Namespace Google.Apis.SecurityCommandCenter.v1beta2.Data
Classes
Access
Represents an access event.
AccessReview
Conveys information about a Kubernetes access review (such as one returned by a kubectl auth can-i
command)
that was involved in a finding.
AdaptiveProtection
Information about Google Cloud Armor Adaptive Protection.
Application
Represents an application associated with a finding.
Attack
Information about DDoS attack volume and classification.
AttackExposure
An attack exposure contains the results of an attack path simulation run.
AwsAccount
An AWS account that is a member of an organization.
AwsMetadata
AWS metadata associated with the resource, only applicable if the finding's cloud provider is Amazon Web Services.
AwsOrganization
An organization is a collection of accounts that are centrally managed together using consolidated billing, organized hierarchically with organizational units (OUs), and controlled with policies.
AwsOrganizationalUnit
An Organizational Unit (OU) is a container of AWS accounts within a root of an organization. Policies that are attached to an OU apply to all accounts contained in that OU and in any child OUs.
AzureManagementGroup
Represents an Azure management group.
AzureMetadata
Azure metadata associated with the resource, only applicable if the finding's cloud provider is Microsoft Azure.
AzureResourceGroup
Represents an Azure resource group.
AzureSubscription
Represents an Azure subscription.
AzureTenant
Represents a Microsoft Entra tenant.
BackupDisasterRecovery
Information related to Google Cloud Backup and DR Service findings.
CloudArmor
Fields related to Google Cloud Armor findings.
CloudDlpDataProfile
The data profile associated with the finding.
CloudDlpInspection
Details about the Cloud Data Loss Prevention (Cloud DLP) inspection job that produced the finding.
CloudLoggingEntry
Metadata taken from a Cloud Logging LogEntry
Compliance
Contains compliance information about a security standard indicating unmet recommendations.
ComplianceSnapshot
Result containing the properties and count of a ComplianceSnapshot request.
Config
Configuration of a module.
Connection
Contains information about the IP connection associated with the finding.
Contact
The email address of a contact.
ContactDetails
Details about specific contacts
Container
Container associated with the finding.
ContainerThreatDetectionSettings
Resource capturing the settings for the Container Threat Detection service.
Cve
CVE stands for Common Vulnerabilities and Exposures. Information from the CVE record that describes this vulnerability.
Cvssv3
Common Vulnerability Scoring System version 3.
DataAccessEvent
Details about a data access attempt made by a principal not authorized under applicable data security policy.
DataFlowEvent
Details about a data flow event, in which either the data is moved to or is accessed from a non-compliant geo-location, as defined in the applicable data security policy.
Database
Represents database access information, such as queries. A database may be a sub-resource of an instance (as in the case of Cloud SQL instances or Cloud Spanner instances), or the database instance itself. Some database resources might not have the full resource name populated because these resource types, such as Cloud SQL databases, are not yet supported by Cloud Asset Inventory. In these cases only the display name is provided.
Details
Details of a subscription.
Detection
Memory hash detection contributing to the binary family match.
Disk
Contains information about the disk associated with the finding.
DiskPath
Path of the file in terms of underlying disk/partition identifiers.
DynamicMuteRecord
The record of a dynamic mute rule that matches the finding.
EnvironmentVariable
A name-value pair representing an environment variable used in an operating system process.
EventThreatDetectionSettings
Resource capturing the settings for the Event Threat Detection service.
ExfilResource
Resource where data was exfiltrated from or exfiltrated to.
Exfiltration
Exfiltration represents a data exfiltration attempt from one or more sources to one or more targets. The
sources
attribute lists the sources of the exfiltrated data. The targets
attribute lists the destinations
the data was copied to.
