package google.cloud.securitycenter.v1

Mouse Melon logoGet desktop application:
View/edit binary Protocol Buffers messages

service SecurityCenter

securitycenter_service.proto:81

V1 APIs for Security Center service.

message Access

access.proto:28

Represents an access event.

Used in: Finding, sensitiveaction.logging.v1.SensitiveAction

message AdaptiveProtection

cloud_armor.proto:95

Information about [Google Cloud Armor Adaptive Protection](https://cloud.google.com/armor/docs/cloud-armor-overview#google-cloud-armor-adaptive-protection).

Used in: CloudArmor

message Application

application.proto:28

Represents an application associated with a finding.

Used in: Finding

message Asset

asset.proto:39

Security Command Center representation of a Google Cloud resource. The Asset is a Security Command Center resource that captures information about a single Google Cloud resource. All modifications to an Asset are only within the context of Security Command Center and don't affect the referenced Google Cloud resource.

Used in: ListAssetsResponse.ListAssetsResult

message Asset.IamPolicy

asset.proto:93

Cloud IAM Policy information associated with the Google Cloud resource described by the Security Command Center asset. This information is managed and defined by the Google Cloud resource and cannot be modified by the user.

Used in: Asset

message Asset.SecurityCenterProperties

asset.proto:51

Security Command Center managed properties. These properties are managed by Security Command Center and cannot be modified by the user.

Used in: Asset

message Attack

cloud_armor.proto:105

Information about DDoS attack volume and classification.

Used in: CloudArmor

message AttackExposure

attack_exposure.proto:30

An attack exposure contains the results of an attack path simulation run.

Used in: Finding

enum AttackExposure.State

attack_exposure.proto:32

This enum defines the various states an AttackExposure can be in.

Used in: AttackExposure

message AttackPath

attack_path.proto:30

A path that an attacker could take to reach an exposed resource.

Used in: ListAttackPathsResponse

message AttackPath.AttackPathEdge

attack_path.proto:114

Represents a connection between a source node and a destination node in this attack path.

Used in: AttackPath

message AttackPath.AttackPathNode

attack_path.proto:39

Represents one point that an attacker passes through in this attack path.

Used in: AttackPath

message AttackPath.AttackPathNode.AttackStepNode

attack_path.proto:72

Detailed steps the attack can take between path nodes.

Used in: AttackPathNode

enum AttackPath.AttackPathNode.NodeType

attack_path.proto:54

The type of the incoming attack step node.

Used in: AttackStepNode

message AttackPath.AttackPathNode.PathNodeAssociatedFinding

attack_path.proto:41

A finding that is associated with this node in the attack path.

Used in: AttackPathNode

message AwsMetadata

resource.proto:115

AWS metadata associated with the resource, only applicable if the finding's cloud provider is Amazon Web Services.

Used in: ListFindingsResponse.ListFindingsResult.Resource, Resource

message AwsMetadata.AwsAccount

resource.proto:142

An AWS account that is a member of an organization.

Used in: AwsMetadata

message AwsMetadata.AwsOrganization

resource.proto:119

An organization is a collection of accounts that are centrally managed together using consolidated billing, organized hierarchically with organizational units (OUs), and controlled with policies.

Used in: AwsMetadata

message AwsMetadata.AwsOrganizationalUnit

resource.proto:129

An Organizational Unit (OU) is a container of AWS accounts within a root of an organization. Policies that are attached to an OU apply to all accounts contained in that OU and in any child OUs.

Used in: AwsMetadata

message AzureMetadata

resource.proto:163

Azure metadata associated with the resource, only applicable if the finding's cloud provider is Microsoft Azure.

Used in: ListFindingsResponse.ListFindingsResult.Resource, Resource

message AzureMetadata.AzureManagementGroup

resource.proto:165

Represents an Azure management group.

Used in: AzureMetadata

message AzureMetadata.AzureResourceGroup

resource.proto:185

Represents an Azure resource group.

