[ aws . securityhub ]
Return a list of findings that match the specified criteria. GetFindings and GetFindingsV2 both use securityhub:GetFindings in the Action element of an IAM policy statement. You must have permission to perform the securityhub:GetFindings action. This API is in public preview and subject to change.
See also: AWS API Documentation
get-findings-v2 uses document type values. Document types follow the JSON data model where valid values are: strings, numbers, booleans, null, arrays, and objects. For command input, options and nested parameters that are labeled with the type document must be provided as JSON. Shorthand syntax does not support document types.
get-findings-v2 is a paginated operation. Multiple API calls may be issued in order to retrieve the entire data set of results. You can disable pagination by providing the --no-paginate argument.
When using --output text and the --query argument on a paginated response, the --query argument must extract data from the results of the following query expressions: Findings
get-findings-v2
[--filters <value>]
[--sort-criteria <value>]
[--cli-input-json | --cli-input-yaml]
[--starting-token <value>]
[--page-size <value>]
[--max-items <value>]
[--generate-cli-skeleton <value>]
[--debug]
[--endpoint-url <value>]
[--no-verify-ssl]
[--no-paginate]
[--output <value>]
[--query <value>]
[--profile <value>]
[--region <value>]
[--version <value>]
[--color <value>]
[--no-sign-request]
[--ca-bundle <value>]
[--cli-read-timeout <value>]
[--cli-connect-timeout <value>]
[--cli-binary-format <value>]
[--no-cli-pager]
[--cli-auto-prompt]
[--no-cli-auto-prompt]
--filters (structure)
The finding attributes used to define a condition to filter the returned OCSF findings. You can filter up to 10 composite filters. For each filter type inside of a composite filter, you can provide up to 20 filters.
CompositeFilters -> (list)
Enables the creation of complex filtering conditions by combining filter criteria.
(structure)
Enables the creation of filtering criteria for security findings.
StringFilters -> (list)
Enables filtering based on string field values.
(structure)
Enables filtering of security findings based on string field values in OCSF.
FieldName -> (string)
The name of the field.
Possible values:
metadata.uidactivity_namecloud.account.uidcloud.providercloud.regioncompliance.assessments.categorycompliance.assessments.namecompliance.controlcompliance.statuscompliance.standardsfinding_info.descfinding_info.src_urlfinding_info.titlefinding_info.typesfinding_info.uidfinding_info.related_events.uidfinding_info.related_events.product.uidfinding_info.related_events.titlemetadata.product.namemetadata.product.uidmetadata.product.vendor_nameremediation.descremediation.referencesresources.cloud_partitionresources.regionresources.typeresources.uidseveritystatuscommentvulnerabilities.fix_coverageclass_namedatabucket.encryption_details.algorithmdatabucket.encryption_details.key_uiddatabucket.file.data_classifications.classifier_details.typeevidences.actor.user.account.uidevidences.api.operationevidences.api.response.error_messageevidences.api.service.nameevidences.connection_info.directionevidences.connection_info.protocol_nameevidences.dst_endpoint.autonomous_system.nameevidences.dst_endpoint.location.cityevidences.dst_endpoint.location.countryevidences.src_endpoint.autonomous_system.nameevidences.src_endpoint.hostnameevidences.src_endpoint.location.cityevidences.src_endpoint.location.countryfinding_info.analytic.namemalware.namemalware_scan_info.uidmalware.severityresources.cloud_function.layers.uid_altresources.cloud_function.runtimeresources.cloud_function.user.uidresources.device.encryption_details.key_uidresources.device.image.uidresources.image.architectureresources.image.registry_uidresources.image.repository_nameresources.image.uidresources.subnet_info.uidresources.vpc_uidvulnerabilities.affected_code.file.pathvulnerabilities.affected_packages.namevulnerabilities.cve.epss.scorevulnerabilities.cve.uidvulnerabilities.related_vulnerabilitiescloud.account.nameFilter -> (structure)
A string filter for filtering Security Hub findings.
Value -> (string)
The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is
Security Hub. If you providesecurity hubas the filter value, there’s no match.Constraints:
- pattern:
.*\S.*Comparison -> (string)
The condition to apply to a string value when filtering Security Hub findings.
