We recommend new projects start with resources from the AWS provider.
aws-native.securityhub.getAutomationRule
Explore with Pulumi AI
We recommend new projects start with resources from the AWS provider.
The AWS::SecurityHub::AutomationRule resource specifies an automation rule based on input parameters. For more information, see Automation rules in the User Guide.
Using getAutomationRule
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getAutomationRule(args: GetAutomationRuleArgs, opts?: InvokeOptions): Promise<GetAutomationRuleResult>
function getAutomationRuleOutput(args: GetAutomationRuleOutputArgs, opts?: InvokeOptions): Output<GetAutomationRuleResult>def get_automation_rule(rule_arn: Optional[str] = None,
                        opts: Optional[InvokeOptions] = None) -> GetAutomationRuleResult
def get_automation_rule_output(rule_arn: Optional[pulumi.Input[str]] = None,
                        opts: Optional[InvokeOptions] = None) -> Output[GetAutomationRuleResult]func LookupAutomationRule(ctx *Context, args *LookupAutomationRuleArgs, opts ...InvokeOption) (*LookupAutomationRuleResult, error)
func LookupAutomationRuleOutput(ctx *Context, args *LookupAutomationRuleOutputArgs, opts ...InvokeOption) LookupAutomationRuleResultOutput> Note: This function is named LookupAutomationRule in the Go SDK.
public static class GetAutomationRule 
{
    public static Task<GetAutomationRuleResult> InvokeAsync(GetAutomationRuleArgs args, InvokeOptions? opts = null)
    public static Output<GetAutomationRuleResult> Invoke(GetAutomationRuleInvokeArgs args, InvokeOptions? opts = null)
}public static CompletableFuture<GetAutomationRuleResult> getAutomationRule(GetAutomationRuleArgs args, InvokeOptions options)
public static Output<GetAutomationRuleResult> getAutomationRule(GetAutomationRuleArgs args, InvokeOptions options)
fn::invoke:
  function: aws-native:securityhub:getAutomationRule
  arguments:
    # arguments dictionaryThe following arguments are supported:
- RuleArn string
- The Amazon Resource Name (ARN) of the automation rule that you create. For example, arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111.
- RuleArn string
- The Amazon Resource Name (ARN) of the automation rule that you create. For example, arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111.
- ruleArn String
- The Amazon Resource Name (ARN) of the automation rule that you create. For example, arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111.
- ruleArn string
- The Amazon Resource Name (ARN) of the automation rule that you create. For example, arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111.
- rule_arn str
- The Amazon Resource Name (ARN) of the automation rule that you create. For example, arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111.
- ruleArn String
- The Amazon Resource Name (ARN) of the automation rule that you create. For example, arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111.
getAutomationRule Result
The following output properties are available:
- Actions
List<Pulumi.Aws Native. Security Hub. Outputs. Automation Rules Action> 
- One or more actions to update finding fields if a finding matches the conditions specified in Criteria.
- CreatedAt string
- A timestamp that indicates when the rule was created. - Uses the - date-timeformat specified in RFC 3339 section 5.6, Internet Date/Time Format . The value cannot contain spaces. For example,- 2020-03-22T13:22:13.933Z.
- CreatedBy string
- The principal that created the rule. For example, arn:aws:sts::123456789012:assumed-role/Developer-Role/JaneDoe.
- Criteria
Pulumi.Aws Native. Security Hub. Outputs. Automation Rules Finding Filters 
- A set of Security Finding Format (ASFF) finding field attributes and corresponding expected values that ASH uses to filter findings. If a rule is enabled and a finding matches the criteria specified in this parameter, ASH applies the rule action to the finding.
- Description string
- A description of the rule.
- IsTerminal bool
- Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding matches the criteria for multiple rules, and each rule has different actions. If a rule is terminal, Security Hub applies the rule action to a finding that matches the rule criteria and doesn't evaluate other rules for the finding. By default, a rule isn't terminal.
- RuleArn string
- The Amazon Resource Name (ARN) of the automation rule that you create. For example, arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111.
- RuleName string
- The name of the rule.
- RuleOrder int
- An integer ranging from 1 to 1000 that represents the order in which the rule action is applied to findings. Security Hub applies rules with lower values for this parameter first.
- RuleStatus Pulumi.Aws Native. Security Hub. Automation Rule Rule Status 
- Whether the rule is active after it is created. If this parameter is equal to ENABLED, ASH applies the rule to findings and finding updates after the rule is created.
- Dictionary<string, string>
- User-defined tags associated with an automation rule.
- UpdatedAt string
- A timestamp that indicates when the rule was most recently updated. - Uses the - date-timeformat specified in RFC 3339 section 5.6, Internet Date/Time Format . The value cannot contain spaces. For example,- 2020-03-22T13:22:13.933Z.
- Actions
[]AutomationRules Action 
- One or more actions to update finding fields if a finding matches the conditions specified in Criteria.
- CreatedAt string
- A timestamp that indicates when the rule was created. - Uses the - date-timeformat specified in RFC 3339 section 5.6, Internet Date/Time Format . The value cannot contain spaces. For example,- 2020-03-22T13:22:13.933Z.
- CreatedBy string
- The principal that created the rule. For example, arn:aws:sts::123456789012:assumed-role/Developer-Role/JaneDoe.
- Criteria
AutomationRules Finding Filters 
- A set of Security Finding Format (ASFF) finding field attributes and corresponding expected values that ASH uses to filter findings. If a rule is enabled and a finding matches the criteria specified in this parameter, ASH applies the rule action to the finding.
- Description string
- A description of the rule.
- IsTerminal bool
- Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding matches the criteria for multiple rules, and each rule has different actions. If a rule is terminal, Security Hub applies the rule action to a finding that matches the rule criteria and doesn't evaluate other rules for the finding. By default, a rule isn't terminal.
- RuleArn string
- The Amazon Resource Name (ARN) of the automation rule that you create. For example, arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111.
- RuleName string
- The name of the rule.
- RuleOrder int
- An integer ranging from 1 to 1000 that represents the order in which the rule action is applied to findings. Security Hub applies rules with lower values for this parameter first.
- RuleStatus AutomationRule Rule Status 
- Whether the rule is active after it is created. If this parameter is equal to ENABLED, ASH applies the rule to findings and finding updates after the rule is created.
- map[string]string
- User-defined tags associated with an automation rule.
- UpdatedAt string
- A timestamp that indicates when the rule was most recently updated. - Uses the - date-timeformat specified in RFC 3339 section 5.6, Internet Date/Time Format . The value cannot contain spaces. For example,- 2020-03-22T13:22:13.933Z.
- actions
List<AutomationRules Action> 
- One or more actions to update finding fields if a finding matches the conditions specified in Criteria.
- createdAt String
- A timestamp that indicates when the rule was created. - Uses the - date-timeformat specified in RFC 3339 section 5.6, Internet Date/Time Format . The value cannot contain spaces. For example,- 2020-03-22T13:22:13.933Z.
- createdBy String
- The principal that created the rule. For example, arn:aws:sts::123456789012:assumed-role/Developer-Role/JaneDoe.
- criteria
AutomationRules Finding Filters 
- A set of Security Finding Format (ASFF) finding field attributes and corresponding expected values that ASH uses to filter findings. If a rule is enabled and a finding matches the criteria specified in this parameter, ASH applies the rule action to the finding.
- description String
- A description of the rule.
- isTerminal Boolean
- Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding matches the criteria for multiple rules, and each rule has different actions. If a rule is terminal, Security Hub applies the rule action to a finding that matches the rule criteria and doesn't evaluate other rules for the finding. By default, a rule isn't terminal.
- ruleArn String
- The Amazon Resource Name (ARN) of the automation rule that you create. For example, arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111.
- ruleName String
- The name of the rule.
- ruleOrder Integer
- An integer ranging from 1 to 1000 that represents the order in which the rule action is applied to findings. Security Hub applies rules with lower values for this parameter first.
- ruleStatus AutomationRule Rule Status 
- Whether the rule is active after it is created. If this parameter is equal to ENABLED, ASH applies the rule to findings and finding updates after the rule is created.
- Map<String,String>
- User-defined tags associated with an automation rule.
- updatedAt String
- A timestamp that indicates when the rule was most recently updated. - Uses the - date-timeformat specified in RFC 3339 section 5.6, Internet Date/Time Format . The value cannot contain spaces. For example,- 2020-03-22T13:22:13.933Z.
- actions
AutomationRules Action[] 
- One or more actions to update finding fields if a finding matches the conditions specified in Criteria.
- createdAt string
- A timestamp that indicates when the rule was created. - Uses the - date-timeformat specified in RFC 3339 section 5.6, Internet Date/Time Format . The value cannot contain spaces. For example,- 2020-03-22T13:22:13.933Z.
- createdBy string
- The principal that created the rule. For example, arn:aws:sts::123456789012:assumed-role/Developer-Role/JaneDoe.
- criteria
AutomationRules Finding Filters 
- A set of Security Finding Format (ASFF) finding field attributes and corresponding expected values that ASH uses to filter findings. If a rule is enabled and a finding matches the criteria specified in this parameter, ASH applies the rule action to the finding.
- description string
- A description of the rule.
- isTerminal boolean
- Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding matches the criteria for multiple rules, and each rule has different actions. If a rule is terminal, Security Hub applies the rule action to a finding that matches the rule criteria and doesn't evaluate other rules for the finding. By default, a rule isn't terminal.
- ruleArn string
- The Amazon Resource Name (ARN) of the automation rule that you create. For example, arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111.
- ruleName string
- The name of the rule.
- ruleOrder number
- An integer ranging from 1 to 1000 that represents the order in which the rule action is applied to findings. Security Hub applies rules with lower values for this parameter first.
- ruleStatus AutomationRule Rule Status 
- Whether the rule is active after it is created. If this parameter is equal to ENABLED, ASH applies the rule to findings and finding updates after the rule is created.
- {[key: string]: string}
- User-defined tags associated with an automation rule.
- updatedAt string
- A timestamp that indicates when the rule was most recently updated. - Uses the - date-timeformat specified in RFC 3339 section 5.6, Internet Date/Time Format . The value cannot contain spaces. For example,- 2020-03-22T13:22:13.933Z.
- actions
Sequence[AutomationRules Action] 
- One or more actions to update finding fields if a finding matches the conditions specified in Criteria.
- created_at str
- A timestamp that indicates when the rule was created. - Uses the - date-timeformat specified in RFC 3339 section 5.6, Internet Date/Time Format . The value cannot contain spaces. For example,- 2020-03-22T13:22:13.933Z.
- created_by str
- The principal that created the rule. For example, arn:aws:sts::123456789012:assumed-role/Developer-Role/JaneDoe.
- criteria
AutomationRules Finding Filters 
- A set of Security Finding Format (ASFF) finding field attributes and corresponding expected values that ASH uses to filter findings. If a rule is enabled and a finding matches the criteria specified in this parameter, ASH applies the rule action to the finding.
- description str
- A description of the rule.
- is_terminal bool
- Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding matches the criteria for multiple rules, and each rule has different actions. If a rule is terminal, Security Hub applies the rule action to a finding that matches the rule criteria and doesn't evaluate other rules for the finding. By default, a rule isn't terminal.
- rule_arn str
- The Amazon Resource Name (ARN) of the automation rule that you create. For example, arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111.
- rule_name str
- The name of the rule.
- rule_order int
- An integer ranging from 1 to 1000 that represents the order in which the rule action is applied to findings. Security Hub applies rules with lower values for this parameter first.
- rule_status AutomationRule Rule Status 
- Whether the rule is active after it is created. If this parameter is equal to ENABLED, ASH applies the rule to findings and finding updates after the rule is created.
- Mapping[str, str]
- User-defined tags associated with an automation rule.
- updated_at str
- A timestamp that indicates when the rule was most recently updated. - Uses the - date-timeformat specified in RFC 3339 section 5.6, Internet Date/Time Format . The value cannot contain spaces. For example,- 2020-03-22T13:22:13.933Z.
- actions List<Property Map>
- One or more actions to update finding fields if a finding matches the conditions specified in Criteria.
- createdAt String
- A timestamp that indicates when the rule was created. - Uses the - date-timeformat specified in RFC 3339 section 5.6, Internet Date/Time Format . The value cannot contain spaces. For example,- 2020-03-22T13:22:13.933Z.
- createdBy String
- The principal that created the rule. For example, arn:aws:sts::123456789012:assumed-role/Developer-Role/JaneDoe.
- criteria Property Map
- A set of Security Finding Format (ASFF) finding field attributes and corresponding expected values that ASH uses to filter findings. If a rule is enabled and a finding matches the criteria specified in this parameter, ASH applies the rule action to the finding.
- description String
- A description of the rule.
- isTerminal Boolean
- Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding matches the criteria for multiple rules, and each rule has different actions. If a rule is terminal, Security Hub applies the rule action to a finding that matches the rule criteria and doesn't evaluate other rules for the finding. By default, a rule isn't terminal.
- ruleArn String
- The Amazon Resource Name (ARN) of the automation rule that you create. For example, arn:aws:securityhub:us-east-1:123456789012:automation-rule/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111.
- ruleName String
- The name of the rule.
- ruleOrder Number
- An integer ranging from 1 to 1000 that represents the order in which the rule action is applied to findings. Security Hub applies rules with lower values for this parameter first.
- ruleStatus "ENABLED" | "DISABLED"
- Whether the rule is active after it is created. If this parameter is equal to ENABLED, ASH applies the rule to findings and finding updates after the rule is created.
- Map<String>
- User-defined tags associated with an automation rule.
- updatedAt String
- A timestamp that indicates when the rule was most recently updated. - Uses the - date-timeformat specified in RFC 3339 section 5.6, Internet Date/Time Format . The value cannot contain spaces. For example,- 2020-03-22T13:22:13.933Z.
Supporting Types
AutomationRuleDateFilter   
- DateRange Pulumi.Aws Native. Security Hub. Inputs. Automation Rule Date Range 
- A date range for the date filter.
- End string
- A timestamp that provides the end date for the date filter. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps.
- Start string
- A timestamp that provides the start date for the date filter. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps.
- DateRange AutomationRule Date Range 
- A date range for the date filter.
- End string
- A timestamp that provides the end date for the date filter. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps.
- Start string
- A timestamp that provides the start date for the date filter. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps.
- dateRange AutomationRule Date Range 
- A date range for the date filter.
- end String
- A timestamp that provides the end date for the date filter. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps.
- start String
- A timestamp that provides the start date for the date filter. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps.
- dateRange AutomationRule Date Range 
- A date range for the date filter.
- end string
- A timestamp that provides the end date for the date filter. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps.
- start string
- A timestamp that provides the start date for the date filter. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps.
- date_range AutomationRule Date Range 
- A date range for the date filter.
- end str
- A timestamp that provides the end date for the date filter. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps.
- start str
- A timestamp that provides the start date for the date filter. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps.
- dateRange Property Map
- A date range for the date filter.
- end String
- A timestamp that provides the end date for the date filter. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps.
- start String
- A timestamp that provides the start date for the date filter. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps.
AutomationRuleDateRange   
- Unit
Pulumi.Aws Native. Security Hub. Automation Rule Date Range Unit 
- A date range unit for the date filter.
- Value double
- A date range value for the date filter.
- Unit
AutomationRule Date Range Unit 
- A date range unit for the date filter.
- Value float64
- A date range value for the date filter.
- unit
AutomationRule Date Range Unit 
- A date range unit for the date filter.
- value Double
- A date range value for the date filter.
- unit
AutomationRule Date Range Unit 
- A date range unit for the date filter.
- value number