Used in: AzureMetadata

message AzureMetadata.AzureSubscription

resource.proto:175

Represents an Azure subscription.

Used in: AzureMetadata

message BackupDisasterRecovery

backup_disaster_recovery.proto:30

Information related to Google Cloud Backup and DR Service findings.

Used in: Finding

message BigQueryExport

bigquery_export.proto:32

Configures how to deliver Findings to BigQuery Instance.

Used as response type in: SecurityCenter.CreateBigQueryExport, SecurityCenter.GetBigQueryExport, SecurityCenter.UpdateBigQueryExport

Used as field type in: CreateBigQueryExportRequest, ListBigQueryExportsResponse, UpdateBigQueryExportRequest

enum BulkMuteFindingsRequest.MuteState

securitycenter_service.proto:1096

The mute state.

Used in: BulkMuteFindingsRequest

message BulkMuteFindingsResponse

securitycenter_service.proto:1148

The response to a BulkMute request. Contains the LRO information.

(message has no fields)

message CloudArmor

cloud_armor.proto:30

Fields related to Google Cloud Armor findings.

Used in: Finding

message CloudDlpDataProfile

cloud_dlp_data_profile.proto:36

The [data profile](https://cloud.google.com/dlp/docs/data-profiles) associated with the finding.

Used in: Finding

enum CloudDlpDataProfile.ParentType

cloud_dlp_data_profile.proto:38

Parents for configurations that produce data profile findings.

Used in: CloudDlpDataProfile

message CloudDlpInspection

cloud_dlp_inspection.proto:37

Details about the Cloud Data Loss Prevention (Cloud DLP) [inspection job](https://cloud.google.com/dlp/docs/concepts-job-triggers) that produced the finding.

Used in: Finding

message CloudLoggingEntry

log_entry.proto:39

Metadata taken from a [Cloud Logging LogEntry](https://cloud.google.com/logging/docs/reference/v2/rest/v2/LogEntry)

Used in: LogEntry

enum CloudProvider

resource.proto:99

Enumeration representing the various cloud providers a finding's resource could reside in.

Used in: ListFindingsResponse.ListFindingsResult.Resource, Resource, ResourceValueConfig, Simulation

message Compliance

compliance.proto:29

Contains compliance information about a security standard indicating unmet recommendations.

Used in: Finding

message Connection

connection.proto:28

Contains information about the IP connection associated with the finding.

Used in: Finding

enum Connection.Protocol

connection.proto:30

IANA Internet Protocol Number such as TCP(6) and UDP(17).

Used in: Connection

message Contact

contact_details.proto:34

The email address of a contact.

Used in: ContactDetails

message ContactDetails

contact_details.proto:28

Details about specific contacts

Used in: Finding

message Container

container.proto:31

Container associated with the finding.

Used in: Finding, Kubernetes.Object, Kubernetes.Pod

message CreateResourceValueConfigRequest

securitycenter_service.proto:1194

Request message to create single resource value config

Used in: BatchCreateResourceValueConfigsRequest

message CustomConfig

security_health_analytics_custom_config.proto:32

Defines the properties in a custom module configuration for Security Health Analytics. Use the custom module configuration to create custom detectors that generate custom findings for resources that you specify.

Used in: EffectiveSecurityHealthAnalyticsCustomModule, SecurityHealthAnalyticsCustomModule, SimulateSecurityHealthAnalyticsCustomModuleRequest

message CustomConfig.CustomOutputSpec

security_health_analytics_custom_config.proto:37

A set of optional name-value pairs that define custom source properties to return with each finding that is generated by the custom module. The custom source properties that are defined here are included in the finding JSON under `sourceProperties`.

Used in: CustomConfig

message CustomConfig.CustomOutputSpec.Property

security_health_analytics_custom_config.proto:39

An individual name-value pair that defines a custom source property.

Used in: CustomOutputSpec

message CustomConfig.ResourceSelector

security_health_analytics_custom_config.proto:54

Resource for selecting resource type.

