Skip to content

Commit 6d000d8

Browse files
author
AWS
committed
AWS Network Firewall Update: Release of Active Threat Defense in Network Firewall
1 parent e7af1a3 commit 6d000d8

File tree

2 files changed

+132
-3
lines changed

2 files changed

+132
-3
lines changed
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
{
2+
"type": "feature",
3+
"category": "AWS Network Firewall",
4+
"contributor": "",
5+
"description": "Release of Active Threat Defense in Network Firewall"
6+
}

services/networkfirewall/src/main/resources/codegen-resources/service-2.json

Lines changed: 126 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -226,7 +226,7 @@
226226
{"shape":"ResourceNotFoundException"},
227227
{"shape":"ThrottlingException"}
228228
],
229-
"documentation":"<p>Deletes a transit gateway attachment from a Network Firewall. Either the firewall owner or the transit gateway owner can delete the attachment.</p> <important> <p>After you delete a transit gateway attachment, traffic will no longer flow through the firewall endpoints.</p> </important> <p>After you initiate the delete operation, use <a>DescribeFirewall</a> to monitor the deletion status.</p>"
229+
"documentation":"<p>Deletes a transit gateway attachment from a Network Firewall. Either the firewall owner or the transit gateway owner can delete the attachment.</p> <important> <p>After you delete a transit gateway attachment, raffic will no longer flow through the firewall endpoints.</p> </important> <p>After you initiate the delete operation, use <a>DescribeFirewall</a> to monitor the deletion status.</p>"
230230
},
231231
"DeleteResourcePolicy":{
232232
"name":"DeleteResourcePolicy",
@@ -425,6 +425,22 @@
425425
],
426426
"documentation":"<p>High-level information about a rule group, returned by operations like create and describe. You can use the information provided in the metadata to retrieve and manage a rule group. You can retrieve all objects for a rule group by calling <a>DescribeRuleGroup</a>. </p>"
427427
},
428+
"DescribeRuleGroupSummary":{
429+
"name":"DescribeRuleGroupSummary",
430+
"http":{
431+
"method":"POST",
432+
"requestUri":"/"
433+
},
434+
"input":{"shape":"DescribeRuleGroupSummaryRequest"},
435+
"output":{"shape":"DescribeRuleGroupSummaryResponse"},
436+
"errors":[
437+
{"shape":"InvalidRequestException"},
438+
{"shape":"ResourceNotFoundException"},
439+
{"shape":"ThrottlingException"},
440+
{"shape":"InternalServerError"}
441+
],
442+
"documentation":"<p>Returns detailed information for a stateful rule group.</p> <p>For active threat defense Amazon Web Services managed rule groups, this operation provides insight into the protections enabled by the rule group, based on Suricata rule metadata fields. Summaries are available for rule groups you manage and for active threat defense Amazon Web Services managed rule groups.</p> <p>To modify how threat information appears in summaries, use the <code>SummaryConfiguration</code> parameter in <a>UpdateRuleGroup</a>.</p>"
443+
},
428444
"DescribeTLSInspectionConfiguration":{
429445
"name":"DescribeTLSInspectionConfiguration",
430446
"http":{
@@ -679,7 +695,7 @@
679695
{"shape":"ResourceNotFoundException"},
680696
{"shape":"ThrottlingException"}
681697
],
682-
"documentation":"<p>Rejects a transit gateway attachment request for Network Firewall. When you reject the attachment request, Network Firewall cancels the creation of routing components between the transit gateway and firewall endpoints.</p> <p>Only the transit gateway owner can reject the attachment. After rejection, no traffic will flow through the firewall endpoints for this attachment.</p> <p>Use <a>DescribeFirewall</a> to monitor the rejection status. To accept the attachment instead of rejecting it, use <a>AcceptNetworkFirewallTransitGatewayAttachment</a>.</p> <note> <p>Once rejected, you cannot reverse this action. To establish connectivity, you must create a new transit gateway-attached firewall.</p> </note>"
