Class: Google::Apis::SecuritycenterV1beta1::Finding
- Inherits:
-
Object
- Object
- Google::Apis::SecuritycenterV1beta1::Finding
- Includes:
- Core::Hashable, Core::JsonObjectSupport
- Defined in:
- lib/google/apis/securitycenter_v1beta1/classes.rb,
lib/google/apis/securitycenter_v1beta1/representations.rb,
lib/google/apis/securitycenter_v1beta1/representations.rb
Overview
Security Command Center finding. A finding is a record of assessment data like security, risk, health, or privacy, that is ingested into Security Command Center for presentation, notification, analysis, policy testing, and enforcement. For example, a cross-site scripting (XSS) vulnerability in an App Engine application is a finding.
Instance Attribute Summary collapse
-
#access ⇒ Google::Apis::SecuritycenterV1beta1::Access
Represents an access event.
-
#canonical_name ⇒ String
The canonical name of the finding.
-
#category ⇒ String
The additional taxonomy group within findings from a given source.
-
#compliances ⇒ Array<Google::Apis::SecuritycenterV1beta1::Compliance>
Contains compliance information for security standards associated to the finding.
-
#connections ⇒ Array<Google::Apis::SecuritycenterV1beta1::Connection>
Contains information about the IP connection associated with the finding.
-
#contacts ⇒ Hash<String,Google::Apis::SecuritycenterV1beta1::ContactDetails>
Output only.
-
#containers ⇒ Array<Google::Apis::SecuritycenterV1beta1::Container>
Containers associated with the finding.
-
#create_time ⇒ String
The time at which the finding was created in Security Command Center.
-
#database ⇒ Google::Apis::SecuritycenterV1beta1::Database
Represents database access information, such as queries.
-
#description ⇒ String
Contains more detail about the finding.
-
#event_time ⇒ String
The time the finding was first detected.
-
#exfiltration ⇒ Google::Apis::SecuritycenterV1beta1::Exfiltration
Exfiltration represents a data exfiltration attempt of one or more sources to one or more targets.
-
#external_systems ⇒ Hash<String,Google::Apis::SecuritycenterV1beta1::GoogleCloudSecuritycenterV1ExternalSystem>
Output only.
-
#external_uri ⇒ String
The URI that, if available, points to a web page outside of Security Command Center where additional information about the finding can be found.
-
#finding_class ⇒ String
The class of the finding.
-
#iam_bindings ⇒ Array<Google::Apis::SecuritycenterV1beta1::IamBinding>
Represents IAM bindings associated with the Finding.
-
#indicator ⇒ Google::Apis::SecuritycenterV1beta1::Indicator
Represents what's commonly known as an Indicator of compromise (IoC) in computer forensics.
-
#kubernetes ⇒ Google::Apis::SecuritycenterV1beta1::Kubernetes
Kubernetes related attributes.
-
#mitre_attack ⇒ Google::Apis::SecuritycenterV1beta1::MitreAttack
MITRE ATT&CK tactics and techniques related to this finding.
-
#mute ⇒ String
Indicates the mute state of a finding (either muted, unmuted or undefined).
-
#mute_initiator ⇒ String
First known as mute_annotation.
-
#mute_update_time ⇒ String
Output only.
-
#name ⇒ String
The relative resource name of this finding.
-
#next_steps ⇒ String
Next steps associate to the finding.
-
#parent ⇒ String
The relative resource name of the source the finding belongs to.
-
#parent_display_name ⇒ String
Output only.
-
#processes ⇒ Array<Google::Apis::SecuritycenterV1beta1::Process>
Represents operating system processes associated with the Finding.
-
#resource_name ⇒ String
For findings on Google Cloud resources, the full resource name of the Google Cloud resource this finding is for.
-
#security_marks ⇒ Google::Apis::SecuritycenterV1beta1::SecurityMarks
User specified security marks that are attached to the parent Security Command Center resource.
-
#severity ⇒ String
The severity of the finding.
-
#source_properties ⇒ Hash<String,Object>
Source specific properties.
-
#state ⇒ String
The state of the finding.