Used in: CustomConfig

enum CustomConfig.Severity

security_health_analytics_custom_config.proto:60

Defines the valid value options for the severity of a finding.

Used in: CustomConfig

message CustomModuleValidationError

event_threat_detection_custom_module_validation_errors.proto:35

An error encountered while validating the uploaded configuration of an Event Threat Detection Custom Module.

Used in: CustomModuleValidationErrors

message CustomModuleValidationErrors

event_threat_detection_custom_module_validation_errors.proto:29

A list of zero or more errors encountered while validating the uploaded configuration of an Event Threat Detection Custom Module.

Used in: ValidateEventThreatDetectionCustomModuleResponse

message Cve

vulnerability.proto:49

CVE stands for Common Vulnerabilities and Exposures. Information from the [CVE record](https://www.cve.org/ResourcesSupport/Glossary) that describes this vulnerability.

Used in: Vulnerability

enum Cve.ExploitationActivity

vulnerability.proto:75

The possible values of exploitation activity of the vulnerability in the wild.

Used in: Cve

enum Cve.RiskRating

vulnerability.proto:52

The possible values of impact of the vulnerability if it was to be exploited.

Used in: Cve

message Cvssv3

vulnerability.proto:138

Common Vulnerability Scoring System version 3.

Used in: Cve

enum Cvssv3.AttackComplexity

vulnerability.proto:165

This metric describes the conditions beyond the attacker's control that must exist in order to exploit the vulnerability.

Used in: Cvssv3

enum Cvssv3.AttackVector

vulnerability.proto:141

This metric reflects the context by which vulnerability exploitation is possible.

Used in: Cvssv3

enum Cvssv3.Impact

vulnerability.proto:238

The Impact metrics capture the effects of a successfully exploited vulnerability on the component that suffers the worst outcome that is most directly and predictably associated with the attack.

Used in: Cvssv3

enum Cvssv3.PrivilegesRequired

vulnerability.proto:184

This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability.

Used in: Cvssv3

enum Cvssv3.Scope

vulnerability.proto:222

The Scope metric captures whether a vulnerability in one vulnerable component impacts resources in components beyond its security scope.

Used in: Cvssv3

enum Cvssv3.UserInteraction

vulnerability.proto:208

This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component.

Used in: Cvssv3

message Database

database.proto:34

Represents database access information, such as queries. A database may be a sub-resource of an instance (as in the case of Cloud SQL instances or Cloud Spanner instances), or the database instance itself. Some database resources might not have the [full resource name](https://google.aip.dev/122#full-resource-names) populated because these resource types, such as Cloud SQL databases, are not yet supported by Cloud Asset Inventory. In these cases only the display name is provided.

Used in: Finding

message EffectiveEventThreatDetectionCustomModule

effective_event_threat_detection_custom_module.proto:40

An EffectiveEventThreatDetectionCustomModule is the representation of an Event Threat Detection custom module at a specified level of the resource hierarchy: organization, folder, or project. If a custom module is inherited from a parent organization or folder, the value of the `enablement_state` property in EffectiveEventThreatDetectionCustomModule is set to the value that is effective in the parent, instead of `INHERITED`. For example, if the module is enabled in a parent organization or folder, the effective `enablement_state` for the module in all child folders or projects is also `enabled`. EffectiveEventThreatDetectionCustomModule is read-only.

Used as response type in: SecurityCenter.GetEffectiveEventThreatDetectionCustomModule

Used as field type in: ListEffectiveEventThreatDetectionCustomModulesResponse

enum EffectiveEventThreatDetectionCustomModule.EnablementState

effective_event_threat_detection_custom_module.proto:49

The enablement state of the module.

