Namespace Google.Apis.SecurityCommandCenter.v1beta1.Data
Classes
Access
Represents an access event.
AccessReview
Conveys information about a Kubernetes access review (such as one returned by a kubectl auth can-i
command)
that was involved in a finding.
AdaptiveProtection
Information about Google Cloud Armor Adaptive Protection.
Application
Represents an application associated with a finding.
Asset
Security Command Center representation of a Google Cloud resource. The Asset is a Security Command Center resource that captures information about a single Google Cloud resource. All modifications to an Asset are only within the context of Security Command Center and don't affect the referenced Google Cloud resource.
AssetDiscoveryConfig
The configuration used for Asset Discovery runs.
Attack
Information about DDoS attack volume and classification.
AttackExposure
An attack exposure contains the results of an attack path simulation run.
AuditConfig
Specifies the audit configuration for a service. The configuration determines which permission types are logged,
and what identities, if any, are exempted from logging. An AuditConfig must have one or more AuditLogConfigs. If
there are AuditConfigs for both allServices
and a specific service, the union of the two AuditConfigs is used
for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each
AuditLogConfig are exempted. Example Policy with multiple AuditConfigs: { "audit_configs": [ { "service":
"allServices", "audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [ "user:jose@example.com" ]
}, { "log_type": "DATA_WRITE" }, { "log_type": "ADMIN_READ" } ] }, { "service": "sampleservice.googleapis.com",
"audit_log_configs": [ { "log_type": "DATA_READ" }, { "log_type": "DATA_WRITE", "exempted_members": [
"user:aliya@example.com" ] } ] } ] } For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
logging. It also exempts jose@example.com
from DATA_READ logging, and aliya@example.com
from DATA_WRITE
logging.
AuditLogConfig
Provides the configuration for logging a type of permissions. Example: { "audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [ "user:jose@example.com" ] }, { "log_type": "DATA_WRITE" } ] } This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting jose@example.com from DATA_READ logging.
AwsAccount
An AWS account that is a member of an organization.
AwsMetadata
AWS metadata associated with the resource, only applicable if the finding's cloud provider is Amazon Web Services.
AwsOrganization
An organization is a collection of accounts that are centrally managed together using consolidated billing, organized hierarchically with organizational units (OUs), and controlled with policies.
AwsOrganizationalUnit
An Organizational Unit (OU) is a container of AWS accounts within a root of an organization. Policies that are attached to an OU apply to all accounts contained in that OU and in any child OUs.
AzureManagementGroup
Represents an Azure management group.
AzureMetadata
Azure metadata associated with the resource, only applicable if the finding's cloud provider is Microsoft Azure.
AzureResourceGroup
Represents an Azure resource group.
AzureSubscription
Represents an Azure subscription.
AzureTenant
Represents a Microsoft Entra tenant.
BackupDisasterRecovery
Information related to Google Cloud Backup and DR Service findings.
Binding
Associates members
, or principals, with a role
.
CancelOperationRequest
The request message for Operations.CancelOperation.
CloudArmor
Fields related to Google Cloud Armor findings.
CloudDlpDataProfile
The data profile associated with the finding.
CloudDlpInspection
Details about the Cloud Data Loss Prevention (Cloud DLP) inspection job that produced the finding.
CloudLoggingEntry
Metadata taken from a Cloud Logging LogEntry
Compliance
Contains compliance information about a security standard indicating unmet recommendations.
ComplianceSnapshot
Result containing the properties and count of a ComplianceSnapshot request.
Connection
Contains information about the IP connection associated with the finding.
Contact
The email address of a contact.
ContactDetails
Details about specific contacts
Container
Container associated with the finding.
Cve
CVE stands for Common Vulnerabilities and Exposures. Information from the CVE record that describes this vulnerability.
Cvssv3
Common Vulnerability Scoring System version 3.
DataAccessEvent
Details about a data access attempt made by a principal not authorized under applicable data security policy.
DataFlowEvent
Details about a data flow event, in which either the data is moved to or is accessed from a non-compliant geo-location, as defined in the applicable data security policy.