To search for values that have the filter value, use one of the following comparison operators:
- To search for values that include the filter value, use
CONTAINS. For example, the filterTitle CONTAINS CloudFrontmatches findings that have aTitlethat includes the string CloudFront.- To search for values that exactly match the filter value, use
EQUALS. For example, the filterAwsAccountId EQUALS 123456789012only matches findings that have an account ID of123456789012.- To search for values that start with the filter value, use
PREFIX. For example, the filterResourceRegion PREFIX usmatches findings that have aResourceRegionthat starts withus. AResourceRegionthat starts with a different value, such asaf,ap, orca, doesn’t match.CONTAINS,EQUALS, andPREFIXfilters on the same field are joined byOR. A finding matches if it matches any one of those filters. For example, the filtersTitle CONTAINS CloudFront OR Title CONTAINS CloudWatchmatch a finding that includes eitherCloudFront,CloudWatch, or both strings in the title.To search for values that don’t have the filter value, use one of the following comparison operators:
- To search for values that exclude the filter value, use
NOT_CONTAINS. For example, the filterTitle NOT_CONTAINS CloudFrontmatches findings that have aTitlethat excludes the string CloudFront.- To search for values other than the filter value, use
NOT_EQUALS. For example, the filterAwsAccountId NOT_EQUALS 123456789012only matches findings that have an account ID other than123456789012.- To search for values that don’t start with the filter value, use
PREFIX_NOT_EQUALS. For example, the filterResourceRegion PREFIX_NOT_EQUALS usmatches findings with aResourceRegionthat starts with a value other thanus.NOT_CONTAINS,NOT_EQUALS, andPREFIX_NOT_EQUALSfilters on the same field are joined byAND. A finding matches only if it matches all of those filters. For example, the filtersTitle NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatchmatch a finding that excludes bothCloudFrontandCloudWatchin the title.You can’t have both a
CONTAINSfilter and aNOT_CONTAINSfilter on the same field. Similarly, you can’t provide both anEQUALSfilter and aNOT_EQUALSorPREFIX_NOT_EQUALSfilter on the same field. Combining filters in this way returns an error.CONTAINSfilters can only be used with otherCONTAINSfilters.NOT_CONTAINSfilters can only be used with otherNOT_CONTAINSfilters.You can combine
PREFIXfilters withNOT_EQUALSorPREFIX_NOT_EQUALSfilters for the same field. Security Hub first processes thePREFIXfilters, and then theNOT_EQUALSorPREFIX_NOT_EQUALSfilters.For example, for the following filters, Security Hub first identifies findings that have resource types that start with either
AwsIamorAwsEc2. It then excludes findings that have a resource type ofAwsIamPolicyand findings that have a resource type ofAwsEc2NetworkInterface.
ResourceType PREFIX AwsIamResourceType PREFIX AwsEc2ResourceType NOT_EQUALS AwsIamPolicyResourceType NOT_EQUALS AwsEc2NetworkInterfaceCONTAINSandNOT_CONTAINSoperators can be used only with automation rules V1.CONTAINS_WORDoperator is only supported inGetFindingsV2,GetFindingStatisticsV2,GetResourcesV2, andGetResourceStatisticsV2APIs. For more information, see Automation rules in the Security Hub User Guide .Possible values:
EQUALSPREFIXNOT_EQUALSPREFIX_NOT_EQUALSCONTAINSNOT_CONTAINSCONTAINS_WORDDateFilters -> (list)
Enables filtering based on date and timestamp fields.
(structure)
Enables filtering of security findings based on date and timestamp fields in OCSF.
FieldName -> (string)
The name of the field.
Possible values:
finding_info.created_time_dtfinding_info.first_seen_time_dtfinding_info.last_seen_time_dtfinding_info.modified_time_dtresources.image.created_time_dtresources.image.last_used_time_dtresources.modified_time_dtFilter -> (structure)
A date filter for querying findings.
Start -> (string)
A timestamp that provides the start date for the date filter.
For more information about the validation and formatting of timestamp fields in Security Hub, see Timestamps .
Constraints:
- pattern:
.*\S.*End -> (string)
A timestamp that provides the end date for the date filter.
For more information about the validation and formatting of timestamp fields in Security Hub, see Timestamps .
Constraints:
- pattern:
.*\S.*DateRange -> (structure)
A date range for the date filter.
Value -> (integer)
A date range value for the date filter.Unit -> (string)
A date range unit for the date filter.
Possible values:
DAYSBooleanFilters -> (list)
Enables filtering based on boolean field values.
(structure)
Enables filtering of security findings based on boolean field values in OCSF.
FieldName -> (string)
The name of the field.
Possible values:
compliance.assessments.meets_criteriavulnerabilities.is_exploit_availablevulnerabilities.is_fix_availableFilter -> (structure)
Boolean filter for querying findings.
Value -> (boolean)
The value of the boolean.NumberFilters -> (list)
Enables filtering based on numerical field values.
(structure)
Enables filtering of security findings based on numerical field values in OCSF.
FieldName -> (string)
The name of the field.
Possible values:
activity_idcompliance.status_idconfidence_scoreseverity_idstatus_idfinding_info.related_events_countevidences.api.response.codeevidences.dst_endpoint.autonomous_system.numberevidences.dst_endpoint.portevidences.src_endpoint.autonomous_system.numberevidences.src_endpoint.portresources.image.in_use_countFilter -> (structure)
A number filter for querying findings.