Used in: EffectiveEventThreatDetectionCustomModule

message EffectiveSecurityHealthAnalyticsCustomModule

effective_security_health_analytics_custom_module.proto:40

An EffectiveSecurityHealthAnalyticsCustomModule is the representation of a Security Health Analytics custom module at a specified level of the resource hierarchy: organization, folder, or project. If a custom module is inherited from a parent organization or folder, the value of the `enablementState` property in EffectiveSecurityHealthAnalyticsCustomModule is set to the value that is effective in the parent, instead of `INHERITED`. For example, if the module is enabled in a parent organization or folder, the effective enablement_state for the module in all child folders or projects is also `enabled`. EffectiveSecurityHealthAnalyticsCustomModule is read-only.

Used as response type in: SecurityCenter.GetEffectiveSecurityHealthAnalyticsCustomModule

Used as field type in: ListEffectiveSecurityHealthAnalyticsCustomModulesResponse

enum EffectiveSecurityHealthAnalyticsCustomModule.EnablementState

effective_security_health_analytics_custom_module.proto:49

The enablement state of the module.

Used in: EffectiveSecurityHealthAnalyticsCustomModule

message EnvironmentVariable

process.proto:68

A name-value pair representing an environment variable used in an operating system process.

Used in: Process

message EventThreatDetectionCustomModule

event_threat_detection_custom_module.proto:37

Represents an instance of an Event Threat Detection custom module, including its full module name, display name, enablement state, and last updated time. You can create a custom module at the organization, folder, or project level. Custom modules that you create at the organization or folder level are inherited by child folders and projects.

Used as response type in: SecurityCenter.CreateEventThreatDetectionCustomModule, SecurityCenter.GetEventThreatDetectionCustomModule, SecurityCenter.UpdateEventThreatDetectionCustomModule

Used as field type in: CreateEventThreatDetectionCustomModuleRequest, ListDescendantEventThreatDetectionCustomModulesResponse, ListEventThreatDetectionCustomModulesResponse, UpdateEventThreatDetectionCustomModuleRequest

enum EventThreatDetectionCustomModule.EnablementState

event_threat_detection_custom_module.proto:46

The enablement state of the module.

Used in: EventThreatDetectionCustomModule

message ExfilResource

exfiltration.proto:46

Resource where data was exfiltrated from or exfiltrated to.

Used in: Exfiltration

message Exfiltration

exfiltration.proto:31

Exfiltration represents a data exfiltration attempt from one or more sources to one or more targets. The `sources` attribute lists the sources of the exfiltrated data. The `targets` attribute lists the destinations the data was copied to.

Used in: Finding

message ExternalSystem

external_system.proto:31

Representation of third party SIEM/SOAR fields within SCC.

Used as response type in: SecurityCenter.UpdateExternalSystem

Used as field type in: Finding, UpdateExternalSystemRequest

message ExternalSystem.TicketInfo

external_system.proto:43

Information about the ticket, if any, that is being used to track the resolution of the issue that is identified by this finding.

Used in: ExternalSystem

message File

file.proto:29

File information about the related binary/library used by an executable, or the script used by a script interpreter

Used in: Finding, Process

message File.DiskPath

file.proto:31

Path of the file in terms of underlying disk/partition identifiers.

Used in: File

message Finding

finding.proto:68

Security Command Center finding. A finding is a record of assessment data like security, risk, health, or privacy, that is ingested into Security Command Center for presentation, notification, analysis, policy testing, and enforcement. For example, a cross-site scripting (XSS) vulnerability in an App Engine application is a finding.

Used as response type in: SecurityCenter.CreateFinding, SecurityCenter.SetFindingState, SecurityCenter.SetMute, SecurityCenter.UpdateFinding

Used as field type in: CreateFindingRequest, ListFindingsResponse.ListFindingsResult, NotificationMessage, SimulateSecurityHealthAnalyticsCustomModuleResponse.SimulatedResult, UpdateFindingRequest

enum Finding.FindingClass

finding.proto:167

Represents what kind of Finding it is.

Used in: Finding

enum Finding.Mute

finding.proto:152

Mute state a finding can be in.

Used in: Finding, MuteInfo.StaticMute, SetMuteRequest

message Finding.MuteInfo

finding.proto:201

Mute information about the finding, including whether the finding has a static mute or any matching dynamic mute rules.

