Show / Hide Table of Contents

Namespace Google.Apis.SecurityCommandCenter.v1.Data

Classes

Access

Represents an access event.

AccessReview

Conveys information about a Kubernetes access review (e.g. kubectl auth can-i ...) that was involved in a finding.

Asset

Security Command Center representation of a Google Cloud resource. The Asset is a Security Command Center resource that captures information about a single Google Cloud resource. All modifications to an Asset are only within the context of Security Command Center and don't affect the referenced Google Cloud resource.

AssetDiscoveryConfig

The configuration used for Asset Discovery runs.

AssociatedFinding

A finding that is associated with this node in the exposure path.

AuditConfig

Specifies the audit configuration for a service. The configuration determines which permission types are logged, and what identities, if any, are exempted from logging. An AuditConfig must have one or more AuditLogConfigs. If there are AuditConfigs for both allServices and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditLogConfig are exempted. Example Policy with multiple AuditConfigs: { "audit_configs": [ { "service": "allServices", "audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [ "user:jose@example.com" ] }, { "log_type": "DATA_WRITE" }, { "log_type": "ADMIN_READ" } ] }, { "service": "sampleservice.googleapis.com", "audit_log_configs": [ { "log_type": "DATA_READ" }, { "log_type": "DATA_WRITE", "exempted_members": [ "user:aliya@example.com" ] } ] } ] } For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts jose@example.com from DATA_READ logging, and aliya@example.com from DATA_WRITE logging.

AuditLogConfig

Provides the configuration for logging a type of permissions. Example: { "audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [ "user:jose@example.com" ] }, { "log_type": "DATA_WRITE" } ] } This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting jose@example.com from DATA_READ logging.

Binding

Associates members, or principals, with a role.

BulkMuteFindingsRequest

Request message for bulk findings update. Note: 1. If multiple bulk update requests match the same resource, the order in which they get executed is not defined. 2. Once a bulk operation is started, there is no way to stop it.

Compliance

Contains compliance information about a security standard indicating unmet recommendations.

Connection

Contains information about the IP connection associated with the finding.

Contact

The email address of a contact.

ContactDetails

The details pertaining to specific contacts

Container

Container associated with the finding.

Cve

CVE stands for Common Vulnerabilities and Exposures. More information: https://cve.mitre.org

Cvssv3

Common Vulnerability Scoring System version 3.

Database

Represents database access information, such as queries. A database may be a sub-resource of an instance (as in the case of CloudSQL instances or Cloud Spanner instances), or the database instance itself. Some database resources may not have the full resource name populated because these resource types are not yet supported by Cloud Asset Inventory (e.g. CloudSQL databases). In these cases only the display name will be provided.

Detection

Memory hash detection contributing to the binary family match.

Edge

Represents a connection between a source node and a destination node in this exposure path.

Empty

A generic empty message that you can re-use to avoid defining duplicated empty messages in your APIs. A typical example is to use it as the request or the response type of an API method. For instance: service Foo { rpc Bar(google.protobuf.Empty) returns (google.protobuf.Empty); }

EnvironmentVariable

EnvironmentVariable is a name-value pair to store environment variables for Process.

ExfilResource

Resource that has been exfiltrated or exfiltrated_to.

Exfiltration

Exfiltration represents a data exfiltration attempt of one or more sources to one or more targets. Sources represent the source of data that is exfiltrated, and Targets represents the destination the data was copied to.

Expr

Represents a textual expression in the Common Expression Language (CEL) syntax. CEL is a C-like expression language. The syntax and semantics of CEL are documented at https://github.com/google/cel-spec. Example (Comparison): title: "Summary size limit" description: "Determines if a summary is less than 100 chars" expression: "document.summary.size() < 100" Example (Equality): title: "Requestor is owner" description: "Determines if requestor is the document owner" expression: "document.owner == request.auth.claims.email" Example (Logic): title: "Public documents" description: "Determine whether the document should be publicly visible" expression: "document.type != 'private' && document.type != 'internal'" Example (Data Manipulation): title: "Notification string" description: "Create a notification string with a timestamp." expression: "'New message received at ' + string(document.create_time)" The exact variables and functions that may be referenced within an expression are determined by the service that evaluates it. See the service documentation for additional information.