Database
Represents database access information, such as queries. A database may be a sub-resource of an instance (as in the case of Cloud SQL instances or Cloud Spanner instances), or the database instance itself. Some database resources might not have the full resource name populated because these resource types, such as Cloud SQL databases, are not yet supported by Cloud Asset Inventory. In these cases only the display name is provided.
Detection
Memory hash detection contributing to the binary family match.
Disk
Contains information about the disk associated with the finding.
DiskPath
Path of the file in terms of underlying disk/partition identifiers.
DynamicMuteRecord
The record of a dynamic mute rule that matches the finding.
Empty
A generic empty message that you can re-use to avoid defining duplicated empty messages in your APIs. A typical example is to use it as the request or the response type of an API method. For instance: service Foo { rpc Bar(google.protobuf.Empty) returns (google.protobuf.Empty); }
EnvironmentVariable
A name-value pair representing an environment variable used in an operating system process.
ExfilResource
Resource where data was exfiltrated from or exfiltrated to.
Exfiltration
Exfiltration represents a data exfiltration attempt from one or more sources to one or more targets. The
sources
attribute lists the sources of the exfiltrated data. The targets
attribute lists the destinations
the data was copied to.
Expr
Represents a textual expression in the Common Expression Language (CEL) syntax. CEL is a C-like expression language. The syntax and semantics of CEL are documented at https://github.com/google/cel-spec. Example (Comparison): title: "Summary size limit" description: "Determines if a summary is less than 100 chars" expression: "document.summary.size() < 100" Example (Equality): title: "Requestor is owner" description: "Determines if requestor is the document owner" expression: "document.owner == request.auth.claims.email" Example (Logic): title: "Public documents" description: "Determine whether the document should be publicly visible" expression: "document.type != 'private' && document.type != 'internal'" Example (Data Manipulation): title: "Notification string" description: "Create a notification string with a timestamp." expression: "'New message received at ' + string(document.create_time)" The exact variables and functions that may be referenced within an expression are determined by the service that evaluates it. See the service documentation for additional information.
File
File information about the related binary/library used by an executable, or the script used by a script interpreter
Finding
Security Command Center finding. A finding is a record of assessment data like security, risk, health, or privacy, that is ingested into Security Command Center for presentation, notification, analysis, policy testing, and enforcement. For example, a cross-site scripting (XSS) vulnerability in an App Engine application is a finding.
Folder
Message that contains the resource name and display name of a folder resource.
GcpMetadata
GCP metadata associated with the resource, only applicable if the finding's cloud provider is Google Cloud Platform.
Geolocation
Represents a geographical location for a given access.
GetIamPolicyRequest
Request message for GetIamPolicy
method.
GetPolicyOptions
Encapsulates settings provided to GetIamPolicy.
GoogleCloudSecuritycenterV1BigQueryExport
Configures how to deliver Findings to BigQuery Instance.
GoogleCloudSecuritycenterV1Binding
Represents a Kubernetes RoleBinding or ClusterRoleBinding.
GoogleCloudSecuritycenterV1BulkMuteFindingsResponse
The response to a BulkMute request. Contains the LRO information.
GoogleCloudSecuritycenterV1CustomConfig
Defines the properties in a custom module configuration for Security Health Analytics. Use the custom module configuration to create custom detectors that generate custom findings for resources that you specify.
GoogleCloudSecuritycenterV1CustomOutputSpec
A set of optional name-value pairs that define custom source properties to return with each finding that is
generated by the custom module. The custom source properties that are defined here are included in the finding
JSON under sourceProperties
.
GoogleCloudSecuritycenterV1EffectiveSecurityHealthAnalyticsCustomModule
An EffectiveSecurityHealthAnalyticsCustomModule is the representation of a Security Health Analytics custom
module at a specified level of the resource hierarchy: organization, folder, or project. If a custom module is
inherited from a parent organization or folder, the value of the enablementState
property in
EffectiveSecurityHealthAnalyticsCustomModule is set to the value that is effective in the parent, instead of
INHERITED
. For example, if the module is enabled in a parent organization or folder, the effective
enablement_state for the module in all child folders or projects is also enabled
.
