Class: Google::Cloud::SecurityCenterManagement::V1::SimulatedFinding
- Inherits:
-
Object
- Object
- Google::Cloud::SecurityCenterManagement::V1::SimulatedFinding
- Extended by:
- Protobuf::MessageExts::ClassMethods
- Includes:
- Protobuf::MessageExts
- Defined in:
- proto_docs/google/cloud/securitycentermanagement/v1/security_center_management.rb
Overview
The minimum set of fields needed to represent a simulated finding from a Security Health Analytics custom module.
Defined Under Namespace
Modules: FindingClass, Severity, State Classes: SourcePropertiesEntry
Instance Attribute Summary collapse
-
#category ⇒ ::String
The additional taxonomy group within findings from a given source.
-
#event_time ⇒ ::Google::Protobuf::Timestamp
The time the finding was first detected.
-
#finding_class ⇒ ::Google::Cloud::SecurityCenterManagement::V1::SimulatedFinding::FindingClass
The class of the finding.
-
#name ⇒ ::String
Identifier.
-
#parent ⇒ ::String
The relative resource name of the source the finding belongs to.
-
#resource_name ⇒ ::String
For findings on Google Cloud resources, the full resource name of the Google Cloud resource this finding is for.
-
#severity ⇒ ::Google::Cloud::SecurityCenterManagement::V1::SimulatedFinding::Severity
The severity of the finding.
-
#source_properties ⇒ ::Google::Protobuf::Map{::String => ::Google::Protobuf::Value}
Source-specific properties.
-
#state ⇒ ::Google::Cloud::SecurityCenterManagement::V1::SimulatedFinding::State
readonly
Output only.
Instance Attribute Details
#category ⇒ ::String
Returns The additional taxonomy group within findings from a given source. For
example, XSS_FLASH_INJECTION
. This field is immutable after creation
time.
659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 |
# File 'proto_docs/google/cloud/securitycentermanagement/v1/security_center_management.rb', line 659 class SimulatedFinding include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # @!attribute [rw] key # @return [::String] # @!attribute [rw] value # @return [::Google::Protobuf::Value] class SourcePropertiesEntry include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods end # The state of the finding. module State # Default value. This value is unused. STATE_UNSPECIFIED = 0 # The finding requires attention and has not been addressed yet. ACTIVE = 1 # The finding has been fixed, triaged as a non-issue, or otherwise # addressed and is no longer active. INACTIVE = 2 end # The severity of the finding. module Severity # Default value. This value is unused. SEVERITY_UNSPECIFIED = 0 # For vulnerabilities: A critical vulnerability is easily discoverable by # an external actor, exploitable, and results in the direct ability to # execute arbitrary code, exfiltrate data, and otherwise gain additional # access and privileges to cloud resources and workloads. Examples include # publicly accessible unprotected user data and public SSH access with weak # or no passwords. # # For threats: Indicates a threat that is able to access, modify, or delete # data or execute unauthorized code within existing resources. CRITICAL = 1 # For vulnerabilities: A high-risk vulnerability can be easily discovered # and exploited in combination with other vulnerabilities in order to gain # direct access and the ability to execute arbitrary code, exfiltrate data, # and otherwise gain additional access and privileges to cloud resources # and workloads. An example is a database with weak or no passwords that is # only accessible internally. This database could easily be compromised by # an actor that had access to the internal network. # # For threats: Indicates a threat that is able to create new computational # resources in an environment but not able to access data or execute code # in existing resources. HIGH = 2 # For vulnerabilities: A medium-risk vulnerability could be used by an # actor to gain access to resources or privileges that enable them to # eventually (through multiple steps or a complex exploit) gain access and # the ability to execute arbitrary code or exfiltrate data. An example is a # service account with access to more projects than it should have. If an # actor gains access to the service account, they could potentially use # that access to manipulate a project the service account was not intended # to. # # For threats: Indicates a threat that is able to cause operational impact # but may not access data or execute unauthorized code. MEDIUM = 3 # For vulnerabilities: A low-risk vulnerability hampers a security # organization's ability to detect vulnerabilities or active threats in # their deployment, or prevents the root cause investigation of security # issues. An example is monitoring and logs being disabled for resource # configurations and access. # # For threats: Indicates a threat that has obtained minimal access to an # environment but is not able to access data, execute code, or create # resources. LOW = 4 end # Represents what kind of finding it is. module FindingClass # Default value. This value is unused. FINDING_CLASS_UNSPECIFIED = 0 # Describes unwanted or malicious activity. THREAT = 1 # Describes a potential weakness in software that increases risk to # confidentiality, integrity, and availability. VULNERABILITY = 2 # Describes a potential weakness in cloud resource or asset configuration # that increases risk. MISCONFIGURATION = 3 # Describes a security observation that is for informational purposes. OBSERVATION = 4 # Describes an error that prevents Security Command Center from working # correctly. SCC_ERROR = 5 # Describes a potential security risk due to a change in the security # posture. POSTURE_VIOLATION = 6 # Describes a combination of security issues that represent a more severe # security problem when taken together. TOXIC_COMBINATION = 7 end end |
#event_time ⇒ ::Google::Protobuf::Timestamp
Returns The time the finding was first detected. If an existing finding is updated, then this is the time the update occurred. If the finding is later resolved, then this time reflects when the finding was resolved.