Used in: Finding

message Finding.MuteInfo.DynamicMuteRecord

finding.proto:215

The record of a dynamic mute rule that matches the finding.

Used in: MuteInfo

message Finding.MuteInfo.StaticMute

finding.proto:205

Information about the static mute state. A static mute state overrides any dynamic mute rules that apply to this finding. The static mute state can be set by a static mute rule or by muting the finding directly.

Used in: MuteInfo

enum Finding.Severity

finding.proto:92

The severity of the finding.

Used in: Finding

enum Finding.State

finding.proto:79

The state of the finding.

Used in: Finding, SetFindingStateRequest

message Folder

folder.proto:29

Message that contains the resource name and display name of a folder resource.

Used in: Asset.SecurityCenterProperties, ListFindingsResponse.ListFindingsResult.Resource, Resource

message Geolocation

access.proto:108

Represents a geographical location for a given access.

Used in: Access

message GroupMembership

group_membership.proto:29

Contains details about groups of which this finding is a member. A group is a collection of findings that are related in some way.

Used in: Finding

enum GroupMembership.GroupType

group_membership.proto:31

Possible types of groups.

Used in: GroupMembership

message GroupResult

securitycenter_service.proto:1825

Result containing the properties and count of a groupBy request.

Used in: GroupAssetsResponse, GroupFindingsResponse

message IamBinding

iam_binding.proto:29

Represents a particular IAM binding, which captures a member's role addition, removal, or state.

Used in: Finding

enum IamBinding.Action

iam_binding.proto:31

The type of action performed on a Binding in a policy.

Used in: IamBinding

message Indicator

indicator.proto:32

Represents what's commonly known as an _indicator of compromise_ (IoC) in computer forensics. This is an artifact observed on a network or in an operating system that, with high confidence, indicates a computer intrusion. For more information, see [Indicator of compromise](https://en.wikipedia.org/wiki/Indicator_of_compromise).

Used in: Finding

message Indicator.ProcessSignature

indicator.proto:34

Indicates what signature matched this process.

Used in: Indicator

message Indicator.ProcessSignature.MemoryHashSignature

indicator.proto:36

A signature corresponding to memory page hashes.

Used in: ProcessSignature

message Indicator.ProcessSignature.MemoryHashSignature.Detection

indicator.proto:38

Memory hash detection contributing to the binary family match.

Used in: MemoryHashSignature

enum Indicator.ProcessSignature.SignatureType

indicator.proto:63

Possible resource types to be associated with a signature.

Used in: ProcessSignature

message Indicator.ProcessSignature.YaraRuleSignature

indicator.proto:57

A signature corresponding to a YARA rule.

Used in: ProcessSignature

message KernelRootkit

kernel_rootkit.proto:28

Kernel mode rootkit signatures.

Used in: Finding

message Kubernetes

kubernetes.proto:31

Kubernetes-related attributes.

Used in: Finding

message Kubernetes.AccessReview

kubernetes.proto:135

Conveys information about a Kubernetes access review (such as one returned by a [`kubectl auth can-i`](https://kubernetes.io/docs/reference/access-authn-authz/authorization/#checking-api-access) command) that was involved in a finding.

Used in: Kubernetes

message Kubernetes.Binding

kubernetes.proto:89

Represents a Kubernetes RoleBinding or ClusterRoleBinding.

Used in: Kubernetes

message Kubernetes.Node

kubernetes.proto:49

Kubernetes nodes associated with the finding.

Used in: Kubernetes, NodePool

message Kubernetes.NodePool

kubernetes.proto:56

Provides GKE node pool information.

Used in: Kubernetes

message Kubernetes.Object

kubernetes.proto:164

Kubernetes object related to the finding, uniquely identified by GKNN. Used if the object Kind is not one of Pod, Node, NodePool, Binding, or AccessReview.

Used in: Kubernetes

message Kubernetes.Pod

kubernetes.proto:33

A Kubernetes Pod.

