|
| 1 | +{ |
| 2 | + "parameters": { |
| 3 | + "api-version": "2023-05-01-preview", |
| 4 | + "resourceId": "subscriptions/a1efb6ca-fbc5-4782-9aaa-5c7daded1ce2/resourcegroups/E2E-IBB0WX/providers/Microsoft.Security/securityconnectors/AwsConnectorAllOfferings", |
| 5 | + "healthReportName": "909c629a-bf39-4521-8e4f-10b443a0bc02" |
| 6 | + }, |
| 7 | + "responses": { |
| 8 | + "200": { |
| 9 | + "body": { |
| 10 | + "id": "/subscriptions/a1efb6ca-fbc5-4782-9aaa-5c7daded1ce2/resourcegroups/E2E-IBB0WX/providers/Microsoft.Security/securityconnectors/AwsConnectorAllOfferings/providers/Microsoft.Security/healthReports/909c629a-bf39-4521-8e4f-10b443a0bc02", |
| 11 | + "name": "909c629a-bf39-4521-8e4f-10b443a0bc02", |
| 12 | + "type": "Microsoft.Security/healthReports", |
| 13 | + "properties": { |
| 14 | + "resourceDetails": { |
| 15 | + "source": "Aws", |
| 16 | + "id": "/subscriptions/a1efb6ca-fbc5-4782-9aaa-5c7daded1ce2/resourcegroups/E2E-IBB0WX/providers/Microsoft.Security/securityconnectors/AwsConnectorAllOfferings", |
| 17 | + "connectorId": "bb7ad9cc-26b6-48ec-a5b4-23fc23be2733" |
| 18 | + }, |
| 19 | + "environmentDetails": { |
| 20 | + "nativeResourceId": "arn:aws:iam::827098768879", |
| 21 | + "environmentHierarchyId": "a1efb6ca-fbc5-4782-9aaa-5c7daded1ce2", |
| 22 | + "organizationalHierarchyId": "e81b978c-11be-449f-a392-42c0ed96bb91", |
| 23 | + "subscriptionId": "a1efb6ca-fbc5-4782-9aaa-5c7daded1ce2", |
| 24 | + "tenantId": "a1efb6ca-fbc5-4782-9aaa-5c7daded1ce2" |
| 25 | + }, |
| 26 | + "healthDataClassification": { |
| 27 | + "component": "Connectivity", |
| 28 | + "scope": "Connectors" |
| 29 | + }, |
| 30 | + "status": { |
| 31 | + "code": "NotHealthy", |
| 32 | + "statusChangeDate": "2023-01-12T09:07:18.6759138Z", |
| 33 | + "firstEvaluationDate": "2023-01-12T09:07:18.6759138Z", |
| 34 | + "lastScannedDate": "2023-04-25T09:02:20.1349133Z" |
| 35 | + }, |
| 36 | + "affectedDefendersPlans": [], |
| 37 | + "issues": [ |
| 38 | + { |
| 39 | + "issueKey": "414af15d-207e-4c63-b8eb-624d1b652e45", |
| 40 | + "issueName": "AWS CloudFormation StackSet name invalid or does not exist", |
| 41 | + "securityValues": [ |
| 42 | + "Connectivity to AWS member accounts" |
| 43 | + ], |
| 44 | + "issueDescription": "A problem was identified with the AWS CloudFormation StackSet. The StackSet is used to create stacks across multiple accounts. To grant Defender for Cloud access to your member accounts, there is a need to run the StackSet on the member accounts.", |
| 45 | + "remediationSteps": "Validate that the StackSet name in AWS matches the name provided in the onboarding set up: StackSet name can be found in AWS Management Console -> CloudFormation -> StackSets -> StackSet name In case the names do not match, update the StackSet name to match the StackSet name provided in the onboarding set up. In case the StackSet does not exist, re-run the CloudFormation template only for StackSet. Navigate to CloudFormation 'StackSets' in AWS Management Console -> Click 'Create StackSet' -> Choose 'Upload a template file', `Choose file` and select the downloaded template. Make sure to enter the exact StackSet name as it was provided in the onboarding set up. Download template link ", |
| 46 | + "remediationScript": "", |
| 47 | + "issueAdditionalData": { |
| 48 | + "StacksetName": "ProdStackSet" |
| 49 | + } |
| 50 | + } |
| 51 | + ] |
| 52 | + } |
| 53 | + } |
| 54 | + } |
| 55 | + } |
| 56 | +} |
0 commit comments