For example, if the finding represents an open firewall, this property captures the time the detector believes the firewall became open. The accuracy is determined by the detector.
The event time must not be set to a value greater than the current timestamp.
659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 |
# File 'proto_docs/google/cloud/securitycentermanagement/v1/security_center_management.rb', line 659 class SimulatedFinding include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # @!attribute [rw] key # @return [::String] # @!attribute [rw] value # @return [::Google::Protobuf::Value] class SourcePropertiesEntry include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods end # The state of the finding. module State # Default value. This value is unused. STATE_UNSPECIFIED = 0 # The finding requires attention and has not been addressed yet. ACTIVE = 1 # The finding has been fixed, triaged as a non-issue, or otherwise # addressed and is no longer active. INACTIVE = 2 end # The severity of the finding. module Severity # Default value. This value is unused. SEVERITY_UNSPECIFIED = 0 # For vulnerabilities: A critical vulnerability is easily discoverable by # an external actor, exploitable, and results in the direct ability to # execute arbitrary code, exfiltrate data, and otherwise gain additional # access and privileges to cloud resources and workloads. Examples include # publicly accessible unprotected user data and public SSH access with weak # or no passwords. # # For threats: Indicates a threat that is able to access, modify, or delete # data or execute unauthorized code within existing resources. CRITICAL = 1 # For vulnerabilities: A high-risk vulnerability can be easily discovered # and exploited in combination with other vulnerabilities in order to gain # direct access and the ability to execute arbitrary code, exfiltrate data, # and otherwise gain additional access and privileges to cloud resources # and workloads. An example is a database with weak or no passwords that is # only accessible internally. This database could easily be compromised by # an actor that had access to the internal network. # # For threats: Indicates a threat that is able to create new computational # resources in an environment but not able to access data or execute code # in existing resources. HIGH = 2 # For vulnerabilities: A medium-risk vulnerability could be used by an # actor to gain access to resources or privileges that enable them to # eventually (through multiple steps or a complex exploit) gain access and # the ability to execute arbitrary code or exfiltrate data. An example is a # service account with access to more projects than it should have. If an # actor gains access to the service account, they could potentially use # that access to manipulate a project the service account was not intended # to. # # For threats: Indicates a threat that is able to cause operational impact # but may not access data or execute unauthorized code. MEDIUM = 3 # For vulnerabilities: A low-risk vulnerability hampers a security # organization's ability to detect vulnerabilities or active threats in # their deployment, or prevents the root cause investigation of security # issues. An example is monitoring and logs being disabled for resource # configurations and access. # # For threats: Indicates a threat that has obtained minimal access to an # environment but is not able to access data, execute code, or create # resources. LOW = 4 end # Represents what kind of finding it is. module FindingClass # Default value. This value is unused. FINDING_CLASS_UNSPECIFIED = 0 # Describes unwanted or malicious activity. THREAT = 1 # Describes a potential weakness in software that increases risk to # confidentiality, integrity, and availability. VULNERABILITY = 2 # Describes a potential weakness in cloud resource or asset configuration # that increases risk. MISCONFIGURATION = 3 # Describes a security observation that is for informational purposes. OBSERVATION = 4 # Describes an error that prevents Security Command Center from working # correctly. SCC_ERROR = 5 # Describes a potential security risk due to a change in the security # posture. POSTURE_VIOLATION = 6 # Describes a combination of security issues that represent a more severe # security problem when taken together. TOXIC_COMBINATION = 7 end end |
#finding_class ⇒ ::Google::Cloud::SecurityCenterManagement::V1::SimulatedFinding::FindingClass
Returns The class of the finding.
