

Terjemahan disediakan oleh mesin penerjemah. Jika konten terjemahan yang diberikan bertentangan dengan versi bahasa Inggris aslinya, utamakan versi bahasa Inggris.

# AWS Format Pencarian Keamanan (ASFF)
<a name="securityhub-findings-format"></a>

AWS Security Hub CSPM mengkonsumsi dan mengumpulkan temuan dari produk terintegrasi Layanan AWS dan pihak ketiga. Security Hub CSPM memproses temuan ini menggunakan format temuan standar yang disebut *AWS Security Finding Format (ASFF)*, yang menghilangkan kebutuhan akan upaya konversi data yang memakan waktu.

Halaman ini memberikan garis besar lengkap JSON untuk temuan di AWS Security Finding Format (ASFF). Formatnya berasal dari Skema [JSON](https://json-schema.org/). Pilih nama objek tertaut untuk meninjau contoh temuan untuk objek itu. Membandingkan temuan CSPM Security Hub Anda dengan sumber daya dan contoh yang ditampilkan di sini dapat membantu Anda menafsirkan temuan Anda.

Untuk deskripsi atribut ASFF individu, lihat [Atribut ASFF tingkat atas yang diperlukan](asff-required-attributes.md) dan. [Atribut ASFF tingkat atas opsional](asff-top-level-attributes.md)

```
"Findings": [ 
    {
    	"Action": {
    		"ActionType": "string",
    		"AwsApiCallAction": {
    			"AffectedResources": {
    				"string": "string"
    			},
    			"Api": "string",
    			"CallerType": "string",
    			"DomainDetails": {
    				"Domain": "string"
    			},
    			"FirstSeen": "string",
    			"LastSeen": "string",
    			"RemoteIpDetails": {
    				"City": {
    					"CityName": "string"
    				},
    				"Country": {
    					"CountryCode": "string",
    					"CountryName": "string"
    				},
    				"IpAddressV4": "string",
    				"Geolocation": {
    					"Lat": number,
    					"Lon": number
    				},
    				"Organization": {
    					"Asn": number,
    					"AsnOrg": "string",
    					"Isp": "string",
    					"Org": "string"
    				}
    			},
    			"ServiceName": "string"
    		},
    		"DnsRequestAction": {
    			"Blocked": boolean,
    			"Domain": "string",
    			"Protocol": "string"
    		},
    		"NetworkConnectionAction": {
    			"Blocked": boolean,
    			"ConnectionDirection": "string",
    			"LocalPortDetails": {
    				"Port": number,
    				"PortName": "string"
    			},
    			"Protocol": "string",
    			"RemoteIpDetails": {
    				"City": {
    					"CityName": "string"
    				},
    				"Country": {
    					"CountryCode": "string",
    					"CountryName": "string"
    				},
    				"IpAddressV4": "string",
    				"Geolocation": {
    					"Lat": number,
    					"Lon": number
    				},
    				"Organization": {
    					"Asn": number,
    					"AsnOrg": "string",
    					"Isp": "string",
    					"Org": "string"
    				}
    			},
    			"RemotePortDetails": {
    				"Port": number,
    				"PortName": "string"
    			}
    		},
    		"PortProbeAction": {
    			"Blocked": boolean,
    			"PortProbeDetails": [{
    				"LocalIpDetails": {
    					"IpAddressV4": "string"
    				},
    				"LocalPortDetails": {
    					"Port": number,
    					"PortName": "string"
    				},
    				"RemoteIpDetails": {
    					"City": {
    						"CityName": "string"
    					},
    					"Country": {
    						"CountryCode": "string",
    						"CountryName": "string"
    					},
    					"GeoLocation": {
    						"Lat": number,
    						"Lon": number
    					},
    					"IpAddressV4": "string",
    					"Organization": {
    						"Asn": number,
    						"AsnOrg": "string",
    						"Isp": "string",
    						"Org": "string"
    					}
    				}
    			}]
    		}
    	},
    	"AwsAccountId": "string",
    	"AwsAccountName": "string",
    	"CompanyName": "string",
    	"Compliance": {
    		"AssociatedStandards": [{
    			"StandardsId": "string"
    		}],
    		"RelatedRequirements": ["string"],
    		"SecurityControlId": "string",
    		"SecurityControlParameters": [
    			{
    				"Name": "string",
    				"Value": ["string"]
    			}
   		],
    		"Status": "string",
    		"StatusReasons": [
    			{
    				"Description": "string",
    				"ReasonCode": "string"
    			}
    		]
    	},
    	"Confidence": number,
    	"CreatedAt": "string",
    	"Criticality": number,
    	"Description": "string",
    	"Detection": {
    		"Sequence": {
    			"Uid": "string",
    			"Actors": [{
    				"Id": "string",
    				"Session": {
    					"Uid": "string",
    					"MfAStatus": "string",
    					"CreatedTime": "string",
    					"Issuer": "string"
    				},
    				"User": {
    					"CredentialUid": "string",
    					"Name": "string",
    					"Type": "string",
    					"Uid": "string",
    					"Account": {
    						"Uid": "string",
    						"Name": "string"
    					}
    				}
    			}],
    			"Endpoints": [{
    				"Id": "string",
    				"Ip": "string",
    				"Domain": "string",
    				"Port": number,
    				"Location": {
    					"City": "string",
    					"Country": "string",
    					"Lat": number,
    					"Lon": number
    				},
    				"AutonomousSystem": {
    					"Name": "string",
    					"Number": number
    				},
    				"Connection": {
    					"Direction": "string"
    				}
    			}],
    			"Signals": [{
    				"Id": "string",
    				"Title": "string",
    				"ActorIds": ["string"],
    				"Count": number,
    				"FirstSeenAt": number,
    				"SignalIndicators": [
    					{
    						"Key": "string",
    						"Title": "string",
    						"Values": ["string"]
    					},
    					{
    						"Key": "string",
    						"Title": "string",
    						"Values": ["string"]
    					}
    				],
    				"LastSeenAt": number,
    				"Name": "string",
    				"ResourceIds": ["string"],
    				"Type": "string"
    			}],
    			"SequenceIndicators": [
    				{
    					"Key": "string",
    					"Title": "string",
    					"Values": ["string"]
    				},
    				{
    					"Key": "string",
    					"Title": "string",
    					"Values": ["string"]
    				}
    			]
    		}
    	},
    	"FindingProviderFields": {
    		"Confidence": number,
    		"Criticality": number,
    		"RelatedFindings": [{
    			"ProductArn": "string",
    			"Id": "string"
    		}],
    		"Severity": {
    			"Label": "string",
    			"Normalized": number,
    			"Original": "string"
    		},
    		"Types": ["string"]
    	},
    	"FirstObservedAt": "string",
    	"GeneratorId": "string",
    	"Id": "string",
    	"LastObservedAt": "string",
    	"Malware": [{
    		"Name": "string",
    		"Path": "string",
    		"State": "string",
    		"Type": "string"
    	}],
    	"Network": {
    		"DestinationDomain": "string",
    		"DestinationIpV4": "string",
    		"DestinationIpV6": "string",
    		"DestinationPort": number,
    		"Direction": "string",
    		"OpenPortRange": {
    			"Begin": integer,
    			"End": integer
    		},
    		"Protocol": "string",
    		"SourceDomain": "string",
    		"SourceIpV4": "string",
    		"SourceIpV6": "string",
    		"SourceMac": "string",
    		"SourcePort": number
    	},
    	"NetworkPath": [{
    		"ComponentId": "string",
    		"ComponentType": "string",
    		"Egress": {
    			"Destination": {
    				"Address": ["string"],
    				"PortRanges": [{
    					"Begin": integer,
    					"End": integer
    				}]
    			},
    			"Protocol": "string",
    			"Source": {
    				"Address": ["string"],
    				"PortRanges": [{
    					"Begin": integer,
    					"End": integer
    				}]
    			}
    		},
    		"Ingress": {
    			"Destination": {
    				"Address": ["string"],
    				"PortRanges": [{
    					"Begin": integer,
    					"End": integer
    				}]
    			},
    			"Protocol": "string",
    			"Source": {
    				"Address": ["string"],
    				"PortRanges": [{
    					"Begin": integer,
    					"End": integer
    				}]
    			}
    		}
    	}],
    	"Note": {
    		"Text": "string",
    		"UpdatedAt": "string",
    		"UpdatedBy": "string"
    	},
    	"PatchSummary": {
    		"FailedCount": number,
    		"Id": "string",
    		"InstalledCount": number,
    		"InstalledOtherCount": number,
    		"InstalledPendingReboot": number,
    		"InstalledRejectedCount": number,
    		"MissingCount": number,
    		"Operation": "string",
    		"OperationEndTime": "string",
    		"OperationStartTime": "string",
    		"RebootOption": "string"
    	},
    	"Process": {
    		"LaunchedAt": "string",
    		"Name": "string",
    		"ParentPid": number,
    		"Path": "string",
    		"Pid": number,
    		"TerminatedAt": "string"
    	},
    	"ProductArn": "string",
    	"ProductFields": {
    		"string": "string"
    	},
    	"ProductName": "string",
    	"RecordState": "string",
    	"Region": "string",
    	"RelatedFindings": [{
    		"Id": "string",
    		"ProductArn": "string"
    	}],
    	"Remediation": {
    		"Recommendation": {
    			"Text": "string",
    			"Url": "string"
    		}
    	},
    	"Resources": [{
    		"ApplicationArn": "string",
    		"ApplicationName": "string",
    		"DataClassification": {
    			"DetailedResultsLocation": "string",
    			"Result": {
    				"AdditionalOccurrences": boolean,
    				"CustomDataIdentifiers": {
    					"Detections": [{
    						"Arn": "string",
    						"Count": integer,
    						"Name": "string",
    						"Occurrences": {
    							"Cells": [{
    								"CellReference": "string",
    								"Column": integer,
    								"ColumnName": "string",
    								"Row": integer
    							}],
    							"LineRanges": [{
    								"End": integer,
    								"Start": integer,
    								"StartColumn": integer
    							}],
    							"OffsetRanges": [{
    								"End": integer,
    								"Start": integer,
    								"StartColumn": integer
    							}],
    							"Pages": [{
    								"LineRange": {
    									"End": integer,
    									"Start": integer,
    									"StartColumn": integer
    								},
    								"OffsetRange": {
    									"End": integer,
    									"Start": integer,
    									"StartColumn": integer
    								},
    								"PageNumber": integer
    							}],
    							"Records": [{
    								"JsonPath": "string",
    								"RecordIndex": integer
    							}]
    						}
    					}],
    					"TotalCount": integer
    				},
    				"MimeType": "string",
    				"SensitiveData": [{
    					"Category": "string",
    					"Detections": [{
    						"Count": integer,
    						"Occurrences": {
    							"Cells": [{
    								"CellReference": "string",
    								"Column": integer,
    								"ColumnName": "string",
    								"Row": integer
    							}],
    							"LineRanges": [{
    								"End": integer,
    								"Start": integer,
    								"StartColumn": integer
    							}],
    							"OffsetRanges": [{
    								"End": integer,
    								"Start": integer,
    								"StartColumn": integer
    							}],
    							"Pages": [{
    								"LineRange": {
    									"End": integer,
    									"Start": integer,
    									"StartColumn": integer
    								},
    								"OffsetRange": {
    									"End": integer,
    									"Start": integer,
    									"StartColumn": integer
    								},
    								"PageNumber": integer
    							}],
    							"Records": [{
    								"JsonPath": "string",
    								"RecordIndex": integer
    							}]
    						},
    						"Type": "string"
    					}],
    					"TotalCount": integer
    				}],
    				"SizeClassified": integer,
    				"Status": {
    					"Code": "string",
    					"Reason": "string"
    				}
    			}
    		},
    		"Details": {
    			"AwsAmazonMQBroker": {
    				"AutoMinorVersionUpgrade": boolean,
    				"BrokerArn": "string",
    				"BrokerId": "string",
    				"BrokerName": "string",
    				"Configuration": {
    					"Id": "string",
    					"Revision": integer
    				},
    				"DeploymentMode": "string",
    				"EncryptionOptions": {
    					"UseAwsOwnedKey": boolean
    				},
    				"EngineType": "string",
    				"EngineVersion": "string",
    				"HostInstanceType": "string",
    				"Logs": {
    					"Audit": boolean,
    					"AuditLogGroup": "string",
    					"General": boolean,
    					"GeneralLogGroup": "string"
    				},
    				"MaintenanceWindowStartTime": {
    					"DayOfWeek": "string",
    					"TimeOfDay": "string",
    					"TimeZone": "string"
    				},
    				"PubliclyAccessible": boolean,
    				"SecurityGroups": [
    					"string"
    				],
    				"StorageType": "string",
    				"SubnetIds": [
    					"string",
    					"string"
    				],
    				"Users": [{
    					"Username": "string"
    				}]
    			},
    			"AwsApiGatewayRestApi": {
    				"ApiKeySource": "string",
    				"BinaryMediaTypes": [" string"],
    				"CreatedDate": "string",
    				"Description": "string",
    				"EndpointConfiguration": {
    					"Types": ["string"]
    				},
    				"Id": "string",
    				"MinimumCompressionSize": number,
    				"Name": "string",
    				"Version": "string"
    			},
    			"AwsApiGatewayStage": {
    				"AccessLogSettings": {
    					"DestinationArn": "string",
    					"Format": "string"
    				},
    				"CacheClusterEnabled": boolean,
    				"CacheClusterSize": "string",
    				"CacheClusterStatus": "string",
    				"CanarySettings": {
    					"DeploymentId": "string",
    					"PercentTraffic": number,
    					"StageVariableOverrides": [{
    						"string": "string"
    					}],
    					"UseStageCache": boolean
    				},
    				"ClientCertificateId": "string",
    				"CreatedDate": "string",
    				"DeploymentId": "string",
    				"Description": "string",
    				"DocumentationVersion": "string",
    				"LastUpdatedDate": "string",
    				"MethodSettings": [{
    					"CacheDataEncrypted": boolean,
    					"CachingEnabled": boolean,
    					"CacheTtlInSeconds": number,
    					"DataTraceEnabled": boolean,
    					"HttpMethod": "string",
    					"LoggingLevel": "string",
    					"MetricsEnabled": boolean,
    					"RequireAuthorizationForCacheControl": boolean,
    					"ResourcePath": "string",
    					"ThrottlingBurstLimit": number,
    					"ThrottlingRateLimit": number,
    					"UnauthorizedCacheControlHeaderStrategy": "string"
    				}],
    				"StageName": "string",
    				"TracingEnabled": boolean,
    				"Variables": {
    					"string": "string"
    				},
    				"WebAclArn": "string"
    			},
    			"AwsApiGatewayV2Api": {
    				"ApiEndpoint": "string",
    				"ApiId": "string",
    				"ApiKeySelectionExpression": "string",
    				"CorsConfiguration": {
    					"AllowCredentials": boolean,
    					"AllowHeaders": ["string"],
    					"AllowMethods": ["string"],
    					"AllowOrigins": ["string"],
    					"ExposeHeaders": ["string"],
    					"MaxAge": number
    				},
    				"CreatedDate": "string",
    				"Description": "string",
    				"Name": "string",
    				"ProtocolType": "string",
    				"RouteSelectionExpression": "string",
    				"Version": "string"
    			},
    			"AwsApiGatewayV2Stage": {
    				"AccessLogSettings": {
    					"DestinationArn": "string",
    					"Format": "string"
    				},
    				"ApiGatewayManaged": boolean,
    				"AutoDeploy": boolean,
    				"ClientCertificateId": "string",
    				"CreatedDate": "string",
    				"DefaultRouteSettings": {
    					"DataTraceEnabled": boolean,
    					"DetailedMetricsEnabled": boolean,
    					"LoggingLevel": "string",
    					"ThrottlingBurstLimit": number,
    					"ThrottlingRateLimit": number
    				},
    				"DeploymentId": "string",
    				"Description": "string",
    				"LastDeploymentStatusMessage": "string",
    				"LastUpdatedDate": "string",
    				"RouteSettings": {
    					"DetailedMetricsEnabled": boolean,
    					"LoggingLevel": "string",
    					"DataTraceEnabled": boolean,
    					"ThrottlingBurstLimit": number,
    					"ThrottlingRateLimit": number
    				},
    				"StageName": "string",
    				"StageVariables": [{
    					"string": "string"
    				}]
    			},
    			"AwsAppSyncGraphQLApi": {
    				"AwsAppSyncGraphQlApi": {
    					"AdditionalAuthenticationProviders": [
    					{
    						"AuthenticationType": "string",
    						"LambdaAuthorizerConfig": {
    							"AuthorizerResultTtlInSeconds": integer,
    							"AuthorizerUri": "string"
    						}
    					},
    					{
    						"AuthenticationType": "string"
    					}
    					],
    					"ApiId": "string",
    					"Arn": "string",
    					"AuthenticationType": "string",
    					"Id": "string",
    					"LogConfig": {
    						"CloudWatchLogsRoleArn": "string",
    						"ExcludeVerboseContent": boolean,
    						"FieldLogLevel": "string"
    					},
    					"Name": "string",
    					"XrayEnabled": boolean
    				}
    			},
    			"AwsAthenaWorkGroup": {
    				"Description": "string",
    				"Name": "string",
    				"WorkgroupConfiguration": {
    					"ResultConfiguration": {
    						"EncryptionConfiguration": {
    							"EncryptionOption": "string",
    							"KmsKey": "string"
    						}
    					}
    				},
    				"State": "string"
    			},
    			"AwsAutoScalingAutoScalingGroup": {
    				"AvailabilityZones": [{
    					"Value": "string"
    				}],
    				"CreatedTime": "string",
    				"HealthCheckGracePeriod": integer,
    				"HealthCheckType": "string",
    				"LaunchConfigurationName": "string",
    				"LoadBalancerNames": ["string"],
    				"LaunchTemplate": {                            
                        "LaunchTemplateId": "string",
                        "LaunchTemplateName": "string",
                        "Version": "string"
                    },
    				"MixedInstancesPolicy": {
    					"InstancesDistribution": {
    						"OnDemandAllocationStrategy": "string",
    						"OnDemandBaseCapacity": number,
    						"OnDemandPercentageAboveBaseCapacity": number,
    						"SpotAllocationStrategy": "string",
    						"SpotInstancePools": number,
    						"SpotMaxPrice": "string"
    					},
    					"LaunchTemplate": {
    						"LaunchTemplateSpecification": {
    							"LaunchTemplateId": "string",
    							"LaunchTemplateName": "string",
    							"Version": "string"
    						},
    						"CapacityRebalance": boolean,
    						"Overrides": [{
    							"InstanceType": "string",
    							"WeightedCapacity": "string"
    						}]
    					}
    				}
    			},
    			"AwsAutoScalingLaunchConfiguration": {
    				"AssociatePublicIpAddress": boolean,
    				"BlockDeviceMappings": [{
    					"DeviceName": "string",
    					"Ebs": {
    						"DeleteOnTermination": boolean,
    						"Encrypted": boolean,
    						"Iops": number,
    						"SnapshotId": "string",
    						"VolumeSize": number,
    						"VolumeType": "string"
    					},
    					"NoDevice": boolean,
    					"VirtualName": "string"
    				}],
    				"ClassicLinkVpcId": "string",
    				"ClassicLinkVpcSecurityGroups": ["string"],
    				"CreatedTime": "string",
    				"EbsOptimized": boolean,
    				"IamInstanceProfile": "string"
    			},
    			"ImageId": "string",
    			"InstanceMonitoring": {
    				"Enabled": boolean
    			},
    			"InstanceType": "string",
    			"KernelId": "string",
    			"KeyName": "string",
    			"LaunchConfigurationName": "string",
    			"MetadataOptions": {
    				"HttpEndPoint": "string",
    				"HttpPutReponseHopLimit": number,
    				"HttpTokens": "string"
    			},
    			"PlacementTenancy": "string",
    			"RamdiskId": "string",
    			"SecurityGroups": ["string"],
    			"SpotPrice": "string",
    			"UserData": "string"
    		},
    		"AwsBackupBackupPlan": {
    			"BackupPlan": {
    				"AdvancedBackupSettings": [{
    					"BackupOptions": {
    						"WindowsVSS":"string"
    					},
    					"ResourceType":"string"
    				}],
    				"BackupPlanName": "string",
    				"BackupPlanRule": [{
    					"CompletionWindowMinutes": integer,
    					"CopyActions": [{
    						"DestinationBackupVaultArn": "string",
    						"Lifecycle": {
    							"DeleteAfterDays": integer,
    							"MoveToColdStorageAfterDays": integer
    						}
    					}],
    					"Lifecycle": {
    						"DeleteAfterDays": integer
    					},
    					"RuleName": "string",
    					"ScheduleExpression": "string",
    					"StartWindowMinutes": integer,
    					"TargetBackupVault": "string"
    				}]
    			},
    			"BackupPlanArn": "string",
    			"BackupPlanId": "string",
    			"VersionId": "string"
    	},
    		"AwsBackupBackupVault": {
    			"AccessPolicy": {
    				"Statement": [{
    					"Action": ["string"],
    					"Effect": "string",
    					"Principal": {
    						"AWS": "string"
    					},
    					"Resource": "string"
    				}],
    				"Version": "string"
    			},
    			"BackupVaultArn": "string",
    			"BackupVaultName": "string",
    			"EncryptionKeyArn": "string",
    			"Notifications": {
    				"BackupVaultEvents": ["string"],
    				"SNSTopicArn": "string"
    			}
    		},
    		"AwsBackupRecoveryPoint": {
    			"BackupSizeInBytes": integer,
    			"BackupVaultName": "string",
    			"BackupVaultArn": "string",
    			"CalculatedLifecycle": {
    				"DeleteAt": "string",
    				"MoveToColdStorageAt": "string"
    			},
    			"CompletionDate": "string",
    			"CreatedBy": {
    				"BackupPlanArn": "string",
    				"BackupPlanId": "string",
    				"BackupPlanVersion": "string",
    				"BackupRuleId": "string"
    			},
    			"CreationDate": "string",
    			"EncryptionKeyArn": "string",
    			"IamRoleArn": "string",
    			"IsEncrypted": boolean,
    			"LastRestoreTime": "string",
    			"Lifecycle": {
    				"DeleteAfterDays": integer,
    				"MoveToColdStorageAfterDays": integer
    			},
    			"RecoveryPointArn": "string",
    			"ResourceArn": "string",
    			"ResourceType": "string",
    			"SourceBackupVaultArn": "string",
    			"Status": "string",
    			"StatusMessage": "string",
    			"StorageClass": "string"
    		},
    		"AwsCertificateManagerCertificate": {
    			"CertificateAuthorityArn": "string",
    			"CreatedAt": "string",
    			"DomainName": "string",
    			"DomainValidationOptions": [{
    				"DomainName": "string",
    				"ResourceRecord": {
    					"Name": "string",
    					"Type": "string",
    					"Value": "string"
    				},
    				"ValidationDomain": "string",
    				"ValidationEmails": ["string"],
    				"ValidationMethod": "string",
    				"ValidationStatus": "string"
    			}],
    			"ExtendedKeyUsages": [{
    				"Name": "string",
    				"OId": "string"
    			}],
    			"FailureReason": "string",
    			"ImportedAt": "string",
    			"InUseBy": ["string"],
    			"IssuedAt": "string",
    			"Issuer": "string",
    			"KeyAlgorithm": "string",
    			"KeyUsages": [{
    				"Name": "string"
    			}],
    			"NotAfter": "string",
    			"NotBefore": "string",
    			"Options": {
    				"CertificateTransparencyLoggingPreference": "string"
    			},
    			"RenewalEligibility": "string",
    			"RenewalSummary": {
    				"DomainValidationOptions": [{
    					"DomainName": "string",
    					"ResourceRecord": {
    						"Name": "string",
    						"Type": "string",
    						"Value": "string"
    					},
    					"ValidationDomain": "string",
    					"ValidationEmails": ["string"],
    					"ValidationMethod": "string",
    					"ValidationStatus": "string"
    				}],
    				"RenewalStatus": "string",
    				"RenewalStatusReason": "string",
    				"UpdatedAt": "string"
    			},
    			"Serial": "string",
    			"SignatureAlgorithm": "string",
    			"Status": "string",
    			"Subject": "string",
    			"SubjectAlternativeNames": ["string"],
    			"Type": "string"
    		},
    		"AwsCloudFormationStack": {
    			"Capabilities": ["string"],
    			"CreationTime": "string",
    			"Description": "string",
    			"DisableRollback": boolean,
    			"DriftInformation": {
    				"StackDriftStatus": "string"
    			},
    			"EnableTerminationProtection": boolean,
    			"LastUpdatedTime": "string",
    			"NotificationArns": ["string"],
    			"Outputs": [{
    				"Description": "string",
    				"OutputKey": "string",
    				"OutputValue": "string"
    			}],
    			"RoleArn": "string",
    			"StackId": "string",
    			"StackName": "string",
    			"StackStatus": "string",
    			"StackStatusReason": "string",
    			"TimeoutInMinutes": number 
    		},
    		"AwsCloudFrontDistribution": {
    			"CacheBehaviors": {
    				"Items": [{
    					"ViewerProtocolPolicy": "string"
    				}]
    			},
    			"DefaultCacheBehavior": {
    				"ViewerProtocolPolicy": "string"
    			},
    			"DefaultRootObject": "string",
    			"DomainName": "string",
    			"Etag": "string",
    			"LastModifiedTime": "string",
    			"Logging": {
    				"Bucket": "string",
    				"Enabled": boolean,
    				"IncludeCookies": boolean,
    				"Prefix": "string"
    			},
    			"OriginGroups": {
    				"Items": [{
    					"FailoverCriteria": {
    						"StatusCodes": {
    							"Items": [number],
    							"Quantity": number
    						}
    					}
    				}]
    			},
    			"Origins": {
    				"Items": [{
    					"CustomOriginConfig": {
    						"HttpPort": number,
    						"HttpsPort": number,
    						"OriginKeepaliveTimeout": number,
    						"OriginProtocolPolicy": "string",
    						"OriginReadTimeout": number,
    						"OriginSslProtocols": {
    							"Items": ["string"],
    							"Quantity": number
    						} 
    					},		
    					"DomainName": "string",
    					"Id": "string",
    					"OriginPath": "string",
    					"S3OriginConfig": {
    						"OriginAccessIdentity": "string"
    					}
    				}]
    			},
    			"Status": "string",
    			"ViewerCertificate": {
    				"AcmCertificateArn": "string",
    				"Certificate": "string",
    				"CertificateSource": "string",
    				"CloudFrontDefaultCertificate": boolean,
    				"IamCertificateId": "string",
    				"MinimumProtocolVersion": "string",
    				"SslSupportMethod": "string"
    			},
    			"WebAclId": "string"
    		},
    		"AwsCloudTrailTrail": {
    			"CloudWatchLogsLogGroupArn": "string",
    			"CloudWatchLogsRoleArn": "string",
    			"HasCustomEventSelectors": boolean,
    			"HomeRegion": "string",
    			"IncludeGlobalServiceEvents": boolean,
    			"IsMultiRegionTrail": boolean,
    			"IsOrganizationTrail": boolean,
    			"KmsKeyId": "string",
    			"LogFileValidationEnabled": boolean,
    			"Name": "string",
    			"S3BucketName": "string",
    			"S3KeyPrefix": "string",
    			"SnsTopicArn": "string",
    			"SnsTopicName": "string",
    			"TrailArn": "string"
    		},
    		"AwsCloudWatchAlarm": {
    			"ActionsEnabled": boolean,
    			"AlarmActions": ["string"],
    			"AlarmArn": "string",
    			"AlarmConfigurationUpdatedTimestamp": "string",
    			"AlarmDescription": "string",
    			"AlarmName": "string",
    			"ComparisonOperator": "string",
    			"DatapointsToAlarm": number,
    			"Dimensions": [{
    				"Name": "string",
    				"Value": "string"
    			}],
    			"EvaluateLowSampleCountPercentile": "string",
    			"EvaluationPeriods": number,
    			"ExtendedStatistic": "string",
    			"InsufficientDataActions": ["string"],
    			"MetricName": "string",
    			"Namespace": "string",
    			"OkActions": ["string"],
    			"Period": number,
    			"Statistic": "string",
    			"Threshold": number,
    			"ThresholdMetricId": "string",
    			"TreatMissingData": "string",
    			"Unit": "string"
    		},
    		"AwsCodeBuildProject": {
    			"Artifacts": [{
    				"ArtifactIdentifier": "string",
    				"EncryptionDisabled": boolean,
    				"Location": "string",
    				"Name": "string",
    				"NamespaceType": "string",
    				"OverrideArtifactName": boolean,
    				"Packaging": "string",
    				"Path": "string",
    				"Type": "string"
    			}],
    			"SecondaryArtifacts": [{
                    "ArtifactIdentifier": "string",
                    "Type": "string",
                    "Location": "string",
                    "Name": "string",
                    "NamespaceType": "string",
                    "Packaging": "string",
                    "Path": "string",
                    "EncryptionDisabled": boolean,
                    "OverrideArtifactName": boolean
                }],
    			"EncryptionKey": "string",
    			"Certificate": "string",
    			"Environment": {
    				"Certificate": "string",
    				"EnvironmentVariables": [{
    					"Name": "string",
    					"Type": "string",
    					"Value": "string"
    				}],
    				"ImagePullCredentialsType": "string",
    				"PrivilegedMode": boolean,
    				"RegistryCredential": {
    					"Credential": "string",
    					"CredentialProvider": "string"
    				},
    				"Type": "string"
    			},
    			"LogsConfig": {
    				"CloudWatchLogs": {
    					"GroupName": "string",
    					"Status": "string",
    					"StreamName": "string"
    				},
    				"S3Logs": {
    					"EncryptionDisabled": boolean,
    					"Location": "string",
    					"Status": "string"
    				}
    			},
    			"Name": "string",
    			"ServiceRole": "string",
    			"Source": {
    				"Type": "string",
    				"Location": "string",
    				"GitCloneDepth": integer
    			},
    			"VpcConfig": {
    				"VpcId": "string",
    				"Subnets": ["string"],
    				"SecurityGroupIds": ["string"]
    			}
    		},
    		"AwsDmsEndpoint": {
    			"CertificateArn": "string",
    			"DatabaseName": "string",
    			"EndpointArn": "string",
    			"EndpointIdentifier": "string",
    			"EndpointType": "string", 
    			"EngineName": "string",
    			"KmsKeyId": "string",
    			"Port": integer,
    			"ServerName": "string",
    			"SslMode": "string",
    			"Username": "string"
    		},
    		"AwsDmsReplicationInstance": {
    			"AllocatedStorage": integer,
    			"AutoMinorVersionUpgrade": boolean,
    			"AvailabilityZone": "string",
    			"EngineVersion": "string",
    			"KmsKeyId": "string",
    			"MultiAZ": boolean,
    			"PreferredMaintenanceWindow": "string",
    			"PubliclyAccessible": boolean,
    			"ReplicationInstanceClass": "string",
    			"ReplicationInstanceIdentifier": "string",
    			"ReplicationSubnetGroup": {
        			"ReplicationSubnetGroupIdentifier": "string"
    			},
    			"VpcSecurityGroups": [
        			{
            			"VpcSecurityGroupId": "string"
        			}
    			]
    		},
    		"AwsDmsReplicationTask": {
    			"CdcStartPosition": "string",
    			"Id": "string",
    			"MigrationType": "string",
    			"ReplicationInstanceArn": "string",
    			"ReplicationTaskIdentifier": "string",
    			"ReplicationTaskSettings": {
    				"string": "string"
    			},
    			"SourceEndpointArn": "string",
    			"TableMappings": {
    				"string": "string"
    			},
    			"TargetEndpointArn": "string"
    		},
    		"AwsDynamoDbTable": {
    			"AttributeDefinitions": [{
    				"AttributeName": "string",
    				"AttributeType": "string"
    			}],
    			"BillingModeSummary": {
    				"BillingMode": "string",
    				"LastUpdateToPayPerRequestDateTime": "string"
    			},
    			"CreationDateTime": "string",
    			"DeletionProtectionEnabled": boolean,
    			"GlobalSecondaryIndexes": [{
    				"Backfilling": boolean,
    				"IndexArn": "string",
    				"IndexName": "string",
    				"IndexSizeBytes": number,
    				"IndexStatus": "string",
    				"ItemCount": number,
    				"KeySchema": [{
    					"AttributeName": "string",
    					"KeyType": "string"
    				}],
    				"Projection": {
    					"NonKeyAttributes": ["string"],
    					"ProjectionType": "string"
    				},
    				"ProvisionedThroughput": {
    					"LastDecreaseDateTime": "string",
    					"LastIncreaseDateTime": "string",
    					"NumberOfDecreasesToday": number,
    					"ReadCapacityUnits": number,
    					"WriteCapacityUnits": number
    				}
    			}],
    			"GlobalTableVersion": "string",
    			"ItemCount": number,
    			"KeySchema": [{
    				"AttributeName": "string",
    				"KeyType": "string"
    			}],
    			"LatestStreamArn": "string",
    			"LatestStreamLabel": "string",
    			"LocalSecondaryIndexes": [{
    				"IndexArn": "string",
    				"IndexName": "string",
    				"KeySchema": [{
    					"AttributeName": "string",
    					"KeyType": "string"
    				}],
    				"Projection": {
    					"NonKeyAttributes": ["string"],
    					"ProjectionType": "string"
    				}
    			}],
    			"ProvisionedThroughput": {
    				"LastDecreaseDateTime": "string",
    				"LastIncreaseDateTime": "string",
    				"NumberOfDecreasesToday": number,
    				"ReadCapacityUnits": number,
    				"WriteCapacityUnits": number
    			},
    			"Replicas": [{
    				"GlobalSecondaryIndexes": [{
    					"IndexName": "string",
    					"ProvisionedThroughputOverride": {
    						"ReadCapacityUnits": number
    					}
    				}],
    				"KmsMasterKeyId": "string",
    				"ProvisionedThroughputOverride": {
    					"ReadCapacityUnits": number
    				},
    				"RegionName": "string",
    				"ReplicaStatus": "string",
    				"ReplicaStatusDescription": "string"
    			}],
    			"RestoreSummary": {
    				"RestoreDateTime": "string",
    				"RestoreInProgress": boolean,
    				"SourceBackupArn": "string",
    				"SourceTableArn": "string"
    			},
    			"SseDescription": {
    				"InaccessibleEncryptionDateTime": "string",
    				"KmsMasterKeyArn": "string",
    				"SseType": "string",
    				"Status": "string"
    			},
    			"StreamSpecification": {
    				"StreamEnabled": boolean,
    				"StreamViewType": "string"
    			},
    			"TableId": "string",
    			"TableName": "string",
    			"TableSizeBytes": number,
    			"TableStatus": "string"
    		},
    		"AwsEc2ClientVpnEndpoint": {
    			"AuthenticationOptions": [
    				{
    					"MutualAuthentication": {
    						"ClientRootCertificateChainArn": "string"
    					},
    					"Type": "string"
    				}
    			],
    			"ClientCidrBlock": "string",
    			"ClientConnectOptions": {
    				"Enabled": boolean
    			},
    			"ClientLoginBannerOptions": {
    				"Enabled": boolean
    			},
    			"ClientVpnEndpointId": "string",
    			"ConnectionLogOptions": {
    				"Enabled": boolean
    			},
    			"Description": "string",
    			"DnsServer": ["string"],
    			"ServerCertificateArn": "string",
    			"SecurityGroupIdSet": [
    				"string"
    			],
    			"SelfServicePortalUrl": "string",
    			"SessionTimeoutHours": "integer",
    			"SplitTunnel": boolean,
    			"TransportProtocol": "string",
    			"VpcId": "string",
    			"VpnPort": integer
    		},
    		"AwsEc2Eip": {
    			"AllocationId": "string",
    			"AssociationId": "string",
    			"Domain": "string",
    			"InstanceId": "string",
    			"NetworkBorderGroup": "string",
    			"NetworkInterfaceId": "string",
    			"NetworkInterfaceOwnerId": "string",
    			"PrivateIpAddress": "string",
    			"PublicIp": "string",
    			"PublicIpv4Pool": "string"
    		},
    		"AwsEc2Instance": {
    			"IamInstanceProfileArn": "string",
    			"ImageId": "string",
    			"IpV4Addresses": ["string"],
    			"IpV6Addresses": ["string"],
    			"KeyName": "string",
    			"LaunchedAt": "string",
    			"MetadataOptions": {
    				"HttpEndpoint": "string",
    				"HttpProtocolIpv6": "string",
    				"HttpPutResponseHopLimit": number,
    				"HttpTokens": "string",
    				"InstanceMetadataTags": "string"
    			},
    			"Monitoring": {
    				"State": "string"
    			},
    			"NetworkInterfaces": [{                
    				"NetworkInterfaceId": "string"
    			}],
    			"SubnetId": "string",
    			"Type": "string",    			
    			"VirtualizationType": "string",
    			"VpcId": "string"
    		},   
    		"AwsEc2LaunchTemplate": {
    			"DefaultVersionNumber": "string",
    			"ElasticGpuSpecifications": ["string"],
    			"ElasticInferenceAccelerators": ["string"],
    			"Id": "string",
    			"ImageId": "string",
    			"LatestVersionNumber": "string",
    			"LaunchTemplateData": {
    				"BlockDeviceMappings": [{
    					"DeviceName": "string",
    					"Ebs": {
    						"DeleteonTermination": boolean,
    						"Encrypted": boolean,
    						"SnapshotId": "string",
    						"VolumeSize": number,
    						"VolumeType": "string"
    					}
    				}],
    				"MetadataOptions": {
    					"HttpTokens": "string",
    					"HttpPutResponseHopLimit" : number
    				},
    				"Monitoring": {
    					"Enabled": boolean
    				},
    				"NetworkInterfaces": [{
    					"AssociatePublicIpAddress" : boolean
    				}]
    			},
    			"LaunchTemplateName": "string",
    			"LicenseSpecifications": ["string"],
    			"SecurityGroupIds": ["string"],
    			"SecurityGroups": ["string"],
    			"TagSpecifications": ["string"]
    		},
    		"AwsEc2NetworkAcl": {
    			"Associations": [{
    				"NetworkAclAssociationId": "string",
    				"NetworkAclId": "string",
    				"SubnetId": "string"
    			}],
    			"Entries": [{
    				"CidrBlock": "string",
    				"Egress": boolean,
    				"IcmpTypeCode": {
    					"Code": number,
    					"Type": number
    				},
    				"Ipv6CidrBlock": "string",
    				"PortRange": {
    					"From": number,
    					"To": number
    				},
    				"Protocol": "string",
    				"RuleAction": "string",
    				"RuleNumber": number
    			}],
    			"IsDefault": boolean,
    			"NetworkAclId": "string",
    			"OwnerId": "string",
    			"VpcId": "string"
    		},
    		"AwsEc2NetworkInterface": {
    			"Attachment": {
    				"AttachmentId": "string",
    				"AttachTime": "string",
    				"DeleteOnTermination": boolean,
    				"DeviceIndex": number,
    				"InstanceId": "string",
    				"InstanceOwnerId": "string",
    				"Status": "string"
    			},
    			"Ipv6Addresses": [{
    				"Ipv6Address": "string"
    			}],
    			"NetworkInterfaceId": "string",
    			"PrivateIpAddresses": [{
    				"PrivateDnsName": "string",
    				"PrivateIpAddress": "string"
    			}],
    			"PublicDnsName": "string",
    			"PublicIp": "string",
    			"SecurityGroups": [{
    				"GroupId": "string",
    				"GroupName": "string"
    			}],
    			"SourceDestCheck": boolean
    		},
    		"AwsEc2RouteTable": {
    			"AssociationSet": [{
    				"AssociationState": {
    					"State": "string"
    				},
    				"Main": boolean,
    				"RouteTableAssociationId": "string",
    				"RouteTableId": "string"
    			}],
    			"PropogatingVgwSet": [],
    			"RouteTableId": "string",
    			"RouteSet": [
    				{
    					"DestinationCidrBlock": "string",
    					"GatewayId": "string",
    					"Origin": "string",
    					"State": "string"
    				},
    				{
    					"DestinationCidrBlock": "string",
    					"GatewayId": "string",
    					"Origin": "string",
    					"State": "string"
    				}
    			],
    			"VpcId": "string"
    		},
    		"AwsEc2SecurityGroup": {
    			"GroupId": "string",
    			"GroupName": "string",
    			"IpPermissions": [{
    				"FromPort": number,
    				"IpProtocol": "string",
    				"IpRanges": [{
    					"CidrIp": "string"
    				}],
    				"Ipv6Ranges": [{
    					"CidrIpv6": "string"
    				}],
    				"PrefixListIds": [{
    					"PrefixListId": "string"
    				}],
    				"ToPort": number,
    				"UserIdGroupPairs": [{
    					"GroupId": "string",
    					"GroupName": "string",
    					"PeeringStatus": "string",
    					"UserId": "string",
    					"VpcId": "string",
    					"VpcPeeringConnectionId": "string"
    				}]
    			}],
    			"IpPermissionsEgress": [{
    				"FromPort": number,
    				"IpProtocol": "string",
    				"IpRanges": [{
    					"CidrIp": "string"
    				}],
    				"Ipv6Ranges": [{
    					"CidrIpv6": "string"
    				}],
    				"PrefixListIds": [{
    					"PrefixListId": "string"
    				}],
    				"ToPort": number,
    				"UserIdGroupPairs": [{
    					"GroupId": "string",
    					"GroupName": "string",
    					"PeeringStatus": "string",
    					"UserId": "string",
    					"VpcId": "string",
    					"VpcPeeringConnectionId": "string"
    				}]
    			}],
    			"OwnerId": "string",
    			"VpcId": "string"
    		},
    		"AwsEc2Subnet": {
    			"AssignIpv6AddressOnCreation": boolean,
    			"AvailabilityZone": "string",
    			"AvailabilityZoneId": "string",
    			"AvailableIpAddressCount": number,
    			"CidrBlock": "string",
    			"DefaultForAz": boolean,
    			"Ipv6CidrBlockAssociationSet": [{
    				"AssociationId": "string",
    				"Ipv6CidrBlock": "string",
    				"CidrBlockState": "string"
    			}],
    			"MapPublicIpOnLaunch": boolean,
    			"OwnerId": "string",
    			"State": "string",
    			"SubnetArn": "string",
    			"SubnetId": "string",
    			"VpcId": "string"
    		},
    		"AwsEc2TransitGateway": {
    			"AmazonSideAsn": number,
    			"AssociationDefaultRouteTableId": "string",
    			"AutoAcceptSharedAttachments": "string",
    			"DefaultRouteTableAssociation": "string",
    			"DefaultRouteTablePropagation": "string",
    			"Description": "string",
    			"DnsSupport": "string",
    			"Id": "string",
    			"MulticastSupport": "string",
    			"PropagationDefaultRouteTableId": "string",
    			"TransitGatewayCidrBlocks": ["string"],
    			"VpnEcmpSupport": "string"
    		},
    		"AwsEc2Volume": {
    			"Attachments": [{
    				"AttachTime": "string",
    				"DeleteOnTermination": boolean,
    				"InstanceId": "string",
    				"Status": "string"
    			}],
    			"CreateTime": "string",
    			"DeviceName": "string",
    			"Encrypted": boolean,
    			"KmsKeyId": "string",
    			"Size": number,
    			"SnapshotId": "string",
    			"Status": "string",
    			"VolumeId": "string",
    			"VolumeScanStatus": "string",
    			"VolumeType": "string"
    		},
    		"AwsEc2Vpc": {
    			"CidrBlockAssociationSet": [{
    				"AssociationId": "string",
    				"CidrBlock": "string",
    				"CidrBlockState": "string"
    			}],
    			"DhcpOptionsId": "string",
    			"Ipv6CidrBlockAssociationSet": [{
    				"AssociationId": "string",
    				"CidrBlockState": "string",
    				"Ipv6CidrBlock": "string"
    			}],
    			"State": "string"
    		},
    		"AwsEc2VpcEndpointService": {
    			"AcceptanceRequired": boolean,
    			"AvailabilityZones": ["string"],
    			"BaseEndpointDnsNames": ["string"],
    			"ManagesVpcEndpoints": boolean,
    			"GatewayLoadBalancerArns": ["string"],
    			"NetworkLoadBalancerArns": ["string"],
    			"PrivateDnsName": "string",
    			"ServiceId": "string",
    			"ServiceName": "string",
    			"ServiceState": "string",
    			"ServiceType": [{
    				"ServiceType": "string"
    			}]
    		},
    		"AwsEc2VpcPeeringConnection": {
    			"AccepterVpcInfo": {
    				"CidrBlock": "string",
    				"CidrBlockSet": [{
    					"CidrBlock": "string"
    				}],
    				"Ipv6CidrBlockSet": [{
    					"Ipv6CidrBlock": "string"
    				}],
    				"OwnerId": "string",
    				"PeeringOptions": {
    					"AllowDnsResolutionFromRemoteVpc": boolean,
    					"AllowEgressFromLocalClassicLinkToRemoteVpc": boolean,
    					"AllowEgressFromLocalVpcToRemoteClassicLink": boolean
    				},
    				"Region": "string",
    				"VpcId": "string"
    			},
    			"ExpirationTime": "string",
    			"RequesterVpcInfo": {
    				"CidrBlock": "string",
    				"CidrBlockSet": [{
    					"CidrBlock": "string"
    				}],
    				"Ipv6CidrBlockSet": [{
    					"Ipv6CidrBlock": "string"
    				}],
    				"OwnerId": "string",
    				"PeeringOptions": {
    					"AllowDnsResolutionFromRemoteVpc": boolean,
    					"AllowEgressFromLocalClassicLinkToRemoteVpc": boolean,
    					"AllowEgressFromLocalVpcToRemoteClassicLink": boolean
    				},
    				"Region": "string",
    				"VpcId": "string"
    			},
    			"Status": {
    				"Code": "string",
    				"Message": "string"
    			},
    			"VpcPeeringConnectionId": "string"
    		},
    		"AwsEcrContainerImage": {
    			"Architecture": "string",
    			"ImageDigest": "string",
    			"ImagePublishedAt": "string",
    			"ImageTags": ["string"],
    			"RegistryId": "string",
    			"RepositoryName": "string"
    		},
    		"AwsEcrRepository": {
    			"Arn": "string",
    			"ImageScanningConfiguration": {
    				"ScanOnPush": boolean
    			},
    			"ImageTagMutability": "string",
    			"LifecyclePolicy": {
    				"LifecyclePolicyText": "string",
    				"RegistryId": "string"
    			},
    			"RepositoryName": "string",
    			"RepositoryPolicyText": "string"
    		},
    		"AwsEcsCluster": {
    			"ActiveServicesCount": number,
    			"CapacityProviders": ["string"],
    			"ClusterArn": "string",
    			"ClusterName": "string",
    			"ClusterSettings": [{
    				"Name": "string",
    				"Value": "string"
    			}],
    			"Configuration": {
    				"ExecuteCommandConfiguration": {
    					"KmsKeyId": "string",
    					"LogConfiguration": {
    						"CloudWatchEncryptionEnabled": boolean,
    						"CloudWatchLogGroupName": "string",
    						"S3BucketName": "string",
    						"S3EncryptionEnabled": boolean,
    						"S3KeyPrefix": "string"
    					},
    					"Logging": "string"
    				}
    			},
    			"DefaultCapacityProviderStrategy": [{
    				"Base": number,
    				"CapacityProvider": "string",
    				"Weight": number
    			}],
    			"RegisteredContainerInstancesCount": number,
    			"RunningTasksCount": number,
    			"Status": "string"
    		},
    		"AwsEcsContainer": {
    			"Image": "string",
    			"MountPoints": [{
    				"ContainerPath": "string",
    				"SourceVolume": "string"
    			}],
    			"Name": "string",
    			"Privileged": boolean
    		},
    		"AwsEcsService": {
    			"CapacityProviderStrategy": [{
    				"Base": number,
    				"CapacityProvider": "string",
    				"Weight": number
    			}],
    			"Cluster": "string",
    			"DeploymentConfiguration": {
    				"DeploymentCircuitBreaker": {
    					"Enable": boolean,
    					"Rollback": boolean
    				},
    				"MaximumPercent": number,
    				"MinimumHealthyPercent": number
    			},
    			"DeploymentController": {
    				"Type": "string"
    			},
    			"DesiredCount": number,
    			"EnableEcsManagedTags": boolean,
    			"EnableExecuteCommand": boolean,
    			"HealthCheckGracePeriodSeconds": number,
    			"LaunchType": "string",
    			"LoadBalancers": [{
    				"ContainerName": "string",
    				"ContainerPort": number,
    				"LoadBalancerName": "string",
    				"TargetGroupArn": "string"
    			}],
    			"Name": "string",
    			"NetworkConfiguration": {
    				"AwsVpcConfiguration": {
    					"AssignPublicIp": "string",
    					"SecurityGroups": ["string"],
    					"Subnets": ["string"]
    				}
    			},
    			"PlacementConstraints": [{
    				"Expression": "string",
    				"Type": "string"
    			}],
    			"PlacementStrategies": [{
    				"Field": "string",
    				"Type": "string"
    			}],
    			"PlatformVersion": "string",
    			"PropagateTags": "string",
    			"Role": "string",
    			"SchedulingStrategy": "string",
    			"ServiceArn": "string",
    			"ServiceName": "string",
    			"ServiceRegistries": [{
    				"ContainerName": "string",
    				"ContainerPort": number,
    				"Port": number,
    				"RegistryArn": "string"
    			}],
    			"TaskDefinition": "string"
    		},
    		"AwsEcsTask": {
    			"CreatedAt": "string",
    			"ClusterArn": "string",
    			"Group": "string",
    			"StartedAt": "string",
    			"StartedBy": "string",
    			"TaskDefinitionArn": "string",
    			"Version": number,
    			"Volumes": [{
    				"Name": "string",
    				"Host": {
    					"SourcePath": "string"
    				}
    			}],
    			"Containers": [{
    				"Image": "string",
    				"MountPoints": [{
    					"ContainerPath": "string",
    					"SourceVolume": "string"
    				}],
    				"Name": "string",
    				"Privileged": boolean
    			}]
    		},
    		"AwsEcsTaskDefinition": {
    			"ContainerDefinitions": [{
    				"Command": ["string"],
    				"Cpu": number,
    				"DependsOn": [{
    					"Condition": "string",
    					"ContainerName": "string"
    				}],
    				"DisableNetworking": boolean,
    				"DnsSearchDomains": ["string"],
    				"DnsServers": ["string"],
    				"DockerLabels": {
    					"string": "string"
    				},
    				"DockerSecurityOptions": ["string"],
    				"EntryPoint": ["string"],
    				"Environment": [{
    					"Name": "string",
    					"Value": "string"
    				}],
    				"EnvironmentFiles": [{
    					"Type": "string",
    					"Value": "string"
    				}],
    				"Essential": boolean,
    				"ExtraHosts": [{
    					"Hostname": "string",
    					"IpAddress": "string"
    				}],
    				"FirelensConfiguration": {
    					"Options": {
    						"string": "string"
    					},
    					"Type": "string"
    				},
    				"HealthCheck": {
    					"Command": ["string"],
    					"Interval": number,
    					"Retries": number,
    					"StartPeriod": number,
    					"Timeout": number
    				},
    				"Hostname": "string",
    				"Image": "string",
    				"Interactive": boolean,
    				"Links": ["string"],
    				"LinuxParameters": {
    					"Capabilities": {
    						"Add": ["string"],
    						"Drop": ["string"]
    					},
    					"Devices": [{
    						"ContainerPath": "string",
    						"HostPath": "string",
    						"Permissions": ["string"]
    					}],
    					"InitProcessEnabled": boolean,
    					"MaxSwap": number,
    					"SharedMemorySize": number,
    					"Swappiness": number,
    					"Tmpfs": [{
    						"ContainerPath": "string",
    						"MountOptions": ["string"],
    						"Size": number
    					}]
    				},
    				"LogConfiguration": {
    					"LogDriver": "string",
    					"Options": {
    						"string": "string"
    					},
    					"SecretOptions": [{
    						"Name": "string",
    						"ValueFrom": "string"
    					}]
    				},
    				"Memory": number,
