Show / Hide Table of Contents

Namespace Google.Apis.SecurityCommandCenter.v1beta2.Data

Classes

Access

Represents an access event.

AccessReview

Conveys information about a Kubernetes access review (such as one returned by a kubectl auth can-i command) that was involved in a finding.

AdaptiveProtection

Information about Google Cloud Armor Adaptive Protection.

AffectedResources

Details about resources affected by this finding.

Allowed

Allowed IP rule.

Application

Represents an application associated with a finding.

Attack

Information about DDoS attack volume and classification.

AttackExposure

An attack exposure contains the results of an attack path simulation run.

AwsAccount

An AWS account that is a member of an organization.

AwsMetadata

AWS metadata associated with the resource, only applicable if the finding's cloud provider is Amazon Web Services.

AwsOrganization

An organization is a collection of accounts that are centrally managed together using consolidated billing, organized hierarchically with organizational units (OUs), and controlled with policies.

AwsOrganizationalUnit

An Organizational Unit (OU) is a container of AWS accounts within a root of an organization. Policies that are attached to an OU apply to all accounts contained in that OU and in any child OUs.

AzureManagementGroup

Represents an Azure management group.

AzureMetadata

Azure metadata associated with the resource, only applicable if the finding's cloud provider is Microsoft Azure.

AzureResourceGroup

Represents an Azure resource group.

AzureSubscription

Represents an Azure subscription.

AzureTenant

Represents a Microsoft Entra tenant.

BackupDisasterRecovery

Information related to Google Cloud Backup and DR Service findings.

Chokepoint

Contains details about a chokepoint, which is a resource or resource group where high-risk attack paths converge, based on [attack path simulations] (https://cloud.google.com/security-command-center/docs/attack-exposure-learn#attack_path_simulations).

CloudArmor

Fields related to Google Cloud Armor findings.

CloudDlpDataProfile

The data profile associated with the finding.

CloudDlpInspection

Details about the Cloud Data Loss Prevention (Cloud DLP) inspection job that produced the finding.

CloudLoggingEntry

Metadata taken from a Cloud Logging LogEntry

Compliance

Contains compliance information about a security standard indicating unmet recommendations.

Config

Configuration of a module.

Connection

Contains information about the IP connection associated with the finding.

Contact

The email address of a contact.

ContactDetails

Details about specific contacts

Container

Container associated with the finding.

ContainerThreatDetectionSettings

Resource capturing the settings for the Container Threat Detection service.

Cve

CVE stands for Common Vulnerabilities and Exposures. Information from the CVE record that describes this vulnerability.

Cvssv3

Common Vulnerability Scoring System version 3.

Cwe

CWE stands for Common Weakness Enumeration. Information about this weakness, as described by CWE.

DataAccessEvent

Details about a data access attempt made by a principal not authorized under applicable data security policy.

DataFlowEvent

Details about a data flow event, in which either the data is moved to or is accessed from a non-compliant geo-location, as defined in the applicable data security policy.

DataRetentionDeletionEvent

Details about data retention deletion violations, in which the data is non-compliant based on their retention or deletion time, as defined in the applicable data security policy. The Data Retention Deletion (DRD) control is a control of the DSPM (Data Security Posture Management) suite that enables organizations to manage data retention and deletion policies in compliance with regulations, such as GDPR and CRPA. DRD supports two primary policy types: maximum storage length (max TTL) and minimum storage length (min TTL). Both are aimed at helping organizations meet regulatory and data management commitments.

Database

Represents database access information, such as queries. A database may be a sub-resource of an instance (as in the case of Cloud SQL instances or Cloud Spanner instances), or the database instance itself. Some database resources might not have the full resource name populated because these resource types, such as Cloud SQL databases, are not yet supported by Cloud Asset Inventory. In these cases only the display name is provided.

Denied

Denied IP rule.

Details

Details of a subscription.

Detection

Memory hash detection contributing to the binary family match.

Disk

Contains information about the disk associated with the finding.

DiskPath

Path of the file in terms of underlying disk/partition identifiers.

DynamicMuteRecord

The record of a dynamic mute rule that matches the finding.

