You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
#### securitycenter:v1
The following keys were deleted:
- schemas.CelPolicySpec (Total Keys: 3)
- schemas.GoogleCloudSecuritycenterV1CustomConfig.properties.celPolicy.$ref (Total Keys: 1)
The following keys were changed:
- endpoints (Total Keys: 1)
#### securitycenter:v1beta1
The following keys were deleted:
- schemas.CelPolicySpec (Total Keys: 3)
- schemas.GoogleCloudSecuritycenterV1CustomConfig.properties.celPolicy.$ref (Total Keys: 1)
The following keys were changed:
- endpoints (Total Keys: 1)
#### securitycenter:v1beta2
The following keys were deleted:
- schemas.CelPolicySpec (Total Keys: 3)
- schemas.GoogleCloudSecuritycenterV1CustomConfig.properties.celPolicy.$ref (Total Keys: 1)
The following keys were changed:
- endpoints (Total Keys: 1)
Copy file name to clipboardExpand all lines: docs/dyn/securitycenter_v1.folders.securityHealthAnalyticsSettings.effectiveCustomModules.html
-6Lines changed: 0 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -108,9 +108,6 @@ <h3>Method Details</h3>
108
108
109
109
{ # An EffectiveSecurityHealthAnalyticsCustomModule is the representation of a Security Health Analytics custom module at a specified level of the resource hierarchy: organization, folder, or project. If a custom module is inherited from a parent organization or folder, the value of the `enablementState` property in EffectiveSecurityHealthAnalyticsCustomModule is set to the value that is effective in the parent, instead of `INHERITED`. For example, if the module is enabled in a parent organization or folder, the effective enablement_state for the module in all child folders or projects is also `enabled`. EffectiveSecurityHealthAnalyticsCustomModule is read-only.
110
110
"customConfig": { # Defines the properties in a custom module configuration for Security Health Analytics. Use the custom module configuration to create custom detectors that generate custom findings for resources that you specify. # Output only. The user-specified configuration for the module.
111
-
"celPolicy": { # YAML-based rule that uses CEL, which supports the declaration of variables and a filtering predicate. A vulnerable resource is emitted if the evaluation is false. Given: 1) the resource types as: - resource_types: "compute.googleapis.com/Instance" - resource_types: "compute.googleapis.com/Firewall" 2) the CEL policy spec as: name: bad_instance resource_filters: - name: instance resource_type: compute.googleapis.com/Instance filter: > instance.status == 'RUNNING' && 'public' in instance.tags.items - name: firewall resource_type: compute.googleapis.com/Firewall filter: > firewall.direction == 'INGRESS' && !firewall.disabled && firewall.allowed.exists(rule, rule.IPProtocol.upperAscii() in ['TCP', 'ALL'] && rule.ports.exists(port, network.portsInRange(port, '11-256'))) rule: match: - predicate: > instance.networkInterfaces.exists(net, firewall.network == net.network) output: > {'message': 'Compute instance with publicly accessible ports', 'instance': instance.name} Users are able to join resource types together using the exact format as Kubernetes Validating Admission policies. # The CEL policy spec attached to the custom module.
112
-
"spec": "A String", # The CEL policy to evaluate to produce findings. A finding is generated when the policy validation evaluates to false.
113
-
},
114
111
"customOutput": { # A set of optional name-value pairs that define custom source properties to return with each finding that is generated by the custom module. The custom source properties that are defined here are included in the finding JSON under `sourceProperties`. # Custom output properties.
115
112
"properties": [ # A list of custom output properties to add to the finding.
116
113
{ # An individual name-value pair that defines a custom source property.
@@ -165,9 +162,6 @@ <h3>Method Details</h3>
165
162
"effectiveSecurityHealthAnalyticsCustomModules": [ # Effective custom modules belonging to the requested parent.
166
163
{ # An EffectiveSecurityHealthAnalyticsCustomModule is the representation of a Security Health Analytics custom module at a specified level of the resource hierarchy: organization, folder, or project. If a custom module is inherited from a parent organization or folder, the value of the `enablementState` property in EffectiveSecurityHealthAnalyticsCustomModule is set to the value that is effective in the parent, instead of `INHERITED`. For example, if the module is enabled in a parent organization or folder, the effective enablement_state for the module in all child folders or projects is also `enabled`. EffectiveSecurityHealthAnalyticsCustomModule is read-only.
167
164
"customConfig": { # Defines the properties in a custom module configuration for Security Health Analytics. Use the custom module configuration to create custom detectors that generate custom findings for resources that you specify. # Output only. The user-specified configuration for the module.
168
-
"celPolicy": { # YAML-based rule that uses CEL, which supports the declaration of variables and a filtering predicate. A vulnerable resource is emitted if the evaluation is false. Given: 1) the resource types as: - resource_types: "compute.googleapis.com/Instance" - resource_types: "compute.googleapis.com/Firewall" 2) the CEL policy spec as: name: bad_instance resource_filters: - name: instance resource_type: compute.googleapis.com/Instance filter: > instance.status == 'RUNNING' && 'public' in instance.tags.items - name: firewall resource_type: compute.googleapis.com/Firewall filter: > firewall.direction == 'INGRESS' && !firewall.disabled && firewall.allowed.exists(rule, rule.IPProtocol.upperAscii() in ['TCP', 'ALL'] && rule.ports.exists(port, network.portsInRange(port, '11-256'))) rule: match: - predicate: > instance.networkInterfaces.exists(net, firewall.network == net.network) output: > {'message': 'Compute instance with publicly accessible ports', 'instance': instance.name} Users are able to join resource types together using the exact format as Kubernetes Validating Admission policies. # The CEL policy spec attached to the custom module.
169
-
"spec": "A String", # The CEL policy to evaluate to produce findings. A finding is generated when the policy validation evaluates to false.
170
-
},
171
165
"customOutput": { # A set of optional name-value pairs that define custom source properties to return with each finding that is generated by the custom module. The custom source properties that are defined here are included in the finding JSON under `sourceProperties`. # Custom output properties.
172
166
"properties": [ # A list of custom output properties to add to the finding.
173
167
{ # An individual name-value pair that defines a custom source property.
0 commit comments