Gte -> (double)
The greater-than-equal condition to be applied to a single field when querying for findings.Lte -> (double)
The less-than-equal condition to be applied to a single field when querying for findings.Eq -> (double)
The equal-to condition to be applied to a single field when querying for findings.Gt -> (double)
The greater-than condition to be applied to a single field when querying for findings.Lt -> (double)
The less-than condition to be applied to a single field when querying for findings.MapFilters -> (list)
Enables filtering based on map field values.
(structure)
Enables filtering of security findings based on map field values in OCSF.
FieldName -> (string)
The name of the field.
Possible values:
resources.tagscompliance.control_parametersdatabucket.tagsfinding_info.tagsFilter -> (structure)
A map filter for filtering Security Hub findings. Each map filter provides the field to check for, the value to check for, and the comparison operator.
Key -> (string)
The key of the map filter. For example, for
ResourceTags,Keyidentifies the name of the tag. ForUserDefinedFields,Keyis the name of the field.Constraints:
- pattern:
.*\S.*Value -> (string)
The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called
Departmentmight beSecurity. If you providesecurityas the filter value, then there’s no match.Constraints:
- pattern:
.*\S.*Comparison -> (string)
The condition to apply to the key value when filtering Security Hub findings with a map filter.
To search for values that have the filter value, use one of the following comparison operators:
- To search for values that include the filter value, use
CONTAINS. For example, for theResourceTagsfield, the filterDepartment CONTAINS Securitymatches findings that include the valueSecurityfor theDepartmenttag. In the same example, a finding with a value ofSecurity teamfor theDepartmenttag is a match.- To search for values that exactly match the filter value, use
EQUALS. For example, for theResourceTagsfield, the filterDepartment EQUALS Securitymatches findings that have the valueSecurityfor theDepartmenttag.CONTAINSandEQUALSfilters on the same field are joined byOR. A finding matches if it matches any one of those filters. For example, the filtersDepartment CONTAINS Security OR Department CONTAINS Financematch a finding that includes eitherSecurity,Finance, or both values.To search for values that don’t have the filter value, use one of the following comparison operators:
- To search for values that exclude the filter value, use
NOT_CONTAINS. For example, for theResourceTagsfield, the filterDepartment NOT_CONTAINS Financematches findings that exclude the valueFinancefor theDepartmenttag.- To search for values other than the filter value, use
NOT_EQUALS. For example, for theResourceTagsfield, the filterDepartment NOT_EQUALS Financematches findings that don’t have the valueFinancefor theDepartmenttag.
NOT_CONTAINSandNOT_EQUALSfilters on the same field are joined byAND. A finding matches only if it matches all of those filters. For example, the filtersDepartment NOT_CONTAINS Security AND Department NOT_CONTAINS Financematch a finding that excludes both theSecurityandFinancevalues.
CONTAINSfilters can only be used with otherCONTAINSfilters.NOT_CONTAINSfilters can only be used with otherNOT_CONTAINSfilters.You can’t have both a
CONTAINSfilter and aNOT_CONTAINSfilter on the same field. Similarly, you can’t have both anEQUALSfilter and aNOT_EQUALSfilter on the same field. Combining filters in this way returns an error.CONTAINSandNOT_CONTAINSoperators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide .Possible values:
EQUALSNOT_EQUALSCONTAINSNOT_CONTAINSIpFilters -> (list)
A list of IP address filters that allowing you to filter findings based on IP address properties.
(structure)
The structure for filtering findings based on IP address attributes.
FieldName -> (string)
The name of the IP address field to filter on.
Possible values:
evidences.dst_endpoint.ipevidences.src_endpoint.ipFilter -> (structure)
The IP filter for querying findings.
Cidr -> (string)
A finding’s CIDR value.
Constraints:
- pattern:
.*\S.*NestedCompositeFilters -> (list)
Provides an additional level of filtering, creating a three-layer nested structure. The first layer is a
CompositeFiltersarray with aCompositeOperator(AND/OR). The second layer is aCompositeFilterobject that contains direct filters andNestedCompositeFilters. The third layer isNestedCompositeFilters, which contains additional filter conditions.(structure)
Enables the creation of filtering criteria for security findings.
StringFilters -> (list)
Enables filtering based on string field values.
(structure)
Enables filtering of security findings based on string field values in OCSF.
FieldName -> (string)
The name of the field.