EnvironmentVariable

A name-value pair representing an environment variable used in an operating system process.

EventThreatDetectionSettings

Resource capturing the settings for the Event Threat Detection service.

ExfilResource

Resource where data was exfiltrated from or exfiltrated to.

Exfiltration

Exfiltration represents a data exfiltration attempt from one or more sources to one or more targets. The sources attribute lists the sources of the exfiltrated data. The targets attribute lists the destinations the data was copied to.

Expr

Represents a textual expression in the Common Expression Language (CEL) syntax. CEL is a C-like expression language. The syntax and semantics of CEL are documented at https://github.com/google/cel-spec. Example (Comparison): title: "Summary size limit" description: "Determines if a summary is less than 100 chars" expression: "document.summary.size() < 100" Example (Equality): title: "Requestor is owner" description: "Determines if requestor is the document owner" expression: "document.owner == request.auth.claims.email" Example (Logic): title: "Public documents" description: "Determine whether the document should be publicly visible" expression: "document.type != 'private' && document.type != 'internal'" Example (Data Manipulation): title: "Notification string" description: "Create a notification string with a timestamp." expression: "'New message received at ' + string(document.create_time)" The exact variables and functions that may be referenced within an expression are determined by the service that evaluates it. See the service documentation for additional information.

File

File information about the related binary/library used by an executable, or the script used by a script interpreter

Finding

Security Command Center finding. A finding is a record of assessment data like security, risk, health, or privacy, that is ingested into Security Command Center for presentation, notification, analysis, policy testing, and enforcement. For example, a cross-site scripting (XSS) vulnerability in an App Engine application is a finding.

Folder

Message that contains the resource name and display name of a folder resource.

GcpMetadata

GCP metadata associated with the resource, only applicable if the finding's cloud provider is Google Cloud Platform.

Geolocation

Represents a geographical location for a given access.

GoogleCloudSecuritycenterV1BigQueryExport

Configures how to deliver Findings to BigQuery Instance.

GoogleCloudSecuritycenterV1Binding

Represents a Kubernetes RoleBinding or ClusterRoleBinding.

GoogleCloudSecuritycenterV1BulkMuteFindingsResponse

The response to a BulkMute request. Contains the LRO information.

GoogleCloudSecuritycenterV1CustomConfig

Defines the properties in a custom module configuration for Security Health Analytics. Use the custom module configuration to create custom detectors that generate custom findings for resources that you specify.

GoogleCloudSecuritycenterV1CustomOutputSpec

A set of optional name-value pairs that define custom source properties to return with each finding that is generated by the custom module. The custom source properties that are defined here are included in the finding JSON under sourceProperties.

GoogleCloudSecuritycenterV1EffectiveSecurityHealthAnalyticsCustomModule

An EffectiveSecurityHealthAnalyticsCustomModule is the representation of a Security Health Analytics custom module at a specified level of the resource hierarchy: organization, folder, or project. If a custom module is inherited from a parent organization or folder, the value of the enablementState property in EffectiveSecurityHealthAnalyticsCustomModule is set to the value that is effective in the parent, instead of INHERITED. For example, if the module is enabled in a parent organization or folder, the effective enablement_state for the module in all child folders or projects is also enabled. EffectiveSecurityHealthAnalyticsCustomModule is read-only.

GoogleCloudSecuritycenterV1ExternalSystem

Representation of third party SIEM/SOAR fields within SCC.

GoogleCloudSecuritycenterV1MuteConfig

A mute config is a Cloud SCC resource that contains the configuration to mute create/update events of findings.

GoogleCloudSecuritycenterV1NotificationMessage

Cloud SCC's Notification

GoogleCloudSecuritycenterV1Property

An individual name-value pair that defines a custom source property.

GoogleCloudSecuritycenterV1Resource

Information related to the Google Cloud resource.

GoogleCloudSecuritycenterV1ResourceSelector

Resource for selecting resource type.

GoogleCloudSecuritycenterV1ResourceValueConfig

A resource value configuration (RVC) is a mapping configuration of user's resources to resource values. Used in Attack path simulations.