659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 |
# File 'proto_docs/google/cloud/securitycentermanagement/v1/security_center_management.rb', line 659 class SimulatedFinding include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # @!attribute [rw] key # @return [::String] # @!attribute [rw] value # @return [::Google::Protobuf::Value] class SourcePropertiesEntry include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods end # The state of the finding. module State # Default value. This value is unused. STATE_UNSPECIFIED = 0 # The finding requires attention and has not been addressed yet. ACTIVE = 1 # The finding has been fixed, triaged as a non-issue, or otherwise # addressed and is no longer active. INACTIVE = 2 end # The severity of the finding. module Severity # Default value. This value is unused. SEVERITY_UNSPECIFIED = 0 # For vulnerabilities: A critical vulnerability is easily discoverable by # an external actor, exploitable, and results in the direct ability to # execute arbitrary code, exfiltrate data, and otherwise gain additional # access and privileges to cloud resources and workloads. Examples include # publicly accessible unprotected user data and public SSH access with weak # or no passwords. # # For threats: Indicates a threat that is able to access, modify, or delete # data or execute unauthorized code within existing resources. CRITICAL = 1 # For vulnerabilities: A high-risk vulnerability can be easily discovered # and exploited in combination with other vulnerabilities in order to gain # direct access and the ability to execute arbitrary code, exfiltrate data, # and otherwise gain additional access and privileges to cloud resources # and workloads. An example is a database with weak or no passwords that is # only accessible internally. This database could easily be compromised by # an actor that had access to the internal network. # # For threats: Indicates a threat that is able to create new computational # resources in an environment but not able to access data or execute code # in existing resources. HIGH = 2 # For vulnerabilities: A medium-risk vulnerability could be used by an # actor to gain access to resources or privileges that enable them to # eventually (through multiple steps or a complex exploit) gain access and # the ability to execute arbitrary code or exfiltrate data. An example is a # service account with access to more projects than it should have. If an # actor gains access to the service account, they could potentially use # that access to manipulate a project the service account was not intended # to. # # For threats: Indicates a threat that is able to cause operational impact # but may not access data or execute unauthorized code. MEDIUM = 3 # For vulnerabilities: A low-risk vulnerability hampers a security # organization's ability to detect vulnerabilities or active threats in # their deployment, or prevents the root cause investigation of security # issues. An example is monitoring and logs being disabled for resource # configurations and access. # # For threats: Indicates a threat that has obtained minimal access to an # environment but is not able to access data, execute code, or create # resources. LOW = 4 end # Represents what kind of finding it is. module FindingClass # Default value. This value is unused. FINDING_CLASS_UNSPECIFIED = 0 # Describes unwanted or malicious activity. THREAT = 1 # Describes a potential weakness in software that increases risk to # confidentiality, integrity, and availability. VULNERABILITY = 2 # Describes a potential weakness in cloud resource or asset configuration # that increases risk. MISCONFIGURATION = 3 # Describes a security observation that is for informational purposes. OBSERVATION = 4 # Describes an error that prevents Security Command Center from working # correctly. SCC_ERROR = 5 # Describes a potential security risk due to a change in the security # posture. POSTURE_VIOLATION = 6 # Describes a combination of security issues that represent a more severe # security problem when taken together. TOXIC_COMBINATION = 7 end end |
#name ⇒ ::String
Returns Identifier. The relative resource name of the finding, in one of the following formats:
organizations/{organization_id}/sources/{source_id}/findings/{finding_id}
folders/{folder_id}/sources/{source_id}/findings/{finding_id}
projects/{project_id}/sources/{source_id}/findings/{finding_id}
.