    				"MemoryReservation": number,
    				"MountPoints": [{
    					"ContainerPath": "string",
    					"ReadOnly": boolean,
    					"SourceVolume": "string"
    				}],
    				"Name": "string",
    				"PortMappings": [{
    					"ContainerPort": number,
    					"HostPort": number,
    					"Protocol": "string"
    				}],
    				"Privileged": boolean,
    				"PseudoTerminal": boolean,
    				"ReadonlyRootFilesystem": boolean,
    				"RepositoryCredentials": {
    					"CredentialsParameter": "string"
    				},
    				"ResourceRequirements": [{
    					"Type": "string",
    					"Value": "string"
    				}],
    				"Secrets": [{
    					"Name": "string",
    					"ValueFrom": "string"
    				}],
    				"StartTimeout": number,
    				"StopTimeout": number,
    				"SystemControls": [{
    					"Namespace": "string",
    					"Value": "string"
    				}],
    				"Ulimits": [{
    					"HardLimit": number,
    					"Name": "string",
    					"SoftLimit": number
    				}],
    				"User": "string",
    				"VolumesFrom": [{
    					"ReadOnly": boolean,
    					"SourceContainer": "string"
    				}],
    				"WorkingDirectory": "string"
    			}],
    			"Cpu": "string",
    			"ExecutionRoleArn": "string",
    			"Family": "string",
    			"InferenceAccelerators": [{
    				"DeviceName": "string",
    				"DeviceType": "string"
    			}],
    			"IpcMode": "string",
    			"Memory": "string",
    			"NetworkMode": "string",
    			"PidMode": "string",
    			"PlacementConstraints": [{
    				"Expression": "string",
    				"Type": "string"
    			}],
    			"ProxyConfiguration": {
    				"ContainerName": "string",
    				"ProxyConfigurationProperties": [{
    					"Name": "string",
    					"Value": "string"
    				}],
    				"Type": "string"
    			},
    			"RequiresCompatibilities": ["string"],
    			"Status": "string",
    			"TaskRoleArn": "string",
    			"Volumes": [{
    				"DockerVolumeConfiguration": {
    					"Autoprovision": boolean,
    					"Driver": "string",
    					"DriverOpts": {
    						"string": "string"
    					},
    					"Labels": {
    						"string": "string"
    					},
    					"Scope": "string"
    				},
    				"EfsVolumeConfiguration": {
    					"AuthorizationConfig": {
    						"AccessPointId": "string",
    						"Iam": "string"
    					},
    					"FilesystemId": "string",
    					"RootDirectory": "string",
    					"TransitEncryption": "string",
    					"TransitEncryptionPort": number
    				},
    				"Host": {
    					"SourcePath": "string"
    				},
    				"Name": "string"
    			}]
    		},
    		"AwsEfsAccessPoint": {
    			"AccessPointId": "string",
    			"Arn": "string",
    			"ClientToken": "string",
    			"FileSystemId": "string",
    			"PosixUser": {
    				"Gid": "string",
    				"SecondaryGids": ["string"],
    				"Uid": "string"
    			},
    			"RootDirectory": {
    				"CreationInfo": {
    					"OwnerGid": "string",
    					"OwnerUid": "string",
    					"Permissions": "string"
    				},
    				"Path": "string"
    			}
    		},
    		"AwsEksCluster": {
    			"Arn": "string",
    			"CertificateAuthorityData": "string",
    			"ClusterStatus": "string",
    			"Endpoint": "string",
    			"Logging": {
    				"ClusterLogging": [{
    					"Enabled": boolean,
    					"Types": ["string"]
    				}]
    			},
    			"Name": "string",
    			"ResourcesVpcConfig": {
    				"EndpointPublicAccess": boolean,
    				"SecurityGroupIds": ["string"],
    				"SubnetIds": ["string"]
    			},
    			"RoleArn": "string",
    			"Version": "string"
    		},
    		"AwsElasticBeanstalkEnvironment": {
    			"ApplicationName": "string",
    			"Cname": "string",
    			"DateCreated": "string",
    			"DateUpdated": "string",
    			"Description": "string",
    			"EndpointUrl": "string",
    			"EnvironmentArn": "string",
    			"EnvironmentId": "string",
    			"EnvironmentLinks": [{
    				"EnvironmentName": "string",
    				"LinkName": "string"
    			}],
    			"EnvironmentName": "string",
    			"OptionSettings": [{
    				"Namespace": "string",
    				"OptionName": "string",
    				"ResourceName": "string",
    				"Value": "string"
    			}],
    			"PlatformArn": "string",
    			"SolutionStackName": "string",
    			"Status": "string",
    			"Tier": {
    				"Name": "string",
    				"Type": "string",
    				"Version": "string"
    			},
    			"VersionLabel": "string"
    		},
    		"AwsElasticSearchDomain": {
    			"AccessPolicies": "string",
    			"DomainStatus": {
    				"DomainId": "string",
    				"DomainName": "string",
    				"Endpoint": "string",
    				"Endpoints": {
    					"string": "string"
    				}
    			},
    			"DomainEndpointOptions": {
    				"EnforceHTTPS": boolean,
    				"TLSSecurityPolicy": "string"
    			},
    			"ElasticsearchClusterConfig": {
    				"DedicatedMasterCount": number,
    				"DedicatedMasterEnabled": boolean,
    				"DedicatedMasterType": "string",
    				"InstanceCount": number,
    				"InstanceType": "string",
    				"ZoneAwarenessConfig": {
    					"AvailabilityZoneCount": number
    				},
    				"ZoneAwarenessEnabled": boolean
    			},
    			"ElasticsearchVersion": "string",
    			"EncryptionAtRestOptions": {
    				"Enabled": boolean,
    				"KmsKeyId": "string"
    			},
    			"LogPublishingOptions": {
    				"AuditLogs": {
    					"CloudWatchLogsLogGroupArn": "string",
    					"Enabled": boolean
    				},
    				"IndexSlowLogs": {
    					"CloudWatchLogsLogGroupArn": "string",
    					"Enabled": boolean
    				},
    				"SearchSlowLogs": {
    					"CloudWatchLogsLogGroupArn": "string",
    					"Enabled": boolean
    				}
    			},
    			"NodeToNodeEncryptionOptions": {
    				"Enabled": boolean
    			},
    			"ServiceSoftwareOptions": {
    				"AutomatedUpdateDate": "string",
    				"Cancellable": boolean,
    				"CurrentVersion": "string",
    				"Description": "string",
    				"NewVersion": "string",
    				"UpdateAvailable": boolean,
    				"UpdateStatus": "string"
    			},
    			"VPCOptions": {
    				"AvailabilityZones": [
    					"string"
    				],
    				"SecurityGroupIds": [
    					"string"
    				],
    				"SubnetIds": [
    					"string"
    				],
    				"VPCId": "string"
    			}
    		},
    		"AwsElbLoadBalancer": {
    			"AvailabilityZones": ["string"],
    			"BackendServerDescriptions": [{
    				"InstancePort": number,
    				"PolicyNames": ["string"]
    			}],
    			"CanonicalHostedZoneName": "string",
    			"CanonicalHostedZoneNameID": "string",
    			"CreatedTime": "string",
    			"DnsName": "string",
    			"HealthCheck": {
    				"HealthyThreshold": number,
    				"Interval": number,
    				"Target": "string",
    				"Timeout": number,
    				"UnhealthyThreshold": number
    			},
    			"Instances": [{
    				"InstanceId": "string"
    			}],
    			"ListenerDescriptions": [{
    				"Listener": {
    					"InstancePort": number,
    					"InstanceProtocol": "string",
    					"LoadBalancerPort": number,
    					"Protocol": "string",
    					"SslCertificateId": "string"
    				},
    				"PolicyNames": ["string"]
    			}],
    			"LoadBalancerAttributes": {
    				"AccessLog": {
    					"EmitInterval": number,
    					"Enabled": boolean,
    					"S3BucketName": "string",
    					"S3BucketPrefix": "string"
    				},
    				"ConnectionDraining": {
    					"Enabled": boolean,
    					"Timeout": number
    				},
    				"ConnectionSettings": {
    					"IdleTimeout": number
    				},
    				"CrossZoneLoadBalancing": {
    					"Enabled": boolean
    				},
    				"AdditionalAttributes": [{
                        "Key": "string",
                        "Value": "string"
                    }]
    			},
    			"LoadBalancerName": "string",
    			"Policies": {
    				"AppCookieStickinessPolicies": [{
    					"CookieName": "string",
    					"PolicyName": "string"
    				}],
    				"LbCookieStickinessPolicies": [{
    					"CookieExpirationPeriod": number,
    					"PolicyName": "string"
    				}],
    				"OtherPolicies": ["string"]
    			},
    			"Scheme": "string",
    			"SecurityGroups": ["string"],
    			"SourceSecurityGroup": {
    				"GroupName": "string",
    				"OwnerAlias": "string"
    			},
    			"Subnets": ["string"],
    			"VpcId": "string"
    		},
    		"AwsElbv2LoadBalancer": {
    			"AvailabilityZones": {
    				"SubnetId": "string",
    				"ZoneName": "string"
    			},
    			"CanonicalHostedZoneId": "string",
    			"CreatedTime": "string",
    			"DNSName": "string",
    			"IpAddressType": "string",
    			"LoadBalancerAttributes": [{
    				"Key": "string",
    				"Value": "string"
    			}],
    			"Scheme": "string",
    			"SecurityGroups": ["string"],
    			"State": {
    				"Code": "string",
    				"Reason": "string"
    			},
    			"Type": "string",
    			"VpcId": "string"
    		},
    		"AwsEventSchemasRegistry": {
    			"Description": "string",
    			"RegistryArn": "string",
    			"RegistryName": "string"
    		},
    		"AwsEventsEndpoint": {
    			"Arn": "string",
    			"Description": "string",
    			"EndpointId": "string",
    			"EndpointUrl": "string",
    			"EventBuses": [
        			{
            			"EventBusArn": "string"
        			},
        			{
            			"EventBusArn": "string"
        			}
    			],
    			"Name": "string",
    			"ReplicationConfig": {
        			"State": "string"
    			},
    			"RoleArn": "string",
    			"RoutingConfig": {
        			"FailoverConfig": {
            			"Primary": {
                			"HealthCheck": "string"
            			},
            			"Secondary": {
                			"Route": "string"
            			}
        			}
    			},
    			"State": "string"
    		},
    		"AwsEventsEventBus": {
    			"Arn": "string",
    			"Name": "string",
    			"Policy": "string"
    		},
    		"AwsGuardDutyDetector": {
    			"FindingPublishingFrequency": "string",
    			"ServiceRole": "string",
    			"Status": "string",
    			"DataSources": {
    				"CloudTrail": {
    					"Status": "string"
    				},
    				"DnsLogs": {
    					"Status": "string"
    				},
    				"FlowLogs": {
    					"Status": "string"
    				},
    				"S3Logs": {
    					"Status": "string"
    				},
    				"Kubernetes": {
    					"AuditLogs": {
    						"Status": "string"
    					}
    				},
    				"MalwareProtection": {
    					"ScanEc2InstanceWithFindings": {
    						"EbsVolumes": {
    							"Status": "string"
    						}
    					},
    					"ServiceRole": "string"
    				}
    			}
    		},
    		"AwsIamAccessKey": {
    			"AccessKeyId": "string",
    			"AccountId": "string",
    			"CreatedAt": "string",
    			"PrincipalId": "string",
    			"PrincipalName": "string",
    			"PrincipalType": "string",
    			"SessionContext": {
    				"Attributes": {
    					"CreationDate": "string",
    					"MfaAuthenticated": boolean
    				},
    				"SessionIssuer": {
    					"AccountId": "string",
    					"Arn": "string",
    					"PrincipalId": "string",
    					"Type": "string",
    					"UserName": "string"
    				}
    			},
    			"Status": "string"
    		},
    		"AwsIamGroup": {
    			"AttachedManagedPolicies": [{
    				"PolicyArn": "string",
    				"PolicyName": "string"
    			}],
    			"CreateDate": "string",
    			"GroupId": "string",
    			"GroupName": "string",
    			"GroupPolicyList": [{
    				"PolicyName": "string"
    			}],
    			"Path": "string"
    		},
    		"AwsIamPolicy": {
    			"AttachmentCount": number,
    			"CreateDate": "string",
    			"DefaultVersionId": "string",
    			"Description": "string",
    			"IsAttachable": boolean,
    			"Path": "string",
    			"PermissionsBoundaryUsageCount": number,
    			"PolicyId": "string",
    			"PolicyName": "string",
    			"PolicyVersionList": [{
    				"CreateDate": "string",
    				"IsDefaultVersion": boolean,
    				"VersionId": "string"
    			}],
    			"UpdateDate": "string"
    		},
    		"AwsIamRole": {
    			"AssumeRolePolicyDocument": "string",
    			"AttachedManagedPolicies": [{
    				"PolicyArn": "string",
    				"PolicyName": "string"
    			}],
    			"CreateDate": "string",
    			"InstanceProfileList": [{
    				"Arn": "string",
    				"CreateDate": "string",
    				"InstanceProfileId": "string",
    				"InstanceProfileName": "string",
    				"Path": "string",
    				"Roles": [{
    					"Arn": "string",
    					"AssumeRolePolicyDocument": "string",
    					"CreateDate": "string",
    					"Path": "string",
    					"RoleId": "string",
    					"RoleName": "string"
    				}]
    			}],
    			"MaxSessionDuration": number,
    			"Path": "string",
    			"PermissionsBoundary": {
    				"PermissionsBoundaryArn": "string",
    				"PermissionsBoundaryType": "string"
    			},
    			"RoleId": "string",
    			"RoleName": "string",
    			"RolePolicyList": [{
    				"PolicyName": "string"
    			}]
    		},
    		"AwsIamUser": {
    			"AttachedManagedPolicies": [{
    				"PolicyArn": "string",
    				"PolicyName": "string"
    			}],
    			"CreateDate": "string",
    			"GroupList": ["string"],
    			"Path": "string",
    			"PermissionsBoundary": {
    				"PermissionsBoundaryArn": "string",
    				"PermissionsBoundaryType": "string"
    			},
    			"UserId": "string",
    			"UserName": "string",
    			"UserPolicyList": [{
    				"PolicyName": "string"
    			}]
    		},
    		"AwsKinesisStream": {
    			"Arn": "string",
    			"Name": "string",
    			"RetentionPeriodHours": number,
    			"ShardCount": number,
    			"StreamEncryption": {
    				"EncryptionType": "string",
    				"KeyId": "string"
    			}
    		},
    		"AwsKmsKey": {
    			"AWSAccountId": "string",
    			"CreationDate": "string",
    			"Description": "string",
    			"KeyId": "string",
    			"KeyManager": "string",
    			"KeyRotationStatus": boolean,
    			"KeyState": "string",
    			"Origin": "string"
    		},
    		"AwsLambdaFunction": {
    			"Architectures": [
    				"string"
    			],
    			"Code": {
    				"S3Bucket": "string",
    				"S3Key": "string",
    				"S3ObjectVersion": "string",
    				"ZipFile": "string"
    			},
    			"CodeSha256": "string",
    			"DeadLetterConfig": {
    				"TargetArn": "string"
    			},
    			"Environment": {
    				"Variables": {
    					"Stage": "string"
    				},
    				"Error": {
    					"ErrorCode": "string",
    					"Message": "string"
    				}
    			},
    			"FunctionName": "string",
    			"Handler": "string",
    			"KmsKeyArn": "string",
    			"LastModified": "string",
    			"Layers": {
    				"Arn": "string",
    				"CodeSize": number
    			},
    			"PackageType": "string",
    			"RevisionId": "string",
    			"Role": "string",
    			"Runtime": "string",
    			"Timeout": integer,
    			"TracingConfig": {
    				"Mode": "string"
    			},
    			"Version": "string",
    			"VpcConfig": {
    				"SecurityGroupIds": ["string"],
    				"SubnetIds": ["string"]
    			},
    			"MasterArn": "string",
    			"MemorySize": number
    		},
    		"AwsLambdaLayerVersion": {
    			"CompatibleRuntimes": [
    				"string"
    			],
    			"CreatedDate": "string",
    			"Version": number
    		},
    		"AwsMskCluster": {
    			"ClusterInfo": {
    				"ClientAuthentication": {
    					"Sasl": {
    						"Scram": {
    							"Enabled": boolean
    						},
    						"Iam": {
    							"Enabled": boolean
    						}
    					},
    					"Tls": {
    						"CertificateAuthorityArnList": [],
    						"Enabled": boolean
    					},
    					"Unauthenticated": {
    						"Enabled": boolean
    					}
    				},
    				"ClusterName": "string",
    				"CurrentVersion": "string",
    				"EncryptionInfo": {
    					"EncryptionAtRest": {
    						"DataVolumeKMSKeyId": "string"
    					},
    					"EncryptionInTransit": {
    						"ClientBroker": "string",
    						"InCluster": boolean
    					}
    				},
    				"EnhancedMonitoring": "string",
    				"NumberOfBrokerNodes": integer
    			}
    		},
    		"AwsNetworkFirewallFirewall": {
    			"DeleteProtection": boolean,
    			"Description": "string",
    			"FirewallArn": "string",
    			"FirewallId": "string",
    			"FirewallName": "string",
    			"FirewallPolicyArn": "string",
    			"FirewallPolicyChangeProtection": boolean,
    			"SubnetChangeProtection": boolean,
    			"SubnetMappings": [{
    				"SubnetId": "string"
    			}],
    			"VpcId": "string"
    		},
    		"AwsNetworkFirewallFirewallPolicy": {
    			"Description": "string",
    			"FirewallPolicy": {
    				"StatefulRuleGroupReferences": [{
    					"ResourceArn": "string"
    				}],
    				"StatelessCustomActions": [{
    					"ActionDefinition": {
    						"PublishMetricAction": {
    							"Dimensions": [{
    								"Value": "string"
    							}]
    						}
    					},
    					"ActionName": "string"
    				}],
    				"StatelessDefaultActions": ["string"],
    				"StatelessFragmentDefaultActions": ["string"],
    				"StatelessRuleGroupReferences": [{
    					"Priority": number,
    					"ResourceArn": "string"
    				}]
    			},
    			"FirewallPolicyArn": "string",
    			"FirewallPolicyId": "string",
    			"FirewallPolicyName": "string"
    		},
    		"AwsNetworkFirewallRuleGroup": {
    			"Capacity": number,
    			"Description": "string",
    			"RuleGroup": {
    				"RulesSource": {
    					"RulesSourceList": {
    						"GeneratedRulesType": "string",
    						"Targets": ["string"],
    						"TargetTypes": ["string"]
    					},
    					"RulesString": "string",
    					"StatefulRules": [{
    						"Action": "string",
    						"Header": {
    							"Destination": "string",
    							"DestinationPort": "string",
    							"Direction": "string",
    							"Protocol": "string",
    							"Source": "string",
    							"SourcePort": "string"
    						},
    						"RuleOptions": [{
    							"Keyword": "string",
    							"Settings": ["string"]
    						}]
    					}],
    					"StatelessRulesAndCustomActions": {
    						"CustomActions": [{
    							"ActionDefinition": {
    								"PublishMetricAction": {
    									"Dimensions": [{
    										"Value": "string"
    									}]
    								}
    							},
    							"ActionName": "string"
    						}],
    						"StatelessRules": [{
    							"Priority": number,
    							"RuleDefinition": {
    								"Actions": ["string"],
    								"MatchAttributes": {
    									"DestinationPorts": [{
    										"FromPort": number,
    										"ToPort": number
    									}],
    									"Destinations": [{
    										"AddressDefinition": "string"
    									}],
    									"Protocols": [number],
    									"SourcePorts": [{
    										"FromPort": number,
    										"ToPort": number
    									}],
    									"Sources": [{
    										"AddressDefinition": "string"
    									}],
    									"TcpFlags": [{
    										"Flags": ["string"],
    										"Masks": ["string"]
    									}]
    								}
    							}
    						}]
    					}
    				},
    				"RuleVariables": {
    					"IpSets": {
    						"Definition": ["string"]
    					},
    					"PortSets": {
    						"Definition": ["string"]
    					}
    				}
    			},
    			"RuleGroupArn": "string",
    			"RuleGroupId": "string",
    			"RuleGroupName": "string",
    			"Type": "string"
    		},
    		"AwsOpenSearchServiceDomain": {
    			"AccessPolicies": "string",
    			"AdvancedSecurityOptions": {
    				"Enabled": boolean,
    				"InternalUserDatabaseEnabled": boolean,
    				"MasterUserOptions": {
    					"MasterUserArn": "string",
    					"MasterUserName": "string",
    					"MasterUserPassword": "string"
    				}
    			},
    			"Arn": "string",
    			"ClusterConfig": {
    				"DedicatedMasterCount": number,
    				"DedicatedMasterEnabled": boolean,
    				"DedicatedMasterType": "string",
    				"InstanceCount": number,
    				"InstanceType": "string",
    				"WarmCount": number,
    				"WarmEnabled": boolean,
    				"WarmType": "string",
    				"ZoneAwarenessConfig": {
    					"AvailabilityZoneCount": number
    				},
    				"ZoneAwarenessEnabled": boolean
    			},
    			"DomainEndpoint": "string",
    			"DomainEndpointOptions": {
    				"CustomEndpoint": "string",
    				"CustomEndpointCertificateArn": "string",
    				"CustomEndpointEnabled": boolean,
    				"EnforceHTTPS": boolean,
    				"TLSSecurityPolicy": "string"
    			},
    			"DomainEndpoints": {
    				"string": "string"
    			},
    			"DomainName": "string",
    			"EncryptionAtRestOptions": {
    				"Enabled": boolean,
    				"KmsKeyId": "string"
    			},
    			"EngineVersion": "string",
    			"Id": "string",
    			"LogPublishingOptions": {
    				"AuditLogs": {
    					"CloudWatchLogsLogGroupArn": "string",
    					"Enabled": boolean
    				},
    				"IndexSlowLogs": {
    					"CloudWatchLogsLogGroupArn": "string",
    					"Enabled": boolean
    				},
    				"SearchSlowLogs": {
    					"CloudWatchLogsLogGroupArn": "string",
    					"Enabled": boolean
    				}
    			},
    			"NodeToNodeEncryptionOptions": {
    				"Enabled": boolean
    			},
    			"ServiceSoftwareOptions": {
    				"AutomatedUpdateDate": "string",
    				"Cancellable": boolean,
    				"CurrentVersion": "string",
    				"Description": "string",
    				"NewVersion": "string",
    				"OptionalDeployment": boolean,
    				"UpdateAvailable": boolean,
    				"UpdateStatus": "string"
    			},
    			"VpcOptions": {
    				"SecurityGroupIds": ["string"],
    				"SubnetIds": ["string"]
    			}
    		},
    		"AwsRdsDbCluster": {
    			"ActivityStreamStatus": "string",
    			"AllocatedStorage": number,
    			"AssociatedRoles": [{
    				"RoleArn": "string",
    				"Status": "string"
    			}],
    			"AutoMinorVersionUpgrade": boolean,
    			"AvailabilityZones": ["string"],
    			"BackupRetentionPeriod": integer,
    			"ClusterCreateTime": "string",
    			"CopyTagsToSnapshot": boolean,
    			"CrossAccountClone": boolean,
    			"CustomEndpoints": ["string"],
    			"DatabaseName": "string",
    			"DbClusterIdentifier": "string",
    			"DbClusterMembers": [{
    				"DbClusterParameterGroupStatus": "string",
    				"DbInstanceIdentifier": "string",
    				"IsClusterWriter": boolean,
    				"PromotionTier": integer
    			}],
    			"DbClusterOptionGroupMemberships": [{
    				"DbClusterOptionGroupName": "string",
    				"Status": "string"
    			}],
    			"DbClusterParameterGroup": "string",
    			"DbClusterResourceId": "string",
    			"DbSubnetGroup": "string",
    			"DeletionProtection": boolean,
    			"DomainMemberships": [{
    				"Domain": "string",
    				"Fqdn": "string",
    				"IamRoleName": "string",
    				"Status": "string"
    			}],
    			"EnabledCloudwatchLogsExports": ["string"],
    			"Endpoint": "string",
    			"Engine": "string",
    			"EngineMode": "string",
    			"EngineVersion": "string",
    			"HostedZoneId": "string",
    			"HttpEndpointEnabled": boolean,
    			"IamDatabaseAuthenticationEnabled": boolean,
    			"KmsKeyId": "string",
    			"MasterUsername": "string",
    			"MultiAz": boolean,
    			"Port": integer,
    			"PreferredBackupWindow": "string",
    			"PreferredMaintenanceWindow": "string",
    			"ReaderEndpoint": "string",
    			"ReadReplicaIdentifiers": ["string"],
    			"Status": "string",
    			"StorageEncrypted": boolean,
    			"VpcSecurityGroups": [{
    				"Status": "string",
    				"VpcSecurityGroupId": "string"
    			}]
    		},
    		"AwsRdsDbClusterSnapshot": {
    			"AllocatedStorage": integer,
    			"AvailabilityZones": ["string"],
    			"ClusterCreateTime": "string",
    			"DbClusterIdentifier": "string",
    			"DbClusterSnapshotAttributes": [{
    				"AttributeName": "string",
    				"AttributeValues": ["string"]
    			}],
    			"DbClusterSnapshotIdentifier": "string",
    			"Engine": "string",
    			"EngineVersion": "string",
    			"IamDatabaseAuthenticationEnabled": boolean,
    			"KmsKeyId": "string",
    			"LicenseModel": "string",
    			"MasterUsername": "string",
    			"PercentProgress": integer,
    			"Port": integer,
    			"SnapshotCreateTime": "string",
    			"SnapshotType": "string",
    			"Status": "string",
    			"StorageEncrypted": boolean,
    			"VpcId": "string"
    		},
    		"AwsRdsDbInstance": {
    			"AllocatedStorage": number,
    			"AssociatedRoles": [{
    				"RoleArn": "string",
    				"FeatureName": "string",
    				"Status": "string"
    			}],
    			"AutoMinorVersionUpgrade": boolean,
    			"AvailabilityZone": "string",
    			"BackupRetentionPeriod": number,
    			"CACertificateIdentifier": "string",
    			"CharacterSetName": "string",
    			"CopyTagsToSnapshot": boolean,
    			"DBClusterIdentifier": "string",
    			"DBInstanceClass": "string",
    			"DBInstanceIdentifier": "string",
    			"DbInstancePort": number,
    			"DbInstanceStatus": "string",
    			"DbiResourceId": "string",
    			"DBName": "string",
    			"DbParameterGroups": [{
    				"DbParameterGroupName": "string",
    				"ParameterApplyStatus": "string"
    			}],
    			"DbSecurityGroups": ["string"],
    			"DbSubnetGroup": {
    				"DbSubnetGroupArn": "string",
    				"DbSubnetGroupDescription": "string",
    				"DbSubnetGroupName": "string",
    				"SubnetGroupStatus": "string",
    				"Subnets": [{
    					"SubnetAvailabilityZone": {
    						"Name": "string"
    					},
    					"SubnetIdentifier": "string",
    					"SubnetStatus": "string"
    				}],
    				"VpcId": "string"
    			},
    			"DeletionProtection": boolean,
    			"Endpoint": {
    				"Address": "string",
    				"Port": number,
    				"HostedZoneId": "string"
    			},
    			"DomainMemberships": [{
    				"Domain": "string",
    				"Fqdn": "string",
    				"IamRoleName": "string",
    				"Status": "string"
    			}],
    			"EnabledCloudwatchLogsExports": ["string"],
    			"Engine": "string",
    			"EngineVersion": "string",
    			"EnhancedMonitoringResourceArn": "string",
    			"IAMDatabaseAuthenticationEnabled": boolean,
    			"InstanceCreateTime": "string",
    			"Iops": number,
    			"KmsKeyId": "string",
    			"LatestRestorableTime": "string",
    			"LicenseModel": "string",
    			"ListenerEndpoint": {
    				"Address": "string",
    				"HostedZoneId": "string",
    				"Port": number
    			},
    			"MasterUsername": "admin",
    			"MaxAllocatedStorage": number,
    			"MonitoringInterval": number,
    			"MonitoringRoleArn": "string",
    			"MultiAz": boolean,
    			"OptionGroupMemberships": [{
    				"OptionGroupName": "string",
    				"Status": "string"
    			}],
    			"PendingModifiedValues": {
    				"AllocatedStorage": number,
    				"BackupRetentionPeriod": number,
    				"CaCertificateIdentifier": "string",
    				"DbInstanceClass": "string",
    				"DbInstanceIdentifier": "string",
    				"DbSubnetGroupName": "string",
    				"EngineVersion": "string",
    				"Iops": number,
    				"LicenseModel": "string",
    				"MasterUserPassword": "string",
    				"MultiAZ": boolean,
    				"PendingCloudWatchLogsExports": {
    					"LogTypesToDisable": ["string"],
    					"LogTypesToEnable": ["string"]
    				},
    				"Port": number,
    				"ProcessorFeatures": [{
    					"Name": "string",
    					"Value": "string"
    				}],
    				"StorageType": "string"
    			},
    			"PerformanceInsightsEnabled": boolean,
    			"PerformanceInsightsKmsKeyId": "string",
    			"PerformanceInsightsRetentionPeriod": number,
    			"PreferredBackupWindow": "string",
    			"PreferredMaintenanceWindow": "string",
    			"ProcessorFeatures": [{
    				"Name": "string",
    				"Value": "string"
    			}],
    			"PromotionTier": number,
    			"PubliclyAccessible": boolean,
    			"ReadReplicaDBClusterIdentifiers": ["string"],
    			"ReadReplicaDBInstanceIdentifiers": ["string"],
    			"ReadReplicaSourceDBInstanceIdentifier": "string",
    			"SecondaryAvailabilityZone": "string",
    			"StatusInfos": [{
    				"Message": "string",
    				"Normal": boolean,
    				"Status": "string",
    				"StatusType": "string"
    			}],
    			"StorageEncrypted": boolean,
    			"TdeCredentialArn": "string",
    			"Timezone": "string",
    			"VpcSecurityGroups": [{
    				"VpcSecurityGroupId": "string",
    				"Status": "string"
    			}]
    		},
    		"AwsRdsDbSecurityGroup": {
    			"DbSecurityGroupArn": "string",
    			"DbSecurityGroupDescription": "string",
    			"DbSecurityGroupName": "string",
    			"Ec2SecurityGroups": [{
    				"Ec2SecurityGroupuId": "string",
    				"Ec2SecurityGroupName": "string",
    				"Ec2SecurityGroupOwnerId": "string",
    				"Status": "string"
    			}],
    			"IpRanges": [{
    				"CidrIp": "string",
    				"Status": "string"
    			}],
    			"OwnerId": "string",
    			"VpcId": "string"
    		},
    		"AwsRdsDbSnapshot": {
    			"AllocatedStorage": integer,
    			"AvailabilityZone": "string",
    			"DbInstanceIdentifier": "string",
    			"DbiResourceId": "string",
    			"DbSnapshotIdentifier": "string",
    			"Encrypted": boolean,
    			"Engine": "string",
    			"EngineVersion": "string",
    			"IamDatabaseAuthenticationEnabled": boolean,
    			"InstanceCreateTime": "string",
    			"Iops": number,
    			"KmsKeyId": "string",
    			"LicenseModel": "string",
    			"MasterUsername": "string",
    			"OptionGroupName": "string",
    			"PercentProgress": integer,
    			"Port": integer,
    			"ProcessorFeatures": [],
    			"SnapshotCreateTime": "string",
    			"SnapshotType": "string",
    			"SourceDbSnapshotIdentifier": "string",
    			"SourceRegion": "string",
    			"Status": "string",
    			"StorageType": "string",
    			"TdeCredentialArn": "string",
    			"Timezone": "string",
    			"VpcId": "string"
    		},
    		"AwsRdsEventSubscription": {
    			"CustomerAwsId": "string",
    			"CustSubscriptionId": "string",
    			"Enabled": boolean,
    			"EventCategoriesList": ["string"],
    			"EventSubscriptionArn": "string",
    			"SnsTopicArn": "string",
    			"SourceIdsList": ["string"],
    			"SourceType": "string",
    			"Status": "string",
    			"SubscriptionCreationTime": "string"
    		},
    		"AwsRedshiftCluster": {
    			"AllowVersionUpgrade": boolean,
    			"AutomatedSnapshotRetentionPeriod": number,
    			"AvailabilityZone": "string",
    			"ClusterAvailabilityStatus": "string",
    			"ClusterCreateTime": "string",
    			"ClusterIdentifier": "string",
    			"ClusterNodes": [{
    				"NodeRole": "string",
    				"PrivateIPAddress": "string",
    				"PublicIPAddress": "string"
    			}],
    			"ClusterParameterGroups": [{
    				"ClusterParameterStatusList": [{
    					"ParameterApplyErrorDescription": "string",
    					"ParameterApplyStatus": "string",
    					"ParameterName": "string"
    				}],
    				"ParameterApplyStatus": "string",
    				"ParameterGroupName": "string"
    			}],
    			"ClusterPublicKey": "string",
    			"ClusterRevisionNumber": "string",
    			"ClusterSecurityGroups": [{
    				"ClusterSecurityGroupName": "string",
    				"Status": "string"
    			}],
    			"ClusterSnapshotCopyStatus": {
    				"DestinationRegion": "string",
    				"ManualSnapshotRetentionPeriod": number,
    				"RetentionPeriod": number,
    				"SnapshotCopyGrantName": "string"
    			},
    			"ClusterStatus": "string",
    			"ClusterSubnetGroupName": "string",
    			"ClusterVersion": "string",
    			"DBName": "string",
    			"DeferredMaintenanceWindows": [{
    				"DeferMaintenanceEndTime": "string",
    				"DeferMaintenanceIdentifier": "string",
    				"DeferMaintenanceStartTime": "string"
    			}],
    			"ElasticIpStatus": {
    				"ElasticIp": "string",
    				"Status": "string"
    			},
    			"ElasticResizeNumberOfNodeOptions": "string",
    			"Encrypted": boolean,
    			"Endpoint": {
    				"Address": "string",
    				"Port": number
    			},
    			"EnhancedVpcRouting": boolean,
    			"ExpectedNextSnapshotScheduleTime": "string",
    			"ExpectedNextSnapshotScheduleTimeStatus": "string",
    			"HsmStatus": {
    				"HsmClientCertificateIdentifier": "string",
    				"HsmConfigurationIdentifier": "string",
    				"Status": "string"
    			},
    			"IamRoles": [{
    				"ApplyStatus": "string",
    				"IamRoleArn": "string"
    			}],
    			"KmsKeyId": "string",
    			"LoggingStatus":{
                    "BucketName": "string",
                    "LastFailureMessage": "string",
                    "LastFailureTime": "string",
                    "LastSuccessfulDeliveryTime": "string",
                    "LoggingEnabled": boolean,
                    "S3KeyPrefix": "string"
                },
    			"MaintenanceTrackName": "string",
    			"ManualSnapshotRetentionPeriod": number,
    			"MasterUsername": "string",
    			"NextMaintenanceWindowStartTime": "string",
    			"NodeType": "string",
    			"NumberOfNodes": number,
    			"PendingActions": ["string"],
    			"PendingModifiedValues": {
    				"AutomatedSnapshotRetentionPeriod": number,
    				"ClusterIdentifier": "string",
    				"ClusterType": "string",
    				"ClusterVersion": "string",
    				"EncryptionType": "string",
    				"EnhancedVpcRouting": boolean,
    				"MaintenanceTrackName": "string",
    				"MasterUserPassword": "string",
    				"NodeType": "string",
    				"NumberOfNodes": number,
    				"PubliclyAccessible": "string"
    			},
    			"PreferredMaintenanceWindow": "string",
    			"PubliclyAccessible": boolean,
    			"ResizeInfo": {
    				"AllowCancelResize": boolean,
    				"ResizeType": "string"
    			},
    			"RestoreStatus": {
    				"CurrentRestoreRateInMegaBytesPerSecond": number,
    				"ElapsedTimeInSeconds": number,
    				"EstimatedTimeToCompletionInSeconds": number,
    				"ProgressInMegaBytes": number,
    				"SnapshotSizeInMegaBytes": number,
    				"Status": "string"
    			},
    			"SnapshotScheduleIdentifier": "string",
    			"SnapshotScheduleState": "string",
    			"VpcId": "string",
    			"VpcSecurityGroups": [{
    				"Status": "string",
    				"VpcSecurityGroupId": "string"
    			}]
    		},
    		"AwsRoute53HostedZone": {
    			"HostedZone": {
    				"Id": "string",
    				"Name": "string",
    				"Config": {
    					"Comment": "string"
    				}
    			},
    			"NameServers": ["string"],
    			"QueryLoggingConfig": {
    				"CloudWatchLogsLogGroupArn": {
    					"CloudWatchLogsLogGroupArn": "string",
    					"Id": "string",
    					"HostedZoneId": "string"
    				}
    			},
    			"Vpcs": [
    				{
    					"Id": "string",
    					"Region": "string"
    				}
    			]
    		},
    		"AwsS3AccessPoint": {
    			"AccessPointArn": "string",
    			"Alias": "string",
    			"Bucket": "string",
    			"BucketAccountId": "string",
    			"Name": "string",
    			"NetworkOrigin": "string",
    			"PublicAccessBlockConfiguration": {
    				"BlockPublicAcls": boolean,
    				"BlockPublicPolicy": boolean,
    				"IgnorePublicAcls": boolean,
    				"RestrictPublicBuckets": boolean
    			},
    			"VpcConfiguration": {
    				"VpcId": "string"
    			}
    		},
    		"AwsS3AccountPublicAccessBlock": {
    			"BlockPublicAcls": boolean,
    			"BlockPublicPolicy": boolean,
    			"IgnorePublicAcls": boolean,
    			"RestrictPublicBuckets": boolean
    		},
    		"AwsS3Bucket": {
    			"AccessControlList": "string",
    			"BucketLifecycleConfiguration": {
    				"Rules": [{
    					"AbortIncompleteMultipartUpload": {
    						"DaysAfterInitiation": number
    					},
    					"ExpirationDate": "string",
    					"ExpirationInDays": number,
    					"ExpiredObjectDeleteMarker": boolean,
    					"Filter": {
    						"Predicate": {
    							"Operands": [{
    									"Prefix": "string",
    									"Type": "string"
    								},
    								{
    									"Tag": {
    										"Key": "string",
    										"Value": "string"
    									},
    									"Type": "string"
    								}
    							],
    							"Type": "string"
    						}
    					},
    					"Id": "string",
    					"NoncurrentVersionExpirationInDays": number,
    					"NoncurrentVersionTransitions": [{
    						"Days": number,
    						"StorageClass": "string"
    					}],
    					"Prefix": "string",
    					"Status": "string",
    					"Transitions": [{
    						"Date": "string",
    						"Days": number,
    						"StorageClass": "string"
    					}]
    				}]
    			},
    			"BucketLoggingConfiguration": {
    				"DestinationBucketName": "string",
    				"LogFilePrefix": "string"
    			},
    			"BucketName": "string",
    			"BucketNotificationConfiguration": {
    				"Configurations": [{
    					"Destination": "string",
    					"Events": ["string"],
    					"Filter": {
    						"S3KeyFilter": {
    							"FilterRules": [{
    								"Name": "string",
    								"Value": "string"
    							}]
    						}
    					},
    					"Type": "string"
    				}]
    			},
    			"BucketVersioningConfiguration": {
    				"IsMfaDeleteEnabled": boolean,
    				"Status": "string"
    			},
    			"BucketWebsiteConfiguration": {
    				"ErrorDocument": "string",
    				"IndexDocumentSuffix": "string",
    				"RedirectAllRequestsTo": {
    					"HostName": "string",
    					"Protocol": "string"
    				},
    				"RoutingRules": [{
    					"Condition": {
    						"HttpErrorCodeReturnedEquals": "string",
    						"KeyPrefixEquals": "string"
    					},
    					"Redirect": {
    						"HostName": "string",
    						"HttpRedirectCode": "string",
    						"Protocol": "string",
    						"ReplaceKeyPrefixWith": "string",
    						"ReplaceKeyWith": "string"
    					}
    				}]
    			},
    			"CreatedAt": "string",
    			"ObjectLockConfiguration": {
    				"ObjectLockEnabled": "string",
    				"Rule": {
    					"DefaultRetention": {
    						"Days": integer,
    						"Mode": "string",
    						"Years": integer
    					}
    				}
    			},
    			"OwnerAccountId": "string",
    			"OwnerId": "string",
    			"OwnerName": "string",
    			"PublicAccessBlockConfiguration": {
    				"BlockPublicAcls": boolean,
    				"BlockPublicPolicy": boolean,
    				"IgnorePublicAcls": boolean,
    				"RestrictPublicBuckets": boolean
    			},
    			"ServerSideEncryptionConfiguration": {
    				"Rules": [{
    					"ApplyServerSideEncryptionByDefault": {
    						"KMSMasterKeyID": "string",
    						"SSEAlgorithm": "string"
    					}
    				}]
    			}
    		},
    		"AwsS3Object": {
    			"ContentType": "string",
    			"ETag": "string",
    			"LastModified": "string",
    			"ServerSideEncryption": "string",
    			"SSEKMSKeyId": "string",
    			"VersionId": "string"
    		},
    		"AwsSagemakerNotebookInstance": {
    			"DirectInternetAccess": "string",
    			"InstanceMetadataServiceConfiguration": {
    				"MinimumInstanceMetadataServiceVersion": "string"
    			},
    			"InstanceType": "string",
    			"LastModifiedTime": "string",
    			"NetworkInterfaceId": "string",
    			"NotebookInstanceArn": "string",
    			"NotebookInstanceName": "string",
    			"NotebookInstanceStatus": "string",
    			"PlatformIdentifier": "string",
    			"RoleArn": "string",
    			"RootAccess": "string",
    			"SecurityGroups": ["string"],
    			"SubnetId": "string",
    			"Url": "string",
    			"VolumeSizeInGB": number
    		},
    		"AwsSecretsManagerSecret": {
    			"Deleted": boolean,
    			"Description": "string",
    			"KmsKeyId": "string",
    			"Name": "string",
    			"RotationEnabled": boolean,
    			"RotationLambdaArn": "string",
    			"RotationOccurredWithinFrequency": boolean,
    			"RotationRules": {
    				"AutomaticallyAfterDays": integer
    			}
    		},
    		"AwsSnsTopic": {
    			"ApplicationSuccessFeedbackRoleArn": "string",		
    			"FirehoseFailureFeedbackRoleArn": "string",
    			"FirehoseSuccessFeedbackRoleArn": "string",
    			"HttpFailureFeedbackRoleArn": "string",
    			"HttpSuccessFeedbackRoleArn": "string",
    			"KmsMasterKeyId": "string",                 
    			"Owner": "string",
    			"SqsFailureFeedbackRoleArn": "string",
    			"SqsSuccessFeedbackRoleArn": "string",	
    			"Subscription": {
    				"Endpoint": "string",
    				"Protocol": "string"
    			},
    			"TopicName": "string"   			              
    		},
    		"AwsSqsQueue": {
    			"DeadLetterTargetArn": "string",
    			"KmsDataKeyReusePeriodSeconds": number,
    			"KmsMasterKeyId": "string",
    			"QueueName": "string"
    		},
    		"AwsSsmPatchCompliance": {
    			"Patch": {
    				"ComplianceSummary": {
    					"ComplianceType": "string",
    					"CompliantCriticalCount": integer,
    					"CompliantHighCount": integer,
    					"CompliantInformationalCount": integer,
    					"CompliantLowCount": integer,
    					"CompliantMediumCount": integer,
    					"CompliantUnspecifiedCount": integer,
    					"ExecutionType": "string",
    					"NonCompliantCriticalCount": integer,
    					"NonCompliantHighCount": integer,
    					"NonCompliantInformationalCount": integer,
    					"NonCompliantLowCount": integer,
    					"NonCompliantMediumCount": integer,
    					"NonCompliantUnspecifiedCount": integer,
    					"OverallSeverity": "string",
    					"PatchBaselineId": "string",
    					"PatchGroup": "string",
    					"Status": "string"
    				}
    			}
    		},
    		"AwsStepFunctionStateMachine": {
    			"StateMachineArn": "string",
    			"Name": "string",
    			"Status": "string",
    			"RoleArn": "string",
    			"Type": "string",
    			"LoggingConfiguration": {
    				"Level": "string",
    				"IncludeExecutionData": boolean
    			},
    			"TracingConfiguration": {
    				"Enabled": boolean
    			}
    		},
    		"AwsWafRateBasedRule": {
    			"MatchPredicates": [{
    				"DataId": "string",
    				"Negated": boolean,
    				"Type": "string"
    			}],
    			"MetricName": "string",
    			"Name": "string",
    			"RateKey": "string",
    			"RateLimit": number,
    			"RuleId": "string"
    		},
    		"AwsWafRegionalRateBasedRule": {
    			"MatchPredicates": [{
    				"DataId": "string",
    				"Negated": boolean,
    				"Type": "string"
    			}],
    			"MetricName": "string",
    			"Name": "string",
    			"RateKey": "string",
    			"RateLimit": number,
    			"RuleId": "string"
    		},
    		"AwsWafRegionalRule": {
    			"MetricName": "string",
    			"Name": "string",
    			"RuleId": "string",
    			"PredicateList": [{
        			"DataId": "string",
        			"Negated": boolean,
        			"Type": "string"
    			}]
    		},
    		"AwsWafRegionalRuleGroup": {
    			"MetricName": "string",
    			"Name": "string",
    			"RuleGroupId": "string",
    			"Rules": [{
    				"Action": {
    					"Type": "string"
    				},
    				"Priority": number,
    				"RuleId": "string",
    				"Type": "string"
    			}]
    		},
    		"AwsWafRegionalWebAcl": {
    			"DefaultAction": "string",
    			"MetricName" : "string",
    			"Name": "string",
    			"RulesList" : [{
    				"Action": {
    					"Type": "string"
    				},
    				"Priority": number,
    				"RuleId": "string",
    				"Type": "string",
    				"ExcludedRules": [{
    					"ExclusionType": "string",
    					"RuleId": "string"
    				}],
    				"OverrideAction": {
    					"Type": "string"
    				}
    			}],
    			"WebAclId": "string"
    		},
    		"AwsWafRule": {
    			"MetricName": "string",
    			"Name": "string",
    			"PredicateList": [{
    				"DataId": "string",
    				"Negated": boolean,
    				"Type": "string"
    			}],
    			"RuleId": "string"
    		},
    		"AwsWafRuleGroup": {
    			"MetricName": "string",
    			"Name": "string",
    			"RuleGroupId": "string",
    			"Rules": [{
    				"Action": {
    					"Type": "string"
    				},
    				"Priority": number,
    				"RuleId": "string",
    				"Type": "string"
    			}]
    		},
    		"AwsWafv2RuleGroup": {
    			"Arn": "string",
    			"Capacity": number,
    			"Description": "string",
    			"Id": "string",
    			"Name": "string",
    			"Rules": [{
    				"Action": {
    				"Allow": {
    					"CustomRequestHandling": {
    						"InsertHeaders": [
    							{
    							"Name": "string",
    							"Value": "string"
    							},
    							{
    							"Name": "string",
    							"Value": "string"
    							}
    						]
    					}
    				}
    				},
    				"Name": "string",
    				"Priority": number,
    				"VisibilityConfig": {
    					"CloudWatchMetricsEnabled": boolean,
    					"MetricName": "string",
    					"SampledRequestsEnabled": boolean
    				}
    			}],
    			"VisibilityConfig": {
    				"CloudWatchMetricsEnabled": boolean,
    				"MetricName": "string",
    				"SampledRequestsEnabled": boolean
    			}
    		},
    		"AwsWafWebAcl": {
    			"DefaultAction": "string",
    			"Name": "string",
    			"Rules": [{
    				"Action": {
    					"Type": "string"
    				},
    				"ExcludedRules": [{
    					"RuleId": "string"
    				}],
    				"OverrideAction": {
    					"Type": "string"
    				},
    				"Priority": number,
    				"RuleId": "string",
    				"Type": "string"
    			}],
    			"WebAclId": "string"
    		},
    		"AwsWafv2WebAcl": {
    			"Arn": "string",
    			"Capacity": number,
    			"CaptchaConfig": {
    				"ImmunityTimeProperty": {
    					"ImmunityTime": number
    				}
    			},
    			"DefaultAction": {
    				"Block": {}
    			},
    			"Description": "string",
    			"ManagedbyFirewallManager": boolean,
    			"Name": "string",
    			"Rules": [{
    				"Action": {
    					"RuleAction": {
    						"Block": {}
    					}
    				},
    				"Name": "string",
    				"Priority": number,
    				"VisibilityConfig": {
    					"SampledRequestsEnabled": boolean,
    					"CloudWatchMetricsEnabled": boolean,
    					"MetricName": "string"
    				}
    			}],
    			"VisibilityConfig": {
    				"SampledRequestsEnabled": boolean,
    				"CloudWatchMetricsEnabled": boolean,
    				"MetricName": "string"
    			}
    		},
    		"AwsXrayEncryptionConfig": {
    			"KeyId": "string",
    			"Status": "string",
    			"Type": "string"
    		},
    		"CodeRepository": {
    			"CodeSecurityIntegrationArn": "string",
    			"ProjectName": "string",
    			"ProviderType": "string"
    		},
    		"Container": {
    			"ContainerRuntime": "string",
    			"ImageId": "string",
    			"ImageName": "string",
    			"LaunchedAt": "string",
    			"Name": "string",
    			"Privileged": boolean,
    			"VolumeMounts": [{
    				"Name": "string",
    				"MountPath": "string"
    			}]
    		}, 
    		"Other": {
    			"string": "string"
    		},
    		"Id": "string",
    		"Partition": "string",
    		"Region": "string",
    		"ResourceRole": "string",
    		"Tags": {
    			"string": "string"
    		},
    		"Type": "string"
    	}],
    	"SchemaVersion": "string",
    	"Severity": {
    		"Label": "string",
    		"Normalized": number,
    		"Original": "string"
    	},
    	"Sample": boolean,
    	"SourceUrl": "string",
    	"Threats": [{
    		"FilePaths": [{
    			"FileName": "string",
    			"FilePath": "string",
    			"Hash": "string",
    			"ResourceId": "string"
    		}],
    		"ItemCount": number,
    		"Name": "string",
    		"Severity": "string"
    	}],
    	"ThreatIntelIndicators": [{
    		"Category": "string",
    		"LastObservedAt": "string",
    		"Source": "string",
    		"SourceUrl": "string",
    		"Type": "string",
    		"Value": "string"
    	}],
    	"Title": "string",
    	"Types": ["string"],
    	"UpdatedAt": "string",
    	"UserDefinedFields": {
    		"string": "string"
    	},
    	"VerificationState": "string",
    	"Vulnerabilities": [{
    		"CodeVulnerabilities": [{
    			"Cwes": [
    				"string",
    				"string"
    			],
    			"FilePath": {
    				"EndLine": integer,
    				"FileName": "string",
    				"FilePath": "string",
    				"StartLine": integer
    			},
    			"SourceArn":"string"
    		}],
    		"Cvss": [{
    			"Adjustments": [{
    				"Metric": "string",
    				"Reason": "string"
    			}],
    			"BaseScore": number,
    			"BaseVector": "string",
    			"Source": "string",
    			"Version": "string"
    		}],
    		"EpssScore": number,
    		"ExploitAvailable": "string",
    		"FixAvailable": "string",
    		"Id": "string",
    		"LastKnownExploitAt": "string",
    		"ReferenceUrls": ["string"],
    		"RelatedVulnerabilities": ["string"],
    		"Vendor": {
    			"Name": "string",
    			"Url": "string",
    			"VendorCreatedAt": "string",
    			"VendorSeverity": "string",
    			"VendorUpdatedAt": "string"
    		},
    		"VulnerablePackages": [{
    			"Architecture": "string",
    			"Epoch": "string",
    			"FilePath": "string",
    			"FixedInVersion": "string",
    			"Name": "string",
    			"PackageManager": "string",
    			"Release": "string",
    			"Remediation": "string",
    			"SourceLayerArn": "string",
    			"SourceLayerHash": "string",
    			"Version": "string"
    		}]
    	}],
    	"Workflow": {
    		"Status": "string"
    	},
    	"WorkflowState": "string"
    }
]
```

# Dampak konsolidasi pada bidang dan nilai ASFF
<a name="asff-changes-consolidation"></a>

AWS Security Hub CSPM menawarkan dua jenis konsolidasi untuk kontrol:
+ **Tampilan kontrol konsolidasi** — Dengan jenis konsolidasi ini, setiap kontrol memiliki pengidentifikasi tunggal di semua standar. Selain itu, pada konsol CSPM Security Hub, halaman **Kontrol** menampilkan semua kontrol di semua standar. 
+ **Temuan kontrol konsolidasi** — Dengan jenis konsolidasi ini, Security Hub CSPM menghasilkan satu temuan untuk kontrol, bahkan jika kontrol berlaku untuk beberapa standar yang diaktifkan. Hal ini dapat mengurangi kebisingan. 