EffectiveSecurityHealthAnalyticsCustomModule is read-only.
GoogleCloudSecuritycenterV1ExternalSystem
Representation of third party SIEM/SOAR fields within SCC.
GoogleCloudSecuritycenterV1MuteConfig
A mute config is a Cloud SCC resource that contains the configuration to mute create/update events of findings.
GoogleCloudSecuritycenterV1NotificationMessage
Cloud SCC's Notification
GoogleCloudSecuritycenterV1Property
An individual name-value pair that defines a custom source property.
GoogleCloudSecuritycenterV1Resource
Information related to the Google Cloud resource.
GoogleCloudSecuritycenterV1ResourceSelector
Resource for selecting resource type.
GoogleCloudSecuritycenterV1ResourceValueConfig
A resource value configuration (RVC) is a mapping configuration of user's resources to resource values. Used in Attack path simulations.
GoogleCloudSecuritycenterV1RunAssetDiscoveryResponse
Response of asset discovery run
GoogleCloudSecuritycenterV1SecurityHealthAnalyticsCustomModule
Represents an instance of a Security Health Analytics custom module, including its full module name, display name, enablement state, and last updated time. You can create a custom module at the organization, folder, or project level. Custom modules that you create at the organization or folder level are inherited by the child folders and projects.
GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping
Resource value mapping for Sensitive Data Protection findings. If any of these mappings have a resource value that is not unspecified, the resource_value field will be ignored when reading this configuration.
GoogleCloudSecuritycenterV1beta1Finding
Security Command Center finding. A finding is a record of assessment data (security, risk, health or privacy) ingested into Security Command Center for presentation, notification, analysis, policy testing, and enforcement. For example, an XSS vulnerability in an App Engine application is a finding.
GoogleCloudSecuritycenterV1beta1RunAssetDiscoveryResponse
Response of asset discovery run
GoogleCloudSecuritycenterV1beta1SecurityMarks
User specified security marks that are attached to the parent Security Command Center resource. Security marks are scoped within a Security Command Center organization -- they can be modified and viewed by all users who have proper permissions on the organization.
GoogleCloudSecuritycenterV1p1beta1Finding
Security Command Center finding. A finding is a record of assessment data (security, risk, health or privacy) ingested into Security Command Center for presentation, notification, analysis, policy testing, and enforcement. For example, an XSS vulnerability in an App Engine application is a finding.
GoogleCloudSecuritycenterV1p1beta1Folder
Message that contains the resource name and display name of a folder resource.
GoogleCloudSecuritycenterV1p1beta1NotificationMessage
Security Command Center's Notification
GoogleCloudSecuritycenterV1p1beta1Resource
Information related to the Google Cloud resource.
GoogleCloudSecuritycenterV1p1beta1RunAssetDiscoveryResponse
Response of asset discovery run
GoogleCloudSecuritycenterV1p1beta1SecurityMarks
User specified security marks that are attached to the parent Security Command Center resource. Security marks are scoped within a Security Command Center organization -- they can be modified and viewed by all users who have proper permissions on the organization.
GoogleCloudSecuritycenterV2Access
Represents an access event.
GoogleCloudSecuritycenterV2AccessReview
Conveys information about a Kubernetes access review (such as one returned by a kubectl auth can-i
command)
that was involved in a finding.
GoogleCloudSecuritycenterV2AdaptiveProtection
Information about Google Cloud Armor Adaptive Protection.
GoogleCloudSecuritycenterV2Application
Represents an application associated with a finding.
GoogleCloudSecuritycenterV2Attack
Information about DDoS attack volume and classification.
GoogleCloudSecuritycenterV2AttackExposure
An attack exposure contains the results of an attack path simulation run.
GoogleCloudSecuritycenterV2AwsAccount
An AWS account that is a member of an organization.
GoogleCloudSecuritycenterV2AwsMetadata
AWS metadata associated with the resource, only applicable if the finding's cloud provider is Amazon Web Services.
GoogleCloudSecuritycenterV2AwsOrganization
An organization is a collection of accounts that are centrally managed together using consolidated billing, organized hierarchically with organizational units (OUs), and controlled with policies.