659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 |
# File 'proto_docs/google/cloud/securitycentermanagement/v1/security_center_management.rb', line 659 class SimulatedFinding include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # @!attribute [rw] key # @return [::String] # @!attribute [rw] value # @return [::Google::Protobuf::Value] class SourcePropertiesEntry include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods end # The state of the finding. module State # Default value. This value is unused. STATE_UNSPECIFIED = 0 # The finding requires attention and has not been addressed yet. ACTIVE = 1 # The finding has been fixed, triaged as a non-issue, or otherwise # addressed and is no longer active. INACTIVE = 2 end # The severity of the finding. module Severity # Default value. This value is unused. SEVERITY_UNSPECIFIED = 0 # For vulnerabilities: A critical vulnerability is easily discoverable by # an external actor, exploitable, and results in the direct ability to # execute arbitrary code, exfiltrate data, and otherwise gain additional # access and privileges to cloud resources and workloads. Examples include # publicly accessible unprotected user data and public SSH access with weak # or no passwords. # # For threats: Indicates a threat that is able to access, modify, or delete # data or execute unauthorized code within existing resources. CRITICAL = 1 # For vulnerabilities: A high-risk vulnerability can be easily discovered # and exploited in combination with other vulnerabilities in order to gain # direct access and the ability to execute arbitrary code, exfiltrate data, # and otherwise gain additional access and privileges to cloud resources # and workloads. An example is a database with weak or no passwords that is # only accessible internally. This database could easily be compromised by # an actor that had access to the internal network. # # For threats: Indicates a threat that is able to create new computational # resources in an environment but not able to access data or execute code # in existing resources. HIGH = 2 # For vulnerabilities: A medium-risk vulnerability could be used by an # actor to gain access to resources or privileges that enable them to # eventually (through multiple steps or a complex exploit) gain access and # the ability to execute arbitrary code or exfiltrate data. An example is a # service account with access to more projects than it should have. If an # actor gains access to the service account, they could potentially use # that access to manipulate a project the service account was not intended # to. # # For threats: Indicates a threat that is able to cause operational impact # but may not access data or execute unauthorized code. MEDIUM = 3 # For vulnerabilities: A low-risk vulnerability hampers a security # organization's ability to detect vulnerabilities or active threats in # their deployment, or prevents the root cause investigation of security # issues. An example is monitoring and logs being disabled for resource # configurations and access. # # For threats: Indicates a threat that has obtained minimal access to an # environment but is not able to access data, execute code, or create # resources. LOW = 4 end # Represents what kind of finding it is. module FindingClass # Default value. This value is unused. FINDING_CLASS_UNSPECIFIED = 0 # Describes unwanted or malicious activity. THREAT = 1 # Describes a potential weakness in software that increases risk to # confidentiality, integrity, and availability. VULNERABILITY = 2 # Describes a potential weakness in cloud resource or asset configuration # that increases risk. MISCONFIGURATION = 3 # Describes a security observation that is for informational purposes. OBSERVATION = 4 # Describes an error that prevents Security Command Center from working # correctly. SCC_ERROR = 5 # Describes a potential security risk due to a change in the security # posture. POSTURE_VIOLATION = 6 # Describes a combination of security issues that represent a more severe # security problem when taken together. TOXIC_COMBINATION = 7 end end |
#parent ⇒ ::String
Returns The relative resource name of the source the
finding belongs to. For example,
organizations/{organization_id}/sources/{source_id}
. This field is
immutable after creation time.
