本文属于机器翻译版本。若本译文内容与英语原文存在差异,则一律以英文原文为准。
ASFF 中的 AwsEventBridge 资源
以下是AwsEventBridge
资源的 Amazon 安全调查发现格式(ASFF)的示例。
Amazon Security Hub 会将各种来源的调查发现标准化为 ASFF。有关 ASFF 的背景信息,请参阅 Amazon 安全调查发现格式 (ASFF)。
AwsEventSchemasRegistry
该AwsEventSchemasRegistry
对象提供有关 Amazon EventBridge 架构注册表的信息。架构定义了发送到的事件的结构 EventBridge。架构注册表是收集架构并对其进行逻辑分组的容器。
以下示例显示AwsEventSchemasRegistry
对象的 Amazon 安全调查发现格式 (ASFF)。要查看 AwsEventSchemasRegistry
属性的描述,请参阅 Amazon Security Hub API 参考中的 AwsEventSchemasRegistry。
示例
"AwsEventSchemasRegistry": { "Description": "This is an example event schema registry.", "RegistryArn": "arn:aws:schemas:us-east-1:123456789012:registry/schema-registry", "RegistryName": "schema-registry" }
AwsEventsEndpoint
该AwsEventsEndpoint
对象提供有关 Amazon EventBridge 全局端点的信息。端点可以通过使其具有区域容错能力来提高应用程序的可用性。
以下示例显示AwsEventsEndpoint
对象的 Amazon 安全调查发现格式 (ASFF)。要查看 AwsEventsEndpoint
属性的描述,请参阅 Amazon Security Hub API 参考中的 AwsEventsEndpointDetails。
示例
"AwsEventsEndpoint": { "Arn": "arn:aws:events:us-east-1:123456789012:endpoint/my-endpoint", "Description": "This is a sample endpoint.", "EndpointId": "04k1exajoy.veo", "EndpointUrl": "https://04k1exajoy.veo.endpoint.events.amazonaws.com", "EventBuses": [ { "EventBusArn": "arn:aws:events:us-east-1:123456789012:event-bus/default" }, { "EventBusArn": "arn:aws:events:us-east-2:123456789012:event-bus/default" } ], "Name": "my-endpoint", "ReplicationConfig": { "State": "ENABLED" }, "RoleArn": "arn:aws:iam::123456789012:role/service-role/Amazon_EventBridge_Invoke_Event_Bus_1258925394", "RoutingConfig": { "FailoverConfig": { "Primary": { "HealthCheck": "arn:aws:route53:::healthcheck/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111" }, "Secondary": { "Route": "us-east-2" } } }, "State": "ACTIVE" }
AwsEventsEventbus
该AwsEventsEventbus
对象提供有关 Amazon EventBridge 全局端点的信息。端点可以通过使其具有区域容错能力来提高应用程序的可用性。
以下示例显示AwsEventsEventbus
对象的 Amazon 安全调查发现格式 (ASFF)。要查看 AwsEventsEventbus
属性的描述,请参阅 Amazon Security Hub API 参考中的 AwsEventsEventbusDetails。
示例
"AwsEventsEventbus": "Arn": "arn:aws:events:us-east-1:123456789012:event-bus/my-event-bus", "Name": "my-event-bus", "Policy": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"AllowAllAccountsFromOrganizationToPutEvents\",\"Effect\":\"Allow\",\"Principal\":\"*\",\"Action\":\"events:PutEvents\",\"Resource\":\"arn:aws:events:us-east-1:123456789012:event-bus/my-event-bus\",\"Condition\":{\"StringEquals\":{\"aws:PrincipalOrgID\":\"o-ki7yjtkjv5\"}}},{\"Sid\":\"AllowAccountToManageRulesTheyCreated\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::123456789012:root\"},\"Action\":[\"events:PutRule\",\"events:PutTargets\",\"events:DeleteRule\",\"events:RemoveTargets\",\"events:DisableRule\",\"events:EnableRule\",\"events:TagResource\",\"events:UntagResource\",\"events:DescribeRule\",\"events:ListTargetsByRule\",\"events:ListTagsForResource\"],\"Resource\":\"arn:aws:events:us-east-1:123456789012:rule/my-event-bus\",\"Condition\":{\"StringEqualsIfExists\":{\"events:creatorAccount\":\"123456789012\"}}}]}"