- A date range value for the date filter.
- unit
AutomationRule Date Range Unit 
- A date range unit for the date filter.
- value float
- A date range value for the date filter.
AutomationRuleDateRangeUnit    
AutomationRuleMapFilter   
- Comparison
Pulumi.Aws Native. Security Hub. Automation Rule Map Filter Comparison 
- The condition to apply to the key value when filtering Security Hub findings with a map filter. To search for values that have the filter value, use one of the following comparison operators: - To search for values that include the filter value, use CONTAINS. For example, for theResourceTagsfield, the filterDepartment CONTAINS Securitymatches findings that include the valueSecurityfor theDepartmenttag. In the same example, a finding with a value ofSecurity teamfor theDepartmenttag is a match.
- To search for values that exactly match the filter value, use EQUALS. For example, for theResourceTagsfield, the filterDepartment EQUALS Securitymatches findings that have the valueSecurityfor theDepartmenttag.
 - CONTAINSand- EQUALSfilters on the same field are joined by- OR. A finding matches if it matches any one of those filters. For example, the filters- Department CONTAINS Security OR Department CONTAINS Financematch a finding that includes either- Security,- Finance, or both values. To search for values that don't have the filter value, use one of the following comparison operators:- To search for values that exclude the filter value, use NOT_CONTAINS. For example, for theResourceTagsfield, the filterDepartment NOT_CONTAINS Financematches findings that exclude the valueFinancefor theDepartmenttag.
- To search for values other than the filter value, use NOT_EQUALS. For example, for theResourceTagsfield, the filterDepartment NOT_EQUALS Financematches findings that don’t have the valueFinancefor theDepartmenttag.
 - NOT_CONTAINSand- NOT_EQUALSfilters on the same field are joined by- AND. A finding matches only if it matches all of those filters. For example, the filters- Department NOT_CONTAINS Security AND Department NOT_CONTAINS Financematch a finding that excludes both the- Securityand- Financevalues.- CONTAINSfilters can only be used with other- CONTAINSfilters.- NOT_CONTAINSfilters can only be used with other- NOT_CONTAINSfilters. You can’t have both a- CONTAINSfilter and a- NOT_CONTAINSfilter on the same field. Similarly, you can’t have both an- EQUALSfilter and a- NOT_EQUALSfilter on the same field. Combining filters in this way returns an error.- CONTAINSand- NOT_CONTAINSoperators can be used only with automation rules. For more information, see Automation rules in the User Guide.
- To search for values that include the filter value, use 
- Key string
- The key of the map filter. For example, for ResourceTags,Keyidentifies the name of the tag. ForUserDefinedFields,Keyis the name of the field.
- Value string
- The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Departmentmight beSecurity. If you providesecurityas the filter value, then there's no match.
- Comparison
AutomationRule Map Filter Comparison 
- The condition to apply to the key value when filtering Security Hub findings with a map filter. To search for values that have the filter value, use one of the following comparison operators: - To search for values that include the filter value, use CONTAINS. For example, for theResourceTagsfield, the filterDepartment CONTAINS Securitymatches findings that include the valueSecurityfor theDepartmenttag. In the same example, a finding with a value ofSecurity teamfor theDepartmenttag is a match.
- To search for values that exactly match the filter value, use EQUALS. For example, for theResourceTagsfield, the filterDepartment EQUALS Securitymatches findings that have the valueSecurityfor theDepartmenttag.
 - CONTAINSand- EQUALSfilters on the same field are joined by- OR. A finding matches if it matches any one of those filters. For example, the filters- Department CONTAINS Security OR Department CONTAINS Financematch a finding that includes either- Security,- Finance, or both values. To search for values that don't have the filter value, use one of the following comparison operators:- To search for values that exclude the filter value, use NOT_CONTAINS. For example, for theResourceTagsfield, the filterDepartment NOT_CONTAINS Financematches findings that exclude the valueFinancefor theDepartmenttag.
- To search for values other than the filter value, use NOT_EQUALS. For example, for theResourceTagsfield, the filterDepartment NOT_EQUALS Financematches findings that don’t have the valueFinancefor theDepartmenttag.
 - NOT_CONTAINSand- NOT_EQUALSfilters on the same field are joined by- AND. A finding matches only if it matches all of those filters. For example, the filters- Department NOT_CONTAINS Security AND Department NOT_CONTAINS Financematch a finding that excludes both the- Securityand- Financevalues.- CONTAINSfilters can only be used with other- CONTAINSfilters.- NOT_CONTAINSfilters can only be used with other- NOT_CONTAINSfilters. You can’t have both a- CONTAINSfilter and a- NOT_CONTAINSfilter on the same field. Similarly, you can’t have both an- EQUALSfilter and a- NOT_EQUALSfilter on the same field. Combining filters in this way returns an error.- CONTAINSand- NOT_CONTAINSoperators can be used only with automation rules. For more information, see Automation rules in the User Guide.
- To search for values that include the filter value, use 
- Key string
- The key of the map filter. For example, for ResourceTags,Keyidentifies the name of the tag. ForUserDefinedFields,Keyis the name of the field.
- Value string
- The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Departmentmight beSecurity. If you providesecurityas the filter value, then there's no match.
- comparison
AutomationRule Map Filter Comparison 
- The condition to apply to the key value when filtering Security Hub findings with a map filter. To search for values that have the filter value, use one of the following comparison operators: - To search for values that include the filter value, use CONTAINS. For example, for theResourceTagsfield, the filterDepartment CONTAINS Securitymatches findings that include the valueSecurityfor theDepartmenttag. In the same example, a finding with a value ofSecurity teamfor theDepartmenttag is a match.
- To search for values that exactly match the filter value, use EQUALS. For example, for theResourceTagsfield, the filterDepartment EQUALS Securitymatches findings that have the valueSecurityfor theDepartmenttag.
 - CONTAINSand- EQUALSfilters on the same field are joined by- OR. A finding matches if it matches any one of those filters. For example, the filters- Department CONTAINS Security OR Department CONTAINS Financematch a finding that includes either- Security,- Finance, or both values. To search for values that don't have the filter value, use one of the following comparison operators:- To search for values that exclude the filter value, use NOT_CONTAINS. For example, for theResourceTagsfield, the filterDepartment NOT_CONTAINS Financematches findings that exclude the valueFinancefor theDepartmenttag.
- To search for values other than the filter value, use NOT_EQUALS. For example, for theResourceTagsfield, the filterDepartment NOT_EQUALS Financematches findings that don’t have the valueFinancefor theDepartmenttag.
 - NOT_CONTAINSand- NOT_EQUALSfilters on the same field are joined by- AND. A finding matches only if it matches all of those filters. For example, the filters- Department NOT_CONTAINS Security AND Department NOT_CONTAINS Financematch a finding that excludes both the- Securityand- Financevalues.- CONTAINSfilters can only be used with other- CONTAINSfilters.- NOT_CONTAINSfilters can only be used with other- NOT_CONTAINSfilters. You can’t have both a- CONTAINSfilter and a- NOT_CONTAINSfilter on the same field. Similarly, you can’t have both an- EQUALSfilter and a- NOT_EQUALSfilter on the same field. Combining filters in this way returns an error.- CONTAINSand- NOT_CONTAINSoperators can be used only with automation rules. For more information, see Automation rules in the User Guide.
- To search for values that include the filter value, use 
- key String
- The key of the map filter. For example, for ResourceTags,Keyidentifies the name of the tag. ForUserDefinedFields,Keyis the name of the field.
- value String
- The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Departmentmight beSecurity. If you providesecurityas the filter value, then there's no match.
- comparison
AutomationRule Map Filter Comparison 
- The condition to apply to the key value when filtering Security Hub findings with a map filter. To search for values that have the filter value, use one of the following comparison operators: - To search for values that include the filter value, use CONTAINS. For example, for theResourceTagsfield, the filterDepartment CONTAINS Securitymatches findings that include the valueSecurityfor theDepartmenttag. In the same example, a finding with a value ofSecurity teamfor theDepartmenttag is a match.
- To search for values that exactly match the filter value, use EQUALS. For example, for theResourceTagsfield, the filterDepartment EQUALS Securitymatches findings that have the valueSecurityfor theDepartmenttag.
 - CONTAINSand- EQUALSfilters on the same field are joined by- OR. A finding matches if it matches any one of those filters. For example, the filters- Department CONTAINS Security OR Department CONTAINS Financematch a finding that includes either- Security,- Finance, or both values. To search for values that don't have the filter value, use one of the following comparison operators:- To search for values that exclude the filter value, use NOT_CONTAINS. For example, for theResourceTagsfield, the filterDepartment NOT_CONTAINS Financematches findings that exclude the valueFinancefor theDepartmenttag.
- To search for values other than the filter value, use NOT_EQUALS. For example, for theResourceTagsfield, the filterDepartment NOT_EQUALS Financematches findings that don’t have the valueFinancefor theDepartmenttag.
 - NOT_CONTAINSand- NOT_EQUALSfilters on the same field are joined by- AND. A finding matches only if it matches all of those filters. For example, the filters- Department NOT_CONTAINS Security AND Department NOT_CONTAINS Financematch a finding that excludes both the- Securityand- Financevalues.- CONTAINSfilters can only be used with other- CONTAINSfilters.- NOT_CONTAINSfilters can only be used with other- NOT_CONTAINSfilters. You can’t have both a- CONTAINSfilter and a- NOT_CONTAINSfilter on the same field. Similarly, you can’t have both an- EQUALSfilter and a- NOT_EQUALSfilter on the same field. Combining filters in this way returns an error.- CONTAINSand- NOT_CONTAINSoperators can be used only with automation rules. For more information, see Automation rules in the User Guide.
- To search for values that include the filter value, use 
- key string
- The key of the map filter. For example, for ResourceTags,Keyidentifies the name of the tag. ForUserDefinedFields,Keyis the name of the field.
- value string
- The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Departmentmight beSecurity. If you providesecurityas the filter value, then there's no match.
- comparison
AutomationRule Map Filter Comparison 
- The condition to apply to the key value when filtering Security Hub findings with a map filter. To search for values that have the filter value, use one of the following comparison operators: - To search for values that include the filter value, use CONTAINS. For example, for theResourceTagsfield, the filterDepartment CONTAINS Securitymatches findings that include the valueSecurityfor theDepartmenttag. In the same example, a finding with a value ofSecurity teamfor theDepartmenttag is a match.
- To search for values that exactly match the filter value, use EQUALS. For example, for theResourceTagsfield, the filterDepartment EQUALS Securitymatches findings that have the valueSecurityfor theDepartmenttag.
 - CONTAINSand- EQUALSfilters on the same field are joined by- OR. A finding matches if it matches any one of those filters. For example, the filters- Department CONTAINS Security OR Department CONTAINS Financematch a finding that includes either- Security,- Finance, or both values. To search for values that don't have the filter value, use one of the following comparison operators:- To search for values that exclude the filter value, use NOT_CONTAINS. For example, for theResourceTagsfield, the filterDepartment NOT_CONTAINS Financematches findings that exclude the valueFinancefor theDepartmenttag.
- To search for values other than the filter value, use NOT_EQUALS. For example, for theResourceTagsfield, the filterDepartment NOT_EQUALS Financematches findings that don’t have the valueFinancefor theDepartmenttag.
 - NOT_CONTAINSand- NOT_EQUALSfilters on the same field are joined by- AND. A finding matches only if it matches all of those filters. For example, the filters- Department NOT_CONTAINS Security AND Department NOT_CONTAINS Financematch a finding that excludes both the- Securityand- Financevalues.- CONTAINSfilters can only be used with other- CONTAINSfilters.- NOT_CONTAINSfilters can only be used with other- NOT_CONTAINSfilters. You can’t have both a- CONTAINSfilter and a- NOT_CONTAINSfilter on the same field. Similarly, you can’t have both an- EQUALSfilter and a- NOT_EQUALSfilter on the same field. Combining filters in this way returns an error.- CONTAINSand- NOT_CONTAINSoperators can be used only with automation rules. For more information, see Automation rules in the User Guide.
- To search for values that include the filter value, use 
- key str
- The key of the map filter. For example, for ResourceTags,Keyidentifies the name of the tag. ForUserDefinedFields,Keyis the name of the field.
- value str
- The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Departmentmight beSecurity. If you providesecurityas the filter value, then there's no match.
- comparison "EQUALS" | "NOT_EQUALS" | "CONTAINS" | "NOT_CONTAINS"
- The condition to apply to the key value when filtering Security Hub findings with a map filter. To search for values that have the filter value, use one of the following comparison operators: - To search for values that include the filter value, use CONTAINS. For example, for theResourceTagsfield, the filterDepartment CONTAINS Securitymatches findings that include the valueSecurityfor theDepartmenttag. In the same example, a finding with a value ofSecurity teamfor theDepartmenttag is a match.
- To search for values that exactly match the filter value, use EQUALS. For example, for theResourceTagsfield, the filterDepartment EQUALS Securitymatches findings that have the valueSecurityfor theDepartmenttag.
 - CONTAINSand- EQUALSfilters on the same field are joined by- OR. A finding matches if it matches any one of those filters. For example, the filters- Department CONTAINS Security OR Department CONTAINS Financematch a finding that includes either- Security,- Finance, or both values. To search for values that don't have the filter value, use one of the following comparison operators:- To search for values that exclude the filter value, use NOT_CONTAINS. For example, for theResourceTagsfield, the filterDepartment NOT_CONTAINS Financematches findings that exclude the valueFinancefor theDepartmenttag.
- To search for values other than the filter value, use NOT_EQUALS. For example, for theResourceTagsfield, the filterDepartment NOT_EQUALS Financematches findings that don’t have the valueFinancefor theDepartmenttag.
 - NOT_CONTAINSand- NOT_EQUALSfilters on the same field are joined by- AND. A finding matches only if it matches all of those filters. For example, the filters- Department NOT_CONTAINS Security AND Department NOT_CONTAINS Financematch a finding that excludes both the- Securityand- Financevalues.- CONTAINSfilters can only be used with other- CONTAINSfilters.- NOT_CONTAINSfilters can only be used with other- NOT_CONTAINSfilters. You can’t have both a- CONTAINSfilter and a- NOT_CONTAINSfilter on the same field. Similarly, you can’t have both an- EQUALSfilter and a- NOT_EQUALSfilter on the same field. Combining filters in this way returns an error.- CONTAINSand- NOT_CONTAINSoperators can be used only with automation rules. For more information, see Automation rules in the User Guide.
- To search for values that include the filter value, use 
- key String
- The key of the map filter. For example, for ResourceTags,Keyidentifies the name of the tag. ForUserDefinedFields,Keyis the name of the field.
- value String
- The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Departmentmight beSecurity. If you providesecurityas the filter value, then there's no match.
AutomationRuleMapFilterComparison    
AutomationRuleNoteUpdate   
- text str
- The updated note text.
- updated_by str
- The principal that updated the note.
AutomationRuleNumberFilter   
AutomationRuleRelatedFinding   
- Id string
- The product-generated identifier for a related finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- ProductArn string
- The Amazon Resource Name (ARN) for the product that generated a related finding.
- Id string
- The product-generated identifier for a related finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- ProductArn string
- The Amazon Resource Name (ARN) for the product that generated a related finding.
- id String
- The product-generated identifier for a related finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- productArn String
- The Amazon Resource Name (ARN) for the product that generated a related finding.
- id string
- The product-generated identifier for a related finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- productArn string
- The Amazon Resource Name (ARN) for the product that generated a related finding.
- id str
- The product-generated identifier for a related finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- product_arn str
- The Amazon Resource Name (ARN) for the product that generated a related finding.
- id String
- The product-generated identifier for a related finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- productArn String
- The Amazon Resource Name (ARN) for the product that generated a related finding.
AutomationRuleRuleStatus   
AutomationRuleSeverityUpdate   
- Label
Pulumi.Aws Native. Security Hub. Automation Rule Severity Update Label 
- The severity value of the finding. The allowed values are the following.- INFORMATIONAL- No issue was found.
- LOW- The issue does not require action on its own.
- MEDIUM- The issue must be addressed but not urgently.
- HIGH- The issue must be addressed as a priority.
- CRITICAL- The issue must be remediated immediately to avoid it escalating.
 