Anda tidak dapat mengaktifkan atau menonaktifkan tampilan kontrol konsolidasi. Temuan kontrol konsolidasi diaktifkan secara default jika Anda mengaktifkan CSPM Security Hub pada atau setelah 23 Februari 2023. Jika tidak, itu dinonaktifkan secara default. Namun, untuk organisasi, temuan kontrol konsolidasi diaktifkan untuk akun anggota CSPM Security Hub hanya jika diaktifkan untuk akun administrator. Untuk mempelajari lebih lanjut tentang temuan kontrol terkonsolidasi, lihat[Menghasilkan dan memperbarui temuan kontrol](controls-findings-create-update.md).

Kedua jenis konsolidasi mempengaruhi bidang dan nilai untuk temuan kontrol di. [AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md)

**Topics**
+ [Tampilan kontrol konsolidasi - perubahan ASFF](#securityhub-findings-format-consolidated-controls-view)
+ [Temuan kontrol konsolidasi - perubahan ASFF](#securityhub-findings-format-consolidated-control-findings)
+ [Generator IDs sebelum dan sesudah memungkinkan temuan kontrol terkonsolidasi](#securityhub-findings-format-changes-generator-ids)
+ [Bagaimana konsolidasi berdampak pada kontrol IDs dan judul](#securityhub-findings-format-changes-ids-titles)
+ [Memperbarui alur kerja untuk konsolidasi](#securityhub-findings-format-changes-prepare)

## Tampilan kontrol konsolidasi - perubahan ASFF
<a name="securityhub-findings-format-consolidated-controls-view"></a>

Fitur tampilan kontrol terkonsolidasi memperkenalkan perubahan berikut pada bidang dan nilai untuk temuan kontrol di ASFF. Jika alur kerja Anda tidak bergantung pada nilai untuk bidang ASFF ini, tidak diperlukan tindakan. Jika Anda memiliki alur kerja yang mengandalkan nilai tertentu untuk bidang ini, perbarui alur kerja Anda untuk menggunakan nilai saat ini.


| Bidang ASFF  | Nilai sampel sebelum tampilan kontrol konsolidasi  | Nilai sampel setelah tampilan kontrol terkonsolidasi, dan deskripsi perubahan  | 
| --- | --- | --- | 
|  Kepatuhan. SecurityControlId  |  Tidak berlaku (bidang baru)  |  EC2.2 Memperkenalkan ID kontrol tunggal di seluruh standar. `ProductFields.RuleId`masih menyediakan ID kontrol berbasis standar untuk kontrol CIS v1.2.0. `ProductFields.ControlId`masih menyediakan ID kontrol berbasis standar untuk kontrol dalam standar lain.  | 
|  Kepatuhan. AssociatedStandards  |  Tidak berlaku (bidang baru)  |  [\$1” StandardsId “:" standards/aws-foundational-security-best-practices/v /1.0.0 “\$1] Menunjukkan standar mana kontrol diaktifkan.  | 
|  ProductFields. ArchivalReasons:0/Deskripsi  |  Tidak berlaku (bidang baru)  |  “Temuan ini dalam keadaan ARCHIVED karena temuan kontrol konsolidasi telah diaktifkan atau dimatikan. Hal ini menyebabkan temuan di negara bagian sebelumnya diarsipkan ketika temuan baru sedang dihasilkan.” Menjelaskan mengapa Security Hub CSPM telah mengarsipkan temuan yang ada.  | 
|  ProductFields. ArchivalReasons:0/ ReasonCode  |  Tidak berlaku (bidang baru)  |  “CONSOLIDATED\$1CONTROL\$1FINDINGS\$1UPDATE” Memberikan alasan mengapa Security Hub CSPM telah mengarsipkan temuan yang ada.  | 
|  ProductFields.RecommendationUrl  |  https://docs.aws.amazon.com/console/securityhub/PCI.EC2.2/remediation  |  https://docs.aws.amazon.com/console/securityhub/EC2.2/remediation Bidang ini tidak lagi mereferensikan standar.  | 
|  Remediation.Recommendation.Text  |  “Untuk petunjuk tentang cara memperbaiki masalah ini, lihat dokumentasi AWS Security Hub CSPM PCI DSS.”  |  “Untuk petunjuk tentang cara memperbaiki masalah ini, lihat dokumentasi kontrol CSPM AWS Security Hub.” Bidang ini tidak lagi mereferensikan standar.  | 
|  Remediasi.Rekomendasi.Url  |  https://docs.aws.amazon.com/console/securityhub/PCI.EC2.2/remediation  |  https://docs.aws.amazon.com/console/securityhub/EC2.2/remediation Bidang ini tidak lagi mereferensikan standar.  | 

## Temuan kontrol konsolidasi - perubahan ASFF
<a name="securityhub-findings-format-consolidated-control-findings"></a>

Jika Anda mengaktifkan temuan kontrol terkonsolidasi, Anda mungkin terpengaruh oleh perubahan bidang dan nilai berikut untuk temuan kontrol di ASFF. Perubahan ini merupakan tambahan dari perubahan yang diperkenalkan oleh fitur tampilan kontrol terkonsolidasi. Jika alur kerja Anda tidak bergantung pada nilai untuk bidang ASFF ini, tidak diperlukan tindakan. Jika Anda memiliki alur kerja yang mengandalkan nilai tertentu untuk bidang ini, perbarui alur kerja Anda untuk menggunakan nilai saat ini.

**Tip**  
Jika Anda menggunakan [Respons Keamanan Otomatis pada solusi AWS v2.0.0](https://aws.amazon.com/solutions/implementations/aws-security-hub-automated-response-and-remediation/), perhatikan bahwa solusi ini mendukung temuan kontrol terkonsolidasi. Ini berarti Anda dapat mempertahankan alur kerja saat ini jika Anda mengaktifkan temuan kontrol terkonsolidasi. 


| Bidang ASFF  | Nilai contoh sebelum mengaktifkan temuan kontrol konsolidasi  | Nilai contoh setelah mengaktifkan temuan kontrol konsolidasi, dan deskripsi perubahan  | 
| --- | --- | --- | 
| GeneratorId |  aws-foundational-security-best- practices/v/1.0.0/Config .1  |  Kontrol keamanan/config.1 Bidang ini tidak lagi mereferensikan standar.  | 
|  judul  |  PCI.config.1 harus diaktifkan AWS Config  |  AWS Config harus diaktifkan Bidang ini tidak lagi mereferensikan informasi khusus standar.  | 
|  Id  |  arn:aws:securityhub: eu-central- 1:123456789012:6d6a26-a156-48f0-9403-115983e5a956 subscription/pci-dss/v/3.2.1/PCI.IAM.5/finding/ab  |  arn:aws:securityhub: eu-central- 1:123456789012: keamanan- 6d6a26-a156-48f0-9403-115983e5a956 control/iam.9/finding/ab Bidang ini tidak lagi mereferensikan standar.  | 
|  ProductFields.ControlId  |  PCI.EC2.2  |  Dihapus. Lihat `Compliance.SecurityControlId` sebagai gantinya. Bidang ini dihapus demi ID kontrol agnostik standar tunggal.  | 
|  ProductFields.RuleId  |  1.3  |  Dihapus. Lihat `Compliance.SecurityControlId` sebagai gantinya. Bidang ini dihapus demi ID kontrol agnostik standar tunggal.  | 
|  Deskripsi  |  Kontrol PCI DSS ini memeriksa apakah AWS Config diaktifkan di akun dan wilayah saat ini.  |   AWS Kontrol ini memeriksa apakah AWS Config diaktifkan di akun dan wilayah saat ini.Bidang ini tidak lagi mereferensikan standar.  | 
|  Kepelikan  |  “Keparahan”: \$1 “Produk”: 90, “Label”: “KRITIS”, “Dinormalisasi”: 90, “Original”: “KRITIS” \$1  |  “Keparahan”: \$1 “Label”: “KRITIS”, “Dinormalisasi”: 90, “Original”: “KRITIS” \$1 Security Hub CSPM tidak lagi menggunakan bidang Produk untuk menggambarkan tingkat keparahan temuan.  | 
|  Tipe  |  ["Perangkat Lunak dan Konfigurasi Checks/Industry dan Standar Regulasi/PCI-DSS"]  |  ["Perangkat Lunak dan Konfigurasi Checks/Industry dan Standar Peraturan"] Bidang ini tidak lagi mereferensikan standar.  | 
|  Kepatuhan. RelatedRequirements  |  ["PCI DSS 10.5.2", “PCI DSS 11,5", “ AWS Yayasan CIS 2.5"]  |  ["PCI DSS v3.2.1/10.5.2", “PCI DSS v3.2.1/11.5", “Tolok Ukur AWS Yayasan CIS v1.2.0/2.5"] Bidang ini menunjukkan persyaratan terkait di semua standar yang diaktifkan.  | 
|  CreatedAt  |  2022-05-05T 08:18:13.138 Z  |  2022-09-25T 08:18:13.138 Z Format tetap sama, tetapi nilai disetel ulang saat Anda mengaktifkan temuan kontrol terkonsolidasi.  | 
|  FirstObservedAt  |  2022-05-07T 08:18:13.138 Z  | 2022-09-28T 08:18:13.138 Z Format tetap sama, tetapi nilai disetel ulang saat Anda mengaktifkan temuan kontrol terkonsolidasi.  | 
|  ProductFields.RecommendationUrl  |  https://docs.aws.amazon.com/console/securityhub/EC2.2/remediation  |  Dihapus. Lihat `Remediation.Recommendation.Url` sebagai gantinya. | 
|  ProductFields.StandardsArn  |  arn:aws:securityhub::: /1.0.0 standards/aws-foundational-security-best-practices/v  |  Dihapus. Lihat `Compliance.AssociatedStandards` sebagai gantinya.  | 
|  ProductFields.StandardsControlArn  |  arn:aws:securityhub: us-timur- 1:123456789012: .1 control/aws-foundational-security-best-practices/v/1.0.0/Config  |  Dihapus. Security Hub CSPM menghasilkan satu temuan untuk pemeriksaan keamanan di seluruh standar.  | 
|  ProductFields.StandardsGuideArn  |  arn:aws:securityhub::: /1.2.0 ruleset/cis-aws-foundations-benchmark/v  |  Dihapus. Lihat `Compliance.AssociatedStandards` sebagai gantinya.  | 
|  ProductFields.StandardsGuideSubscriptionArn  |  arn:aws:securityhub: us-timur- 2:123456789012: /1.2.0 subscription/cis-aws-foundations-benchmark/v  |  Dihapus. Security Hub CSPM menghasilkan satu temuan untuk pemeriksaan keamanan di seluruh standar.  | 
|  ProductFields.StandardsSubscriptionArn  |  arn:aws:securityhub: us-timur- 1:123456789012: /1.0.0 subscription/aws-foundational-security-best-practices/v  |  Dihapus. Security Hub CSPM menghasilkan satu temuan untuk pemeriksaan keamanan di seluruh standar.  | 
|  ProductFields.aws/securityhub/FindingId  |  arn:aws:securityhub: us-east-1:: /751c2173-7372-4e12-8656-a5210dfb1d67 product/aws/securityhub/arn:aws:securityhub:us-east-1:123456789012:subscription/aws-foundational-security-best-practices/v/1.0.0/Config.1/finding  |  arn:aws:securityhub: us-east-1:: /751c2173-7372-4e12-8656-a5210dfb1d67 product/aws/securityhub/arn:aws:securityhub:us-east-1:123456789012:security-control/Config.1/finding  Bidang ini tidak lagi mereferensikan standar.  | 

### Nilai untuk bidang ASFF yang disediakan pelanggan setelah mengaktifkan temuan kontrol terkonsolidasi
<a name="consolidated-controls-view-customer-provided-values"></a>

Jika Anda mengaktifkan temuan kontrol terkonsolidasi, Security Hub CSPM menghasilkan satu temuan di seluruh standar dan mengarsipkan temuan asli (temuan terpisah untuk setiap standar).

Pembaruan yang Anda buat untuk temuan asli dengan menggunakan konsol CSPM Security Hub atau [https://docs.aws.amazon.com/securityhub/latest/userguide/finding-update-batchupdatefindings.html](https://docs.aws.amazon.com/securityhub/latest/userguide/finding-update-batchupdatefindings.html)operasi tidak akan disimpan dalam temuan baru. Jika perlu, Anda dapat memulihkan data ini dengan merujuk pada temuan yang diarsipkan. **Untuk meninjau temuan yang diarsipkan, Anda dapat menggunakan halaman **Temuan** di konsol CSPM Security Hub dan menyetel filter **status Record** ke ARCHIVED.** Atau, Anda dapat menggunakan [https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_GetFindings.html](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_GetFindings.html)pengoperasian Security Hub CSPM API.


| Bidang ASFF yang disediakan pelanggan  | Deskripsi perubahan setelah memungkinkan temuan kontrol konsolidasi  | 
| --- | --- | 
|  Kepercayaan  |  Reset ke status kosong.  | 
|  Kekritisan  |  Reset ke status kosong.  | 
|  Catatan  |  Reset ke status kosong.  | 
|  RelatedFindings  |  Reset ke status kosong.  | 
|  Kepelikan  |  Tingkat keparahan default temuan (cocok dengan tingkat keparahan kontrol).  | 
|  Tipe  |  Reset ke nilai agnostik standar.  | 
|  UserDefinedFields  |  Reset ke status kosong.  | 
|  VerificationState  |  Reset ke status kosong.  | 
|  Alur kerja  |  Temuan baru yang gagal memiliki nilai defaultNEW. Temuan baru yang lulus memiliki nilai defaultRESOLVED.  | 

## Generator IDs sebelum dan sesudah memungkinkan temuan kontrol terkonsolidasi
<a name="securityhub-findings-format-changes-generator-ids"></a>

Tabel berikut mencantumkan perubahan nilai ID generator untuk kontrol saat Anda mengaktifkan temuan kontrol terkonsolidasi. Perubahan ini berlaku untuk kontrol yang didukung CSPM Security Hub per 15 Februari 2023.


| generatorId sebelum mengaktifkan temuan kontrol terkonsolidasi | generatorId setelah mengaktifkan temuan kontrol terkonsolidasi | 
| --- | --- | 
|  arn:aws:securityhub::: /1.1 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  kontrol keamanan/ .1 CloudWatch  | 
|  arn:aws:securityhub::: /1.10 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  Kontrol keamanan/IAM.16  | 
|  arn:aws:securityhub::: /1.11 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  Kontrol keamanan/IAM.17  | 
|  arn:aws:securityhub::: /1.12 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  Kontrol keamanan/IAM.4  | 
|  arn:aws:securityhub::: /1.13 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  Kontrol keamanan/IAM.9  | 
|  arn:aws:securityhub::: /1.14 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  Kontrol keamanan/IAM.6  | 
|  arn:aws:securityhub::: /1.16 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  Kontrol keamanan/IAM.2  | 
|  arn:aws:securityhub::: /1.2 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  Kontrol keamanan/IAM.5  | 
|  arn:aws:securityhub::: /1.20 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  Kontrol keamanan/IAM.18  | 
|  arn:aws:securityhub::: /1.22 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  Kontrol keamanan/IAM.1  | 
|  arn:aws:securityhub::: /1.3 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  Kontrol keamanan/IAM.8  | 
|  arn:aws:securityhub::: /1.4 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  Kontrol keamanan/IAM.3  | 
|  arn:aws:securityhub::: /1.5 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  Kontrol keamanan/IAM.11  | 
|  arn:aws:securityhub::: /1.6 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  Kontrol keamanan/IAM.12  | 
|  arn:aws:securityhub::: /1.7 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  Kontrol keamanan/IAM.13  | 
|  arn:aws:securityhub::: /1.8 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  Kontrol keamanan/IAM.14  | 
|  arn:aws:securityhub::: /1.9 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  Kontrol keamanan/IAM.15  | 
|  arn:aws:securityhub::: /2.1 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  kontrol keamanan/ .1 CloudTrail  | 
|  arn:aws:securityhub::: /2.2 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  kontrol keamanan/ .4 CloudTrail  | 
|  arn:aws:securityhub::: /2.3 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  kontrol keamanan/ .6 CloudTrail  | 
|  arn:aws:securityhub::: /2.4 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  kontrol keamanan/ .5 CloudTrail  | 
|  arn:aws:securityhub::: /2.5 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  Kontrol keamanan/config.1  | 
|  arn:aws:securityhub::: /2.6 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  kontrol keamanan/ .7 CloudTrail  | 
|  arn:aws:securityhub::: /2.7 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  kontrol keamanan/ .2 CloudTrail  | 
|  arn:aws:securityhub::: /2.8 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  Kontrol keamanan/KMS.4  | 
|  arn:aws:securityhub::: /2.9 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  Kontrol keamanan/EC2.6  | 
|  arn:aws:securityhub::: /3.1 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  kontrol keamanan/ .2 CloudWatch  | 
|  arn:aws:securityhub::: /3.2 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  kontrol keamanan/ .3 CloudWatch  | 
|  arn:aws:securityhub::: /3.3 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  kontrol keamanan/ .1 CloudWatch  | 
|  arn:aws:securityhub::: /3.4 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  kontrol keamanan/ .4 CloudWatch  | 
|  arn:aws:securityhub::: /3.5 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  kontrol keamanan/ .5 CloudWatch  | 
|  arn:aws:securityhub::: /3.6 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  kontrol keamanan/ .6 CloudWatch  | 
|  arn:aws:securityhub::: /3.7 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  kontrol keamanan/ .7 CloudWatch  | 
|  arn:aws:securityhub::: /3.8 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  kontrol keamanan/ .8 CloudWatch  | 
|  arn:aws:securityhub::: /3.9 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  kontrol keamanan/ .9 CloudWatch  | 
|  arn:aws:securityhub::: /3.10 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  kontrol keamanan/ .10 CloudWatch  | 
|  arn:aws:securityhub::: /3.11 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  kontrol keamanan/ .11 CloudWatch  | 
|  arn:aws:securityhub::: /3.12 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  kontrol keamanan/ .12 CloudWatch  | 
|  arn:aws:securityhub::: /3.13 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  kontrol keamanan/ .13 CloudWatch  | 
|  arn:aws:securityhub::: /3.14 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  kontrol keamanan/ .14 CloudWatch  | 
|  arn:aws:securityhub::: /4.1 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  Kontrol keamanan/EC2.13  | 
|  arn:aws:securityhub::: /4.2 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  Kontrol keamanan/EC2.14  | 
|  arn:aws:securityhub::: /4.3 ruleset/cis-aws-foundations-benchmark/v/1.2.0/rule  |  Kontrol keamanan/EC2.2  | 
|  cis-aws-foundations-benchmark/v/1.4.0/1.10  |  Kontrol keamanan/IAM.5  | 
|  cis-aws-foundations-benchmark/v/1.4.0/1.14  |  Kontrol keamanan/IAM.3  | 
|  cis-aws-foundations-benchmark/v/1.4.0/1.16  |  Kontrol keamanan/IAM.1  | 
|  cis-aws-foundations-benchmark/v/1.4.0/1.17  |  Kontrol keamanan/IAM.18  | 
|  cis-aws-foundations-benchmark/v/1.4.0/1.4  |  Kontrol keamanan/IAM.4  | 
|  cis-aws-foundations-benchmark/v/1.4.0/1.5  |  Kontrol keamanan/IAM.9  | 
|  cis-aws-foundations-benchmark/v/1.4.0/1.6  |  Kontrol keamanan/IAM.6  | 
|  cis-aws-foundations-benchmark/v/1.4.0/1.7  |  kontrol keamanan/ .1 CloudWatch  | 
|  cis-aws-foundations-benchmark/v/1.4.0/1.8  |  Kontrol keamanan/IAM.15  | 
|  cis-aws-foundations-benchmark/v/1.4.0/1.9  |  Kontrol keamanan/IAM.16  | 
|  cis-aws-foundations-benchmark/v/1.4.0/2.1.2  |  Kontrol keamanan/S3.5  | 
|  cis-aws-foundations-benchmark/v/1.4.0/2.1.5.1  |  Kontrol keamanan/S3.1  | 
|  cis-aws-foundations-benchmark/v/1.4.0/2.1.5.2  |  Kontrol keamanan/S3.8  | 
|  cis-aws-foundations-benchmark/v/1.4.0/2.2.1  |  Kontrol keamanan/EC2.7  | 
|  cis-aws-foundations-benchmark/v/1.4.0/2.3.1  |  Kontrol keamanan/RDS.3  | 
|  cis-aws-foundations-benchmark/v/1.4.0/3.1  |  kontrol keamanan/ .1 CloudTrail  | 
|  cis-aws-foundations-benchmark/v/1.4.0/3.2  |  kontrol keamanan/ .4 CloudTrail  | 
|  cis-aws-foundations-benchmark/v/1.4.0/3.4  |  kontrol keamanan/ .5 CloudTrail  | 
|  cis-aws-foundations-benchmark/v/1.4.0/3.5  |  Kontrol keamanan/config.1  | 
|  cis-aws-foundations-benchmark/v/1.4.0/3.6  |  Kontrol keamanan/S3.9  | 
|  cis-aws-foundations-benchmark/v/1.4.0/3.7  |  kontrol keamanan/ .2 CloudTrail  | 
|  cis-aws-foundations-benchmark/v/1.4.0/3.8  |  Kontrol keamanan/KMS.4  | 
|  cis-aws-foundations-benchmark/v/1.4.0/3.9  |  Kontrol keamanan/EC2.6  | 
|  cis-aws-foundations-benchmark/v/1.4.0/4.3  |  kontrol keamanan/ .1 CloudWatch  | 
|  cis-aws-foundations-benchmark/v/1.4.0/4.4  |  kontrol keamanan/ .4 CloudWatch  | 
|  cis-aws-foundations-benchmark/v/1.4.0/4.5  |  kontrol keamanan/ .5 CloudWatch  | 
|  cis-aws-foundations-benchmark/v/1.4.0/4.6  |  kontrol keamanan/ .6 CloudWatch  | 
|  cis-aws-foundations-benchmark/v/1.4.0/4.7  |  kontrol keamanan/ .7 CloudWatch  | 
|  cis-aws-foundations-benchmark/v/1.4.0/4.8  |  kontrol keamanan/ .8 CloudWatch  | 
|  cis-aws-foundations-benchmark/v/1.4.0/4.9  |  kontrol keamanan/ .9 CloudWatch  | 
|  cis-aws-foundations-benchmark/v/1.4.0/4.10  |  kontrol keamanan/ .10 CloudWatch  | 
|  cis-aws-foundations-benchmark/v/1.4.0/4.11  |  kontrol keamanan/ .11 CloudWatch  | 
|  cis-aws-foundations-benchmark/v/1.4.0/4.12  |  kontrol keamanan/ .12 CloudWatch  | 
|  cis-aws-foundations-benchmark/v/1.4.0/4.13  |  kontrol keamanan/ .13 CloudWatch  | 
|  cis-aws-foundations-benchmark/v/1.4.0/4.14  |  kontrol keamanan/ .14 CloudWatch  | 
|  cis-aws-foundations-benchmark/v/1.4.0/5.1  |  Kontrol keamanan/EC2.21  | 
|  cis-aws-foundations-benchmark/v/1.4.0/5.3  |  Kontrol keamanan/EC2.2  | 
|  aws-foundational-security-best- practices/v/1.0.0/Account .1  |  Kontrol keamanan/akun.1  | 
|  aws-foundational-security-best- practices/v/1.0.0/ACM .1  |  Kontrol keamanan/ACM.1  | 
|  aws-foundational-security-best- practices/v/1.0.0/APIGateway .1  |  kontrol keamanan/ .1 APIGateway  | 
|  aws-foundational-security-best- practices/v/1.0.0/APIGateway .2  |  kontrol keamanan/ .2 APIGateway  | 
|  aws-foundational-security-best- practices/v/1.0.0/APIGateway .3  |  kontrol keamanan/ .3 APIGateway  | 
|  aws-foundational-security-best- practices/v/1.0.0/APIGateway .4  |  kontrol keamanan/ .4 APIGateway  | 
|  aws-foundational-security-best- practices/v/1.0.0/APIGateway .5  |  kontrol keamanan/ .5 APIGateway  | 
|  aws-foundational-security-best- practices/v/1.0.0/APIGateway .8  |  kontrol keamanan/ .8 APIGateway  | 
|  aws-foundational-security-best- practices/v/1.0.0/APIGateway .9  |  kontrol keamanan/ .9 APIGateway  | 
|  aws-foundational-security-best- practices/v/1.0.0/AutoScaling .1  |  kontrol keamanan/ .1 AutoScaling  | 
|  aws-foundational-security-best- practices/v/1.0.0/AutoScaling .2  |  kontrol keamanan/ .2 AutoScaling  | 
|  aws-foundational-security-best- practices/v/1.0.0/AutoScaling .3  |  kontrol keamanan/ .3 AutoScaling  | 
|  aws-foundational-security-best- practices/v/1.0.0/Autoscaling .5  |  Kontrol keamanan/penskalan.5  | 
|  aws-foundational-security-best- practices/v/1.0.0/AutoScaling .6  |  kontrol keamanan/ .6 AutoScaling  | 
|  aws-foundational-security-best- practices/v/1.0.0/AutoScaling .9  |  kontrol keamanan/ .9 AutoScaling  | 
|  aws-foundational-security-best- practices/v/1.0.0/CloudFront .1  |  kontrol keamanan/ .1 CloudFront  | 
|  aws-foundational-security-best- practices/v/1.0.0/CloudFront .3  |  kontrol keamanan/ .3 CloudFront  | 
|  aws-foundational-security-best- practices/v/1.0.0/CloudFront .4  |  kontrol keamanan/ .4 CloudFront  | 
|  aws-foundational-security-best- practices/v/1.0.0/CloudFront .5  |  kontrol keamanan/ .5 CloudFront  | 
|  aws-foundational-security-best- practices/v/1.0.0/CloudFront .6  |  kontrol keamanan/ .6 CloudFront  | 
|  aws-foundational-security-best- practices/v/1.0.0/CloudFront .7  |  kontrol keamanan/ .7 CloudFront  | 
|  aws-foundational-security-best- practices/v/1.0.0/CloudFront .8  |  kontrol keamanan/ .8 CloudFront  | 
|  aws-foundational-security-best- practices/v/1.0.0/CloudFront .9  |  kontrol keamanan/ .9 CloudFront  | 
|  aws-foundational-security-best- practices/v/1.0.0/CloudFront .10  |  kontrol keamanan/ .10 CloudFront  | 
|  aws-foundational-security-best- practices/v/1.0.0/CloudFront .12  |  kontrol keamanan/ .12 CloudFront  | 
|  aws-foundational-security-best- practices/v/1.0.0/CloudTrail .1  |  kontrol keamanan/ .1 CloudTrail  | 
|  aws-foundational-security-best- practices/v/1.0.0/CloudTrail .2  |  kontrol keamanan/ .2 CloudTrail  | 
|  aws-foundational-security-best- practices/v/1.0.0/CloudTrail .4  |  kontrol keamanan/ .4 CloudTrail  | 
|  aws-foundational-security-best- practices/v/1.0.0/CloudTrail .5  |  kontrol keamanan/ .5 CloudTrail  | 
|  aws-foundational-security-best- practices/v/1.0.0/CodeBuild .1  |  kontrol keamanan/ .1 CodeBuild  | 
|  aws-foundational-security-best- practices/v/1.0.0/CodeBuild .2  |  kontrol keamanan/ .2 CodeBuild  | 
|  aws-foundational-security-best- practices/v/1.0.0/CodeBuild .3  |  kontrol keamanan/ .3 CodeBuild  | 
|  aws-foundational-security-best- practices/v/1.0.0/CodeBuild .4  |  kontrol keamanan/ .4 CodeBuild  | 
|  aws-foundational-security-best- practices/v/1.0.0/Config .1  |  Kontrol keamanan/config.1  | 
|  aws-foundational-security-best- practices/v/1.0.0/DMS .1  |  Kontrol keamanan/DMS.1  | 
|  aws-foundational-security-best- practices/v/1.0.0/DynamoDB .1  |  Kontrol keamanan/DynamoDB.1  | 
|  aws-foundational-security-best- practices/v/1.0.0/DynamoDB .2  |  Kontrol keamanan/DynamoDB.2  | 
|  aws-foundational-security-best- practices/v/1.0.0/DynamoDB .3  |  Kontrol keamanan/DynamoDB.3  | 
|  aws-foundational-security-best- practices/v/1.0.0/EC 2.1  |  Kontrol keamanan/EC2.1  | 
|  aws-foundational-security-best- practices/v/1.0.0/EC 2.3  |  Kontrol keamanan/EC2.3  | 
|  aws-foundational-security-best- practices/v/1.0.0/EC 2,4  |  Kontrol keamanan/EC2.4  | 
|  aws-foundational-security-best- practices/v/1.0.0/EC 2.6  |  Kontrol keamanan/EC2.6  | 
|  aws-foundational-security-best- practices/v/1.0.0/EC 2,7  |  Kontrol keamanan/EC2.7  | 
|  aws-foundational-security-best- practices/v/1.0.0/EC 2,8  |  Kontrol keamanan/EC2.8  | 
|  aws-foundational-security-best- practices/v/1.0.0/EC 2,9  |  Kontrol keamanan/EC2.9  | 
|  aws-foundational-security-best- practices/v/1.0.0/EC 2.10  |  Kontrol keamanan/EC2.10  | 
|  aws-foundational-security-best- practices/v/1.0.0/EC 2.15  |  Kontrol keamanan/EC2.15  | 
|  aws-foundational-security-best- practices/v/1.0.0/EC 2.16  |  Kontrol keamanan/EC2.16  | 
|  aws-foundational-security-best- practices/v/1.0.0/EC 2.17  |  Kontrol keamanan/EC2.17  | 
|  aws-foundational-security-best- practices/v/1.0.0/EC 2.18  |  Kontrol keamanan/EC2.18  | 
|  aws-foundational-security-best- practices/v/1.0.0/EC 2.19  |  Kontrol keamanan/EC2.19  | 
|  aws-foundational-security-best- practices/v/1.0.0/EC 2.2  |  Kontrol keamanan/EC2.2  | 
|  aws-foundational-security-best- practices/v/1.0.0/EC 2.20  |  Kontrol keamanan/EC2.20  | 
|  aws-foundational-security-best- practices/v/1.0.0/EC 2,21  |  Kontrol keamanan/EC2.21  | 
|  aws-foundational-security-best- practices/v/1.0.0/EC 2,23  |  Kontrol keamanan/EC2.23  | 
|  aws-foundational-security-best- practices/v/1.0.0/EC 2,24  |  Kontrol keamanan/EC2.24  | 
|  aws-foundational-security-best- practices/v/1.0.0/EC 2,25  |  Kontrol keamanan/EC2.25  | 
|  aws-foundational-security-best- practices/v/1.0.0/ECR .1  |  Kontrol keamanan/ECR.1  | 
|  aws-foundational-security-best- practices/v/1.0.0/ECR .2  |  Kontrol keamanan/ECR.2  | 
|  aws-foundational-security-best- practices/v/1.0.0/ECR .3  |  Kontrol keamanan/ECR.3  | 
|  aws-foundational-security-best- practices/v/1.0.0/ECS .1  |  Kontrol keamanan/ECS.1  | 
|  aws-foundational-security-best- practices/v/1.0.0/ECS .10  |  Kontrol keamanan/ECS.10  | 
|  aws-foundational-security-best- practices/v/1.0.0/ECS .12  |  Kontrol keamanan/ECS.12  | 
|  aws-foundational-security-best- practices/v/1.0.0/ECS .2  |  Kontrol keamanan/ECS.2  | 
|  aws-foundational-security-best- practices/v/1.0.0/ECS .3  |  Kontrol keamanan/ECS.3  | 
|  aws-foundational-security-best- practices/v/1.0.0/ECS .4  |  Kontrol keamanan/ECS.4  | 
|  aws-foundational-security-best- practices/v/1.0.0/ECS .5  |  Kontrol keamanan/ECS.5  | 
|  aws-foundational-security-best- practices/v/1.0.0/ECS .8  |  Kontrol keamanan/ECS.8  | 
|  aws-foundational-security-best- practices/v/1.0.0/EFS .1  |  Kontrol keamanan/EFS.1  | 
|  aws-foundational-security-best- practices/v/1.0.0/EFS .2  |  Kontrol keamanan/EFS.2  | 
|  aws-foundational-security-best- practices/v/1.0.0/EFS .3  |  Kontrol keamanan/EFS.3  | 
|  aws-foundational-security-best- practices/v/1.0.0/EFS .4  |  Kontrol keamanan/EFS.4  | 
|  aws-foundational-security-best- practices/v/1.0.0/EKS .2  |  Kontrol keamanan/EKS.2  | 
|  aws-foundational-security-best- practices/v/1.0.0/ElasticBeanstalk .1  |  kontrol keamanan/ .1 ElasticBeanstalk  | 
|  aws-foundational-security-best- practices/v/1.0.0/ElasticBeanstalk .2  |  kontrol keamanan/ .2 ElasticBeanstalk  | 
|  aws-foundational-security-best- practices/v/1.0.0/ELBv 2.1  |  Kontrol keamanan/ELB.1  | 
|  aws-foundational-security-best- practices/v/1.0.0/ELB .2  |  Kontrol keamanan/ELB.2  | 
|  aws-foundational-security-best- practices/v/1.0.0/ELB .3  |  Kontrol keamanan/ELB.3  | 
|  aws-foundational-security-best- practices/v/1.0.0/ELB .4  |  Kontrol keamanan/ELB.4  | 
|  aws-foundational-security-best- practices/v/1.0.0/ELB .5  |  Kontrol keamanan/ELB.5  | 
|  aws-foundational-security-best- practices/v/1.0.0/ELB .6  |  Kontrol keamanan/ELB.6  | 
|  aws-foundational-security-best- practices/v/1.0.0/ELB .7  |  Kontrol keamanan/ELB.7  | 
|  aws-foundational-security-best- practices/v/1.0.0/ELB .8  |  Kontrol keamanan/ELB.8  | 
|  aws-foundational-security-best- practices/v/1.0.0/ELB .9  |  Kontrol keamanan/ELB.9  | 
|  aws-foundational-security-best- practices/v/1.0.0/ELB .10  |  Kontrol keamanan/ELB.10  | 
|  aws-foundational-security-best- practices/v/1.0.0/ELB .11  |  Kontrol keamanan/ELB.11  | 
|  aws-foundational-security-best- practices/v/1.0.0/ELB .12  |  Kontrol keamanan/ELB.12  | 
|  aws-foundational-security-best- practices/v/1.0.0/ELB .13  |  Kontrol keamanan/ELB.13  | 
|  aws-foundational-security-best- practices/v/1.0.0/ELB .14  |  Kontrol keamanan/ELB.14  | 
|  aws-foundational-security-best- practices/v/1.0.0/EMR .1  |  Kontrol keamanan/EMR.1  | 
|  aws-foundational-security-best- practices/v/1.0.0/ES .1  |  Kontrol keamanan/ES.1  | 
|  aws-foundational-security-best- practices/v/1.0.0/ES .2  |  Kontrol keamanan/ES.2  | 
|  aws-foundational-security-best- practices/v/1.0.0/ES .3  |  Kontrol keamanan/ES.3  | 
|  aws-foundational-security-best- practices/v/1.0.0/ES .4  |  Kontrol keamanan/ES.4  | 
|  aws-foundational-security-best- practices/v/1.0.0/ES .5  |  Kontrol keamanan/ES.5  | 
|  aws-foundational-security-best- practices/v/1.0.0/ES .6  |  Kontrol keamanan/ES.6  | 
|  aws-foundational-security-best- practices/v/1.0.0/ES .7  |  Kontrol keamanan/ES.7  | 
|  aws-foundational-security-best- practices/v/1.0.0/ES .8  |  Kontrol keamanan/ES.8  | 
|  aws-foundational-security-best- practices/v/1.0.0/GuardDuty .1  |  kontrol keamanan/ .1 GuardDuty  | 
|  aws-foundational-security-best- practices/v/1.0.0/IAM .1  |  Kontrol keamanan/IAM.1  | 
|  aws-foundational-security-best- practices/v/1.0.0/IAM .2  |  Kontrol keamanan/IAM.2  | 
|  aws-foundational-security-best- practices/v/1.0.0/IAM .21  |  Kontrol keamanan/IAM.21  | 
|  aws-foundational-security-best- practices/v/1.0.0/IAM .3  |  Kontrol keamanan/IAM.3  | 
|  aws-foundational-security-best- practices/v/1.0.0/IAM .4  |  Kontrol keamanan/IAM.4  | 
|  aws-foundational-security-best- practices/v/1.0.0/IAM .5  |  Kontrol keamanan/IAM.5  | 
|  aws-foundational-security-best- practices/v/1.0.0/IAM .6  |  Kontrol keamanan/IAM.6  | 
|  aws-foundational-security-best- practices/v/1.0.0/IAM .7  |  Kontrol keamanan/IAM.7  | 
|  aws-foundational-security-best- practices/v/1.0.0/IAM .8  |  Kontrol keamanan/IAM.8  | 
|  aws-foundational-security-best- practices/v/1.0.0/Kinesis .1  |  Kontrol keamanan/kinesis.1  | 
|  aws-foundational-security-best- practices/v/1.0.0/KMS .1  |  Kontrol keamanan/KMS.1  | 
|  aws-foundational-security-best- practices/v/1.0.0/KMS .2  |  Kontrol keamanan/KMS.2  | 
|  aws-foundational-security-best- practices/v/1.0.0/KMS .3  |  Kontrol keamanan/KMS.3  | 
|  aws-foundational-security-best- practices/v/1.0.0/Lambda .1  |  Kontrol keamanan/Lambda.1  | 
|  aws-foundational-security-best- practices/v/1.0.0/Lambda .2  |  Kontrol keamanan/Lambda.2  | 
|  aws-foundational-security-best- practices/v/1.0.0/Lambda .5  |  Kontrol keamanan/Lambda.5  | 
|  aws-foundational-security-best- practices/v/1.0.0/NetworkFirewall .3  |  kontrol keamanan/ .3 NetworkFirewall  | 
|  aws-foundational-security-best- practices/v/1.0.0/NetworkFirewall .4  |  kontrol keamanan/ .4 NetworkFirewall  | 
|  aws-foundational-security-best- practices/v/1.0.0/NetworkFirewall .5  |  kontrol keamanan/ .5 NetworkFirewall  | 
|  aws-foundational-security-best- practices/v/1.0.0/NetworkFirewall .6  |  kontrol keamanan/ .6 NetworkFirewall  | 
|  aws-foundational-security-best- practices/v/1.0.0/Opensearch .1  |  Kontrol keamanan/OpenSearch.1  | 
|  aws-foundational-security-best- practices/v/1.0.0/Opensearch .2  |  Kontrol keamanan/OpenSearch.2  | 
|  aws-foundational-security-best- practices/v/1.0.0/Opensearch .3  |  Kontrol keamanan/OpenSearch.3  | 
|  aws-foundational-security-best- practices/v/1.0.0/Opensearch .4  |  Kontrol keamanan/OpenSearch.4  | 
|  aws-foundational-security-best- practices/v/1.0.0/Opensearch .5  |  Kontrol keamanan/OpenSearch.5  | 
|  aws-foundational-security-best- practices/v/1.0.0/Opensearch .6  |  Kontrol keamanan/OpenSearch.6  | 
|  aws-foundational-security-best- practices/v/1.0.0/Opensearch .7  |  Kontrol keamanan/OpenSearch.7  | 
|  aws-foundational-security-best- practices/v/1.0.0/Opensearch .8  |  Kontrol keamanan/OpenSearch.8  | 
|  aws-foundational-security-best- practices/v/1.0.0/RDS .1  |  Kontrol keamanan/RDS.1  | 
|  aws-foundational-security-best- practices/v/1.0.0/RDS .10  |  Kontrol keamanan/RDS.10  | 
|  aws-foundational-security-best- practices/v/1.0.0/RDS .11  |  Kontrol keamanan/RDS.11  | 
|  aws-foundational-security-best- practices/v/1.0.0/RDS .12  |  Kontrol keamanan/RDS.12  | 
|  aws-foundational-security-best- practices/v/1.0.0/RDS .13  |  Kontrol keamanan/RDS.13  | 
|  aws-foundational-security-best- practices/v/1.0.0/RDS .14  |  Kontrol keamanan/RDS.14  | 
|  aws-foundational-security-best- practices/v/1.0.0/RDS .15  |  Kontrol keamanan/RDS.15  | 
|  aws-foundational-security-best- practices/v/1.0.0/RDS .16  |  Kontrol keamanan/RDS.16  | 
|  aws-foundational-security-best- practices/v/1.0.0/RDS .17  |  Kontrol keamanan/RDS.17  | 
|  aws-foundational-security-best- practices/v/1.0.0/RDS .19  |  Kontrol keamanan/RDS.19  | 
|  aws-foundational-security-best- practices/v/1.0.0/RDS .2  |  Kontrol keamanan/RDS.2  | 
|  aws-foundational-security-best- practices/v/1.0.0/RDS .20  |  Kontrol keamanan/RDS.20  | 
|  aws-foundational-security-best- practices/v/1.0.0/RDS .21  |  Kontrol keamanan/RDS.21  | 
|  aws-foundational-security-best- practices/v/1.0.0/RDS .22  |  Kontrol keamanan/RDS.22  | 
|  aws-foundational-security-best- practices/v/1.0.0/RDS .23  |  Kontrol keamanan/RDS.23  | 
|  aws-foundational-security-best- practices/v/1.0.0/RDS .24  |  Kontrol keamanan/RDS.24  | 
|  aws-foundational-security-best- practices/v/1.0.0/RDS .25  |  Kontrol keamanan/RDS.25  | 
|  aws-foundational-security-best- practices/v/1.0.0/RDS .3  |  Kontrol keamanan/RDS.3  | 
|  aws-foundational-security-best- practices/v/1.0.0/RDS .4  |  Kontrol keamanan/RDS.4  | 
|  aws-foundational-security-best- practices/v/1.0.0/RDS .5  |  Kontrol keamanan/RDS.5  | 
|  aws-foundational-security-best- practices/v/1.0.0/RDS .6  |  Kontrol keamanan/RDS.6  | 
|  aws-foundational-security-best- practices/v/1.0.0/RDS .7  |  Kontrol keamanan/RDS.7  | 
|  aws-foundational-security-best- practices/v/1.0.0/RDS .8  |  Kontrol keamanan/RDS.8  | 
|  aws-foundational-security-best- practices/v/1.0.0/RDS .9  |  Kontrol keamanan/RDS.9  | 
|  aws-foundational-security-best- practices/v/1.0.0/Redshift .1  |  Kontrol keamanan/pergeseran merah.1  | 
|  aws-foundational-security-best- practices/v/1.0.0/Redshift .2  |  Kontrol keamanan/pergeseran merah.2  | 
|  aws-foundational-security-best- practices/v/1.0.0/Redshift .3  |  Kontrol keamanan/pergeseran merah.3  | 
|  aws-foundational-security-best- practices/v/1.0.0/Redshift .4  |  Kontrol keamanan/Redshift.4  | 
|  aws-foundational-security-best- practices/v/1.0.0/Redshift .6  |  Kontrol keamanan/pergeseran merah.6  | 
|  aws-foundational-security-best- practices/v/1.0.0/Redshift .7  |  Kontrol keamanan/pergeseran merah.7  | 
|  aws-foundational-security-best- practices/v/1.0.0/Redshift .8  |  Kontrol keamanan/pergeseran merah.8  | 
|  aws-foundational-security-best- practices/v/1.0.0/Redshift .9  |  Kontrol keamanan/pergeseran merah.9  | 
|  aws-foundational-security-best- practices/v/1.0.0/S 3.1  |  Kontrol keamanan/S3.1  | 
|  aws-foundational-security-best- practices/v/1.0.0/S 3.12  |  Kontrol keamanan/S3.12  | 
|  aws-foundational-security-best- practices/v/1.0.0/S 3.13  |  Kontrol keamanan/S3.13  | 
|  aws-foundational-security-best- practices/v/1.0.0/S 3.2  |  Kontrol keamanan/S3.2  | 
|  aws-foundational-security-best- practices/v/1.0.0/S 3,3  |  Kontrol keamanan/S3.3  | 
|  aws-foundational-security-best- practices/v/1.0.0/S 3,5  |  Kontrol keamanan/S3.5  | 
|  aws-foundational-security-best- practices/v/1.0.0/S 3,6  |  Kontrol keamanan/S3.6  | 
|  aws-foundational-security-best- practices/v/1.0.0/S 3,8  |  Kontrol keamanan/S3.8  | 
|  aws-foundational-security-best- practices/v/1.0.0/S 3,9  |  Kontrol keamanan/S3.9  | 
|  aws-foundational-security-best- practices/v/1.0.0/SageMaker .1  |  kontrol keamanan/ .1 SageMaker  | 
|  aws-foundational-security-best- practices/v/1.0.0/SageMaker .2  |  kontrol keamanan/ .2 SageMaker  | 
|  aws-foundational-security-best- practices/v/1.0.0/SageMaker .3  |  kontrol keamanan/ .3 SageMaker  | 
|  aws-foundational-security-best- practices/v/1.0.0/SecretsManager .1  |  kontrol keamanan/ .1 SecretsManager  | 
|  aws-foundational-security-best- practices/v/1.0.0/SecretsManager .2  |  kontrol keamanan/ .2 SecretsManager  | 
|  aws-foundational-security-best- practices/v/1.0.0/SecretsManager .3  |  kontrol keamanan/ .3 SecretsManager  | 
|  aws-foundational-security-best- practices/v/1.0.0/SecretsManager .4  |  kontrol keamanan/ .4 SecretsManager  | 
|  aws-foundational-security-best- practices/v/1.0.0/SQS .1  |  Kontrol keamanan/SQS.1  | 
|  aws-foundational-security-best- practices/v/1.0.0/SSM .1  |  Kontrol keamanan/SSM.1  | 
|  aws-foundational-security-best- practices/v/1.0.0/SSM .2  |  Kontrol keamanan/SSM.2  | 
|  aws-foundational-security-best- practices/v/1.0.0/SSM .3  |  Kontrol keamanan/SSM.3  | 
|  aws-foundational-security-best- practices/v/1.0.0/SSM .4  |  Kontrol keamanan/SSM.4  | 
|  aws-foundational-security-best- practices/v/1.0.0/WAF .1  |  Kontrol keamanan/WAF.1  | 
|  aws-foundational-security-best- practices/v/1.0.0/WAF .2  |  Kontrol keamanan/WAF.2  | 
|  aws-foundational-security-best- practices/v/1.0.0/WAF .3  |  Kontrol keamanan/WAF.3  | 
|  aws-foundational-security-best- practices/v/1.0.0/WAF .4  |  Kontrol keamanan/WAF.4  | 
|  aws-foundational-security-best- practices/v/1.0.0/WAF .6  |  Kontrol keamanan/WAF.6  | 
|  aws-foundational-security-best- practices/v/1.0.0/WAF .7  |  Kontrol keamanan/WAF.7  | 
|  aws-foundational-security-best- practices/v/1.0.0/WAF .8  |  Kontrol keamanan/WAF.8  | 
|  aws-foundational-security-best- practices/v/1.0.0/WAF .10  |  Kontrol keamanan/WAF.10  | 
|  pci-dss/v/3.2.1/PCI. AutoScaling.1  |  kontrol keamanan/ .1 AutoScaling  | 
|  pci-dss/v/3.2.1/PCI. CloudTrail.1  |  kontrol keamanan/ .2 CloudTrail  | 
|  pci-dss/v/3.2.1/PCI. CloudTrail.2  |  kontrol keamanan/ .3 CloudTrail  | 
|  pci-dss/v/3.2.1/PCI. CloudTrail.3  |  kontrol keamanan/ .4 CloudTrail  | 
|  pci-dss/v/3.2.1/PCI. CloudTrail.4  |  kontrol keamanan/ .5 CloudTrail  | 
|  pci-dss/v/3.2.1/PCI. CodeBuild.1  |  kontrol keamanan/ .1 CodeBuild  | 
|  pci-dss/v/3.2.1/PCI. CodeBuild.2  |  kontrol keamanan/ .2 CodeBuild  | 
|  pci- dss/v/3.2.1/PCI .config.1  |  Kontrol keamanan/config.1  | 
|  pci- dss/v/3.2.1/PCI .CW.1  |  kontrol keamanan/ .1 CloudWatch  | 
|  pci- dss/v/3.2.1/PCI .DMS.1  |  Kontrol keamanan/DMS.1  | 
|  pci- dss/v/3.2.1/PCI .EC2.1  |  Kontrol keamanan/EC2.1  | 
|  pci- dss/v/3.2.1/PCI .EC2.2  |  Kontrol keamanan/EC2.2  | 
|  pci- dss/v/3.2.1/PCI .EC2.4  |  Kontrol keamanan/EC2.12  | 
|  pci- dss/v/3.2.1/PCI .EC2.5  |  Kontrol keamanan/EC2.13  | 
|  pci- dss/v/3.2.1/PCI .EC2.6  |  Kontrol keamanan/EC2.6  | 
|  pci-dss/v/3.2.1/PCI. ELBv2.1  |  Kontrol keamanan/ELB.1  | 
|  pci- dss/v/3.2.1/PCI .ES1  |  Kontrol keamanan/ES.2  | 
|  pci- dss/v/3.2.1/PCI .ES2  |  Kontrol keamanan/ES.1  | 
|  pci-dss/v/3.2.1/PCI. GuardDuty.1  |  kontrol keamanan/ .1 GuardDuty  | 
|  pci- dss/v/3.2.1/PCI .IAM.1  |  Kontrol keamanan/IAM.4  | 
|  pci- dss/v/3.2.1/PCI .IAM.2  |  Kontrol keamanan/IAM.2  | 
|  pci- dss/v/3.2.1/PCI .IAM.3  |  Kontrol keamanan/IAM.1  | 
|  pci- dss/v/3.2.1/PCI .IAM.4  |  Kontrol keamanan/IAM.6  | 
|  pci- dss/v/3.2.1/PCI .IAM.5  |  Kontrol keamanan/IAM.9  | 
|  pci- dss/v/3.2.1/PCI .IAM.6  |  Kontrol keamanan/IAM.19  | 
|  pci- dss/v/3.2.1/PCI .IAM.7  |  Kontrol keamanan/IAM.8  | 
|  pci- dss/v/3.2.1/PCI .IAM.8  |  Kontrol keamanan/IAM.10  | 
|  pci- dss/v/3.2.1/PCI .KMS.1  |  Kontrol keamanan/KMS.4  | 
|  pci- dss/v/3.2.1/PCI .Lambda.1  |  Kontrol keamanan/Lambda.1  | 
|  pci- dss/v/3.2.1/PCI .Lambda.2  |  Kontrol keamanan/Lambda.3  | 
|  pci- dss/v/3.2.1/PCI .Opensearch.1  |  Kontrol keamanan/OpenSearch.2  | 
|  pci- dss/v/3.2.1/PCI .Opensearch.2  |  Kontrol keamanan/OpenSearch.1  | 
|  pci- dss/v/3.2.1/PCI .RDS.1  |  Kontrol keamanan/RDS.1  | 
|  pci- dss/v/3.2.1/PCI .RDS.2  |  Kontrol keamanan/RDS.2  | 
|  pci- dss/v/3.2.1/PCI .Redshift.1  |  Kontrol keamanan/pergeseran merah.1  | 
|  pci- dss/v/3.2.1/PCI .S3.1  |  Kontrol keamanan/S3.3  | 
|  pci- dss/v/3.2.1/PCI .S3.2  |  Kontrol keamanan/S3.2  | 
|  pci- dss/v/3.2.1/PCI .S3.3  |  Kontrol keamanan/S3.7  | 
|  pci- dss/v/3.2.1/PCI .S3.5  |  Kontrol keamanan/S3.5  | 
|  pci- dss/v/3.2.1/PCI .S3.6  |  Kontrol keamanan/S3.1  | 
|  pci-dss/v/3.2.1/PCI. SageMaker.1  |  kontrol keamanan/ .1 SageMaker  | 
|  pci- dss/v/3.2.1/PCI .SSM.1  |  Kontrol keamanan/SSM.2  | 
|  pci- dss/v/3.2.1/PCI .SSM.2  |  Kontrol keamanan/SSM.3  | 
|  pci- dss/v/3.2.1/PCI .SSM.3  |  Kontrol keamanan/SSM.1  | 
|  service-managed-aws-control- tower/v/1.0.0/ACM .1  |  Kontrol keamanan/ACM.1  | 
|  service-managed-aws-control- tower/v/1.0.0/APIGateway .1  |  kontrol keamanan/ .1 APIGateway  | 
|  service-managed-aws-control- tower/v/1.0.0/APIGateway .2  |  kontrol keamanan/ .2 APIGateway  | 
|  service-managed-aws-control- tower/v/1.0.0/APIGateway .3  |  kontrol keamanan/ .3 APIGateway  | 
|  service-managed-aws-control- tower/v/1.0.0/APIGateway .4  |  kontrol keamanan/ .4 APIGateway  | 
|  service-managed-aws-control- tower/v/1.0.0/APIGateway .5  |  kontrol keamanan/ .5 APIGateway  | 
|  service-managed-aws-control- tower/v/1.0.0/AutoScaling .1  |  kontrol keamanan/ .1 AutoScaling  | 
|  service-managed-aws-control- tower/v/1.0.0/AutoScaling .2  |  kontrol keamanan/ .2 AutoScaling  | 
|  service-managed-aws-control- tower/v/1.0.0/AutoScaling .3  |  kontrol keamanan/ .3 AutoScaling  | 
|  service-managed-aws-control- tower/v/1.0.0/AutoScaling .4  |  kontrol keamanan/ .4 AutoScaling  | 
|  service-managed-aws-control- tower/v/1.0.0/Autoscaling .5  |  Kontrol keamanan/penskalan.5  | 
|  service-managed-aws-control- tower/v/1.0.0/AutoScaling .6  |  kontrol keamanan/ .6 AutoScaling  | 
|  service-managed-aws-control- tower/v/1.0.0/AutoScaling .9  |  kontrol keamanan/ .9 AutoScaling  | 
|  service-managed-aws-control- tower/v/1.0.0/CloudTrail .1  |  kontrol keamanan/ .1 CloudTrail  | 
|  service-managed-aws-control- tower/v/1.0.0/CloudTrail .2  |  kontrol keamanan/ .2 CloudTrail  | 
|  service-managed-aws-control- tower/v/1.0.0/CloudTrail .4  |  kontrol keamanan/ .4 CloudTrail  | 
|  service-managed-aws-control- tower/v/1.0.0/CloudTrail .5  |  kontrol keamanan/ .5 CloudTrail  | 
|  service-managed-aws-control- tower/v/1.0.0/CodeBuild .1  |  kontrol keamanan/ .1 CodeBuild  | 
|  service-managed-aws-control- tower/v/1.0.0/CodeBuild .2  |  kontrol keamanan/ .2 CodeBuild  | 
|  service-managed-aws-control- tower/v/1.0.0/CodeBuild .4  |  kontrol keamanan/ .4 CodeBuild  | 
|  service-managed-aws-control- tower/v/1.0.0/CodeBuild .5  |  kontrol keamanan/ .5 CodeBuild  | 
|  service-managed-aws-control- tower/v/1.0.0/DMS .1  |  Kontrol keamanan/DMS.1  | 
|  service-managed-aws-control- tower/v/1.0.0/DynamoDB .1  |  Kontrol keamanan/DynamoDB.1  | 
|  service-managed-aws-control- tower/v/1.0.0/DynamoDB .2  |  Kontrol keamanan/DynamoDB.2  | 
|  service-managed-aws-control- tower/v/1.0.0/EC 2.1  |  Kontrol keamanan/EC2.1  | 
|  service-managed-aws-control- tower/v/1.0.0/EC 2.2  |  Kontrol keamanan/EC2.2  | 
|  service-managed-aws-control- tower/v/1.0.0/EC 2.3  |  Kontrol keamanan/EC2.3  | 
|  service-managed-aws-control- tower/v/1.0.0/EC 2,4  |  Kontrol keamanan/EC2.4  | 
|  service-managed-aws-control- tower/v/1.0.0/EC 2.6  |  Kontrol keamanan/EC2.6  | 
|  service-managed-aws-control- tower/v/1.0.0/EC 2,7  |  Kontrol keamanan/EC2.7  | 
|  service-managed-aws-control- tower/v/1.0.0/EC 2,8  |  Kontrol keamanan/EC2.8  | 
|  service-managed-aws-control- tower/v/1.0.0/EC 2,9  |  Kontrol keamanan/EC2.9  | 
|  service-managed-aws-control- tower/v/1.0.0/EC 2.10  |  Kontrol keamanan/EC2.10  | 
|  service-managed-aws-control- tower/v/1.0.0/EC 2.15  |  Kontrol keamanan/EC2.15  | 
|  service-managed-aws-control- tower/v/1.0.0/EC 2.16  |  Kontrol keamanan/EC2.16  | 
|  service-managed-aws-control- tower/v/1.0.0/EC 2.17  |  Kontrol keamanan/EC2.17  | 
|  service-managed-aws-control- tower/v/1.0.0/EC 2.18  |  Kontrol keamanan/EC2.18  | 
|  service-managed-aws-control- tower/v/1.0.0/EC 2.19  |  Kontrol keamanan/EC2.19  | 
|  service-managed-aws-control- tower/v/1.0.0/EC 2.20  |  Kontrol keamanan/EC2.20  | 
|  service-managed-aws-control- tower/v/1.0.0/EC 2,21  |  Kontrol keamanan/EC2.21  | 
|  service-managed-aws-control- tower/v/1.0.0/EC 2,22  |  Kontrol keamanan/EC2.22  | 
|  service-managed-aws-control- tower/v/1.0.0/ECR .1  |  Kontrol keamanan/ECR.1  | 
|  service-managed-aws-control- tower/v/1.0.0/ECR .2  |  Kontrol keamanan/ECR.2  | 
|  service-managed-aws-control- tower/v/1.0.0/ECR .3  |  Kontrol keamanan/ECR.3  | 
|  service-managed-aws-control- tower/v/1.0.0/ECS .1  |  Kontrol keamanan/ECS.1  | 
|  service-managed-aws-control- tower/v/1.0.0/ECS .2  |  Kontrol keamanan/ECS.2  | 
|  service-managed-aws-control- tower/v/1.0.0/ECS .3  |  Kontrol keamanan/ECS.3  | 
|  service-managed-aws-control- tower/v/1.0.0/ECS .4  |  Kontrol keamanan/ECS.4  | 
|  service-managed-aws-control- tower/v/1.0.0/ECS .5  |  Kontrol keamanan/ECS.5  | 
|  service-managed-aws-control- tower/v/1.0.0/ECS .8  |  Kontrol keamanan/ECS.8  | 
|  service-managed-aws-control- tower/v/1.0.0/ECS .10  |  Kontrol keamanan/ECS.10  | 
|  service-managed-aws-control- tower/v/1.0.0/ECS .12  |  Kontrol keamanan/ECS.12  | 
|  service-managed-aws-control- tower/v/1.0.0/EFS .1  |  Kontrol keamanan/EFS.1  | 
|  service-managed-aws-control- tower/v/1.0.0/EFS .2  |  Kontrol keamanan/EFS.2  | 
|  service-managed-aws-control- tower/v/1.0.0/EFS .3  |  Kontrol keamanan/EFS.3  | 
|  service-managed-aws-control- tower/v/1.0.0/EFS .4  |  Kontrol keamanan/EFS.4  | 
|  service-managed-aws-control- tower/v/1.0.0/EKS .2  |  Kontrol keamanan/EKS.2  | 
|  service-managed-aws-control- tower/v/1.0.0/ELB .2  |  Kontrol keamanan/ELB.2  | 
|  service-managed-aws-control- tower/v/1.0.0/ELB .3  |  Kontrol keamanan/ELB.3  | 
|  service-managed-aws-control- tower/v/1.0.0/ELB .4  |  Kontrol keamanan/ELB.4  | 
|  service-managed-aws-control- tower/v/1.0.0/ELB .5  |  Kontrol keamanan/ELB.5  | 
|  service-managed-aws-control- tower/v/1.0.0/ELB .6  |  Kontrol keamanan/ELB.6  | 
|  service-managed-aws-control- tower/v/1.0.0/ELB .7  |  Kontrol keamanan/ELB.7  | 
|  service-managed-aws-control- tower/v/1.0.0/ELB .8  |  Kontrol keamanan/ELB.8  | 
|  service-managed-aws-control- tower/v/1.0.0/ELB .9  |  Kontrol keamanan/ELB.9  | 
|  service-managed-aws-control- tower/v/1.0.0/ELB .10  |  Kontrol keamanan/ELB.10  | 
|  service-managed-aws-control- tower/v/1.0.0/ELB .12  |  Kontrol keamanan/ELB.12  | 
|  service-managed-aws-control- tower/v/1.0.0/ELB .13  |  Kontrol keamanan/ELB.13  | 
|  service-managed-aws-control- tower/v/1.0.0/ELB .14  |  Kontrol keamanan/ELB.14  | 
|  service-managed-aws-control- tower/v/1.0.0/ELBv 2.1  |  kontrol keamanan/ .1 ELBv2  | 
|  service-managed-aws-control- tower/v/1.0.0/EMR .1  |  Kontrol keamanan/EMR.1  | 
|  service-managed-aws-control- tower/v/1.0.0/ES .1  |  Kontrol keamanan/ES.1  | 
|  service-managed-aws-control- tower/v/1.0.0/ES .2  |  Kontrol keamanan/ES.2  | 
|  service-managed-aws-control- tower/v/1.0.0/ES .3  |  Kontrol keamanan/ES.3  | 
|  service-managed-aws-control- tower/v/1.0.0/ES .4  |  Kontrol keamanan/ES.4  | 
|  service-managed-aws-control- tower/v/1.0.0/ES .5  |  Kontrol keamanan/ES.5  | 
|  service-managed-aws-control- tower/v/1.0.0/ES .6  |  Kontrol keamanan/ES.6  | 
|  service-managed-aws-control- tower/v/1.0.0/ES .7  |  Kontrol keamanan/ES.7  | 
|  service-managed-aws-control- tower/v/1.0.0/ES .8  |  Kontrol keamanan/ES.8  | 
|  service-managed-aws-control- tower/v/1.0.0/ElasticBeanstalk .1  |  kontrol keamanan/ .1 ElasticBeanstalk  | 
|  service-managed-aws-control- tower/v/1.0.0/ElasticBeanstalk .2  |  kontrol keamanan/ .2 ElasticBeanstalk  | 
|  service-managed-aws-control- tower/v/1.0.0/GuardDuty .1  |  kontrol keamanan/ .1 GuardDuty  | 
|  service-managed-aws-control- tower/v/1.0.0/IAM .1  |  Kontrol keamanan/IAM.1  | 
|  service-managed-aws-control- tower/v/1.0.0/IAM .2  |  Kontrol keamanan/IAM.2  | 
|  service-managed-aws-control- tower/v/1.0.0/IAM .3  |  Kontrol keamanan/IAM.3  | 
|  service-managed-aws-control- tower/v/1.0.0/IAM .4  |  Kontrol keamanan/IAM.4  | 
|  service-managed-aws-control- tower/v/1.0.0/IAM .5  |  Kontrol keamanan/IAM.5  | 
|  service-managed-aws-control- tower/v/1.0.0/IAM .6  |  Kontrol keamanan/IAM.6  | 
|  service-managed-aws-control- tower/v/1.0.0/IAM .7  |  Kontrol keamanan/IAM.7  | 
|  service-managed-aws-control- tower/v/1.0.0/IAM .8  |  Kontrol keamanan/IAM.8  | 
|  service-managed-aws-control- tower/v/1.0.0/IAM .21  |  Kontrol keamanan/IAM.21  | 
|  service-managed-aws-control- tower/v/1.0.0/Kinesis .1  |  Kontrol keamanan/kinesis.1  | 
|  service-managed-aws-control- tower/v/1.0.0/KMS .1  |  Kontrol keamanan/KMS.1  | 
|  service-managed-aws-control- tower/v/1.0.0/KMS .2  |  Kontrol keamanan/KMS.2  | 
|  service-managed-aws-control- tower/v/1.0.0/KMS .3  |  Kontrol keamanan/KMS.3  | 
|  service-managed-aws-control- tower/v/1.0.0/Lambda .1  |  Kontrol keamanan/Lambda.1  | 
|  service-managed-aws-control- tower/v/1.0.0/Lambda .2  |  Kontrol keamanan/Lambda.2  | 
|  service-managed-aws-control- tower/v/1.0.0/Lambda .5  |  Kontrol keamanan/Lambda.5  | 
|  service-managed-aws-control- tower/v/1.0.0/NetworkFirewall .3  |  kontrol keamanan/ .3 NetworkFirewall  | 
|  service-managed-aws-control- tower/v/1.0.0/NetworkFirewall .4  |  kontrol keamanan/ .4 NetworkFirewall  | 
|  service-managed-aws-control- tower/v/1.0.0/NetworkFirewall .5  |  kontrol keamanan/ .5 NetworkFirewall  | 
|  service-managed-aws-control- tower/v/1.0.0/NetworkFirewall .6  |  kontrol keamanan/ .6 NetworkFirewall  | 
|  service-managed-aws-control- tower/v/1.0.0/Opensearch .1  |  Kontrol keamanan/OpenSearch.1  | 
|  service-managed-aws-control- tower/v/1.0.0/Opensearch .2  |  Kontrol keamanan/OpenSearch.2  | 
|  service-managed-aws-control- tower/v/1.0.0/Opensearch .3  |  Kontrol keamanan/OpenSearch.3  | 
|  service-managed-aws-control- tower/v/1.0.0/Opensearch .4  |  Kontrol keamanan/OpenSearch.4  | 
|  service-managed-aws-control- tower/v/1.0.0/Opensearch .5  |  Kontrol keamanan/OpenSearch.5  | 
|  service-managed-aws-control- tower/v/1.0.0/Opensearch .6  |  Kontrol keamanan/OpenSearch.6  | 
|  service-managed-aws-control- tower/v/1.0.0/Opensearch .7  |  Kontrol keamanan/OpenSearch.7  | 
|  service-managed-aws-control- tower/v/1.0.0/Opensearch .8  |  Kontrol keamanan/OpenSearch.8  | 
|  service-managed-aws-control- tower/v/1.0.0/RDS .1  |  Kontrol keamanan/RDS.1  | 
|  service-managed-aws-control- tower/v/1.0.0/RDS .2  |  Kontrol keamanan/RDS.2  | 
|  service-managed-aws-control- tower/v/1.0.0/RDS .3  |  Kontrol keamanan/RDS.3  | 
|  service-managed-aws-control- tower/v/1.0.0/RDS .4  |  Kontrol keamanan/RDS.4  | 
|  service-managed-aws-control- tower/v/1.0.0/RDS .5  |  Kontrol keamanan/RDS.5  | 
|  service-managed-aws-control- tower/v/1.0.0/RDS .6  |  Kontrol keamanan/RDS.6  | 
|  service-managed-aws-control- tower/v/1.0.0/RDS .8  |  Kontrol keamanan/RDS.8  | 
|  service-managed-aws-control- tower/v/1.0.0/RDS .9  |  Kontrol keamanan/RDS.9  | 
|  service-managed-aws-control- tower/v/1.0.0/RDS .10  |  Kontrol keamanan/RDS.10  | 
|  service-managed-aws-control- tower/v/1.0.0/RDS .11  |  Kontrol keamanan/RDS.11  | 
|  service-managed-aws-control- tower/v/1.0.0/RDS .13  |  Kontrol keamanan/RDS.13  | 
|  service-managed-aws-control- tower/v/1.0.0/RDS .17  |  Kontrol keamanan/RDS.17  | 
|  service-managed-aws-control- tower/v/1.0.0/RDS .18  |  Kontrol keamanan/RDS.18  | 
|  service-managed-aws-control- tower/v/1.0.0/RDS .19  |  Kontrol keamanan/RDS.19  | 
|  service-managed-aws-control- tower/v/1.0.0/RDS .20  |  Kontrol keamanan/RDS.20  | 
|  service-managed-aws-control- tower/v/1.0.0/RDS .21  |  Kontrol keamanan/RDS.21  | 
|  service-managed-aws-control- tower/v/1.0.0/RDS .22  |  Kontrol keamanan/RDS.22  | 
|  service-managed-aws-control- tower/v/1.0.0/RDS .23  |  Kontrol keamanan/RDS.23  | 
|  service-managed-aws-control- tower/v/1.0.0/RDS .25  |  Kontrol keamanan/RDS.25  | 
|  service-managed-aws-control- tower/v/1.0.0/Redshift .1  |  Kontrol keamanan/pergeseran merah.1  | 
|  service-managed-aws-control- tower/v/1.0.0/Redshift .2  |  Kontrol keamanan/pergeseran merah.2  | 
|  service-managed-aws-control- tower/v/1.0.0/Redshift .4  |  Kontrol keamanan/Redshift.4  | 
|  service-managed-aws-control- tower/v/1.0.0/Redshift .6  |  Kontrol keamanan/pergeseran merah.6  | 
|  service-managed-aws-control- tower/v/1.0.0/Redshift .7  |  Kontrol keamanan/pergeseran merah.7  | 
|  service-managed-aws-control- tower/v/1.0.0/Redshift .8  |  Kontrol keamanan/pergeseran merah.8  | 
|  service-managed-aws-control- tower/v/1.0.0/Redshift .9  |  Kontrol keamanan/pergeseran merah.9  | 
|  service-managed-aws-control- tower/v/1.0.0/S 3.1  |  Kontrol keamanan/S3.1  | 
|  service-managed-aws-control- tower/v/1.0.0/S 3.2  |  Kontrol keamanan/S3.2  | 
|  service-managed-aws-control- tower/v/1.0.0/S 3,3  |  Kontrol keamanan/S3.3  | 
|  service-managed-aws-control- tower/v/1.0.0/S 3,5  |  Kontrol keamanan/S3.5  | 
|  service-managed-aws-control- tower/v/1.0.0/S 3,6  |  Kontrol keamanan/S3.6  | 
|  service-managed-aws-control- tower/v/1.0.0/S 3,8  |  Kontrol keamanan/S3.8  | 
|  service-managed-aws-control- tower/v/1.0.0/S 3,9  |  Kontrol keamanan/S3.9  | 
|  service-managed-aws-control- tower/v/1.0.0/S 3.12  |  Kontrol keamanan/S3.12  | 
|  service-managed-aws-control- tower/v/1.0.0/S 3.13  |  Kontrol keamanan/S3.13  | 
|  service-managed-aws-control- tower/v/1.0.0/SageMaker .1  |  kontrol keamanan/ .1 SageMaker  | 
|  service-managed-aws-control- tower/v/1.0.0/SecretsManager .1  |  kontrol keamanan/ .1 SecretsManager  | 
|  service-managed-aws-control- tower/v/1.0.0/SecretsManager .2  |  kontrol keamanan/ .2 SecretsManager  | 
|  service-managed-aws-control- tower/v/1.0.0/SecretsManager .3  |  kontrol keamanan/ .3 SecretsManager  | 
|  service-managed-aws-control- tower/v/1.0.0/SecretsManager .4  |  kontrol keamanan/ .4 SecretsManager  | 
|  service-managed-aws-control- tower/v/1.0.0/SQS .1  |  Kontrol keamanan/SQS.1  | 
|  service-managed-aws-control- tower/v/1.0.0/SSM .1  |  Kontrol keamanan/SSM.1  | 
|  service-managed-aws-control- tower/v/1.0.0/SSM .2  |  Kontrol keamanan/SSM.2  | 
|  service-managed-aws-control- tower/v/1.0.0/SSM .3  |  Kontrol keamanan/SSM.3  | 
|  service-managed-aws-control- tower/v/1.0.0/SSM .4  |  Kontrol keamanan/SSM.4  | 
|  service-managed-aws-control- tower/v/1.0.0/WAF .2  |  Kontrol keamanan/WAF.2  | 
|  service-managed-aws-control- tower/v/1.0.0/WAF .3  |  Kontrol keamanan/WAF.3  | 
|  service-managed-aws-control- tower/v/1.0.0/WAF .4  |  Kontrol keamanan/WAF.4  | 