GoogleCloudSecuritycenterV2AwsOrganizationalUnit
An Organizational Unit (OU) is a container of AWS accounts within a root of an organization. Policies that are attached to an OU apply to all accounts contained in that OU and in any child OUs.
GoogleCloudSecuritycenterV2AzureManagementGroup
Represents an Azure management group.
GoogleCloudSecuritycenterV2AzureMetadata
Azure metadata associated with the resource, only applicable if the finding's cloud provider is Microsoft Azure.
GoogleCloudSecuritycenterV2AzureResourceGroup
Represents an Azure resource group.
GoogleCloudSecuritycenterV2AzureSubscription
Represents an Azure subscription.
GoogleCloudSecuritycenterV2AzureTenant
Represents a Microsoft Entra tenant.
GoogleCloudSecuritycenterV2BackupDisasterRecovery
Information related to Google Cloud Backup and DR Service findings.
GoogleCloudSecuritycenterV2BigQueryExport
Configures how to deliver Findings to BigQuery Instance.
GoogleCloudSecuritycenterV2Binding
Represents a Kubernetes RoleBinding or ClusterRoleBinding.
GoogleCloudSecuritycenterV2BulkMuteFindingsResponse
The response to a BulkMute request. Contains the LRO information.
GoogleCloudSecuritycenterV2CloudArmor
Fields related to Google Cloud Armor findings.
GoogleCloudSecuritycenterV2CloudDlpDataProfile
The data profile associated with the finding.
GoogleCloudSecuritycenterV2CloudDlpInspection
Details about the Cloud Data Loss Prevention (Cloud DLP) inspection job that produced the finding.
GoogleCloudSecuritycenterV2CloudLoggingEntry
Metadata taken from a Cloud Logging LogEntry
GoogleCloudSecuritycenterV2Compliance
Contains compliance information about a security standard indicating unmet recommendations.
GoogleCloudSecuritycenterV2Connection
Contains information about the IP connection associated with the finding.
GoogleCloudSecuritycenterV2Contact
The email address of a contact.
GoogleCloudSecuritycenterV2ContactDetails
Details about specific contacts
GoogleCloudSecuritycenterV2Container
Container associated with the finding.
GoogleCloudSecuritycenterV2Cve
CVE stands for Common Vulnerabilities and Exposures. Information from the CVE record that describes this vulnerability.
GoogleCloudSecuritycenterV2Cvssv3
Common Vulnerability Scoring System version 3.
GoogleCloudSecuritycenterV2DataAccessEvent
Details about a data access attempt made by a principal not authorized under applicable data security policy.
GoogleCloudSecuritycenterV2DataFlowEvent
Details about a data flow event, in which either the data is moved to or is accessed from a non-compliant geo-location, as defined in the applicable data security policy.
GoogleCloudSecuritycenterV2Database
Represents database access information, such as queries. A database may be a sub-resource of an instance (as in the case of Cloud SQL instances or Cloud Spanner instances), or the database instance itself. Some database resources might not have the full resource name populated because these resource types, such as Cloud SQL databases, are not yet supported by Cloud Asset Inventory. In these cases only the display name is provided.
GoogleCloudSecuritycenterV2Detection
Memory hash detection contributing to the binary family match.
GoogleCloudSecuritycenterV2Disk
Contains information about the disk associated with the finding.
GoogleCloudSecuritycenterV2DiskPath
Path of the file in terms of underlying disk/partition identifiers.
GoogleCloudSecuritycenterV2DynamicMuteRecord
The record of a dynamic mute rule that matches the finding.
GoogleCloudSecuritycenterV2EnvironmentVariable
A name-value pair representing an environment variable used in an operating system process.
GoogleCloudSecuritycenterV2ExfilResource
Resource where data was exfiltrated from or exfiltrated to.
GoogleCloudSecuritycenterV2Exfiltration
Exfiltration represents a data exfiltration attempt from one or more sources to one or more targets. The
sources
attribute lists the sources of the exfiltrated data. The targets
attribute lists the destinations
the data was copied to.
GoogleCloudSecuritycenterV2ExternalSystem
Representation of third party SIEM/SOAR fields within SCC.