- Normalized int
- The normalized severity for the finding. This attribute is to be deprecated in favor of Label. If you provideNormalizedand don't provideLabel,Labelis set automatically as follows.- 0 - INFORMATIONAL
- 1–39 - LOW
- 40–69 - MEDIUM
- 70–89 - HIGH
- 90–100 - CRITICAL
 
- 0 - 
- Product double
- The native severity as defined by the AWS service or integrated partner product that generated the finding.
- Label
AutomationRule Severity Update Label 
- The severity value of the finding. The allowed values are the following.- INFORMATIONAL- No issue was found.
- LOW- The issue does not require action on its own.
- MEDIUM- The issue must be addressed but not urgently.
- HIGH- The issue must be addressed as a priority.
- CRITICAL- The issue must be remediated immediately to avoid it escalating.
 
- Normalized int
- The normalized severity for the finding. This attribute is to be deprecated in favor of Label. If you provideNormalizedand don't provideLabel,Labelis set automatically as follows.- 0 - INFORMATIONAL
- 1–39 - LOW
- 40–69 - MEDIUM
- 70–89 - HIGH
- 90–100 - CRITICAL
 
- 0 - 
- Product float64
- The native severity as defined by the AWS service or integrated partner product that generated the finding.
- label
AutomationRule Severity Update Label 
- The severity value of the finding. The allowed values are the following.- INFORMATIONAL- No issue was found.
- LOW- The issue does not require action on its own.
- MEDIUM- The issue must be addressed but not urgently.
- HIGH- The issue must be addressed as a priority.
- CRITICAL- The issue must be remediated immediately to avoid it escalating.
 
- normalized Integer
- The normalized severity for the finding. This attribute is to be deprecated in favor of Label. If you provideNormalizedand don't provideLabel,Labelis set automatically as follows.- 0 - INFORMATIONAL
- 1–39 - LOW
- 40–69 - MEDIUM
- 70–89 - HIGH
- 90–100 - CRITICAL
 
- 0 - 
- product Double
- The native severity as defined by the AWS service or integrated partner product that generated the finding.
- label
AutomationRule Severity Update Label 
- The severity value of the finding. The allowed values are the following.- INFORMATIONAL- No issue was found.
- LOW- The issue does not require action on its own.
- MEDIUM- The issue must be addressed but not urgently.
- HIGH- The issue must be addressed as a priority.
- CRITICAL- The issue must be remediated immediately to avoid it escalating.
 
- normalized number
- The normalized severity for the finding. This attribute is to be deprecated in favor of Label. If you provideNormalizedand don't provideLabel,Labelis set automatically as follows.- 0 - INFORMATIONAL
- 1–39 - LOW
- 40–69 - MEDIUM
- 70–89 - HIGH
- 90–100 - CRITICAL
 
- 0 - 
- product number
- The native severity as defined by the AWS service or integrated partner product that generated the finding.
- label
AutomationRule Severity Update Label 
- The severity value of the finding. The allowed values are the following.- INFORMATIONAL- No issue was found.
- LOW- The issue does not require action on its own.
- MEDIUM- The issue must be addressed but not urgently.
- HIGH- The issue must be addressed as a priority.
- CRITICAL- The issue must be remediated immediately to avoid it escalating.
 
- normalized int
- The normalized severity for the finding. This attribute is to be deprecated in favor of Label. If you provideNormalizedand don't provideLabel,Labelis set automatically as follows.- 0 - INFORMATIONAL
- 1–39 - LOW
- 40–69 - MEDIUM
- 70–89 - HIGH
- 90–100 - CRITICAL
 
- 0 - 
- product float
- The native severity as defined by the AWS service or integrated partner product that generated the finding.
- label "INFORMATIONAL" | "LOW" | "MEDIUM" | "HIGH" | "CRITICAL"
- The severity value of the finding. The allowed values are the following.- INFORMATIONAL- No issue was found.
- LOW- The issue does not require action on its own.
- MEDIUM- The issue must be addressed but not urgently.
- HIGH- The issue must be addressed as a priority.
- CRITICAL- The issue must be remediated immediately to avoid it escalating.
 