GoogleCloudSecuritycenterV1RunAssetDiscoveryResponse

Response of asset discovery run

GoogleCloudSecuritycenterV1SecurityHealthAnalyticsCustomModule

Represents an instance of a Security Health Analytics custom module, including its full module name, display name, enablement state, and last updated time. You can create a custom module at the organization, folder, or project level. Custom modules that you create at the organization or folder level are inherited by the child folders and projects.

GoogleCloudSecuritycenterV1SensitiveDataProtectionMapping

Resource value mapping for Sensitive Data Protection findings. If any of these mappings have a resource value that is not unspecified, the resource_value field will be ignored when reading this configuration.

GoogleCloudSecuritycenterV1beta1RunAssetDiscoveryResponse

Response of asset discovery run

GoogleCloudSecuritycenterV1p1beta1Finding

Security Command Center finding. A finding is a record of assessment data (security, risk, health or privacy) ingested into Security Command Center for presentation, notification, analysis, policy testing, and enforcement. For example, an XSS vulnerability in an App Engine application is a finding.

GoogleCloudSecuritycenterV1p1beta1Folder

Message that contains the resource name and display name of a folder resource.

GoogleCloudSecuritycenterV1p1beta1NotificationMessage

Security Command Center's Notification

GoogleCloudSecuritycenterV1p1beta1Resource

Information related to the Google Cloud resource.

GoogleCloudSecuritycenterV1p1beta1RunAssetDiscoveryResponse

Response of asset discovery run

GoogleCloudSecuritycenterV1p1beta1SecurityMarks

User specified security marks that are attached to the parent Security Command Center resource. Security marks are scoped within a Security Command Center organization -- they can be modified and viewed by all users who have proper permissions on the organization.

GoogleCloudSecuritycenterV2Access

Represents an access event.

GoogleCloudSecuritycenterV2AccessReview

Conveys information about a Kubernetes access review (such as one returned by a kubectl auth can-i command) that was involved in a finding.

GoogleCloudSecuritycenterV2AdaptiveProtection

Information about Google Cloud Armor Adaptive Protection.

GoogleCloudSecuritycenterV2AffectedResources

Details about resources affected by this finding.

GoogleCloudSecuritycenterV2Allowed

Allowed IP rule.

GoogleCloudSecuritycenterV2Application

Represents an application associated with a finding.

GoogleCloudSecuritycenterV2Attack

Information about DDoS attack volume and classification.

GoogleCloudSecuritycenterV2AttackExposure

An attack exposure contains the results of an attack path simulation run.

GoogleCloudSecuritycenterV2AwsAccount

An AWS account that is a member of an organization.

GoogleCloudSecuritycenterV2AwsMetadata

AWS metadata associated with the resource, only applicable if the finding's cloud provider is Amazon Web Services.

GoogleCloudSecuritycenterV2AwsOrganization

An organization is a collection of accounts that are centrally managed together using consolidated billing, organized hierarchically with organizational units (OUs), and controlled with policies.

GoogleCloudSecuritycenterV2AwsOrganizationalUnit

An Organizational Unit (OU) is a container of AWS accounts within a root of an organization. Policies that are attached to an OU apply to all accounts contained in that OU and in any child OUs.

GoogleCloudSecuritycenterV2AzureManagementGroup

Represents an Azure management group.

GoogleCloudSecuritycenterV2AzureMetadata

Azure metadata associated with the resource, only applicable if the finding's cloud provider is Microsoft Azure.

GoogleCloudSecuritycenterV2AzureResourceGroup

Represents an Azure resource group.

GoogleCloudSecuritycenterV2AzureSubscription

Represents an Azure subscription.

GoogleCloudSecuritycenterV2AzureTenant

Represents a Microsoft Entra tenant.

GoogleCloudSecuritycenterV2BackupDisasterRecovery

Information related to Google Cloud Backup and DR Service findings.

GoogleCloudSecuritycenterV2BigQueryExport

Configures how to deliver Findings to BigQuery Instance.

GoogleCloudSecuritycenterV2Binding

Represents a Kubernetes RoleBinding or ClusterRoleBinding.