Used in: Kubernetes

message Kubernetes.Role

kubernetes.proto:65

Kubernetes Role or ClusterRole.

Used in: Kubernetes, Binding

enum Kubernetes.Role.Kind

kubernetes.proto:67

Types of Kubernetes roles.

Used in: Role

message Kubernetes.Subject

kubernetes.proto:105

Represents a Kubernetes subject.

Used in: Binding

enum Kubernetes.Subject.AuthType

kubernetes.proto:107

Auth types that can be used for the subject's kind field.

Used in: Subject

message Label

label.proto:31

Represents a generic name-value label. A label has separate name and value fields to support filtering with the `contains()` function. For more information, see [Filtering on array-type fields](https://cloud.google.com/security-command-center/docs/how-to-api-list-findings#array-contains-filtering).

Used in: Container, Kubernetes.Pod

message ListAssetsResponse.ListAssetsResult

securitycenter_service.proto:2327

Result containing the Asset and its State.

Used in: ListAssetsResponse

enum ListAssetsResponse.ListAssetsResult.StateChange

securitycenter_service.proto:2334

The change in state of the asset. When querying across two points in time this describes the change between the two points: ADDED, REMOVED, or ACTIVE. If there was no compare_duration supplied in the request the state change will be: UNUSED

Used in: ListAssetsResult

message ListFindingsResponse.ListFindingsResult

securitycenter_service.proto:2523

Result containing the Finding and its StateChange.

Used in: ListFindingsResponse

message ListFindingsResponse.ListFindingsResult.Resource

securitycenter_service.proto:2554

Information related to the Google Cloud resource that is associated with this finding.

Used in: ListFindingsResult

enum ListFindingsResponse.ListFindingsResult.StateChange

securitycenter_service.proto:2532

The change in state of the finding. When querying across two points in time this describes the change in the finding between the two points: CHANGED, UNCHANGED, ADDED, or REMOVED. Findings can not be deleted, so REMOVED implies that the finding at timestamp does not match the filter specified, but it did at timestamp - compare_duration. If there was no compare_duration supplied in the request the state change will be: UNUSED

Used in: ListFindingsResult

message LoadBalancer

load_balancer.proto:29

Contains information related to the load balancer associated with the finding.

Used in: Finding

message LogEntry

log_entry.proto:30

An individual entry in a log.

Used in: Finding

message MitreAttack

mitre_attack.proto:29

MITRE ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org

Used in: Finding

enum MitreAttack.Tactic

mitre_attack.proto:32

MITRE ATT&CK tactics that can be referenced by SCC findings. See: https://attack.mitre.org/tactics/enterprise/

Used in: MitreAttack

enum MitreAttack.Technique

mitre_attack.proto:82

MITRE ATT&CK techniques that can be referenced by SCC findings. See: https://attack.mitre.org/techniques/enterprise/ Next ID: 65

Used in: MitreAttack

message MuteConfig

mute_config.proto:33

A mute config is a Cloud SCC resource that contains the configuration to mute create/update events of findings.

Used as response type in: SecurityCenter.CreateMuteConfig, SecurityCenter.GetMuteConfig, SecurityCenter.UpdateMuteConfig

Used as field type in: CreateMuteConfigRequest, ListMuteConfigsResponse, UpdateMuteConfigRequest

enum MuteConfig.MuteConfigType

mute_config.proto:47

The type of MuteConfig.

Used in: MuteConfig

message Notebook

notebook.proto:32

Represents a Jupyter notebook IPYNB file, such as a [Colab Enterprise notebook](https://cloud.google.com/colab/docs/introduction) file, that is associated with a finding.

Used in: Finding

message NotificationConfig

notification_config.proto:38

Cloud Security Command Center (Cloud SCC) notification configs. A notification config is a Cloud SCC resource that contains the configuration to send notifications for create/update events of findings, assets and etc.