659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 |
# File 'proto_docs/google/cloud/securitycentermanagement/v1/security_center_management.rb', line 659 class SimulatedFinding include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # @!attribute [rw] key # @return [::String] # @!attribute [rw] value # @return [::Google::Protobuf::Value] class SourcePropertiesEntry include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods end # The state of the finding. module State # Default value. This value is unused. STATE_UNSPECIFIED = 0 # The finding requires attention and has not been addressed yet. ACTIVE = 1 # The finding has been fixed, triaged as a non-issue, or otherwise # addressed and is no longer active. INACTIVE = 2 end # The severity of the finding. module Severity # Default value. This value is unused. SEVERITY_UNSPECIFIED = 0 # For vulnerabilities: A critical vulnerability is easily discoverable by # an external actor, exploitable, and results in the direct ability to # execute arbitrary code, exfiltrate data, and otherwise gain additional # access and privileges to cloud resources and workloads. Examples include # publicly accessible unprotected user data and public SSH access with weak # or no passwords. # # For threats: Indicates a threat that is able to access, modify, or delete # data or execute unauthorized code within existing resources. CRITICAL = 1 # For vulnerabilities: A high-risk vulnerability can be easily discovered # and exploited in combination with other vulnerabilities in order to gain # direct access and the ability to execute arbitrary code, exfiltrate data, # and otherwise gain additional access and privileges to cloud resources # and workloads. An example is a database with weak or no passwords that is # only accessible internally. This database could easily be compromised by # an actor that had access to the internal network. # # For threats: Indicates a threat that is able to create new computational # resources in an environment but not able to access data or execute code # in existing resources. HIGH = 2 # For vulnerabilities: A medium-risk vulnerability could be used by an # actor to gain access to resources or privileges that enable them to # eventually (through multiple steps or a complex exploit) gain access and # the ability to execute arbitrary code or exfiltrate data. An example is a # service account with access to more projects than it should have. If an # actor gains access to the service account, they could potentially use # that access to manipulate a project the service account was not intended # to. # # For threats: Indicates a threat that is able to cause operational impact # but may not access data or execute unauthorized code. MEDIUM = 3 # For vulnerabilities: A low-risk vulnerability hampers a security # organization's ability to detect vulnerabilities or active threats in # their deployment, or prevents the root cause investigation of security # issues. An example is monitoring and logs being disabled for resource # configurations and access. # # For threats: Indicates a threat that has obtained minimal access to an # environment but is not able to access data, execute code, or create # resources. LOW = 4 end # Represents what kind of finding it is. module FindingClass # Default value. This value is unused. FINDING_CLASS_UNSPECIFIED = 0 # Describes unwanted or malicious activity. THREAT = 1 # Describes a potential weakness in software that increases risk to # confidentiality, integrity, and availability. VULNERABILITY = 2 # Describes a potential weakness in cloud resource or asset configuration # that increases risk. MISCONFIGURATION = 3 # Describes a security observation that is for informational purposes. OBSERVATION = 4 # Describes an error that prevents Security Command Center from working # correctly. SCC_ERROR = 5 # Describes a potential security risk due to a change in the security # posture. POSTURE_VIOLATION = 6 # Describes a combination of security issues that represent a more severe # security problem when taken together. TOXIC_COMBINATION = 7 end end |
#resource_name ⇒ ::String
Returns For findings on Google Cloud resources, the full resource name of the Google Cloud resource this finding is for. When the finding is for a non-Google Cloud resource, the value can be a customer or partner defined string. This field is immutable after creation time.
659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 |
# File 'proto_docs/google/cloud/securitycentermanagement/v1/security_center_management.rb', line 659 class SimulatedFinding include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # @!attribute [rw] key # @return [::String] # @!attribute [rw] value # @return [::Google::Protobuf::Value] class SourcePropertiesEntry include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods end # The state of the finding. module State # Default value. This value is unused. STATE_UNSPECIFIED = 0 # The finding requires attention and has not been addressed yet. ACTIVE = 1 # The finding has been fixed, triaged as a non-issue, or otherwise # addressed and is no longer active. INACTIVE = 2 end # The severity of the finding. module Severity # Default value. This value is unused. SEVERITY_UNSPECIFIED = 0 # For vulnerabilities: A critical vulnerability is easily discoverable by # an external actor, exploitable, and results in the direct ability to # execute arbitrary code, exfiltrate data, and otherwise gain additional # access and privileges to cloud resources and workloads. Examples include # publicly accessible unprotected user data and public SSH access with weak # or no passwords. # # For threats: Indicates a threat that is able to access, modify, or delete # data or execute unauthorized code within existing