File

File information about the related binary/library used by an executable, or the script used by a script interpreter

Finding

Security Command Center finding. A finding is a record of assessment data like security, risk, health, or privacy, that is ingested into Security Command Center for presentation, notification, analysis, policy testing, and enforcement. For example, a cross-site scripting (XSS) vulnerability in an App Engine application is a finding.

Folder

Message that contains the resource name and display name of a folder resource.

Geolocation

Represents a geographical location for a given access.

GetIamPolicyRequest

Request message for GetIamPolicy method.

GetPolicyOptions

Encapsulates settings provided to GetIamPolicy.

GoogleCloudSecuritycenterV1beta1RunAssetDiscoveryResponse

Response of asset discovery run

GoogleCloudSecuritycenterV1BigQueryExport

Configures how to deliver Findings to BigQuery Instance.

GoogleCloudSecuritycenterV1Binding

Represents a Kubernetes RoleBinding or ClusterRoleBinding.

GoogleCloudSecuritycenterV1BulkMuteFindingsResponse

The response to a BulkMute request. Contains the LRO information.

GoogleCloudSecuritycenterV1ExposedResource

A resource that is exposed as a result of a finding.

GoogleCloudSecuritycenterV1ExposurePath

A path that an attacker could take to reach an exposed resource.

GoogleCloudSecuritycenterV1ExternalSystem

Representation of third party SIEM/SOAR fields within SCC.

GoogleCloudSecuritycenterV1MuteConfig

A mute config is a Cloud SCC resource that contains the configuration to mute create/update events of findings.

GoogleCloudSecuritycenterV1NotificationMessage

Cloud SCC's Notification

GoogleCloudSecuritycenterV1p1beta1Finding

Security Command Center finding. A finding is a record of assessment data (security, risk, health or privacy) ingested into Security Command Center for presentation, notification, analysis, policy testing, and enforcement. For example, an XSS vulnerability in an App Engine application is a finding.

GoogleCloudSecuritycenterV1p1beta1Folder

Message that contains the resource name and display name of a folder resource.

GoogleCloudSecuritycenterV1p1beta1NotificationMessage

Security Command Center's Notification

GoogleCloudSecuritycenterV1p1beta1Resource

Information related to the Google Cloud resource.

GoogleCloudSecuritycenterV1p1beta1RunAssetDiscoveryResponse

Response of asset discovery run

GoogleCloudSecuritycenterV1p1beta1SecurityMarks

User specified security marks that are attached to the parent Security Command Center resource. Security marks are scoped within a Security Command Center organization -- they can be modified and viewed by all users who have proper permissions on the organization.

GoogleCloudSecuritycenterV1Resource

Information related to the Google Cloud resource.

GoogleCloudSecuritycenterV1ResourceValueConfig

A resource value config is a mapping configuration of user's tag values to resource values. Used by the attack path simulation.

GoogleCloudSecuritycenterV1RunAssetDiscoveryResponse

Response of asset discovery run

GroupAssetsRequest

Request message for grouping by assets.

GroupAssetsResponse

Response message for grouping by assets.

GroupFindingsRequest

Request message for grouping by findings.

GroupFindingsResponse

Response message for group by findings.

GroupResult

Result containing the properties and count of a groupBy request.

IamBinding

Represents a particular IAM binding, which captures a member's role addition, removal, or state.

IamPolicy

Cloud IAM Policy information associated with the Google Cloud resource described by the Security Command Center asset. This information is managed and defined by the Google Cloud resource and cannot be modified by the user.

Indicator

Represents what's commonly known as an indicator of compromise (IoC) in computer forensics. This is an artifact observed on a network or in an operating system that, with high confidence, indicates a computer intrusion. For more information, see Indicator of compromise.

KernelRootkit

Kernel mode rootkit signatures.