GoogleCloudSecuritycenterV2File
File information about the related binary/library used by an executable, or the script used by a script interpreter
GoogleCloudSecuritycenterV2Finding
Security Command Center finding. A finding is a record of assessment data like security, risk, health, or privacy, that is ingested into Security Command Center for presentation, notification, analysis, policy testing, and enforcement. For example, a cross-site scripting (XSS) vulnerability in an App Engine application is a finding.
GoogleCloudSecuritycenterV2Folder
Message that contains the resource name and display name of a folder resource.
GoogleCloudSecuritycenterV2Geolocation
Represents a geographical location for a given access.
GoogleCloudSecuritycenterV2GroupMembership
Contains details about groups of which this finding is a member. A group is a collection of findings that are related in some way.
GoogleCloudSecuritycenterV2IamBinding
Represents a particular IAM binding, which captures a member's role addition, removal, or state.
GoogleCloudSecuritycenterV2Indicator
Represents what's commonly known as an indicator of compromise (IoC) in computer forensics. This is an artifact observed on a network or in an operating system that, with high confidence, indicates a computer intrusion. For more information, see Indicator of compromise.
GoogleCloudSecuritycenterV2KernelRootkit
Kernel mode rootkit signatures.
GoogleCloudSecuritycenterV2Kubernetes
Kubernetes-related attributes.
GoogleCloudSecuritycenterV2Label
Represents a generic name-value label. A label has separate name and value fields to support filtering with the
contains()
function. For more information, see Filtering on array-type
fields.
GoogleCloudSecuritycenterV2LoadBalancer
Contains information related to the load balancer associated with the finding.
GoogleCloudSecuritycenterV2LogEntry
An individual entry in a log.
GoogleCloudSecuritycenterV2MemoryHashSignature
A signature corresponding to memory page hashes.
GoogleCloudSecuritycenterV2MitreAttack
MITRE ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org
GoogleCloudSecuritycenterV2MuteConfig
A mute config is a Cloud SCC resource that contains the configuration to mute create/update events of findings.
GoogleCloudSecuritycenterV2MuteInfo
Mute information about the finding, including whether the finding has a static mute or any matching dynamic mute rules.
GoogleCloudSecuritycenterV2Node
Kubernetes nodes associated with the finding.
GoogleCloudSecuritycenterV2NodePool
Provides GKE node pool information.
GoogleCloudSecuritycenterV2Notebook
Represents a Jupyter notebook IPYNB file, such as a Colab Enterprise notebook file, that is associated with a finding.
GoogleCloudSecuritycenterV2NotificationMessage
Cloud SCC's Notification
GoogleCloudSecuritycenterV2Object
Kubernetes object related to the finding, uniquely identified by GKNN. Used if the object Kind is not one of Pod, Node, NodePool, Binding, or AccessReview.
GoogleCloudSecuritycenterV2OrgPolicy
Contains information about the org policies associated with the finding.
GoogleCloudSecuritycenterV2Package
Package is a generic definition of a package.
GoogleCloudSecuritycenterV2Pod
A Kubernetes Pod.
GoogleCloudSecuritycenterV2PolicyDriftDetails
The policy field that violates the deployed posture and its expected and detected values.
GoogleCloudSecuritycenterV2Process
Represents an operating system process.
GoogleCloudSecuritycenterV2ProcessSignature
Indicates what signature matched this process.
GoogleCloudSecuritycenterV2Reference
Additional Links
GoogleCloudSecuritycenterV2Requests
Information about the requests relevant to the finding.
GoogleCloudSecuritycenterV2Resource
Information related to the Google Cloud resource.
GoogleCloudSecuritycenterV2ResourcePath
Represents the path of resources leading up to the resource this finding is about.
GoogleCloudSecuritycenterV2ResourcePathNode
A node within the resource path. Each node represents a resource within the resource hierarchy.
GoogleCloudSecuritycenterV2ResourceValueConfig
A resource value configuration (RVC) is a mapping configuration of user's resources to resource values. Used in Attack path simulations.
GoogleCloudSecuritycenterV2Role
Kubernetes Role or ClusterRole.