## Bagaimana konsolidasi berdampak pada kontrol IDs dan judul
<a name="securityhub-findings-format-changes-ids-titles"></a>

Tampilan kontrol terkonsolidasi dan temuan kontrol terkonsolidasi menstandarisasi kontrol IDs dan judul di seluruh standar. Istilah *ID kontrol keamanan* dan *judul kontrol keamanan* mengacu pada nilai agnostik standar ini.

Konsol CSPM Security Hub menampilkan kontrol keamanan agnostik standar IDs dan judul kontrol keamanan, terlepas dari apakah temuan kontrol konsolidasi diaktifkan atau dinonaktifkan untuk akun Anda. Namun, temuan CSPM Security Hub berisi judul kontrol khusus standar, untuk PCI DSS dan CIS v1.2.0, jika temuan kontrol konsolidasi dinonaktifkan untuk akun Anda. Selain itu, temuan CSPM Security Hub berisi ID kontrol khusus standar dan ID kontrol keamanan. Untuk contoh bagaimana konsolidasi berdampak pada temuan kontrol, lihat[Sampel temuan kontrol](sample-control-findings.md).

Untuk kontrol yang merupakan bagian dari [standar yang AWS Control Tower dikelola layanan](service-managed-standard-aws-control-tower.md), awalan `CT.` dihapus dari ID kontrol dan judul dalam temuan saat temuan kontrol terkonsolidasi diaktifkan.

Untuk menonaktifkan kontrol keamanan di Security Hub CSPM, Anda harus menonaktifkan semua kontrol standar yang sesuai dengan kontrol keamanan. Tabel berikut menunjukkan pemetaan kontrol keamanan IDs dan judul ke kontrol dan judul khusus standar. IDs IDs dan judul untuk kontrol yang termasuk dalam standar Praktik Terbaik Keamanan AWS Dasar (FSBP) sudah agnostik standar. Untuk pemetaan kontrol ke persyaratan Center for Internet Security (CIS) v3.0.0, lihat. [Pemetaan kontrol ke persyaratan CIS di setiap versi](cis-aws-foundations-benchmark.md#cis-version-comparison) Untuk menjalankan skrip Anda sendiri di tabel ini, Anda dapat [mengunduhnya sebagai file.csv.](samples/Consolidation_ID_Title_Changes.csv.zip)


| Standar | ID kontrol standar dan judul | ID dan judul kontrol keamanan | 
| --- | --- | --- | 
|  CIS v1.2.0  |  1.1 Hindari penggunaan pengguna root  |  [[CloudWatch.1] Filter metrik log dan alarm harus ada untuk penggunaan pengguna “root”](cloudwatch-controls.md#cloudwatch-1)  | 
|  CIS v1.2.0  |  1.10 Pastikan kebijakan kata sandi IAM mencegah penggunaan kembali kata sandi  |  [[IAM.16] Pastikan kebijakan kata sandi IAM mencegah penggunaan kembali kata sandi](iam-controls.md#iam-16)  | 
|  CIS v1.2.0  |  1.11 Pastikan kebijakan kata sandi IAM kedaluwarsa kata sandi dalam waktu 90 hari atau kurang  |  [[IAM.17] Pastikan kebijakan kata sandi IAM kedaluwarsa kata sandi dalam waktu 90 hari atau kurang](iam-controls.md#iam-17)  | 
|  CIS v1.2.0  |  1.12 Pastikan tidak ada kunci akses pengguna root  |  [[IAM.4] Kunci akses pengguna root IAM seharusnya tidak ada](iam-controls.md#iam-4)  | 
|  CIS v1.2.0  |  1.13 Pastikan MFA diaktifkan untuk pengguna root  |  [[IAM.9] MFA harus diaktifkan untuk pengguna root](iam-controls.md#iam-9)  | 
|  CIS v1.2.0  |  1.14 Pastikan MFA perangkat keras diaktifkan untuk pengguna root  |  [[IAM.6] MFA perangkat keras harus diaktifkan untuk pengguna root](iam-controls.md#iam-6)  | 
|  CIS v1.2.0  |  1.16 Pastikan kebijakan IAM hanya dilampirkan pada grup atau peran  |  [[IAM.2] Pengguna IAM seharusnya tidak memiliki kebijakan IAM yang dilampirkan](iam-controls.md#iam-2)  | 
|  CIS v1.2.0  |  1.2 Pastikan otentikasi multi-faktor (MFA) diaktifkan untuk semua pengguna IAM yang memiliki kata sandi konsol  |  [[IAM.5] MFA harus diaktifkan untuk semua pengguna IAM yang memiliki kata sandi konsol](iam-controls.md#iam-5)  | 
|  CIS v1.2.0  |  1.20 Memastikan peran dukungan telah dibuat untuk mengelola insiden dengan Dukungan  |  [[IAM.18] Memastikan peran dukungan telah dibuat untuk mengelola insiden dengan AWS Dukungan](iam-controls.md#iam-18)  | 
|  CIS v1.2.0  |  1.22 Pastikan kebijakan IAM yang memungkinkan hak administratif “\$1: \$1” penuh tidak dibuat  |  [[IAM.1] Kebijakan IAM seharusnya tidak mengizinkan hak administratif “\$1” penuh](iam-controls.md#iam-1)  | 
|  CIS v1.2.0  |  1.3 Pastikan kredensil yang tidak digunakan selama 90 hari atau lebih dinonaktifkan  |  [[IAM.8] Kredensi pengguna IAM yang tidak digunakan harus dihapus](iam-controls.md#iam-8)  | 
|  CIS v1.2.0  |  1.4 Pastikan kunci akses diputar setiap 90 hari atau kurang  |  [[IAM.3] Kunci akses pengguna IAM harus diputar setiap 90 hari atau kurang](iam-controls.md#iam-3)  | 
|  CIS v1.2.0  |  1.5 Pastikan kebijakan kata sandi IAM membutuhkan setidaknya satu huruf besar  |  [[IAM.11] Pastikan kebijakan kata sandi IAM membutuhkan setidaknya satu huruf besar](iam-controls.md#iam-11)  | 
|  CIS v1.2.0  |  1.6 Pastikan kebijakan kata sandi IAM membutuhkan setidaknya satu huruf kecil  |  [[IAM.12] Pastikan kebijakan kata sandi IAM membutuhkan setidaknya satu huruf kecil](iam-controls.md#iam-12)  | 
|  CIS v1.2.0  |  1.7 Pastikan kebijakan kata sandi IAM membutuhkan setidaknya satu simbol  |  [[IAM.13] Pastikan kebijakan kata sandi IAM membutuhkan setidaknya satu simbol](iam-controls.md#iam-13)  | 
|  CIS v1.2.0  |  1.8 Pastikan kebijakan kata sandi IAM membutuhkan setidaknya satu nomor  |  [[IAM.14] Pastikan kebijakan kata sandi IAM membutuhkan setidaknya satu nomor](iam-controls.md#iam-14)  | 
|  CIS v1.2.0  |  1.9 Pastikan kebijakan kata sandi IAM memerlukan panjang kata sandi minimum 14 atau lebih  |  [[IAM.15] Pastikan kebijakan kata sandi IAM membutuhkan panjang kata sandi minimum 14 atau lebih](iam-controls.md#iam-15)  | 
|  CIS v1.2.0  |  2.1 Pastikan CloudTrail diaktifkan di semua wilayah  |  [[CloudTrail.1] CloudTrail harus diaktifkan dan dikonfigurasi dengan setidaknya satu jejak Multi-wilayah yang mencakup acara manajemen baca dan tulis](cloudtrail-controls.md#cloudtrail-1)  | 
|  CIS v1.2.0  |  2.2 Pastikan validasi file CloudTrail log diaktifkan  |  [[CloudTrail.4] validasi file CloudTrail log harus diaktifkan](cloudtrail-controls.md#cloudtrail-4)  | 
|  CIS v1.2.0  |  2.3 Pastikan bucket S3 yang digunakan untuk menyimpan CloudTrail log tidak dapat diakses publik  |  [[CloudTrail.6] Pastikan bucket S3 yang digunakan untuk menyimpan CloudTrail log tidak dapat diakses publik](cloudtrail-controls.md#cloudtrail-6)  | 
|  CIS v1.2.0  |  2.4 Pastikan CloudTrail jalur terintegrasi dengan Log CloudWatch   |  [[CloudTrail.5] CloudTrail jalur harus diintegrasikan dengan Amazon Logs CloudWatch](cloudtrail-controls.md#cloudtrail-5)  | 
|  CIS v1.2.0  |  2.5 Pastikan AWS Config diaktifkan  |  [[Config.1] AWS Config harus diaktifkan dan menggunakan peran terkait layanan untuk perekaman sumber daya](config-controls.md#config-1)  | 
|  CIS v1.2.0  |  2.6 Pastikan pencatatan akses bucket S3 diaktifkan pada bucket CloudTrail S3  |  [[CloudTrail.7] Pastikan pencatatan akses bucket S3 diaktifkan pada bucket CloudTrail S3](cloudtrail-controls.md#cloudtrail-7)  | 
|  CIS v1.2.0  |  2.7 Pastikan CloudTrail log dienkripsi saat istirahat menggunakan KMS CMKs  |  [[CloudTrail.2] CloudTrail harus mengaktifkan enkripsi saat istirahat](cloudtrail-controls.md#cloudtrail-2)  | 
|  CIS v1.2.0  |  2.8 Pastikan rotasi untuk pelanggan yang dibuat CMKs diaktifkan  |  [[KMS.4] rotasi AWS KMS tombol harus diaktifkan](kms-controls.md#kms-4)  | 
|  CIS v1.2.0  |  2.9 Pastikan pencatatan aliran VPC diaktifkan di semua VPCs  |  [[EC2.6] Pencatatan aliran VPC harus diaktifkan di semua VPCs](ec2-controls.md#ec2-6)  | 
|  CIS v1.2.0  |  3.1 Pastikan filter metrik log dan alarm ada untuk panggilan API yang tidak sah  |  [[CloudWatch.2] Pastikan filter metrik log dan alarm ada untuk panggilan API yang tidak sah](cloudwatch-controls.md#cloudwatch-2)  | 
|  CIS v1.2.0  |  3.10 Pastikan filter metrik log dan alarm ada untuk perubahan grup keamanan  |  [[CloudWatch.10] Pastikan filter metrik log dan alarm ada untuk perubahan grup keamanan](cloudwatch-controls.md#cloudwatch-10)  | 
|  CIS v1.2.0  |  3.11 Pastikan filter metrik log dan alarm ada untuk perubahan pada Daftar Kontrol Akses Jaringan (NACL)  |  [[CloudWatch.11] Pastikan filter metrik log dan alarm ada untuk perubahan pada Daftar Kontrol Akses Jaringan (NACL)](cloudwatch-controls.md#cloudwatch-11)  | 
|  CIS v1.2.0  |  3.12 Pastikan filter metrik log dan alarm ada untuk perubahan gateway jaringan  |  [[CloudWatch.12] Pastikan filter metrik log dan alarm ada untuk perubahan gateway jaringan](cloudwatch-controls.md#cloudwatch-12)  | 
|  CIS v1.2.0  |  3.13 Pastikan filter metrik log dan alarm ada untuk perubahan tabel rute  |  [[CloudWatch.13] Pastikan filter metrik log dan alarm ada untuk perubahan tabel rute](cloudwatch-controls.md#cloudwatch-13)  | 
|  CIS v1.2.0  |  3.14 Pastikan filter metrik log dan alarm ada untuk perubahan VPC  |  [[CloudWatch.14] Pastikan filter metrik log dan alarm ada untuk perubahan VPC](cloudwatch-controls.md#cloudwatch-14)  | 
|  CIS v1.2.0  |  3.2 Pastikan filter metrik log dan alarm ada untuk login Konsol Manajemen tanpa MFA  |  [[CloudWatch.3] Pastikan filter metrik log dan alarm ada untuk login Konsol Manajemen tanpa MFA](cloudwatch-controls.md#cloudwatch-3)  | 
|  CIS v1.2.0  |  3.3 Pastikan filter metrik log dan alarm ada untuk penggunaan pengguna root  |  [[CloudWatch.1] Filter metrik log dan alarm harus ada untuk penggunaan pengguna “root”](cloudwatch-controls.md#cloudwatch-1)  | 
|  CIS v1.2.0  |  3.4 Pastikan filter metrik log dan alarm ada untuk perubahan kebijakan IAM  |  [[CloudWatch.4] Pastikan filter metrik log dan alarm ada untuk perubahan kebijakan IAM](cloudwatch-controls.md#cloudwatch-4)  | 
|  CIS v1.2.0  |  3.5 Pastikan filter metrik log dan alarm ada untuk perubahan CloudTrail konfigurasi  |  [[CloudWatch.5] Pastikan filter metrik log dan alarm ada untuk perubahan CloudTrail konfigurasi](cloudwatch-controls.md#cloudwatch-5)  | 
|  CIS v1.2.0  |  3.6 Pastikan filter metrik log dan alarm ada untuk kegagalan Konsol Manajemen AWS otentikasi  |  [[CloudWatch.6] Pastikan filter metrik log dan alarm ada untuk kegagalan Konsol Manajemen AWS otentikasi](cloudwatch-controls.md#cloudwatch-6)  | 
|  CIS v1.2.0  |  3.7 Pastikan filter metrik log dan alarm ada untuk menonaktifkan atau terjadwal penghapusan pelanggan yang dibuat CMKs  |  [[CloudWatch.7] Pastikan filter metrik log dan alarm ada untuk menonaktifkan atau menjadwalkan penghapusan kunci yang dikelola pelanggan](cloudwatch-controls.md#cloudwatch-7)  | 
|  CIS v1.2.0  |  3.8 Pastikan filter metrik log dan alarm ada untuk perubahan kebijakan bucket S3  |  [[CloudWatch.8] Pastikan filter metrik log dan alarm ada untuk perubahan kebijakan bucket S3](cloudwatch-controls.md#cloudwatch-8)  | 
|  CIS v1.2.0  |  3.9 Pastikan filter metrik log dan alarm ada untuk perubahan AWS Config konfigurasi  |  [[CloudWatch.9] Pastikan filter metrik log dan alarm ada untuk perubahan AWS Config konfigurasi](cloudwatch-controls.md#cloudwatch-9)  | 
|  CIS v1.2.0  |  4.1 Pastikan tidak ada grup keamanan yang mengizinkan masuknya dari 0.0.0.0/0 ke port 22  |  [[EC2.13] Grup keamanan tidak boleh mengizinkan masuknya dari 0.0.0.0/0 atau: :/0 ke port 22](ec2-controls.md#ec2-13)  | 
|  CIS v1.2.0  |  4.2 Pastikan tidak ada grup keamanan yang mengizinkan masuknya dari 0.0.0.0/0 ke port 3389  |  [[EC2.14] Grup keamanan tidak boleh mengizinkan masuknya dari 0.0.0.0/0 atau: :/0 ke port 3389](ec2-controls.md#ec2-14)  | 
|  CIS v1.2.0  |  4.3 Pastikan grup keamanan default dari setiap VPC membatasi semua lalu lintas  |  [[EC2.2] Grup keamanan default VPC tidak boleh mengizinkan lalu lintas masuk atau keluar](ec2-controls.md#ec2-2)  | 
|  CIS v1.4.0  |  1.10 Pastikan otentikasi multi-faktor (MFA) diaktifkan untuk semua pengguna IAM yang memiliki kata sandi konsol  |  [[IAM.5] MFA harus diaktifkan untuk semua pengguna IAM yang memiliki kata sandi konsol](iam-controls.md#iam-5)  | 
|  CIS v1.4.0  |  1.14 Pastikan kunci akses diputar setiap 90 hari atau kurang  |  [[IAM.3] Kunci akses pengguna IAM harus diputar setiap 90 hari atau kurang](iam-controls.md#iam-3)  | 
|  CIS v1.4.0  |  1.16 Pastikan kebijakan IAM yang memungkinkan hak administratif “\$1: \$1” penuh tidak dilampirkan  |  [[IAM.1] Kebijakan IAM seharusnya tidak mengizinkan hak administratif “\$1” penuh](iam-controls.md#iam-1)  | 
|  CIS v1.4.0  |  1.17 Memastikan peran dukungan telah dibuat untuk mengelola insiden dengan Dukungan  |  [[IAM.18] Memastikan peran dukungan telah dibuat untuk mengelola insiden dengan AWS Dukungan](iam-controls.md#iam-18)  | 
|  CIS v1.4.0  |  1.4 Pastikan tidak ada kunci akses akun pengguna root  |  [[IAM.4] Kunci akses pengguna root IAM seharusnya tidak ada](iam-controls.md#iam-4)  | 
|  CIS v1.4.0  |  1.5 Pastikan MFA diaktifkan untuk akun pengguna root  |  [[IAM.9] MFA harus diaktifkan untuk pengguna root](iam-controls.md#iam-9)  | 
|  CIS v1.4.0  |  1.6 Pastikan MFA perangkat keras diaktifkan untuk akun pengguna root  |  [[IAM.6] MFA perangkat keras harus diaktifkan untuk pengguna root](iam-controls.md#iam-6)  | 
|  CIS v1.4.0  |  1.7 Hilangkan penggunaan pengguna root untuk tugas administratif dan harian  |  [[CloudWatch.1] Filter metrik log dan alarm harus ada untuk penggunaan pengguna “root”](cloudwatch-controls.md#cloudwatch-1)  | 
|  CIS v1.4.0  |  1.8 Pastikan kebijakan kata sandi IAM membutuhkan panjang minimum 14 atau lebih  |  [[IAM.15] Pastikan kebijakan kata sandi IAM membutuhkan panjang kata sandi minimum 14 atau lebih](iam-controls.md#iam-15)  | 
|  CIS v1.4.0  |  1.9 Pastikan kebijakan kata sandi IAM mencegah penggunaan kembali kata sandi  |  [[IAM.16] Pastikan kebijakan kata sandi IAM mencegah penggunaan kembali kata sandi](iam-controls.md#iam-16)  | 
|  CIS v1.4.0  |  2.1.2 Pastikan Kebijakan Bucket S3 disetel untuk menolak permintaan HTTP  |  [[S3.5] Bucket tujuan umum S3 harus memerlukan permintaan untuk menggunakan SSL](s3-controls.md#s3-5)  | 
|  CIS v1.4.0  |  2.1.5.1 Pengaturan Akses Publik Blok S3 harus diaktifkan  |  [[S3.1] Bucket tujuan umum S3 harus mengaktifkan pengaturan akses publik blok](s3-controls.md#s3-1)  | 
|  CIS v1.4.0  |  2.1.5.2 Pengaturan Akses Publik Blok S3 harus diaktifkan pada tingkat bucket  |  [[S3.8] Bucket tujuan umum S3 harus memblokir akses publik](s3-controls.md#s3-8)  | 
|  CIS v1.4.0  |  2.2.1 Pastikan enkripsi volume EBS diaktifkan  |  [[EC2.7] Enkripsi default EBS harus diaktifkan](ec2-controls.md#ec2-7)  | 
|  CIS v1.4.0  |  2.3.1 Pastikan enkripsi diaktifkan untuk Instans RDS  |  [[RDS.3] Instans RDS DB harus mengaktifkan enkripsi saat istirahat](rds-controls.md#rds-3)  | 
|  CIS v1.4.0  |  3.1 Pastikan CloudTrail diaktifkan di semua wilayah  |  [[CloudTrail.1] CloudTrail harus diaktifkan dan dikonfigurasi dengan setidaknya satu jejak Multi-wilayah yang mencakup acara manajemen baca dan tulis](cloudtrail-controls.md#cloudtrail-1)  | 
|  CIS v1.4.0  |  3.2 Pastikan validasi file CloudTrail log diaktifkan  |  [[CloudTrail.4] validasi file CloudTrail log harus diaktifkan](cloudtrail-controls.md#cloudtrail-4)  | 
|  CIS v1.4.0  |  3.4 Pastikan CloudTrail jalur terintegrasi dengan Log CloudWatch   |  [[CloudTrail.5] CloudTrail jalur harus diintegrasikan dengan Amazon Logs CloudWatch](cloudtrail-controls.md#cloudtrail-5)  | 
|  CIS v1.4.0  |  3.5 Pastikan AWS Config diaktifkan di semua wilayah  |  [[Config.1] AWS Config harus diaktifkan dan menggunakan peran terkait layanan untuk perekaman sumber daya](config-controls.md#config-1)  | 
|  CIS v1.4.0  |  3.6 Pastikan pencatatan akses bucket S3 diaktifkan pada bucket CloudTrail S3  |  [[CloudTrail.7] Pastikan pencatatan akses bucket S3 diaktifkan pada bucket CloudTrail S3](cloudtrail-controls.md#cloudtrail-7)  | 
|  CIS v1.4.0  |  3.7 Pastikan CloudTrail log dienkripsi saat istirahat menggunakan KMS CMKs  |  [[CloudTrail.2] CloudTrail harus mengaktifkan enkripsi saat istirahat](cloudtrail-controls.md#cloudtrail-2)  | 
|  CIS v1.4.0  |  3.8 Pastikan rotasi untuk pelanggan yang dibuat CMKs diaktifkan  |  [[KMS.4] rotasi AWS KMS tombol harus diaktifkan](kms-controls.md#kms-4)  | 
|  CIS v1.4.0  |  3.9 Pastikan pencatatan aliran VPC diaktifkan di semua VPCs  |  [[EC2.6] Pencatatan aliran VPC harus diaktifkan di semua VPCs](ec2-controls.md#ec2-6)  | 
|  CIS v1.4.0  |  4.4 Pastikan filter metrik log dan alarm ada untuk perubahan kebijakan IAM  |  [[CloudWatch.4] Pastikan filter metrik log dan alarm ada untuk perubahan kebijakan IAM](cloudwatch-controls.md#cloudwatch-4)  | 
|  CIS v1.4.0  |  4.5 Pastikan filter metrik log dan alarm ada untuk perubahan CloudTrail konfigurasi  |  [[CloudWatch.5] Pastikan filter metrik log dan alarm ada untuk perubahan CloudTrail konfigurasi](cloudwatch-controls.md#cloudwatch-5)  | 
|  CIS v1.4.0  |  4.6 Pastikan filter metrik log dan alarm ada untuk kegagalan Konsol Manajemen AWS otentikasi  |  [[CloudWatch.6] Pastikan filter metrik log dan alarm ada untuk kegagalan Konsol Manajemen AWS otentikasi](cloudwatch-controls.md#cloudwatch-6)  | 
|  CIS v1.4.0  |  4.7 Pastikan filter metrik log dan alarm ada untuk menonaktifkan atau terjadwal penghapusan pelanggan yang dibuat CMKs  |  [[CloudWatch.7] Pastikan filter metrik log dan alarm ada untuk menonaktifkan atau menjadwalkan penghapusan kunci yang dikelola pelanggan](cloudwatch-controls.md#cloudwatch-7)  | 
|  CIS v1.4.0  |  4.8 Pastikan filter metrik log dan alarm ada untuk perubahan kebijakan bucket S3  |  [[CloudWatch.8] Pastikan filter metrik log dan alarm ada untuk perubahan kebijakan bucket S3](cloudwatch-controls.md#cloudwatch-8)  | 
|  CIS v1.4.0  |  4.9 Pastikan filter metrik log dan alarm ada untuk perubahan AWS Config konfigurasi  |  [[CloudWatch.9] Pastikan filter metrik log dan alarm ada untuk perubahan AWS Config konfigurasi](cloudwatch-controls.md#cloudwatch-9)  | 
|  CIS v1.4.0  |  4.10 Pastikan filter metrik log dan alarm ada untuk perubahan grup keamanan  |  [[CloudWatch.10] Pastikan filter metrik log dan alarm ada untuk perubahan grup keamanan](cloudwatch-controls.md#cloudwatch-10)  | 
|  CIS v1.4.0  |  4.11 Pastikan filter metrik log dan alarm ada untuk perubahan pada Daftar Kontrol Akses Jaringan (NACL)  |  [[CloudWatch.11] Pastikan filter metrik log dan alarm ada untuk perubahan pada Daftar Kontrol Akses Jaringan (NACL)](cloudwatch-controls.md#cloudwatch-11)  | 
|  CIS v1.4.0  |  4.12 Pastikan filter metrik log dan alarm ada untuk perubahan gateway jaringan  |  [[CloudWatch.12] Pastikan filter metrik log dan alarm ada untuk perubahan gateway jaringan](cloudwatch-controls.md#cloudwatch-12)  | 
|  CIS v1.4.0  |  4.13 Pastikan filter metrik log dan alarm ada untuk perubahan tabel rute  |  [[CloudWatch.13] Pastikan filter metrik log dan alarm ada untuk perubahan tabel rute](cloudwatch-controls.md#cloudwatch-13)  | 
|  CIS v1.4.0  |  4.14 Pastikan filter metrik log dan alarm ada untuk perubahan VPC  |  [[CloudWatch.14] Pastikan filter metrik log dan alarm ada untuk perubahan VPC](cloudwatch-controls.md#cloudwatch-14)  | 
|  CIS v1.4.0  |  5.1 Pastikan tidak ada Jaringan yang ACLs mengizinkan masuknya dari 0.0.0.0/0 ke port administrasi server jarak jauh  |  [[EC2.21] Jaringan ACLs seharusnya tidak mengizinkan masuknya dari 0.0.0.0/0 ke port 22 atau port 3389](ec2-controls.md#ec2-21)  | 
|  CIS v1.4.0  |  5.3 Pastikan grup keamanan default dari setiap VPC membatasi semua lalu lintas  |  [[EC2.2] Grup keamanan default VPC tidak boleh mengizinkan lalu lintas masuk atau keluar](ec2-controls.md#ec2-2)  | 
|  PCI DSS v3.2.1  |  PCI. AutoScaling.1 Grup penskalaan otomatis yang terkait dengan penyeimbang beban harus menggunakan pemeriksaan kesehatan penyeimbang beban  |  [[AutoScaling.1] Grup Auto Scaling yang terkait dengan penyeimbang beban harus menggunakan pemeriksaan kesehatan ELB](autoscaling-controls.md#autoscaling-1)  | 
|  PCI DSS v3.2.1  |  PCI. CloudTrail.1 CloudTrail log harus dienkripsi saat istirahat menggunakan AWS KMS CMKs  |  [[CloudTrail.2] CloudTrail harus mengaktifkan enkripsi saat istirahat](cloudtrail-controls.md#cloudtrail-2)  | 
|  PCI DSS v3.2.1  |  PCI. CloudTrail.2 CloudTrail harus diaktifkan  |  [[CloudTrail.3] Setidaknya satu CloudTrail jejak harus diaktifkan](cloudtrail-controls.md#cloudtrail-3)  | 
|  PCI DSS v3.2.1  |  PCI. CloudTrail.3 validasi file CloudTrail log harus diaktifkan  |  [[CloudTrail.4] validasi file CloudTrail log harus diaktifkan](cloudtrail-controls.md#cloudtrail-4)  | 
|  PCI DSS v3.2.1  |  PCI. CloudTrail.4 CloudTrail jalur harus diintegrasikan dengan Amazon Logs CloudWatch   |  [[CloudTrail.5] CloudTrail jalur harus diintegrasikan dengan Amazon Logs CloudWatch](cloudtrail-controls.md#cloudtrail-5)  | 
|  PCI DSS v3.2.1  |  PCI. CodeBuild.1 CodeBuild GitHub atau repositori sumber Bitbucket harus digunakan URLs OAuth  |  [[CodeBuild.1] Repositori sumber CodeBuild Bitbucket tidak URLs boleh berisi kredensil sensitif](codebuild-controls.md#codebuild-1)  | 
|  PCI DSS v3.2.1  |  PCI. CodeBuild.2 variabel lingkungan CodeBuild proyek tidak boleh berisi kredensil teks yang jelas  |  [[CodeBuild.2] variabel lingkungan CodeBuild proyek tidak boleh berisi kredensil teks yang jelas](codebuild-controls.md#codebuild-2)  | 
|  PCI DSS v3.2.1  |  PCI.config.1 harus diaktifkan AWS Config   |  [[Config.1] AWS Config harus diaktifkan dan menggunakan peran terkait layanan untuk perekaman sumber daya](config-controls.md#config-1)  | 
|  PCI DSS v3.2.1  |  PCI.CW.1 Filter metrik log dan alarm harus ada untuk penggunaan pengguna “root”  |  [[CloudWatch.1] Filter metrik log dan alarm harus ada untuk penggunaan pengguna “root”](cloudwatch-controls.md#cloudwatch-1)  | 
|  PCI DSS v3.2.1  |  Instans replikasi Layanan Migrasi Database PCI.DMS.1 tidak boleh bersifat publik  |  [[DMS.1] Instans replikasi Layanan Migrasi Database tidak boleh bersifat publik](dms-controls.md#dms-1)  | 
|  PCI DSS v3.2.1  |  Snapshot PCI.EC2.1 EBS tidak boleh dipulihkan secara publik  |  [[EC2.1] Snapshot Amazon EBS tidak boleh dipulihkan secara publik](ec2-controls.md#ec2-1)  | 
|  PCI DSS v3.2.1  |  Grup keamanan default PCI.EC2.2 VPC harus melarang lalu lintas masuk dan keluar  |  [[EC2.2] Grup keamanan default VPC tidak boleh mengizinkan lalu lintas masuk atau keluar](ec2-controls.md#ec2-2)  | 
|  PCI DSS v3.2.1  |  PCI.EC2.4 EC2 yang tidak terpakai harus dihapus EIPs   |  [[EC2.12] Amazon EC2 yang tidak digunakan harus dihapus EIPs](ec2-controls.md#ec2-12)  | 
|  PCI DSS v3.2.1  |  PCI.EC2.5 Grup keamanan tidak boleh mengizinkan masuknya dari 0.0.0.0/0 ke port 22  |  [[EC2.13] Grup keamanan tidak boleh mengizinkan masuknya dari 0.0.0.0/0 atau: :/0 ke port 22](ec2-controls.md#ec2-13)  | 
|  PCI DSS v3.2.1  |  Pencatatan aliran VPC PCI.EC2.6 harus diaktifkan di semua VPCs  |  [[EC2.6] Pencatatan aliran VPC harus diaktifkan di semua VPCs](ec2-controls.md#ec2-6)  | 
|  PCI DSS v3.2.1  |  PCI. ELBv2.1 Application Load Balancer harus dikonfigurasi untuk mengalihkan semua permintaan HTTP ke HTTPS  |  [[ELB.1] Application Load Balancer harus dikonfigurasi untuk mengalihkan semua permintaan HTTP ke HTTPS](elb-controls.md#elb-1)  | 
|  PCI DSS v3.2.1  |  Domain PCI.ES.1 Elasticsearch harus dalam VPC  |  [[ES.2] Domain Elasticsearch tidak boleh diakses publik](es-controls.md#es-2)  | 
|  PCI DSS v3.2.1  |  Domain PCI.ES.2 Elasticsearch harus mengaktifkan enkripsi saat istirahat  |  [[ES.1] Domain Elasticsearch harus mengaktifkan enkripsi saat istirahat](es-controls.md#es-1)  | 
|  PCI DSS v3.2.1  |  PCI. GuardDuty.1 GuardDuty harus diaktifkan  |  [[GuardDuty.1] GuardDuty harus diaktifkan](guardduty-controls.md#guardduty-1)  | 
|  PCI DSS v3.2.1  |  Kunci akses pengguna root PCI.IAM.1 IAM seharusnya tidak ada  |  [[IAM.4] Kunci akses pengguna root IAM seharusnya tidak ada](iam-controls.md#iam-4)  | 
|  PCI DSS v3.2.1  |  Pengguna IAM PCI.IAM.2 tidak boleh memiliki kebijakan IAM yang dilampirkan  |  [[IAM.2] Pengguna IAM seharusnya tidak memiliki kebijakan IAM yang dilampirkan](iam-controls.md#iam-2)  | 
|  PCI DSS v3.2.1  |  Kebijakan IAM PCI.IAM.3 tidak boleh mengizinkan hak administratif “\$1” penuh  |  [[IAM.1] Kebijakan IAM seharusnya tidak mengizinkan hak administratif “\$1” penuh](iam-controls.md#iam-1)  | 
|  PCI DSS v3.2.1  |  MFA Perangkat Keras PCI.IAM.4 harus diaktifkan untuk pengguna root  |  [[IAM.6] MFA perangkat keras harus diaktifkan untuk pengguna root](iam-controls.md#iam-6)  | 
|  PCI DSS v3.2.1  |  PCI.IAM.5 MFA Virtual harus diaktifkan untuk pengguna root  |  [[IAM.9] MFA harus diaktifkan untuk pengguna root](iam-controls.md#iam-9)  | 
|  PCI DSS v3.2.1  |  MFA PCI.IAM.6 harus diaktifkan untuk semua pengguna IAM  |  [[IAM.19] MFA harus diaktifkan untuk semua pengguna IAM](iam-controls.md#iam-19)  | 
|  PCI DSS v3.2.1  |  Kredensi pengguna IAM PCI.IAM.7 harus dinonaktifkan jika tidak digunakan dalam jumlah hari yang ditentukan sebelumnya  |  [[IAM.8] Kredensi pengguna IAM yang tidak digunakan harus dihapus](iam-controls.md#iam-8)  | 
|  PCI DSS v3.2.1  |  Kebijakan kata sandi PCI.IAM.8 untuk pengguna IAM harus memiliki konfigurasi yang kuat  |  [[IAM.10] Kebijakan kata sandi untuk pengguna IAM harus memiliki konfigurasi yang kuat](iam-controls.md#iam-10)  | 
|  PCI DSS v3.2.1  |  PCI.KMS.1 Rotasi kunci master pelanggan (CMK) harus diaktifkan  |  [[KMS.4] rotasi AWS KMS tombol harus diaktifkan](kms-controls.md#kms-4)  | 
|  PCI DSS v3.2.1  |  Fungsi Lambda PCI.lambda.1 harus melarang akses publik  |  [[Lambda.1] Kebijakan fungsi Lambda harus melarang akses publik](lambda-controls.md#lambda-1)  | 
|  PCI DSS v3.2.1  |  PCI.lambda.2 Fungsi Lambda harus dalam VPC  |  [[Lambda.3] Fungsi Lambda harus dalam VPC](lambda-controls.md#lambda-3)  | 
|  PCI DSS v3.2.1  |  Domain OpenSearch PCI.openSearch.1 harus dalam VPC  |  [[Opensearch.2] OpenSearch domain tidak boleh diakses publik](opensearch-controls.md#opensearch-2)  | 
|  PCI DSS v3.2.1  |  Cuplikan PCI.openSearch.2 EBS tidak boleh dipulihkan secara publik  |  [[Opensearch.1] OpenSearch domain harus mengaktifkan enkripsi saat istirahat](opensearch-controls.md#opensearch-1)  | 
|  PCI DSS v3.2.1  |  Snapshot PCI.RDS.1 RDS harus pribadi  |  [[RDS.1] Snapshot RDS harus pribadi](rds-controls.md#rds-1)  | 
|  PCI DSS v3.2.1  |  Instans PCI.RDS.2 RDS DB harus melarang akses publik  |  [[RDS.2] Instans RDS DB harus melarang akses publik, sebagaimana ditentukan oleh konfigurasi PubliclyAccessible](rds-controls.md#rds-2)  | 
|  PCI DSS v3.2.1  |  PCI.redshift.1 Cluster Amazon Redshift harus melarang akses publik  |  [[Redshift.1] Cluster Amazon Redshift harus melarang akses publik](redshift-controls.md#redshift-1)  | 
|  PCI DSS v3.2.1  |  Bucket PCI.S3.1 S3 harus melarang akses tulis publik  |  [[S3.3] Bucket tujuan umum S3 harus memblokir akses tulis publik](s3-controls.md#s3-3)  | 
|  PCI DSS v3.2.1  |  Bucket PCI.S3.2 S3 harus melarang akses baca publik  |  [[S3.2] Bucket tujuan umum S3 harus memblokir akses baca publik](s3-controls.md#s3-2)  | 
|  PCI DSS v3.2.1  |  Bucket PCI.S3.3 S3 harus mengaktifkan replikasi lintas wilayah  |  [[S3.7] Ember tujuan umum S3 harus menggunakan replikasi lintas wilayah](s3-controls.md#s3-7)  | 
|  PCI DSS v3.2.1  |  Bucket PCI.S3.5 S3 harus memerlukan permintaan untuk menggunakan Secure Socket Layer  |  [[S3.5] Bucket tujuan umum S3 harus memerlukan permintaan untuk menggunakan SSL](s3-controls.md#s3-5)  | 
|  PCI DSS v3.2.1  |  Pengaturan Akses Publik Blok PCI.S3.6 S3 harus diaktifkan  |  [[S3.1] Bucket tujuan umum S3 harus mengaktifkan pengaturan akses publik blok](s3-controls.md#s3-1)  | 
|  PCI DSS v3.2.1  |  PCI. SageMaker.1 Instans SageMaker notebook Amazon seharusnya tidak memiliki akses internet langsung  |  [[SageMaker.1] Instans SageMaker notebook Amazon seharusnya tidak memiliki akses internet langsung](sagemaker-controls.md#sagemaker-1)  | 
|  PCI DSS v3.2.1  |  Instans PCI.SSM.1 EC2 yang dikelola oleh Systems Manager harus memiliki status kepatuhan patch COMPLIANT setelah instalasi patch  |  [[SSM.2] Instans Amazon EC2 yang dikelola oleh Systems Manager harus memiliki status kepatuhan patch COMPLIANT setelah instalasi patch](ssm-controls.md#ssm-2)  | 
|  PCI DSS v3.2.1  |  Instans PCI.SSM.2 EC2 yang dikelola oleh Systems Manager harus memiliki status kepatuhan asosiasi COMPLIANT  |  [[SSM.3] Instans Amazon EC2 yang dikelola oleh Systems Manager harus memiliki status kepatuhan asosiasi COMPLIANT](ssm-controls.md#ssm-3)  | 
|  PCI DSS v3.2.1  |  Instans PCI.SSM.3 EC2 harus dikelola oleh AWS Systems Manager  |  [[SSM.1] Instans Amazon EC2 harus dikelola oleh AWS Systems Manager](ssm-controls.md#ssm-1)  | 

