Skip to content

Commit 71110eb

Browse files
author
CI bot
committed
Definitions Update remediations
2 parents a00f8e2 + e18c5a5 commit 71110eb

File tree

1 file changed

+14
-13
lines changed

1 file changed

+14
-13
lines changed

alsdkdefs/apis/remediations/assets_query.v1.yaml

Lines changed: 14 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -348,9 +348,9 @@ info:
348348
identified with `I` and `R` in the table below.
349349
350350
#### Using CSVs in filters
351-
Some filters allow passing a comma-separated list (CSV) of limiting property values, indicating
351+
All filters allow passing a comma-separated list (CSV) of limiting property values, indicating
352352
that only remediations/exposures that contain **at least one** of the given values will be
353-
returned. This is identified with `C` in the table below.
353+
returned.
354354
355355
#### Using negation in filters
356356
Some filters allow prefixing a value (or a comma-separated list (CSV)) with `!`, indicating
@@ -379,9 +379,9 @@ info:
379379
| `application` | `type` | A, R | `"application:any"`, `"application:Apache"` | |
380380
| `asset_type` | `type` | I | `"asset_type:host"` | Applies to the `"type"` of the vulnerable asset. Only one `asset_type` filter of a single asset type is supported in a request. This filter must be present in the exposures query request to be included in the response. |
381381
| `cloud-trail` | `key` | I | `"cloud-trail:/aws/us-west-2/cloud-trail/trail/Rackspace"` | |
382-
| `category` | `categories` | !, C, R | `"category:security"`| Applies to the `"categories"` property of the related vulnerability. |
383-
| `cve` | `cve` | !, A, C, N, R | `"cve:CVE-2013-1937"` | Applies to the `"cve"` property of the related vulnerability.|
384-
| `cwe` | `cwe` | !, A, C, N, R | `"cwe:CWE-121"` | Applies to the `"cwe"` property of the related vulnerability. |
382+
| `category` | `categories` | !, R | `"category:security"`| Applies to the `"categories"` property of the related vulnerability. |
383+
| `cve` | `cve` | !, A, N, R | `"cve:CVE-2013-1937"` | Applies to the `"cve"` property of the related vulnerability.|
384+
| `cwe` | `cwe` | !, A, N, R | `"cwe:CWE-121"` | Applies to the `"cwe"` property of the related vulnerability. |
385385
| `db-instance` | `key` | I | `"db-instance:/aws/us-east-1/db-instance/db-12345678"` | |
386386
| `deployment_id` | `deployment_id` | I | `"deployment_id:825283AC-8244-412C-8674-4DBF931E6C16"` | Only one deployment_id filter may be passed per request. |
387387
| `dns-zone` | `key` | A, I | `"dns-zone:/a/dns-zone/key"` | |
@@ -392,24 +392,25 @@ info:
392392
| `kms-key` | `key` | I | `"kms-key:/aws/us-east-1/kms-key/1"` | |
393393
| `load-balancer` | `key` | I, R | `"load-balancer:/aws/us-east-1/load-balancer/s-12345678"` ||
394394
| `redshift-cluster` | `key` | I | `"redshift-cluster:/aws/us-east-1/redshift-cluster/rc-12345678"` | |
395-
| `remediation` | `remediation_id` | !, C, R | `"remediation:00001111-2222-3333-4444-555566667777"` | |
395+
| `remediation` | `remediation_id` | !, R | `"remediation:00001111-2222-3333-4444-555566667777"` | |
396396
| `region` | `key` | I | `"region:/aws/us-east-1"` | <sup>2</sup> |
397397
| `role` | `key` | A, I | `"role:/a/role/key"` | |
398398
| `route` | `key` | I | `"route:/aws/eu-west-2/route/rtb-0e738966"` | |
399399
| `s3-bucket` | `key` | A, I | `"s3-bucket:any"`, `"s3-bucket:/an/s3-bucket/key"` | |
400-
| `severity` | `severity` | !, C, R | `"severity:high"` | Applies to the `"severity"` property of the related vulnerability. |
400+
| `severity` | `severity` | !, R | `"severity:high"` | Applies to the `"severity"` property of the related vulnerability. |
401401
| `sg` | `key` | I, R | `"sg:/aws/us-east-1/sg/s-12345678"` | |
402402
| `user` | `key` | A, I | `"user:any"`, `"user:/aws/123456789012/user/jdoe"` | |
403403
| `volume` | `key` | I | `"volume:/aws/us-east-1/volume/vol-12345678"` | |
404-
| `vulnerability` | `vulnerability_id`| !, C, R | `"vulnerability:09876543210fedcba0987654321fedcba"` | |
405-
| `vulnerability:id` | `vulnerability_id`| !, C, R | `"vulnerability:id:09876543210fedcba0987654321fedcba"` | |
406-
| `vulnerability:key` | `key` | !, C, R | `"vulnerability:key:/aws/us-east-1/host/i-1234567890abcdef0/vulnerability/09876543210fedcba0987654321fedcba/tcp/22"` | <sup>3</sup> |
404+
| `vulnerability` | `vulnerability_id`| !, R | `"vulnerability:09876543210fedcba0987654321fedcba"` | |
405+
| `vulnerability:id` | `vulnerability_id`| !, R | `"vulnerability:id:09876543210fedcba0987654321fedcba"` | |
406+
| `vulnerability:key` | `key` | !, R | `"vulnerability:key:/aws/us-east-1/host/i-1234567890abcdef0/vulnerability/09876543210fedcba0987654321fedcba/tcp/22"` | <sup>3</sup> |
407407
| `vpc` | `key` | R | `"vpc:/aws/us-east-1/vpc/vpc-12345678"` | |
408408
409409
Notes:
410-
1. ! = negation allowed, A = `any` allowed, C = CSV allowed, I = identity, R = relational, N = `none` allowed.
411-
2. The region filter will also be relational in the near future.
412-
3. This selects only assets that have the vulnerability specified by the vulnerability key.
410+
1. ! = negation allowed, A = `any` allowed, I = identity, R = relational, N = `none` allowed.
411+
2. All filters are CSV allowed. Eg. `"role:/a/role/key,/a/role/key2"`
412+
3. The region filter will also be relational in the near future.
413+
4. This selects only assets that have the vulnerability specified by the vulnerability key.
413414
This will only ever return a single remediation on a single asset.
414415
paths:
415416
/assets_query/v1/{account_id}/assets:

0 commit comments

Comments
 (0)