Represents an access event.
Represents an application associated with a finding.
Security Command Center representation of a Google Cloud
resource.
Information about DDoS attack volume and classification.
Information related to Google Cloud Backup and DR Service findings.
Configures how to deliver Findings to BigQuery Instance.
Request message for bulk findings update.
The response to a BulkMute request. Contains the LRO information.
Fields related to Google Cloud Armor findings.
Details about the Cloud Data Loss Prevention (Cloud DLP)
inspection
job that produced
the finding.
Contains compliance information about a security standard indicating unmet
recommendations.
Contains information about the IP connection associated with the finding.
The email address of a contact.
Details about specific contacts
Container associated with the finding.
Request message for creating a BigQuery export.
Request message for creating a finding.
Request message for creating a mute config.
Request message for creating a notification config.
Request message for creating Security Health Analytics custom modules.
Request message for creating a source.
Defines the properties in a custom module configuration for Security
Health Analytics. Use the custom module configuration to create custom
detectors that generate custom findings for resources that you specify.
CVE stands for Common Vulnerabilities and Exposures.
Information from the
CVE
record that describes this
vulnerability.
Common Vulnerability Scoring System version 3.
Represents database access information, such as queries. A database may be a
sub-resource of an instance (as in the case of Cloud SQL instances or Cloud
Spanner instances), or the database instance itself. Some database resources
might not have the
full resource
name populated because these
resource types, such as Cloud SQL databases, are not yet supported by Cloud
Asset Inventory. In these cases only the display name is provided.
Request message for deleting a BigQuery export.
Request message for deleting a mute config.
Request message for deleting a notification config.
Request message for deleting Security Health Analytics custom modules.
An EffectiveSecurityHealthAnalyticsCustomModule is the representation of
a Security Health Analytics custom module at a specified level of the
resource hierarchy: organization, folder, or project. If a custom module is
inherited from a parent organization or folder, the value of the
enablementState
property in EffectiveSecurityHealthAnalyticsCustomModule is
set to the value that is effective in the parent, instead of INHERITED
.
For example, if the module is enabled in a parent organization or folder, the
effective enablement_state for the module in all child folders or projects is
also enabled
. EffectiveSecurityHealthAnalyticsCustomModule is read-only.
A name-value pair representing an environment variable used in an operating
system process.
Resource where data was exfiltrated from or exfiltrated to.
Exfiltration represents a data exfiltration attempt from one or more sources
to one or more targets. The sources
attribute lists the sources of the
exfiltrated data. The targets
attribute lists the destinations the data was
copied to.
Representation of third party SIEM/SOAR fields within SCC.
File information about the related binary/library used by an executable, or
the script used by a script interpreter
Security Command Center finding.
Message that contains the resource name and display name of a folder
resource.
Represents a geographical location for a given access.
Request message for retrieving a BigQuery export.
Request message for getting effective Security Health Analytics custom
modules.
Request message for retrieving a mute config.
Request message for getting a notification config.
Request message for getting organization settings.
Request message for getting Security Health Analytics custom modules.
Request message for getting a source.
Request message for grouping by assets.
Response message for grouping by assets.
Request message for grouping by findings.
Response message for group by findings.
Result containing the properties and count of a groupBy request.
Represents a particular IAM binding, which captures a member’s role addition,
removal, or state.
Represents what’s commonly known as an
indicator of compromise (IoC) in
computer forensics. This is an artifact observed on a network or in an
operating system that, with high confidence, indicates a computer intrusion.
For more information, see
Indicator of
compromise.
Kernel mode rootkit signatures.
Kubernetes-related attributes.
Represents a generic name-value label. A label has separate name and value
fields to support filtering with the
contains()
function. For more
information, see
Filtering on array-type
fields.
Request message for listing assets.
Response message for listing assets.
Request message for listing BigQuery exports at a given scope e.g.
organization, folder or project.
Response message for listing BigQuery exports.
Request message for listing descendant Security Health Analytics custom
modules.
Response message for listing descendant Security Health Analytics custom
modules.
Request message for listing effective Security Health Analytics custom
modules.
Response message for listing effective Security Health Analytics custom
modules.
Request message for listing findings.
Response message for listing findings.
Request message for listing mute configs at a given scope e.g. organization,
folder or project.
Response message for listing mute configs.
Request message for listing notification configs.
Response message for listing notification configs.
Request message for listing Security Health Analytics custom modules.
Response message for listing Security Health Analytics custom modules.
Request message for listing sources.
Response message for listing sources.
Contains information related to the load balancer associated with the
finding.
An individual entry in a log.
A mute config is a Cloud SCC resource that contains the configuration
to mute create/update events of findings.
Cloud Security Command Center (Cloud SCC) notification configs.
Cloud SCC’s Notification
Contains information about the org policies associated with the finding.
User specified settings that are attached to the Security Command
Center organization.
Package is a generic definition of a package.
Represents an operating system process.
Additional Links
Information about the requests relevant to the finding.
Information related to the Google Cloud resource.
Request message for running asset discovery for an organization.
Response of asset discovery run
SecurityBulletin are notifications of vulnerabilities of Google products.
Represents an instance of a Security Health Analytics custom module,
including its full module name, display name, enablement state, and last
updated time. You can create a custom module at the organization, folder, or
project level. Custom modules that you create at the organization or folder
level are inherited by the child folders and projects.
User specified security marks that are attached to the parent Security
Command Center resource. Security marks are scoped within a Security Command
Center organization – they can be modified and viewed by all users who have
proper permissions on the organization.
Represents a posture that is deployed on Google Cloud by the
Security Command Center Posture Management service.
A posture contains one or more policy sets. A policy set is a
group of policies that enforce a set of security rules on Google
Cloud.
Identity delegation history of an authenticated service account.
Request message for updating a finding’s state.
Request message for updating a finding’s mute status.
Request message to simulate a CustomConfig against a given test resource.
Maximum size of the request is 4 MB by default.
Response message for simulating a SecurityHealthAnalyticsCustomModule
against a given resource.
Security Command Center finding source. A finding source
is an entity or a mechanism that can produce a finding. A source is like a
container of findings that come from the same scanner, logger, monitor, and
other tools.
Request message for updating a BigQuery export.
Request message for updating a ExternalSystem resource.
Request message for updating or creating a finding.
Request message for updating a mute config.
Request message for updating a notification config.
Request message for updating an organization’s settings.
Request message for updating Security Health Analytics custom modules.
Request message for updating a SecurityMarks resource.
Request message for updating a source.
Refers to common vulnerability fields e.g. cve, cvss, cwe etc.