Possible values:
metadata.uidactivity_namecloud.account.uidcloud.providercloud.regioncompliance.assessments.categorycompliance.assessments.namecompliance.controlcompliance.statuscompliance.standardsfinding_info.descfinding_info.src_urlfinding_info.titlefinding_info.typesfinding_info.uidfinding_info.related_events.uidfinding_info.related_events.product.uidfinding_info.related_events.titlemetadata.product.namemetadata.product.uidmetadata.product.vendor_nameremediation.descremediation.referencesresources.cloud_partitionresources.regionresources.typeresources.uidseveritystatuscommentvulnerabilities.fix_coverageclass_namedatabucket.encryption_details.algorithmdatabucket.encryption_details.key_uiddatabucket.file.data_classifications.classifier_details.typeevidences.actor.user.account.uidevidences.api.operationevidences.api.response.error_messageevidences.api.service.nameevidences.connection_info.directionevidences.connection_info.protocol_nameevidences.dst_endpoint.autonomous_system.nameevidences.dst_endpoint.location.cityevidences.dst_endpoint.location.countryevidences.src_endpoint.autonomous_system.nameevidences.src_endpoint.hostnameevidences.src_endpoint.location.cityevidences.src_endpoint.location.countryfinding_info.analytic.namemalware.namemalware_scan_info.uidmalware.severityresources.cloud_function.layers.uid_altresources.cloud_function.runtimeresources.cloud_function.user.uidresources.device.encryption_details.key_uidresources.device.image.uidresources.image.architectureresources.image.registry_uidresources.image.repository_nameresources.image.uidresources.subnet_info.uidresources.vpc_uidvulnerabilities.affected_code.file.pathvulnerabilities.affected_packages.namevulnerabilities.cve.epss.scorevulnerabilities.cve.uidvulnerabilities.related_vulnerabilitiescloud.account.nameFilter -> (structure)
A string filter for filtering Security Hub findings.
Value -> (string)
The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is
Security Hub. If you providesecurity hubas the filter value, there’s no match.Constraints:
- pattern:
.*\S.*Comparison -> (string)
The condition to apply to a string value when filtering Security Hub findings.
To search for values that have the filter value, use one of the following comparison operators:
- To search for values that include the filter value, use
CONTAINS. For example, the filterTitle CONTAINS CloudFrontmatches findings that have aTitlethat includes the string CloudFront.- To search for values that exactly match the filter value, use
EQUALS. For example, the filterAwsAccountId EQUALS 123456789012only matches findings that have an account ID of123456789012.- To search for values that start with the filter value, use
PREFIX. For example, the filterResourceRegion PREFIX usmatches findings that have aResourceRegionthat starts withus. AResourceRegionthat starts with a different value, such asaf,ap, orca, doesn’t match.CONTAINS,EQUALS, andPREFIXfilters on the same field are joined byOR. A finding matches if it matches any one of those filters. For example, the filtersTitle CONTAINS CloudFront OR Title CONTAINS CloudWatchmatch a finding that includes eitherCloudFront,CloudWatch, or both strings in the title.To search for values that don’t have the filter value, use one of the following comparison operators:
- To search for values that exclude the filter value, use
NOT_CONTAINS. For example, the filterTitle NOT_CONTAINS CloudFrontmatches findings that have aTitlethat excludes the string CloudFront.- To search for values other than the filter value, use
NOT_EQUALS. For example, the filterAwsAccountId NOT_EQUALS 123456789012only matches findings that have an account ID other than123456789012.- To search for values that don’t start with the filter value, use
PREFIX_NOT_EQUALS. For example, the filterResourceRegion PREFIX_NOT_EQUALS usmatches findings with aResourceRegionthat starts with a value other thanus.NOT_CONTAINS,NOT_EQUALS, andPREFIX_NOT_EQUALSfilters on the same field are joined byAND. A finding matches only if it matches all of those filters. For example, the filtersTitle NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatchmatch a finding that excludes bothCloudFrontandCloudWatchin the title.You can’t have both a
CONTAINSfilter and aNOT_CONTAINSfilter on the same field. Similarly, you can’t provide both anEQUALSfilter and aNOT_EQUALSorPREFIX_NOT_EQUALSfilter on the same field. Combining filters in this way returns an error.CONTAINSfilters can only be used with otherCONTAINSfilters.NOT_CONTAINSfilters can only be used with otherNOT_CONTAINSfilters.You can combine
PREFIXfilters withNOT_EQUALSorPREFIX_NOT_EQUALSfilters for the same field. Security Hub first processes thePREFIXfilters, and then theNOT_EQUALSorPREFIX_NOT_EQUALSfilters.For example, for the following filters, Security Hub first identifies findings that have resource types that start with either
AwsIamorAwsEc2. It then excludes findings that have a resource type ofAwsIamPolicyand findings that have a resource type ofAwsEc2NetworkInterface.
ResourceType PREFIX AwsIamResourceType PREFIX AwsEc2ResourceType NOT_EQUALS AwsIamPolicyResourceType NOT_EQUALS AwsEc2NetworkInterfaceCONTAINSandNOT_CONTAINSoperators can be used only with automation rules V1.CONTAINS_WORDoperator is only supported inGetFindingsV2,GetFindingStatisticsV2,GetResourcesV2, andGetResourceStatisticsV2APIs. For more information, see Automation rules in the Security Hub User Guide .Possible values:
EQUALSPREFIXNOT_EQUALSPREFIX_NOT_EQUALSCONTAINSNOT_CONTAINSCONTAINS_WORDDateFilters -> (list)
Enables filtering based on date and timestamp fields.
