicates that you reviewed the finding and do not believe that any action is needed.

          The workflow status of a SUPPRESSED finding does not change if RecordState changes from ARCHIVED to ACTIVE.

        • RESOLVED - The finding was reviewed and remediated and is now considered resolved.

          The finding remains RESOLVED unless one of the following occurs:

          • RecordState changes from ARCHIVED to ACTIVE.

          • Compliance.Status changes from PASSED to FAILED, WARNING, or NOT_AVAILABLE.

          In those cases, the workflow status is automatically reset to NEW.

          For findings from controls, if Compliance.Status is PASSED, then Security Hub automatically sets the workflow status to RESOLVED.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • RecordState — (Array<map>)

        The updated record state for the finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • RelatedFindingsProductArn — (Array<map>)

        The ARN of the solution that generated a related finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • RelatedFindingsId — (Array<map>)

        The solution-generated identifier for a related finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NoteText — (Array<map>)

        The text of a note.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • NoteUpdatedAt — (Array<map>)

        The timestamp of when the note was updated.

        • Start — (String)

          A timestamp that provides the start date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • End — (String)

          A timestamp that provides the end date for the date filter.

          A correctly formatted example is 2020-05-21T20:16:34.724Z. The value cannot contain spaces, and date and time should be separated by T. For more information, see RFC 3339 section 5.6, Internet Date/Time Format.

        • DateRange — (map)

          A date range for the date filter.

          • Value — (Integer)

            A date range value for the date filter.

          • Unit — (String)

            A date range unit for the date filter.

            Possible values include:
            • "DAYS"
      • NoteUpdatedBy — (Array<map>)

        The principal that created a note.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Keyword — (Array<map>)

        A keyword for a finding.

        • Value — (String)

          A value for the keyword.

      • FindingProviderFieldsConfidence — (Array<map>)

        The finding provider value for the finding confidence. Confidence is defined as the likelihood that a finding accurately identifies the behavior or issue that it was intended to identify.

        Confidence is scored on a 0-100 basis using a ratio scale, where 0 means zero percent confidence and 100 means 100 percent confidence.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • FindingProviderFieldsCriticality — (Array<map>)

        The finding provider value for the level of importance assigned to the resources associated with the findings.

        A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources.

        • Gte — (Float)

          The greater-than-equal condition to be applied to a single field when querying for findings.

        • Lte — (Float)

          The less-than-equal condition to be applied to a single field when querying for findings.

        • Gt — (Float)

          The greater-than condition to be applied to a single field when querying for findings.

        • Lt — (Float)

          The less-than condition to be applied to a single field when querying for findings.

        • Eq — (Float)

          The equal-to condition to be applied to a single field when querying for findings.

      • FindingProviderFieldsRelatedFindingsId — (Array<map>)

        The finding identifier of a related finding that is identified by the finding provider.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • FindingProviderFieldsRelatedFindingsProductArn — (Array<map>)

        The ARN of the solution that generated a related finding that is identified by the finding provider.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • FindingProviderFieldsSeverityLabel — (Array<map>)

        The finding provider value for the severity label.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • FindingProviderFieldsSeverityOriginal — (Array<map>)

        The finding provider's original value for the severity.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • FindingProviderFieldsTypes — (Array<map>)

        One or more finding types that the finding provider assigned to the finding. Uses the format of namespace/category/classifier that classify a finding.

        Valid namespace values are: Software and Configuration Checks | TTPs | Effects | Unusual Behaviors | Sensitive Data Identifications

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • Sample — (Array<map>)

        Indicates whether or not sample findings are included in the filter results.

        • Value — (Boolean)

          The value of the boolean.