## Memperbarui alur kerja untuk konsolidasi
<a name="securityhub-findings-format-changes-prepare"></a>

Jika alur kerja Anda tidak bergantung pada format spesifik bidang apa pun dalam temuan kontrol, tidak diperlukan tindakan.

Jika alur kerja Anda bergantung pada format tertentu dari satu atau beberapa bidang dalam temuan kontrol, seperti yang disebutkan dalam tabel sebelumnya, Anda harus memperbarui alur kerja Anda. Misalnya, Jika Anda membuat EventBridge aturan Amazon yang memicu tindakan untuk ID kontrol tertentu, seperti menjalankan AWS Lambda fungsi jika ID kontrol sama dengan CIS 2.7, perbarui aturan untuk menggunakan CloudTrail .2, yang merupakan nilai untuk bidang untuk kontrol tersebut`Compliance.SecurityControlId`.

Jika Anda membuat [wawasan khusus](securityhub-custom-insights.md) yang menggunakan bidang atau nilai apa pun yang berubah, perbarui wawasan tersebut untuk menggunakan bidang atau nilai baru.

# Atribut ASFF tingkat atas yang diperlukan
<a name="asff-required-attributes"></a>

Atribut tingkat atas berikut dalam AWS Security Finding Format (ASFF) diperlukan untuk semua temuan di Security Hub CSPM. Untuk informasi selengkapnya tentang atribut ini, lihat [https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsSecurityFinding.html](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsSecurityFinding.html)di *Referensi API AWS Security Hub*.

## AwsAccountId
<a name="AwsAccountId"></a>

 Akun AWS ID yang berlaku untuk temuan tersebut.

**Contoh**

```
"AwsAccountId": "111111111111"
```

## CreatedAt
<a name="CreatedAt"></a>

Menunjukkan kapan potensi masalah keamanan atau peristiwa yang ditangkap oleh temuan dibuat.

**Contoh**

```
"CreatedAt": "2017-03-22T13:22:13.933Z"
```

## Deskripsi
<a name="Description"></a>

Deskripsi temuan. Bidang ini dapat berupa teks boilerplate nonspesifik atau detail yang spesifik untuk contoh temuan.

Untuk temuan kontrol yang dihasilkan oleh Security Hub CSPM, bidang ini memberikan deskripsi kontrol.

Bidang ini tidak mereferensikan standar jika Anda mengaktifkan [temuan kontrol terkonsolidasi](controls-findings-create-update.md#consolidated-control-findings).

**Contoh**

```
"Description": "This AWS control checks whether AWS Config is enabled in the current account and Region."
```

## GeneratorId
<a name="GeneratorId"></a>

Pengidentifikasi untuk komponen spesifik solusi (unit logika diskrit) yang menghasilkan temuan.

Untuk temuan kontrol yang dihasilkan CSPM Security Hub, bidang ini tidak mereferensikan standar jika Anda mengaktifkan temuan kontrol [konsolidasi](controls-findings-create-update.md#consolidated-control-findings).

**Contoh**

```
"GeneratorId": "security-control/Config.1"
```

## Id
<a name="Id"></a>

Pengidentifikasi khusus produk untuk sebuah temuan. Untuk temuan kontrol yang dihasilkan oleh Security Hub CSPM, bidang ini menyediakan Nama Sumber Daya Amazon (ARN) dari temuan tersebut.

Bidang ini tidak mereferensikan standar jika Anda mengaktifkan [temuan kontrol terkonsolidasi](controls-findings-create-update.md#consolidated-control-findings).

**Contoh**

```
"Id": "arn:aws:securityhub:eu-central-1:123456789012:security-control/iam.9/finding/ab6d6a26-a156-48f0-9403-115983e5a956"
```

## ProductArn
<a name="ProductArn"></a>

Nama Sumber Daya Amazon (ARN) yang dihasilkan oleh Security Hub CSPM yang secara unik mengidentifikasi produk temuan pihak ketiga setelah produk terdaftar di Security Hub CSPM.

Format bidang ini adalah `arn:partition:securityhub:region:account-id:product/company-id/product-id`.
+ Untuk Layanan AWS itu terintegrasi dengan Security Hub CSPM, `company-id` harus "`aws`“, dan `product-id` harus menjadi nama layanan AWS publik. Karena AWS produk dan layanan tidak terkait dengan akun, `account-id` bagian ARN kosong. Layanan AWS yang belum terintegrasi dengan Security Hub CSPM dianggap sebagai produk pihak ketiga.
+ Untuk produk publik, `company-id` dan `product-id` harus berupa nilai ID yang ditentukan pada saat pendaftaran.
+ Untuk produk pribadi, `company-id` harus ID akun. `product-id`Harus berupa kata cadangan “default” atau ID yang ditentukan pada saat pendaftaran.

**Contoh**

```
// Private ARN
    "ProductArn": "arn:aws:securityhub:us-east-1:111111111111:product/111111111111/default"

// Public ARN
    "ProductArn": "arn:aws:securityhub:us-west-2::product/aws/guardduty"
    "ProductArn": "arn:aws:securityhub:us-west-2:222222222222:product/generico/secure-pro"
```

## Sumber daya
<a name="Resources"></a>

`Resources`Array objek menyediakan satu set tipe data sumber daya yang menggambarkan AWS sumber daya yang mengacu pada temuan tersebut. Untuk detail tentang bidang yang mungkin berisi `Resources` objek, termasuk bidang mana yang diperlukan, lihat [https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_Resource.html](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_Resource.html)di *Referensi API AWS Security Hub*. Untuk contoh `Resources` objek untuk spesifik Layanan AWS, lihat[ResourcesObjek ASFF](asff-resources.md).

**Contoh**

```
"Resources": [
  {
    "ApplicationArn": "arn:aws:resource-groups:us-west-2:123456789012:group/SampleApp/1234567890abcdef0",
    "ApplicationName": "SampleApp",
    "DataClassification": {
    "DetailedResultsLocation": "Path_to_Folder_Or_File",
    "Result": {
        "MimeType": "text/plain",
        "SizeClassified": 2966026,
        "AdditionalOccurrences": false,
        "Status": {
            "Code": "COMPLETE",
            "Reason": "Unsupportedfield"
        },
       "SensitiveData": [
            {
                "Category": "PERSONAL_INFORMATION",
                "Detections": [
                    {
                        "Count": 34,
                        "Type": "GE_PERSONAL_ID",
                        "Occurrences": {
                            "LineRanges": [
                                {
                                    "Start": 1,
                                    "End": 10,
                                    "StartColumn": 20
                                }
                            ],
                            "Pages": [],
                            "Records": [],
                            "Cells": []
                        }
                    },
                    {
                        "Count": 59,
                        "Type": "EMAIL_ADDRESS",
                        "Occurrences": {
                            "Pages": [
                                {
                                    "PageNumber": 1,
                                    "OffsetRange": {
                                        "Start": 1,
                                        "End": 100,
                                        "StartColumn": 10
                                     },
                                    "LineRange": {
                                        "Start": 1,
                                        "End": 100,
                                        "StartColumn": 10
                                    }
                                }
                            ]
                        }
                    },
                    {
                        "Count": 2229,
                        "Type": "URL",
                        "Occurrences": {
                           "LineRanges": [
                               {
                                   "Start": 1,
                                   "End": 13
                               }
                           ]
                       }
                   },
                   {
                       "Count": 13826,
                       "Type": "NameDetection",
                       "Occurrences": {
                            "Records": [
                                {
                                    "RecordIndex": 1,
                                    "JsonPath": "$.ssn.value"
                                }
                            ]
                        }
                   },
                   {
                       "Count": 32,
                       "Type": "AddressDetection"
                   }
               ],
               "TotalCount": 32
           }
        ],
        "CustomDataIdentifiers": {
            "Detections": [
                 {
                     "Arn": "1712be25e7c7f53c731fe464f1c869b8", 
                     "Name": "1712be25e7c7f53c731fe464f1c869b8", 
                     "Count": 2
                 }
            ],
            "TotalCount": 2
        }
    }
},
	"Type": "AwsEc2Instance",
	"Id": "arn:aws:ec2:us-west-2:123456789012:instance/i-abcdef01234567890",
	"Partition": "aws",
	"Region": "us-west-2",
	"ResourceRole": "Target",
	"Tags": {
		"billingCode": "Lotus-1-2-3",
		"needsPatching": true
	},
	"Details": {
		"IamInstanceProfileArn": "arn:aws:iam::123456789012:role/IamInstanceProfileArn",
		"ImageId": "ami-79fd7eee",
		"IpV4Addresses": ["1.1.1.1"],
		"IpV6Addresses": ["2001:db8:1234:1a2b::123"],
		"KeyName": "testkey",
		"LaunchedAt": "2018-09-29T01:25:54Z",
		"MetadataOptions": {
			"HttpEndpoint": "enabled",
			"HttpProtocolIpv6": "enabled",
			"HttpPutResponseHopLimit": 1,
			"HttpTokens": "optional",
			"InstanceMetadataTags": "disabled"
		}
	},
		"NetworkInterfaces": [
		{
			"NetworkInterfaceId": "eni-e5aa89a3"
		}
		],
		"SubnetId": "PublicSubnet",
		"Type": "i3.xlarge",
		"VirtualizationType": "hvm",
		"VpcId": "TestVPCIpv6"
	}

]
```

## SchemaVersion
<a name="SchemaVersion"></a>

Versi skema yang diformat untuk temuan. Nilai bidang ini harus menjadi salah satu versi yang diterbitkan secara resmi yang diidentifikasi oleh AWS. Dalam rilis saat ini, versi skema AWS Security Finding Format adalah`2018-10-08`.

**Contoh**

```
"SchemaVersion": "2018-10-08"
```

## Kepelikan
<a name="Severity"></a>

Mendefinisikan pentingnya sebuah temuan. Untuk detail tentang objek ini, lihat [https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_Severity.html](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_Severity.html)di *Referensi AWS Security Hub API*.

`Severity`adalah objek tingkat atas dalam temuan dan bersarang di bawah objek. `FindingProviderFields`

Nilai `Severity` objek tingkat atas untuk temuan harus diperbarui hanya dengan menggunakan [https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_BatchUpdateFindings.html](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_BatchUpdateFindings.html)API.

Untuk memberikan informasi tingkat keparahan, penyedia pencarian harus memperbarui `Severity` objek di bawah `FindingProviderFields` saat membuat permintaan [https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_BatchImportFindings.html](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_BatchImportFindings.html)API.  Jika `BatchImportFindings` permintaan untuk temuan baru hanya menyediakan `Label` atau hanya menyediakan`Normalized`, Security Hub CSPM secara otomatis mengisi nilai bidang lainnya. `Original`Bidang `Product` dan juga dapat dihuni.

Jika `Finding.Severity` objek tingkat atas hadir tetapi tidak `Finding.FindingProviderFields` ada, Security Hub CSPM membuat `FindingProviderFields.Severity` objek dan menyalin keseluruhan `Finding.Severity object` ke dalamnya. Ini memastikan bahwa detail asli yang disediakan penyedia dipertahankan dalam `FindingProviderFields.Severity` struktur, bahkan jika objek tingkat atas `Severity` ditimpa. 

Tingkat keparahan temuan tidak mempertimbangkan kekritisan aset yang terlibat atau sumber daya yang mendasarinya. Kritikalitas didefinisikan sebagai tingkat kepentingan sumber daya yang terkait dengan temuan tersebut. Misalnya, sumber daya yang terkait dengan aplikasi kritis misi memiliki kekritisan yang lebih tinggi daripada yang terkait dengan pengujian nonproduksi. Untuk menangkap informasi tentang kekritisan sumber daya, gunakan `Criticality` bidang.

Sebaiknya gunakan panduan berikut saat menerjemahkan skor keparahan asli temuan ke nilai `Severity.Label` di ASFF.
+ `INFORMATIONAL`Kategori ini dapat mencakup temuan untuk`PASSED`,`WARNING`, atau `NOT AVAILABLE` cek atau identifikasi data sensitif.
+ `LOW`— Temuan yang dapat menghasilkan kompromi di masa depan. Misalnya, kategori ini mungkin mencakup kerentanan, kelemahan konfigurasi, dan kata sandi yang terbuka.
+ `MEDIUM`— Temuan yang menunjukkan kompromi aktif, tetapi tidak ada indikasi bahwa musuh menyelesaikan tujuan mereka. Misalnya, kategori ini mungkin mencakup aktivitas malware, aktivitas peretasan, dan deteksi perilaku yang tidak biasa.
+ `HIGH`atau `CRITICAL` — Temuan yang menunjukkan bahwa musuh menyelesaikan tujuan mereka, seperti kehilangan data aktif atau kompromi atau penolakan layanan.

**Contoh**

```
"Severity": {
    "Label": "CRITICAL",
    "Normalized": 90,
    "Original": "CRITICAL"
}
```

## judul
<a name="Title"></a>

Judul temuan. Bidang ini dapat berisi teks boilerplate nonspesifik atau detail yang spesifik untuk contoh temuan ini.

Untuk temuan kontrol, bidang ini memberikan judul kontrol. Bidang ini tidak mereferensikan standar jika Anda mengaktifkan [temuan kontrol terkonsolidasi](controls-findings-create-update.md#consolidated-control-findings).

**Contoh**

```
"Title": "AWS Config should be enabled"
```

## Tipe
<a name="Types"></a>

Satu atau lebih jenis temuan dalam format `namespace/category/classifier` yang mengklasifikasikan temuan. Bidang ini tidak mereferensikan standar jika Anda mengaktifkan [temuan kontrol terkonsolidasi](controls-findings-create-update.md#consolidated-control-findings).

`Types`harus diperbarui hanya dengan menggunakan [https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html](https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html)API.

Menemukan penyedia yang ingin memberikan nilai untuk `Types` harus menggunakan `Types` atribut di bawah [https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_FindingProviderFields.html](https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_FindingProviderFields.html).

Dalam daftar berikut, peluru tingkat atas adalah ruang nama, peluru tingkat kedua adalah kategori, dan peluru tingkat ketiga adalah pengklasifikasi. Sebaiknya penyedia pencarian menggunakan ruang nama yang ditentukan untuk membantu mengurutkan dan mengelompokkan temuan. Kategori dan pengklasifikasi yang ditentukan juga dapat digunakan, tetapi tidak diperlukan. Hanya namespace Pemeriksaan Perangkat Lunak dan Konfigurasi yang telah menentukan pengklasifikasi.

Anda dapat menentukan jalur sebagian untuknamespace/category/classifier. Misalnya, jenis temuan berikut semuanya valid:
+ TTPs
+ TTPs/Penghindaran Pertahanan
+ TTPs/Defense Evasion/CloudTrailStopped

Kategori taktik, teknik, dan prosedur (TTPs) dalam daftar berikut selaras dengan MatrixTM [MITRE ATT&CK](https://attack.mitre.org/matrices/enterprise/). Namespace Perilaku Tidak Biasa mencerminkan perilaku umum yang tidak biasa, seperti anomali statistik umum, dan tidak selaras dengan TTP tertentu. Namun, Anda dapat mengklasifikasikan temuan dengan Perilaku Tidak Biasa dan tipe TTPs temuan.

**Daftar ruang nama, kategori, dan pengklasifikasi:**
+ Pemeriksaan Perangkat Lunak dan Konfigurasi
  + Kerentanan
    + CVE
  + AWS Praktik Terbaik Keamanan
    + Keterjangkauan Jaringan
    + Analisis Perilaku Waktu Aktif
  + Standar Industri dan Regulasi
    + AWS Praktik Terbaik Keamanan Dasar
    + Tolok Ukur Pengerasan Host CIS
    + Tolok Ukur AWS Yayasan CIS
    + PCI-DSS
    + Kontrol Aliansi Keamanan Cloud
    + Kontrol ISO 90001
    + Kontrol ISO 27001
    + Kontrol ISO 27017
    + Kontrol ISO 27018
    + SOC 1
    + SOC 2
    + Kontrol HIPAA (AS)
    + NIST 800-53 Kontrol (AS)
    + Kontrol CSF NIST (AS)
    + Kontrol IRAP (Australia)
    + Kontrol K-ISMS (Korea)
    + Kontrol MTCS (Singapura)
    + Kontrol FISC (Jepang)
    + Kontrol Undang-Undang Nomor Saya (Jepang)
    + ENS Controls (Spanyol)
    + Kontrol Cyber Essentials Plus (Inggris)
    + Kontrol G-Cloud (Inggris)
    + Kontrol C5 (Jerman)
    + Kontrol IT-Grundschutz (Jerman)
    + Kontrol GDPR (Eropa)
    + Kontrol TISAX (Eropa)
  + Manajemen Patch
+ TTPs
  + Akses Awal
  + Eksekusi
  + Tetap
  + Eskalasi Hak Istimewa
  + Penghindaran Pertahanan
  + Akses Kredensi
  + Penemuan
  + Gerakan Lateral
  + Koleksi
  + Perintah dan Kontrol
+ Efek
  + Eksposur Data
  + Ekfiltrasi Data 
  + Penghancuran Data 
  + Penolakan Layanan 
  + Konsumsi Sumber Daya
+ Perilaku Tidak Biasa
  + Aplikasi
  + Aliran Jaringan
  + Alamat IP
  + Pengguna
  + VM
  + Kontainer
  + Nirserver
  + Proses
  + Basis Data
  + Data 
+ Identifikasi Data Sensitif
  + PII
  + Kata Sandi
  + Hukum
  + Keuangan
  + Keamanan
  + Bisnis

**Contoh**

```
"Types": [
    "Software and Configuration Checks/Vulnerabilities/CVE"
]
```

## UpdatedAt
<a name="UpdatedAt"></a>

Menunjukkan kapan penyedia temuan terakhir memperbarui catatan temuan.

Stempel waktu ini mencerminkan waktu ketika catatan temuan terakhir atau yang terbaru diperbarui. Akibatnya, ini dapat berbeda dari `LastObservedAt` stempel waktu, yang mencerminkan kapan peristiwa atau kerentanan terakhir atau yang terbaru diamati.

Saat memperbarui catatan temuan, Anda harus memperbarui stempel waktu ini ke stempel waktu saat ini. Setelah membuat catatan temuan, `CreatedAt` dan `UpdatedAt` stempel waktu harus sama. Setelah pembaruan ke catatan temuan, nilai bidang ini harus lebih baru dari semua nilai sebelumnya yang terkandung di dalamnya.

Perhatikan bahwa `UpdatedAt` tidak dapat diperbarui dengan menggunakan [https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html](https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html)operasi. Anda dapat memperbaruinya hanya dengan menggunakan [https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchImportFindings.html](https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchImportFindings.html)operasi.

**Contoh**

```
"UpdatedAt": "2017-04-22T13:22:13.933Z"
```

# Atribut ASFF tingkat atas opsional
<a name="asff-top-level-attributes"></a>

Atribut tingkat atas berikut dalam AWS Security Finding Format (ASFF) adalah opsional untuk temuan di Security Hub CSPM. Untuk informasi selengkapnya tentang atribut ini, lihat [AwsSecurityFinding](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsSecurityFinding.html)di *Referensi API AWS Security Hub*.

## Tindakan
<a name="asff-action"></a>

[https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_Action.html](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_Action.html)Objek memberikan rincian tentang tindakan yang mempengaruhi atau diambil pada sumber daya.

**Contoh**

```
"Action": {
    "ActionType": "PORT_PROBE",
    "PortProbeAction": {
        "PortProbeDetails": [
            {
                "LocalPortDetails": {
                    "Port": 80,
                    "PortName": "HTTP"
                  },
                "LocalIpDetails": {
                     "IpAddressV4": "192.0.2.0"
                 },
                "RemoteIpDetails": {
                    "Country": {
                        "CountryName": "Example Country"
                    },
                    "City": {
                        "CityName": "Example City"
                    },
                   "GeoLocation": {
                       "Lon": 0,
                       "Lat": 0
                   },
                   "Organization": {
                       "AsnOrg": "ExampleASO",
                       "Org": "ExampleOrg",
                       "Isp": "ExampleISP",
                       "Asn": 64496
                   }
                }
            }
        ],
        "Blocked": false
    }
}
```

## AwsAccountName
<a name="asff-awsaccountname"></a>

 Akun AWS Nama yang digunakan untuk temuan itu.

**Contoh**

```
"AwsAccountName": "jane-doe-testaccount"
```

## CompanyName
<a name="asff-companyname"></a>

Nama perusahaan untuk produk yang menghasilkan temuan. Untuk temuan berbasis kontrol, perusahaan adalah. AWS

Security Hub CSPM mengisi atribut ini secara otomatis untuk setiap temuan. Anda tidak dapat memperbaruinya menggunakan [https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchImportFindings.html](https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchImportFindings.html)atau [https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html](https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html). Pengecualian untuk ini adalah ketika Anda menggunakan integrasi khusus. Lihat [Mengintegrasikan Security Hub CSPM dengan produk khusus](securityhub-custom-providers.md).

Saat Anda menggunakan konsol CSPM Security Hub untuk memfilter temuan berdasarkan nama perusahaan, Anda menggunakan atribut ini. Bila Anda menggunakan Security Hub CSPM API untuk memfilter temuan berdasarkan nama perusahaan, Anda menggunakan `aws/securityhub/CompanyName` atribut di bawah. `ProductFields` Security Hub CSPM tidak menyinkronkan kedua atribut tersebut.

**Contoh**

```
"CompanyName": "AWS"
```

## Kepatuhan
<a name="asff-compliance"></a>

[https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_Compliance.html](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_Compliance.html)Objek biasanya memberikan rincian tentang temuan kontrol, seperti standar yang berlaku dan status pemeriksaan kontrol.

**Contoh**

```
"Compliance": {
    "AssociatedStandards": [
        {"StandardsId": "standards/aws-foundational-security-best-practices/v/1.0.0"},
        {"StandardsId": "standards/service-managed-aws-control-tower/v/1.0.0"},
        {"StandardsId": "standards/nist-800-53/v/5.0.0"}
    ],
    "RelatedRequirements": [
        "NIST.800-53.r5 AC-4",
        "NIST.800-53.r5 AC-4(21)",
        "NIST.800-53.r5 SC-7",
        "NIST.800-53.r5 SC-7(11)",
        "NIST.800-53.r5 SC-7(16)",
        "NIST.800-53.r5 SC-7(21)",
        "NIST.800-53.r5 SC-7(4)",
        "NIST.800-53.r5 SC-7(5)"
    ],
    "SecurityControlId": "EC2.18",
    "SecurityControlParameters":[
        {
            "Name": "authorizedTcpPorts",
            "Value": ["80", "443"]
        },
        {
            "Name": "authorizedUdpPorts",
            "Value": ["427"]
        }
    ],
    "Status": "NOT_AVAILABLE",
    "StatusReasons": [
        {
            "ReasonCode": "CONFIG_RETURNS_NOT_APPLICABLE",
            "Description": "This finding has a compliance status of NOT AVAILABLE because AWS Config sent Security Hub CSPM a finding with a compliance state of Not Applicable. The potential reasons for a Not Applicable finding from Config are that (1) a resource has been moved out of scope of the Config rule; (2) the Config rule has been deleted; (3) the resource has been deleted; or (4) the logic of the Config rule itself includes scenarios where Not Applicable is returned. The specific reason why Not Applicable is returned is not available in the Config rule evaluation."
        }
    ]
}
```

## Kepercayaan
<a name="asff-confidence"></a>

Kemungkinan bahwa temuan secara akurat mengidentifikasi perilaku atau masalah yang dimaksudkan untuk diidentifikasi.

`Confidence`seharusnya hanya diperbarui menggunakan [https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html](https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html).

Menemukan penyedia yang ingin memberikan nilai untuk `Confidence` harus menggunakan `Confidence` atribut di bawah`FindingProviderFields`. Lihat [Memperbarui temuan dengan FindingProviderFields](finding-update-batchimportfindings.md#batchimportfindings-findingproviderfields).

`Confidence`dinilai berdasarkan 0-100 menggunakan skala rasio. 0 berarti kepercayaan 0 persen, dan 100 berarti kepercayaan 100 persen. Misalnya, deteksi eksfiltrasi data berdasarkan penyimpangan statistik lalu lintas jaringan memiliki kepercayaan diri yang rendah karena eksfiltrasi aktual belum diverifikasi.

**Contoh**

```
"Confidence": 42
```

## Kekritisan
<a name="asff-criticality"></a>

Tingkat kepentingan yang ditetapkan untuk sumber daya yang terkait dengan temuan.

`Criticality`seharusnya hanya diperbarui dengan memanggil operasi [https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html](https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html)API. Jangan perbarui objek ini dengan [https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchImportFindings.html](https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchImportFindings.html).

Menemukan penyedia yang ingin memberikan nilai untuk `Criticality` harus menggunakan `Criticality` atribut di bawah`FindingProviderFields`. Lihat [Memperbarui temuan dengan FindingProviderFields](finding-update-batchimportfindings.md#batchimportfindings-findingproviderfields).

`Criticality`diberi skor pada basis 0-100, menggunakan skala rasio yang hanya mendukung bilangan bulat penuh. Skor 0 berarti bahwa sumber daya yang mendasarinya tidak memiliki kekritisan, dan skor 100 dicadangkan untuk sumber daya yang paling kritis.

Untuk setiap sumber daya, pertimbangkan hal berikut saat menetapkan`Criticality`:
+ Apakah sumber daya yang terpengaruh berisi data sensitif (misalnya, bucket S3 dengan PII)? 
+ Apakah sumber daya yang terpengaruh memungkinkan musuh untuk memperdalam akses mereka atau memperluas kemampuan mereka untuk melakukan aktivitas berbahaya tambahan (misalnya, akun sysadmin yang disusupi)?
+ Apakah sumber daya merupakan aset penting bisnis (misalnya, sistem bisnis utama yang jika dikompromikan dapat memiliki dampak pendapatan yang signifikan)?

Anda dapat menggunakan pedoman berikut:
+ Sumber daya yang menggerakkan sistem mission-critical atau berisi data yang sangat sensitif dapat dinilai dalam kisaran 75-100.
+ Sumber daya yang memberi daya pada sistem penting (tetapi bukan sistem kritis) atau berisi data yang cukup penting dapat dinilai dalam kisaran 25-74.
+ Sumber daya yang memberi daya pada sistem yang tidak penting atau berisi data yang tidak sensitif harus dinilai dalam kisaran 0-24.

**Contoh**

```
"Criticality": 99
```

## Deteksi
<a name="asff-detection"></a>

`Detection`Objek ini memberikan detail tentang temuan urutan serangan dari Amazon GuardDuty Extended Threat Detection. GuardDuty menghasilkan temuan urutan serangan ketika beberapa peristiwa sejajar dengan aktivitas yang berpotensi mencurigakan. Untuk menerima temuan urutan GuardDuty serangan di AWS Security Hub CSPM, Anda harus GuardDuty mengaktifkan di akun Anda. Untuk informasi selengkapnya, lihat [Deteksi Ancaman GuardDuty Diperpanjang Amazon](https://docs.aws.amazon.com/guardduty/latest/ug/guardduty-extended-threat-detection.html) *di Panduan GuardDuty Pengguna Amazon*.

**Contoh**

```
"Detection": {
    "Sequence": {
    	"Uid": "1111111111111-184ec3b9-cf8d-452d-9aad-f5bdb7afb010",
    	"Actors": [{
    		"Id": "USER:AROA987654321EXAMPLE:i-b188560f:1234567891",
    		"Session": {
    			"Uid": "1234567891",
    			"MfAStatus": "DISABLED",
    			"CreatedTime": "1716916944000",
    			"Issuer": "arn:aws:s3:::amzn-s3-demo-destination-bucket"
    		},
    		"User": {
    			"CredentialUid": "ASIAIOSFODNN7EXAMPLE",
    			"Name": "ec2_instance_role_production",
    			"Type": "AssumedRole",
    			"Uid": "AROA987654321EXAMPLE:i-b188560f",
    			"Account": {
    				"Uid": "AccountId",
    				"Name": "AccountName"
    			}
    		}
    	}],
    	"Endpoints": [{
    		"Id": "EndpointId",
    		"Ip": "203.0.113.1",
    		"Domain": "example.com",
    		"Port": 4040,
    		"Location": {
    			"City": "New York",
    			"Country": "US",
    			"Lat": 40.7123,
    			"Lon": -74.0068
    		},
    		"AutonomousSystem": {
    			"Name": "AnyCompany",
    			"Number": 64496
    		},
    		"Connection": {
    			"Direction": "INBOUND"
    		}
    	}],
    	"Signals": [{
    		"Id": "arn:aws:guardduty:us-east-1:123456789012:detector/d0bfe135ab8b4dd8c3eaae7df9900073/finding/535a382b1bcc44d6b219517a29058fb7",
    		"Title": "Someone ran a penetration test tool on your account.",
    		"ActorIds": ["USER:AROA987654321EXAMPLE:i-b188560f:1234567891"],
    		"Count": 19,
    		"FirstSeenAt": 1716916943000,
    		"SignalIndicators": [
    			{
    				"Key": "ATTACK_TACTIC",
    				"Title": "Attack Tactic",
    				"Values": [
    					"Impact"
    				]
    			},
    			{
    				"Key": "HIGH_RISK_API",
    				"Title": "High Risk Api",
    				"Values": [
    					"s3:DeleteObject"
    				]
    			},
    			{
    				"Key": "ATTACK_TECHNIQUE",
    				"Title": "Attack Technique",
    				"Values": [
    					"Data Destruction"
    				]
    			},
    		],
    		"LastSeenAt": 1716916944000,
    		"Name": "Test:IAMUser/KaliLinux",
    		"ResourceIds": [
    			"arn:aws:s3:::amzn-s3-demo-destination-bucket"
    		],
    		"Type": "FINDING"
    	}],
    	"SequenceIndicators": [
    		{
    			"Key": "ATTACK_TACTIC",
    			"Title": "Attack Tactic",
    			"Values": [
    				"Discovery",
    				"Exfiltration",
    				"Impact"
    			]
    		},
    		{
    			"Key": "HIGH_RISK_API",
    			"Title": "High Risk Api",
    			"Values": [
    				"s3:DeleteObject",
    				"s3:GetObject",
    				"s3:ListBuckets"
    				"s3:ListObjects"
    			]
    		},
    		{
    			"Key": "ATTACK_TECHNIQUE",
    			"Title": "Attack Technique",
    			"Values": [
    				"Cloud Service Discovery",
    				"Data Destruction"
    			]
    		}
    	]
    }
}
```

## FindingProviderFields
<a name="asff-findingproviderfields"></a>

`FindingProviderFields`termasuk atribut berikut:
+ `Confidence`
+ `Criticality`
+ `RelatedFindings`
+ `Severity`
+ `Types`

Bidang sebelumnya bersarang di bawah `FindingProviderFields` objek, tetapi memiliki analog dengan nama yang sama dengan bidang ASFF tingkat atas. Ketika temuan baru dikirim ke Security Hub CSPM oleh penyedia pencarian, Security Hub CSPM mengisi `FindingProviderFields` objek secara otomatis jika kosong berdasarkan bidang tingkat atas yang sesuai.

Penyedia pencarian dapat memperbarui `FindingProviderFields` dengan menggunakan [https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchImportFindings.html](https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchImportFindings.html)pengoperasian Security Hub CSPM API. Menemukan penyedia tidak dapat memperbarui objek ini dengan [https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html](https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html).

Untuk detail tentang cara Security Hub CSPM menangani pembaruan dari `BatchImportFindings` ke `FindingProviderFields` dan ke atribut tingkat atas yang sesuai, lihat. [Memperbarui temuan dengan FindingProviderFields](finding-update-batchimportfindings.md#batchimportfindings-findingproviderfields)

Pelanggan dapat memperbarui bidang tingkat atas dengan menggunakan `BatchUpdateFindings` operasi. Pelanggan tidak dapat memperbarui`FindingProviderFields`.

**Contoh**

```
"FindingProviderFields": {
    "Confidence": 42,
    "Criticality": 99,
    "RelatedFindings":[
      { 
        "ProductArn": "arn:aws:securityhub:us-west-2::product/aws/guardduty", 
        "Id": "123e4567-e89b-12d3-a456-426655440000" 
      }
    ],
    "Severity": {
        "Label": "MEDIUM", 
        "Original": "MEDIUM"
    },
    "Types": [ "Software and Configuration Checks/Vulnerabilities/CVE" ]
}
```

## FirstObservedAt
<a name="asff-firstobservedat"></a>

Menunjukkan kapan potensi masalah keamanan atau peristiwa yang ditangkap oleh temuan pertama kali diamati.

Stempel waktu ini menentukan kapan peristiwa atau kerentanan pertama kali diamati. Akibatnya, ini dapat berbeda dari `CreatedAt` stempel waktu, yang mencerminkan kapan catatan temuan ini dibuat.

Untuk temuan kontrol yang dihasilkan dan diperbarui oleh Security Hub CSPM, stempel waktu ini juga dapat menunjukkan kapan status kepatuhan sumber daya baru-baru ini berubah. Untuk jenis temuan lain, stempel waktu ini harus tidak dapat diubah antara pembaruan catatan temuan, tetapi dapat diperbarui jika stempel waktu yang lebih akurat ditentukan.

**Contoh**

```
"FirstObservedAt": "2017-03-22T13:22:13.933Z"
```

## LastObservedAt
<a name="asff-lastobservedat"></a>

Menunjukkan kapan potensi masalah keamanan atau peristiwa yang ditangkap oleh temuan baru-baru ini diamati oleh produk temuan keamanan.

Stempel waktu ini menentukan kapan peristiwa atau kerentanan terakhir atau yang terbaru diamati. Akibatnya, ini dapat berbeda dari `UpdatedAt` stempel waktu, yang mencerminkan kapan catatan temuan ini terakhir atau yang terbaru diperbarui. 

Anda dapat memberikan stempel waktu ini, tetapi tidak diperlukan pada pengamatan pertama. Jika Anda mengisi bidang ini pada pengamatan pertama, stempel waktu harus sama dengan stempel waktu. `FirstObservedAt` Anda harus memperbarui bidang ini untuk mencerminkan stempel waktu terakhir atau yang paling baru diamati setiap kali temuan diamati.

**Contoh**

```
"LastObservedAt": "2017-03-23T13:22:13.933Z"
```

## Malware
<a name="asff-malware"></a>

[https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_Malware.html](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_Malware.html)Objek menyediakan daftar malware yang terkait dengan temuan.

**Contoh**

```
"Malware": [
    {
        "Name": "Stringler",
        "Type": "COIN_MINER",
        "Path": "/usr/sbin/stringler",
        "State": "OBSERVED"
    }
]
```

## Jaringan (Pensiunan)
<a name="asff-network"></a>

[https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_Network.html](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_Network.html)Objek menyediakan informasi terkait jaringan tentang temuan.

Objek ini sudah pensiun. Untuk menyediakan data ini, Anda dapat memetakan data ke sumber daya di`Resources`, atau menggunakan `Action` objek.

**Contoh**

```
"Network": {
    "Direction": "IN",
    "OpenPortRange": {
        "Begin": 443,
        "End": 443
    },
    "Protocol": "TCP",
    "SourceIpV4": "1.2.3.4",
    "SourceIpV6": "FE80:CD00:0000:0CDE:1257:0000:211E:729C",
    "SourcePort": "42",
    "SourceDomain": "example1.com",
    "SourceMac": "00:0d:83:b1:c0:8e",
    "DestinationIpV4": "2.3.4.5",
    "DestinationIpV6": "FE80:CD00:0000:0CDE:1257:0000:211E:729C",
    "DestinationPort": "80",
    "DestinationDomain": "example2.com"
}
```

## NetworkPath
<a name="asff-networkpath"></a>

[https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_NetworkPathComponent.html](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_NetworkPathComponent.html)Objek memberikan informasi tentang jalur jaringan yang terkait dengan temuan. Setiap entri di `NetworkPath` mewakili komponen jalur.

**Contoh**

```
"NetworkPath" : [
    {
        "ComponentId": "abc-01a234bc56d8901ee",
        "ComponentType": "AWS::EC2::InternetGateway",
        "Egress": {
            "Destination": {
                "Address": [ "192.0.2.0/24" ],
                "PortRanges": [
                    {
                        "Begin": 443,
                        "End": 443
                    }
                ]
            },
            "Protocol": "TCP",
            "Source": {
                "Address": ["203.0.113.0/24"]
            }
        },
        "Ingress": {
            "Destination": {
                "Address": [ "198.51.100.0/24" ],
                "PortRanges": [
                    {
                        "Begin": 443,
                        "End": 443
                    }
                 ]
            },
            "Protocol": "TCP",
            "Source": {
                "Address": [ "203.0.113.0/24" ]
            }
        }
     }
]
```

## Catatan
<a name="asff-note"></a>

[https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_Note.html](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_Note.html)Objek menentukan catatan yang ditentukan pengguna yang dapat Anda tambahkan ke temuan.

Penyedia temuan dapat memberikan catatan awal untuk sebuah temuan, tetapi tidak dapat menambahkan catatan setelah itu. Anda hanya dapat memperbarui catatan menggunakan [https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html](https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html).

**Contoh**

```
"Note": {
    "Text": "Don't forget to check under the mat.",
    "UpdatedBy": "jsmith",
    "UpdatedAt": "2018-08-31T00:15:09Z"
}
```

## PatchSummary
<a name="asff-patchsummary"></a>

[https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_PatchSummary.html](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_PatchSummary.html)Objek menyediakan ringkasan status kepatuhan patch untuk sebuah instance terhadap standar kepatuhan yang dipilih.

**Contoh**

```
"PatchSummary" : {
    "FailedCount" : 0,
    "Id" : "pb-123456789098",
    "InstalledCount" : 100,
    "InstalledOtherCount" : 1023,
    "InstalledPendingReboot" : 0,
    "InstalledRejectedCount" : 0,
    "MissingCount" : 100,
    "Operation" : "Install",
    "OperationEndTime" : "2018-09-27T23:39:31Z",
    "OperationStartTime" : "2018-09-27T23:37:31Z",
    "RebootOption" : "RebootIfNeeded"
}
```

## Proses
<a name="asff-process"></a>

[https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_ProcessDetails.html](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_ProcessDetails.html)Objek memberikan rincian terkait proses tentang temuan.

Contoh:

```
"Process": {
    "LaunchedAt": "2018-09-27T22:37:31Z",
    "Name": "syslogd",
    "ParentPid": 56789,
    "Path": "/usr/sbin/syslogd",
    "Pid": 12345,
    "TerminatedAt": "2018-09-27T23:37:31Z"
}
```

## ProcessedAt
<a name="asff-processedat"></a>

Menunjukkan kapan Security Hub CSPM menerima temuan dan mulai memprosesnya.

Ini berbeda dari `CreatedAt` dan`UpdatedAt`, yang merupakan stempel waktu yang diperlukan yang berhubungan dengan interaksi penyedia temuan dengan masalah keamanan dan temuan. `ProcessedAt`Stempel waktu menunjukkan kapan Security Hub CSPM mulai memproses temuan. Temuan muncul di akun pengguna setelah pemrosesan selesai.

```
"ProcessedAt": "2023-03-23T13:22:13.933Z"
```

## ProductFields
<a name="asff-productfields"></a>

Tipe data di mana produk temuan keamanan dapat menyertakan detail spesifik solusi tambahan yang bukan merupakan bagian dari Format Pencarian AWS Keamanan yang ditentukan.