698+
"documentation":"<p>Rejects a transit gateway attachment request for Network Firewall. When you reject the attachment request, Network Firewall cancels the creation of routing components between the transit gateway and firewall endpoints.</p> <p>Only the firewall owner can reject the attachment. After rejection, no traffic will flow through the firewall endpoints for this attachment.</p> <p>Use <a>DescribeFirewall</a> to monitor the rejection status. To accept the attachment instead of rejecting it, use <a>AcceptNetworkFirewallTransitGatewayAttachment</a>.</p> <note> <p>Once rejected, you cannot reverse this action. To establish connectivity, you must create a new transit gateway-attached firewall.</p> </note>"
683699
},
684700
"StartAnalysisReport":{
685701
"name":"StartAnalysisReport",
@@ -1578,6 +1594,10 @@
15781594
"AnalyzeRuleGroup":{
15791595
"shape":"Boolean",
15801596
"documentation":"<p>Indicates whether you want Network Firewall to analyze the stateless rules in the rule group for rule behavior such as asymmetric routing. If set to <code>TRUE</code>, Network Firewall runs the analysis and then creates the rule group for you. To run the stateless rule group analyzer without creating the rule group, set <code>DryRun</code> to <code>TRUE</code>.</p>"
1597+
},
1598+
"SummaryConfiguration":{
1599+
"shape":"SummaryConfiguration",
1600+
"documentation":"<p>An object that contains a <code>RuleOptions</code> array of strings. You use <code>RuleOptions</code> to determine which of the following <a>RuleSummary</a> values are returned in response to <code>DescribeRuleGroupSummary</code>.</p> <ul> <li> <p> <code>Metadata</code> - returns</p> </li> <li> <p> <code>Msg</code> </p> </li> <li> <p> <code>SID</code> </p> </li> </ul>"
15811601
}
15821602
}
15831603
},
@@ -1703,6 +1723,7 @@
17031723
"type":"list",
17041724
"member":{"shape":"CustomAction"}
17051725
},
1726+
"DeepThreatInspection":{"type":"boolean"},
17061727
"DeleteFirewallPolicyRequest":{
17071728
"type":"structure",
17081729
"members":{
@@ -2175,6 +2196,41 @@
21752196
}
21762197
}
21772198
},
2199+
"DescribeRuleGroupSummaryRequest":{
2200+
"type":"structure",
2201+
"members":{
2202+
"RuleGroupName":{
2203+
"shape":"ResourceName",
2204+
"documentation":"<p>The descriptive name of the rule group. You can't change the name of a rule group after you create it.</p> <p>You must specify the ARN or the name, and you can specify both. </p>"
2205+
},
2206+
"RuleGroupArn":{
2207+
"shape":"ResourceArn",
2208+
"documentation":"<p>Required. The Amazon Resource Name (ARN) of the rule group.</p> <p>You must specify the ARN or the name, and you can specify both. </p>"
2209+
},
2210+
"Type":{
2211+
"shape":"RuleGroupType",
2212+
"documentation":"<p>The type of rule group you want a summary for. This is a required field.</p> <p>Valid value: <code>STATEFUL</code> </p> <p>Note that <code>STATELESS</code> exists but is not currently supported. If you provide <code>STATELESS</code>, an exception is returned.</p>"
2213+
}
2214+
}
2215+
},
2216+
"DescribeRuleGroupSummaryResponse":{
2217+
"type":"structure",
2218+
"required":["RuleGroupName"],
2219+
"members":{
2220+
"RuleGroupName":{
2221+
"shape":"ResourceName",
2222+
"documentation":"<p>The descriptive name of the rule group. You can't change the name of a rule group after you create it.</p>"
2223+
},
2224+
"Description":{
2225+