- normalized Number
- The normalized severity for the finding. This attribute is to be deprecated in favor of Label. If you provideNormalizedand don't provideLabel,Labelis set automatically as follows.- 0 - INFORMATIONAL
- 1–39 - LOW
- 40–69 - MEDIUM
- 70–89 - HIGH
- 90–100 - CRITICAL
 
- 0 - 
- product Number
- The native severity as defined by the AWS service or integrated partner product that generated the finding.
AutomationRuleSeverityUpdateLabel    
AutomationRuleStringFilter   
- Comparison
Pulumi.Aws Native. Security Hub. Automation Rule String Filter Comparison 
- The condition to apply to a string value when filtering Security Hub findings. To search for values that have the filter value, use one of the following comparison operators: - To search for values that include the filter value, use CONTAINS. For example, the filterTitle CONTAINS CloudFrontmatches findings that have aTitlethat includes the string CloudFront.
- To search for values that exactly match the filter value, use EQUALS. For example, the filterAwsAccountId EQUALS 123456789012only matches findings that have an account ID of123456789012.
- To search for values that start with the filter value, use PREFIX. For example, the filterResourceRegion PREFIX usmatches findings that have aResourceRegionthat starts withus. AResourceRegionthat starts with a different value, such asaf,ap, orca, doesn't match.
 - CONTAINS,- EQUALS, and- PREFIXfilters on the same field are joined by- OR. A finding matches if it matches any one of those filters. For example, the filters- Title CONTAINS CloudFront OR Title CONTAINS CloudWatchmatch a finding that includes either- CloudFront,- CloudWatch, or both strings in the title. To search for values that don’t have the filter value, use one of the following comparison operators:- To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filterTitle NOT_CONTAINS CloudFrontmatches findings that have aTitlethat excludes the string CloudFront.
- To search for values other than the filter value, use NOT_EQUALS. For example, the filterAwsAccountId NOT_EQUALS 123456789012only matches findings that have an account ID other than123456789012.
- To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filterResourceRegion PREFIX_NOT_EQUALS usmatches findings with aResourceRegionthat starts with a value other thanus.
 - NOT_CONTAINS,- NOT_EQUALS, and- PREFIX_NOT_EQUALSfilters on the same field are joined by- AND. A finding matches only if it matches all of those filters. For example, the filters- Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatchmatch a finding that excludes both- CloudFrontand- CloudWatchin the title. You can’t have both a- CONTAINSfilter and a- NOT_CONTAINSfilter on the same field. Similarly, you can't provide both an- EQUALSfilter and a- NOT_EQUALSor- PREFIX_NOT_EQUALSfilter on the same field. Combining filters in this way returns an error.- CONTAINSfilters can only be used with other- CONTAINSfilters.- NOT_CONTAINSfilters can only be used with other- NOT_CONTAINSfilters. You can combine- PREFIXfilters with- NOT_EQUALSor- PREFIX_NOT_EQUALSfilters for the same field. Security Hub first processes the- PREFIXfilters, and then the- NOT_EQUALSor- PREFIX_NOT_EQUALSfilters. For example, for the following filters, Security Hub first identifies findings that have resource types that start with either- AwsIamor- AwsEc2. It then excludes findings that have a resource type of- AwsIamPolicyand findings that have a resource type of- AwsEc2NetworkInterface.- ResourceType PREFIX AwsIam
- ResourceType PREFIX AwsEc2
- ResourceType NOT_EQUALS AwsIamPolicy
- ResourceType NOT_EQUALS AwsEc2NetworkInterface
 - CONTAINSand- NOT_CONTAINSoperators can be used only with automation rules. For more information, see Automation rules in the User Guide.
- To search for values that include the filter value, use 
- Value string
- The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you providesecurity hubas the filter value, there's no match.
- Comparison
AutomationRule String Filter Comparison 
- The condition to apply to a string value when filtering Security Hub findings. To search for values that have the filter value, use one of the following comparison operators: - To search for values that include the filter value, use CONTAINS. For example, the filterTitle CONTAINS CloudFrontmatches findings that have aTitlethat includes the string CloudFront.
- To search for values that exactly match the filter value, use EQUALS. For example, the filterAwsAccountId EQUALS 123456789012only matches findings that have an account ID of123456789012.
- To search for values that start with the filter value, use PREFIX. For example, the filterResourceRegion PREFIX usmatches findings that have aResourceRegionthat starts withus. AResourceRegionthat starts with a different value, such asaf,ap, orca, doesn't match.
 - CONTAINS,- EQUALS, and- PREFIXfilters on the same field are joined by- OR. A finding matches if it matches any one of those filters. For example, the filters- Title CONTAINS CloudFront OR Title CONTAINS CloudWatchmatch a finding that includes either- CloudFront,- CloudWatch, or both strings in the title. To search for values that don’t have the filter value, use one of the following comparison operators:- To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filterTitle NOT_CONTAINS CloudFrontmatches findings that have aTitlethat excludes the string CloudFront.
- To search for values other than the filter value, use NOT_EQUALS. For example, the filterAwsAccountId NOT_EQUALS 123456789012only matches findings that have an account ID other than123456789012.
- To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filterResourceRegion PREFIX_NOT_EQUALS usmatches findings with aResourceRegionthat starts with a value other thanus.
 - NOT_CONTAINS,- NOT_EQUALS, and- PREFIX_NOT_EQUALSfilters on the same field are joined by- AND. A finding matches only if it matches all of those filters. For example, the filters- Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatchmatch a finding that excludes both- CloudFrontand- CloudWatchin the title. You can’t have both a- CONTAINSfilter and a- NOT_CONTAINSfilter on the same field. Similarly, you can't provide both an- EQUALSfilter and a- NOT_EQUALSor- PREFIX_NOT_EQUALSfilter on the same field. Combining filters in this way returns an error.- CONTAINSfilters can only be used with other- CONTAINSfilters.- NOT_CONTAINSfilters can only be used with other- NOT_CONTAINSfilters. You can combine- PREFIXfilters with- NOT_EQUALSor- PREFIX_NOT_EQUALSfilters for the same field. Security Hub first processes the- PREFIXfilters, and then the- NOT_EQUALSor- PREFIX_NOT_EQUALSfilters. For example, for the following filters, Security Hub first identifies findings that have resource types that start with either- AwsIamor- AwsEc2. It then excludes findings that have a resource type of- AwsIamPolicyand findings that have a resource type of- AwsEc2NetworkInterface.- ResourceType PREFIX AwsIam
- ResourceType PREFIX AwsEc2
- ResourceType NOT_EQUALS AwsIamPolicy
- ResourceType NOT_EQUALS AwsEc2NetworkInterface
 - CONTAINSand- NOT_CONTAINSoperators can be used only with automation rules. For more information, see Automation rules in the User Guide.
- To search for values that include the filter value, use 
- Value string
- The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you providesecurity hubas the filter value, there's no match.
- comparison
AutomationRule String Filter Comparison 
- The condition to apply to a string value when filtering Security Hub findings. To search for values that have the filter value, use one of the following comparison operators: - To search for values that include the filter value, use CONTAINS. For example, the filterTitle CONTAINS CloudFrontmatches findings that have aTitlethat includes the string CloudFront.
- To search for values that exactly match the filter value, use EQUALS. For example, the filterAwsAccountId EQUALS 123456789012only matches findings that have an account ID of123456789012.
- To search for values that start with the filter value, use PREFIX. For example, the filterResourceRegion PREFIX usmatches findings that have aResourceRegionthat starts withus. AResourceRegionthat starts with a different value, such asaf,ap, orca, doesn't match.
 - CONTAINS,- EQUALS, and- PREFIXfilters on the same field are joined by- OR. A finding matches if it matches any one of those filters. For example, the filters- Title CONTAINS CloudFront OR Title CONTAINS CloudWatchmatch a finding that includes either- CloudFront,- CloudWatch, or both strings in the title. To search for values that don’t have the filter value, use one of the following comparison operators:- To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filterTitle NOT_CONTAINS CloudFrontmatches findings that have aTitlethat excludes the string CloudFront.
- To search for values other than the filter value, use NOT_EQUALS. For example, the filterAwsAccountId NOT_EQUALS 123456789012only matches findings that have an account ID other than123456789012.
- To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filterResourceRegion PREFIX_NOT_EQUALS usmatches findings with aResourceRegionthat starts with a value other thanus.
 - NOT_CONTAINS,- NOT_EQUALS, and- PREFIX_NOT_EQUALSfilters on the same field are joined by- AND. A finding matches only if it matches all of those filters. For example, the filters- Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatchmatch a finding that excludes both- CloudFrontand- CloudWatchin the title. You can’t have both a- CONTAINSfilter and a- NOT_CONTAINSfilter on the same field. Similarly, you can't provide both an- EQUALSfilter and a- NOT_EQUALSor- PREFIX_NOT_EQUALSfilter on the same field. Combining filters in this way returns an error.- CONTAINSfilters can only be used with other- CONTAINSfilters.- NOT_CONTAINSfilters can only be used with other- NOT_CONTAINSfilters. You can combine- PREFIXfilters with- NOT_EQUALSor- PREFIX_NOT_EQUALSfilters for the same field. Security Hub first processes the- PREFIXfilters, and then the- NOT_EQUALSor- PREFIX_NOT_EQUALSfilters. For example, for the following filters, Security Hub first identifies findings that have resource types that start with either- AwsIamor- AwsEc2. It then excludes findings that have a resource type of- AwsIamPolicyand findings that have a resource type of- AwsEc2NetworkInterface.- ResourceType PREFIX AwsIam
- ResourceType PREFIX AwsEc2
- ResourceType NOT_EQUALS AwsIamPolicy
- ResourceType NOT_EQUALS AwsEc2NetworkInterface
 - CONTAINSand- NOT_CONTAINSoperators can be used only with automation rules. For more information, see Automation rules in the User Guide.
- To search for values that include the filter value, use 
- value String
- The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you providesecurity hubas the filter value, there's no match.
- comparison
AutomationRule String Filter Comparison 
- The condition to apply to a string value when filtering Security Hub findings. To search for values that have the filter value, use one of the following comparison operators: - To search for values that include the filter value, use CONTAINS. For example, the filterTitle CONTAINS CloudFrontmatches findings that have aTitlethat includes the string CloudFront.
- To search for values that exactly match the filter value, use EQUALS. For example, the filterAwsAccountId EQUALS 123456789012only matches findings that have an account ID of123456789012.
- To search for values that start with the filter value, use PREFIX. For example, the filterResourceRegion PREFIX usmatches findings that have aResourceRegionthat starts withus. AResourceRegionthat starts with a different value, such asaf,ap, orca, doesn't match.
 - CONTAINS,- EQUALS, and- PREFIXfilters on the same field are joined by- OR. A finding matches if it matches any one of those filters. For example, the filters- Title CONTAINS CloudFront OR Title CONTAINS CloudWatchmatch a finding that includes either- CloudFront,- CloudWatch, or both strings in the title. To search for values that don’t have the filter value, use one of the following comparison operators:- To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filterTitle NOT_CONTAINS CloudFrontmatches findings that have aTitlethat excludes the string CloudFront.
- To search for values other than the filter value, use NOT_EQUALS. For example, the filterAwsAccountId NOT_EQUALS 123456789012only matches findings that have an account ID other than123456789012.
- To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filterResourceRegion PREFIX_NOT_EQUALS usmatches findings with aResourceRegionthat starts with a value other thanus.
 - NOT_CONTAINS,- NOT_EQUALS, and- PREFIX_NOT_EQUALSfilters on the same field are joined by- AND. A finding matches only if it matches all of those filters. For example, the filters- Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatchmatch a finding that excludes both- CloudFrontand- CloudWatchin the title. You can’t have both a- CONTAINSfilter and a- NOT_CONTAINSfilter on the same field. Similarly, you can't provide both an- EQUALSfilter and a- NOT_EQUALSor- PREFIX_NOT_EQUALSfilter on the same field. Combining filters in this way returns an error.- CONTAINSfilters can only be used with other- CONTAINSfilters.- NOT_CONTAINSfilters can only be used with other- NOT_CONTAINSfilters. You can combine- PREFIXfilters with- NOT_EQUALSor- PREFIX_NOT_EQUALSfilters for the same field. Security Hub first processes the- PREFIXfilters, and then the- NOT_EQUALSor- PREFIX_NOT_EQUALSfilters. For example, for the following filters, Security Hub first identifies findings that have resource types that start with either- AwsIamor- AwsEc2. It then excludes findings that have a resource type of- AwsIamPolicyand findings that have a resource type of- AwsEc2NetworkInterface.- ResourceType PREFIX AwsIam
- ResourceType PREFIX AwsEc2
- ResourceType NOT_EQUALS AwsIamPolicy
- ResourceType NOT_EQUALS AwsEc2NetworkInterface
 - CONTAINSand- NOT_CONTAINSoperators can be used only with automation rules. For more information, see Automation rules in the User Guide.
- To search for values that include the filter value, use 
- value string
- The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you providesecurity hubas the filter value, there's no match.
- comparison
AutomationRule String Filter Comparison 
- The condition to apply to a string value when filtering Security Hub findings. To search for values that have the filter value, use one of the following comparison operators: - To search for values that include the filter value, use CONTAINS. For example, the filterTitle CONTAINS CloudFrontmatches findings that have aTitlethat includes the string CloudFront.
- To search for values that exactly match the filter value, use EQUALS. For example, the filterAwsAccountId EQUALS 123456789012only matches findings that have an account ID of123456789012.
- To search for values that start with the filter value, use PREFIX. For example, the filterResourceRegion PREFIX usmatches findings that have aResourceRegionthat starts withus. AResourceRegionthat starts with a different value, such asaf,ap, orca, doesn't match.
 - CONTAINS,- EQUALS, and- PREFIXfilters on the same field are joined by- OR. A finding matches if it matches any one of those filters. For example, the filters- Title CONTAINS CloudFront OR Title CONTAINS CloudWatchmatch a finding that includes either- CloudFront,- CloudWatch, or both strings in the title. To search for values that don’t have the filter value, use one of the following comparison operators:- To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filterTitle NOT_CONTAINS CloudFrontmatches findings that have aTitlethat excludes the string CloudFront.
- To search for values other than the filter value, use NOT_EQUALS. For example, the filterAwsAccountId NOT_EQUALS 123456789012only matches findings that have an account ID other than123456789012.
- To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filterResourceRegion PREFIX_NOT_EQUALS usmatches findings with aResourceRegionthat starts with a value other thanus.
 - NOT_CONTAINS,- NOT_EQUALS, and- PREFIX_NOT_EQUALSfilters on the same field are joined by- AND. A finding matches only if it matches all of those filters. For example, the filters- Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatchmatch a finding that excludes both- CloudFrontand- CloudWatchin the title. You can’t have both a- CONTAINSfilter and a- NOT_CONTAINSfilter on the same field. Similarly, you can't provide both an- EQUALSfilter and a- NOT_EQUALSor- PREFIX_NOT_EQUALSfilter on the same field. Combining filters in this way returns an error.- CONTAINSfilters can only be used with other- CONTAINSfilters.- NOT_CONTAINSfilters can only be used with other- NOT_CONTAINSfilters. You can combine- PREFIXfilters with- NOT_EQUALSor- PREFIX_NOT_EQUALSfilters for the same field. Security Hub first processes the- PREFIXfilters, and then the- NOT_EQUALSor- PREFIX_NOT_EQUALSfilters. For example, for the following filters, Security Hub first identifies findings that have resource types that start with either- AwsIamor- AwsEc2. It then excludes findings that have a resource type of- AwsIamPolicyand findings that have a resource type of- AwsEc2NetworkInterface.- ResourceType PREFIX AwsIam
- ResourceType PREFIX AwsEc2
- ResourceType NOT_EQUALS AwsIamPolicy
- ResourceType NOT_EQUALS AwsEc2NetworkInterface
 - CONTAINSand- NOT_CONTAINSoperators can be used only with automation rules. For more information, see Automation rules in the User Guide.
- To search for values that include the filter value, use 
- value str
- The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you providesecurity hubas the filter value, there's no match.
- comparison "EQUALS" | "PREFIX" | "NOT_EQUALS" | "PREFIX_NOT_EQUALS" | "CONTAINS" | "NOT_CONTAINS"
- The condition to apply to a string value when filtering Security Hub findings. To search for values that have the filter value, use one of the following comparison operators: - To search for values that include the filter value, use CONTAINS. For example, the filterTitle CONTAINS CloudFrontmatches findings that have aTitlethat includes the string CloudFront.
- To search for values that exactly match the filter value, use EQUALS. For example, the filterAwsAccountId EQUALS 123456789012only matches findings that have an account ID of123456789012.
- To search for values that start with the filter value, use PREFIX. For example, the filterResourceRegion PREFIX usmatches findings that have aResourceRegionthat starts withus. AResourceRegionthat starts with a different value, such asaf,ap, orca, doesn't match.
 - CONTAINS,- EQUALS, and- PREFIXfilters on the same field are joined by- OR. A finding matches if it matches any one of those filters. For example, the filters- Title CONTAINS CloudFront OR Title CONTAINS CloudWatchmatch a finding that includes either- CloudFront,- CloudWatch, or both strings in the title. To search for values that don’t have the filter value, use one of the following comparison operators:- To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filterTitle NOT_CONTAINS CloudFrontmatches findings that have aTitlethat excludes the string CloudFront.
- To search for values other than the filter value, use NOT_EQUALS. For example, the filterAwsAccountId NOT_EQUALS 123456789012only matches findings that have an account ID other than123456789012.
- To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filterResourceRegion PREFIX_NOT_EQUALS usmatches findings with aResourceRegionthat starts with a value other thanus.
 - NOT_CONTAINS,- NOT_EQUALS, and- PREFIX_NOT_EQUALSfilters on the same field are joined by- AND. A finding matches only if it matches all of those filters. For example, the filters- Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatchmatch a finding that excludes both- CloudFrontand- CloudWatchin the title. You can’t have both a- CONTAINSfilter and a- NOT_CONTAINSfilter on the same field. Similarly, you can't provide both an- EQUALSfilter and a- NOT_EQUALSor- PREFIX_NOT_EQUALSfilter on the same field. Combining filters in this way returns an error.- CONTAINSfilters can only be used with other- CONTAINSfilters.- NOT_CONTAINSfilters can only be used with other- NOT_CONTAINSfilters. You can combine- PREFIXfilters with- NOT_EQUALSor- PREFIX_NOT_EQUALSfilters for the same field. Security Hub first processes the- PREFIXfilters, and then the- NOT_EQUALSor- PREFIX_NOT_EQUALSfilters. For example, for the following filters, Security Hub first identifies findings that have resource types that start with either- AwsIamor- AwsEc2. It then excludes findings that have a resource type of- AwsIamPolicyand findings that have a resource type of- AwsEc2NetworkInterface.- ResourceType PREFIX AwsIam
- ResourceType PREFIX AwsEc2
- ResourceType NOT_EQUALS AwsIamPolicy
- ResourceType NOT_EQUALS AwsEc2NetworkInterface
 - CONTAINSand- NOT_CONTAINSoperators can be used only with automation rules. For more information, see Automation rules in the User Guide.
- To search for values that include the filter value, use 
- value String
- The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub. If you providesecurity hubas the filter value, there's no match.
AutomationRuleStringFilterComparison    
AutomationRuleWorkflowUpdate   
- Status
Pulumi.Aws Native. Security Hub. Automation Rule Workflow Update Status 
- The status of the investigation into the finding. The workflow status is specific to an individual finding. It does not affect the generation of new findings. For example, setting the workflow status to - SUPPRESSEDor- RESOLVEDdoes not prevent a new finding for the same issue. The allowed values are the following.- NEW- The initial state of a finding, before it is reviewed. Security Hub also resets- WorkFlowStatusfrom- NOTIFIEDor- RESOLVEDto- NEWin the following cases:
- The record state changes from - ARCHIVEDto- ACTIVE.
- The compliance status changes from - PASSEDto either- WARNING,- FAILED, or- NOT_AVAILABLE.
- NOTIFIED- Indicates that you notified the resource owner about the security issue. Used when the initial reviewer is not the resource owner, and needs intervention from the resource owner.
- RESOLVED- The finding was reviewed and remediated and is now considered resolved.
- SUPPRESSED- Indicates that you reviewed the finding and don't believe that any action is needed. The finding is no longer updated.
 