(structure)
Enables filtering of security findings based on date and timestamp fields in OCSF.
FieldName -> (string)
The name of the field.
Possible values:
finding_info.created_time_dtfinding_info.first_seen_time_dtfinding_info.last_seen_time_dtfinding_info.modified_time_dtresources.image.created_time_dtresources.image.last_used_time_dtresources.modified_time_dtFilter -> (structure)
A date filter for querying findings.
Start -> (string)
A timestamp that provides the start date for the date filter.
For more information about the validation and formatting of timestamp fields in Security Hub, see Timestamps .
Constraints:
- pattern:
.*\S.*End -> (string)
A timestamp that provides the end date for the date filter.
For more information about the validation and formatting of timestamp fields in Security Hub, see Timestamps .
Constraints:
- pattern:
.*\S.*DateRange -> (structure)
A date range for the date filter.
Value -> (integer)
A date range value for the date filter.Unit -> (string)
A date range unit for the date filter.
Possible values:
DAYSBooleanFilters -> (list)
Enables filtering based on boolean field values.
(structure)
Enables filtering of security findings based on boolean field values in OCSF.
FieldName -> (string)
The name of the field.
Possible values:
compliance.assessments.meets_criteriavulnerabilities.is_exploit_availablevulnerabilities.is_fix_availableFilter -> (structure)
Boolean filter for querying findings.
Value -> (boolean)
The value of the boolean.NumberFilters -> (list)
Enables filtering based on numerical field values.
(structure)
Enables filtering of security findings based on numerical field values in OCSF.
FieldName -> (string)
The name of the field.
Possible values:
activity_idcompliance.status_idconfidence_scoreseverity_idstatus_idfinding_info.related_events_countevidences.api.response.codeevidences.dst_endpoint.autonomous_system.numberevidences.dst_endpoint.portevidences.src_endpoint.autonomous_system.numberevidences.src_endpoint.portresources.image.in_use_countFilter -> (structure)
A number filter for querying findings.
Gte -> (double)
The greater-than-equal condition to be applied to a single field when querying for findings.Lte -> (double)
The less-than-equal condition to be applied to a single field when querying for findings.Eq -> (double)
The equal-to condition to be applied to a single field when querying for findings.Gt -> (double)
The greater-than condition to be applied to a single field when querying for findings.Lt -> (double)
The less-than condition to be applied to a single field when querying for findings.MapFilters -> (list)
Enables filtering based on map field values.
(structure)
Enables filtering of security findings based on map field values in OCSF.
FieldName -> (string)
The name of the field.
Possible values:
resources.tagscompliance.control_parametersdatabucket.tagsfinding_info.tagsFilter -> (structure)
A map filter for filtering Security Hub findings. Each map filter provides the field to check for, the value to check for, and the comparison operator.
Key -> (string)
The key of the map filter. For example, for
ResourceTags,Keyidentifies the name of the tag. ForUserDefinedFields,Keyis the name of the field.Constraints:
- pattern:
.*\S.*Value -> (string)
The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called
Departmentmight beSecurity. If you providesecurityas the filter value, then there’s no match.Constraints:
- pattern:
.*\S.*Comparison -> (string)
The condition to apply to the key value when filtering Security Hub findings with a map filter.
To search for values that have the filter value, use one of the following comparison operators:
- To search for values that include the filter value, use
CONTAINS. For example, for theResourceTagsfield, the filterDepartment CONTAINS Securitymatches findings that include the valueSecurityfor theDepartmenttag. In the same example, a finding with a value ofSecurity teamfor theDepartmenttag is a match.- To search for values that exactly match the filter value, use
EQUALS. For example, for theResourceTagsfield, the filterDepartment EQUALS Securitymatches findings that have the valueSecurityfor theDepartmenttag.CONTAINSandEQUALSfilters on the same field are joined byOR. A finding matches if it matches any one of those filters. For example, the filtersDepartment CONTAINS Security OR Department CONTAINS Financematch a finding that includes eitherSecurity,Finance, or both values.To search for values that don’t have the filter value, use one of the following comparison operators:
- To search for values that exclude the filter value, use
NOT_CONTAINS. For example, for theResourceTagsfield, the filterDepartment NOT_CONTAINS Financematches findings that exclude the valueFinancefor theDepartmenttag.- To search for values other than the filter value, use
NOT_EQUALS. For example, for theResourceTagsfield, the filterDepartment NOT_EQUALS Financematches findings that don’t have the valueFinancefor theDepartmenttag.
NOT_CONTAINSandNOT_EQUALSfilters on the same field are joined byAND. A finding matches only if it matches all of those filters. For example, the filtersDepartment NOT_CONTAINS Security AND Department NOT_CONTAINS Financematch a finding that excludes both theSecurityandFinancevalues.
