Paws::SecurityHub::AwsSecurityFindingFilters
This class represents one of two things:
Use the attributes of this class as arguments to methods. You shouldn't make instances of this class. Each attribute should be used as a named argument in the calls that expect this type of object.
As an example, if Att1 is expected to be a Paws::SecurityHub::AwsSecurityFindingFilters object:
$service_obj->Method(Att1 => { AwsAccountId => $value, ..., WorkflowState => $value });
Use accessors for each attribute. If Att1 is expected to be an Paws::SecurityHub::AwsSecurityFindingFilters object:
$result = $service_obj->Method(...); $result->Att1->AwsAccountId
A collection of attributes that are applied to all active Security Hub-aggregated findings and that result in a subset of findings that are included in this insight.
The AWS account ID in which a finding is generated.
The name of the findings provider (company) that owns the solution (product) that generates findings.
Exclusive to findings that are generated as the result of a check run against a specific rule in a supported standard (for example, AWS CIS Foundations). Contains compliance-related finding details.
A finding's confidence. Confidence is defined as the likelihood that a finding accurately identifies the behavior or issue that it was intended to identify. Confidence is scored on a 0-100 basis using a ratio scale. 0 equates zero percent confidence and 100 equates to 100 percent confidence.
An ISO8601-formatted timestamp that indicates when the potential security issue captured by a finding was created by the security findings provider.
The level of importance assigned to the resources associated with the finding. A score of 0 means the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources.
A finding's description.
An ISO8601-formatted timestamp that indicates when the potential security issue captured by a finding was first observed by the security findings provider.
This is the identifier for the solution-specific component (a discrete unit of logic) that generated a finding. In various security findings provider's solutions, this generator can be called a rule, a check, a detector, a plug-in, etc.
The security findings provider-specific identifier for a finding.
A keyword for a finding.
An ISO8601-formatted timestamp that indicates when the potential security issue captured by a finding was most recently observed by the security findings provider.
The name of the malware that was observed.
The filesystem path of the malware that was observed.
The state of the malware that was observed.
The type of the malware that was observed.
The destination domain of network-related information about a finding.
The destination IPv4 address of network-related information about a finding.
The destination IPv6 address of network-related information about a finding.
The destination port of network-related information about a finding.
Indicates the direction of network traffic associated with a finding.
The protocol of network-related information about a finding.
The source domain of network-related information about a finding.
The source IPv4 address of network-related information about a finding.
The source IPv6 address of network-related information about a finding.
The source media access control (MAC) address of network-related information about a finding.
The source port of network-related information about a finding.
The text of a note.
The timestamp of when the note was updated.
The principal that created a note.
The date/time that the process was launched.
The name of the process.
The parent process ID.
The path to the process executable.
The process ID.
The date/time that the process was terminated.
The ARN generated by Security Hub that uniquely identifies a third-party company (security findings provider) once this provider's product (solution that generates findings) is registered with Security Hub.
A data type where security findings providers can include additional solution-specific details that are not part of the defined AwsSecurityFinding format.
The name of the solution (product) that generates findings.
The recommendation of what to do about the issue described in a finding.
The updated record state for the finding.
The solution-generated identifier for a related finding.
The ARN of the solution that generated a related finding.
The IAM profile ARN of the instance.
The Amazon Machine Image (AMI) ID of the instance.
The IPv4 addresses associated with the instance.
The IPv6 addresses associated with the instance.
The key name associated with the instance.
The date/time the instance was launched.
The identifier of the subnet in which the instance was launched.
The instance type of the instance.
The identifier of the VPC in which the instance was launched.
The creation date/time of the IAM access key related to a finding.
The status of the IAM access key related to a finding.
The user associated with the IAM access key related to a finding.
The canonical user ID of the owner of the S3 bucket.
The display name of the owner of the S3 bucket.
The identifier of the image related to a finding.
The name of the image related to a finding.
The date/time that the container was started.
The name of the container related to a finding.
The details of a resource that does not have a specific sub-field for the resource type defined.
The canonical identifier for the given resource type.
The canonical AWS partition name to which the region is assigned.
The canonical AWS external region name where this resource is located.
A list of AWS tags associated with a resource at the time the finding was processed.
Specifies the type of the resource for which details are provided.
The label of a finding's severity.
The normalized severity of a finding.
The native severity as defined by the security findings provider's solution that generated the finding.
A URL that links to a page about the current finding in the security findings provider's solution.
The category of a threat intel indicator.
The date/time of the last observation of a threat intel indicator.
The source of the threat intel.
The URL for more details from the source of the threat intel.
The type of a threat intel indicator.
The value of a threat intel indicator.
A finding's title.
A finding type in the format of 'namespace/category/classifier' that classifies a finding.
An ISO8601-formatted timestamp that indicates when the finding record was last updated by the security findings provider.
A list of name/value string pairs associated with the finding. These are custom, user-defined fields added to a finding.
Indicates the veracity of a finding.
The workflow state of a finding.
This class forms part of Paws, describing an object used in Paws::SecurityHub
The source code is located here: https://github.com/pplu/aws-sdk-perl
Please report bugs to: https://github.com/pplu/aws-sdk-perl/issues
To install Paws::SDK::Config, copy and paste the appropriate command in to your terminal.
cpanm
cpanm Paws::SDK::Config
CPAN shell
perl -MCPAN -e shell install Paws::SDK::Config
For more information on module installation, please visit the detailed CPAN module installation guide.