GoogleCloudSecuritycenterV2BulkMuteFindingsResponse

The response to a BulkMute request. Contains the LRO information.

GoogleCloudSecuritycenterV2Chokepoint

Contains details about a chokepoint, which is a resource or resource group where high-risk attack paths converge, based on [attack path simulations] (https://cloud.google.com/security-command-center/docs/attack-exposure-learn#attack_path_simulations).

GoogleCloudSecuritycenterV2CloudArmor

Fields related to Google Cloud Armor findings.

GoogleCloudSecuritycenterV2CloudDlpDataProfile

The data profile associated with the finding.

GoogleCloudSecuritycenterV2CloudDlpInspection

Details about the Cloud Data Loss Prevention (Cloud DLP) inspection job that produced the finding.

GoogleCloudSecuritycenterV2CloudLoggingEntry

Metadata taken from a Cloud Logging LogEntry

GoogleCloudSecuritycenterV2Compliance

Contains compliance information about a security standard indicating unmet recommendations.

GoogleCloudSecuritycenterV2Connection

Contains information about the IP connection associated with the finding.

GoogleCloudSecuritycenterV2Contact

The email address of a contact.

GoogleCloudSecuritycenterV2ContactDetails

Details about specific contacts

GoogleCloudSecuritycenterV2Container

Container associated with the finding.

GoogleCloudSecuritycenterV2Cve

CVE stands for Common Vulnerabilities and Exposures. Information from the CVE record that describes this vulnerability.

GoogleCloudSecuritycenterV2Cvssv3

Common Vulnerability Scoring System version 3.

GoogleCloudSecuritycenterV2Cwe

CWE stands for Common Weakness Enumeration. Information about this weakness, as described by CWE.

GoogleCloudSecuritycenterV2DataAccessEvent

Details about a data access attempt made by a principal not authorized under applicable data security policy.

GoogleCloudSecuritycenterV2DataFlowEvent

Details about a data flow event, in which either the data is moved to or is accessed from a non-compliant geo-location, as defined in the applicable data security policy.

GoogleCloudSecuritycenterV2DataRetentionDeletionEvent

Details about data retention deletion violations, in which the data is non-compliant based on their retention or deletion time, as defined in the applicable data security policy. The Data Retention Deletion (DRD) control is a control of the DSPM (Data Security Posture Management) suite that enables organizations to manage data retention and deletion policies in compliance with regulations, such as GDPR and CRPA. DRD supports two primary policy types: maximum storage length (max TTL) and minimum storage length (min TTL). Both are aimed at helping organizations meet regulatory and data management commitments.

GoogleCloudSecuritycenterV2Database

Represents database access information, such as queries. A database may be a sub-resource of an instance (as in the case of Cloud SQL instances or Cloud Spanner instances), or the database instance itself. Some database resources might not have the full resource name populated because these resource types, such as Cloud SQL databases, are not yet supported by Cloud Asset Inventory. In these cases only the display name is provided.

GoogleCloudSecuritycenterV2Denied

Denied IP rule.

GoogleCloudSecuritycenterV2Detection

Memory hash detection contributing to the binary family match.

GoogleCloudSecuritycenterV2Disk

Contains information about the disk associated with the finding.

GoogleCloudSecuritycenterV2DiskPath

Path of the file in terms of underlying disk/partition identifiers.

GoogleCloudSecuritycenterV2DynamicMuteRecord

The record of a dynamic mute rule that matches the finding.

GoogleCloudSecuritycenterV2EnvironmentVariable

A name-value pair representing an environment variable used in an operating system process.

GoogleCloudSecuritycenterV2ExfilResource

Resource where data was exfiltrated from or exfiltrated to.

GoogleCloudSecuritycenterV2Exfiltration

Exfiltration represents a data exfiltration attempt from one or more sources to one or more targets. The sources attribute lists the sources of the exfiltrated data. The targets attribute lists the destinations the data was copied to.

GoogleCloudSecuritycenterV2ExternalSystem

Representation of third party SIEM/SOAR fields within SCC.