resources. CRITICAL = 1 # For vulnerabilities: A high-risk vulnerability can be easily discovered # and exploited in combination with other vulnerabilities in order to gain # direct access and the ability to execute arbitrary code, exfiltrate data, # and otherwise gain additional access and privileges to cloud resources # and workloads. An example is a database with weak or no passwords that is # only accessible internally. This database could easily be compromised by # an actor that had access to the internal network. # # For threats: Indicates a threat that is able to create new computational # resources in an environment but not able to access data or execute code # in existing resources. HIGH = 2 # For vulnerabilities: A medium-risk vulnerability could be used by an # actor to gain access to resources or privileges that enable them to # eventually (through multiple steps or a complex exploit) gain access and # the ability to execute arbitrary code or exfiltrate data. An example is a # service account with access to more projects than it should have. If an # actor gains access to the service account, they could potentially use # that access to manipulate a project the service account was not intended # to. # # For threats: Indicates a threat that is able to cause operational impact # but may not access data or execute unauthorized code. MEDIUM = 3 # For vulnerabilities: A low-risk vulnerability hampers a security # organization's ability to detect vulnerabilities or active threats in # their deployment, or prevents the root cause investigation of security # issues. An example is monitoring and logs being disabled for resource # configurations and access. # # For threats: Indicates a threat that has obtained minimal access to an # environment but is not able to access data, execute code, or create # resources. LOW = 4 end # Represents what kind of finding it is. module FindingClass # Default value. This value is unused. FINDING_CLASS_UNSPECIFIED = 0 # Describes unwanted or malicious activity. THREAT = 1 # Describes a potential weakness in software that increases risk to # confidentiality, integrity, and availability. VULNERABILITY = 2 # Describes a potential weakness in cloud resource or asset configuration # that increases risk. MISCONFIGURATION = 3 # Describes a security observation that is for informational purposes. OBSERVATION = 4 # Describes an error that prevents Security Command Center from working # correctly. SCC_ERROR = 5 # Describes a potential security risk due to a change in the security # posture. POSTURE_VIOLATION = 6 # Describes a combination of security issues that represent a more severe # security problem when taken together. TOXIC_COMBINATION = 7 end end |
#severity ⇒ ::Google::Cloud::SecurityCenterManagement::V1::SimulatedFinding::Severity
Returns The severity of the finding. This field is managed by the source that writes the finding.
659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 |
# File 'proto_docs/google/cloud/securitycentermanagement/v1/security_center_management.rb', line 659 class SimulatedFinding include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # @!attribute [rw] key # @return [::String] # @!attribute [rw] value # @return [::Google::Protobuf::Value] class SourcePropertiesEntry include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods end # The state of the finding. module State # Default value. This value is unused. STATE_UNSPECIFIED = 0 # The finding requires attention and has not been addressed yet. ACTIVE = 1 # The finding has been fixed, triaged as a non-issue, or otherwise # addressed and is no longer active. INACTIVE = 2 end # The severity of the finding. module Severity # Default value. This value is unused. SEVERITY_UNSPECIFIED = 0 # For vulnerabilities: A critical vulnerability is easily discoverable by # an external actor, exploitable, and results in the direct ability to # execute arbitrary code, exfiltrate data, and otherwise gain additional # access and privileges to cloud resources and workloads. Examples include # publicly accessible unprotected user data and public SSH access with weak # or no passwords. # # For threats: Indicates a threat that is able to access, modify, or delete # data or execute unauthorized code within existing resources. CRITICAL = 1 # For vulnerabilities: A high-risk vulnerability can be easily discovered # and exploited in combination with other vulnerabilities in order to gain # direct access and the ability to execute arbitrary code, exfiltrate data, # and otherwise gain additional access and privileges to cloud resources # and workloads. An example is a database with weak or no passwords that is # only accessible internally. This database could easily be compromised by # an actor that had access to the internal network. # # For threats: Indicates a threat that is able to create new computational # resources in an environment but not able to access data or execute code # in existing resources. HIGH = 2 # For vulnerabilities: A medium-risk vulnerability could be used by an # actor to gain access to resources or privileges that enable them to # eventually (through multiple steps or a complex exploit) gain access and # the ability to execute arbitrary code or exfiltrate data. An example is a # service account with access to more projects than it should have. If an # actor gains access to the service account, they could potentially use # that access to manipulate a project the service account was not intended # to. # # For threats: Indicates a threat that is able to cause operational impact # but may not access data or execute unauthorized code. MEDIUM = 3 # For vulnerabilities: A low-risk vulnerability hampers a security # organization's ability to detect vulnerabilities or active threats