      • ComplianceSecurityControlId — (Array<map>)

        The unique identifier of a control across standards. Values for this field typically consist of an Amazon Web Service and a number, such as APIGateway.5.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ComplianceAssociatedStandardsId — (Array<map>)

        The unique identifier of a standard in which a control is enabled. This field consists of the resource portion of the Amazon Resource Name (ARN) returned for a standard in the DescribeStandards API response.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • VulnerabilitiesExploitAvailable — (Array<map>)

        Indicates whether a software vulnerability in your environment has a known exploit. You can filter findings by this field only if you use Security Hub and Amazon Inspector.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • VulnerabilitiesFixAvailable — (Array<map>)

        Indicates whether a vulnerability is fixed in a newer version of the affected software packages. You can filter findings by this field only if you use Security Hub and Amazon Inspector.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ComplianceSecurityControlParametersName — (Array<map>)

        The name of a security control parameter.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ComplianceSecurityControlParametersValue — (Array<map>)

        The current value of a security control parameter.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • AwsAccountName — (Array<map>)

        The name of the Amazon Web Services account in which a finding is generated.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceApplicationName — (Array<map>)

        The name of the application that is related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
      • ResourceApplicationArn — (Array<map>)

        The ARN of the application that is related to a finding.

        • Value — (String)

          The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you provide security hub as the filter value, there's no match.

        • Comparison — (String)

          The condition to apply to a string value when filtering Security Hub findings.

          To search for values that have the filter value, use one of the following comparison operators:

          • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

          • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

          • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

          CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

          To search for values that don’t have the filter value, use one of the following comparison operators:

          • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

          • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

          • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

          NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

          You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

          You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

          For example, for the following filters, Security Hub first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

          • ResourceType PREFIX AwsIam

          • ResourceType PREFIX AwsEc2

          • ResourceType NOT_EQUALS AwsIamPolicy

          • ResourceType NOT_EQUALS AwsEc2NetworkInterface

          CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide.

          Possible values include:
          • "EQUALS"
          • "PREFIX"
          • "NOT_EQUALS"
          • "PREFIX_NOT_EQUALS"
          • "CONTAINS"
          • "NOT_CONTAINS"
    • GroupByAttribute — (String)

      The updated GroupBy attribute that defines this insight.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

updateOrganizationConfiguration(params = {}, callback) ⇒ AWS.Request

Updates the configuration of your organization in Security Hub. Only the Security Hub administrator account can invoke this operation.

Service Reference:

Examples:

To update organization configuration


/* This operation updates the way your organization is configured in Security Hub. Only a Security Hub administrator account can invoke this operation. */

 var params = {
  AutoEnable: false, 
  AutoEnableStandards: "NONE", 
  OrganizationConfiguration: {
   ConfigurationType: "CENTRAL"
  }
 };
 securityhub.updateOrganizationConfiguration(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
   }
   */
 });

Calling the updateOrganizationConfiguration operation

var params = {
  AutoEnable: true || false, /* required */
  AutoEnableStandards: NONE | DEFAULT,
  OrganizationConfiguration: {
    ConfigurationType: CENTRAL | LOCAL,
    Status: PENDING | ENABLED | FAILED,
    StatusMessage: 'STRING_VALUE'
  }
};
securityhub.updateOrganizationConfiguration(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • AutoEnable — (Boolean)

      Whether to automatically enable Security Hub in new member accounts when they join the organization.

      If set to true, then Security Hub is automatically enabled in new accounts. If set to false, then Security Hub isn't enabled in new accounts automatically. The default value is false.

      If the ConfigurationType of your organization is set to CENTRAL, then this field is set to false and can't be changed in the home Region and linked Regions. However, in that case, the delegated administrator can create a configuration policy in which Security Hub is enabled and associate the policy with new organization accounts.

    • AutoEnableStandards — (String)

      Whether to automatically enable Security Hub default standards in new member accounts when they join the organization.

      The default value of this parameter is equal to DEFAULT.

      If equal to DEFAULT, then Security Hub default standards are automatically enabled for new member accounts. If equal to NONE, then default standards are not automatically enabled for new member accounts.