GoogleCloudSecuritycenterV2File

File information about the related binary/library used by an executable, or the script used by a script interpreter

GoogleCloudSecuritycenterV2Finding

Security Command Center finding. A finding is a record of assessment data like security, risk, health, or privacy, that is ingested into Security Command Center for presentation, notification, analysis, policy testing, and enforcement. For example, a cross-site scripting (XSS) vulnerability in an App Engine application is a finding.

GoogleCloudSecuritycenterV2Folder

Message that contains the resource name and display name of a folder resource.

GoogleCloudSecuritycenterV2Geolocation

Represents a geographical location for a given access.

GoogleCloudSecuritycenterV2GroupMembership

Contains details about groups of which this finding is a member. A group is a collection of findings that are related in some way.

GoogleCloudSecuritycenterV2IamBinding

Represents a particular IAM binding, which captures a member's role addition, removal, or state.

GoogleCloudSecuritycenterV2Indicator

Represents what's commonly known as an indicator of compromise (IoC) in computer forensics. This is an artifact observed on a network or in an operating system that, with high confidence, indicates a computer intrusion. For more information, see Indicator of compromise.

GoogleCloudSecuritycenterV2IpRule

IP rule information.

GoogleCloudSecuritycenterV2IpRules

IP rules associated with the finding.

GoogleCloudSecuritycenterV2Issue

Security Command Center Issue.

GoogleCloudSecuritycenterV2IssueDomain

The domains of an issue.

GoogleCloudSecuritycenterV2IssueFinding

Finding related to an issue.

GoogleCloudSecuritycenterV2IssueFindingCve

The CVE of the finding.

GoogleCloudSecuritycenterV2IssueFindingSecurityBulletin

The security bulletin of the finding.

GoogleCloudSecuritycenterV2IssueMute

The mute information of the issue.

GoogleCloudSecuritycenterV2IssueResource

A resource associated with the an issue.

GoogleCloudSecuritycenterV2IssueResourceAwsMetadata

The AWS metadata of a resource associated with an issue.

GoogleCloudSecuritycenterV2IssueResourceAwsMetadataAwsAccount

The AWS account of the resource associated with the issue.

GoogleCloudSecuritycenterV2IssueResourceAzureMetadata

The Azure metadata of a resource associated with an issue.

GoogleCloudSecuritycenterV2IssueResourceAzureMetadataAzureSubscription

The Azure subscription of the resource associated with the issue.

GoogleCloudSecuritycenterV2IssueResourceGoogleCloudMetadata

Google Cloud metadata of a resource associated with an issue.

GoogleCloudSecuritycenterV2IssueSecurityContext

Security context associated with an issue.

GoogleCloudSecuritycenterV2IssueSecurityContextAggregatedCount

Aggregated count of a security context.

GoogleCloudSecuritycenterV2IssueSecurityContextContext

Context of a security context.

GoogleCloudSecuritycenterV2Job

Describes a job

GoogleCloudSecuritycenterV2KernelRootkit

Kernel mode rootkit signatures.

GoogleCloudSecuritycenterV2Kubernetes

Kubernetes-related attributes.

GoogleCloudSecuritycenterV2Label

Represents a generic name-value label. A label has separate name and value fields to support filtering with the contains() function. For more information, see Filtering on array-type fields.

GoogleCloudSecuritycenterV2LoadBalancer

Contains information related to the load balancer associated with the finding.

GoogleCloudSecuritycenterV2LogEntry

An individual entry in a log.

GoogleCloudSecuritycenterV2MemoryHashSignature

A signature corresponding to memory page hashes.

GoogleCloudSecuritycenterV2MitreAttack

MITRE ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org

GoogleCloudSecuritycenterV2MuteConfig

A mute config is a Cloud SCC resource that contains the configuration to mute create/update events of findings.

GoogleCloudSecuritycenterV2MuteInfo

Mute information about the finding, including whether the finding has a static mute or any matching dynamic mute rules.

GoogleCloudSecuritycenterV2Network

Contains information about a VPC network associated with the finding.

GoogleCloudSecuritycenterV2Node

Kubernetes nodes associated with the finding.

GoogleCloudSecuritycenterV2NodePool

Provides GKE node pool information.