-
#vulnerability ⇒ Google::Apis::SecuritycenterV1beta1::Vulnerability
Refers to common vulnerability fields e.g.
Instance Method Summary collapse
-
#initialize(**args) ⇒ Finding
constructor
A new instance of Finding.
-
#update!(**args) ⇒ Object
Update properties of this object.
Constructor Details
#initialize(**args) ⇒ Finding
Returns a new instance of Finding.
1197 1198 1199 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1197 def initialize(**args) update!(**args) end |
Instance Attribute Details
#access ⇒ Google::Apis::SecuritycenterV1beta1::Access
Represents an access event.
Corresponds to the JSON property access
982 983 984 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 982 def access @access end |
#canonical_name ⇒ String
The canonical name of the finding. It's either "organizations/organization_id
/sources/source_id/findings/finding_id", "folders/folder_id/sources/
source_id/findings/finding_id" or "projects/project_number/sources/
source_id/findings/finding_id", depending on the closest CRM ancestor of
the resource associated with the finding.
Corresponds to the JSON property canonicalName
991 992 993 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 991 def canonical_name @canonical_name end |
#category ⇒ String
The additional taxonomy group within findings from a given source. This field
is immutable after creation time. Example: "XSS_FLASH_INJECTION"
Corresponds to the JSON property category
997 998 999 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 997 def category @category end |
#compliances ⇒ Array<Google::Apis::SecuritycenterV1beta1::Compliance>
Contains compliance information for security standards associated to the
finding.
Corresponds to the JSON property compliances
1003 1004 1005 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1003 def compliances @compliances end |
#connections ⇒ Array<Google::Apis::SecuritycenterV1beta1::Connection>
Contains information about the IP connection associated with the finding.
Corresponds to the JSON property connections
1008 1009 1010 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1008 def connections @connections end |
#contacts ⇒ Hash<String,Google::Apis::SecuritycenterV1beta1::ContactDetails>
Output only. Map containing the point of contacts for the given finding. The
key represents the type of contact, while the value contains a list of all the
contacts that pertain. Please refer to: https://cloud.google.com/resource-
manager/docs/managing-notification-contacts#notification-categories "
security": "contacts": [ "email": "person1@company.com", "email": "
person2@company.com" ]
Corresponds to the JSON property contacts
1018 1019 1020 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1018 def contacts @contacts end |
#containers ⇒ Array<Google::Apis::SecuritycenterV1beta1::Container>
Containers associated with the finding. containers provides information for
both Kubernetes and non-Kubernetes containers.
Corresponds to the JSON property containers
1024 1025 1026 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1024 def containers @containers end |
#create_time ⇒ String
The time at which the finding was created in Security Command Center.
Corresponds to the JSON property createTime
1029 1030 1031 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1029 def create_time @create_time end |
#database ⇒ Google::Apis::SecuritycenterV1beta1::Database
Represents database access information, such as queries. A database may be a
sub-resource of an instance (as in the case of CloudSQL instances or Cloud
Spanner instances), or the database instance itself. Some database resources
may not have the full resource name populated because these resource types are
not yet supported by Cloud Asset Inventory (e.g. CloudSQL databases). In these
cases only the display name will be provided.
Corresponds to the JSON property database
1039 1040 1041 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1039 def database @database end |
#description ⇒ String
Contains more detail about the finding.
Corresponds to the JSON property description
1044 1045 1046 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1044 def description @description end |
#event_time ⇒ String
The time the finding was first detected. If an existing finding is updated,
then this is the time the update occurred. For example, if the finding
represents an open firewall, this property captures the time the detector
believes the firewall became open. The accuracy is determined by the detector.
If the finding is later resolved, then this time reflects when the finding was
resolved. This must not be set to a value greater than the current timestamp.
Corresponds to the JSON property eventTime
1054 1055 1056 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1054 def event_time @event_time end |
#exfiltration ⇒ Google::Apis::SecuritycenterV1beta1::Exfiltration
Exfiltration represents a data exfiltration attempt of one or more sources to
one or more targets. Sources represent the source of data that is exfiltrated,
and Targets represents the destination the data was copied to.
