Nested message and enum types in Asset
.
Nested message and enum types in AttackExposure
.
Nested message and enum types in AttackPath
.
Nested message and enum types in AwsMetadata
.
Nested message and enum types in AzureMetadata
.
Nested message and enum types in BulkMuteFindingsRequest
.
Nested message and enum types in CloudDlpDataProfile
.
Nested message and enum types in Connection
.
Nested message and enum types in CustomConfig
.
Nested message and enum types in Cve
.
Nested message and enum types in Cvssv3
.
Nested message and enum types in EffectiveEventThreatDetectionCustomModule
.
Nested message and enum types in EffectiveSecurityHealthAnalyticsCustomModule
.
Nested message and enum types in EventThreatDetectionCustomModule
.
Nested message and enum types in ExternalSystem
.
Nested message and enum types in File
.
Nested message and enum types in Finding
.
Nested message and enum types in GroupMembership
.
Nested message and enum types in IamBinding
.
Nested message and enum types in Indicator
.
Nested message and enum types in Kubernetes
.
Nested message and enum types in ListAssetsResponse
.
Nested message and enum types in ListFindingsResponse
.
Nested message and enum types in LogEntry
.
Nested message and enum types in MitreAttack
.
Nested message and enum types in MuteConfig
.
Nested message and enum types in NotificationConfig
.
Nested message and enum types in NotificationMessage
.
Nested message and enum types in OrganizationSettings
.
Nested message and enum types in Resource
.
Nested message and enum types in ResourcePath
.
Nested message and enum types in ResourceValueConfig
.
Nested message and enum types in RunAssetDiscoveryResponse
.
Generated client implementations.
Nested message and enum types in SecurityHealthAnalyticsCustomModule
.
Nested message and enum types in SecurityPosture
.
Nested message and enum types in SimulateSecurityHealthAnalyticsCustomModuleRequest
.
Nested message and enum types in SimulateSecurityHealthAnalyticsCustomModuleResponse
.
Nested message and enum types in ValuedResource
.
Represents an access event.
Represents an application associated with a finding.
Security Command Center representation of a Google Cloud
resource.
Information about DDoS attack volume and classification.
An attack exposure contains the results of an attack path simulation run.
A path that an attacker could take to reach an exposed resource.
AWS metadata associated with the resource, only applicable if the finding’s
cloud provider is Amazon Web Services.
Azure metadata associated with the resource, only applicable if the finding’s
cloud provider is Microsoft Azure.
Information related to Google Cloud Backup and DR Service findings.
Request message to create multiple resource value configs
Response message for BatchCreateResourceValueConfigs
Configures how to deliver Findings to BigQuery Instance.
Request message for bulk findings update.
The response to a BulkMute request. Contains the LRO information.
Fields related to Google Cloud Armor findings.
Details about the Cloud Data Loss Prevention (Cloud DLP)
inspection
job that produced
the finding.
Contains compliance information about a security standard indicating unmet
recommendations.
Contains information about the IP connection associated with the finding.
The email address of a contact.
Details about specific contacts
Container associated with the finding.
Request message for creating a BigQuery export.
Request to create an Event Threat Detection custom module.
Request message for creating a finding.
Request message for creating a mute config.
Request message for creating a notification config.
Request message to create single resource value config
Request message for creating Security Health Analytics custom modules.
Request message for creating a source.
Defines the properties in a custom module configuration for Security
Health Analytics. Use the custom module configuration to create custom
detectors that generate custom findings for resources that you specify.
An error encountered while validating the uploaded configuration of an
Event Threat Detection Custom Module.
A list of zero or more errors encountered while validating the uploaded
configuration of an Event Threat Detection Custom Module.
CVE stands for Common Vulnerabilities and Exposures.
Information from the
CVE
record that describes this
vulnerability.
Common Vulnerability Scoring System version 3.