- Status
AutomationRule Workflow Update Status 
- The status of the investigation into the finding. The workflow status is specific to an individual finding. It does not affect the generation of new findings. For example, setting the workflow status to - SUPPRESSEDor- RESOLVEDdoes not prevent a new finding for the same issue. The allowed values are the following.- NEW- The initial state of a finding, before it is reviewed. Security Hub also resets- WorkFlowStatusfrom- NOTIFIEDor- RESOLVEDto- NEWin the following cases:
- The record state changes from - ARCHIVEDto- ACTIVE.
- The compliance status changes from - PASSEDto either- WARNING,- FAILED, or- NOT_AVAILABLE.
- NOTIFIED- Indicates that you notified the resource owner about the security issue. Used when the initial reviewer is not the resource owner, and needs intervention from the resource owner.
- RESOLVED- The finding was reviewed and remediated and is now considered resolved.
- SUPPRESSED- Indicates that you reviewed the finding and don't believe that any action is needed. The finding is no longer updated.
 
- status
AutomationRule Workflow Update Status 
- The status of the investigation into the finding. The workflow status is specific to an individual finding. It does not affect the generation of new findings. For example, setting the workflow status to - SUPPRESSEDor- RESOLVEDdoes not prevent a new finding for the same issue. The allowed values are the following.- NEW- The initial state of a finding, before it is reviewed. Security Hub also resets- WorkFlowStatusfrom- NOTIFIEDor- RESOLVEDto- NEWin the following cases:
- The record state changes from - ARCHIVEDto- ACTIVE.
- The compliance status changes from - PASSEDto either- WARNING,- FAILED, or- NOT_AVAILABLE.
- NOTIFIED- Indicates that you notified the resource owner about the security issue. Used when the initial reviewer is not the resource owner, and needs intervention from the resource owner.
- RESOLVED- The finding was reviewed and remediated and is now considered resolved.
- SUPPRESSED- Indicates that you reviewed the finding and don't believe that any action is needed. The finding is no longer updated.
 
- status
AutomationRule Workflow Update Status 
- The status of the investigation into the finding. The workflow status is specific to an individual finding. It does not affect the generation of new findings. For example, setting the workflow status to - SUPPRESSEDor- RESOLVEDdoes not prevent a new finding for the same issue. The allowed values are the following.- NEW- The initial state of a finding, before it is reviewed. Security Hub also resets- WorkFlowStatusfrom- NOTIFIEDor- RESOLVEDto- NEWin the following cases:
- The record state changes from - ARCHIVEDto- ACTIVE.
- The compliance status changes from - PASSEDto either- WARNING,- FAILED, or- NOT_AVAILABLE.
- NOTIFIED- Indicates that you notified the resource owner about the security issue. Used when the initial reviewer is not the resource owner, and needs intervention from the resource owner.
- RESOLVED- The finding was reviewed and remediated and is now considered resolved.
- SUPPRESSED- Indicates that you reviewed the finding and don't believe that any action is needed. The finding is no longer updated.
 
- status
AutomationRule Workflow Update Status 
- The status of the investigation into the finding. The workflow status is specific to an individual finding. It does not affect the generation of new findings. For example, setting the workflow status to - SUPPRESSEDor- RESOLVEDdoes not prevent a new finding for the same issue. The allowed values are the following.- NEW- The initial state of a finding, before it is reviewed. Security Hub also resets- WorkFlowStatusfrom- NOTIFIEDor- RESOLVEDto- NEWin the following cases:
- The record state changes from - ARCHIVEDto- ACTIVE.
- The compliance status changes from - PASSEDto either- WARNING,- FAILED, or- NOT_AVAILABLE.
- NOTIFIED- Indicates that you notified the resource owner about the security issue. Used when the initial reviewer is not the resource owner, and needs intervention from the resource owner.
- RESOLVED- The finding was reviewed and remediated and is now considered resolved.
- SUPPRESSED- Indicates that you reviewed the finding and don't believe that any action is needed. The finding is no longer updated.
 
- status "NEW" | "NOTIFIED" | "RESOLVED" | "SUPPRESSED"
- The status of the investigation into the finding. The workflow status is specific to an individual finding. It does not affect the generation of new findings. For example, setting the workflow status to - SUPPRESSEDor- RESOLVEDdoes not prevent a new finding for the same issue. The allowed values are the following.- NEW- The initial state of a finding, before it is reviewed. Security Hub also resets- WorkFlowStatusfrom- NOTIFIEDor- RESOLVEDto- NEWin the following cases:
- The record state changes from - ARCHIVEDto- ACTIVE.
- The compliance status changes from - PASSEDto either- WARNING,- FAILED, or- NOT_AVAILABLE.
- NOTIFIED- Indicates that you notified the resource owner about the security issue. Used when the initial reviewer is not the resource owner, and needs intervention from the resource owner.
- RESOLVED- The finding was reviewed and remediated and is now considered resolved.
- SUPPRESSED- Indicates that you reviewed the finding and don't believe that any action is needed. The finding is no longer updated.
 