CONTAINSfilters can only be used with otherCONTAINSfilters.NOT_CONTAINSfilters can only be used with otherNOT_CONTAINSfilters.You can’t have both a
CONTAINSfilter and aNOT_CONTAINSfilter on the same field. Similarly, you can’t have both anEQUALSfilter and aNOT_EQUALSfilter on the same field. Combining filters in this way returns an error.CONTAINSandNOT_CONTAINSoperators can be used only with automation rules. For more information, see Automation rules in the Security Hub User Guide .Possible values:
EQUALSNOT_EQUALSCONTAINSNOT_CONTAINSIpFilters -> (list)
A list of IP address filters that allowing you to filter findings based on IP address properties.
(structure)
The structure for filtering findings based on IP address attributes.
FieldName -> (string)
The name of the IP address field to filter on.
Possible values:
evidences.dst_endpoint.ipevidences.src_endpoint.ipFilter -> (structure)
The IP filter for querying findings.
Cidr -> (string)
A finding’s CIDR value.
Constraints:
- pattern:
.*\S.*Operator -> (string)
The logical operator used to combine multiple filter conditions.
Possible values:
ANDOROperator -> (string)
The logical operator used to combine multiple filter conditions.
Possible values:
ANDORCompositeOperator -> (string)
The logical operators used to combine the filtering on multiple
CompositeFilters.Possible values:
ANDOR
JSON Syntax:
{
"CompositeFilters": [
{
"StringFilters": [
{
"FieldName": "metadata.uid"|"activity_name"|"cloud.account.uid"|"cloud.provider"|"cloud.region"|"compliance.assessments.category"|"compliance.assessments.name"|"compliance.control"|"compliance.status"|"compliance.standards"|"finding_info.desc"|"finding_info.src_url"|"finding_info.title"|"finding_info.types"|"finding_info.uid"|"finding_info.related_events.uid"|"finding_info.related_events.product.uid"|"finding_info.related_events.title"|"metadata.product.name"|"metadata.product.uid"|"metadata.product.vendor_name"|"remediation.desc"|"remediation.references"|"resources.cloud_partition"|"resources.region"|"resources.type"|"resources.uid"|"severity"|"status"|"comment"|"vulnerabilities.fix_coverage"|"class_name"|"databucket.encryption_details.algorithm"|"databucket.encryption_details.key_uid"|"databucket.file.data_classifications.classifier_details.type"|"evidences.actor.user.account.uid"|"evidences.api.operation"|"evidences.api.response.error_message"|"evidences.api.service.name"|"evidences.connection_info.direction"|"evidences.connection_info.protocol_name"|"evidences.dst_endpoint.autonomous_system.name"|"evidences.dst_endpoint.location.city"|"evidences.dst_endpoint.location.country"|"evidences.src_endpoint.autonomous_system.name"|"evidences.src_endpoint.hostname"|"evidences.src_endpoint.location.city"|"evidences.src_endpoint.location.country"|"finding_info.analytic.name"|"malware.name"|"malware_scan_info.uid"|"malware.severity"|"resources.cloud_function.layers.uid_alt"|"resources.cloud_function.runtime"|"resources.cloud_function.user.uid"|"resources.device.encryption_details.key_uid"|"resources.device.image.uid"|"resources.image.architecture"|"resources.image.registry_uid"|"resources.image.repository_name"|"resources.image.uid"|"resources.subnet_info.uid"|"resources.vpc_uid"|"vulnerabilities.affected_code.file.path"|"vulnerabilities.affected_packages.name"|"vulnerabilities.cve.epss.score"|"vulnerabilities.cve.uid"|"vulnerabilities.related_vulnerabilities"|"cloud.account.name",
"Filter": {
"Value": "string",
"Comparison": "EQUALS"|"PREFIX"|"NOT_EQUALS"|"PREFIX_NOT_EQUALS"|"CONTAINS"|"NOT_CONTAINS"|"CONTAINS_WORD"
}
}
...
],
"DateFilters": [
{
"FieldName": "finding_info.created_time_dt"|"finding_info.first_seen_time_dt"|"finding_info.last_seen_time_dt"|"finding_info.modified_time_dt"|"resources.image.created_time_dt"|"resources.image.last_used_time_dt"|"resources.modified_time_dt",
"Filter": {
"Start": "string",
"End": "string",
"DateRange": {
"Value": integer,
"Unit": "DAYS"
}
}
}
...
],
"BooleanFilters": [
{
"FieldName": "compliance.assessments.meets_criteria"|"vulnerabilities.is_exploit_available"|"vulnerabilities.is_fix_available",
"Filter": {
"Value": true|false
}
}
...