Untuk temuan yang dihasilkan oleh kontrol CSPM Security Hub, `ProductFields` termasuk informasi tentang kontrol. Lihat [Menghasilkan dan memperbarui temuan kontrol](controls-findings-create-update.md).

Bidang ini tidak boleh berisi data yang berlebihan dan tidak boleh berisi data yang bertentangan dengan bidang Format Pencarian AWS Keamanan.

Awalan `aws/` "" mewakili namespace yang dicadangkan hanya untuk AWS produk dan layanan dan tidak boleh diserahkan dengan temuan dari integrasi pihak ketiga.

Meskipun tidak diperlukan, produk harus memformat nama bidang sebagai`company-id/product-id/field-name`, di mana `company-id` dan `product-id` cocok dengan yang `ProductArn` disediakan dalam temuan.

Referensi bidang `Archival` digunakan saat Security Hub CSPM mengarsipkan temuan yang ada. Misalnya, Security Hub CSPM mengarsipkan temuan yang ada saat Anda menonaktifkan kontrol atau standar dan saat Anda mengaktifkan atau menonaktifkan [temuan kontrol konsolidasi](controls-findings-create-update.md#consolidated-control-findings).

Bidang ini juga dapat mencakup informasi tentang standar yang mencakup kontrol yang menghasilkan temuan.

**Contoh**

```
"ProductFields": {
    "API", "DeleteTrail",
    "ArchivalReasons:0/Description": "The finding is in an ARCHIVED state because consolidated control findings has been turned on or off. This causes findings in the previous state to be archived when new findings are being generated.",
    "ArchivalReasons:0/ReasonCode": "CONSOLIDATED_CONTROL_FINDINGS_UPDATE",
    "aws/inspector/AssessmentTargetName": "My prod env",
    "aws/inspector/AssessmentTemplateName": "My daily CVE assessment",
    "aws/inspector/RulesPackageName": "Common Vulnerabilities and Exposures",
    "generico/secure-pro/Action.Type", "AWS_API_CALL",
    "generico/secure-pro/Count": "6",
    "Service_Name": "cloudtrail.amazonaws.com"
}
```

## ProductName
<a name="asff-productname"></a>

Memberikan nama produk yang menghasilkan temuan. Untuk temuan berbasis kontrol, nama produknya adalah Security Hub CSPM.

Security Hub CSPM mengisi atribut ini secara otomatis untuk setiap temuan. Anda tidak dapat memperbaruinya menggunakan [https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchImportFindings.html](https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchImportFindings.html)atau [https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html](https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html). Pengecualian untuk ini adalah ketika Anda menggunakan integrasi khusus. Lihat [Mengintegrasikan Security Hub CSPM dengan produk khusus](securityhub-custom-providers.md).

Saat Anda menggunakan konsol CSPM Security Hub untuk memfilter temuan berdasarkan nama produk, Anda menggunakan atribut ini.

Bila Anda menggunakan Security Hub CSPM API untuk memfilter temuan berdasarkan nama produk, Anda menggunakan `aws/securityhub/ProductName` atribut di bawah. `ProductFields`

Security Hub CSPM tidak menyinkronkan kedua atribut tersebut.

## RecordState
<a name="asff-recordstate"></a>

Memberikan status catatan temuan. 

Secara default, ketika awalnya dihasilkan oleh layanan, temuan dipertimbangkan`ACTIVE`.

`ARCHIVED`Negara menunjukkan bahwa temuan harus disembunyikan dari pandangan. Temuan yang diarsipkan tidak segera dihapus. Anda dapat mencari, meninjau, dan melaporkannya. Security Hub CSPM secara otomatis mengarsipkan temuan berbasis kontrol jika sumber daya terkait dihapus, sumber daya tidak ada, atau kontrol dinonaktifkan.

`RecordState`dimaksudkan untuk menemukan penyedia, dan dapat diperbarui hanya dengan menggunakan [https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchImportFindings.html](https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchImportFindings.html)operasi. Anda tidak dapat memperbaruinya dengan menggunakan [https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html](https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html)operasi.

Untuk melacak status penyelidikan Anda ke dalam sebuah temuan, gunakan [`Workflow`](#asff-workflow)sebagai gantinya`RecordState`.

Jika status rekaman berubah dari `ARCHIVED` ke`ACTIVE`, dan status alur kerja temuan adalah `NOTIFIED` atau`RESOLVED`, Security Hub CSPM secara otomatis mengubah status alur kerja menjadi. `NEW`

**Contoh**

```
"RecordState": "ACTIVE"
```

## Region
<a name="asff-region"></a>

Menentukan Wilayah AWS dari mana temuan itu dihasilkan.

Security Hub CSPM mengisi atribut ini secara otomatis untuk setiap temuan. Anda tidak dapat memperbaruinya menggunakan [https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchImportFindings.html](https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchImportFindings.html)atau [https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html](https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html).

**Contoh**

```
"Region": "us-west-2"
```

## RelatedFindings
<a name="asff-relatedfindings"></a>

Memberikan daftar temuan yang terkait dengan temuan saat ini.

`RelatedFindings`seharusnya hanya diperbarui dengan operasi [https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html](https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html)API. Anda tidak harus memperbarui objek ini dengan [https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchImportFindings.html](https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchImportFindings.html).

Untuk [https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchImportFindings.html](https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchImportFindings.html)permintaan, penyedia pencarian harus menggunakan `RelatedFindings` objek di bawah [`FindingProviderFields`](#asff-findingproviderfields).

Untuk melihat deskripsi `RelatedFindings` atribut, lihat [https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_RelatedFinding.html](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_RelatedFinding.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"RelatedFindings": [
    { "ProductArn": "arn:aws:securityhub:us-west-2::product/aws/guardduty", 
      "Id": "123e4567-e89b-12d3-a456-426655440000" },
    { "ProductArn": "arn:aws:securityhub:us-west-2::product/aws/guardduty", 
      "Id": "AcmeNerfHerder-111111111111-x189dx7824" }
]
```

## RiskAssessment
<a name="asff-riskassessment"></a>

**Contoh**

```
"RiskAssessment": {
    "Posture": {
        "FindingTotal": 4,
        "Indicators": [
            {
                "Type": "Reachability",
                "Findings": [
                    {
                        "Id": "arn:aws:inspector2:us-east-2:123456789012:finding/1234567890abcdef0",
                        "ProductArn": "arn:aws:securityhub:us-east-1::product/aws/inspector",
                        "Title": "Finding title"
                    },
                    {
                        "Id": "arn:aws:inspector2:us-east-2:123456789012:finding/abcdef01234567890",
                        "ProductArn": "arn:aws:securityhub:us-east-1::product/aws/inspector",
                        "Title": "Finding title"
                    }
                ]
            },
            {
                "Type": "Vulnerability",
                "Findings": [
                    {
                        "Id": "arn:aws:inspector2:us-east-2:123456789012:finding/021345abcdef6789",
                        "ProductArn": "arn:aws:securityhub:us-east-1::product/aws/inspector",
                        "Title": "Finding title"
                    },
                    {
                        "Id": "arn:aws:inspector2:us-east-2:123456789012:finding/021345ghijkl6789",
                        "ProductArn": "arn:aws:securityhub:us-east-1::product/aws/inspector",
                        "Title": "Finding title"
                    }
                ]
            }
        ]
    }
}
```

## Remediasi
<a name="asff-remediation"></a>

[https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_Remediation.html](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_Remediation.html)Objek memberikan informasi tentang langkah-langkah remediasi yang direkomendasikan untuk mengatasi temuan tersebut.

**Contoh**

```
"Remediation": {
    "Recommendation": {
        "Text": "For instructions on how to fix this issue, see the AWS Security Hub CSPM documentation for EC2.2.",
        "Url": "https://docs.aws.amazon.com/console/securityhub/EC2.2/remediation"
    }
}
```

## Sampel
<a name="asff-sample"></a>

Menentukan apakah temuan adalah temuan sampel.

```
"Sample": true
```

## SourceUrl
<a name="asff-sourceurl"></a>

`SourceUrl`Objek menyediakan URL yang menautkan ke halaman tentang temuan saat ini dalam produk pencarian.

```
"SourceUrl": "http://sourceurl.com"
```

## ThreatIntelIndicators
<a name="asff-threatintelindicators"></a>

[https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_ThreatIntelIndicator.html](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_ThreatIntelIndicator.html)Objek tersebut memberikan rincian intelijen ancaman yang terkait dengan temuan.

**Contoh**

```
"ThreatIntelIndicators": [
  {
    "Category": "BACKDOOR",
    "LastObservedAt": "2018-09-27T23:37:31Z",
    "Source": "Threat Intel Weekly",
    "SourceUrl": "http://threatintelweekly.org/backdoors/8888",
    "Type": "IPV4_ADDRESS",
    "Value": "8.8.8.8",
  }
]
```

## Ancaman
<a name="asff-threats"></a>

[https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_Threat.html](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_Threat.html)Objek tersebut memberikan rincian tentang ancaman yang terdeteksi oleh sebuah temuan.

**Contoh**

```
"Threats": [{
    "FilePaths": [{
        "FileName": "b.txt",
        "FilePath": "/tmp/b.txt",
        "Hash": "sha256",
        "ResourceId": "arn:aws:ec2:us-west-2:123456789012:volume/vol-032f3bdd89aee112f"
    }],
    "ItemCount": 3,
    "Name": "Iot.linux.mirai.vwisi",
    "Severity": "HIGH"
}]
```

## UserDefinedFields
<a name="asff-userdefinedfields"></a>

Menyediakan daftar pasangan string nama-nilai yang terkait dengan temuan. Ini adalah bidang khusus yang ditentukan pengguna yang ditambahkan ke temuan. Bidang ini dapat dihasilkan secara otomatis melalui konfigurasi spesifik Anda.

Penyedia pencarian tidak boleh menggunakan bidang ini untuk data yang dihasilkan produk. Sebagai gantinya, penyedia pencarian dapat menggunakan `ProductFields` bidang untuk data yang tidak dipetakan ke bidang Format Pencarian AWS Keamanan standar apa pun.

Bidang ini hanya dapat diperbarui menggunakan [https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html](https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html).

**Contoh**

```
"UserDefinedFields": {
    "reviewedByCio": "true",
    "comeBackToLater": "Check this again on Monday"
}
```

## VerificationState
<a name="asff-verificationstate"></a>

Memberikan kebenaran temuan. Temuan produk dapat memberikan nilai `UNKNOWN` untuk bidang ini. Produk temuan harus memberikan nilai untuk bidang ini jika ada analog yang berarti dalam sistem produk temuan. Bidang ini biasanya diisi oleh penentuan atau tindakan pengguna setelah menyelidiki temuan.

Penyedia temuan dapat memberikan nilai awal untuk atribut ini, tetapi tidak dapat memperbaruinya setelah itu. Anda hanya dapat memperbarui atribut ini dengan menggunakan [https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html](https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html).

```
"VerificationState": "Confirmed"
```

## Kerentanan
<a name="asff-vulnerabilities"></a>

[https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_Vulnerability.html](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_Vulnerability.html)Objek menyediakan daftar kerentanan yang terkait dengan temuan.

**Contoh**

```
"Vulnerabilities" : [
    {
        "CodeVulnerabilities": [{
            "Cwes": [
                "CWE-798",
                "CWE-799"
            ],
            "FilePath": {
                "EndLine": 421,
                "FileName": "package-lock.json",
                "FilePath": "package-lock.json",
                "StartLine": 420
            },
                "SourceArn":"arn:aws:lambda:us-east-1:123456789012:layer:AWS-AppConfig-Extension:114"
        }],
        "Cvss": [
            {
                "BaseScore": 4.7,
                "BaseVector": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
                "Version": "V3"
            },
            {
                "BaseScore": 4.7,
                "BaseVector": "AV:L/AC:M/Au:N/C:C/I:N/A:N",
                "Version": "V2"
            }
        ],
        "EpssScore": 0.015,
        "ExploitAvailable": "YES",
        "FixAvailable": "YES",
        "Id": "CVE-2020-12345",
        "LastKnownExploitAt": "2020-01-16T00:01:35Z",
        "ReferenceUrls":[
           "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12418",
            "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17563"
        ],
        "RelatedVulnerabilities": ["CVE-2020-12345"],
        "Vendor": {
            "Name": "Alas",
            "Url":"https://alas.aws.amazon.com/ALAS-2020-1337.html",
            "VendorCreatedAt":"2020-01-16T00:01:43Z",
            "VendorSeverity":"Medium",
            "VendorUpdatedAt":"2020-01-16T00:01:43Z"
        },
        "VulnerablePackages": [
            {
                "Architecture": "x86_64",
                "Epoch": "1",
                "FilePath": "/tmp",
                "FixedInVersion": "0.14.0",
                "Name": "openssl",
                "PackageManager": "OS",
                "Release": "16.amzn2.0.3",
                "Remediation": "Update aws-crt to 0.14.0",
                "SourceLayerArn": "arn:aws:lambda:us-west-2:123456789012:layer:id",
                "SourceLayerHash": "sha256:c1962c35b63a6ff6ce7df6e042ee82371a605ca9515569edec46ff14f926f001",
                "Version": "1.0.2k"
            }
        ]
    }
]
```

## Alur kerja
<a name="asff-workflow"></a>

[https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_Workflow.html](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_Workflow.html)Objek tersebut memberikan informasi tentang status investigasi terhadap suatu temuan.

Bidang ini ditujukan bagi pelanggan untuk digunakan dengan alat remediasi, orkestrasi, dan tiket. Ini tidak dimaksudkan untuk menemukan penyedia.

Anda hanya dapat memperbarui `Workflow` bidang dengan [https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html](https://docs.aws.amazon.com//securityhub/1.0/APIReference/API_BatchUpdateFindings.html). Pelanggan juga dapat memperbaruinya dari konsol. Lihat [Menetapkan status alur kerja temuan di Security Hub CSPM](findings-workflow-status.md).

**Contoh**

```
"Workflow": {
    "Status": "NEW"
}
```

## WorkflowState (Pensiun)
<a name="asff-workflowstate"></a>

Objek ini sudah pensiun dan telah digantikan oleh `Status` bidang `Workflow` objek.

Bidang ini menyediakan status alur kerja dari sebuah temuan. Temuan produk dapat memberikan nilai `NEW` untuk bidang ini. Produk temuan dapat memberikan nilai untuk bidang ini jika ada analog yang berarti dalam sistem produk temuan.

**Contoh**

```
"WorkflowState": "NEW"
```

# ResourcesObjek ASFF
<a name="asff-resources"></a>

Dalam AWS Security Finding Format (ASFF), `Resources` objek memberikan informasi tentang sumber daya yang terlibat dalam temuan. Ini berisi array hingga 32 objek sumber daya. Untuk menentukan bagaimana nama sumber daya diformat, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md). Untuk contoh setiap objek sumber daya, pilih sumber daya dari daftar berikut.

**Topics**
+ [Atribut sumber daya di ASFF](asff-resources-attributes.md)
+ [AwsAmazonMQsumber daya di ASFF](asff-resourcedetails-awsamazonmq.md)
+ [AwsApiGatewaysumber daya di ASFF](asff-resourcedetails-awsapigateway.md)
+ [AwsAppSyncsumber daya di ASFF](asff-resourcedetails-awsappsync.md)
+ [AwsAthenasumber daya di ASFF](asff-resourcedetails-awsathena.md)
+ [AwsAutoScalingsumber daya di ASFF](asff-resourcedetails-awsautoscaling.md)
+ [AwsBackupsumber daya di ASFF](asff-resourcedetails-awsbackup.md)
+ [AwsCertificateManagersumber daya di ASFF](asff-resourcedetails-awscertificatemanager.md)
+ [AwsCloudFormationsumber daya di ASFF](asff-resourcedetails-awscloudformation.md)
+ [AwsCloudFrontsumber daya di ASFF](asff-resourcedetails-awscloudfront.md)
+ [AwsCloudTrailsumber daya di ASFF](asff-resourcedetails-awscloudtrail.md)
+ [AwsCloudWatchsumber daya di ASFF](asff-resourcedetails-awscloudwatch.md)
+ [AwsCodeBuildsumber daya di ASFF](asff-resourcedetails-awscodebuild.md)
+ [AwsDmssumber daya di ASFF](asff-resourcedetails-awsdms.md)
+ [AwsDynamoDBsumber daya di ASFF](asff-resourcedetails-awsdynamodb.md)
+ [AwsEc2sumber daya di ASFF](asff-resourcedetails-awsec2.md)
+ [AwsEcrsumber daya di ASFF](asff-resourcedetails-awsecr.md)
+ [AwsEcssumber daya di ASFF](asff-resourcedetails-awsecs.md)
+ [AwsEfssumber daya di ASFF](asff-resourcedetails-awsefs.md)
+ [AwsEkssumber daya di ASFF](asff-resourcedetails-awseks.md)
+ [AwsElasticBeanstalksumber daya di ASFF](asff-resourcedetails-awselasticbeanstalk.md)
+ [AwsElasticSearchsumber daya di ASFF](asff-resourcedetails-awselasticsearch.md)
+ [AwsElbsumber daya di ASFF](asff-resourcedetails-awselb.md)
+ [AwsEventBridgesumber daya di ASFF](asff-resourcedetails-awsevent.md)
+ [AwsGuardDutysumber daya di ASFF](asff-resourcedetails-awsguardduty.md)
+ [AwsIamsumber daya di ASFF](asff-resourcedetails-awsiam.md)
+ [AwsKinesissumber daya di ASFF](asff-resourcedetails-awskinesis.md)
+ [AwsKmssumber daya di ASFF](asff-resourcedetails-awskms.md)
+ [AwsLambda](asff-resourcedetails-awslambda.md)
+ [AwsMsksumber daya di ASFF](asff-resourcedetails-awsmsk.md)
+ [AwsNetworkFirewallsumber daya di ASFF](asff-resourcedetails-awsnetworkfirewall.md)
+ [AwsOpenSearchServicesumber daya di ASFF](asff-resourcedetails-awsopensearchservice.md)
+ [AwsRdssumber daya di ASFF](asff-resourcedetails-awsrds.md)
+ [AwsRedshiftsumber daya di ASFF](asff-resourcedetails-awsredshift.md)
+ [AwsRoute53sumber daya di ASFF](asff-resourcedetails-awsroute53.md)
+ [AwsS3sumber daya di ASFF](asff-resourcedetails-awss3.md)
+ [AwsSageMakersumber daya di ASFF](asff-resourcedetails-awssagemaker.md)
+ [AwsSecretsManagersumber daya di ASFF](asff-resourcedetails-awssecretsmanager.md)
+ [AwsSnssumber daya di ASFF](asff-resourcedetails-awssns.md)
+ [AwsSqssumber daya di ASFF](asff-resourcedetails-awssqs.md)
+ [AwsSsmsumber daya di ASFF](asff-resourcedetails-awsssm.md)
+ [AwsStepFunctionssumber daya di ASFF](asff-resourcedetails-awsstepfunctions.md)
+ [AwsWafsumber daya di ASFF](asff-resourcedetails-awswaf.md)
+ [AwsXraysumber daya di ASFF](asff-resourcedetails-awsxray.md)
+ [CodeRepositoryobjek di ASFF](asff-resourcedetails-coderepository.md)
+ [Containerobjek di ASFF](asff-resourcedetails-container.md)
+ [Otherobjek di ASFF](asff-resourcedetails-other.md)

# Atribut sumber daya di ASFF
<a name="asff-resources-attributes"></a>

Berikut adalah deskripsi dan contoh untuk `Resources` objek dalam AWS Security Finding Format (ASFF). Untuk informasi lebih lanjut tentang bidang ini, lihat[Sumber daya](asff-required-attributes.md#Resources).

## ApplicationArn
<a name="asff-resources-applicationarn"></a>

Mengidentifikasi Nama Sumber Daya Amazon (ARN) dari aplikasi yang terlibat dalam temuan.

**Contoh**

```
"ApplicationArn": "arn:aws:resource-groups:us-west-2:123456789012:group/SampleApp/1234567890abcdef0"
```

## ApplicationName
<a name="asff-resources-applicationname"></a>

Mengidentifikasi nama aplikasi yang terlibat dalam temuan.

**Contoh**

```
"ApplicationName": "SampleApp"
```

## DataClassification
<a name="asff-resources-dataclassification"></a>

[https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_DataClassificationDetails.html](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_DataClassificationDetails.html)Bidang ini memberikan informasi tentang data sensitif yang terdeteksi pada sumber daya.

**Contoh**

```
"DataClassification": {
    "DetailedResultsLocation": "Path_to_Folder_Or_File",
    "Result": {
        "MimeType": "text/plain",
        "SizeClassified": 2966026,
        "AdditionalOccurrences": false,
        "Status": {
            "Code": "COMPLETE",
            "Reason": "Unsupportedfield"
        },
       "SensitiveData": [
            {
                "Category": "PERSONAL_INFORMATION",
                "Detections": [
                    {
                        "Count": 34,
                        "Type": "GE_PERSONAL_ID",
                        "Occurrences": {
                            "LineRanges": [
                                {
                                    "Start": 1,
                                    "End": 10,
                                    "StartColumn": 20
                                }
                            ],
                            "Pages": [],
                            "Records": [],
                            "Cells": []
                        }
                    },
                    {
                        "Count": 59,
                        "Type": "EMAIL_ADDRESS",
                        "Occurrences": {
                            "Pages": [
                                {
                                    "PageNumber": 1,
                                    "OffsetRange": {
                                        "Start": 1,
                                        "End": 100,
                                        "StartColumn": 10
                                     },
                                    "LineRange": {
                                        "Start": 1,
                                        "End": 100,
                                        "StartColumn": 10
                                    }
                                }
                            ]
                        }
                    },
                    {
                        "Count": 2229,
                        "Type": "URL",
                        "Occurrences": {
                           "LineRanges": [
                               {
                                   "Start": 1,
                                   "End": 13
                               }
                           ]
                       }
                   },
                   {
                       "Count": 13826,
                       "Type": "NameDetection",
                       "Occurrences": {
                            "Records": [
                                {
                                    "RecordIndex": 1,
                                    "JsonPath": "$.ssn.value"
                                }
                            ]
                        }
                   },
                   {
                       "Count": 32,
                       "Type": "AddressDetection"
                   }
               ],
               "TotalCount": 32
           }
        ],
        "CustomDataIdentifiers": {
            "Detections": [
                 {
                     "Arn": "1712be25e7c7f53c731fe464f1c869b8", 
                     "Name": "1712be25e7c7f53c731fe464f1c869b8", 
                     "Count": 2,
                 }
            ],
            "TotalCount": 2
        }
    }
}
```

## Detail
<a name="asff-resources-details"></a>

[https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_ResourceDetails.html](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_ResourceDetails.html)Bidang ini memberikan informasi tambahan tentang sumber daya tunggal menggunakan objek yang sesuai. Setiap sumber daya harus disediakan dalam objek sumber daya terpisah di `Resources` objek.

Perhatikan bahwa jika ukuran temuan melebihi maksimum 240 KB, maka `Details` objek dihapus dari temuan. Untuk temuan kontrol yang menggunakan AWS Config aturan, Anda dapat melihat detail sumber daya di AWS Config konsol.

Security Hub CSPM menyediakan serangkaian detail sumber daya yang tersedia untuk jenis sumber daya yang didukung. Detail ini sesuai dengan nilai `Type` objek. Gunakan jenis yang disediakan bila memungkinkan.

Misalnya, jika sumber daya adalah bucket S3, maka atur sumber daya `Type` ke `AwsS3Bucket` dan berikan detail sumber daya di [`AwsS3Bucket`](asff-resourcedetails-awss3.md#asff-resourcedetails-awss3bucket)objek.

[`Other`](asff-resourcedetails-other.md)Objek memungkinkan Anda untuk memberikan bidang dan nilai khusus. Anda menggunakan `Other` objek dalam kasus berikut:
+ Jenis sumber daya (nilai sumber daya`Type`) tidak memiliki objek detail yang sesuai. Untuk memberikan detail untuk sumber daya, Anda menggunakan [`Other`](asff-resourcedetails-other.md)objek.
+ Objek untuk jenis sumber daya tidak menyertakan semua bidang yang ingin Anda isi. Dalam hal ini, gunakan objek detail untuk jenis sumber daya untuk mengisi bidang yang tersedia. Gunakan `Other` objek untuk mengisi bidang yang tidak ada di objek khusus tipe.
+ Jenis sumber daya bukan salah satu jenis yang disediakan. Dalam hal ini, atur `Resource.Type` ke`Other`, dan gunakan `Other` objek untuk mengisi detail.

**Contoh**

```
"Details": {
  "AwsEc2Instance": {
    "IamInstanceProfileArn": "arn:aws:iam::123456789012:role/IamInstanceProfileArn",
    "ImageId": "ami-79fd7eee",
    "IpV4Addresses": ["1.1.1.1"],
    "IpV6Addresses": ["2001:db8:1234:1a2b::123"],
    "KeyName": "testkey",
    "LaunchedAt": "2018-09-29T01:25:54Z",
    "MetadataOptions": {
      "HttpEndpoint": "enabled",
      "HttpProtocolIpv6": "enabled",
      "HttpPutResponseHopLimit": 1,
      "HttpTokens": "optional",
      "InstanceMetadataTags": "disabled"
    },
    "NetworkInterfaces": [
    {
      "NetworkInterfaceId": "eni-e5aa89a3"
    }
    ],
    "SubnetId": "PublicSubnet",
    "Type": "i3.xlarge",
    "VirtualizationType": "hvm",
    "VpcId": "TestVPCIpv6"
  },
  "AwsS3Bucket": {
    "OwnerId": "da4d66eac431652a4d44d490a00500bded52c97d235b7b4752f9f688566fe6de",
    "OwnerName": "acmes3bucketowner"
  },
  "Other": { "LightPen": "blinky", "SerialNo": "1234abcd"}  
}
```

## Id
<a name="asff-resources-id"></a>

Pengidentifikasi untuk jenis sumber daya yang diberikan.

Untuk AWS sumber daya yang diidentifikasi oleh Amazon Resource Names (ARNs), ini adalah ARN.

Untuk AWS sumber daya yang kurang ARNs, ini adalah pengidentifikasi seperti yang didefinisikan oleh AWS layanan yang menciptakan sumber daya.

Untuk AWS non-sumber daya, ini adalah pengidentifikasi unik yang terkait dengan sumber daya.

**Contoh**

```
"Id": "arn:aws:s3:::amzn-s3-demo-bucket"
```

## Partition
<a name="asff-resources-partition"></a>

Partisi tempat sumber daya berada. Partisi adalah sekelompok Wilayah AWS. Masing-masing Akun AWS dicakup ke satu partisi.

Partisi berikut didukung:
+ `aws` – Wilayah AWS
+ `aws-cn`— Wilayah Tiongkok
+ `aws-us-gov` – AWS GovCloud (US) Region

**Contoh**

```
"Partition": "aws"
```

## Region
<a name="asff-resources-region"></a>

Kode untuk Wilayah AWS tempat sumber daya ini berada. Untuk daftar kode Wilayah, lihat [Titik akhir Regional](https://docs.aws.amazon.com/general/latest/gr/rande.html#regional-endpoints).

**Contoh**

```
"Region": "us-west-2"
```

## ResourceRole
<a name="asff-resources-resourcerole"></a>

Mengidentifikasi peran sumber daya dalam temuan. Sumber daya adalah target aktivitas pencarian atau aktor yang melakukan aktivitas tersebut.

**Contoh**

```
"ResourceRole": "target"
```

## Tag
<a name="asff-resources-tags"></a>

Bidang ini menyediakan kunci tag dan informasi nilai untuk sumber daya yang terlibat dalam temuan. Anda dapat menandai [sumber daya yang didukung](https://docs.aws.amazon.com/resourcegroupstagging/latest/APIReference/supported-services.html) oleh `GetResources` pengoperasian API AWS Resource Groups Tagging. Security Hub CSPM memanggil operasi ini melalui [peran terkait layanan](using-service-linked-roles.md) dan mengambil tag sumber daya jika `Resource.Id` bidang AWS Security Finding Format (ASFF) diisi dengan ARN sumber daya. AWS Sumber daya yang tidak valid diabaikan IDs . 

Anda dapat menambahkan tag sumber daya ke temuan yang dicerna CSPM Security Hub, termasuk temuan dari produk terintegrasi Layanan AWS dan pihak ketiga.

Menambahkan tag memberi tahu Anda tag yang dikaitkan dengan sumber daya pada saat temuan diproses. Anda dapat menyertakan `Tags` atribut hanya untuk sumber daya yang memiliki tag terkait. Jika sumber daya tidak memiliki tag terkait, jangan sertakan `Tags` atribut dalam temuan.

Dimasukkannya tag sumber daya dalam temuan menghilangkan kebutuhan untuk membangun jaringan pengayaan data atau secara manual memperkaya metadata temuan keamanan. Anda juga dapat menggunakan tag untuk mencari atau memfilter temuan dan wawasan dan membuat [aturan otomatisasi](automation-rules.md).

Untuk informasi tentang pembatasan yang berlaku untuk tag, lihat [Batas dan persyaratan penamaan tag](https://docs.aws.amazon.com/tag-editor/latest/userguide/tagging.html#tag-conventions).

Anda hanya dapat memberikan tag yang ada pada AWS sumber daya di bidang ini. Untuk menyediakan data yang tidak ditentukan dalam Format Pencarian AWS Keamanan, gunakan subbidang `Other` detail.

**Contoh**

```
"Tags": {
    "billingCode": "Lotus-1-2-3",
    "needsPatching": "true"
}
```

## Tipe
<a name="asff-resources-type"></a>

Jenis sumber daya yang Anda berikan detailnya.

Bila memungkinkan, gunakan salah satu jenis sumber daya yang disediakan, seperti `AwsEc2Instance` atau`AwsS3Bucket`.

Jika jenis sumber daya tidak cocok dengan salah satu jenis sumber daya yang disediakan, setel sumber daya `Type` ke`Other`, dan gunakan subbidang `Other` detail untuk mengisi detailnya.

Nilai yang didukung tercantum di bawah [Sumber Daya](asff-resources.md).

**Contoh**

```
"Type": "AwsS3Bucket"
```

# AwsAmazonMQsumber daya di ASFF
<a name="asff-resourcedetails-awsamazonmq"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsAmazonMQ` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsAmazonMQBroker
<a name="asff-resourcedetails-awsamazonmqbroker"></a>

`AwsAmazonMQBroker`memberikan informasi tentang broker Amazon MQ, yang merupakan lingkungan broker pesan yang berjalan di Amazon MQ.

Contoh berikut menunjukkan ASFF untuk `AwsAmazonMQBroker` objek. Untuk melihat deskripsi `AwsAmazonMQBroker` atribut, lihat [AwsAmazonMQBroker](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsAmazonMQBrokerDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsAmazonMQBroker": {
    "AutoMinorVersionUpgrade": true,
    "BrokerArn": "arn:aws:mq:us-east-1:123456789012:broker:TestBroker:b-a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
    "BrokerId": "b-a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
    "BrokerName": "TestBroker",
    "Configuration": {
        "Id": "c-a1b2c3d4-5678-90ab-cdef-EXAMPLE22222",
        "Revision": 1
    },
    "DeploymentMode": "ACTIVE_STANDBY_MULTI_AZ",
    "EncryptionOptions": {
        "UseAwsOwnedKey": true
    },
    "EngineType": "ActiveMQ",
    "EngineVersion": "5.17.2",
    "HostInstanceType": "mq.t2.micro",
    "Logs": {
        "Audit": false,
        "AuditLogGroup": "/aws/amazonmq/broker/b-a1b2c3d4-5678-90ab-cdef-EXAMPLE11111/audit",
        "General": false,
        "GeneralLogGroup": "/aws/amazonmq/broker/b-a1b2c3d4-5678-90ab-cdef-EXAMPLE11111/general"
    },
    "MaintenanceWindowStartTime": {
        "DayOfWeek": "MONDAY",
        "TimeOfDay": "22:00",
        "TimeZone": "UTC"
    },
    "PubliclyAccessible": true,
    "SecurityGroups": [
        "sg-021345abcdef6789"
    ],
    "StorageType": "efs",
    "SubnetIds": [
        "subnet-1234567890abcdef0",
        "subnet-abcdef01234567890"
    ],
    "Users": [
        {
            "Username": "admin"
        }
    ]
}
```

# AwsApiGatewaysumber daya di ASFF
<a name="asff-resourcedetails-awsapigateway"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsApiGateway` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsApiGatewayRestApi
<a name="asff-resourcedetails-awsapigatewayrestapi"></a>

`AwsApiGatewayRestApi`Objek berisi informasi tentang REST API di Amazon API Gateway versi 1.

Berikut ini adalah contoh `AwsApiGatewayRestApi` temuan dalam AWS Security Finding Format (ASFF). Untuk melihat deskripsi `AwsApiGatewayRestApi` atribut, lihat [AwsApiGatewayRestApiDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsApiGatewayRestApiDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
AwsApiGatewayRestApi: {
    "Id": "exampleapi",
    "Name": "Security Hub",
    "Description": "AWS Security Hub",
    "CreatedDate": "2018-11-18T10:20:05-08:00",
    "Version": "2018-10-26",
    "BinaryMediaTypes" : ["-'*~1*'"],
    "MinimumCompressionSize": 1024,
    "ApiKeySource": "AWS_ACCOUNT_ID",
    "EndpointConfiguration": {
        "Types": [
            "REGIONAL"
        ]
    }
}
```

## AwsApiGatewayStage
<a name="asff-resourcedetails-awsapigatewaystage"></a>

`AwsApiGatewayStage`Objek menyediakan informasi tentang tahap Amazon API Gateway versi 1.

Berikut ini adalah contoh `AwsApiGatewayStage` temuan dalam AWS Security Finding Format (ASFF). Untuk melihat deskripsi `AwsApiGatewayStage` atribut, lihat [AwsApiGatewayStageDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsApiGatewayStageDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsApiGatewayStage": {
    "DeploymentId": "n7hlmf",
    "ClientCertificateId": "a1b2c3", 
    "StageName": "Prod",
    "Description" : "Stage Description",
    "CacheClusterEnabled": false,
    "CacheClusterSize" : "1.6",
    "CacheClusterStatus": "NOT_AVAILABLE",
    "MethodSettings": [
        {
            "MetricsEnabled": true,
            "LoggingLevel": "INFO",
            "DataTraceEnabled": false,
            "ThrottlingBurstLimit": 100,
            "ThrottlingRateLimit": 5.0,
            "CachingEnabled": false,
            "CacheTtlInSeconds": 300,
            "CacheDataEncrypted": false,
            "RequireAuthorizationForCacheControl": true,
            "UnauthorizedCacheControlHeaderStrategy": "SUCCEED_WITH_RESPONSE_HEADER",
            "HttpMethod": "POST",
            "ResourcePath": "/echo"
        }
    ],
    "Variables": {"test": "value"},
    "DocumentationVersion": "2.0",
    "AccessLogSettings": {
        "Format": "{\"requestId\": \"$context.requestId\", \"extendedRequestId\": \"$context.extendedRequestId\", \"ownerAccountId\": \"$context.accountId\", \"requestAccountId\": \"$context.identity.accountId\", \"callerPrincipal\": \"$context.identity.caller\", \"httpMethod\": \"$context.httpMethod\", \"resourcePath\": \"$context.resourcePath\", \"status\": \"$context.status\", \"requestTime\": \"$context.requestTime\", \"responseLatencyMs\": \"$context.responseLatency\", \"errorMessage\": \"$context.error.message\", \"errorResponseType\": \"$context.error.responseType\", \"apiId\": \"$context.apiId\", \"awsEndpointRequestId\": \"$context.awsEndpointRequestId\", \"domainName\": \"$context.domainName\", \"stage\": \"$context.stage\", \"xrayTraceId\": \"$context.xrayTraceId\", \"sourceIp\": \"$context.identity.sourceIp\", \"user\": \"$context.identity.user\", \"userAgent\": \"$context.identity.userAgent\", \"userArn\": \"$context.identity.userArn\", \"integrationLatency\": \"$context.integrationLatency\", \"integrationStatus\": \"$context.integrationStatus\", \"authorizerIntegrationLatency\": \"$context.authorizer.integrationLatency\" }",
        "DestinationArn": "arn:aws:logs:us-west-2:111122223333:log-group:SecurityHubAPIAccessLog/Prod"
    },
    "CanarySettings": {
        "PercentTraffic": 0.0,
        "DeploymentId": "ul73s8",
        "StageVariableOverrides" : [
            "String" : "String"
        ],
        "UseStageCache": false
    },
    "TracingEnabled": false,
    "CreatedDate": "2018-07-11T10:55:18-07:00",
    "LastUpdatedDate": "2020-08-26T11:51:04-07:00",
    "WebAclArn" : "arn:aws:waf-regional:us-west-2:111122223333:webacl/cb606bd8-5b0b-4f0b-830a-dd304e48a822"
}
```

## AwsApiGatewayV2Api
<a name="asff-resourcedetails-awsapigatewayv2api"></a>

`AwsApiGatewayV2Api`Objek berisi informasi tentang API versi 2 di Amazon API Gateway.

Berikut ini adalah contoh `AwsApiGatewayV2Api` temuan dalam AWS Security Finding Format (ASFF). Untuk melihat deskripsi `AwsApiGatewayV2Api` atribut, lihat [AwsApiGatewayV2 ApiDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsApiGatewayV2ApiDetails.html) di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsApiGatewayV2Api": {
    "ApiEndpoint": "https://example.us-west-2.amazonaws.com",
    "ApiId": "a1b2c3d4",
    "ApiKeySelectionExpression": "$request.header.x-api-key",
    "CreatedDate": "2020-03-28T00:32:37Z",
   "Description": "ApiGatewayV2 Api",
   "Version": "string",
    "Name": "my-api",
    "ProtocolType": "HTTP",
    "RouteSelectionExpression": "$request.method $request.path",
   "CorsConfiguration": {
        "AllowOrigins": [ "*" ],
        "AllowCredentials": true,
        "ExposeHeaders": [ "string" ],
        "MaxAge": 3000,
        "AllowMethods": [
          "GET",
          "PUT",
          "POST",
          "DELETE",
          "HEAD"
        ],
        "AllowHeaders": [ "*" ]
    }
}
```

## AwsApiGatewayV2Panggung
<a name="asff-resourcedetails-awsapigatewayv2stage"></a>

`AwsApiGatewayV2Stage`berisi informasi tentang tahap versi 2 untuk Amazon API Gateway.

Berikut ini adalah contoh `AwsApiGatewayV2Stage` temuan dalam AWS Security Finding Format (ASFF). Untuk melihat deskripsi `AwsApiGatewayV2Stage` atribut, lihat [AwsApiGatewayV2 StageDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsApiGatewayV2StageDetails.html) di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsApiGatewayV2Stage": {
    "CreatedDate": "2020-04-08T00:36:05Z",
    "Description" : "ApiGatewayV2",
    "DefaultRouteSettings": {
        "DetailedMetricsEnabled": false,
        "LoggingLevel": "INFO",
        "DataTraceEnabled": true,
        "ThrottlingBurstLimit": 100,
        "ThrottlingRateLimit": 50
    },
    "DeploymentId": "x1zwyv",
    "LastUpdatedDate": "2020-04-08T00:36:13Z",
    "RouteSettings": {
        "DetailedMetricsEnabled": false,
        "LoggingLevel": "INFO",
        "DataTraceEnabled": true,
        "ThrottlingBurstLimit": 100,
        "ThrottlingRateLimit": 50
    },
    "StageName": "prod",
    "StageVariables": [
        "function": "my-prod-function"
    ],
    "AccessLogSettings": {
        "Format": "{\"requestId\": \"$context.requestId\", \"extendedRequestId\": \"$context.extendedRequestId\", \"ownerAccountId\": \"$context.accountId\", \"requestAccountId\": \"$context.identity.accountId\", \"callerPrincipal\": \"$context.identity.caller\", \"httpMethod\": \"$context.httpMethod\", \"resourcePath\": \"$context.resourcePath\", \"status\": \"$context.status\", \"requestTime\": \"$context.requestTime\", \"responseLatencyMs\": \"$context.responseLatency\", \"errorMessage\": \"$context.error.message\", \"errorResponseType\": \"$context.error.responseType\", \"apiId\": \"$context.apiId\", \"awsEndpointRequestId\": \"$context.awsEndpointRequestId\", \"domainName\": \"$context.domainName\", \"stage\": \"$context.stage\", \"xrayTraceId\": \"$context.xrayTraceId\", \"sourceIp\": \"$context.identity.sourceIp\", \"user\": \"$context.identity.user\", \"userAgent\": \"$context.identity.userAgent\", \"userArn\": \"$context.identity.userArn\", \"integrationLatency\": \"$context.integrationLatency\", \"integrationStatus\": \"$context.integrationStatus\", \"authorizerIntegrationLatency\": \"$context.authorizer.integrationLatency\" }",
        "DestinationArn": "arn:aws:logs:us-west-2:111122223333:log-group:SecurityHubAPIAccessLog/Prod"
    },
    "AutoDeploy": false,
    "LastDeploymentStatusMessage": "Message",
    "ApiGatewayManaged": true,
}
```

# AwsAppSyncsumber daya di ASFF
<a name="asff-resourcedetails-awsappsync"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsAppSync` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsAppSyncGraphQLApi
<a name="asff-resourcedetails-awsappsyncgraphqlapi"></a>

`AwsAppSyncGraphQLApi`menyediakan informasi tentang AWS AppSync GraphQL API, yang merupakan konstruksi tingkat atas untuk aplikasi Anda.

Contoh berikut menunjukkan ASFF untuk `AwsAppSyncGraphQLApi` objek. Untuk melihat deskripsi `AwsAppSyncGraphQLApi` atribut, lihat [AwsAppSyncGraphQLApi](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsAppSyncGraphQLApiDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsAppSyncGraphQLApi": {
    "AdditionalAuthenticationProviders": [
    {
    	"AuthenticationType": "AWS_LAMBDA",
    	"LambdaAuthorizerConfig": {
    		"AuthorizerResultTtlInSeconds": 300,
    		"AuthorizerUri": "arn:aws:lambda:us-east-1:123456789012:function:mylambdafunc"
    	}
    },
    {
    	"AuthenticationType": "AWS_IAM"
    }
    ],
    "ApiId": "021345abcdef6789",
    "Arn": "arn:aws:appsync:eu-central-1:123456789012:apis/021345abcdef6789",
    "AuthenticationType": "API_KEY",
    "Id": "021345abcdef6789",
    "LogConfig": {
    	"CloudWatchLogsRoleArn": "arn:aws:iam::123456789012:role/service-role/appsync-graphqlapi-logs-eu-central-1",
    	"ExcludeVerboseContent": true,
    	"FieldLogLevel": "ALL"
    },
    "Name": "My AppSync App",
    "XrayEnabled": true,
}
```

# AwsAthenasumber daya di ASFF
<a name="asff-resourcedetails-awsathena"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsAthena` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsAthenaWorkGroup
<a name="asff-resourcedetails-awsathenaworkgroup"></a>

`AwsAthenaWorkGroup`memberikan informasi tentang workgroup Amazon Athena. Workgroup membantu Anda memisahkan pengguna, tim, aplikasi, atau beban kerja. Ini juga membantu Anda menetapkan batasan pada pemrosesan data dan melacak biaya.

Contoh berikut menunjukkan ASFF untuk `AwsAthenaWorkGroup` objek. Untuk melihat deskripsi `AwsAthenaWorkGroup` atribut, lihat [AwsAthenaWorkGroup](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsAthenaWorkGroupDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsAthenaWorkGroup": {
    "Description": "My workgroup for prod workloads",
    "Name": "MyWorkgroup",
    "WorkgroupConfiguration" {
        "ResultConfiguration": {
            "EncryptionConfiguration": {
                "EncryptionOption": "SSE_KMS",
                "KmsKey": "arn:aws:kms:us-east-1:123456789012:key/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111"
            }
        }
    },
        "State": "ENABLED"
}
```

# AwsAutoScalingsumber daya di ASFF
<a name="asff-resourcedetails-awsautoscaling"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsAutoScaling` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsAutoScalingAutoScalingGroup
<a name="asff-resourcedetails-awsautoscalingautoscalinggroup"></a>

`AwsAutoScalingAutoScalingGroup`Objek memberikan rincian tentang grup penskalaan otomatis.