AutomationRuleWorkflowUpdateStatus    
AutomationRulesAction  
- FindingFields Pulumi.Update Aws Native. Security Hub. Inputs. Automation Rules Finding Fields Update 
- Specifies that the automation rule action is an update to a finding field.
- Type
Pulumi.Aws Native. Security Hub. Automation Rules Action Type 
- Specifies the type of action that Security Hub takes when a finding matches the defined criteria of a rule.
- FindingFields AutomationUpdate Rules Finding Fields Update 
- Specifies that the automation rule action is an update to a finding field.
- Type
AutomationRules Action Type 
- Specifies the type of action that Security Hub takes when a finding matches the defined criteria of a rule.
- findingFields AutomationUpdate Rules Finding Fields Update 
- Specifies that the automation rule action is an update to a finding field.
- type
AutomationRules Action Type 
- Specifies the type of action that Security Hub takes when a finding matches the defined criteria of a rule.
- findingFields AutomationUpdate Rules Finding Fields Update 
- Specifies that the automation rule action is an update to a finding field.
- type
AutomationRules Action Type 
- Specifies the type of action that Security Hub takes when a finding matches the defined criteria of a rule.
- finding_fields_ Automationupdate Rules Finding Fields Update 
- Specifies that the automation rule action is an update to a finding field.
- type
AutomationRules Action Type 
- Specifies the type of action that Security Hub takes when a finding matches the defined criteria of a rule.
- findingFields Property MapUpdate 
- Specifies that the automation rule action is an update to a finding field.
- type "FINDING_FIELDS_UPDATE"
- Specifies the type of action that Security Hub takes when a finding matches the defined criteria of a rule.
AutomationRulesActionType   
AutomationRulesFindingFieldsUpdate    
- Confidence int
- The rule action updates the Confidencefield of a finding.
- Criticality int
- The rule action updates the Criticalityfield of a finding.
- Note
Pulumi.Aws Native. Security Hub. Inputs. Automation Rule Note Update 
- The rule action will update the Notefield of a finding.
- 
List<Pulumi.Aws Native. Security Hub. Inputs. Automation Rule Related Finding> 
- The rule action will update the RelatedFindingsfield of a finding.
- Severity
Pulumi.Aws Native. Security Hub. Inputs. Automation Rule Severity Update 
- The rule action will update the Severityfield of a finding.
- Types List<string>
- The rule action updates the Typesfield of a finding.
- UserDefined Dictionary<string, string>Fields 
- The rule action updates the UserDefinedFieldsfield of a finding.
- VerificationState Pulumi.Aws Native. Security Hub. Automation Rules Finding Fields Update Verification State 
- The rule action updates the VerificationStatefield of a finding.
- Workflow
Pulumi.Aws Native. Security Hub. Inputs. Automation Rule Workflow Update 
- The rule action will update the Workflowfield of a finding.
- Confidence int
- The rule action updates the Confidencefield of a finding.
- Criticality int
- The rule action updates the Criticalityfield of a finding.
- Note
AutomationRule Note Update 
- The rule action will update the Notefield of a finding.
- 
[]AutomationRule Related Finding 
- The rule action will update the RelatedFindingsfield of a finding.
- Severity
AutomationRule Severity Update 
- The rule action will update the Severityfield of a finding.
- Types []string
- The rule action updates the Typesfield of a finding.
- UserDefined map[string]stringFields 
- The rule action updates the UserDefinedFieldsfield of a finding.
- VerificationState AutomationRules Finding Fields Update Verification State 
- The rule action updates the VerificationStatefield of a finding.
- Workflow
AutomationRule Workflow Update 
- The rule action will update the Workflowfield of a finding.
- confidence Integer
- The rule action updates the Confidencefield of a finding.
- criticality Integer
- The rule action updates the Criticalityfield of a finding.
- note
AutomationRule Note Update 
- The rule action will update the Notefield of a finding.
- 
List<AutomationRule Related Finding> 
- The rule action will update the RelatedFindingsfield of a finding.
- severity
AutomationRule Severity Update 
- The rule action will update the Severityfield of a finding.
- types List<String>
- The rule action updates the Typesfield of a finding.
- userDefined Map<String,String>Fields 
- The rule action updates the UserDefinedFieldsfield of a finding.
- verificationState AutomationRules Finding Fields Update Verification State 
- The rule action updates the VerificationStatefield of a finding.
- workflow
AutomationRule Workflow Update 
- The rule action will update the Workflowfield of a finding.
- confidence number
- The rule action updates the Confidencefield of a finding.
- criticality number
- The rule action updates the Criticalityfield of a finding.
- note
AutomationRule Note Update 
- The rule action will update the Notefield of a finding.
- 
AutomationRule Related Finding[] 
- The rule action will update the RelatedFindingsfield of a finding.
- severity
AutomationRule Severity Update 
- The rule action will update the Severityfield of a finding.
- types string[]
- The rule action updates the Typesfield of a finding.
- userDefined {[key: string]: string}Fields 
- The rule action updates the UserDefinedFieldsfield of a finding.
- verificationState AutomationRules Finding Fields Update Verification State 
- The rule action updates the VerificationStatefield of a finding.
- workflow
AutomationRule Workflow Update 
- The rule action will update the Workflowfield of a finding.
- confidence int
- The rule action updates the Confidencefield of a finding.
- criticality int
- The rule action updates the Criticalityfield of a finding.
- note
AutomationRule Note Update 
- The rule action will update the Notefield of a finding.
- 
Sequence[AutomationRule Related Finding] 
- The rule action will update the RelatedFindingsfield of a finding.
- severity
AutomationRule Severity Update 
- The rule action will update the Severityfield of a finding.
- types Sequence[str]
- The rule action updates the Typesfield of a finding.
- user_defined_ Mapping[str, str]fields 
- The rule action updates the UserDefinedFieldsfield of a finding.
- verification_state AutomationRules Finding Fields Update Verification State 
- The rule action updates the VerificationStatefield of a finding.
- workflow
AutomationRule Workflow Update 
- The rule action will update the Workflowfield of a finding.
- confidence Number
- The rule action updates the Confidencefield of a finding.
- criticality Number
- The rule action updates the Criticalityfield of a finding.
- note Property Map
- The rule action will update the Notefield of a finding.
- List<Property Map>
- The rule action will update the RelatedFindingsfield of a finding.
- severity Property Map
- The rule action will update the Severityfield of a finding.
- types List<String>
- The rule action updates the Typesfield of a finding.
- userDefined Map<String>Fields 
- The rule action updates the UserDefinedFieldsfield of a finding.
- verificationState "UNKNOWN" | "TRUE_POSITIVE" | "FALSE_POSITIVE" | "BENIGN_POSITIVE"
- The rule action updates the VerificationStatefield of a finding.
- workflow Property Map
- The rule action will update the Workflowfield of a finding.
AutomationRulesFindingFieldsUpdateVerificationState      
AutomationRulesFindingFilters   
- AwsAccount List<Pulumi.Id Aws Native. Security Hub. Inputs. Automation Rule String Filter> 
- The AWS-account ID in which a finding was generated. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- CompanyName List<Pulumi.Aws Native. Security Hub. Inputs. Automation Rule String Filter> 
- The name of the company for the product that generated the finding. For control-based findings, the company is AWS. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- ComplianceAssociated List<Pulumi.Standards Id Aws Native. Security Hub. Inputs. Automation Rule String Filter> 
- The unique identifier of a standard in which a control is enabled. This field consists of the resource portion of the Amazon Resource Name (ARN) returned for a standard in the DescribeStandards API response. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- ComplianceSecurity List<Pulumi.Control Id Aws Native. Security Hub. Inputs. Automation Rule String Filter> 
- The security control ID for which a finding was generated. Security control IDs are the same across standards. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- ComplianceStatus List<Pulumi.Aws Native. Security Hub. Inputs. Automation Rule String Filter> 
- The result of a security check. This field is only used for findings generated from controls. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- Confidence
List<Pulumi.Aws Native. Security Hub. Inputs. Automation Rule Number Filter> 
- The likelihood that a finding accurately identifies the behavior or issue that it was intended to identify. Confidenceis scored on a 0–100 basis using a ratio scale. A value of0means 0 percent confidence, and a value of100means 100 percent confidence. For example, a data exfiltration detection based on a statistical deviation of network traffic has low confidence because an actual exfiltration hasn't been verified. For more information, see Confidence in the User Guide. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- CreatedAt List<Pulumi.Aws Native. Security Hub. Inputs. Automation Rule Date Filter> 
- A timestamp that indicates when this finding record was created. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- Criticality
List<Pulumi.Aws Native. Security Hub. Inputs. Automation Rule Number Filter> 
- The level of importance that is assigned to the resources that are associated with a finding. Criticalityis scored on a 0–100 basis, using a ratio scale that supports only full integers. A score of0means that the underlying resources have no criticality, and a score of100is reserved for the most critical resources. For more information, see Criticality in the User Guide. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- Description
List<Pulumi.Aws Native. Security Hub. Inputs. Automation Rule String Filter> 
- A finding's description. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- FirstObserved List<Pulumi.At Aws Native. Security Hub. Inputs. Automation Rule Date Filter> 
- A timestamp that indicates when the potential security issue captured by a finding was first observed by the security findings product. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- GeneratorId List<Pulumi.Aws Native. Security Hub. Inputs. Automation Rule String Filter> 
- The identifier for the solution-specific component that generated a finding. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- Id
List<Pulumi.Aws Native. Security Hub. Inputs. Automation Rule String Filter> 
- The product-specific identifier for a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- LastObserved List<Pulumi.At Aws Native. Security Hub. Inputs. Automation Rule Date Filter> 
- A timestamp that indicates when the security findings provider most recently observed a change in the resource that is involved in the finding. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- NoteText List<Pulumi.Aws Native. Security Hub. Inputs. Automation Rule String Filter> 
- The text of a user-defined note that's added to a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- NoteUpdated List<Pulumi.At Aws Native. Security Hub. Inputs. Automation Rule Date Filter> 
- The timestamp of when the note was updated. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- NoteUpdated List<Pulumi.By Aws Native. Security Hub. Inputs. Automation Rule String Filter> 
- The principal that created a note. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- ProductArn List<Pulumi.Aws Native. Security Hub. Inputs. Automation Rule String Filter> 
- The Amazon Resource Name (ARN) for a third-party product that generated a finding in Security Hub. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- ProductName List<Pulumi.Aws Native. Security Hub. Inputs. Automation Rule String Filter> 
- Provides the name of the product that generated the finding. For control-based findings, the product name is Security Hub. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- RecordState List<Pulumi.Aws Native. Security Hub. Inputs. Automation Rule String Filter> 
- Provides the current state of a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- 
List<Pulumi.Aws Native. Security Hub. Inputs. Automation Rule String Filter> 
- The product-generated identifier for a related finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- 
List<Pulumi.Aws Native. Security Hub. Inputs. Automation Rule String Filter> 
- The ARN for the product that generated a related finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- ResourceDetails List<Pulumi.Other Aws Native. Security Hub. Inputs. Automation Rule Map Filter> 
- Custom fields and values about the resource that a finding pertains to. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- ResourceId List<Pulumi.Aws Native. Security Hub. Inputs. Automation Rule String Filter> 
- The identifier for the given resource type. For AWS resources that are identified by Amazon Resource Names (ARNs), this is the ARN. For AWS resources that lack ARNs, this is the identifier as defined by the AWS-service that created the resource. For non-AWS resources, this is a unique identifier that is associated with the resource. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- ResourcePartition List<Pulumi.Aws Native. Security Hub. Inputs. Automation Rule String Filter> 
- The partition in which the resource that the finding pertains to is located. A partition is a group of AWS-Regions. Each AWS-account is scoped to one partition. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- ResourceRegion List<Pulumi.Aws Native. Security Hub. Inputs. Automation Rule String Filter> 
- The AWS-Region where the resource that a finding pertains to is located. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- 
List<Pulumi.Aws Native. Security Hub. Inputs. Automation Rule Map Filter> 
- A list of AWS tags associated with a resource at the time the finding was processed. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- ResourceType List<Pulumi.Aws Native. Security Hub. Inputs. Automation Rule String Filter> 
- A finding's title. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- SeverityLabel List<Pulumi.Aws Native. Security Hub. Inputs. Automation Rule String Filter> 
- The severity value of the finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- SourceUrl List<Pulumi.Aws Native. Security Hub. Inputs. Automation Rule String Filter> 
- Provides a URL that links to a page about the current finding in the finding product. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- Title
List<Pulumi.Aws Native. Security Hub. Inputs. Automation Rule String Filter> 
- A finding's title. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- Type
List<Pulumi.Aws Native. Security Hub. Inputs. Automation Rule String Filter> 
- One or more finding types in the format of namespace/category/classifier that classify a finding. For a list of namespaces, classifiers, and categories, see Types taxonomy for ASFF in the User Guide. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- UpdatedAt List<Pulumi.Aws Native. Security Hub. Inputs. Automation Rule Date Filter> 
- A timestamp that indicates when the finding record was most recently updated. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- UserDefined List<Pulumi.Fields Aws Native. Security Hub. Inputs. Automation Rule Map Filter> 
- A list of user-defined name and value string pairs added to a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- VerificationState List<Pulumi.Aws Native. Security Hub. Inputs. Automation Rule String Filter> 
- Provides the veracity of a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- WorkflowStatus List<Pulumi.Aws Native. Security Hub. Inputs. Automation Rule String Filter> 
- Provides information about the status of the investigation into a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- AwsAccount []AutomationId Rule String Filter 
- The AWS-account ID in which a finding was generated. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- CompanyName []AutomationRule String Filter 
- The name of the company for the product that generated the finding. For control-based findings, the company is AWS. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- ComplianceAssociated []AutomationStandards Id Rule String Filter 
- The unique identifier of a standard in which a control is enabled. This field consists of the resource portion of the Amazon Resource Name (ARN) returned for a standard in the DescribeStandards API response. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- ComplianceSecurity []AutomationControl Id Rule String Filter 
- The security control ID for which a finding was generated. Security control IDs are the same across standards. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- ComplianceStatus []AutomationRule String Filter 
- The result of a security check. This field is only used for findings generated from controls. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- Confidence
[]AutomationRule Number Filter 