GoogleCloudSecuritycenterV2Notebook

Represents a Jupyter notebook IPYNB file, such as a Colab Enterprise notebook file, that is associated with a finding.

GoogleCloudSecuritycenterV2NotificationMessage

Cloud SCC's Notification

GoogleCloudSecuritycenterV2Object

Kubernetes object related to the finding, uniquely identified by GKNN. Used if the object Kind is not one of Pod, Node, NodePool, Binding, or AccessReview.

GoogleCloudSecuritycenterV2OrgPolicy

Contains information about the org policies associated with the finding.

GoogleCloudSecuritycenterV2Package

Package is a generic definition of a package.

GoogleCloudSecuritycenterV2Pod

A Kubernetes Pod.

GoogleCloudSecuritycenterV2PolicyDriftDetails

The policy field that violates the deployed posture and its expected and detected values.

GoogleCloudSecuritycenterV2PortRange

A port range which is inclusive of the min and max values. Values are between 0 and 2^16-1. The max can be equal / must be not smaller than the min value. If min and max are equal this indicates that it is a single port.

GoogleCloudSecuritycenterV2Process

Represents an operating system process.

GoogleCloudSecuritycenterV2ProcessSignature

Indicates what signature matched this process.

GoogleCloudSecuritycenterV2Reference

Additional Links

GoogleCloudSecuritycenterV2Requests

Information about the requests relevant to the finding.

GoogleCloudSecuritycenterV2Resource

Information related to the Google Cloud resource.

GoogleCloudSecuritycenterV2ResourcePath

Represents the path of resources leading up to the resource this finding is about.

GoogleCloudSecuritycenterV2ResourcePathNode

A node within the resource path. Each node represents a resource within the resource hierarchy.

GoogleCloudSecuritycenterV2ResourceValueConfig

A resource value configuration (RVC) is a mapping configuration of user's resources to resource values. Used in Attack path simulations.

GoogleCloudSecuritycenterV2Role

Kubernetes Role or ClusterRole.

GoogleCloudSecuritycenterV2SecurityBulletin

SecurityBulletin are notifications of vulnerabilities of Google products.

GoogleCloudSecuritycenterV2SecurityMarks

User specified security marks that are attached to the parent Security Command Center resource. Security marks are scoped within a Security Command Center organization -- they can be modified and viewed by all users who have proper permissions on the organization.

GoogleCloudSecuritycenterV2SecurityPolicy

Information about the Google Cloud Armor security policy relevant to the finding.

GoogleCloudSecuritycenterV2SecurityPosture

Represents a posture that is deployed on Google Cloud by the Security Command Center Posture Management service. A posture contains one or more policy sets. A policy set is a group of policies that enforce a set of security rules on Google Cloud.

GoogleCloudSecuritycenterV2SensitiveDataProtectionMapping

Resource value mapping for Sensitive Data Protection findings If any of these mappings have a resource value that is not unspecified, the resource_value field will be ignored when reading this configuration.

GoogleCloudSecuritycenterV2ServiceAccountDelegationInfo

Identity delegation history of an authenticated service account.

GoogleCloudSecuritycenterV2StaticMute

Information about the static mute state. A static mute state overrides any dynamic mute rules that apply to this finding. The static mute state can be set by a static mute rule or by muting the finding directly.

GoogleCloudSecuritycenterV2Subject

Represents a Kubernetes subject.

GoogleCloudSecuritycenterV2TicketInfo

Information about the ticket, if any, that is being used to track the resolution of the issue that is identified by this finding.

GoogleCloudSecuritycenterV2ToxicCombination

Contains details about a group of security issues that, when the issues occur together, represent a greater risk than when the issues occur independently. A group of such issues is referred to as a toxic combination.

GoogleCloudSecuritycenterV2Vulnerability

Refers to common vulnerability fields e.g. cve, cvss, cwe etc.

GoogleCloudSecuritycenterV2YaraRuleSignature

A signature corresponding to a YARA rule.

GroupMembership

Contains details about groups of which this finding is a member. A group is a collection of findings that are related in some way.

IamBinding

Represents a particular IAM binding, which captures a member's role addition, removal, or state.