GoogleCloudSecuritycenterV2SecurityBulletin
SecurityBulletin are notifications of vulnerabilities of Google products.
GoogleCloudSecuritycenterV2SecurityMarks
User specified security marks that are attached to the parent Security Command Center resource. Security marks are scoped within a Security Command Center organization -- they can be modified and viewed by all users who have proper permissions on the organization.
GoogleCloudSecuritycenterV2SecurityPolicy
Information about the Google Cloud Armor security policy relevant to the finding.
GoogleCloudSecuritycenterV2SecurityPosture
Represents a posture that is deployed on Google Cloud by the Security Command Center Posture Management service. A posture contains one or more policy sets. A policy set is a group of policies that enforce a set of security rules on Google Cloud.
GoogleCloudSecuritycenterV2SensitiveDataProtectionMapping
Resource value mapping for Sensitive Data Protection findings If any of these mappings have a resource value that is not unspecified, the resource_value field will be ignored when reading this configuration.
GoogleCloudSecuritycenterV2ServiceAccountDelegationInfo
Identity delegation history of an authenticated service account.
GoogleCloudSecuritycenterV2StaticMute
Information about the static mute state. A static mute state overrides any dynamic mute rules that apply to this finding. The static mute state can be set by a static mute rule or by muting the finding directly.
GoogleCloudSecuritycenterV2Subject
Represents a Kubernetes subject.
GoogleCloudSecuritycenterV2TicketInfo
Information about the ticket, if any, that is being used to track the resolution of the issue that is identified by this finding.
GoogleCloudSecuritycenterV2ToxicCombination
Contains details about a group of security issues that, when the issues occur together, represent a greater risk than when the issues occur independently. A group of such issues is referred to as a toxic combination.
GoogleCloudSecuritycenterV2Vulnerability
Refers to common vulnerability fields e.g. cve, cvss, cwe etc.
GoogleCloudSecuritycenterV2YaraRuleSignature
A signature corresponding to a YARA rule.
GroupAssetsRequest
Request message for grouping by assets.
GroupAssetsResponse
Response message for grouping by assets.
GroupFindingsRequest
Request message for grouping by findings.
GroupFindingsResponse
Response message for group by findings.
GroupMembership
Contains details about groups of which this finding is a member. A group is a collection of findings that are related in some way.
GroupResult
Result containing the properties and count of a groupBy request.
IamBinding
Represents a particular IAM binding, which captures a member's role addition, removal, or state.
Indicator
Represents what's commonly known as an indicator of compromise (IoC) in computer forensics. This is an artifact observed on a network or in an operating system that, with high confidence, indicates a computer intrusion. For more information, see Indicator of compromise.
KernelRootkit
Kernel mode rootkit signatures.
Kubernetes
Kubernetes-related attributes.
Label
Represents a generic name-value label. A label has separate name and value fields to support filtering with the
contains()
function. For more information, see Filtering on array-type
fields.
ListAssetsResponse
Response message for listing assets.
ListAssetsResult
Result containing the Asset and its State.
ListFindingsResponse
Response message for listing findings.
ListOperationsResponse
The response message for Operations.ListOperations.
ListSourcesResponse
Response message for listing sources.
LoadBalancer
Contains information related to the load balancer associated with the finding.
LogEntry
An individual entry in a log.
MemoryHashSignature
A signature corresponding to memory page hashes.
MitreAttack
MITRE ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org
MuteInfo
Mute information about the finding, including whether the finding has a static mute or any matching dynamic mute rules.
Node
Kubernetes nodes associated with the finding.
NodePool
Provides GKE node pool information.
Notebook
Represents a Jupyter notebook IPYNB file, such as a Colab Enterprise notebook file, that is associated with a finding.
Object
Kubernetes object related to the finding, uniquely identified by GKNN. Used if the object Kind is not one of Pod, Node, NodePool, Binding, or AccessReview.
Operation
This resource represents a long-running operation that is the result of a network API call.
OrgPolicy
Contains information about the org policies associated with the finding.
OrganizationSettings
User specified settings that are attached to the Security Command Center organization.
Package
Package is a generic definition of a package.