- The likelihood that a finding accurately identifies the behavior or issue that it was intended to identify. Confidenceis scored on a 0–100 basis using a ratio scale. A value of0means 0 percent confidence, and a value of100means 100 percent confidence. For example, a data exfiltration detection based on a statistical deviation of network traffic has low confidence because an actual exfiltration hasn't been verified. For more information, see Confidence in the User Guide. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- CreatedAt []AutomationRule Date Filter 
- A timestamp that indicates when this finding record was created. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- Criticality
[]AutomationRule Number Filter 
- The level of importance that is assigned to the resources that are associated with a finding. Criticalityis scored on a 0–100 basis, using a ratio scale that supports only full integers. A score of0means that the underlying resources have no criticality, and a score of100is reserved for the most critical resources. For more information, see Criticality in the User Guide. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- Description
[]AutomationRule String Filter 
- A finding's description. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- FirstObserved []AutomationAt Rule Date Filter 
- A timestamp that indicates when the potential security issue captured by a finding was first observed by the security findings product. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- GeneratorId []AutomationRule String Filter 
- The identifier for the solution-specific component that generated a finding. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- Id
[]AutomationRule String Filter 
- The product-specific identifier for a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- LastObserved []AutomationAt Rule Date Filter 
- A timestamp that indicates when the security findings provider most recently observed a change in the resource that is involved in the finding. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- NoteText []AutomationRule String Filter 
- The text of a user-defined note that's added to a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- NoteUpdated []AutomationAt Rule Date Filter 
- The timestamp of when the note was updated. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- NoteUpdated []AutomationBy Rule String Filter 
- The principal that created a note. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- ProductArn []AutomationRule String Filter 
- The Amazon Resource Name (ARN) for a third-party product that generated a finding in Security Hub. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- ProductName []AutomationRule String Filter 
- Provides the name of the product that generated the finding. For control-based findings, the product name is Security Hub. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- RecordState []AutomationRule String Filter 
- Provides the current state of a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- 
[]AutomationRule String Filter 
- The product-generated identifier for a related finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- 
[]AutomationRule String Filter 
- The ARN for the product that generated a related finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- ResourceDetails []AutomationOther Rule Map Filter 
- Custom fields and values about the resource that a finding pertains to. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- ResourceId []AutomationRule String Filter 
- The identifier for the given resource type. For AWS resources that are identified by Amazon Resource Names (ARNs), this is the ARN. For AWS resources that lack ARNs, this is the identifier as defined by the AWS-service that created the resource. For non-AWS resources, this is a unique identifier that is associated with the resource. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- ResourcePartition []AutomationRule String Filter 
- The partition in which the resource that the finding pertains to is located. A partition is a group of AWS-Regions. Each AWS-account is scoped to one partition. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- ResourceRegion []AutomationRule String Filter 
- The AWS-Region where the resource that a finding pertains to is located. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- 
[]AutomationRule Map Filter 
- A list of AWS tags associated with a resource at the time the finding was processed. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- ResourceType []AutomationRule String Filter 
- A finding's title. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- SeverityLabel []AutomationRule String Filter 
- The severity value of the finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- SourceUrl []AutomationRule String Filter 
- Provides a URL that links to a page about the current finding in the finding product. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- Title
[]AutomationRule String Filter 
- A finding's title. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- Type
[]AutomationRule String Filter 
- One or more finding types in the format of namespace/category/classifier that classify a finding. For a list of namespaces, classifiers, and categories, see Types taxonomy for ASFF in the User Guide. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- UpdatedAt []AutomationRule Date Filter 
- A timestamp that indicates when the finding record was most recently updated. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- UserDefined []AutomationFields Rule Map Filter 
- A list of user-defined name and value string pairs added to a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- VerificationState []AutomationRule String Filter 
- Provides the veracity of a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- WorkflowStatus []AutomationRule String Filter 
- Provides information about the status of the investigation into a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- awsAccount List<AutomationId Rule String Filter> 
- The AWS-account ID in which a finding was generated. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- companyName List<AutomationRule String Filter> 
- The name of the company for the product that generated the finding. For control-based findings, the company is AWS. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- complianceAssociated List<AutomationStandards Id Rule String Filter> 
- The unique identifier of a standard in which a control is enabled. This field consists of the resource portion of the Amazon Resource Name (ARN) returned for a standard in the DescribeStandards API response. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- complianceSecurity List<AutomationControl Id Rule String Filter> 
- The security control ID for which a finding was generated. Security control IDs are the same across standards. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- complianceStatus List<AutomationRule String Filter> 
- The result of a security check. This field is only used for findings generated from controls. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- confidence
List<AutomationRule Number Filter> 
- The likelihood that a finding accurately identifies the behavior or issue that it was intended to identify. Confidenceis scored on a 0–100 basis using a ratio scale. A value of0means 0 percent confidence, and a value of100means 100 percent confidence. For example, a data exfiltration detection based on a statistical deviation of network traffic has low confidence because an actual exfiltration hasn't been verified. For more information, see Confidence in the User Guide. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- createdAt List<AutomationRule Date Filter> 
- A timestamp that indicates when this finding record was created. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- criticality
List<AutomationRule Number Filter> 
- The level of importance that is assigned to the resources that are associated with a finding. Criticalityis scored on a 0–100 basis, using a ratio scale that supports only full integers. A score of0means that the underlying resources have no criticality, and a score of100is reserved for the most critical resources. For more information, see Criticality in the User Guide. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- description
List<AutomationRule String Filter> 
- A finding's description. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- firstObserved List<AutomationAt Rule Date Filter> 
- A timestamp that indicates when the potential security issue captured by a finding was first observed by the security findings product. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- generatorId List<AutomationRule String Filter> 
- The identifier for the solution-specific component that generated a finding. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- id
List<AutomationRule String Filter> 
- The product-specific identifier for a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- lastObserved List<AutomationAt Rule Date Filter> 
- A timestamp that indicates when the security findings provider most recently observed a change in the resource that is involved in the finding. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- noteText List<AutomationRule String Filter> 
- The text of a user-defined note that's added to a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- noteUpdated List<AutomationAt Rule Date Filter> 
- The timestamp of when the note was updated. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- noteUpdated List<AutomationBy Rule String Filter> 
- The principal that created a note. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- productArn List<AutomationRule String Filter> 
- The Amazon Resource Name (ARN) for a third-party product that generated a finding in Security Hub. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- productName List<AutomationRule String Filter> 
- Provides the name of the product that generated the finding. For control-based findings, the product name is Security Hub. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- recordState List<AutomationRule String Filter> 
- Provides the current state of a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- 
List<AutomationRule String Filter> 
- The product-generated identifier for a related finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- 
List<AutomationRule String Filter> 
- The ARN for the product that generated a related finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- resourceDetails List<AutomationOther Rule Map Filter> 
- Custom fields and values about the resource that a finding pertains to. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- resourceId List<AutomationRule String Filter> 
- The identifier for the given resource type. For AWS resources that are identified by Amazon Resource Names (ARNs), this is the ARN. For AWS resources that lack ARNs, this is the identifier as defined by the AWS-service that created the resource. For non-AWS resources, this is a unique identifier that is associated with the resource. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- resourcePartition List<AutomationRule String Filter> 
- The partition in which the resource that the finding pertains to is located. A partition is a group of AWS-Regions. Each AWS-account is scoped to one partition. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- resourceRegion List<AutomationRule String Filter> 
- The AWS-Region where the resource that a finding pertains to is located. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- 
List<AutomationRule Map Filter> 
- A list of AWS tags associated with a resource at the time the finding was processed. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- resourceType List<AutomationRule String Filter> 
- A finding's title. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- severityLabel List<AutomationRule String Filter> 
- The severity value of the finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- sourceUrl List<AutomationRule String Filter> 
- Provides a URL that links to a page about the current finding in the finding product. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- title
List<AutomationRule String Filter> 
- A finding's title. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- type
List<AutomationRule String Filter> 
- One or more finding types in the format of namespace/category/classifier that classify a finding. For a list of namespaces, classifiers, and categories, see Types taxonomy for ASFF in the User Guide. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- updatedAt List<AutomationRule Date Filter> 
- A timestamp that indicates when the finding record was most recently updated. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- userDefined List<AutomationFields Rule Map Filter> 
- A list of user-defined name and value string pairs added to a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- verificationState List<AutomationRule String Filter> 
- Provides the veracity of a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- workflowStatus List<AutomationRule String Filter> 
- Provides information about the status of the investigation into a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- awsAccount AutomationId Rule String Filter[] 
- The AWS-account ID in which a finding was generated. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- companyName AutomationRule String Filter[] 
- The name of the company for the product that generated the finding. For control-based findings, the company is AWS. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- complianceAssociated AutomationStandards Id Rule String Filter[] 
- The unique identifier of a standard in which a control is enabled. This field consists of the resource portion of the Amazon Resource Name (ARN) returned for a standard in the DescribeStandards API response. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- complianceSecurity AutomationControl Id Rule String Filter[] 
- The security control ID for which a finding was generated. Security control IDs are the same across standards. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- complianceStatus AutomationRule String Filter[] 
- The result of a security check. This field is only used for findings generated from controls. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- confidence
AutomationRule Number Filter[] 
- The likelihood that a finding accurately identifies the behavior or issue that it was intended to identify. Confidenceis scored on a 0–100 basis using a ratio scale. A value of0means 0 percent confidence, and a value of100means 100 percent confidence. For example, a data exfiltration detection based on a statistical deviation of network traffic has low confidence because an actual exfiltration hasn't been verified. For more information, see Confidence in the User Guide. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- createdAt AutomationRule Date Filter[] 
- A timestamp that indicates when this finding record was created. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- criticality
AutomationRule Number Filter[] 
- The level of importance that is assigned to the resources that are associated with a finding. Criticalityis scored on a 0–100 basis, using a ratio scale that supports only full integers. A score of0means that the underlying resources have no criticality, and a score of100is reserved for the most critical resources. For more information, see Criticality in the User Guide. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- description
AutomationRule String Filter[] 
- A finding's description. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- firstObserved AutomationAt Rule Date Filter[] 
- A timestamp that indicates when the potential security issue captured by a finding was first observed by the security findings product. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- generatorId AutomationRule String Filter[] 
- The identifier for the solution-specific component that generated a finding. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- id
AutomationRule String Filter[] 
- The product-specific identifier for a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- lastObserved AutomationAt Rule Date Filter[] 
- A timestamp that indicates when the security findings provider most recently observed a change in the resource that is involved in the finding. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- noteText AutomationRule String Filter[] 
- The text of a user-defined note that's added to a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- noteUpdated AutomationAt Rule Date Filter[] 
- The timestamp of when the note was updated. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- noteUpdated AutomationBy Rule String Filter[] 
- The principal that created a note. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- productArn AutomationRule String Filter[] 
- The Amazon Resource Name (ARN) for a third-party product that generated a finding in Security Hub. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- productName AutomationRule String Filter[] 
- Provides the name of the product that generated the finding. For control-based findings, the product name is Security Hub. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- recordState AutomationRule String Filter[] 
- Provides the current state of a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- 