Expr
Represents a textual expression in the Common Expression Language (CEL) syntax. CEL is a C-like expression language. The syntax and semantics of CEL are documented at https://github.com/google/cel-spec. Example (Comparison): title: "Summary size limit" description: "Determines if a summary is less than 100 chars" expression: "document.summary.size() < 100" Example (Equality): title: "Requestor is owner" description: "Determines if requestor is the document owner" expression: "document.owner == request.auth.claims.email" Example (Logic): title: "Public documents" description: "Determine whether the document should be publicly visible" expression: "document.type != 'private' && document.type != 'internal'" Example (Data Manipulation): title: "Notification string" description: "Create a notification string with a timestamp." expression: "'New message received at ' + string(document.create_time)" The exact variables and functions that may be referenced within an expression are determined by the service that evaluates it. See the service documentation for additional information.
File
File information about the related binary/library used by an executable, or the script used by a script interpreter
Finding
Security Command Center finding. A finding is a record of assessment data like security, risk, health, or privacy, that is ingested into Security Command Center for presentation, notification, analysis, policy testing, and enforcement. For example, a cross-site scripting (XSS) vulnerability in an App Engine application is a finding.
Folder
Message that contains the resource name and display name of a folder resource.
GcpMetadata
GCP metadata associated with the resource, only applicable if the finding's cloud provider is Google Cloud Platform.
Geolocation
Represents a geographical location for a given access.
GoogleCloudSecuritycenterV1BigQueryExport
Configures how to deliver Findings to BigQuery Instance.
GoogleCloudSecuritycenterV1Binding
Represents a Kubernetes RoleBinding or ClusterRoleBinding.
GoogleCloudSecuritycenterV1BulkMuteFindingsResponse
The response to a BulkMute request. Contains the LRO information.
GoogleCloudSecuritycenterV1CustomConfig
Defines the properties in a custom module configuration for Security Health Analytics. Use the custom module configuration to create custom detectors that generate custom findings for resources that you specify.
GoogleCloudSecuritycenterV1CustomOutputSpec
A set of optional name-value pairs that define custom source properties to return with each finding that is
generated by the custom module. The custom source properties that are defined here are included in the finding
JSON under sourceProperties
.
GoogleCloudSecuritycenterV1EffectiveSecurityHealthAnalyticsCustomModule
An EffectiveSecurityHealthAnalyticsCustomModule is the representation of a Security Health Analytics custom
module at a specified level of the resource hierarchy: organization, folder, or project. If a custom module is
inherited from a parent organization or folder, the value of the enablementState
property in
EffectiveSecurityHealthAnalyticsCustomModule is set to the value that is effective in the parent, instead of
INHERITED
. For example, if the module is enabled in a parent organization or folder, the effective
enablement_state for the module in all child folders or projects is also enabled
.
EffectiveSecurityHealthAnalyticsCustomModule is read-only.
GoogleCloudSecuritycenterV1ExternalSystem
Representation of third party SIEM/SOAR fields within SCC.
GoogleCloudSecuritycenterV1MuteConfig
A mute config is a Cloud SCC resource that contains the configuration to mute create/update events of findings.
GoogleCloudSecuritycenterV1NotificationMessage
Cloud SCC's Notification
GoogleCloudSecuritycenterV1Property
An individual name-value pair that defines a custom source property.
GoogleCloudSecuritycenterV1Resource
Information related to the Google Cloud resource.
GoogleCloudSecuritycenterV1ResourceSelector
Resource for selecting resource type.
GoogleCloudSecuritycenterV1ResourceValueConfig
A resource value configuration (RVC) is a mapping configuration of user's resources to resource values. Used in Attack path simulations.
GoogleCloudSecuritycenterV1RunAssetDiscoveryResponse
Response of asset discovery run
GoogleCloudSecuritycenterV1SecurityHealthAnalyticsCustomModule
Represents an instance of a Security Health Analytics custom module, including its full module name, display name, enablement state, and last updated time. You can create a custom module at the organization, folder, or project level. Custom modules that you create at the organization or folder level are inherited by the child folders and projects.
GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping
Resource value mapping for Sensitive Data Protection findings. If any of these mappings have a resource value that is not unspecified, the resource_value field will be ignored when reading this configuration.
