Nested message and enum types in AttackExposure
.
Nested message and enum types in AttackPath
.
Nested message and enum types in AwsMetadata
.
Nested message and enum types in AzureMetadata
.
Nested message and enum types in BulkMuteFindingsRequest
.
Nested message and enum types in CloudDlpDataProfile
.
Nested message and enum types in Connection
.
Nested message and enum types in Cve
.
Nested message and enum types in Cvssv3
.
Nested message and enum types in ExternalSystem
.
Nested message and enum types in File
.
Nested message and enum types in Finding
.
Nested message and enum types in GroupMembership
.
Nested message and enum types in IamBinding
.
Nested message and enum types in Indicator
.
Nested message and enum types in Kubernetes
.
Nested message and enum types in ListFindingsResponse
.
Nested message and enum types in LogEntry
.
Nested message and enum types in MitreAttack
.
Nested message and enum types in MuteConfig
.
Nested message and enum types in NotificationConfig
.
Nested message and enum types in NotificationMessage
.
Nested message and enum types in Resource
.
Nested message and enum types in ResourcePath
.
Nested message and enum types in ResourceValueConfig
.
Generated client implementations.
Nested message and enum types in SecurityPosture
.
Nested message and enum types in ValuedResource
.
Represents an access event.
Represents an application associated with a finding.
Information about DDoS attack volume and classification.
An attack exposure contains the results of an attack path simulation run.
A path that an attacker could take to reach an exposed resource.
AWS metadata associated with the resource, only applicable if the finding’s
cloud provider is Amazon Web Services.
Azure metadata associated with the resource, only applicable if the finding’s
cloud provider is Microsoft Azure.
Information related to Google Cloud Backup and DR Service findings.
Request message to create multiple resource value configs
Response message for BatchCreateResourceValueConfigs
Configures how to deliver Findings to BigQuery Instance.
Request message for bulk findings update.
The response to a BulkMute request. Contains the LRO information.
Fields related to Google Cloud Armor findings.
Details about the Cloud Data Loss Prevention (Cloud DLP)
inspection
job that produced
the finding.
Contains compliance information about a security standard indicating unmet
recommendations.
Contains information about the IP connection associated with the finding.
The email address of a contact.
Details about specific contacts
Container associated with the finding.
Request message for creating a BigQuery export.
Request message for creating a finding.
Request message for creating a mute config.
Request message for creating a notification config.
Request message to create single resource value config
Request message for creating a source.
CVE stands for Common Vulnerabilities and Exposures.
Information from the
CVE
record that describes this
vulnerability.
Common Vulnerability Scoring System version 3.
Represents database access information, such as queries. A database may be a
sub-resource of an instance (as in the case of Cloud SQL instances or Cloud
Spanner instances), or the database instance itself. Some database resources
might not have the
full resource
name populated because these
resource types, such as Cloud SQL databases, are not yet supported by Cloud
Asset Inventory. In these cases only the display name is provided.
Request message for deleting a BigQuery export.
Request message for deleting a mute config. If no location is specified,
default is global.
Request message for deleting a notification config.
Request message to delete resource value config
A name-value pair representing an environment variable used in an operating
system process.
Resource where data was exfiltrated from or exfiltrated to.
Exfiltration represents a data exfiltration attempt from one or more sources
to one or more targets. The sources
attribute lists the sources of the
exfiltrated data. The targets
attribute lists the destinations the data was
copied to.
Representation of third party SIEM/SOAR fields within SCC.
File information about the related binary/library used by an executable, or
the script used by a script interpreter
Security Command Center finding.
Message that contains the resource name and display name of a folder
resource.
GCP metadata associated with the resource, only applicable if the finding’s
cloud provider is Google Cloud Platform.
Represents a geographical location for a given access.
Request message for retrieving a BigQuery export.
Request message for retrieving a mute config. If no location is specified,
default is global.
Request message for getting a notification config.
Request message to get resource value config
Request message for getting simulation.
Simulation name can include “latest” to retrieve the latest simulation
For example, “organizations/123/simulations/latest”
Request message for getting a source.
Request message for getting a valued resource.
Request message for grouping by findings.
Response message for group by findings.
Contains details about groups of which this finding is a member. A group is a
collection of findings that are related in some way.
Result containing the properties and count of a groupBy request.
Represents a particular IAM binding, which captures a member’s role addition,
removal, or state.
Represents what’s commonly known as an
indicator of compromise (IoC) in
computer forensics. This is an artifact observed on a network or in an
operating system that, with high confidence, indicates a computer intrusion.
For more information, see
Indicator of
compromise.
Kernel mode rootkit signatures.
Kubernetes-related attributes.
Represents a generic name-value label. A label has separate name and value
fields to support filtering with the
contains()
function. For more
information, see
Filtering on array-type
fields.
Request message for listing the attack paths for a given simulation or valued
resource.
Response message for listing the attack paths for a given simulation or
valued resource.
Request message for listing BigQuery exports at a given scope e.g.
organization, folder or project.
Response message for listing BigQuery exports.
Request message for listing findings.
Response message for listing findings.
Request message for listing mute configs at a given scope e.g. organization,
folder or project. If no location is specified, default is
global.
Response message for listing mute configs.
Request message for listing notification configs.
Response message for listing notification configs.
Request message to list resource value configs of a parent
Response message to list resource value configs
Request message for listing sources.
Response message for listing sources.
Request message for listing the valued resources for a given simulation.
Response message for listing the valued resources for a given simulation.
Contains information related to the load balancer associated with the
finding.
An individual entry in a log.
A mute config is a Cloud SCC resource that contains the configuration
to mute create/update events of findings.
Cloud Security Command Center (Cloud SCC) notification configs.
Cloud SCC’s Notification
Contains information about the org policies associated with the finding.
Package is a generic definition of a package.
Represents an operating system process.
Additional Links
Information about the requests relevant to the finding.
Information related to the Google Cloud resource.
Represents the path of resources leading up to the resource this finding is
about.
A resource value configuration (RVC) is a mapping configuration of user’s
resources to resource values. Used in Attack path simulations.
Metadata about a ResourceValueConfig. For example, id and name.
SecurityBulletin are notifications of vulnerabilities of Google products.
User specified security marks that are attached to the parent Security
Command Center resource. Security marks are scoped within a Security Command
Center organization – they can be modified and viewed by all users who have
proper permissions on the organization.
Represents a posture that is deployed on Google Cloud by the
Security Command Center Posture Management service.
A posture contains one or more policy sets. A policy set is a
group of policies that enforce a set of security rules on Google
Cloud.
Identity delegation history of an authenticated service account.
Request message for updating a finding’s state.
Request message for updating a finding’s mute status.
Attack path simulation
Security Command Center finding source. A finding source
is an entity or a mechanism that can produce a finding. A source is like a
container of findings that come from the same scanner, logger, monitor, and
other tools.
Contains details about a group of security issues that, when the issues
occur together, represent a greater risk than when the issues occur
independently. A group of such issues is referred to as a toxic
combination.
Request message for updating a BigQuery export.
Request message for updating a ExternalSystem resource.
Request message for updating or creating a finding.
Request message for updating a mute config.
Request message for updating a notification config.
Request message to update resource value config
Request message for updating a SecurityMarks resource.
Request message for updating a source.
A resource that is determined to have value to a user’s system
Refers to common vulnerability fields e.g. cve, cvss, cwe etc.