      If the ConfigurationType of your organization is set to CENTRAL, then this field is set to NONE and can't be changed in the home Region and linked Regions. However, in that case, the delegated administrator can create a configuration policy in which specific security standards are enabled and associate the policy with new organization accounts.

      Possible values include:
      • "NONE"
      • "DEFAULT"
    • OrganizationConfiguration — (map)

      Provides information about the way an organization is configured in Security Hub.

      • ConfigurationType — (String)

        Indicates whether the organization uses local or central configuration.

        If you use local configuration, the Security Hub delegated administrator can set AutoEnable to true and AutoEnableStandards to DEFAULT. This automatically enables Security Hub and default security standards in new organization accounts. These new account settings must be set separately in each Amazon Web Services Region, and settings may be different in each Region.

        If you use central configuration, the delegated administrator can create configuration policies. Configuration policies can be used to configure Security Hub, security standards, and security controls in multiple accounts and Regions. If you want new organization accounts to use a specific configuration, you can create a configuration policy and associate it with the root or specific organizational units (OUs). New accounts will inherit the policy from the root or their assigned OU.

        Possible values include:
        • "CENTRAL"
        • "LOCAL"
      • Status — (String)

        Describes whether central configuration could be enabled as the ConfigurationType for the organization. If your ConfigurationType is local configuration, then the value of Status is always ENABLED.

        Possible values include:
        • "PENDING"
        • "ENABLED"
        • "FAILED"
      • StatusMessage — (String)

        Provides an explanation if the value of Status is equal to FAILED when ConfigurationType is equal to CENTRAL.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

updateSecurityControl(params = {}, callback) ⇒ AWS.Request

Updates the properties of a security control.

Service Reference:

Examples:

To update security control properties


/* The following example updates the specified security control. Specifically, this example updates control parameters. */

 var params = {
  LastUpdateReason: "Comply with internal requirements", 
  Parameters: {
   "maxCredentialUsageAge": {
     Value: {
      Integer: 15
     }, 
     ValueType: "CUSTOM"
    }
  }, 
  SecurityControlId: "ACM.1"
 };
 securityhub.updateSecurityControl(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
   }
   */
 });

Calling the updateSecurityControl operation

var params = {
  Parameters: { /* required */
    '<NonEmptyString>': {
      ValueType: DEFAULT | CUSTOM, /* required */
      Value: {
        Boolean: true || false,
        Double: 'NUMBER_VALUE',
        Enum: 'STRING_VALUE',
        EnumList: [
          'STRING_VALUE',
          /* more items */
        ],
        Integer: 'NUMBER_VALUE',
        IntegerList: [
          'NUMBER_VALUE',
          /* more items */
        ],
        String: 'STRING_VALUE',
        StringList: [
          'STRING_VALUE',
          /* more items */
        ]
      }
    },
    /* '<NonEmptyString>': ... */
  },
  SecurityControlId: 'STRING_VALUE', /* required */
  LastUpdateReason: 'STRING_VALUE'
};
securityhub.updateSecurityControl(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • SecurityControlId — (String)

      The Amazon Resource Name (ARN) or ID of the control to update.

    • Parameters — (map<map>)

      An object that specifies which security control parameters to update.

      • ValueTyperequired — (String)

        Identifies whether a control parameter uses a custom user-defined value or subscribes to the default Security Hub behavior.

        When ValueType is set equal to DEFAULT, the default behavior can be a specific Security Hub default value, or the default behavior can be to ignore a specific parameter. When ValueType is set equal to DEFAULT, Security Hub ignores user-provided input for the Value field.

        When ValueType is set equal to CUSTOM, the Value field can't be empty.

        Possible values include:
        • "DEFAULT"
        • "CUSTOM"
      • Value — (map)

        The current value of a control parameter.

        • Integer — (Integer)

          A control parameter that is an integer.

        • IntegerList — (Array<Integer>)

          A control parameter that is a list of integers.

        • Double — (Float)

          A control parameter that is a double.

        • String — (String)

          A control parameter that is a string.

        • StringList — (Array<String>)

          A control parameter that is a list of strings.