GoogleCloudSecuritycenterV1beta1RunAssetDiscoveryResponse
Response of asset discovery run
GoogleCloudSecuritycenterV1p1beta1Finding
Security Command Center finding. A finding is a record of assessment data (security, risk, health or privacy) ingested into Security Command Center for presentation, notification, analysis, policy testing, and enforcement. For example, an XSS vulnerability in an App Engine application is a finding.
GoogleCloudSecuritycenterV1p1beta1Folder
Message that contains the resource name and display name of a folder resource.
GoogleCloudSecuritycenterV1p1beta1NotificationMessage
Security Command Center's Notification
GoogleCloudSecuritycenterV1p1beta1Resource
Information related to the Google Cloud resource.
GoogleCloudSecuritycenterV1p1beta1RunAssetDiscoveryResponse
Response of asset discovery run
GoogleCloudSecuritycenterV1p1beta1SecurityMarks
User specified security marks that are attached to the parent Security Command Center resource. Security marks are scoped within a Security Command Center organization -- they can be modified and viewed by all users who have proper permissions on the organization.
GoogleCloudSecuritycenterV2Access
Represents an access event.
GoogleCloudSecuritycenterV2AccessReview
Conveys information about a Kubernetes access review (such as one returned by a kubectl auth can-i
command)
that was involved in a finding.
GoogleCloudSecuritycenterV2AdaptiveProtection
Information about Google Cloud Armor Adaptive Protection.
GoogleCloudSecuritycenterV2Application
Represents an application associated with a finding.
GoogleCloudSecuritycenterV2Attack
Information about DDoS attack volume and classification.
GoogleCloudSecuritycenterV2AttackExposure
An attack exposure contains the results of an attack path simulation run.
GoogleCloudSecuritycenterV2AwsAccount
An AWS account that is a member of an organization.
GoogleCloudSecuritycenterV2AwsMetadata
AWS metadata associated with the resource, only applicable if the finding's cloud provider is Amazon Web Services.
GoogleCloudSecuritycenterV2AwsOrganization
An organization is a collection of accounts that are centrally managed together using consolidated billing, organized hierarchically with organizational units (OUs), and controlled with policies.
GoogleCloudSecuritycenterV2AwsOrganizationalUnit
An Organizational Unit (OU) is a container of AWS accounts within a root of an organization. Policies that are attached to an OU apply to all accounts contained in that OU and in any child OUs.
GoogleCloudSecuritycenterV2AzureManagementGroup
Represents an Azure management group.
GoogleCloudSecuritycenterV2AzureMetadata
Azure metadata associated with the resource, only applicable if the finding's cloud provider is Microsoft Azure.
GoogleCloudSecuritycenterV2AzureResourceGroup
Represents an Azure resource group.
GoogleCloudSecuritycenterV2AzureSubscription
Represents an Azure subscription.
GoogleCloudSecuritycenterV2AzureTenant
Represents a Microsoft Entra tenant.
GoogleCloudSecuritycenterV2BackupDisasterRecovery
Information related to Google Cloud Backup and DR Service findings.
GoogleCloudSecuritycenterV2BigQueryExport
Configures how to deliver Findings to BigQuery Instance.
GoogleCloudSecuritycenterV2Binding
Represents a Kubernetes RoleBinding or ClusterRoleBinding.
GoogleCloudSecuritycenterV2BulkMuteFindingsResponse
The response to a BulkMute request. Contains the LRO information.
GoogleCloudSecuritycenterV2CloudArmor
Fields related to Google Cloud Armor findings.
GoogleCloudSecuritycenterV2CloudDlpDataProfile
The data profile associated with the finding.
GoogleCloudSecuritycenterV2CloudDlpInspection
Details about the Cloud Data Loss Prevention (Cloud DLP) inspection job that produced the finding.
GoogleCloudSecuritycenterV2CloudLoggingEntry
Metadata taken from a Cloud Logging LogEntry
GoogleCloudSecuritycenterV2Compliance
Contains compliance information about a security standard indicating unmet recommendations.
GoogleCloudSecuritycenterV2Connection
Contains information about the IP connection associated with the finding.
GoogleCloudSecuritycenterV2Contact
The email address of a contact.