"shape":"Description",
2226+
"documentation":"<p>A description of the rule group. </p>"
2227+
},
2228+
"Summary":{
2229+
"shape":"Summary",
2230+
"documentation":"<p>A complex type that contains rule information based on the rule group's configured summary settings. The content varies depending on the fields that you specified to extract in your SummaryConfiguration. When you haven't configured any summary settings, this returns an empty array. The response might include:</p> <ul> <li> <p>Rule identifiers</p> </li> <li> <p>Rule descriptions</p> </li> <li> <p>Any metadata fields that you specified in your SummaryConfiguration</p> </li> </ul>"
2231+
}
2232+
}
2233+
},
21782234
"DescribeTLSInspectionConfigurationRequest":{
21792235
"type":"structure",
21802236
"members":{
@@ -3721,7 +3777,8 @@
37213777
"type":"string",
37223778
"enum":[
37233779
"AWS_MANAGED_THREAT_SIGNATURES",
3724-
"AWS_MANAGED_DOMAIN_LISTS"
3780+
"AWS_MANAGED_DOMAIN_LISTS",
3781+
"ACTIVE_THREAT_DEFENSE"
37253782
]
37263783
},
37273784
"ResourceName":{
@@ -3885,6 +3942,10 @@
38853942
"AnalysisResults":{
38863943
"shape":"AnalysisResultList",
38873944
"documentation":"<p>The list of analysis results for <code>AnalyzeRuleGroup</code>. If you set <code>AnalyzeRuleGroup</code> to <code>TRUE</code> in <a>CreateRuleGroup</a>, <a>UpdateRuleGroup</a>, or <a>DescribeRuleGroup</a>, Network Firewall analyzes the rule group and identifies the rules that might adversely effect your firewall's functionality. For example, if Network Firewall detects a rule that's routing traffic asymmetrically, which impacts the service's ability to properly process traffic, the service includes the rule in the list of analysis results.</p>"
3945+
},
3946+
"SummaryConfiguration":{
3947+
"shape":"SummaryConfiguration",
3948+
"documentation":"<p>A complex type containing the currently selected rule option fields that will be displayed for rule summarization returned by <a>DescribeRuleGroupSummary</a>.</p> <ul> <li> <p>The <code>RuleOptions</code> specified in <a>SummaryConfiguration</a> </p> </li> <li> <p>Rule metadata organization preferences</p> </li> </ul>"
38883949
}
38893950
},
38903951
"documentation":"<p>The high-level properties of a rule group. This, along with the <a>RuleGroup</a>, define the rule group. You can retrieve all objects for a rule group by calling <a>DescribeRuleGroup</a>. </p>"
@@ -3930,6 +3991,28 @@
39303991
"STRICT_ORDER"
39313992
]
39323993
},
3994+
"RuleSummaries":{
3995+
"type":"list",
3996+
"member":{"shape":"RuleSummary"}
3997+
},
3998+
"RuleSummary":{
3999+
"type":"structure",
4000+
"members":{
4001+
"SID":{
4002+
"shape":"CollectionMember_String",
4003+
"documentation":"<p>The unique identifier (Signature ID) of the Suricata rule.</p>"
4004+
},
4005+
"Msg":{
4006+
"shape":"CollectionMember_String",
4007+
"documentation":"<p>The contents taken from the rule's msg field.</p>"
4008+
},
4009+
"Metadata":{
4010+
"shape":"CollectionMember_String",
4011+
"documentation":"<p>The contents of the rule's metadata.</p>"
4012+
}
4013+
},
4014+
"documentation":"<p>A complex type containing details about a Suricata rule. Contains:</p> <ul> <li> <p> <code>SID</code> </p> </li> <li> <p> <code>Msg</code> </p> </li> <li> <p> <code>Metadata</code> </p> </li> </ul> <p>Summaries are available for rule groups you manage and for active threat defense Amazon Web Services managed rule groups.</p>"
4015+
},
39334016
"RuleTargets":{
39344017
"type":"list",
39354018
"member":{"shape":"CollectionMember_String"}
@@ -4320,6 +4403,10 @@
43204403
"Override":{
43214404
"shape":"StatefulRuleGroupOverride",
43224405
"documentation":"<p>The action that allows the policy owner to override the behavior of the rule group within a policy.</p>"