Represents database access information, such as queries. A database may be a
sub-resource of an instance (as in the case of Cloud SQL instances or Cloud
Spanner instances), or the database instance itself. Some database resources
might not have the
full resource
name populated because these
resource types, such as Cloud SQL databases, are not yet supported by Cloud
Asset Inventory. In these cases only the display name is provided.
Request message for deleting a BigQuery export.
Request to delete an Event Threat Detection custom module.
Request message for deleting a mute config.
Request message for deleting a notification config.
Request message to delete resource value config
Request message for deleting Security Health Analytics custom modules.
An EffectiveEventThreatDetectionCustomModule is the representation of
an Event Threat Detection custom module at a specified level of the
resource hierarchy: organization, folder, or project. If a custom module is
inherited from a parent organization or folder, the value of the
enablement_state
property in EffectiveEventThreatDetectionCustomModule is
set to the value that is effective in the parent, instead of INHERITED
.
For example, if the module is enabled in a parent organization or folder, the
effective enablement_state
for the module in all child folders or projects
is also enabled
. EffectiveEventThreatDetectionCustomModule is read-only.
An EffectiveSecurityHealthAnalyticsCustomModule is the representation of
a Security Health Analytics custom module at a specified level of the
resource hierarchy: organization, folder, or project. If a custom module is
inherited from a parent organization or folder, the value of the
enablementState
property in EffectiveSecurityHealthAnalyticsCustomModule is
set to the value that is effective in the parent, instead of INHERITED
.
For example, if the module is enabled in a parent organization or folder, the
effective enablement_state for the module in all child folders or projects is
also enabled
. EffectiveSecurityHealthAnalyticsCustomModule is read-only.
A name-value pair representing an environment variable used in an operating
system process.
Represents an instance of an Event Threat Detection custom module,
including its full module name, display name, enablement state, and last
updated time. You can create a custom module at the organization, folder, or
project level. Custom modules that you create at the organization or folder
level are inherited by child folders and projects.
Resource where data was exfiltrated from or exfiltrated to.
Exfiltration represents a data exfiltration attempt from one or more sources
to one or more targets. The sources
attribute lists the sources of the
exfiltrated data. The targets
attribute lists the destinations the data was
copied to.
Representation of third party SIEM/SOAR fields within SCC.
File information about the related binary/library used by an executable, or
the script used by a script interpreter
Security Command Center finding.
Message that contains the resource name and display name of a folder
resource.
Represents a geographical location for a given access.
Request message for retrieving a BigQuery export.
Request to get an EffectiveEventThreatDetectionCustomModule.
Request message for getting effective Security Health Analytics custom
modules.
Request to get an Event Threat Detection custom module.
Request message for retrieving a mute config.
Request message for getting a notification config.
Request message for getting organization settings.
Request message to get resource value config
Request message for getting Security Health Analytics custom modules.
Request message for getting simulation.
Simulation name can include “latest” to retrieve the latest simulation
For example, “organizations/123/simulations/latest”
Request message for getting a source.
Request message for getting a valued resource.
Request message for grouping by assets.
Response message for grouping by assets.
Request message for grouping by findings.
Response message for group by findings.
Contains details about groups of which this finding is a member. A group is a
collection of findings that are related in some way.
Result containing the properties and count of a groupBy request.
Represents a particular IAM binding, which captures a member’s role addition,
removal, or state.
Represents what’s commonly known as an
indicator of compromise (IoC) in
computer forensics. This is an artifact observed on a network or in an
operating system that, with high confidence, indicates a computer intrusion.
For more information, see
Indicator of
compromise.
Kernel mode rootkit signatures.
Kubernetes-related attributes.
Represents a generic name-value label. A label has separate name and value
fields to support filtering with the
contains()
function. For more
information, see
Filtering on array-type
fields.
Request message for listing assets.
Response message for listing assets.
Request message for listing the attack paths for a given simulation or valued
resource.
Response message for listing the attack paths for a given simulation or
valued resource.
Request message for listing BigQuery exports at a given scope e.g.
organization, folder or project.