GoogleCloudSecuritycenterV2ContactDetails
Details about specific contacts
GoogleCloudSecuritycenterV2Container
Container associated with the finding.
GoogleCloudSecuritycenterV2Cve
CVE stands for Common Vulnerabilities and Exposures. Information from the CVE record that describes this vulnerability.
GoogleCloudSecuritycenterV2Cvssv3
Common Vulnerability Scoring System version 3.
GoogleCloudSecuritycenterV2DataAccessEvent
Details about a data access attempt made by a principal not authorized under applicable data security policy.
GoogleCloudSecuritycenterV2DataFlowEvent
Details about a data flow event, in which either the data is moved to or is accessed from a non-compliant geo-location, as defined in the applicable data security policy.
GoogleCloudSecuritycenterV2Database
Represents database access information, such as queries. A database may be a sub-resource of an instance (as in the case of Cloud SQL instances or Cloud Spanner instances), or the database instance itself. Some database resources might not have the full resource name populated because these resource types, such as Cloud SQL databases, are not yet supported by Cloud Asset Inventory. In these cases only the display name is provided.
GoogleCloudSecuritycenterV2Detection
Memory hash detection contributing to the binary family match.
GoogleCloudSecuritycenterV2Disk
Contains information about the disk associated with the finding.
GoogleCloudSecuritycenterV2DiskPath
Path of the file in terms of underlying disk/partition identifiers.
GoogleCloudSecuritycenterV2DynamicMuteRecord
The record of a dynamic mute rule that matches the finding.
GoogleCloudSecuritycenterV2EnvironmentVariable
A name-value pair representing an environment variable used in an operating system process.
GoogleCloudSecuritycenterV2ExfilResource
Resource where data was exfiltrated from or exfiltrated to.
GoogleCloudSecuritycenterV2Exfiltration
Exfiltration represents a data exfiltration attempt from one or more sources to one or more targets. The
sources
attribute lists the sources of the exfiltrated data. The targets
attribute lists the destinations
the data was copied to.
GoogleCloudSecuritycenterV2ExternalSystem
Representation of third party SIEM/SOAR fields within SCC.
GoogleCloudSecuritycenterV2File
File information about the related binary/library used by an executable, or the script used by a script interpreter
GoogleCloudSecuritycenterV2Finding
Security Command Center finding. A finding is a record of assessment data like security, risk, health, or privacy, that is ingested into Security Command Center for presentation, notification, analysis, policy testing, and enforcement. For example, a cross-site scripting (XSS) vulnerability in an App Engine application is a finding.
GoogleCloudSecuritycenterV2Folder
Message that contains the resource name and display name of a folder resource.
GoogleCloudSecuritycenterV2Geolocation
Represents a geographical location for a given access.
GoogleCloudSecuritycenterV2GroupMembership
Contains details about groups of which this finding is a member. A group is a collection of findings that are related in some way.
GoogleCloudSecuritycenterV2IamBinding
Represents a particular IAM binding, which captures a member's role addition, removal, or state.
GoogleCloudSecuritycenterV2Indicator
Represents what's commonly known as an indicator of compromise (IoC) in computer forensics. This is an artifact observed on a network or in an operating system that, with high confidence, indicates a computer intrusion. For more information, see Indicator of compromise.
GoogleCloudSecuritycenterV2KernelRootkit
Kernel mode rootkit signatures.
GoogleCloudSecuritycenterV2Kubernetes
Kubernetes-related attributes.
GoogleCloudSecuritycenterV2Label
Represents a generic name-value label. A label has separate name and value fields to support filtering with the
contains()
function. For more information, see Filtering on array-type
fields.
GoogleCloudSecuritycenterV2LoadBalancer
Contains information related to the load balancer associated with the finding.
GoogleCloudSecuritycenterV2LogEntry
An individual entry in a log.
GoogleCloudSecuritycenterV2MemoryHashSignature
A signature corresponding to memory page hashes.
GoogleCloudSecuritycenterV2MitreAttack
MITRE ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org
GoogleCloudSecuritycenterV2MuteConfig
A mute config is a Cloud SCC resource that contains the configuration to mute create/update events of findings.
