本文為英文版的機器翻譯版本,如內容有任何歧義或不一致之處,概以英文版為準。
AwsIam ASFF 中的 資源
以下是 AwsIam 資源 AWS 的安全調查結果格式 (ASFF) 語法範例。
AWS Security Hub CSPM 將各種來源的問題清單標準化為 ASFF。如需 ASFF 的背景資訊,請參閱 AWS 安全調查結果格式 (ASFF)。
AwsIamAccessKey
AwsIamAccessKey 物件包含與問題清單相關的 IAM 存取金鑰詳細資訊。
下列範例顯示 AwsIamAccessKey 物件 AWS 的安全調查結果格式 (ASFF)。若要檢視AwsIamAccessKey屬性的描述,請參閱 AWS Security Hub CSPM API 參考中的 AwsIamAccessKeyDetails。
範例
"AwsIamAccessKey": { "AccessKeyId": "string", "AccountId": "string", "CreatedAt": "string", "PrincipalId": "string", "PrincipalName": "string", "PrincipalType": "string", "SessionContext": { "Attributes": { "CreationDate": "string", "MfaAuthenticated": boolean }, "SessionIssuer": { "AccountId": "string", "Arn": "string", "PrincipalId": "string", "Type": "string", "UserName": "string" } }, "Status": "string" }
AwsIamGroup
AwsIamGroup 物件包含 IAM 群組的詳細資訊。
下列範例顯示 AwsIamGroup 物件 AWS 的安全調查結果格式 (ASFF)。若要檢視AwsIamGroup屬性的描述,請參閱 AWS Security Hub CSPM API 參考中的 AwsIamGroupDetails。
範例
"AwsIamGroup": { "AttachedManagedPolicies": [ { "PolicyArn": "arn:aws:iam::aws:policy/ExampleManagedAccess", "PolicyName": "ExampleManagedAccess", } ], "CreateDate": "2020-04-28T14:08:37.000Z", "GroupId": "AGPA4TPS3VLP7QEXAMPLE", "GroupName": "Example_User_Group", "GroupPolicyList": [ { "PolicyName": "ExampleGroupPolicy" } ], "Path": "/" }
AwsIamPolicy
AwsIamPolicy 物件代表 IAM 許可政策。
下列範例顯示 AwsIamPolicy 物件 AWS 的安全調查結果格式 (ASFF)。若要檢視AwsIamPolicy屬性的描述,請參閱 AWS Security Hub CSPM API 參考中的 AwsIamPolicyDetails。
範例
"AwsIamPolicy": { "AttachmentCount": 1, "CreateDate": "2017-09-14T08:17:29.000Z", "DefaultVersionId": "v1", "Description": "Example IAM policy", "IsAttachable": true, "Path": "/", "PermissionsBoundaryUsageCount": 5, "PolicyId": "ANPAJ2UCCR6DPCEXAMPLE", "PolicyName": "EXAMPLE-MANAGED-POLICY", "PolicyVersionList": [ { "VersionId": "v1", "IsDefaultVersion": true, "CreateDate": "2017-09-14T08:17:29.000Z" } ], "UpdateDate": "2017-09-14T08:17:29.000Z" }
AwsIamRole
AwsIamRole 物件包含 IAM 角色的相關資訊,包括角色的所有政策。
下列範例顯示 AwsIamRole 物件 AWS 的安全調查結果格式 (ASFF)。若要檢視AwsIamRole屬性的描述,請參閱 AWS Security Hub CSPM API 參考中的 AwsIamRoleDetails。
範例
"AwsIamRole": { "AssumeRolePolicyDocument": "{'Version': '2012-10-17', 'Statement': [{'Effect': 'Allow','Action': 'sts:AssumeRole'}]}", "AttachedManagedPolicies": [ { "PolicyArn": "arn:aws:iam::aws:policy/ExamplePolicy1", "PolicyName": "Example policy 1" }, { "PolicyArn": "arn:aws:iam::444455556666:policy/ExamplePolicy2", "PolicyName": "Example policy 2" } ], "CreateDate": "2020-03-14T07:19:14.000Z", "InstanceProfileList": [ { "Arn": "arn:aws:iam::333333333333:ExampleProfile", "CreateDate": "2020-03-11T00:02:27Z", "InstanceProfileId": "AIPAIXEU4NUHUPEXAMPLE", "InstanceProfileName": "ExampleInstanceProfile", "Path": "/", "Roles": [ { "Arn": "arn:aws:iam::444455556666:role/example-role", "AssumeRolePolicyDocument": "", "CreateDate": "2020-03-11T00:02:27Z", "Path": "/", "RoleId": "AROAJ52OTH4H7LEXAMPLE", "RoleName": "example-role", } ] } ], "MaxSessionDuration": 3600, "Path": "/", "PermissionsBoundary": { "PermissionsBoundaryArn": "arn:aws:iam::aws:policy/AdministratorAccess", "PermissionsBoundaryType": "PermissionsBoundaryPolicy" }, "RoleId": "AROA4TPS3VLEXAMPLE", "RoleName": "BONESBootstrapHydra-OverbridgeOpsFunctionsLambda", "RolePolicyList": [ { "PolicyName": "Example role policy" } ] }
AwsIamUser
AwsIamUser 物件提供使用者的相關資訊。
下列範例顯示 AwsIamUser 物件 AWS 的安全調查結果格式 (ASFF)。若要檢視AwsIamUser屬性的描述,請參閱 AWS Security Hub CSPM API 參考中的 AwsIamUserDetails。
範例
"AwsIamUser": { "AttachedManagedPolicies": [ { "PolicyName": "ExamplePolicy", "PolicyArn": "arn:aws:iam::aws:policy/ExampleAccess" } ], "CreateDate": "2018-01-26T23:50:05.000Z", "GroupList": [], "Path": "/", "PermissionsBoundary" : { "PermissionsBoundaryArn" : "arn:aws:iam::aws:policy/AdministratorAccess", "PermissionsBoundaryType" : "PermissionsBoundaryPolicy" }, "UserId": "AIDACKCEVSQ6C2EXAMPLE", "UserName": "ExampleUser", "UserPolicyList": [ { "PolicyName": "InstancePolicy" } ] }