Response message for listing BigQuery exports.
Request to list current and descendant resident Event Threat Detection custom
modules.
Response for listing current and descendant resident
Event Threat Detection custom modules.
Request message for listing descendant Security Health Analytics custom
modules.
Response message for listing descendant Security Health Analytics custom
modules.
Request to list effective Event Threat Detection custom modules.
Response for listing EffectiveEventThreatDetectionCustomModules.
Request message for listing effective Security Health Analytics custom
modules.
Response message for listing effective Security Health Analytics custom
modules.
Request to list Event Threat Detection custom modules.
Response for listing Event Threat Detection custom modules.
Request message for listing findings.
Response message for listing findings.
Request message for listing mute configs at a given scope e.g. organization,
folder or project.
Response message for listing mute configs.
Request message for listing notification configs.
Response message for listing notification configs.
Request message to list resource value configs of a parent
Response message to list resource value configs
Request message for listing Security Health Analytics custom modules.
Response message for listing Security Health Analytics custom modules.
Request message for listing sources.
Response message for listing sources.
Request message for listing the valued resources for a given simulation.
Response message for listing the valued resources for a given simulation.
Contains information related to the load balancer associated with the
finding.
An individual entry in a log.
A mute config is a Cloud SCC resource that contains the configuration
to mute create/update events of findings.
Cloud Security Command Center (Cloud SCC) notification configs.
Cloud SCC’s Notification
Contains information about the org policies associated with the finding.
User specified settings that are attached to the Security Command
Center organization.
Package is a generic definition of a package.
A position in the uploaded text version of a module.
Represents an operating system process.
Additional Links
Information about the requests relevant to the finding.
Information related to the Google Cloud resource.
Represents the path of resources leading up to the resource this finding is
about.
A resource value configuration (RVC) is a mapping configuration of user’s
resources to resource values. Used in Attack path simulations.
Metadata about a ResourceValueConfig. For example, id and name.
Request message for running asset discovery for an organization.
Response of asset discovery run
SecurityBulletin are notifications of vulnerabilities of Google products.
Represents an instance of a Security Health Analytics custom module,
including its full module name, display name, enablement state, and last
updated time. You can create a custom module at the organization, folder, or
project level. Custom modules that you create at the organization or folder
level are inherited by the child folders and projects.
User specified security marks that are attached to the parent Security
Command Center resource. Security marks are scoped within a Security Command
Center organization – they can be modified and viewed by all users who have
proper permissions on the organization.
Represents a posture that is deployed on Google Cloud by the
Security Command Center Posture Management service.
A posture contains one or more policy sets. A policy set is a
group of policies that enforce a set of security rules on Google
Cloud.
Identity delegation history of an authenticated service account.
Request message for updating a finding’s state.
Request message for updating a finding’s mute status.
Request message to simulate a CustomConfig against a given test resource.
Maximum size of the request is 4 MB by default.
Response message for simulating a SecurityHealthAnalyticsCustomModule
against a given resource.
Attack path simulation
Security Command Center finding source. A finding source
is an entity or a mechanism that can produce a finding. A source is like a
container of findings that come from the same scanner, logger, monitor, and
other tools.
Contains details about a group of security issues that, when the issues
occur together, represent a greater risk than when the issues occur
independently. A group of such issues is referred to as a toxic combination.
Request message for updating a BigQuery export.
Request to update an Event Threat Detection custom module.
Request message for updating a ExternalSystem resource.
Request message for updating or creating a finding.
Request message for updating a mute config.
Request message for updating a notification config.
Request message for updating an organization’s settings.
Request message to update resource value config
Request message for updating Security Health Analytics custom modules.
Request message for updating a SecurityMarks resource.
Request message for updating a source.
Request to validate an Event Threat Detection custom module.
Response to validating an Event Threat Detection custom module.
A resource that is determined to have value to a user’s system
Refers to common vulnerability fields e.g. cve, cvss, cwe etc.