4406+
},
4407+
"DeepThreatInspection":{
4408+
"shape":"DeepThreatInspection",
4409+
"documentation":"<p>Network Firewall plans to augment the active threat defense managed rule group with an additional deep threat inspection capability. When this capability is released, Amazon Web Services will analyze service logs of network traffic processed by these rule groups to identify threat indicators across customers. Amazon Web Services will use these threat indicators to improve the active threat defense managed rule groups and protect the security of Amazon Web Services customers and services.</p> <note> <p>Customers can opt-out of deep threat inspection at any time through the Network Firewall console or API. When customers opt out, Network Firewall will not use the network traffic processed by those customers' active threat defense rule groups for rule group improvement.</p> </note>"
43234410
}
43244411
},
43254412
"documentation":"<p>Identifier for a single stateful rule group, used in a firewall policy to refer to a rule group. </p>"
@@ -4466,6 +4553,38 @@
44664553
"type":"list",
44674554
"member":{"shape":"SubnetMapping"}
44684555
},
4556+
"Summary":{
4557+
"type":"structure",
4558+
"members":{
4559+
"RuleSummaries":{
4560+
"shape":"RuleSummaries",
4561+
"documentation":"<p>An array of <a>RuleSummary</a> objects containing individual rule details that had been configured by the rulegroup's SummaryConfiguration.</p>"
4562+
}
4563+
},
4564+
"documentation":"<p>A complex type containing summaries of security protections provided by a rule group.</p> <p>Network Firewall extracts this information from selected fields in the rule group's Suricata rules, based on your <a>SummaryConfiguration</a> settings.</p>"
4565+
},
4566+
"SummaryConfiguration":{
4567+
"type":"structure",
4568+
"members":{
4569+
"RuleOptions":{
4570+
"shape":"SummaryRuleOptions",
4571+
"documentation":"<p>Specifies the selected rule options returned by <a>DescribeRuleGroupSummary</a>.</p>"
4572+
}
4573+
},
4574+
"documentation":"<p>A complex type that specifies which Suricata rule metadata fields to use when displaying threat information. Contains:</p> <ul> <li> <p> <code>RuleOptions</code> - The Suricata rule options fields to extract and display</p> </li> </ul> <p>These settings affect how threat information appears in both the console and API responses. Summaries are available for rule groups you manage and for active threat defense Amazon Web Services managed rule groups.</p>"
4575+
},
4576+
"SummaryRuleOption":{
4577+
"type":"string",
4578+
"enum":[
4579+
"SID",
4580+
"MSG",
4581+
"METADATA"
4582+
]
4583+
},
4584+
"SummaryRuleOptions":{
4585+
"type":"list",
4586+
"member":{"shape":"SummaryRuleOption"}
4587+
},
44694588
"SupportedAvailabilityZones":{
44704589
"type":"map",
44714590
"key":{"shape":"AvailabilityZone"},
@@ -5190,6 +5309,10 @@
51905309
"AnalyzeRuleGroup":{
51915310
"shape":"Boolean",
51925311
"documentation":"<p>Indicates whether you want Network Firewall to analyze the stateless rules in the rule group for rule behavior such as asymmetric routing. If set to <code>TRUE</code>, Network Firewall runs the analysis and then updates the rule group for you. To run the stateless rule group analyzer without updating the rule group, set <code>DryRun</code> to <code>TRUE</code>. </p>"
5312+
},
5313+
"SummaryConfiguration":{
5314+
"shape":"SummaryConfiguration",
5315+
"documentation":"<p>Updates the selected summary configuration for a rule group.</p> <p>Changes affect subsequent responses from <a>DescribeRuleGroupSummary</a>.</p>"
51935316
}
51945317
}
51955318
},

0 commit comments

Comments
 (0)