],
"NumberFilters": [
{
"FieldName": "activity_id"|"compliance.status_id"|"confidence_score"|"severity_id"|"status_id"|"finding_info.related_events_count"|"evidences.api.response.code"|"evidences.dst_endpoint.autonomous_system.number"|"evidences.dst_endpoint.port"|"evidences.src_endpoint.autonomous_system.number"|"evidences.src_endpoint.port"|"resources.image.in_use_count",
"Filter": {
"Gte": double,
"Lte": double,
"Eq": double,
"Gt": double,
"Lt": double
}
}
...
],
"MapFilters": [
{
"FieldName": "resources.tags"|"compliance.control_parameters"|"databucket.tags"|"finding_info.tags",
"Filter": {
"Key": "string",
"Value": "string",
"Comparison": "EQUALS"|"NOT_EQUALS"|"CONTAINS"|"NOT_CONTAINS"
}
}
...
],
"IpFilters": [
{
"FieldName": "evidences.dst_endpoint.ip"|"evidences.src_endpoint.ip",
"Filter": {
"Cidr": "string"
}
}
...
],
"NestedCompositeFilters": [
{
"StringFilters": [
{
"FieldName": "metadata.uid"|"activity_name"|"cloud.account.uid"|"cloud.provider"|"cloud.region"|"compliance.assessments.category"|"compliance.assessments.name"|"compliance.control"|"compliance.status"|"compliance.standards"|"finding_info.desc"|"finding_info.src_url"|"finding_info.title"|"finding_info.types"|"finding_info.uid"|"finding_info.related_events.uid"|"finding_info.related_events.product.uid"|"finding_info.related_events.title"|"metadata.product.name"|"metadata.product.uid"|"metadata.product.vendor_name"|"remediation.desc"|"remediation.references"|"resources.cloud_partition"|"resources.region"|"resources.type"|"resources.uid"|"severity"|"status"|"comment"|"vulnerabilities.fix_coverage"|"class_name"|"databucket.encryption_details.algorithm"|"databucket.encryption_details.key_uid"|"databucket.file.data_classifications.classifier_details.type"|"evidences.actor.user.account.uid"|"evidences.api.operation"|"evidences.api.response.error_message"|"evidences.api.service.name"|"evidences.connection_info.direction"|"evidences.connection_info.protocol_name"|"evidences.dst_endpoint.autonomous_system.name"|"evidences.dst_endpoint.location.city"|"evidences.dst_endpoint.location.country"|"evidences.src_endpoint.autonomous_system.name"|"evidences.src_endpoint.hostname"|"evidences.src_endpoint.location.city"|"evidences.src_endpoint.location.country"|"finding_info.analytic.name"|"malware.name"|"malware_scan_info.uid"|"malware.severity"|"resources.cloud_function.layers.uid_alt"|"resources.cloud_function.runtime"|"resources.cloud_function.user.uid"|"resources.device.encryption_details.key_uid"|"resources.device.image.uid"|"resources.image.architecture"|"resources.image.registry_uid"|"resources.image.repository_name"|"resources.image.uid"|"resources.subnet_info.uid"|"resources.vpc_uid"|"vulnerabilities.affected_code.file.path"|"vulnerabilities.affected_packages.name"|"vulnerabilities.cve.epss.score"|"vulnerabilities.cve.uid"|"vulnerabilities.related_vulnerabilities"|"cloud.account.name",
"Filter": {
"Value": "string",
"Comparison": "EQUALS"|"PREFIX"|"NOT_EQUALS"|"PREFIX_NOT_EQUALS"|"CONTAINS"|"NOT_CONTAINS"|"CONTAINS_WORD"
}
}
...
],
"DateFilters": [
{
"FieldName": "finding_info.created_time_dt"|"finding_info.first_seen_time_dt"|"finding_info.last_seen_time_dt"|"finding_info.modified_time_dt"|"resources.image.created_time_dt"|"resources.image.last_used_time_dt"|"resources.modified_time_dt",
"Filter": {
"Start": "string",
"End": "string",
"DateRange": {
"Value": integer,
"Unit": "DAYS"
}
}
}
...
],
"BooleanFilters": [
{
"FieldName": "compliance.assessments.meets_criteria"|"vulnerabilities.is_exploit_available"|"vulnerabilities.is_fix_available",
"Filter": {
"Value": true|false
}
}
...
],
"NumberFilters": [
{
"FieldName": "activity_id"|"compliance.status_id"|"confidence_score"|"severity_id"|"status_id"|"finding_info.related_events_count"|"evidences.api.response.code"|"evidences.dst_endpoint.autonomous_system.number"|"evidences.dst_endpoint.port"|"evidences.src_endpoint.autonomous_system.number"|"evidences.src_endpoint.port"|"resources.image.in_use_count",
"Filter": {
"Gte": double,
"Lte": double,
"Eq": double,
"Gt": double,
"Lt": double
}
}
...
],
"MapFilters": [
{
"FieldName": "resources.tags"|"compliance.control_parameters"|"databucket.tags"|"finding_info.tags",
"Filter": {
"Key": "string",
"Value": "string",
"Comparison": "EQUALS"|"NOT_EQUALS"|"CONTAINS"|"NOT_CONTAINS"
}
}
...