AutomationRule String Filter[] 
- The product-generated identifier for a related finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- 
AutomationRule String Filter[] 
- The ARN for the product that generated a related finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- resourceDetails AutomationOther Rule Map Filter[] 
- Custom fields and values about the resource that a finding pertains to. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- resourceId AutomationRule String Filter[] 
- The identifier for the given resource type. For AWS resources that are identified by Amazon Resource Names (ARNs), this is the ARN. For AWS resources that lack ARNs, this is the identifier as defined by the AWS-service that created the resource. For non-AWS resources, this is a unique identifier that is associated with the resource. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- resourcePartition AutomationRule String Filter[] 
- The partition in which the resource that the finding pertains to is located. A partition is a group of AWS-Regions. Each AWS-account is scoped to one partition. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- resourceRegion AutomationRule String Filter[] 
- The AWS-Region where the resource that a finding pertains to is located. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- 
AutomationRule Map Filter[] 
- A list of AWS tags associated with a resource at the time the finding was processed. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- resourceType AutomationRule String Filter[] 
- A finding's title. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- severityLabel AutomationRule String Filter[] 
- The severity value of the finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- sourceUrl AutomationRule String Filter[] 
- Provides a URL that links to a page about the current finding in the finding product. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- title
AutomationRule String Filter[] 
- A finding's title. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- type
AutomationRule String Filter[] 
- One or more finding types in the format of namespace/category/classifier that classify a finding. For a list of namespaces, classifiers, and categories, see Types taxonomy for ASFF in the User Guide. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- updatedAt AutomationRule Date Filter[] 
- A timestamp that indicates when the finding record was most recently updated. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- userDefined AutomationFields Rule Map Filter[] 
- A list of user-defined name and value string pairs added to a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- verificationState AutomationRule String Filter[] 
- Provides the veracity of a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- workflowStatus AutomationRule String Filter[] 
- Provides information about the status of the investigation into a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- aws_account_ Sequence[Automationid Rule String Filter] 
- The AWS-account ID in which a finding was generated. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- company_name Sequence[AutomationRule String Filter] 
- The name of the company for the product that generated the finding. For control-based findings, the company is AWS. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- compliance_associated_ Sequence[Automationstandards_ id Rule String Filter] 
- The unique identifier of a standard in which a control is enabled. This field consists of the resource portion of the Amazon Resource Name (ARN) returned for a standard in the DescribeStandards API response. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- compliance_security_ Sequence[Automationcontrol_ id Rule String Filter] 
- The security control ID for which a finding was generated. Security control IDs are the same across standards. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- compliance_status Sequence[AutomationRule String Filter] 
- The result of a security check. This field is only used for findings generated from controls. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- confidence
Sequence[AutomationRule Number Filter] 
- The likelihood that a finding accurately identifies the behavior or issue that it was intended to identify. Confidenceis scored on a 0–100 basis using a ratio scale. A value of0means 0 percent confidence, and a value of100means 100 percent confidence. For example, a data exfiltration detection based on a statistical deviation of network traffic has low confidence because an actual exfiltration hasn't been verified. For more information, see Confidence in the User Guide. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- created_at Sequence[AutomationRule Date Filter] 
- A timestamp that indicates when this finding record was created. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- criticality
Sequence[AutomationRule Number Filter] 
- The level of importance that is assigned to the resources that are associated with a finding. Criticalityis scored on a 0–100 basis, using a ratio scale that supports only full integers. A score of0means that the underlying resources have no criticality, and a score of100is reserved for the most critical resources. For more information, see Criticality in the User Guide. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- description
Sequence[AutomationRule String Filter] 
- A finding's description. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- first_observed_ Sequence[Automationat Rule Date Filter] 
- A timestamp that indicates when the potential security issue captured by a finding was first observed by the security findings product. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- generator_id Sequence[AutomationRule String Filter] 
- The identifier for the solution-specific component that generated a finding. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- id
Sequence[AutomationRule String Filter] 
- The product-specific identifier for a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- last_observed_ Sequence[Automationat Rule Date Filter] 
- A timestamp that indicates when the security findings provider most recently observed a change in the resource that is involved in the finding. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- note_text Sequence[AutomationRule String Filter] 
- The text of a user-defined note that's added to a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- note_updated_ Sequence[Automationat Rule Date Filter] 
- The timestamp of when the note was updated. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- note_updated_ Sequence[Automationby Rule String Filter] 
- The principal that created a note. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- product_arn Sequence[AutomationRule String Filter] 
- The Amazon Resource Name (ARN) for a third-party product that generated a finding in Security Hub. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- product_name Sequence[AutomationRule String Filter] 
- Provides the name of the product that generated the finding. For control-based findings, the product name is Security Hub. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- record_state Sequence[AutomationRule String Filter] 
- Provides the current state of a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- 
Sequence[AutomationRule String Filter] 
- The product-generated identifier for a related finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- 
Sequence[AutomationRule String Filter] 
- The ARN for the product that generated a related finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- resource_details_ Sequence[Automationother Rule Map Filter] 
- Custom fields and values about the resource that a finding pertains to. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- resource_id Sequence[AutomationRule String Filter] 
- The identifier for the given resource type. For AWS resources that are identified by Amazon Resource Names (ARNs), this is the ARN. For AWS resources that lack ARNs, this is the identifier as defined by the AWS-service that created the resource. For non-AWS resources, this is a unique identifier that is associated with the resource. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- resource_partition Sequence[AutomationRule String Filter] 
- The partition in which the resource that the finding pertains to is located. A partition is a group of AWS-Regions. Each AWS-account is scoped to one partition. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- resource_region Sequence[AutomationRule String Filter] 
- The AWS-Region where the resource that a finding pertains to is located. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- 
Sequence[AutomationRule Map Filter] 
- A list of AWS tags associated with a resource at the time the finding was processed. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- resource_type Sequence[AutomationRule String Filter] 
- A finding's title. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- severity_label Sequence[AutomationRule String Filter] 
- The severity value of the finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- source_url Sequence[AutomationRule String Filter] 
- Provides a URL that links to a page about the current finding in the finding product. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- title
Sequence[AutomationRule String Filter] 
- A finding's title. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- type
Sequence[AutomationRule String Filter] 
- One or more finding types in the format of namespace/category/classifier that classify a finding. For a list of namespaces, classifiers, and categories, see Types taxonomy for ASFF in the User Guide. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- updated_at Sequence[AutomationRule Date Filter] 
- A timestamp that indicates when the finding record was most recently updated. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- user_defined_ Sequence[Automationfields Rule Map Filter] 
- A list of user-defined name and value string pairs added to a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- verification_state Sequence[AutomationRule String Filter] 
- Provides the veracity of a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- workflow_status Sequence[AutomationRule String Filter] 
- Provides information about the status of the investigation into a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- awsAccount List<Property Map>Id 
- The AWS-account ID in which a finding was generated. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- companyName List<Property Map>
- The name of the company for the product that generated the finding. For control-based findings, the company is AWS. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- complianceAssociated List<Property Map>Standards Id 
- The unique identifier of a standard in which a control is enabled. This field consists of the resource portion of the Amazon Resource Name (ARN) returned for a standard in the DescribeStandards API response. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- complianceSecurity List<Property Map>Control Id 
- The security control ID for which a finding was generated. Security control IDs are the same across standards. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- complianceStatus List<Property Map>
- The result of a security check. This field is only used for findings generated from controls. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- confidence List<Property Map>
- The likelihood that a finding accurately identifies the behavior or issue that it was intended to identify. Confidenceis scored on a 0–100 basis using a ratio scale. A value of0means 0 percent confidence, and a value of100means 100 percent confidence. For example, a data exfiltration detection based on a statistical deviation of network traffic has low confidence because an actual exfiltration hasn't been verified. For more information, see Confidence in the User Guide. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- createdAt List<Property Map>
- A timestamp that indicates when this finding record was created. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- criticality List<Property Map>
- The level of importance that is assigned to the resources that are associated with a finding. Criticalityis scored on a 0–100 basis, using a ratio scale that supports only full integers. A score of0means that the underlying resources have no criticality, and a score of100is reserved for the most critical resources. For more information, see Criticality in the User Guide. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- description List<Property Map>
- A finding's description. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- firstObserved List<Property Map>At 
- A timestamp that indicates when the potential security issue captured by a finding was first observed by the security findings product. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- generatorId List<Property Map>
- The identifier for the solution-specific component that generated a finding. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- id List<Property Map>
- The product-specific identifier for a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- lastObserved List<Property Map>At 
- A timestamp that indicates when the security findings provider most recently observed a change in the resource that is involved in the finding. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- noteText List<Property Map>
- The text of a user-defined note that's added to a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- noteUpdated List<Property Map>At 
- The timestamp of when the note was updated. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- noteUpdated List<Property Map>By 
- The principal that created a note. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- productArn List<Property Map>
- The Amazon Resource Name (ARN) for a third-party product that generated a finding in Security Hub. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- productName List<Property Map>
- Provides the name of the product that generated the finding. For control-based findings, the product name is Security Hub. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- recordState List<Property Map>
- Provides the current state of a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- List<Property Map>
- The product-generated identifier for a related finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- List<Property Map>
- The ARN for the product that generated a related finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- resourceDetails List<Property Map>Other 
- Custom fields and values about the resource that a finding pertains to. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- resourceId List<Property Map>
- The identifier for the given resource type. For AWS resources that are identified by Amazon Resource Names (ARNs), this is the ARN. For AWS resources that lack ARNs, this is the identifier as defined by the AWS-service that created the resource. For non-AWS resources, this is a unique identifier that is associated with the resource. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- resourcePartition List<Property Map>
- The partition in which the resource that the finding pertains to is located. A partition is a group of AWS-Regions. Each AWS-account is scoped to one partition. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- resourceRegion List<Property Map>
- The AWS-Region where the resource that a finding pertains to is located. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- List<Property Map>
- A list of AWS tags associated with a resource at the time the finding was processed. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- resourceType List<Property Map>
- A finding's title. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- severityLabel List<Property Map>
- The severity value of the finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- sourceUrl List<Property Map>
- Provides a URL that links to a page about the current finding in the finding product. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- title List<Property Map>
- A finding's title. Array Members: Minimum number of 1 item. Maximum number of 100 items.
- type List<Property Map>
- One or more finding types in the format of namespace/category/classifier that classify a finding. For a list of namespaces, classifiers, and categories, see Types taxonomy for ASFF in the User Guide. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- updatedAt List<Property Map>
- A timestamp that indicates when the finding record was most recently updated. For more information about the validation and formatting of timestamp fields in ASHlong, see Timestamps. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- userDefined List<Property Map>Fields 
- A list of user-defined name and value string pairs added to a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- verificationState List<Property Map>
- Provides the veracity of a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
- workflowStatus List<Property Map>
- Provides information about the status of the investigation into a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
Package Details
- Repository
- AWS Native pulumi/pulumi-aws-native
- License
- Apache-2.0
We recommend new projects start with resources from the AWS provider.