GoogleCloudSecuritycenterV2MuteInfo
Mute information about the finding, including whether the finding has a static mute or any matching dynamic mute rules.
GoogleCloudSecuritycenterV2Node
Kubernetes nodes associated with the finding.
GoogleCloudSecuritycenterV2NodePool
Provides GKE node pool information.
GoogleCloudSecuritycenterV2Notebook
Represents a Jupyter notebook IPYNB file, such as a Colab Enterprise notebook file, that is associated with a finding.
GoogleCloudSecuritycenterV2NotificationMessage
Cloud SCC's Notification
GoogleCloudSecuritycenterV2Object
Kubernetes object related to the finding, uniquely identified by GKNN. Used if the object Kind is not one of Pod, Node, NodePool, Binding, or AccessReview.
GoogleCloudSecuritycenterV2OrgPolicy
Contains information about the org policies associated with the finding.
GoogleCloudSecuritycenterV2Package
Package is a generic definition of a package.
GoogleCloudSecuritycenterV2Pod
A Kubernetes Pod.
GoogleCloudSecuritycenterV2PolicyDriftDetails
The policy field that violates the deployed posture and its expected and detected values.
GoogleCloudSecuritycenterV2Process
Represents an operating system process.
GoogleCloudSecuritycenterV2ProcessSignature
Indicates what signature matched this process.
GoogleCloudSecuritycenterV2Reference
Additional Links
GoogleCloudSecuritycenterV2Requests
Information about the requests relevant to the finding.
GoogleCloudSecuritycenterV2Resource
Information related to the Google Cloud resource.
GoogleCloudSecuritycenterV2ResourcePath
Represents the path of resources leading up to the resource this finding is about.
GoogleCloudSecuritycenterV2ResourcePathNode
A node within the resource path. Each node represents a resource within the resource hierarchy.
GoogleCloudSecuritycenterV2ResourceValueConfig
A resource value configuration (RVC) is a mapping configuration of user's resources to resource values. Used in Attack path simulations.
GoogleCloudSecuritycenterV2Role
Kubernetes Role or ClusterRole.
GoogleCloudSecuritycenterV2SecurityBulletin
SecurityBulletin are notifications of vulnerabilities of Google products.
GoogleCloudSecuritycenterV2SecurityMarks
User specified security marks that are attached to the parent Security Command Center resource. Security marks are scoped within a Security Command Center organization -- they can be modified and viewed by all users who have proper permissions on the organization.
GoogleCloudSecuritycenterV2SecurityPolicy
Information about the Google Cloud Armor security policy relevant to the finding.
GoogleCloudSecuritycenterV2SecurityPosture
Represents a posture that is deployed on Google Cloud by the Security Command Center Posture Management service. A posture contains one or more policy sets. A policy set is a group of policies that enforce a set of security rules on Google Cloud.
GoogleCloudSecuritycenterV2SensitiveDataProtectionMapping
Resource value mapping for Sensitive Data Protection findings If any of these mappings have a resource value that is not unspecified, the resource_value field will be ignored when reading this configuration.
GoogleCloudSecuritycenterV2ServiceAccountDelegationInfo
Identity delegation history of an authenticated service account.
GoogleCloudSecuritycenterV2StaticMute
Information about the static mute state. A static mute state overrides any dynamic mute rules that apply to this finding. The static mute state can be set by a static mute rule or by muting the finding directly.
GoogleCloudSecuritycenterV2Subject
Represents a Kubernetes subject.
GoogleCloudSecuritycenterV2TicketInfo
Information about the ticket, if any, that is being used to track the resolution of the issue that is identified by this finding.
GoogleCloudSecuritycenterV2ToxicCombination
Contains details about a group of security issues that, when the issues occur together, represent a greater risk than when the issues occur independently. A group of such issues is referred to as a toxic combination.
GoogleCloudSecuritycenterV2Vulnerability
Refers to common vulnerability fields e.g. cve, cvss, cwe etc.