in # their deployment, or prevents the root cause investigation of security # issues. An example is monitoring and logs being disabled for resource # configurations and access. # # For threats: Indicates a threat that has obtained minimal access to an # environment but is not able to access data, execute code, or create # resources. LOW = 4 end # Represents what kind of finding it is. module FindingClass # Default value. This value is unused. FINDING_CLASS_UNSPECIFIED = 0 # Describes unwanted or malicious activity. THREAT = 1 # Describes a potential weakness in software that increases risk to # confidentiality, integrity, and availability. VULNERABILITY = 2 # Describes a potential weakness in cloud resource or asset configuration # that increases risk. MISCONFIGURATION = 3 # Describes a security observation that is for informational purposes. OBSERVATION = 4 # Describes an error that prevents Security Command Center from working # correctly. SCC_ERROR = 5 # Describes a potential security risk due to a change in the security # posture. POSTURE_VIOLATION = 6 # Describes a combination of security issues that represent a more severe # security problem when taken together. TOXIC_COMBINATION = 7 end end |
#source_properties ⇒ ::Google::Protobuf::Map{::String => ::Google::Protobuf::Value}
Returns Source-specific properties. These properties are managed by the source that writes the finding. The key names must be between 1 and 255 characters; they must start with a letter and contain alphanumeric characters or underscores only.
659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 |
# File 'proto_docs/google/cloud/securitycentermanagement/v1/security_center_management.rb', line 659 class SimulatedFinding include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # @!attribute [rw] key # @return [::String] # @!attribute [rw] value # @return [::Google::Protobuf::Value] class SourcePropertiesEntry include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods end # The state of the finding. module State # Default value. This value is unused. STATE_UNSPECIFIED = 0 # The finding requires attention and has not been addressed yet. ACTIVE = 1 # The finding has been fixed, triaged as a non-issue, or otherwise # addressed and is no longer active. INACTIVE = 2 end # The severity of the finding. module Severity # Default value. This value is unused. SEVERITY_UNSPECIFIED = 0 # For vulnerabilities: A critical vulnerability is easily discoverable by # an external actor, exploitable, and results in the direct ability to # execute arbitrary code, exfiltrate data, and otherwise gain additional # access and privileges to cloud resources and workloads. Examples include # publicly accessible unprotected user data and public SSH access with weak # or no passwords. # # For threats: Indicates a threat that is able to access, modify, or delete # data or execute unauthorized code within existing resources. CRITICAL = 1 # For vulnerabilities: A high-risk vulnerability can be easily discovered # and exploited in combination with other vulnerabilities in order to gain # direct access and the ability to execute arbitrary code, exfiltrate data, # and otherwise gain additional access and privileges to cloud resources # and workloads. An example is a database with weak or no passwords that is # only accessible internally. This database could easily be compromised by # an actor that had access to the internal network. # # For threats: Indicates a threat that is able to create new computational # resources in an environment but not able to access data or execute code # in existing resources. HIGH = 2 # For vulnerabilities: A medium-risk vulnerability could be used by an # actor to gain access to resources or privileges that enable them to # eventually (through multiple steps or a complex exploit) gain access and # the ability to execute arbitrary code or exfiltrate data. An example is a # service account with access to more projects than it should have. If an # actor gains access to the service account, they could potentially use # that access to manipulate a project the service account was not intended # to. # # For threats: Indicates a threat that is able to cause operational impact # but may not access data or execute unauthorized code. MEDIUM = 3 # For vulnerabilities: A low-risk vulnerability hampers a security # organization's ability to detect vulnerabilities or active threats in # their deployment, or prevents the root cause investigation of security # issues. An example is monitoring and logs being disabled for resource # configurations and access. # # For threats: Indicates a threat that has obtained minimal access to an # environment but is not able to access data, execute code, or create # resources. LOW = 4 end # Represents what kind of finding it is. module FindingClass # Default value. This value is unused. FINDING_CLASS_UNSPECIFIED = 0 # Describes unwanted or malicious activity. THREAT = 1 # Describes a potential weakness in software that increases risk to # confidentiality, integrity, and availability. VULNERABILITY = 2 # Describes a potential weakness in cloud resource or asset configuration # that increases risk. MISCONFIGURATION = 3 # Describes a security observation that is for informational purposes. OBSERVATION = 4 # Describes an error that prevents Security Command Center from working # correctly. SCC_ERROR = 5 # Describes a potential security risk due to a change in the security # posture. POSTURE_VIOLATION = 6 # Describes a combination of security issues that represent a more severe # security problem when taken together. TOXIC_COMBINATION = 7 end end |
#state ⇒ ::Google::Cloud::SecurityCenterManagement::V1::SimulatedFinding::State (readonly)
Returns Output only. The state of the finding.