],
"IpFilters": [
{
"FieldName": "evidences.dst_endpoint.ip"|"evidences.src_endpoint.ip",
"Filter": {
"Cidr": "string"
}
}
...
],
"NestedCompositeFilters": ,
"Operator": "AND"|"OR"
}
...
],
"Operator": "AND"|"OR"
}
...
],
"CompositeOperator": "AND"|"OR"
}
--sort-criteria (list)
The finding attributes used to sort the list of returned findings.
(structure)
A collection of finding attributes used to sort findings.
Field -> (string)
The finding attribute used to sort findings.
Constraints:
- pattern:
.*\S.*SortOrder -> (string)
The order used to sort findings.
Possible values:
ascdesc
Shorthand Syntax:
Field=string,SortOrder=string ...
JSON Syntax:
[
{
"Field": "string",
"SortOrder": "asc"|"desc"
}
...
]
--cli-input-json | --cli-input-yaml (string)
Reads arguments from the JSON string provided. The JSON string follows the format provided by --generate-cli-skeleton. If other arguments are provided on the command line, those values will override the JSON-provided values. It is not possible to pass arbitrary binary values using a JSON-provided value as the string will be taken literally. This may not be specified along with --cli-input-yaml.
--starting-token (string)
A token to specify where to start paginating. This is the
NextTokenfrom a previously truncated response.For usage examples, see Pagination in the AWS Command Line Interface User Guide .
--page-size (integer)
The size of each page to get in the AWS service call. This does not affect the number of items returned in the command’s output. Setting a smaller page size results in more calls to the AWS service, retrieving fewer items in each call. This can help prevent the AWS service calls from timing out.
For usage examples, see Pagination in the AWS Command Line Interface User Guide .
--max-items (integer)
The total number of items to return in the command’s output. If the total number of items available is more than the value specified, a
NextTokenis provided in the command’s output. To resume pagination, provide theNextTokenvalue in thestarting-tokenargument of a subsequent command. Do not use theNextTokenresponse element directly outside of the AWS CLI.For usage examples, see Pagination in the AWS Command Line Interface User Guide .
--generate-cli-skeleton (string)
Prints a JSON skeleton to standard output without sending an API request. If provided with no value or the value input, prints a sample input JSON that can be used as an argument for --cli-input-json. Similarly, if provided yaml-input it will print a sample input YAML that can be used with --cli-input-yaml. If provided with the value output, it validates the command inputs and returns a sample output JSON for that command. The generated JSON skeleton is not stable between versions of the AWS CLI and there are no backwards compatibility guarantees in the JSON skeleton generated.
--debug (boolean)
Turn on debug logging.
--endpoint-url (string)
Override command’s default URL with the given URL.
--no-verify-ssl (boolean)
By default, the AWS CLI uses SSL when communicating with AWS services. For each SSL connection, the AWS CLI will verify SSL certificates. This option overrides the default behavior of verifying SSL certificates.
--no-paginate (boolean)
Disable automatic pagination. If automatic pagination is disabled, the AWS CLI will only make one call, for the first page of results.
--output (string)
The formatting style for command output.
--query (string)
A JMESPath query to use in filtering the response data.
--profile (string)
Use a specific profile from your credential file.
--region (string)
The region to use. Overrides config/env settings.
--version (string)
Display the version of this tool.
--color (string)
Turn on/off color output.
--no-sign-request (boolean)
Do not sign requests. Credentials will not be loaded if this argument is provided.
--ca-bundle (string)
The CA certificate bundle to use when verifying SSL certificates. Overrides config/env settings.
--cli-read-timeout (int)
The maximum socket read time in seconds. If the value is set to 0, the socket read will be blocking and not timeout. The default value is 60 seconds.
--cli-connect-timeout (int)
The maximum socket connect time in seconds. If the value is set to 0, the socket connect will be blocking and not timeout. The default value is 60 seconds.
--cli-binary-format (string)
The formatting style to be used for binary blobs. The default format is base64. The base64 format expects binary blobs to be provided as a base64 encoded string. The raw-in-base64-out format preserves compatibility with AWS CLI V1 behavior and binary values must be passed literally. When providing contents from a file that map to a binary blob fileb:// will always be treated as binary and use the file contents directly regardless of the cli-binary-format setting. When using file:// the file contents will need to properly formatted for the configured cli-binary-format.
--no-cli-pager (boolean)
Disable cli pager for output.
--cli-auto-prompt (boolean)
Automatically prompt for CLI input parameters.
--no-cli-auto-prompt (boolean)
Disable automatically prompt for CLI input parameters.
Findings -> (list)
An array of security findings returned by the operation.
(document)
NextToken -> (string)
The pagination token to use to request the next page of results. Otherwise, this parameter is null.