Used as response type in: SecurityCenter.CreateNotificationConfig, SecurityCenter.GetNotificationConfig, SecurityCenter.UpdateNotificationConfig

Used as field type in: CreateNotificationConfigRequest, ListNotificationConfigsResponse, UpdateNotificationConfigRequest

message NotificationConfig.StreamingConfig

notification_config.proto:50

The config for streaming-based notifications, which send each event as soon as it is detected.

Used in: NotificationConfig

message NotificationMessage

notification_message.proto:31

Cloud SCC's Notification

message OrgPolicy

org_policy.proto:30

Contains information about the org policies associated with the finding.

Used in: Finding

message OrganizationSettings

organization_settings.proto:30

User specified settings that are attached to the Security Command Center organization.

Used as response type in: SecurityCenter.GetOrganizationSettings, SecurityCenter.UpdateOrganizationSettings

Used as field type in: UpdateOrganizationSettingsRequest

message OrganizationSettings.AssetDiscoveryConfig

organization_settings.proto:39

The configuration used for Asset Discovery runs.

Used in: OrganizationSettings

enum OrganizationSettings.AssetDiscoveryConfig.InclusionMode

organization_settings.proto:48

The mode of inclusion when running Asset Discovery. Asset discovery can be limited by explicitly identifying projects to be included or excluded. If INCLUDE_ONLY is set, then only those projects within the organization and their children are discovered during asset discovery. If EXCLUDE is set, then projects that don't match those projects are discovered during asset discovery. If neither are set, then all projects within the organization are discovered during asset discovery.

Used in: AssetDiscoveryConfig

message Package

vulnerability.proto:294

Package is a generic definition of a package.

Used in: Vulnerability

message Position

event_threat_detection_custom_module_validation_errors.proto:55

A position in the uploaded text version of a module.

Used in: CustomModuleValidationError

message Process

process.proto:30

Represents an operating system process.

Used in: Finding

message Reference

vulnerability.proto:128

Additional Links

Used in: Cve

message Requests

cloud_armor.proto:77

Information about the requests relevant to the finding.

Used in: CloudArmor

message Resource

resource.proto:31

Information related to the Google Cloud resource.

Used in: NotificationMessage

message ResourcePath

resource.proto:203

Represents the path of resources leading up to the resource this finding is about.

Used in: ListFindingsResponse.ListFindingsResult.Resource, Resource

message ResourcePath.ResourcePathNode

resource.proto:239

A node within the resource path. Each node represents a resource within the resource hierarchy.

Used in: ResourcePath

enum ResourcePath.ResourcePathNodeType

resource.proto:205

The type of resource the node represents.

Used in: ResourcePathNode

enum ResourceValue

resource_value_config.proto:108

Value enum to map to a resource

Used in: ResourceValueConfig, ResourceValueConfig.SensitiveDataProtectionMapping

message ResourceValueConfig

resource_value_config.proto:34

A resource value configuration (RVC) is a mapping configuration of user's resources to resource values. Used in Attack path simulations.

Used as response type in: SecurityCenter.GetResourceValueConfig, SecurityCenter.UpdateResourceValueConfig

Used as field type in: BatchCreateResourceValueConfigsResponse, CreateResourceValueConfigRequest, ListResourceValueConfigsResponse, UpdateResourceValueConfigRequest

message ResourceValueConfig.SensitiveDataProtectionMapping

resource_value_config.proto:45

Resource value mapping for Sensitive Data Protection findings. If any of these mappings have a resource value that is not unspecified, the resource_value field will be ignored when reading this configuration.

Used in: ResourceValueConfig

message ResourceValueConfigMetadata

valued_resource.proto:85

Metadata about a ResourceValueConfig. For example, id and name.

Used in: Simulation, ValuedResource

message RunAssetDiscoveryResponse

run_asset_discovery_response.proto:29

Response of asset discovery run

enum RunAssetDiscoveryResponse.State

run_asset_discovery_response.proto:31

The state of an asset discovery run.

Used in: RunAssetDiscoveryResponse

message SecurityBulletin

vulnerability.proto:309

SecurityBulletin are notifications of vulnerabilities of Google products.