Pod
A Kubernetes Pod.
Policy
An Identity and Access Management (IAM) policy, which specifies access controls for Google Cloud resources. A
Policy
is a collection of bindings
. A binding
binds one or more members
, or principals, to a single
role
. Principals can be user accounts, service accounts, Google groups, and domains (such as G Suite). A
role
is a named list of permissions; each role
can be an IAM predefined role or a user-created custom role.
For some types of Google Cloud resources, a binding
can also specify a condition
, which is a logical
expression that allows access to a resource only if the expression evaluates to true
. A condition can add
constraints based on attributes of the request, the resource, or both. To learn which resources support
conditions in their IAM policies, see the IAM
documentation. JSON example:
{
"bindings": [ { "role": "roles/resourcemanager.organizationAdmin", "members": [ "user:mike@example.com",
"group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@appspot.gserviceaccount.com" ] },
{ "role": "roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com" ], "condition": {
"title": "expirable access", "description": "Does not grant access after Sep 2020", "expression": "request.time
< timestamp('2020-10-01T00:00:00.000Z')", } } ], "etag": "BwWWja0YfJA=", "version": 3 }
YAML example:
bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com -
serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin -
members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable
access description: Does not grant access after Sep 2020 expression: request.time <
timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3
For a description of IAM and its features, see the IAM documentation.
PolicyDriftDetails
The policy field that violates the deployed posture and its expected and detected values.
Process
Represents an operating system process.
ProcessSignature
Indicates what signature matched this process.
Reference
Additional Links
Requests
Information about the requests relevant to the finding.
ResourcePath
Represents the path of resources leading up to the resource this finding is about.
ResourcePathNode
A node within the resource path. Each node represents a resource within the resource hierarchy.
Role
Kubernetes Role or ClusterRole.
RunAssetDiscoveryRequest
Request message for running asset discovery for an organization.
SecurityBulletin
SecurityBulletin are notifications of vulnerabilities of Google products.
SecurityCenterProperties
Security Command Center managed properties. These properties are managed by Security Command Center and cannot be modified by the user.
SecurityMarks
User specified security marks that are attached to the parent Security Command Center resource. Security marks are scoped within a Security Command Center organization -- they can be modified and viewed by all users who have proper permissions on the organization.
SecurityPolicy
Information about the Google Cloud Armor security policy relevant to the finding.
SecurityPosture
Represents a posture that is deployed on Google Cloud by the Security Command Center Posture Management service. A posture contains one or more policy sets. A policy set is a group of policies that enforce a set of security rules on Google Cloud.
ServiceAccountDelegationInfo
Identity delegation history of an authenticated service account.
SetFindingStateRequest
Request message for updating a finding's state.
SetIamPolicyRequest
Request message for SetIamPolicy
method.
Source
Security Command Center finding source. A finding source is an entity or a mechanism that can produce a finding. A source is like a container of findings that come from the same scanner, logger, monitor, etc.
StaticMute
Information about the static mute state. A static mute state overrides any dynamic mute rules that apply to this finding. The static mute state can be set by a static mute rule or by muting the finding directly.
Status
The Status
type defines a logical error model that is suitable for different programming environments,
including REST APIs and RPC APIs. It is used by gRPC. Each Status
message contains
three pieces of data: error code, error message, and error details. You can find out more about this error model
and how to work with it in the API Design Guide.
Subject
Represents a Kubernetes subject.
TestIamPermissionsRequest
Request message for TestIamPermissions
method.
TestIamPermissionsResponse
Response message for TestIamPermissions
method.
TicketInfo
Information about the ticket, if any, that is being used to track the resolution of the issue that is identified by this finding.
ToxicCombination
Contains details about a group of security issues that, when the issues occur together, represent a greater risk than when the issues occur independently. A group of such issues is referred to as a toxic combination.
Vulnerability
Refers to common vulnerability fields e.g. cve, cvss, cwe etc.
VulnerabilityCountBySeverity
Vulnerability count by severity.
VulnerabilitySnapshot
Result containing the properties and count of a VulnerabilitySnapshot request.
YaraRuleSignature
A signature corresponding to a YARA rule.