Kubernetes

Kubernetes-related attributes.

Label

Label represents a generic name=value label. Label has separate name and value fields to support filtering with contains().

ListAssetsResponse

Response message for listing assets.

ListAssetsResult

Result containing the Asset and its State.

ListBigQueryExportsResponse

Response message for listing BigQuery exports.

ListFindingsResponse

Response message for listing findings.

ListFindingsResult

Result containing the Finding and its StateChange.

ListMuteConfigsResponse

Response message for listing mute configs.

ListNotificationConfigsResponse

Response message for listing notification configs.

ListOperationsResponse

The response message for Operations.ListOperations.

ListSourcesResponse

Response message for listing sources.

MemoryHashSignature

A signature corresponding to memory page hashes.

MitreAttack

MITRE ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org

Node

Kubernetes Nodes associated with the finding.

NodePool

Provides GKE Node Pool information.

NotificationConfig

Cloud Security Command Center (Cloud SCC) notification configs. A notification config is a Cloud SCC resource that contains the configuration to send notifications for create/update events of findings, assets and etc.

Operation

This resource represents a long-running operation that is the result of a network API call.

OrganizationSettings

User specified settings that are attached to the Security Command Center organization.

PathNode

Represents one point that an attacker passes through in this exposure path.

Pod

Kubernetes Pod.

Policy

An Identity and Access Management (IAM) policy, which specifies access controls for Google Cloud resources. A Policy is a collection of bindings. A binding binds one or more members, or principals, to a single role. Principals can be user accounts, service accounts, Google groups, and domains (such as G Suite). A role is a named list of permissions; each role can be an IAM predefined role or a user-created custom role. For some types of Google Cloud resources, a binding can also specify a condition, which is a logical expression that allows access to a resource only if the expression evaluates to true. A condition can add constraints based on attributes of the request, the resource, or both. To learn which resources support conditions in their IAM policies, see the IAM documentation. JSON example: { "bindings": [ { "role": "roles/resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@appspot.gserviceaccount.com" ] }, { "role": "roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com" ], "condition": { "title": "expirable access", "description": "Does not grant access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag": "BwWWja0YfJA=", "version": 3 } YAML example: bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a description of IAM and its features, see the IAM documentation.

Process

Represents an operating system process.

ProcessSignature

Indicates what signature matched this process.

Reference

Additional Links

Resource

Information related to the Google Cloud resource that is associated with this finding.

Role

Kubernetes Role or ClusterRole.

RunAssetDiscoveryRequest

Request message for running asset discovery for an organization.

SecurityCenterProperties

Security Command Center managed properties. These properties are managed by Security Command Center and cannot be modified by the user.

SecurityMarks

User specified security marks that are attached to the parent Security Command Center resource. Security marks are scoped within a Security Command Center organization -- they can be modified and viewed by all users who have proper permissions on the organization.

ServiceAccountDelegationInfo

Identity delegation history of an authenticated service account.

SetFindingStateRequest

Request message for updating a finding's state.

SetIamPolicyRequest

Request message for SetIamPolicy method.

SetMuteRequest

Request message for updating a finding's mute status.

Source

Security Command Center finding source. A finding source is an entity or a mechanism that can produce a finding. A source is like a container of findings that come from the same scanner, logger, monitor, and other tools.

Status

The Status type defines a logical error model that is suitable for different programming environments, including REST APIs and RPC APIs. It is used by gRPC. Each Status message contains three pieces of data: error code, error message, and error details. You can find out more about this error model and how to work with it in the API Design Guide.

StreamingConfig

The config for streaming-based notifications, which send each event as soon as it is detected.

Subject

Represents a Kubernetes Subject.

TestIamPermissionsRequest

Request message for TestIamPermissions method.

TestIamPermissionsResponse

Response message for TestIamPermissions method.

Vulnerability

Refers to common vulnerability fields e.g. cve, cvss, cwe etc.

YaraRuleSignature

A signature corresponding to a YARA rule.

In This Article
Back to top Generated by DocFX