Berikut ini adalah contoh `AwsAutoScalingAutoScalingGroup` temuan dalam AWS Security Finding Format (ASFF). Untuk melihat deskripsi `AwsAutoScalingAutoScalingGroup` atribut, lihat [AwsAutoScalingAutoScalingGroupDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsAutoScalingAutoScalingGroupDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsAutoScalingAutoScalingGroup": {
        "CreatedTime": "2017-10-17T14:47:11Z",
        "HealthCheckGracePeriod": 300,
        "HealthCheckType": "EC2",
        "LaunchConfigurationName": "mylaunchconf",
        "LoadBalancerNames": [],
        "LaunchTemplate": {                            
            "LaunchTemplateId": "string",
            "LaunchTemplateName": "string",
            "Version": "string"
        },
        "MixedInstancesPolicy": {
            "InstancesDistribution": {
                "OnDemandAllocationStrategy": "prioritized",
                "OnDemandBaseCapacity": number,
                "OnDemandPercentageAboveBaseCapacity": number,
                "SpotAllocationStrategy": "lowest-price",
                "SpotInstancePools": number,
                "SpotMaxPrice": "string"
            },
            "LaunchTemplate": {
                "LaunchTemplateSpecification": {
                    "LaunchTemplateId": "string",
                    "LaunchTemplateName": "string",
                    "Version": "string"
                 },
                "CapacityRebalance": true,
                "Overrides": [
                    {
                       "InstanceType": "string",
                       "WeightedCapacity": "string"
                    }
                ]
            }
        }
    }
}
```

## AwsAutoScalingLaunchConfiguration
<a name="asff-resourcedetails-awsautoscalinglaunchconfiguration"></a>

`AwsAutoScalingLaunchConfiguration`Objek memberikan rincian tentang konfigurasi peluncuran.

Berikut ini adalah contoh `AwsAutoScalingLaunchConfiguration` temuan dalam AWS Security Finding Format (ASFF).

Untuk melihat deskripsi `AwsAutoScalingLaunchConfiguration` atribut, lihat [AwsAutoScalingLaunchConfigurationDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsAutoScalingLaunchConfigurationDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
AwsAutoScalingLaunchConfiguration: {
    "LaunchConfigurationName": "newtest",
    "ImageId": "ami-058a3739b02263842",
    "KeyName": "55hundredinstance",
    "SecurityGroups": [ "sg-01fce87ad6e019725" ],
    "ClassicLinkVpcSecurityGroups": [],
    "UserData": "...Base64-Encoded user data..."
    "InstanceType": "a1.metal",
    "KernelId": "",
    "RamdiskId": "ari-a51cf9cc",
    "BlockDeviceMappings": [
        {
            "DeviceName": "/dev/sdh",
            "Ebs": {
                "VolumeSize": 30,
                "VolumeType": "gp2",
                "DeleteOnTermination": false,
                "Encrypted": true,
                "SnapshotId": "snap-ffaa1e69",
                "VirtualName": "ephemeral1"
            }
        },
        {
            "DeviceName": "/dev/sdb",
            "NoDevice": true
        },
        {
            "DeviceName": "/dev/sda1",
            "Ebs": {
                "SnapshotId": "snap-02420cd3d2dea1bc0",
                "VolumeSize": 8,
                "VolumeType": "gp2",
                "DeleteOnTermination": true,
                "Encrypted": false
            }
        },
        {
            "DeviceName": "/dev/sdi",
            "Ebs": {
                "VolumeSize": 20,
                "VolumeType": "gp2",
                "DeleteOnTermination": false,
                "Encrypted": true
            }
        },
        {
            "DeviceName": "/dev/sdc",
            "NoDevice": true
        }
    ],
    "InstanceMonitoring": {
        "Enabled": false
    },
    "CreatedTime": 1620842933453,
    "EbsOptimized": false,
    "AssociatePublicIpAddress": true,
    "SpotPrice": "0.045"
}
```

# AwsBackupsumber daya di ASFF
<a name="asff-resourcedetails-awsbackup"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsBackup` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsBackupBackupPlan
<a name="asff-resourcedetails-awsbackupbackupplan"></a>

`AwsBackupBackupPlan`Objek memberikan informasi tentang rencana AWS Backup cadangan. Rencana AWS Backup cadangan adalah ekspresi kebijakan yang menentukan kapan dan bagaimana Anda ingin mencadangkan AWS sumber daya Anda.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsBackupBackupPlan` objek. Untuk melihat deskripsi `AwsBackupBackupPlan` atribut, lihat [AwsBackupBackupPlan](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsBackupBackupPlanDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsBackupBackupPlan": {
    "BackupPlan": {
    	"AdvancedBackupSettings": [{
    		"BackupOptions": {
    			"WindowsVSS":"enabled"
    		},
    		"ResourceType":"EC2"
    	}],
    	"BackupPlanName": "test",
    	"BackupPlanRule": [{
    		"CompletionWindowMinutes": 10080,
    		"CopyActions": [{
    			"DestinationBackupVaultArn": "arn:aws:backup:us-east-1:858726136373:backup-vault:aws/efs/automatic-backup-vault",
    			"Lifecycle": {
    				"DeleteAfterDays": 365,
    				"MoveToColdStorageAfterDays": 30
    			}
    		}],
    		"Lifecycle": {
    			"DeleteAfterDays": 35
    		},
    		"RuleName": "DailyBackups",
    		"ScheduleExpression": "cron(0 5 ? * * *)",
    		"StartWindowMinutes": 480,
    		"TargetBackupVault": "Default"
    		},
    		{
    		"CompletionWindowMinutes": 10080,
    		"CopyActions": [{
    			"DestinationBackupVaultArn": "arn:aws:backup:us-east-1:858726136373:backup-vault:aws/efs/automatic-backup-vault",
    			"Lifecycle": {
    				"DeleteAfterDays": 365,
    				"MoveToColdStorageAfterDays": 30
    			}
    		}],
    		"Lifecycle": {
    			"DeleteAfterDays": 35
    		},
    		"RuleName": "Monthly",
    		"ScheduleExpression": "cron(0 5 1 * ? *)",
    		"StartWindowMinutes": 480,
    		"TargetBackupVault": "Default"
    	}]
    },
    "BackupPlanArn": "arn:aws:backup:us-east-1:858726136373:backup-plan:b6d6b896-590d-4ee1-bf29-c5ccae63f4e7",
    "BackupPlanId": "b6d6b896-590d-4ee1-bf29-c5ccae63f4e7",
    "VersionId": "ZDVjNDIzMjItYTZiNS00NzczLTg4YzctNmExMWM2NjZhY2E1"
}
```

## AwsBackupBackupVault
<a name="asff-resourcedetails-awsbackupbackupvault"></a>

`AwsBackupBackupVault`Objek memberikan informasi tentang brankas AWS Backup cadangan. Brankas AWS Backup cadangan adalah wadah yang menyimpan dan mengatur cadangan Anda.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsBackupBackupVault` objek. Untuk melihat deskripsi `AwsBackupBackupVault` atribut, lihat [AwsBackupBackupVault](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsBackupBackupVaultDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsBackupBackupVault": {
    "AccessPolicy": {
    	"Statement": [{
    		"Action": [
    			"backup:DeleteBackupVault",
    			"backup:DeleteBackupVaultAccessPolicy",
    			"backup:DeleteRecoveryPoint",
    			"backup:StartCopyJob",
    			"backup:StartRestoreJob",
    			"backup:UpdateRecoveryPointLifecycle"
    		],
    		"Effect": "Deny",
    		"Principal": {
    			"AWS": "*"
    		},
    		"Resource": "*"
    	}],
    	"Version": "2012-10-17"		 	 	 
    },
    "BackupVaultArn": "arn:aws:backup:us-east-1:123456789012:backup-vault:aws/efs/automatic-backup-vault",
    "BackupVaultName": "aws/efs/automatic-backup-vault",
    "EncrytionKeyArn": "arn:aws:kms:us-east-1:444455556666:key/72ba68d4-5e43-40b0-ba38-838bf8d06ca0",
    "Notifications": {
    	"BackupVaultEvents": ["BACKUP_JOB_STARTED", "BACKUP_JOB_COMPLETED", "COPY_JOB_STARTED"],
    	"SNSTopicArn": "arn:aws:sns:us-west-2:111122223333:MyVaultTopic"
    }
}
```

## AwsBackupRecoveryPoint
<a name="asff-resourcedetails-awsbackuprecoverypoint"></a>

`AwsBackupRecoveryPoint`Objek memberikan informasi tentang AWS Backup cadangan, juga disebut sebagai titik pemulihan. Titik AWS Backup pemulihan mewakili konten sumber daya pada waktu tertentu.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsBackupRecoveryPoint` objek. Untuk melihat deskripsi `AwsBackupBackupVault` atribut, lihat [AwsBackupRecoveryPoint](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsBackupRecoveryPointDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsBackupRecoveryPoint": {
    "BackupSizeInBytes": 0,
    "BackupVaultName": "aws/efs/automatic-backup-vault",
    "BackupVaultArn": "arn:aws:backup:us-east-1:111122223333:backup-vault:aws/efs/automatic-backup-vault",
    "CalculatedLifecycle": {
    	"DeleteAt": "2021-08-30T06:51:58.271Z",
    	"MoveToColdStorageAt": "2020-08-10T06:51:58.271Z"
    },
    "CompletionDate": "2021-07-26T07:21:40.361Z",
    "CreatedBy": {
    	"BackupPlanArn": "arn:aws:backup:us-east-1:111122223333:backup-plan:aws/efs/73d922fb-9312-3a70-99c3-e69367f9fdad",
    	"BackupPlanId": "aws/efs/73d922fb-9312-3a70-99c3-e69367f9fdad",
    	"BackupPlanVersion": "ZGM4YzY5YjktMWYxNC00ZTBmLWE5MjYtZmU5OWNiZmM5ZjIz",
    	"BackupRuleId": "2a600c2-42ad-4196-808e-084923ebfd25"
    },
    "CreationDate": "2021-07-26T06:51:58.271Z",
    "EncryptionKeyArn": "arn:aws:kms:us-east-1:111122223333:key/72ba68d4-5e43-40b0-ba38-838bf8d06ca0",
    "IamRoleArn": "arn:aws:iam::111122223333:role/aws-service-role/backup.amazonaws.com/AWSServiceRoleForBackup",
    "IsEncrypted": true,
    "LastRestoreTime": "2021-07-26T06:51:58.271Z",
    "Lifecycle": {
    	"DeleteAfterDays": 35,
    	"MoveToColdStorageAfterDays": 15
    },
    "RecoveryPointArn": "arn:aws:backup:us-east-1:111122223333:recovery-point:151a59e4-f1d5-4587-a7fd-0774c6e91268",
    "ResourceArn": "arn:aws:elasticfilesystem:us-east-1:858726136373:file-system/fs-15bd31a1",
    "ResourceType": "EFS",
    "SourceBackupVaultArn": "arn:aws:backup:us-east-1:111122223333:backup-vault:aws/efs/automatic-backup-vault",
    "Status": "COMPLETED",
    "StatusMessage": "Failure message",
    "StorageClass": "WARM"
}
```

# AwsCertificateManagersumber daya di ASFF
<a name="asff-resourcedetails-awscertificatemanager"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsCertificateManager` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsCertificateManagerCertificate
<a name="asff-resourcedetails-awscertificatemanagercertificate"></a>

`AwsCertificateManagerCertificate`Objek memberikan rincian tentang sertifikat AWS Certificate Manager (ACM).

Berikut ini adalah contoh `AwsCertificateManagerCertificate` temuan dalam AWS Security Finding Format (ASFF). Untuk melihat deskripsi `AwsCertificateManagerCertificate` atribut, lihat [AwsCertificateManagerCertificateDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsCertificateManagerCertificateDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsCertificateManagerCertificate": {
    "CertificateAuthorityArn": "arn:aws:acm:us-west-2:444455556666:certificate-authority/example",
    "CreatedAt": "2019-05-24T18:12:02.000Z",
    "DomainName": "example.amazondomains.com",
    "DomainValidationOptions": [
        {
            "DomainName": "example.amazondomains.com",
            "ResourceRecord": {
                "Name": "_1bacb61828d3a1020c40a560ceed08f7.example.amazondomains.com",
                "Type": "CNAME",
                "Value": "_example.acm-validations.aws."
             },
             "ValidationDomain": "example.amazondomains.com",
             "ValidationEmails": [sample_email@sample.com],
             "ValidationMethod": "DNS",
             "ValidationStatus": "SUCCESS"
        }
    ],
    "ExtendedKeyUsages": [
        {
            "Name": "TLS_WEB_SERVER_AUTHENTICATION",
            "OId": "1.3.6.1.5.5.7.3.1"
        },
        {
            "Name": "TLS_WEB_CLIENT_AUTHENTICATION",
            "OId": "1.3.6.1.5.5.7.3.2"
        }
    ],
    "FailureReason": "",
    "ImportedAt": "2018-08-17T00:13:00.000Z",
    "InUseBy": ["arn:aws:amazondomains:us-west-2:444455556666:loadbalancer/example"],
    "IssuedAt": "2020-04-26T00:41:17.000Z",
    "Issuer": "Amazon",
    "KeyAlgorithm": "RSA-1024",
    "KeyUsages": [
        {
            "Name": "DIGITAL_SIGNATURE",
        },
        {
            "Name": "KEY_ENCIPHERMENT",
        }
    ],
    "NotAfter": "2021-05-26T12:00:00.000Z",
    "NotBefore": "2020-04-26T00:00:00.000Z",
    "Options": {
        "CertificateTransparencyLoggingPreference": "ENABLED",
    }
    "RenewalEligibility": "ELIGIBLE",
    "RenewalSummary": {
        "DomainValidationOptions": [
            {
                "DomainName": "example.amazondomains.com",
                "ResourceRecord": {
                    "Name": "_1bacb61828d3a1020c40a560ceed08f7.example.amazondomains.com",
                    "Type": "CNAME",
                    "Value": "_example.acm-validations.aws.com",
                },
                "ValidationDomain": "example.amazondomains.com",
                "ValidationEmails": ["sample_email@sample.com"],
                "ValidationMethod": "DNS",
                "ValidationStatus": "SUCCESS"
            }
        ],
        "RenewalStatus": "SUCCESS",
        "RenewalStatusReason": "",
        "UpdatedAt": "2020-04-26T00:41:35.000Z",
    },
    "Serial": "02:ac:86:b6:07:2f:0a:61:0e:3a:ac:fd:d9:ab:17:1a",
    "SignatureAlgorithm": "SHA256WITHRSA",
    "Status": "ISSUED",
    "Subject": "CN=example.amazondomains.com",
    "SubjectAlternativeNames": ["example.amazondomains.com"],
    "Type": "AMAZON_ISSUED"
}
```

# AwsCloudFormationsumber daya di ASFF
<a name="asff-resourcedetails-awscloudformation"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsCloudFormation` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsCloudFormationStack
<a name="asff-resourcedetails-awscloudformationstack"></a>

`AwsCloudFormationStack`Objek memberikan rincian tentang AWS CloudFormation tumpukan yang bersarang sebagai sumber daya dalam template tingkat atas.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsCloudFormationStack` objek. Untuk melihat deskripsi `AwsCloudFormationStack` atribut, lihat [AwsCloudFormationStackDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsCloudFormationStackDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsCloudFormationStack": { 
	"Capabilities": [
		"CAPABILITY_IAM",
		"CAPABILITY_NAMED_IAM"
	],
	"CreationTime": "2022-02-18T15:31:53.161Z",
	"Description": "AWS CloudFormation Sample",
	"DisableRollback": true,
	"DriftInformation": {
		"StackDriftStatus": "DRIFTED"
	},
	"EnableTerminationProtection": false,
	"LastUpdatedTime": "2022-02-18T15:31:53.161Z",
	"NotificationArns": [
		"arn:aws:sns:us-east-1:978084797471:sample-sns-cfn"
	],
	"Outputs": [{
		"Description": "URL for newly created LAMP stack",
		"OutputKey": "WebsiteUrl",
		"OutputValue": "http://ec2-44-193-18-241.compute-1.amazonaws.com"
	}],
	"RoleArn": "arn:aws:iam::012345678910:role/exampleRole",
	"StackId": "arn:aws:cloudformation:us-east-1:978084797471:stack/sample-stack/e5d9f7e0-90cf-11ec-88c6-12ac1f91724b",
	"StackName": "sample-stack",
	"StackStatus": "CREATE_COMPLETE",
	"StackStatusReason": "Success",
	"TimeoutInMinutes": 1
}
```

# AwsCloudFrontsumber daya di ASFF
<a name="asff-resourcedetails-awscloudfront"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsCloudFront` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsCloudFrontDistribution
<a name="asff-resourcedetails-awscloudfrontdistribution"></a>

`AwsCloudFrontDistribution`Objek memberikan rincian tentang konfigurasi CloudFront distribusi Amazon.

Berikut ini adalah contoh `AwsCloudFrontDistribution` temuan dalam AWS Security Finding Format (ASFF). Untuk melihat deskripsi `AwsCloudFrontDistribution` atribut, lihat [AwsCloudFrontDistributionDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsCloudFrontDistributionDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsCloudFrontDistribution": {
    "CacheBehaviors": {
        "Items": [
            {
               "ViewerProtocolPolicy": "https-only"
            }
         ]
    },
    "DefaultCacheBehavior": {
         "ViewerProtocolPolicy": "https-only"
    },
    "DefaultRootObject": "index.html",
    "DomainName": "d2wkuj2w9l34gt.cloudfront.net",
    "Etag": "E37HOT42DHPVYH",
    "LastModifiedTime": "2015-08-31T21:11:29.093Z",
    "Logging": {
         "Bucket": "myawslogbucket.s3.amazonaws.com",
         "Enabled": false,
         "IncludeCookies": false,
         "Prefix": "myawslog/"
     },
     "OriginGroups": {
          "Items": [
              {
                 "FailoverCriteria": {
                     "StatusCodes": {
                          "Items": [
                              200,
                              301,
                              404
                          ]
                          "Quantity": 3
                      }
                 }
              }
           ]
     },
     "Origins": {
           "Items": [
               {
                  "CustomOriginConfig": {
                      "HttpPort": 80,
                      "HttpsPort": 443,
                      "OriginKeepaliveTimeout": 60,
                      "OriginProtocolPolicy": "match-viewer",
                      "OriginReadTimeout": 30,
                      "OriginSslProtocols": {
                        "Items": ["SSLv3", "TLSv1"],
                        "Quantity": 2
                      }                       
                  }
               },                  
           ]
     },
                  "DomainName": "amzn-s3-demo-bucket.s3.amazonaws.com",
                  "Id": "my-origin",
                  "OriginPath": "/production",
                  "S3OriginConfig": {
                      "OriginAccessIdentity": "origin-access-identity/cloudfront/E2YFS67H6VB6E4"
                  }
           ]
     },
     "Status": "Deployed",
     "ViewerCertificate": {
            "AcmCertificateArn": "arn:aws:acm::123456789012:AcmCertificateArn",
            "Certificate": "ASCAJRRE5XYF52TKRY5M4",
            "CertificateSource": "iam",
            "CloudFrontDefaultCertificate": true,
            "IamCertificateId": "ASCAJRRE5XYF52TKRY5M4",
            "MinimumProtocolVersion": "TLSv1.2_2021",
            "SslSupportMethod": "sni-only"
      },
      "WebAclId": "waf-1234567890"
}
```

# AwsCloudTrailsumber daya di ASFF
<a name="asff-resourcedetails-awscloudtrail"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsCloudTrail` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsCloudTrailTrail
<a name="asff-resourcedetails-awscloudtrailtrail"></a>

`AwsCloudTrailTrail`Objek tersebut memberikan detail tentang AWS CloudTrail jejak.

Berikut ini adalah contoh `AwsCloudTrailTrail` temuan dalam AWS Security Finding Format (ASFF). Untuk melihat deskripsi `AwsCloudTrailTrail` atribut, lihat [AwsCloudTrailTrailDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsCloudTrailTrailDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsCloudTrailTrail": {
    "CloudWatchLogsLogGroupArn": "arn:aws:logs:us-west-2:123456789012:log-group:CloudTrail/regression:*",
    "CloudWatchLogsRoleArn": "arn:aws:iam::866482105055:role/CloudTrail_CloudWatchLogs",
    "HasCustomEventSelectors": true,
    "HomeRegion": "us-west-2",
    "IncludeGlobalServiceEvents": true,
    "IsMultiRegionTrail": true,
    "IsOrganizationTrail": false,
    "KmsKeyId": "kmsKeyId",
    "LogFileValidationEnabled": true,
    "Name": "regression-trail",
    "S3BucketName": "cloudtrail-bucket",
    "S3KeyPrefix": "s3KeyPrefix",
    "SnsTopicArn": "arn:aws:sns:us-east-2:123456789012:MyTopic",
    "SnsTopicName": "snsTopicName",
    "TrailArn": "arn:aws:cloudtrail:us-west-2:123456789012:trail"
}
```

# AwsCloudWatchsumber daya di ASFF
<a name="asff-resourcedetails-awscloudwatch"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsCloudWatch` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsCloudWatchAlarm
<a name="asff-resourcedetails-awscloudwatchalarm"></a>

`AwsCloudWatchAlarm`Objek ini memberikan detail tentang CloudWatch alarm Amazon yang menonton metrik atau melakukan tindakan saat alarm berubah status.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsCloudWatchAlarm` objek. Untuk melihat deskripsi `AwsCloudWatchAlarm` atribut, lihat [AwsCloudWatchAlarmDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsCloudWatchAlarmDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsCloudWatchAlarm": { 
	"ActionsEnabled": true,
	"AlarmActions": [
		"arn:aws:automate:region:ec2:stop",
		"arn:aws:automate:region:ec2:terminate"
	],
	"AlarmArn": "arn:aws:cloudwatch:us-west-2:012345678910:alarm:sampleAlarm",
	"AlarmConfigurationUpdatedTimestamp": "2022-02-18T15:31:53.161Z",
	"AlarmDescription": "Alarm Example",
	"AlarmName": "Example",
	"ComparisonOperator": "GreaterThanOrEqualToThreshold",
	"DatapointsToAlarm": 1,
	"Dimensions": [{
		"Name": "InstanceId",
		"Value": "i-1234567890abcdef0"
	}],
	"EvaluateLowSampleCountPercentile": "evaluate",
	"EvaluationPeriods": 1,
	"ExtendedStatistic": "p99.9",
	"InsufficientDataActions": [
		"arn:aws:automate:region:ec2:stop"
	],
	"MetricName": "Sample Metric",
	"Namespace": "YourNamespace",
	"OkActions": [
		"arn:aws:swf:region:account-id:action/actions/AWS_EC2.InstanceId.Stop/1.0"
	],
	"Period": 1,
	"Statistic": "SampleCount",
	"Threshold": 12.3,
	"ThresholdMetricId": "t1",
	"TreatMissingData": "notBreaching",
	"Unit": "Kilobytes/Second"
}
```

# AwsCodeBuildsumber daya di ASFF
<a name="asff-resourcedetails-awscodebuild"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsCodeBuild` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsCodeBuildProject
<a name="asff-resourcedetails-awscodebuildproject"></a>

`AwsCodeBuildProject`Objek memberikan informasi tentang suatu AWS CodeBuild proyek.

Berikut ini adalah contoh `AwsCodeBuildProject` temuan dalam AWS Security Finding Format (ASFF). Untuk melihat deskripsi `AwsCodeBuildProject` atribut, lihat [AwsCodeBuildProjectDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsCodeBuildProjectDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsCodeBuildProject": {
   "Artifacts": [
      {
          "ArtifactIdentifier": "string",
          "EncryptionDisabled": boolean,
          "Location": "string",
          "Name": "string",
          "NamespaceType": "string",
          "OverrideArtifactName": boolean,
          "Packaging": "string",
          "Path": "string",
          "Type": "string"
       }
   ],
   "SecondaryArtifacts": [
      {
          "ArtifactIdentifier": "string",
          "EncryptionDisabled": boolean,
          "Location": "string",
          "Name": "string",
          "NamespaceType": "string",
          "OverrideArtifactName": boolean,
          "Packaging": "string",
          "Path": "string",
          "Type": "string"
       }
   ],
   "EncryptionKey": "string",
   "Certificate": "string",
   "Environment": {
      "Certificate": "string",
      "EnvironmentVariables": [
           {
                "Name": "string",
                "Type": "string",
                "Value": "string"
           }
      ],
   "ImagePullCredentialsType": "string",
   "PrivilegedMode": boolean, 
   "RegistryCredential": {
       "Credential": "string",
       "CredentialProvider": "string"
   },
   "Type": "string"
   },
   "LogsConfig": {
        "CloudWatchLogs": {
             "GroupName": "string",
             "Status": "string",
             "StreamName": "string"
        },
        "S3Logs": {
             "EncryptionDisabled": boolean,
             "Location": "string",
             "Status": "string"
        }
   },
   "Name": "string",
   "ServiceRole": "string",
   "Source": {
        "Type": "string",
        "Location": "string",
        "GitCloneDepth": integer
   },
   "VpcConfig": {
        "VpcId": "string",
        "Subnets": ["string"],
        "SecurityGroupIds": ["string"]
   }
}
```

# AwsDmssumber daya di ASFF
<a name="asff-resourcedetails-awsdms"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsDms` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsDmsEndpoint
<a name="asff-resourcedetails-awsdmsendpoint"></a>

`AwsDmsEndpoint`Objek memberikan informasi tentang titik akhir AWS Database Migration Service (AWS DMS). Endpoint menyediakan koneksi, tipe penyimpanan data, dan informasi lokasi tentang penyimpanan data Anda.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsDmsEndpoint` objek. Untuk melihat deskripsi `AwsDmsEndpoint` atribut, lihat [AwsDmsEndpointDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsDmsEndpointDeatils.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsDmsEndpoint": {
    "CertificateArn": "arn:aws:dms:us-east-1:123456789012:cert:EXAMPLEIGDURVZGVJQZDPWJ5A7F2YDJVSMTBWFI",
    "DatabaseName": "Test",
    "EndpointArn": "arn:aws:dms:us-east-1:123456789012:endpoint:EXAMPLEQB3CZY33F7XV253NAJVBNPK6MJQVFVQA",
    "EndpointIdentifier": "target-db",
    "EndpointType": "TARGET", 
    "EngineName": "mariadb",
    "KmsKeyId": "arn:aws:kms:us-east-1:123456789012:key/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
    "Port": 3306,
    "ServerName": "target-db.exampletafyu.us-east-1.rds.amazonaws.com",
    "SslMode": "verify-ca",
    "Username": "admin"
}
```

## AwsDmsReplicationInstance
<a name="asff-resourcedetails-awsdmsreplicationinstance"></a>

`AwsDmsReplicationInstance`Objek memberikan informasi tentang contoh replikasi AWS Database Migration Service (AWS DMS). DMS menggunakan instance replikasi untuk terhubung ke penyimpanan data sumber Anda, membaca data sumber, dan memformat data untuk konsumsi oleh penyimpanan data target.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsDmsReplicationInstance` objek. Untuk melihat deskripsi `AwsDmsReplicationInstance` atribut, lihat [AwsDmsReplicationInstanceDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsDmsReplicationInstanceDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsDmsReplicationInstance": {
    "AllocatedStorage": 50,
    "AutoMinorVersionUpgrade": true,
    "AvailabilityZone": "us-east-1b",
    "EngineVersion": "3.5.1",
    "KmsKeyId": "arn:aws:kms:us-east-1:123456789012:key/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
    "MultiAZ": false,
    "PreferredMaintenanceWindow": "wed:08:08-wed:08:38",
    "PubliclyAccessible": true,
    "ReplicationInstanceClass": "dms.c5.xlarge",
    "ReplicationInstanceIdentifier": "second-replication-instance",
    "ReplicationSubnetGroup": {
        "ReplicationSubnetGroupIdentifier": "default-vpc-2344f44f"
    },
    "VpcSecurityGroups": [
        {
            "VpcSecurityGroupId": "sg-003a34e205138138b"
        }
    ]
}
```

## AwsDmsReplicationTask
<a name="asff-resourcedetails-awsdmsreplicationtask"></a>

`AwsDmsReplicationTask`Objek memberikan informasi tentang tugas replikasi AWS Database Migration Service (AWS DMS). Tugas replikasi memindahkan sekumpulan data dari titik akhir sumber ke titik akhir target.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsDmsReplicationInstance` objek. Untuk melihat deskripsi `AwsDmsReplicationInstance` atribut, lihat [AwsDmsReplicationInstance](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsDmsReplicationTaskDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsDmsReplicationTask": {
    "CdcStartPosition": "2023-08-28T14:26:22",
    "Id": "arn:aws:dms:us-east-1:123456789012:task:YDYUOHZIXWKQSUCBMUCQCNY44SJW74VJNB5DFWQ",
    "MigrationType": "cdc",
    "ReplicationInstanceArn": "arn:aws:dms:us-east-1:123456789012:rep:T7V6RFDP23PYQWUL26N3PF5REKML4YOUGIMYJUI",
    "ReplicationTaskIdentifier": "test-task",
    "ReplicationTaskSettings": "{\"Logging\":{\"EnableLogging\":false,\"EnableLogContext\":false,\"LogComponents\":[{\"Severity\":\"LOGGER_SEVERITY_DEFAULT\",\"Id\":\"TRANSFORMATION\"},{\"Severity\":\"LOGGER_SEVERITY_DEFAULT\",\"Id\":\"SOURCE_UNLOAD\"},{\"Severity\":\"LOGGER_SEVERITY_DEFAULT\",\"Id\":\"IO\"},{\"Severity\":\"LOGGER_SEVERITY_DEFAULT\",\"Id\":\"TARGET_LOAD\"},{\"Severity\":\"LOGGER_SEVERITY_DEFAULT\",\"Id\":\"PERFORMANCE\"},{\"Severity\":\"LOGGER_SEVERITY_DEFAULT\",\"Id\":\"SOURCE_CAPTURE\"},{\"Severity\":\"LOGGER_SEVERITY_DEFAULT\",\"Id\":\"SORTER\"},{\"Severity\":\"LOGGER_SEVERITY_DEFAULT\",\"Id\":\"REST_SERVER\"},{\"Severity\":\"LOGGER_SEVERITY_DEFAULT\",\"Id\":\"VALIDATOR_EXT\"},{\"Severity\":\"LOGGER_SEVERITY_DEFAULT\",\"Id\":\"TARGET_APPLY\"},{\"Severity\":\"LOGGER_SEVERITY_DEFAULT\",\"Id\":\"TASK_MANAGER\"},{\"Severity\":\"LOGGER_SEVERITY_DEFAULT\",\"Id\":\"TABLES_MANAGER\"},{\"Severity\":\"LOGGER_SEVERITY_DEFAULT\",\"Id\":\"METADATA_MANAGER\"},{\"Severity\":\"LOGGER_SEVERITY_DEFAULT\",\"Id\":\"FILE_FACTORY\"},{\"Severity\":\"LOGGER_SEVERITY_DEFAULT\",\"Id\":\"COMMON\"},{\"Severity\":\"LOGGER_SEVERITY_DEFAULT\",\"Id\":\"ADDONS\"},{\"Severity\":\"LOGGER_SEVERITY_DEFAULT\",\"Id\":\"DATA_STRUCTURE\"},{\"Severity\":\"LOGGER_SEVERITY_DEFAULT\",\"Id\":\"COMMUNICATION\"},{\"Severity\":\"LOGGER_SEVERITY_DEFAULT\",\"Id\":\"FILE_TRANSFER\"}],\"CloudWatchLogGroup\":null,\"CloudWatchLogStream\":null},\"StreamBufferSettings\":{\"StreamBufferCount\":3,\"CtrlStreamBufferSizeInMB\":5,\"StreamBufferSizeInMB\":8},\"ErrorBehavior\":{\"FailOnNoTablesCaptured\":true,\"ApplyErrorUpdatePolicy\":\"LOG_ERROR\",\"FailOnTransactionConsistencyBreached\":false,\"RecoverableErrorThrottlingMax\":1800,\"DataErrorEscalationPolicy\":\"SUSPEND_TABLE\",\"ApplyErrorEscalationCount\":0,\"RecoverableErrorStopRetryAfterThrottlingMax\":true,\"RecoverableErrorThrottling\":true,\"ApplyErrorFailOnTruncationDdl\":false,\"DataTruncationErrorPolicy\":\"LOG_ERROR\",\"ApplyErrorInsertPolicy\":\"LOG_ERROR\",\"EventErrorPolicy\":\"IGNORE\",\"ApplyErrorEscalationPolicy\":\"LOG_ERROR\",\"RecoverableErrorCount\":-1,\"DataErrorEscalationCount\":0,\"TableErrorEscalationPolicy\":\"STOP_TASK\",\"RecoverableErrorInterval\":5,\"ApplyErrorDeletePolicy\":\"IGNORE_RECORD\",\"TableErrorEscalationCount\":0,\"FullLoadIgnoreConflicts\":true,\"DataErrorPolicy\":\"LOG_ERROR\",\"TableErrorPolicy\":\"SUSPEND_TABLE\"},\"TTSettings\":{\"TTS3Settings\":null,\"TTRecordSettings\":null,\"EnableTT\":false},\"FullLoadSettings\":{\"CommitRate\":10000,\"StopTaskCachedChangesApplied\":false,\"StopTaskCachedChangesNotApplied\":false,\"MaxFullLoadSubTasks\":8,\"TransactionConsistencyTimeout\":600,\"CreatePkAfterFullLoad\":false,\"TargetTablePrepMode\":\"DO_NOTHING\"},\"TargetMetadata\":{\"ParallelApplyBufferSize\":0,\"ParallelApplyQueuesPerThread\":0,\"ParallelApplyThreads\":0,\"TargetSchema\":\"\",\"InlineLobMaxSize\":0,\"ParallelLoadQueuesPerThread\":0,\"SupportLobs\":true,\"LobChunkSize\":64,\"TaskRecoveryTableEnabled\":false,\"ParallelLoadThreads\":0,\"LobMaxSize\":0,\"BatchApplyEnabled\":false,\"FullLobMode\":true,\"LimitedSizeLobMode\":false,\"LoadMaxFileSize\":0,\"ParallelLoadBufferSize\":0},\"BeforeImageSettings\":null,\"ControlTablesSettings\":{\"historyTimeslotInMinutes\":5,\"HistoryTimeslotInMinutes\":5,\"StatusTableEnabled\":false,\"SuspendedTablesTableEnabled\":false,\"HistoryTableEnabled\":false,\"ControlSchema\":\"\",\"FullLoadExceptionTableEnabled\":false},\"LoopbackPreventionSettings\":null,\"CharacterSetSettings\":null,\"FailTaskWhenCleanTaskResourceFailed\":false,\"ChangeProcessingTuning\":{\"StatementCacheSize\":50,\"CommitTimeout\":1,\"BatchApplyPreserveTransaction\":true,\"BatchApplyTimeoutMin\":1,\"BatchSplitSize\":0,\"BatchApplyTimeoutMax\":30,\"MinTransactionSize\":1000,\"MemoryKeepTime\":60,\"BatchApplyMemoryLimit\":500,\"MemoryLimitTotal\":1024},\"ChangeProcessingDdlHandlingPolicy\":{\"HandleSourceTableDropped\":true,\"HandleSourceTableTruncated\":true,\"HandleSourceTableAltered\":true},\"PostProcessingRules\":null}",
    "SourceEndpointArn": "arn:aws:dms:us-east-1:123456789012:endpoint:TZPWV2VCXEGHYOKVKRNHAKJ4Q3RUXACNGFGYWRI",
    "TableMappings": "{\"rules\":[{\"rule-type\":\"selection\",\"rule-id\":\"969761702\",\"rule-name\":\"969761702\",\"object-locator\":{\"schema-name\":\"%table\",\"table-name\":\"%example\"},\"rule-action\":\"exclude\",\"filters\":[]}]}",
    "TargetEndpointArn": "arn:aws:dms:us-east-1:123456789012:endpoint:ABR8LBOQB3CZY33F7XV253NAJVBNPK6MJQVFVQA"
}
```

# AwsDynamoDBsumber daya di ASFF
<a name="asff-resourcedetails-awsdynamodb"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsDynamoDB` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsDynamoDbTable
<a name="asff-resourcedetails-awsdynamodbtable"></a>

`AwsDynamoDbTable`Objek memberikan rincian tentang tabel Amazon DynamoDB.

Berikut ini adalah contoh `AwsDynamoDbTable` temuan dalam AWS Security Finding Format (ASFF). Untuk melihat deskripsi `AwsDynamoDbTable` atribut, lihat [AwsDynamoDbTableDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsDynamoDbTableDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsDynamoDbTable": {
    "AttributeDefinitions": [   
        {        
            "AttributeName": "attribute1",
            "AttributeType": "value 1"
        },
        {
            "AttributeName": "attribute2",
            "AttributeType": "value 2"
        },
        {
            "AttributeName": "attribute3",
            "AttributeType": "value 3"
        }
    ],
    "BillingModeSummary": {
        "BillingMode": "PAY_PER_REQUEST",
        "LastUpdateToPayPerRequestDateTime": "2019-12-03T15:23:10.323Z"
    },
    "CreationDateTime": "2019-12-03T15:23:10.248Z",
    "DeletionProtectionEnabled": true,
    "GlobalSecondaryIndexes": [
        {
            "Backfilling": false,
            "IndexArn": "arn:aws:dynamodb:us-west-2:111122223333:table/exampleTable/index/exampleIndex",                
            "IndexName": "standardsControlArnIndex",
            "IndexSizeBytes": 1862513,
            "IndexStatus": "ACTIVE",
            "ItemCount": 20,
            "KeySchema": [
                {
                    "AttributeName": "City",
                    "KeyType": "HASH"
                },     
                {
                    "AttributeName": "Date",
                    "KeyType": "RANGE"
                }
            ],      
            "Projection": {
                "NonKeyAttributes": ["predictorName"],
                "ProjectionType": "ALL"
            },     
            "ProvisionedThroughput": {
                "LastIncreaseDateTime": "2019-03-14T13:21:00.399Z",
                "LastDecreaseDateTime": "2019-03-14T12:47:35.193Z",
                "NumberOfDecreasesToday": 0,
                "ReadCapacityUnits": 100,
                "WriteCapacityUnits": 50
            },
        }
   ],
   "GlobalTableVersion": "V1",
   "ItemCount": 2705,
   "KeySchema": [
        {
            "AttributeName": "zipcode",
            "KeyType": "HASH"
        }
    ],
    "LatestStreamArn": "arn:aws:dynamodb:us-west-2:111122223333:table/exampleTable/stream/2019-12-03T23:23:10.248",
    "LatestStreamLabel": "2019-12-03T23:23:10.248",
    "LocalSecondaryIndexes": [
        {
            "IndexArn": "arn:aws:dynamodb:us-east-1:111122223333:table/exampleGroup/index/exampleId",
            "IndexName": "CITY_DATE_INDEX_NAME",
            "KeySchema": [
                {
                    "AttributeName": "zipcode",
                    "KeyType": "HASH"
                }
            ],
            "Projection": {
                "NonKeyAttributes": ["predictorName"],
                "ProjectionType": "ALL"
            },  
        }
    ],
    "ProvisionedThroughput": {
        "LastIncreaseDateTime": "2019-03-14T13:21:00.399Z",
        "LastDecreaseDateTime": "2019-03-14T12:47:35.193Z",
        "NumberOfDecreasesToday": 0,
        "ReadCapacityUnits": 100,
        "WriteCapacityUnits": 50
    },
    "Replicas": [
        {
            "GlobalSecondaryIndexes":[
                {
                    "IndexName": "CITY_DATE_INDEX_NAME", 
                    "ProvisionedThroughputOverride": {
                        "ReadCapacityUnits": 10
                    }
                }
            ],
            "KmsMasterKeyId" : "KmsKeyId"
            "ProvisionedThroughputOverride": {
                "ReadCapacityUnits": 10
            },
            "RegionName": "regionName",
            "ReplicaStatus": "CREATING",
            "ReplicaStatusDescription": "replicaStatusDescription"
        }
    ],
    "RestoreSummary" : {
        "SourceBackupArn": "arn:aws:dynamodb:us-west-2:111122223333:table/exampleTable/backup/backup1",
        "SourceTableArn": "arn:aws:dynamodb:us-west-2:111122223333:table/exampleTable",
        "RestoreDateTime": "2020-06-22T17:40:12.322Z",
        "RestoreInProgress": true
    },
    "SseDescription": {
        "InaccessibleEncryptionDateTime": "2018-01-26T23:50:05.000Z",
        "Status": "ENABLED",
        "SseType": "KMS",
        "KmsMasterKeyArn": "arn:aws:kms:us-east-1:111122223333:key/key1"
    },
    "StreamSpecification" : {
        "StreamEnabled": true,
        "StreamViewType": "NEW_IMAGE"
    },
    "TableId": "example-table-id-1",
    "TableName": "example-table",
    "TableSizeBytes": 1862513,
    "TableStatus": "ACTIVE"
}
```

# AwsEc2sumber daya di ASFF
<a name="asff-resourcedetails-awsec2"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsEc2` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsEc2ClientVpnEndpoint
<a name="asff-resourcedetails-awsec2clientvpnendpoint"></a>

`AwsEc2ClientVpnEndpoint`Objek memberikan informasi tentang AWS Client VPN titik akhir. Titik akhir Client VPN adalah sumber daya yang Anda buat dan konfigurasikan untuk mengaktifkan dan mengelola sesi VPN klien. Ini adalah titik terminasi untuk semua sesi VPN klien.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsEc2ClientVpnEndpoint` objek. Untuk melihat deskripsi `AwsEc2ClientVpnEndpoint` atribut, lihat [AwsEc2 ClientVpnEndpointDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsEc2ClientVpnEndpointDetails.html) di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsEc2ClientVpnEndpoint": {
    "AuthenticationOptions": [
        {
            "MutualAuthentication": {
                "ClientRootCertificateChainArn": "arn:aws:acm:us-east-1:123456789012:certificate/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111"
            },
            "Type": "certificate-authentication"
        }
    ],
    "ClientCidrBlock": "10.0.0.0/22",
    "ClientConnectOptions": {
        "Enabled": false
    },
    "ClientLoginBannerOptions": {
        "Enabled": false
    },
    "ClientVpnEndpointId": "cvpn-endpoint-00c5d11fc4729f2a5",
    "ConnectionLogOptions": {
        "Enabled": false
    },
    "Description": "test",
    "DnsServer": ["10.0.0.0"],
    "ServerCertificateArn": "arn:aws:acm:us-east-1:123456789012:certificate/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
    "SecurityGroupIdSet": [
        "sg-0f7a177b82b443691"
    ],
    "SelfServicePortalUrl": "https://self-service.clientvpn.amazonaws.com/endpoints/cvpn-endpoint-00c5d11fc4729f2a5",
    "SessionTimeoutHours": 24,
    "SplitTunnel": false,
    "TransportProtocol": "udp",
    "VpcId": "vpc-1a2b3c4d5e6f1a2b3",
    "VpnPort": 443
}
```

## AwsEc2Eip
<a name="asff-resourcedetails-awsec2eip"></a>

`AwsEc2Eip`Objek memberikan informasi tentang alamat IP Elastis.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsEc2Eip` objek. Untuk melihat deskripsi `AwsEc2Eip` atribut, lihat [AwsEc2 EipDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsEc2EipDetails.html) di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsEc2Eip": {
    "InstanceId": "instance1",
    "PublicIp": "192.0.2.04",
    "AllocationId": "eipalloc-example-id-1",
    "AssociationId": "eipassoc-example-id-1",
    "Domain": "vpc",
    "PublicIpv4Pool": "anycompany",
    "NetworkBorderGroup": "eu-central-1",
    "NetworkInterfaceId": "eni-example-id-1",
    "NetworkInterfaceOwnerId": "777788889999",
    "PrivateIpAddress": "192.0.2.03"
}
```

## AwsEc2Instance
<a name="asff-resourcedetails-awsec2instance"></a>

`AwsEc2Instance`Objek memberikan detail tentang instans Amazon EC2.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsEc2Instance` objek. Untuk melihat deskripsi `AwsEc2Instance` atribut, lihat [AwsEc2 InstanceDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsEc2InstanceDetails.html) di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsEc2Instance": { 
    "IamInstanceProfileArn": "arn:aws:iam::123456789012:instance-profile/AdminRole",
    "ImageId": "ami-1234",
    "IpV4Addresses": [ "1.1.1.1" ],
    "IpV6Addresses": [ "2001:db8:1234:1a2b::123" ],
    "KeyName": "my_keypair",
    "LaunchedAt": "2018-05-08T16:46:19.000Z",
    "MetadataOptions": {
    	"HttpEndpoint": "enabled",
    	"HttpProtocolIpv6": "enabled",
    	"HttpPutResponseHopLimit": 1,
    	"HttpTokens": "optional",
    	"InstanceMetadataTags": "disabled",
    },
    "Monitoring": {
    	"State": "disabled"
    },
    "NetworkInterfaces": [
      {
         "NetworkInterfaceId": "eni-e5aa89a3"
      }
    ],
    "SubnetId": "subnet-123",
    "Type": "i3.xlarge",
    "VpcId": "vpc-123"
}
```

## AwsEc2LaunchTemplate
<a name="asff-resourcedetails-awsec2launchtemplate"></a>

`AwsEc2LaunchTemplate`Objek berisi detail tentang template peluncuran Amazon Elastic Compute Cloud yang menentukan informasi konfigurasi instans.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsEc2LaunchTemplate` objek. Untuk melihat deskripsi `AwsEc2LaunchTemplate` atribut, lihat [AwsEc2 LaunchTemplateDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsEc2LaunchTemplateDetals.html) di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsEc2LaunchTemplate": {
    "DefaultVersionNumber": "1",
    "ElasticGpuSpecifications": ["string"],
    "ElasticInferenceAccelerators": ["string"],
    "Id": "lt-0a16e9802800bdd85",
    "ImageId": "ami-0d5eff06f840b45e9",
    "LatestVersionNumber": "1",
    "LaunchTemplateData": {
    	"BlockDeviceMappings": [{
    		"DeviceName": "/dev/xvda",
    		"Ebs": {
    			"DeleteonTermination": true,
    			"Encrypted": true,
    			"SnapshotId": "snap-01047646ec075f543",
    			"VolumeSize": 8,
    			"VolumeType:" "gp2"
    		}
    	}],
    	"MetadataOptions": {
    		"HttpTokens": "enabled",
    		"HttpPutResponseHopLimit" : 1
    	},
    	"Monitoring": {
    		"Enabled": true,
    	"NetworkInterfaces": [{
    		"AssociatePublicIpAddress" : true,
    	}],
    "LaunchTemplateName": "string",
    "LicenseSpecifications": ["string"],
    "SecurityGroupIds": ["sg-01fce87ad6e019725"],
    "SecurityGroups": ["string"],
    "TagSpecifications": ["string"]
}
```

## AwsEc2NetworkAcl
<a name="asff-resourcedetails-awsec2networkacl"></a>

`AwsEc2NetworkAcl`Objek berisi rincian tentang daftar kontrol akses jaringan Amazon EC2 (ACL).

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsEc2NetworkAcl` objek. Untuk melihat deskripsi `AwsEc2NetworkAcl` atribut, lihat [AwsEc2 NetworkAclDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsEc2NetworkAclDetails.html) di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsEc2NetworkAcl": {
    "IsDefault": false,
    "NetworkAclId": "acl-1234567890abcdef0",
    "OwnerId": "123456789012",
    "VpcId": "vpc-1234abcd",
    "Associations": [{
        "NetworkAclAssociationId": "aclassoc-abcd1234",
        "NetworkAclId": "acl-021345abcdef6789",
        "SubnetId": "subnet-abcd1234"
   }],
   "Entries": [{
        "CidrBlock": "10.24.34.0/23",
        "Egress": true,
        "IcmpTypeCode": {
            "Code": 10,
            "Type": 30
        },
        "Ipv6CidrBlock": "2001:DB8::/32",
        "PortRange": {
            "From": 20,
            "To": 40
        },
        "Protocol": "tcp",
        "RuleAction": "allow",
        "RuleNumber": 100
   }]
}
```

## AwsEc2NetworkInterface
<a name="asff-resourcedetails-awsec2networkinterface"></a>

`AwsEc2NetworkInterface`Objek menyediakan informasi tentang antarmuka jaringan Amazon EC2.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsEc2NetworkInterface` objek. Untuk melihat deskripsi `AwsEc2NetworkInterface` atribut, lihat [AwsEc2 NetworkInterfaceDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsEc2NetworkInterfaceDetails.html) di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsEc2NetworkInterface": {
    "Attachment": {
        "AttachTime": "2019-01-01T03:03:21Z",
        "AttachmentId": "eni-attach-43348162",
        "DeleteOnTermination": true,
        "DeviceIndex": 123,
        "InstanceId": "i-1234567890abcdef0",
        "InstanceOwnerId": "123456789012",
        "Status": 'ATTACHED'
    },
    "SecurityGroups": [
        {
            "GroupName": "my-security-group",
            "GroupId": "sg-903004f8"
        },
    ],
    "NetworkInterfaceId": 'eni-686ea200',
    "SourceDestCheck": false
}
```

## AwsEc2RouteTable
<a name="asff-resourcedetails-awsec2routetable"></a>

`AwsEc2RouteTable`Objek memberikan informasi tentang tabel rute Amazon EC2.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsEc2RouteTable` objek. Untuk melihat deskripsi `AwsEc2RouteTable` atribut, lihat [AwsEc2 RouteTableDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsEc2RouteTableDetails.html) di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsEc2RouteTable": {
    "AssociationSet": [{
    	"AssociationSet": {
    		"State": "associated"
    				},
    	"Main": true,
    	"RouteTableAssociationId": "rtbassoc-08e706c45de9f7512",
    	"RouteTableId": "rtb-0a59bde9cf2548e34",
    }],
    "PropogatingVgwSet": [],
    "RouteTableId": "rtb-0a59bde9cf2548e34",
    "RouteSet": [
    	{
    		"DestinationCidrBlock": "10.24.34.0/23",
    		"GatewayId": "local",
    		"Origin": "CreateRouteTable",
    		"State": "active"
    	},
    	{
    		"DestinationCidrBlock": "10.24.34.0/24",
    		"GatewayId": "igw-0242c2d7d513fc5d3",
    		"Origin": "CreateRoute",
    		"State": "active"
    	}
    ],
    "VpcId": "vpc-0c250a5c33f51d456"
}
```

## AwsEc2SecurityGroup
<a name="asff-resourcedetails-awsec2securitygroup"></a>

`AwsEc2SecurityGroup`Objek tersebut menggambarkan grup keamanan Amazon EC2.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsEc2SecurityGroup` objek. Untuk melihat deskripsi `AwsEc2SecurityGroup` atribut, lihat [AwsEc2 SecurityGroupDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsEc2SecurityGroupDetails.html) di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsEc2SecurityGroup": {
    "GroupName": "MySecurityGroup",
    "GroupId": "sg-903004f8",
    "OwnerId": "123456789012",
    "VpcId": "vpc-1a2b3c4d",
    "IpPermissions": [
        {
            "IpProtocol": "-1",
            "IpRanges": [],
            "UserIdGroupPairs": [
                {
                    "UserId": "123456789012",
                    "GroupId": "sg-903004f8"
                }
            ],
            "PrefixListIds": [
                {"PrefixListId": "pl-63a5400a"}
            ]
        },
        {
            "PrefixListIds": [],
            "FromPort": 22,
            "IpRanges": [
                {
                    "CidrIp": "203.0.113.0/24"
                }
            ],
            "ToPort": 22,
            "IpProtocol": "tcp",
            "UserIdGroupPairs": []
        }
    ]
}
```

## AwsEc2Subnet
<a name="asff-resourcedetails-awsec2subnet"></a>

`AwsEc2Subnet`Objek memberikan informasi tentang subnet di Amazon EC2.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsEc2Subnet` objek. Untuk melihat deskripsi `AwsEc2Subnet` atribut, lihat [AwsEc2 SubnetDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsEc2SubnetDetails.html) di *Referensi AWS Security Hub API*.

**Contoh**

```
AwsEc2Subnet: {
    "AssignIpv6AddressOnCreation": false,
    "AvailabilityZone": "us-west-2c",
    "AvailabilityZoneId": "usw2-az3",
    "AvailableIpAddressCount": 8185,
    "CidrBlock": "10.0.0.0/24",
    "DefaultForAz": false,
    "MapPublicIpOnLaunch": false,
    "OwnerId": "123456789012",
    "State": "available",
    "SubnetArn": "arn:aws:ec2:us-west-2:123456789012:subnet/subnet-d5436c93",
    "SubnetId": "subnet-d5436c93",
    "VpcId": "vpc-153ade70",
    "Ipv6CidrBlockAssociationSet": [{
        "AssociationId": "subnet-cidr-assoc-EXAMPLE",
        "Ipv6CidrBlock": "2001:DB8::/32",
        "CidrBlockState": "associated"
   }]
}
```

## AwsEc2TransitGateway
<a name="asff-resourcedetails-awsec2transitgateway"></a>

`AwsEc2TransitGateway`Objek ini memberikan detail tentang gateway transit Amazon EC2 yang menghubungkan cloud pribadi virtual (VPCs) dan jaringan lokal Anda.

Berikut ini adalah contoh `AwsEc2TransitGateway` temuan dalam AWS Security Finding Format (ASFF). Untuk melihat deskripsi `AwsEc2TransitGateway` atribut, lihat [AwsEc2 TransitGatewayDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsEc2TransitGatewayDetails.html) di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsEc2TransitGateway": {
	"AmazonSideAsn": 65000,
	"AssociationDefaultRouteTableId": "tgw-rtb-099ba47cbbea837cc",
	"AutoAcceptSharedAttachments": "disable",
	"DefaultRouteTableAssociation": "enable",
	"DefaultRouteTablePropagation": "enable",
	"Description": "sample transit gateway",
	"DnsSupport": "enable",
	"Id": "tgw-042ae6bf7a5c126c3",
	"MulticastSupport": "disable",
	"PropagationDefaultRouteTableId": "tgw-rtb-099ba47cbbea837cc",
	"TransitGatewayCidrBlocks": ["10.0.0.0/16"],
	"VpnEcmpSupport": "enable"
}
```

## AwsEc2Volume
<a name="asff-resourcedetails-awsec2volume"></a>

`AwsEc2Volume`Objek memberikan detail tentang volume Amazon EC2.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsEc2Volume` objek. Untuk melihat deskripsi `AwsEc2Volume` atribut, lihat [AwsEc2 VolumeDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsEc2VolumeDetails.html) di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsEc2Volume": {
    "Attachments": [
      {
        "AttachTime": "2017-10-17T14:47:11Z",
        "DeleteOnTermination": true,
        "InstanceId": "i-123abc456def789g",
        "Status": "attached"
      }
     ],
    "CreateTime": "2020-02-24T15:54:30Z",
    "Encrypted": true,
    "KmsKeyId": "arn:aws:kms:us-east-1:111122223333:key/wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY",
    "Size": 80,
    "SnapshotId": "",
    "Status": "available"
}
```

## AwsEc2Vpc
<a name="asff-resourcedetails-awsec2vpc"></a>

`AwsEc2Vpc`Objek tersebut memberikan detail tentang VPC Amazon EC2.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsEc2Vpc` objek. Untuk melihat deskripsi `AwsEc2Vpc` atribut, lihat [AwsEc2 VpcDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsEc2VpcDetails.html) di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsEc2Vpc": {
    "CidrBlockAssociationSet": [
        {
            "AssociationId": "vpc-cidr-assoc-0dc4c852f52abda97",
            "CidrBlock": "192.0.2.0/24",
            "CidrBlockState": "associated"
        }
    ],
    "DhcpOptionsId": "dopt-4e42ce28",
    "Ipv6CidrBlockAssociationSet": [
        {
            "AssociationId": "vpc-cidr-assoc-0dc4c852f52abda97",
            "CidrBlockState": "associated",
            "Ipv6CidrBlock": "192.0.2.0/24"
       }

    ],
    "State": "available"
}
```