Indicator

Represents what's commonly known as an indicator of compromise (IoC) in computer forensics. This is an artifact observed on a network or in an operating system that, with high confidence, indicates a computer intrusion. For more information, see Indicator of compromise.

IpRule

IP rule information.

IpRules

IP rules associated with the finding.

Job

Describes a job

KernelRootkit

Kernel mode rootkit signatures.

Kubernetes

Kubernetes-related attributes.

Label

Represents a generic name-value label. A label has separate name and value fields to support filtering with the contains() function. For more information, see Filtering on array-type fields.

LoadBalancer

Contains information related to the load balancer associated with the finding.

LogEntry

An individual entry in a log.

MemoryHashSignature

A signature corresponding to memory page hashes.

MitreAttack

MITRE ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org

MuteInfo

Mute information about the finding, including whether the finding has a static mute or any matching dynamic mute rules.

Network

Contains information about a VPC network associated with the finding.

Node

Kubernetes nodes associated with the finding.

NodePool

Provides GKE node pool information.

Notebook

Represents a Jupyter notebook IPYNB file, such as a Colab Enterprise notebook file, that is associated with a finding.

Object

Kubernetes object related to the finding, uniquely identified by GKNN. Used if the object Kind is not one of Pod, Node, NodePool, Binding, or AccessReview.

OrgPolicy

Contains information about the org policies associated with the finding.

Package

Package is a generic definition of a package.

Pod

A Kubernetes Pod.

PolicyDriftDetails

The policy field that violates the deployed posture and its expected and detected values.

PortRange

A port range which is inclusive of the min and max values. Values are between 0 and 2^16-1. The max can be equal / must be not smaller than the min value. If min and max are equal this indicates that it is a single port.

Process

Represents an operating system process.

ProcessSignature

Indicates what signature matched this process.

RapidVulnerabilityDetectionSettings

Resource capturing the settings for the Rapid Vulnerability Detection service.

Reference

Additional Links

Requests

Information about the requests relevant to the finding.

ResourcePath

Represents the path of resources leading up to the resource this finding is about.

ResourcePathNode

A node within the resource path. Each node represents a resource within the resource hierarchy.

Role

Kubernetes Role or ClusterRole.

SecurityBulletin

SecurityBulletin are notifications of vulnerabilities of Google products.

SecurityCenterSettings

Resource capturing the settings for Security Center.

SecurityHealthAnalyticsSettings

Resource capturing the settings for the Security Health Analytics service.

SecurityMarks

User specified security marks that are attached to the parent Security Command Center resource. Security marks are scoped within a Security Command Center organization -- they can be modified and viewed by all users who have proper permissions on the organization.

SecurityPolicy

Information about the Google Cloud Armor security policy relevant to the finding.

SecurityPosture

Represents a posture that is deployed on Google Cloud by the Security Command Center Posture Management service. A posture contains one or more policy sets. A policy set is a group of policies that enforce a set of security rules on Google Cloud.

ServiceAccountDelegationInfo

Identity delegation history of an authenticated service account.

StaticMute

Information about the static mute state. A static mute state overrides any dynamic mute rules that apply to this finding. The static mute state can be set by a static mute rule or by muting the finding directly.

Subject

Represents a Kubernetes subject.

Subscription

Resource capturing the state of an organization's subscription.

TicketInfo

Information about the ticket, if any, that is being used to track the resolution of the issue that is identified by this finding.

ToxicCombination

Contains details about a group of security issues that, when the issues occur together, represent a greater risk than when the issues occur independently. A group of such issues is referred to as a toxic combination.

VirtualMachineThreatDetectionSettings

Resource capturing the settings for the Virtual Machine Threat Detection service.

Vulnerability

Refers to common vulnerability fields e.g. cve, cvss, cwe etc.

VulnerabilityCountBySeverity

Vulnerability count by severity.

VulnerabilitySnapshot

Result containing the properties and count of a VulnerabilitySnapshot request.

WebSecurityScannerSettings

Resource capturing the settings for the Web Security Scanner service.

YaraRuleSignature

A signature corresponding to a YARA rule.

In this article
Back to top Generated by DocFX