Corresponds to the JSON property exfiltration
1061 1062 1063 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1061 def exfiltration @exfiltration end |
#external_systems ⇒ Hash<String,Google::Apis::SecuritycenterV1beta1::GoogleCloudSecuritycenterV1ExternalSystem>
Output only. Third party SIEM/SOAR fields within SCC, contains external system
information and external system finding fields.
Corresponds to the JSON property externalSystems
1067 1068 1069 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1067 def external_systems @external_systems end |
#external_uri ⇒ String
The URI that, if available, points to a web page outside of Security Command
Center where additional information about the finding can be found. This field
is guaranteed to be either empty or a well formed URL.
Corresponds to the JSON property externalUri
1074 1075 1076 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1074 def external_uri @external_uri end |
#finding_class ⇒ String
The class of the finding.
Corresponds to the JSON property findingClass
1079 1080 1081 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1079 def finding_class @finding_class end |
#iam_bindings ⇒ Array<Google::Apis::SecuritycenterV1beta1::IamBinding>
Represents IAM bindings associated with the Finding.
Corresponds to the JSON property iamBindings
1084 1085 1086 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1084 def iam_bindings @iam_bindings end |
#indicator ⇒ Google::Apis::SecuritycenterV1beta1::Indicator
Represents what's commonly known as an Indicator of compromise (IoC) in
computer forensics. This is an artifact observed on a network or in an
operating system that, with high confidence, indicates a computer intrusion.
Reference: https://en.wikipedia.org/wiki/Indicator_of_compromise
Corresponds to the JSON property indicator
1092 1093 1094 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1092 def indicator @indicator end |
#kubernetes ⇒ Google::Apis::SecuritycenterV1beta1::Kubernetes
Kubernetes related attributes.
Corresponds to the JSON property kubernetes
1097 1098 1099 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1097 def kubernetes @kubernetes end |
#mitre_attack ⇒ Google::Apis::SecuritycenterV1beta1::MitreAttack
MITRE ATT&CK tactics and techniques related to this finding. See: https://
attack.mitre.org
Corresponds to the JSON property mitreAttack
1103 1104 1105 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1103 def mitre_attack @mitre_attack end |
#mute ⇒ String
Indicates the mute state of a finding (either muted, unmuted or undefined).
Unlike other attributes of a finding, a finding provider shouldn't set the
value of mute.
Corresponds to the JSON property mute
1110 1111 1112 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1110 def mute @mute end |
#mute_initiator ⇒ String
First known as mute_annotation. Records additional information about the mute
operation e.g. mute config that muted the finding, user who muted the finding,
etc. Unlike other attributes of a finding, a finding provider shouldn't set
the value of mute.
Corresponds to the JSON property muteInitiator
1118 1119 1120 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1118 def mute_initiator @mute_initiator end |
#mute_update_time ⇒ String
Output only. The most recent time this finding was muted or unmuted.
Corresponds to the JSON property muteUpdateTime
1123 1124 1125 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1123 def mute_update_time @mute_update_time end |
#name ⇒ String
The relative resource name of this finding. See: https://cloud.google.com/apis/
design/resource_names#relative_resource_name Example: "organizations/
organization_id/sources/source_id/findings/finding_id"
Corresponds to the JSON property name
1130 1131 1132 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1130 def name @name end |
#next_steps ⇒ String
Next steps associate to the finding.
Corresponds to the JSON property nextSteps
1135 1136 1137 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1135 def next_steps @next_steps end |
#parent ⇒ String
The relative resource name of the source the finding belongs to. See: https://
cloud.google.com/apis/design/resource_names#relative_resource_name This field
is immutable after creation time. For example: "organizations/organization_id
/sources/source_id"
Corresponds to the JSON property parent
1143 1144 1145 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1143 def parent @parent end |
#parent_display_name ⇒ String
Output only. The human readable display name of the finding source such as "
Event Threat Detection" or "Security Health Analytics"
Corresponds to the JSON property parentDisplayName
1149 1150 1151 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1149 def parent_display_name @parent_display_name end |
#processes ⇒ Array<Google::Apis::SecuritycenterV1beta1::Process>
Represents operating system processes associated with the Finding.