659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 |
# File 'proto_docs/google/cloud/securitycentermanagement/v1/security_center_management.rb', line 659 class SimulatedFinding include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # @!attribute [rw] key # @return [::String] # @!attribute [rw] value # @return [::Google::Protobuf::Value] class SourcePropertiesEntry include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods end # The state of the finding. module State # Default value. This value is unused. STATE_UNSPECIFIED = 0 # The finding requires attention and has not been addressed yet. ACTIVE = 1 # The finding has been fixed, triaged as a non-issue, or otherwise # addressed and is no longer active. INACTIVE = 2 end # The severity of the finding. module Severity # Default value. This value is unused. SEVERITY_UNSPECIFIED = 0 # For vulnerabilities: A critical vulnerability is easily discoverable by # an external actor, exploitable, and results in the direct ability to # execute arbitrary code, exfiltrate data, and otherwise gain additional # access and privileges to cloud resources and workloads. Examples include # publicly accessible unprotected user data and public SSH access with weak # or no passwords. # # For threats: Indicates a threat that is able to access, modify, or delete # data or execute unauthorized code within existing resources. CRITICAL = 1 # For vulnerabilities: A high-risk vulnerability can be easily discovered # and exploited in combination with other vulnerabilities in order to gain # direct access and the ability to execute arbitrary code, exfiltrate data, # and otherwise gain additional access and privileges to cloud resources # and workloads. An example is a database with weak or no passwords that is # only accessible internally. This database could easily be compromised by # an actor that had access to the internal network. # # For threats: Indicates a threat that is able to create new computational # resources in an environment but not able to access data or execute code # in existing resources. HIGH = 2 # For vulnerabilities: A medium-risk vulnerability could be used by an # actor to gain access to resources or privileges that enable them to # eventually (through multiple steps or a complex exploit) gain access and # the ability to execute arbitrary code or exfiltrate data. An example is a # service account with access to more projects than it should have. If an # actor gains access to the service account, they could potentially use # that access to manipulate a project the service account was not intended # to. # # For threats: Indicates a threat that is able to cause operational impact # but may not access data or execute unauthorized code. MEDIUM = 3 # For vulnerabilities: A low-risk vulnerability hampers a security # organization's ability to detect vulnerabilities or active threats in # their deployment, or prevents the root cause investigation of security # issues. An example is monitoring and logs being disabled for resource # configurations and access. # # For threats: Indicates a threat that has obtained minimal access to an # environment but is not able to access data, execute code, or create # resources. LOW = 4 end # Represents what kind of finding it is. module FindingClass # Default value. This value is unused. FINDING_CLASS_UNSPECIFIED = 0 # Describes unwanted or malicious activity. THREAT = 1 # Describes a potential weakness in software that increases risk to # confidentiality, integrity, and availability. VULNERABILITY = 2 # Describes a potential weakness in cloud resource or asset configuration # that increases risk. MISCONFIGURATION = 3 # Describes a security observation that is for informational purposes. OBSERVATION = 4 # Describes an error that prevents Security Command Center from working # correctly. SCC_ERROR = 5 # Describes a potential security risk due to a change in the security # posture. POSTURE_VIOLATION = 6 # Describes a combination of security issues that represent a more severe # security problem when taken together. TOXIC_COMBINATION = 7 end end |