GoogleCloudSecuritycenterV2YaraRuleSignature
A signature corresponding to a YARA rule.
GroupMembership
Contains details about groups of which this finding is a member. A group is a collection of findings that are related in some way.
IamBinding
Represents a particular IAM binding, which captures a member's role addition, removal, or state.
Indicator
Represents what's commonly known as an indicator of compromise (IoC) in computer forensics. This is an artifact observed on a network or in an operating system that, with high confidence, indicates a computer intrusion. For more information, see Indicator of compromise.
KernelRootkit
Kernel mode rootkit signatures.
Kubernetes
Kubernetes-related attributes.
Label
Represents a generic name-value label. A label has separate name and value fields to support filtering with the
contains()
function. For more information, see Filtering on array-type
fields.
LoadBalancer
Contains information related to the load balancer associated with the finding.
LogEntry
An individual entry in a log.
MemoryHashSignature
A signature corresponding to memory page hashes.
MitreAttack
MITRE ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org
MuteInfo
Mute information about the finding, including whether the finding has a static mute or any matching dynamic mute rules.
Node
Kubernetes nodes associated with the finding.
NodePool
Provides GKE node pool information.
Notebook
Represents a Jupyter notebook IPYNB file, such as a Colab Enterprise notebook file, that is associated with a finding.
Object
Kubernetes object related to the finding, uniquely identified by GKNN. Used if the object Kind is not one of Pod, Node, NodePool, Binding, or AccessReview.
OrgPolicy
Contains information about the org policies associated with the finding.
Package
Package is a generic definition of a package.
Pod
A Kubernetes Pod.
PolicyDriftDetails
The policy field that violates the deployed posture and its expected and detected values.
Process
Represents an operating system process.
ProcessSignature
Indicates what signature matched this process.
RapidVulnerabilityDetectionSettings
Resource capturing the settings for the Rapid Vulnerability Detection service.
Reference
Additional Links
Requests
Information about the requests relevant to the finding.
ResourcePath
Represents the path of resources leading up to the resource this finding is about.
ResourcePathNode
A node within the resource path. Each node represents a resource within the resource hierarchy.
Role
Kubernetes Role or ClusterRole.
SecurityBulletin
SecurityBulletin are notifications of vulnerabilities of Google products.
SecurityCenterSettings
Resource capturing the settings for Security Center. Next ID: 12
SecurityHealthAnalyticsSettings
Resource capturing the settings for the Security Health Analytics service.
SecurityMarks
User specified security marks that are attached to the parent Security Command Center resource. Security marks are scoped within a Security Command Center organization -- they can be modified and viewed by all users who have proper permissions on the organization.
SecurityPolicy
Information about the Google Cloud Armor security policy relevant to the finding.
SecurityPosture
Represents a posture that is deployed on Google Cloud by the Security Command Center Posture Management service. A posture contains one or more policy sets. A policy set is a group of policies that enforce a set of security rules on Google Cloud.
ServiceAccountDelegationInfo
Identity delegation history of an authenticated service account.
StaticMute
Information about the static mute state. A static mute state overrides any dynamic mute rules that apply to this finding. The static mute state can be set by a static mute rule or by muting the finding directly.
Subject
Represents a Kubernetes subject.
Subscription
Resource capturing the state of an organization's subscription.
TicketInfo
Information about the ticket, if any, that is being used to track the resolution of the issue that is identified by this finding.
ToxicCombination
Contains details about a group of security issues that, when the issues occur together, represent a greater risk than when the issues occur independently. A group of such issues is referred to as a toxic combination.
VirtualMachineThreatDetectionSettings
Resource capturing the settings for the Virtual Machine Threat Detection service.
Vulnerability
Refers to common vulnerability fields e.g. cve, cvss, cwe etc.
VulnerabilityCountBySeverity
Vulnerability count by severity.
VulnerabilitySnapshot
Result containing the properties and count of a VulnerabilitySnapshot request.
WebSecurityScannerSettings
Resource capturing the settings for the Web Security Scanner service.
YaraRuleSignature
A signature corresponding to a YARA rule.