Used in: Vulnerability

message SecurityHealthAnalyticsCustomModule

security_health_analytics_custom_module.proto:43

Represents an instance of a Security Health Analytics custom module, including its full module name, display name, enablement state, and last updated time. You can create a custom module at the organization, folder, or project level. Custom modules that you create at the organization or folder level are inherited by the child folders and projects.

Used as response type in: SecurityCenter.CreateSecurityHealthAnalyticsCustomModule, SecurityCenter.GetSecurityHealthAnalyticsCustomModule, SecurityCenter.UpdateSecurityHealthAnalyticsCustomModule

Used as field type in: CreateSecurityHealthAnalyticsCustomModuleRequest, ListDescendantSecurityHealthAnalyticsCustomModulesResponse, ListSecurityHealthAnalyticsCustomModulesResponse, UpdateSecurityHealthAnalyticsCustomModuleRequest

enum SecurityHealthAnalyticsCustomModule.EnablementState

security_health_analytics_custom_module.proto:52

Possible enablement states of a custom module.

Used in: SecurityHealthAnalyticsCustomModule

message SecurityMarks

security_marks.proto:32

User specified security marks that are attached to the parent Security Command Center resource. Security marks are scoped within a Security Command Center organization -- they can be modified and viewed by all users who have proper permissions on the organization.

Used as response type in: SecurityCenter.UpdateSecurityMarks

Used as field type in: Asset, Finding, UpdateSecurityMarksRequest

message SecurityPolicy

cloud_armor.proto:62

Information about the [Google Cloud Armor security policy](https://cloud.google.com/armor/docs/security-policy-overview) relevant to the finding.

Used in: CloudArmor

message SecurityPosture

security_posture.proto:32

Represents a posture that is deployed on Google Cloud by the Security Command Center Posture Management service. A posture contains one or more policy sets. A policy set is a group of policies that enforce a set of security rules on Google Cloud.

Used in: Finding

message SecurityPosture.PolicyDriftDetails

security_posture.proto:35

The policy field that violates the deployed posture and its expected and detected values.

Used in: SecurityPosture

message ServiceAccountDelegationInfo

access.proto:93

Identity delegation history of an authenticated service account.

Used in: Access

message SimulateSecurityHealthAnalyticsCustomModuleRequest.SimulatedResource

securitycenter_service.proto:2702

Manually constructed resource name. If the custom module evaluates against only the resource data, you can omit the `iam_policy_data` field. If it evaluates only the `iam_policy_data` field, you can omit the resource data.

Used in: SimulateSecurityHealthAnalyticsCustomModuleRequest

message SimulateSecurityHealthAnalyticsCustomModuleResponse.SimulatedResult

securitycenter_service.proto:2735

Possible test result.

Used in: SimulateSecurityHealthAnalyticsCustomModuleResponse

message Source

source.proto:32

Security Command Center finding source. A finding source is an entity or a mechanism that can produce a finding. A source is like a container of findings that come from the same scanner, logger, monitor, and other tools.

Used as response type in: SecurityCenter.CreateSource, SecurityCenter.GetSource, SecurityCenter.UpdateSource

Used as field type in: CreateSourceRequest, ListSourcesResponse, UpdateSourceRequest

message ToxicCombination

toxic_combination.proto:30

Contains details about a group of security issues that, when the issues occur together, represent a greater risk than when the issues occur independently. A group of such issues is referred to as a toxic combination.

Used in: Finding

message ValuedResource

valued_resource.proto:30

A resource that is determined to have value to a user's system

Used as response type in: SecurityCenter.GetValuedResource

Used as field type in: ListValuedResourcesResponse

enum ValuedResource.ResourceValue

valued_resource.proto:39

How valuable the resource is.

Used in: ValuedResource

message Vulnerability

vulnerability.proto:30

Refers to common vulnerability fields e.g. cve, cvss, cwe etc.

Used in: Finding