        • Boolean — (Boolean)

          A control parameter that is a boolean.

        • Enum — (String)

          A control parameter that is an enum.

        • EnumList — (Array<String>)

          A control parameter that is a list of enums.

    • LastUpdateReason — (String)

      The most recent reason for updating the properties of the security control. This field accepts alphanumeric characters in addition to white spaces, dashes, and underscores.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

updateSecurityHubConfiguration(params = {}, callback) ⇒ AWS.Request

Updates configuration options for Security Hub.

Service Reference:

Examples:

To update Security Hub settings


/* The following example updates Security Hub settings to turn on consolidated control findings, and to automatically enable new controls in enabled standards. */

 var params = {
  AutoEnableControls: true, 
  ControlFindingGenerator: "SECURITY_CONTROL"
 };
 securityhub.updateSecurityHubConfiguration(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
   }
   */
 });

Calling the updateSecurityHubConfiguration operation

var params = {
  AutoEnableControls: true || false,
  ControlFindingGenerator: STANDARD_CONTROL | SECURITY_CONTROL
};
securityhub.updateSecurityHubConfiguration(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • AutoEnableControls — (Boolean)

      Whether to automatically enable new controls when they are added to standards that are enabled.

      By default, this is set to true, and new controls are enabled automatically. To not automatically enable new controls, set this to false.

    • ControlFindingGenerator — (String)

      Updates whether the calling account has consolidated control findings turned on. If the value for this field is set to SECURITY_CONTROL, Security Hub generates a single finding for a control check even when the check applies to multiple enabled standards.

      If the value for this field is set to STANDARD_CONTROL, Security Hub generates separate findings for a control check when the check applies to multiple enabled standards.

      For accounts that are part of an organization, this value can only be updated in the administrator account.

      Possible values include:
      • "STANDARD_CONTROL"
      • "SECURITY_CONTROL"

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.

updateStandardsControl(params = {}, callback) ⇒ AWS.Request

Used to control whether an individual security standard control is enabled or disabled.

Service Reference:

Examples:

To update the enablement status of a standard control


/* The following example disables the specified control in the specified security standard. */

 var params = {
  ControlStatus: "DISABLED", 
  DisabledReason: "Not applicable to my service", 
  StandardsControlArn: "arn:aws:securityhub:us-west-1:123456789012:control/pci-dss/v/3.2.1/PCI.AutoScaling.1"
 };
 securityhub.updateStandardsControl(params, function(err, data) {
   if (err) console.log(err, err.stack); // an error occurred
   else     console.log(data);           // successful response
   /*
   data = {
   }
   */
 });

Calling the updateStandardsControl operation

var params = {
  StandardsControlArn: 'STRING_VALUE', /* required */
  ControlStatus: ENABLED | DISABLED,
  DisabledReason: 'STRING_VALUE'
};
securityhub.updateStandardsControl(params, function(err, data) {
  if (err) console.log(err, err.stack); // an error occurred
  else     console.log(data);           // successful response
});

Parameters:

  • params (Object) (defaults to: {})
    • StandardsControlArn — (String)

      The ARN of the security standard control to enable or disable.

    • ControlStatus — (String)

      The updated status of the security standard control.

      Possible values include:
      • "ENABLED"
      • "DISABLED"
    • DisabledReason — (String)

      A description of the reason why you are disabling a security standard control. If you are disabling a control, then this is required.

Callback (callback):

  • function(err, data) { ... }

    Called when a response from the service is returned. If a callback is not supplied, you must call AWS.Request.send() on the returned request object to initiate the request.

    Context (this):

    • (AWS.Response)

      the response object containing error, data properties, and the original request object.

    Parameters:

    • err (Error)

      the error object returned from the request. Set to null if the request is successful.

    • data (Object)

      the de-serialized data returned from the request. Set to null if a request error occurs.

Returns:

  • (AWS.Request)

    a handle to the operation request for subsequent event callback registration.