Corresponds to the JSON property processes
1154 1155 1156 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1154 def processes @processes end |
#resource_name ⇒ String
For findings on Google Cloud resources, the full resource name of the Google
Cloud resource this finding is for. See: https://cloud.google.com/apis/design/
resource_names#full_resource_name When the finding is for a non-Google Cloud
resource, the resourceName can be a customer or partner defined string. This
field is immutable after creation time.
Corresponds to the JSON property resourceName
1163 1164 1165 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1163 def resource_name @resource_name end |
#security_marks ⇒ Google::Apis::SecuritycenterV1beta1::SecurityMarks
User specified security marks that are attached to the parent Security Command
Center resource. Security marks are scoped within a Security Command Center
organization -- they can be modified and viewed by all users who have proper
permissions on the organization.
Corresponds to the JSON property securityMarks
1171 1172 1173 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1171 def security_marks @security_marks end |
#severity ⇒ String
The severity of the finding. This field is managed by the source that writes
the finding.
Corresponds to the JSON property severity
1177 1178 1179 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1177 def severity @severity end |
#source_properties ⇒ Hash<String,Object>
Source specific properties. These properties are managed by the source that
writes the finding. The key names in the source_properties map must be between
1 and 255 characters, and must start with a letter and contain alphanumeric
characters or underscores only.
Corresponds to the JSON property sourceProperties
1185 1186 1187 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1185 def source_properties @source_properties end |
#state ⇒ String
The state of the finding.
Corresponds to the JSON property state
1190 1191 1192 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1190 def state @state end |
#vulnerability ⇒ Google::Apis::SecuritycenterV1beta1::Vulnerability
Refers to common vulnerability fields e.g. cve, cvss, cwe etc.
Corresponds to the JSON property vulnerability
1195 1196 1197 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1195 def vulnerability @vulnerability end |
Instance Method Details
#update!(**args) ⇒ Object
Update properties of this object
1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 |
# File 'lib/google/apis/securitycenter_v1beta1/classes.rb', line 1202 def update!(**args) @access = args[:access] if args.key?(:access) @canonical_name = args[:canonical_name] if args.key?(:canonical_name) @category = args[:category] if args.key?(:category) @compliances = args[:compliances] if args.key?(:compliances) @connections = args[:connections] if args.key?(:connections) @contacts = args[:contacts] if args.key?(:contacts) @containers = args[:containers] if args.key?(:containers) @create_time = args[:create_time] if args.key?(:create_time) @database = args[:database] if args.key?(:database) @description = args[:description] if args.key?(:description) @event_time = args[:event_time] if args.key?(:event_time) @exfiltration = args[:exfiltration] if args.key?(:exfiltration) @external_systems = args[:external_systems] if args.key?(:external_systems) @external_uri = args[:external_uri] if args.key?(:external_uri) @finding_class = args[:finding_class] if args.key?(:finding_class) @iam_bindings = args[:iam_bindings] if args.key?(:iam_bindings) @indicator = args[:indicator] if args.key?(:indicator) @kubernetes = args[:kubernetes] if args.key?(:kubernetes) @mitre_attack = args[:mitre_attack] if args.key?(:mitre_attack) @mute = args[:mute] if args.key?(:mute) @mute_initiator = args[:mute_initiator] if args.key?(:mute_initiator) @mute_update_time = args[:mute_update_time] if args.key?(:mute_update_time) @name = args[:name] if args.key?(:name) @next_steps = args[:next_steps] if args.key?(:next_steps) @parent = args[:parent] if args.key?(:parent) @parent_display_name = args[:parent_display_name] if args.key?(:parent_display_name) @processes = args[:processes] if args.key?(:processes) @resource_name = args[:resource_name] if args.key?(:resource_name) @security_marks = args[:security_marks] if args.key?(:security_marks) @severity = args[:severity] if args.key?(:severity) @source_properties = args[:source_properties] if args.key?(:source_properties) @state = args[:state] if args.key?(:state) @vulnerability = args[:vulnerability] if args.key?(:vulnerability) end |