## AwsEc2VpcEndpointService
<a name="asff-resourcedetails-awsec2vpcendpointservice"></a>

`AwsEc2VpcEndpointService`Objek berisi rincian tentang konfigurasi layanan untuk layanan titik akhir VPC.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsEc2VpcEndpointService` objek. Untuk melihat deskripsi `AwsEc2VpcEndpointService` atribut, lihat [AwsEc2 VpcEndpointServiceDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsEc2VpcEndpointServiceDetails.html) di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsEc2VpcEndpointService": {
    "ServiceType": [
      {
        "ServiceType": "Interface"
      }
    ],
    "ServiceId": "vpce-svc-example1",
    "ServiceName": "com.amazonaws.vpce.us-east-1.vpce-svc-example1",
    "ServiceState": "Available",
    "AvailabilityZones": [
      "us-east-1"
    ],
    "AcceptanceRequired": true,
    "ManagesVpcEndpoints": false,
    "NetworkLoadBalancerArns": [
      "arn:aws:elasticloadbalancing:us-east-1:444455556666:loadbalancer/net/my-network-load-balancer/example1"
    ],
    "GatewayLoadBalancerArns": [],
    "BaseEndpointDnsNames": [
      "vpce-svc-04eec859668b51c34.us-east-1.vpce.amazonaws.com"
    ],
    "PrivateDnsName": "my-private-dns"
}
```

## AwsEc2VpcPeeringConnection
<a name="asff-resourcedetails-awsec2vpcpeeringconnection"></a>

`AwsEc2VpcPeeringConnection`Objek memberikan rincian tentang koneksi jaringan antara dua VPCs.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsEc2VpcPeeringConnection` objek. Untuk melihat deskripsi `AwsEc2VpcPeeringConnection` atribut, lihat [AwsEc2 VpcPeeringConnectionDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsEc2VpcPeeringConnectionDetails.html) di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsEc2VpcPeeringConnection": { 
	"AccepterVpcInfo": {
		"CidrBlock": "10.0.0.0/28",
		"CidrBlockSet": [{
			"CidrBlock": "10.0.0.0/28"
		}],
		"Ipv6CidrBlockSet": [{
			"Ipv6CidrBlock": "2002::1234:abcd:ffff:c0a8:101/64"
		}],
		"OwnerId": "012345678910",
		"PeeringOptions": {
			"AllowDnsResolutionFromRemoteVpc": true,
			"AllowEgressFromLocalClassicLinkToRemoteVpc": false,
			"AllowEgressFromLocalVpcToRemoteClassicLink": true
		},
		"Region": "us-west-2",
		"VpcId": "vpc-i123456"
	},
	"ExpirationTime": "2022-02-18T15:31:53.161Z",
	"RequesterVpcInfo": {
		"CidrBlock": "192.168.0.0/28",
		"CidrBlockSet": [{
			"CidrBlock": "192.168.0.0/28"
		}],
		"Ipv6CidrBlockSet": [{
			"Ipv6CidrBlock": "2002::1234:abcd:ffff:c0a8:101/64"
		}],
		"OwnerId": "012345678910",
		"PeeringOptions": {
			"AllowDnsResolutionFromRemoteVpc": true,
			"AllowEgressFromLocalClassicLinkToRemoteVpc": false,
			"AllowEgressFromLocalVpcToRemoteClassicLink": true
		},
		"Region": "us-west-2",
		"VpcId": "vpc-i123456"
	},
	"Status": {
		"Code": "initiating-request",
		"Message": "Active"
	},
	"VpcPeeringConnectionId": "pcx-1a2b3c4d"
}
```

# AwsEcrsumber daya di ASFF
<a name="asff-resourcedetails-awsecr"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsEcr` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsEcrContainerImage
<a name="asff-resourcedetails-awsecrcontainerimage"></a>

`AwsEcrContainerImage`Objek memberikan informasi tentang gambar Amazon ECR.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsEcrContainerImage` objek. Untuk melihat deskripsi `AwsEcrContainerImage` atribut, lihat [AwsEcrContainerImageDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsEcrContainerImageDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsEcrContainerImage": {
    "RegistryId": "123456789012",
    "RepositoryName": "repository-name",
    "Architecture": "amd64"
    "ImageDigest": "sha256:a568e5c7a953fbeaa2904ac83401f93e4a076972dc1bae527832f5349cd2fb10",
    "ImageTags": ["00000000-0000-0000-0000-000000000000"],
    "ImagePublishedAt": "2019-10-01T20:06:12Z"
}
```

## AwsEcrRepository
<a name="asff-resourcedetails-awsecrrepository"></a>

`AwsEcrRepository`Objek memberikan informasi tentang repositori Amazon Elastic Container Registry.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsEcrRepository` objek. Untuk melihat deskripsi `AwsEcrRepository` atribut, lihat [AwsEcrRepositoryDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsEcrRepositoryDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsEcrRepository": {
    "LifecyclePolicy": {
        "RegistryId": "123456789012",
    },  
    "RepositoryName": "sample-repo",
    "Arn": "arn:aws:ecr:us-west-2:111122223333:repository/sample-repo",
    "ImageScanningConfiguration": {
        "ScanOnPush": true
    },
    "ImageTagMutability": "IMMUTABLE"
}
```

# AwsEcssumber daya di ASFF
<a name="asff-resourcedetails-awsecs"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsEcs` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsEcsCluster
<a name="asff-resourcedetails-awsecscluster"></a>

`AwsEcsCluster`Objek ini memberikan detail tentang kluster Amazon Elastic Container Service.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsEcsCluster` objek. Untuk melihat deskripsi `AwsEcsCluster` atribut, lihat [AwsEcsClusterDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsEcsClusterDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
    "AwsEcsCluster": {
        "CapacityProviders": [],
        "ClusterSettings": [
            {
                "Name": "containerInsights",
                "Value": "enabled"
            }
        ],
        "Configuration": {
            "ExecuteCommandConfiguration": {
                "KmsKeyId": "kmsKeyId",
                "LogConfiguration": {
                    "CloudWatchEncryptionEnabled": true,
                    "CloudWatchLogGroupName": "cloudWatchLogGroupName",
                    "S3BucketName": "s3BucketName",
                    "S3EncryptionEnabled": true,
                    "S3KeyPrefix": "s3KeyPrefix"
                },
                "Logging": "DEFAULT"
            }
        }
        "DefaultCapacityProviderStrategy": [
            {
                "Base": 0,
                "CapacityProvider": "capacityProvider",
                "Weight": 1
            }
        ]
    }
```

## AwsEcsContainer
<a name="asff-resourcedetails-awsecscontainer"></a>

`AwsEcsContainer`Objek berisi detail tentang wadah Amazon ECS.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsEcsContainer` objek. Untuk melihat deskripsi `AwsEcsContainer` atribut, lihat [AwsEcsContainerDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsEcsContainerDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsEcsContainer": {
    "Image": "1111111/knotejs@sha256:356131c9fef111111111111115f4ed8de5f9dce4dc3bd34bg21846588a3",
    "MountPoints": [{
        "ContainerPath": "/mnt/etc",
        "SourceVolume": "vol-03909e9"
    }],
    "Name": "knote",
    "Privileged": true 
}
```

## AwsEcsService
<a name="asff-resourcedetails-awsecsservice"></a>

`AwsEcsService`Objek memberikan rincian tentang layanan dalam cluster Amazon ECS.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsEcsService` objek. Untuk melihat deskripsi `AwsEcsService` atribut, lihat [AwsEcsServiceDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsEcsServiceDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsEcsService": {
    "CapacityProviderStrategy": [
        {
            "Base": 12,
            "CapacityProvider": "",
            "Weight": ""
        }
    ],
    "Cluster": "arn:aws:ecs:us-east-1:111122223333:cluster/example-ecs-cluster",
    "DeploymentConfiguration": {
        "DeploymentCircuitBreaker": {
            "Enable": false,
            "Rollback": false
        },
        "MaximumPercent": 200,
        "MinimumHealthyPercent": 100
    },
    "DeploymentController": "",
    "DesiredCount": 1,
    "EnableEcsManagedTags": false,
    "EnableExecuteCommand": false,
    "HealthCheckGracePeriodSeconds": 1,
    "LaunchType": "FARGATE",
    "LoadBalancers": [
        {
            "ContainerName": "",
            "ContainerPort": 23,
            "LoadBalancerName": "",
            "TargetGroupArn": ""
        }
    ],
    "Name": "sample-app-service",
    "NetworkConfiguration": {
        "AwsVpcConfiguration": {
            "Subnets": [
                "Subnet-example1",
                "Subnet-example2"
            ],
        "SecurityGroups": [
                "Sg-0ce48e9a6e5b457f5"
        ],
        "AssignPublicIp": "ENABLED"
        }
    },
    "PlacementConstraints": [
        {
            "Expression": "",
            "Type": ""
        }
    ],
    "PlacementStrategies": [
        {
            "Field": "",
            "Type": ""
        }
    ],
    "PlatformVersion": "LATEST",
    "PropagateTags": "",
    "Role": "arn:aws:iam::111122223333:role/aws-servicerole/ecs.amazonaws.com/ServiceRoleForECS",
    "SchedulingStrategy": "REPLICA",
    "ServiceName": "sample-app-service",
    "ServiceArn": "arn:aws:ecs:us-east-1:111122223333:service/example-ecs-cluster/sample-app-service",
    "ServiceRegistries": [
        {
            "ContainerName": "",
            "ContainerPort": 1212,
            "Port": 1221,
            "RegistryArn": ""
        }
    ],
    "TaskDefinition": "arn:aws:ecs:us-east-1:111122223333:task-definition/example-taskdef:1"
}
```

## AwsEcsTask
<a name="asff-resourcedetails-awsecstask"></a>

`AwsEcsTask`Objek memberikan detail tentang tugas Amazon ECS. 

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsEcsTask` objek. Untuk melihat deskripsi `AwsEcsTask` atribut, lihat [AwsEcsTask](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsEcsTaskDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsEcsTask": {
	"ClusterArn": "arn:aws:ecs:us-west-2:123456789012:task/MyCluster/1234567890123456789",
	"CreatedAt": "1557134011644",
	"Group": "service:fargate-service",
	"StartedAt": "1557134011644",
	"StartedBy": "ecs-svc/1234567890123456789",
	"TaskDefinitionArn": "arn:aws:ecs:us-west-2:123456789012:task-definition/sample-fargate:2",
	"Version": 3,
	"Volumes": [{
		"Name": "string",
		"Host": {
			"SourcePath": "string"
		}
	}],
	"Containers": {
		"Image": "1111111/knotejs@sha256:356131c9fef111111111111115f4ed8de5f9dce4dc3bd34bg21846588a3",
		"MountPoints": [{
			"ContainerPath": "/mnt/etc",
			"SourceVolume": "vol-03909e9"
		}],
		"Name": "knote",
		"Privileged": true
	}
}
```

## AwsEcsTaskDefinition
<a name="asff-resourcedetails-awsecstaskdefinition"></a>

`AwsEcsTaskDefinition`Objek berisi rincian tentang definisi tugas. Definisi tugas menjelaskan definisi kontainer dan volume tugas Amazon Elastic Container Service.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsEcsTaskDefinition` objek. Untuk melihat deskripsi `AwsEcsTaskDefinition` atribut, lihat [AwsEcsTaskDefinitionDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsEcsTaskDefinitionDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
    "AwsEcsTaskDefinition": {
        "ContainerDefinitions": [
            {
                "Command": ['ruby', 'hi.rb'],
                "Cpu":128,
                "Essential": true,
                "HealthCheck": {
                    "Command": ["CMD-SHELL", "curl -f http://localhost/ || exit 1"],
                    "Interval": 10,
                    "Retries": 3,
                    "StartPeriod": 5,
                    "Timeout": 20
                },
                "Image": "tongueroo/sinatra:latest",
                "Interactive": true,
                "Links": [],
                "LogConfiguration": {
                    "LogDriver": "awslogs",
                    "Options": {
                        "awslogs-group": "/ecs/sinatra-hi",
                        "awslogs-region": "ap-southeast-1",
                        "awslogs-stream-prefix": "ecs"
                    },
                    "SecretOptions": []
                    
                },
                "MemoryReservation": 128,
                "Name": "web",
                "PortMappings": [
                    {
                        "ContainerPort": 4567,
                        "HostPort":4567,
                        "Protocol": "tcp"
                    }
                ],
                "Privileged": true,
                "StartTimeout": 10,
                "StopTimeout": 100,
            }
        ],
        "Family": "sinatra-hi",
        "NetworkMode": "host",
        "RequiresCompatibilities": ["EC2"],
        "Status": "ACTIVE",
        "TaskRoleArn": "arn:aws:iam::111122223333:role/ecsTaskExecutionRole",
    }
```

# AwsEfssumber daya di ASFF
<a name="asff-resourcedetails-awsefs"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsEfs` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsEfsAccessPoint
<a name="asff-resourcedetails-awsefsaccesspoint"></a>

`AwsEfsAccessPoint`Objek memberikan detail tentang file yang disimpan di Amazon Elastic File System.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsEfsAccessPoint` objek. Untuk melihat deskripsi `AwsEfsAccessPoint` atribut, lihat [AwsEfsAccessPointDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsEfsAccessPointDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsEfsAccessPoint": { 
	"AccessPointId": "fsap-05c4c0e79ba0b118a",
	"Arn": "arn:aws:elasticfilesystem:us-east-1:863155670886:access-point/fsap-05c4c0e79ba0b118a",
	"ClientToken": "AccessPointCompliant-ASk06ZZSXsEp",
	"FileSystemId": "fs-0f8137f731cb32146",
	"PosixUser": {
		"Gid": "1000",
		"SecondaryGids": ["0", "4294967295"],
		"Uid": "1234"
	},
	"RootDirectory": {
		"CreationInfo": {
			"OwnerGid": "1000",
			"OwnerUid": "1234",
			"Permissions": "777"
		},
		"Path": "/tmp/example"
	}
}
```

# AwsEkssumber daya di ASFF
<a name="asff-resourcedetails-awseks"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsEks` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsEksCluster
<a name="asff-resourcedetails-awsekscluster"></a>

`AwsEksCluster`Objek tersebut memberikan detail tentang cluster Amazon EKS.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsEksCluster` objek. Untuk melihat deskripsi `AwsEksCluster` atribut, lihat [AwsEksClusterDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsEksClusterDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
{
  "AwsEksCluster": {
    "Name": "example",
    "Arn": "arn:aws:eks:us-west-2:222222222222:cluster/example",
    "CreatedAt": 1565804921.901,
    "Version": "1.12",
    "RoleArn": "arn:aws:iam::222222222222:role/example-cluster-ServiceRole-1XWBQWYSFRE2Q",
    "ResourcesVpcConfig": {
      "EndpointPublicAccess": false,
      "SubnetIds": [
        "subnet-021345abcdef6789",
        "subnet-abcdef01234567890",
        "subnet-1234567890abcdef0"
      ],
      "SecurityGroupIds": [
        "sg-abcdef01234567890"
      ]
    },
    "Logging": {
      "ClusterLogging": [
        {
          "Types": [
            "api",
            "audit",
            "authenticator",
            "controllerManager",
            "scheduler"
          ],
          "Enabled": true
        }
      ]
    },
    "Status": "CREATING",
    "CertificateAuthorityData": {},
  }
}
```

# AwsElasticBeanstalksumber daya di ASFF
<a name="asff-resourcedetails-awselasticbeanstalk"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsElasticBeanstalk` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsElasticBeanstalkEnvironment
<a name="asff-resourcedetails-awselasticbeanstalkenvironment"></a>

`AwsElasticBeanstalkEnvironment`Objek berisi rincian tentang AWS Elastic Beanstalk lingkungan.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsElasticBeanstalkEnvironment` objek. Untuk melihat deskripsi `AwsElasticBeanstalkEnvironment` atribut, lihat [AwsElasticBeanstalkEnvironmentDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsElasticBeanstalkEnvironmentDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsElasticBeanstalkEnvironment": {
    "ApplicationName": "MyApplication",
    "Cname": "myexampleapp-env.devo-2.elasticbeanstalk-internal.com",
    "DateCreated": "2021-04-30T01:38:01.090Z",
    "DateUpdated": "2021-04-30T01:38:01.090Z",
    "Description": "Example description of my awesome application",
    "EndpointUrl": "eb-dv-e-p-AWSEBLoa-abcdef01234567890-021345abcdef6789.us-east-1.elb.amazonaws.com",
    "EnvironmentArn": "arn:aws:elasticbeanstalk:us-east-1:123456789012:environment/MyApplication/myapplication-env",
    "EnvironmentId": "e-abcd1234",
    "EnvironmentLinks": [
        {
            "EnvironmentName": "myexampleapp-env",
            "LinkName": "myapplicationLink"
        }
    ],
    "EnvironmentName": "myapplication-env",
    "OptionSettings": [
        {
            "Namespace": "aws:elasticbeanstalk:command",
            "OptionName": "BatchSize",
            "Value": "100"
        },
        {
            "Namespace": "aws:elasticbeanstalk:command",
            "OptionName": "Timeout",
            "Value": "600"
        },
        {
            "Namespace": "aws:elasticbeanstalk:command",
            "OptionName": "BatchSizeType",
            "Value": "Percentage"
        },
        {
            "Namespace": "aws:elasticbeanstalk:command",
            "OptionName": "IgnoreHealthCheck",
            "Value": "false"
        },
        {
            "Namespace": "aws:elasticbeanstalk:application",
            "OptionName": "Application Healthcheck URL",
            "Value": "TCP:80"
        }
    ],
    "PlatformArn": "arn:aws:elasticbeanstalk:us-east-1::platform/Tomcat 8 with Java 8 running on 64bit Amazon Linux/2.7.7",
    "SolutionStackName": "64bit Amazon Linux 2017.09 v2.7.7 running Tomcat 8 Java 8",
    "Status": "Ready",
    "Tier": {
        "Name": "WebServer"
       "Type": "Standard"
       "Version": "1.0"
    },
    "VersionLabel": "Sample Application"
}
```

# AwsElasticSearchsumber daya di ASFF
<a name="asff-resourcedetails-awselasticsearch"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsElasticSearch` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsElasticSearchDomain
<a name="asff-resourcedetails-awselasticsearchdomain"></a>

`AwsElasticSearchDomain`Objek memberikan detail tentang domain OpenSearch Layanan Amazon.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsElasticSearchDomain` objek. Untuk melihat deskripsi `AwsElasticSearchDomain` atribut, lihat [AwsElasticSearchDomainDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsElasticsearchDomainDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsElasticSearchDomain": {
    "AccessPolicies": "string",
    "DomainStatus": {
           "DomainId": "string",
           "DomainName": "string",
           "Endpoint": "string",
           "Endpoints": {
                  "string": "string"
           }
    },
    "DomainEndpointOptions": {
           "EnforceHTTPS": boolean,
           "TLSSecurityPolicy": "string"
    },
    "ElasticsearchClusterConfig": {
           "DedicatedMasterCount": number,
           "DedicatedMasterEnabled": boolean,
           "DedicatedMasterType": "string",
           "InstanceCount": number,
           "InstanceType": "string",
           "ZoneAwarenessConfig": {
                  "AvailabilityZoneCount": number
           },
           "ZoneAwarenessEnabled": boolean
    },
    "ElasticsearchVersion": "string",
    "EncryptionAtRestOptions": {
           "Enabled": boolean,
           "KmsKeyId": "string"
    },
    "LogPublishingOptions": {
           "AuditLogs": {
                  "CloudWatchLogsLogGroupArn": "string",
                  "Enabled": boolean
           },
           "IndexSlowLogs": {
                  "CloudWatchLogsLogGroupArn": "string",
                  "Enabled": boolean
           },
           "SearchSlowLogs": {
                  "CloudWatchLogsLogGroupArn": "string",
                  "Enabled": boolean
           }
    },
    "NodeToNodeEncryptionOptions": {
           "Enabled": boolean
    },
    "ServiceSoftwareOptions": {
           "AutomatedUpdateDate": "string",
           "Cancellable": boolean,
           "CurrentVersion": "string",
           "Description": "string",
           "NewVersion": "string",
           "UpdateAvailable": boolean,
           "UpdateStatus": "string"
    },
    "VPCOptions": {
           "AvailabilityZones": [
                 "string"
           ],
           "SecurityGroupIds": [
                 "string"
           ],
           "SubnetIds": [
                 "string"
           ],
          "VPCId": "string"
    }
}
```

# AwsElbsumber daya di ASFF
<a name="asff-resourcedetails-awselb"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsElb` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsElbLoadBalancer
<a name="asff-resourcedetails-awselbloadbalancer"></a>

`AwsElbLoadBalancer`Objek berisi rincian tentang Classic Load Balancer.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsElbLoadBalancer` objek. Untuk melihat deskripsi `AwsElbLoadBalancer` atribut, lihat [AwsElbLoadBalancerDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsElbLoadBalancerDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsElbLoadBalancer": {
    "AvailabilityZones": ["us-west-2a"],
    "BackendServerDescriptions": [
         {
            "InstancePort": 80,
            "PolicyNames": ["doc-example-policy"]
        }
    ],
    "CanonicalHostedZoneName": "Z3DZXE0EXAMPLE",
    "CanonicalHostedZoneNameID": "my-load-balancer-444455556666.us-west-2.elb.amazonaws.com",
    "CreatedTime": "2020-08-03T19:22:44.637Z",
    "DnsName": "my-load-balancer-444455556666.us-west-2.elb.amazonaws.com",
    "HealthCheck": {
        "HealthyThreshold": 2,
        "Interval": 30,
        "Target": "HTTP:80/png",
        "Timeout": 3,
        "UnhealthyThreshold": 2
    },
    "Instances": [
        {
            "InstanceId": "i-example"
        }
    ],
    "ListenerDescriptions": [
        {
            "Listener": {
                "InstancePort": 443,
                "InstanceProtocol": "HTTPS",
                "LoadBalancerPort": 443,
                "Protocol": "HTTPS",
                "SslCertificateId": "arn:aws:iam::444455556666:server-certificate/my-server-cert"
            },
            "PolicyNames": ["ELBSecurityPolicy-TLS-1-2-2017-01"]
        }
    ],
    "LoadBalancerAttributes": {
        "AccessLog": {
            "EmitInterval": 60,
            "Enabled": true,
            "S3BucketName": "amzn-s3-demo-bucket",
            "S3BucketPrefix": "doc-example-prefix"
        },
        "ConnectionDraining": {
            "Enabled": false,
            "Timeout": 300
        },
        "ConnectionSettings": {
            "IdleTimeout": 30
        },
        "CrossZoneLoadBalancing": {
            "Enabled": true
        },
        "AdditionalAttributes": [{
            "Key": "elb.http.desyncmitigationmode",
            "Value": "strictest"
        }]

    },
    "LoadBalancerName": "example-load-balancer",
    "Policies": {
        "AppCookieStickinessPolicies": [
            {
                "CookieName": "",
                "PolicyName": ""
            }
        ],
        "LbCookieStickinessPolicies": [
            {
                "CookieExpirationPeriod": 60,
                "PolicyName": "my-example-cookie-policy"
            }
        ],
        "OtherPolicies": [
            "my-PublicKey-policy",
            "my-authentication-policy",
            "my-SSLNegotiation-policy",
            "my-ProxyProtocol-policy",
            "ELBSecurityPolicy-2015-03"
        ]
    },
    "Scheme": "internet-facing",
    "SecurityGroups": ["sg-example"],
    "SourceSecurityGroup": {
        "GroupName": "my-elb-example-group",
        "OwnerAlias": "444455556666"
    },
    "Subnets": ["subnet-example"],
    "VpcId": "vpc-a01106c2"
}
```

## AwsElbv2LoadBalancer
<a name="asff-resourcedetails-awselbv2loadbalancer"></a>

`AwsElbv2LoadBalancer`Objek memberikan informasi tentang penyeimbang beban.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsElbv2LoadBalancer` objek. Untuk melihat deskripsi `AwsElbv2LoadBalancer` atribut, lihat [AwsElbv2 LoadBalancerDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsElbv2LoadBalancerDetails.html) di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsElbv2LoadBalancer": {
                        "AvailabilityZones": {
                            "SubnetId": "string",
                            "ZoneName": "string"
                        },
                        "CanonicalHostedZoneId": "string",
                        "CreatedTime": "string",
                        "DNSName": "string",
                        "IpAddressType": "string",
                        "LoadBalancerAttributes": [
                            {
                                "Key": "string",
                                "Value": "string"
                            }
                        ],
                        "Scheme": "string",
                        "SecurityGroups": [ "string" ],
                        "State": {
                            "Code": "string",
                            "Reason": "string"
                        },
                        "Type": "string",
                        "VpcId": "string"
                    }
```

# AwsEventBridgesumber daya di ASFF
<a name="asff-resourcedetails-awsevent"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsEventBridge` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsEventSchemasRegistry
<a name="asff-resourcedetails-awseventschemasregistry"></a>

`AwsEventSchemasRegistry`Objek memberikan informasi tentang registri EventBridge skema Amazon. Skema mendefinisikan struktur peristiwa yang dikirim ke. EventBridge Registries skema adalah wadah yang mengumpulkan dan secara logis mengelompokkan skema Anda.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsEventSchemasRegistry` objek. Untuk melihat deskripsi `AwsEventSchemasRegistry` atribut, lihat [AwsEventSchemasRegistry](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsEventSchemasRegistryDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsEventSchemasRegistry": {
    "Description": "This is an example event schema registry.",
    "RegistryArn": "arn:aws:schemas:us-east-1:123456789012:registry/schema-registry",
    "RegistryName": "schema-registry"
}
```

## AwsEventsEndpoint
<a name="asff-resourcedetails-awseventsendpoint"></a>

`AwsEventsEndpoint`Objek memberikan informasi tentang titik akhir EventBridge global Amazon. Titik akhir dapat meningkatkan ketersediaan aplikasi Anda dengan membuatnya toleran terhadap kesalahan regional.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsEventsEndpoint` objek. Untuk melihat deskripsi `AwsEventsEndpoint` atribut, lihat [AwsEventsEndpointDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsEventsEndpointDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsEventsEndpoint": {
    "Arn": "arn:aws:events:us-east-1:123456789012:endpoint/my-endpoint",
    "Description": "This is a sample endpoint.",
    "EndpointId": "04k1exajoy.veo",
    "EndpointUrl": "https://04k1exajoy.veo.endpoint.events.amazonaws.com",
    "EventBuses": [
        {
            "EventBusArn": "arn:aws:events:us-east-1:123456789012:event-bus/default"
        },
        {
            "EventBusArn": "arn:aws:events:us-east-2:123456789012:event-bus/default"
        }
    ],
    "Name": "my-endpoint",
    "ReplicationConfig": {
        "State": "ENABLED"
    },
    "RoleArn": "arn:aws:iam::123456789012:role/service-role/Amazon_EventBridge_Invoke_Event_Bus_1258925394",
    "RoutingConfig": {
        "FailoverConfig": {
            "Primary": {
                "HealthCheck": "arn:aws:route53:::healthcheck/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111"
            },
            "Secondary": {
                "Route": "us-east-2"
            }
        }
    },
    "State": "ACTIVE"
}
```

## AwsEventsEventbus
<a name="asff-resourcedetails-awseventseventbus"></a>

`AwsEventsEventbus`Objek memberikan informasi tentang titik akhir EventBridge global Amazon. Titik akhir dapat meningkatkan ketersediaan aplikasi Anda dengan membuatnya toleran terhadap kesalahan regional.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsEventsEventbus` objek. Untuk melihat deskripsi `AwsEventsEventbus` atribut, lihat [AwsEventsEventbusDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsEventsEventbusDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsEventsEventbus": 
    "Arn": "arn:aws:events:us-east-1:123456789012:event-bus/my-event-bus",
    "Name": "my-event-bus",
    "Policy": "{\"Version\":\"2012-10-17\",		 	 	 \"Statement\":[{\"Sid\":\"AllowAllAccountsFromOrganizationToPutEvents\",\"Effect\":\"Allow\",\"Principal\":\"*\",\"Action\":\"events:PutEvents\",\"Resource\":\"arn:aws:events:us-east-1:123456789012:event-bus/my-event-bus\",\"Condition\":{\"StringEquals\":{\"aws:PrincipalOrgID\":\"o-ki7yjtkjv5\"}}},{\"Sid\":\"AllowAccountToManageRulesTheyCreated\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::123456789012:root\"},\"Action\":[\"events:PutRule\",\"events:PutTargets\",\"events:DeleteRule\",\"events:RemoveTargets\",\"events:DisableRule\",\"events:EnableRule\",\"events:TagResource\",\"events:UntagResource\",\"events:DescribeRule\",\"events:ListTargetsByRule\",\"events:ListTagsForResource\"],\"Resource\":\"arn:aws:events:us-east-1:123456789012:rule/my-event-bus\",\"Condition\":{\"StringEqualsIfExists\":{\"events:creatorAccount\":\"123456789012\"}}}]}"
```

# AwsGuardDutysumber daya di ASFF
<a name="asff-resourcedetails-awsguardduty"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsGuardDuty` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsGuardDutyDetector
<a name="asff-resourcedetails-awsguarddutydetector"></a>

`AwsGuardDutyDetector`Objek tersebut memberikan informasi tentang GuardDuty detektor Amazon. Detektor adalah objek yang mewakili GuardDuty layanan. Detektor diperlukan GuardDuty untuk menjadi operasional.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsGuardDutyDetector` objek. Untuk melihat deskripsi `AwsGuardDutyDetector` atribut, lihat [AwsGuardDutyDetector](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsGuardDutyDetectorDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsGuardDutyDetector": {
    "FindingPublishingFrequency": "SIX_HOURS",
    "ServiceRole": "arn:aws:iam::123456789012:role/aws-service-role/guardduty.amazonaws.com/AWSServiceRoleForAmazonGuardDuty",
    "Status": "ENABLED",
    "DataSources": {
        "CloudTrail": {
            "Status": "ENABLED"
        },
        "DnsLogs": {
            "Status": "ENABLED"
        },
        "FlowLogs": {
            "Status": "ENABLED"
        },
        "S3Logs": {
             "Status": "ENABLED"
         },
         "Kubernetes": {
             "AuditLogs": {
                "Status": "ENABLED"
             }
         },
         "MalwareProtection": {
             "ScanEc2InstanceWithFindings": {
                "EbsVolumes": {
                    "Status": "ENABLED"
                 }
             },
            "ServiceRole": "arn:aws:iam::123456789012:role/aws-service-role/malware-protection.guardduty.amazonaws.com/AWSServiceRoleForAmazonGuardDutyMalwareProtection"
         }
    }
}
```

# AwsIamsumber daya di ASFF
<a name="asff-resourcedetails-awsiam"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsIam` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsIamAccessKey
<a name="asff-resourcedetails-awsiamaccesskey"></a>

`AwsIamAccessKey`Objek berisi rincian tentang kunci akses IAM yang terkait dengan temuan.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsIamAccessKey` objek. Untuk melihat deskripsi `AwsIamAccessKey` atribut, lihat [AwsIamAccessKeyDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsIamAccessKeyDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsIamAccessKey": { 
                        "AccessKeyId": "string",
                        "AccountId": "string",
                        "CreatedAt": "string",
                        "PrincipalId": "string",
                        "PrincipalName": "string",
                        "PrincipalType": "string",
                        "SessionContext": {
                            "Attributes": {
                                "CreationDate": "string",
                                "MfaAuthenticated": boolean
                            },
                            "SessionIssuer": {
                                "AccountId": "string",
                                "Arn": "string",
                                "PrincipalId": "string",
                                "Type": "string",
                                "UserName": "string"
                            }
                        },
                        "Status": "string"
                    }
```

## AwsIamGroup
<a name="asff-resourcedetails-awsiamgroup"></a>

`AwsIamGroup`Objek berisi rincian tentang grup IAM.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsIamGroup` objek. Untuk melihat deskripsi `AwsIamGroup` atribut, lihat [AwsIamGroupDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsIamGroupDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsIamGroup": {
    "AttachedManagedPolicies": [
        {
            "PolicyArn": "arn:aws:iam::aws:policy/ExampleManagedAccess",
            "PolicyName": "ExampleManagedAccess",
        }
    ],
    "CreateDate": "2020-04-28T14:08:37.000Z",
    "GroupId": "AGPA4TPS3VLP7QEXAMPLE",
    "GroupName": "Example_User_Group",
    "GroupPolicyList": [
        {
            "PolicyName": "ExampleGroupPolicy"
        }
    ],
    "Path": "/"
}
```

## AwsIamPolicy
<a name="asff-resourcedetails-awsiampolicy"></a>

`AwsIamPolicy`Objek mewakili kebijakan izin IAM.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsIamPolicy` objek. Untuk melihat deskripsi `AwsIamPolicy` atribut, lihat [AwsIamPolicyDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsIamPolicyDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsIamPolicy": {
    "AttachmentCount": 1,
    "CreateDate": "2017-09-14T08:17:29.000Z",
    "DefaultVersionId": "v1",
    "Description": "Example IAM policy",
    "IsAttachable": true,
    "Path": "/",
    "PermissionsBoundaryUsageCount": 5,
    "PolicyId": "ANPAJ2UCCR6DPCEXAMPLE",
    "PolicyName": "EXAMPLE-MANAGED-POLICY",
    "PolicyVersionList": [
        {
            "VersionId": "v1",
            "IsDefaultVersion": true,
            "CreateDate": "2017-09-14T08:17:29.000Z"
        }
    ],
    "UpdateDate": "2017-09-14T08:17:29.000Z"
}
```

## AwsIamRole
<a name="asff-resourcedetails-awsiamrole"></a>

`AwsIamRole`Objek berisi informasi tentang peran IAM, termasuk semua kebijakan peran.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsIamRole` objek. Untuk melihat deskripsi `AwsIamRole` atribut, lihat [AwsIamRoleDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsIamRoleDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsIamRole": {
    "AssumeRolePolicyDocument": "{'Version': '2012-10-17',		 	 	 'Statement': [{'Effect': 'Allow','Action': 'sts:AssumeRole'}]}",
    "AttachedManagedPolicies": [
        {
            "PolicyArn": "arn:aws:iam::aws:policy/ExamplePolicy1",
            "PolicyName": "Example policy 1"
        },
        {
            "PolicyArn": "arn:aws:iam::444455556666:policy/ExamplePolicy2",
            "PolicyName": "Example policy 2"
        }
        ],
        "CreateDate": "2020-03-14T07:19:14.000Z",
        "InstanceProfileList": [
            {
                "Arn": "arn:aws:iam::333333333333:ExampleProfile",
                "CreateDate": "2020-03-11T00:02:27Z",
                "InstanceProfileId": "AIPAIXEU4NUHUPEXAMPLE",
                "InstanceProfileName": "ExampleInstanceProfile",
                "Path": "/",
                "Roles": [
                    {
                       "Arn": "arn:aws:iam::444455556666:role/example-role",
                        "AssumeRolePolicyDocument": "",
                        "CreateDate": "2020-03-11T00:02:27Z",
                        "Path": "/",
                        "RoleId": "AROAJ52OTH4H7LEXAMPLE",
                        "RoleName": "example-role",
                    }
                ]
            }
        ],
        "MaxSessionDuration": 3600,
        "Path": "/",
        "PermissionsBoundary": {
            "PermissionsBoundaryArn": "arn:aws:iam::aws:policy/AdministratorAccess",
            "PermissionsBoundaryType": "PermissionsBoundaryPolicy"
        },
        "RoleId": "AROA4TPS3VLEXAMPLE",
        "RoleName": "BONESBootstrapHydra-OverbridgeOpsFunctionsLambda",
        "RolePolicyList": [
            {
                "PolicyName": "Example role policy"
            }
        ]
    }
```

## AwsIamUser
<a name="asff-resourcedetails-awsiamuser"></a>

`AwsIamUser`Objek memberikan informasi tentang pengguna.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsIamUser` objek. Untuk melihat deskripsi `AwsIamUser` atribut, lihat [AwsIamUserDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsIamUserDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsIamUser": {
    "AttachedManagedPolicies": [
        {
            "PolicyName": "ExamplePolicy",
            "PolicyArn": "arn:aws:iam::aws:policy/ExampleAccess"
        }
    ],
    "CreateDate": "2018-01-26T23:50:05.000Z",
    "GroupList": [],
    "Path": "/",
    "PermissionsBoundary" : {
        "PermissionsBoundaryArn" : "arn:aws:iam::aws:policy/AdministratorAccess",
        "PermissionsBoundaryType" : "PermissionsBoundaryPolicy"
    },
    "UserId": "AIDACKCEVSQ6C2EXAMPLE",
    "UserName": "ExampleUser",
    "UserPolicyList": [
        {
            "PolicyName": "InstancePolicy"
        }
    ]
}
```

# AwsKinesissumber daya di ASFF
<a name="asff-resourcedetails-awskinesis"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsKinesis` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsKinesisStream
<a name="asff-resourcedetails-awskinesisstream"></a>

`AwsKinesisStream`Objek ini memberikan detail tentang Amazon Kinesis Data Streams.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsKinesisStream` objek. Untuk melihat deskripsi `AwsKinesisStream` atribut, lihat [AwsKinesisStreamDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsKinesisStreamDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsKinesisStream": { 
	"Name": "test-vir-kinesis-stream",
	"Arn": "arn:aws:kinesis:us-east-1:293279581038:stream/test-vir-kinesis-stream",
	"RetentionPeriodHours": 24,
	"ShardCount": 2,
	"StreamEncryption": {
		"EncryptionType": "KMS",
		"KeyId": "arn:aws:kms:us-east-1:293279581038:key/849cf029-4143-4c59-91f8-ea76007247eb"
	}
}
```

# AwsKmssumber daya di ASFF
<a name="asff-resourcedetails-awskms"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsKms` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsKmsKey
<a name="asff-resourcedetails-awskmskey"></a>

`AwsKmsKey`Objek memberikan rincian tentang file AWS KMS key.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsKmsKey` objek. Untuk melihat deskripsi `AwsKmsKey` atribut, lihat [AwsKmsKeyDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsKmsKeyDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsKmsKey": {
                        "AWSAccountId": "string",
                        "CreationDate": "string",
                        "Description": "string",
                        "KeyId": "string",
                        "KeyManager": "string",
                        "KeyRotationStatus": boolean,
                        "KeyState": "string",
                        "Origin": "string"
                    }
```

# AwsLambda
<a name="asff-resourcedetails-awslambda"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsLambda` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsLambdaFunction
<a name="asff-resourcedetails-awslambdafunction"></a>

`AwsLambdaFunction`Objek memberikan rincian tentang konfigurasi fungsi Lambda.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsLambdaFunction` objek. Untuk melihat deskripsi `AwsLambdaFunction` atribut, lihat [AwsLambdaFunctionDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsLambdaFunctionDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsLambdaFunction": {
    "Architectures": [
        "x86_64"
    ],
    "Code": {
        "S3Bucket": "amzn-s3-demo-bucket",
        "S3Key": "samplekey",
        "S3ObjectVersion": "2",
        "ZipFile": "myzip.zip"
    },
    "CodeSha256": "1111111111111abcdef",
    "DeadLetterConfig": {
        "TargetArn": "arn:aws:lambda:us-east-2:123456789012:queue:myqueue:2"
    },
    "Environment": {
        "Variables": {
            "Stage": "foobar"
         },
        "Error": {
            "ErrorCode": "Sample-error-code",
            "Message": "Caller principal is a manager."
         }
     },
    "FunctionName": "CheckOut",
    "Handler": "main.py:lambda_handler",
    "KmsKeyArn": "arn:aws:kms:us-west-2:123456789012:key/mykey",
    "LastModified": "2001-09-11T09:00:00Z",
    "Layers": {
        "Arn": "arn:aws:lambda:us-east-2:123456789012:layer:my-layer:3",
        "CodeSize": 169
    },
    "PackageType": "Zip",
    "RevisionId": "23",
    "Role": "arn:aws:iam::123456789012:role/Accounting-Role",
    "Runtime": "go1.7",
    "Timeout": 15,
    "TracingConfig": {
        "Mode": "Active"
    },
    "Version": "$LATEST$",
    "VpcConfig": {
        "SecurityGroupIds": ["sg-085912345678492fb", "sg-08591234567bdgdc"],
         "SubnetIds": ["subnet-071f712345678e7c8", "subnet-07fd123456788a036"]
    },
    "MasterArn": "arn:aws:lambda:us-east-2:123456789012:\$LATEST",
    "MemorySize": 2048
}
```

## AwsLambdaLayerVersion
<a name="asff-resourcedetails-awslambdalayerversion"></a>

`AwsLambdaLayerVersion`Objek memberikan rincian tentang versi lapisan Lambda.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsLambdaLayerVersion` objek. Untuk melihat deskripsi `AwsLambdaLayerVersion` atribut, lihat [AwsLambdaLayerVersionDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsLambdaLayerVersionDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsLambdaLayerVersion": {
    "Version": 2,
    "CompatibleRuntimes": [
        "java8"
    ],
    "CreatedDate": "2019-10-09T22:02:00.274+0000"
}
```

# AwsMsksumber daya di ASFF
<a name="asff-resourcedetails-awsmsk"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsMsk` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsMskCluster
<a name="asff-resourcedetails-awsmskcluster"></a>

`AwsMskCluster`Objek tersebut memberikan informasi tentang cluster Amazon Managed Streaming for Apache Kafka (Amazon MSK).

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsMskCluster` objek. Untuk melihat deskripsi `AwsMskCluster` atribut, lihat [AwsMskClusterDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsMskClusterDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsMskCluster": {
        "ClusterInfo": {
            "ClientAuthentication": {
                "Sasl": {
                    "Scram": {
                        "Enabled": true
                    },
                    "Iam": {
                        "Enabled": true
                    }
                },
                "Tls": {
                    "CertificateAuthorityArnList": [],
                    "Enabled": false
                },
                "Unauthenticated": {
                    "Enabled": false
                }
            },
            "ClusterName": "my-cluster",
            "CurrentVersion": "K2PWKAKR8XB7XF",
            "EncryptionInfo": {
                "EncryptionAtRest": {
                    "DataVolumeKMSKeyId": "arn:aws:kms:us-east-1:123456789012:key/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111"
                },
                "EncryptionInTransit": {
                    "ClientBroker": "TLS",
                    "InCluster": true
                }
            },
            "EnhancedMonitoring": "PER_TOPIC_PER_BROKER",
            "NumberOfBrokerNodes": 3
        }
}
```

# AwsNetworkFirewallsumber daya di ASFF
<a name="asff-resourcedetails-awsnetworkfirewall"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsNetworkFirewall` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsNetworkFirewallFirewall
<a name="asff-resourcedetails-awsnetworkfirewallfirewall"></a>

`AwsNetworkFirewallFirewall`Objek berisi rincian tentang AWS Network Firewall firewall.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsNetworkFirewallFirewall` objek. Untuk melihat deskripsi `AwsNetworkFirewallFirewall` atribut, lihat [AwsNetworkFirewallFirewallDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsNetworkFirewallFirewallDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsNetworkFirewallFirewall": {
    "DeleteProtection": false,
    "FirewallArn": "arn:aws:network-firewall:us-east-1:024665936331:firewall/testfirewall", 
    "FirewallPolicyArn": "arn:aws:network-firewall:us-east-1:444455556666:firewall-policy/InitialFirewall",
    "FirewallId": "dea7d8e9-ae38-4a8a-b022-672a830a99fa",
    "FirewallName": "testfirewall",
    "FirewallPolicyChangeProtection": false,
    "SubnetChangeProtection": false,
    "SubnetMappings": [
        {
            "SubnetId": "subnet-0183481095e588cdc"
        },
        {
            "SubnetId": "subnet-01f518fad1b1c90b0"
        }
    ],
    "VpcId": "vpc-40e83c38"
}
```

## AwsNetworkFirewallFirewallPolicy
<a name="asff-resourcedetails-awsnetworkfirewallfirewallpolicy"></a>

`AwsNetworkFirewallFirewallPolicy`Objek memberikan rincian tentang kebijakan firewall. Kebijakan firewall mendefinisikan perilaku firewall jaringan.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsNetworkFirewallFirewallPolicy` objek. Untuk melihat deskripsi `AwsNetworkFirewallFirewallPolicy` atribut, lihat [AwsNetworkFirewallFirewallPolicyDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsNetworkFirewallFirewallPolicyDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsNetworkFirewallFirewallPolicy": {
   "FirewallPolicy": {  
    "StatefulRuleGroupReferences": [
        {
            "ResourceArn": "arn:aws:network-firewall:us-east-1:444455556666:stateful-rulegroup/PatchesOnly"
        }
    ],
    "StatelessDefaultActions": [ "aws:forward_to_sfe" ],
    "StatelessFragmentDefaultActions": [ "aws:forward_to_sfe" ],
    "StatelessRuleGroupReferences": [
       {
          "Priority": 1,
          "ResourceArn": "arn:aws:network-firewall:us-east-1:444455556666:stateless-rulegroup/Stateless-1"
       }
     ]
   },
   "FirewallPolicyArn": "arn:aws:network-firewall:us-east-1:444455556666:firewall-policy/InitialFirewall",
   "FirewallPolicyId": "9ceeda22-6050-4048-a0ca-50ce47f0cc65",
   "FirewallPolicyName": "InitialFirewall",
   "Description": "Initial firewall"
}
```

## AwsNetworkFirewallRuleGroup
<a name="asff-resourcedetails-awsnetworkfirewallrulegroup"></a>

`AwsNetworkFirewallRuleGroup`Objek memberikan rincian tentang kelompok AWS Network Firewall aturan. Kelompok aturan digunakan untuk memeriksa dan mengontrol lalu lintas jaringan. Kelompok aturan stateless berlaku untuk paket individu. Kelompok aturan stateful berlaku untuk paket dalam konteks arus lalu lintas mereka.

Grup aturan direferensikan dalam kebijakan firewall.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsNetworkFirewallRuleGroup` objek. Untuk melihat deskripsi `AwsNetworkFirewallRuleGroup` atribut, lihat [AwsNetworkFirewallRuleGroupDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsNetworkFirewallRuleGroupDetails.html)di *Referensi AWS Security Hub API*.

**Contoh - kelompok aturan tanpa kewarganegaraan**

```
"AwsNetworkFirewallRuleGroup": {
    "Capacity": 600,
    "RuleGroupArn": "arn:aws:network-firewall:us-east-1:444455556666:stateless-rulegroup/Stateless-1",
    "RuleGroupId": "fb13c4df-b6da-4c1e-91ec-84b7a5487493",
    "RuleGroupName": "Stateless-1"
    "Description": "Example of a stateless rule group",
    "Type": "STATELESS",
    "RuleGroup": {
        "RulesSource": {
            "StatelessRulesAndCustomActions": {
                "CustomActions": [],
                "StatelessRules": [
                    {
                        "Priority": 1,
                        "RuleDefinition": {
                            "Actions": [
                                "aws:pass"
                            ],
                            "MatchAttributes": {
                                "DestinationPorts": [
                                    {
                                        "FromPort": 443,
                                        "ToPort": 443
                                    }
                                ],
                                "Destinations": [
                                    {
                                        "AddressDefinition": "192.0.2.0/24"
                                    }
                                ],
                                "Protocols": [
                                            6
                                ],
                                "SourcePorts": [
                                    {
                                        "FromPort": 0,
                                        "ToPort": 65535
                                    }
                                ],
                                "Sources": [
                                    {
                                         "AddressDefinition": "198.51.100.0/24"
                                    }
                                ]
                            }
                        }
                    }
                ]
            }
        }
    }
}
```

**Contoh - kelompok aturan stateful**

```
"AwsNetworkFirewallRuleGroup": {
    "Capacity": 100,
    "RuleGroupArn": "arn:aws:network-firewall:us-east-1:444455556666:stateful-rulegroup/tupletest",
    "RuleGroupId": "38b71c12-da80-4643-a6c5-03337f8933e0",
    "RuleGroupName": "ExampleRuleGroup",
    "Description": "Example of a stateful rule group",
    "Type": "STATEFUL",
    "RuleGroup": {
        "RuleSource": {
             "StatefulRules": [
                 {
                     "Action": "PASS",
                     "Header": {
                         "Destination": "Any",
                         "DestinationPort": "443",
                         "Direction": "ANY",
                         "Protocol": "TCP",
                         "Source": "Any",
                         "SourcePort": "Any"
                     },
                     "RuleOptions": [
                         {
                            "Keyword": "sid:1"
                         }
                     ]      
                 }
             ]
         }
    }
}
```

Berikut ini adalah daftar contoh nilai yang valid untuk `AwsNetworkFirewallRuleGroup` atribut:
+ `Action`

  Nilai yang valid: `PASS` \$1 `DROP` \$1 `ALERT`
+ `Protocol`

  Nilai yang valid: `IP` `TCP` \$1 `UDP` \$1 `ICMP` \$1 `HTTP` \$1 `FTP` \$1 `TLS` `SMB` \$1 `DNS` \$1 `DCERPC` \$1 `SSH` \$1 `SMTP` \$1 `IMAP` \$1 `MSN` \$1 `KRB5` \$1 `IKEV2` \$1 `TFTP` \$1 `NTP` \$1 `DHCP`
+ `Flags`

  Nilai yang valid: `FIN` `SYN` \$1 `RST` \$1 `PSH` \$1 `ACK` \$1 `URG` \$1 `ECE` \$1 `CWR`
+ `Masks`

  Nilai yang valid: `FIN` `SYN` \$1 `RST` \$1 `PSH` \$1 `ACK` \$1 `URG` \$1 `ECE` \$1 `CWR`

# AwsOpenSearchServicesumber daya di ASFF
<a name="asff-resourcedetails-awsopensearchservice"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsOpenSearchService` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsOpenSearchServiceDomain
<a name="asff-resourcedetails-awsopensearchservicedomain"></a>

`AwsOpenSearchServiceDomain`Objek berisi informasi tentang domain OpenSearch Layanan Amazon.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsOpenSearchServiceDomain` objek. Untuk melihat deskripsi `AwsOpenSearchServiceDomain` atribut, lihat [AwsOpenSearchServiceDomainDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsOpenSearchServiceDomainDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsOpenSearchServiceDomain": {
    "AccessPolicies": "IAM_Id",
    "AdvancedSecurityOptions": {
        "Enabled": true,
        "InternalUserDatabaseEnabled": true,
        "MasterUserOptions": {
            "MasterUserArn": "arn:aws:iam::123456789012:user/third-master-use",
            "MasterUserName": "third-master-use",
            "MasterUserPassword": "some-password"
        }
    },
    "Arn": "arn:aws:Opensearch:us-east-1:111122223333:somedomain",
    "ClusterConfig": {
        "InstanceType": "c5.large.search",
        "InstanceCount": 1,
        "DedicatedMasterEnabled": true,
        "ZoneAwarenessEnabled": false,
        "ZoneAwarenessConfig": {
            "AvailabilityZoneCount": 2
        },
        "DedicatedMasterType": "c5.large.search",
        "DedicatedMasterCount": 3,
        "WarmEnabled": true,
        "WarmCount": 3,
        "WarmType": "ultrawarm1.large.search"
    },
    "DomainEndpoint": "https://es-2021-06-23t17-04-qowmgghud5vofgb5e4wmi.eu-central-1.es.amazonaws.com",
    "DomainEndpointOptions": {
        "EnforceHTTPS": false,
        "TLSSecurityPolicy": "Policy-Min-TLS-1-0-2019-07",
        "CustomEndpointCertificateArn": "arn:aws:acm:us-east-1:111122223333:certificate/bda1bff1-79c0-49d0-abe6-50a15a7477d4",
        "CustomEndpointEnabled": true,
        "CustomEndpoint": "example.com"
    },
    "DomainEndpoints": {
        "vpc": "vpc-endpoint-h2dsd34efgyghrtguk5gt6j2foh4.us-east-1.es.amazonaws.com"
    },
    "DomainName": "my-domain",
    "EncryptionAtRestOptions": {
        "Enabled": false,
        "KmsKeyId": "1a2a3a4-1a2a-3a4a-5a6a-1a2a3a4a5a6a"
    },
    "EngineVersion": "7.1",
    "Id": "123456789012",
    "LogPublishingOptions": {
        "IndexSlowLogs": {
            "CloudWatchLogsLogGroupArn": "arn:aws:logs:us-east-1:111122223333:log-group:/aws/aes/domains/es-index-slow-logs",
            "Enabled": true
        },
        "SearchSlowLogs": {
            "CloudWatchLogsLogGroupArn": "arn:aws:logs:us-east-1:111122223333:log-group:/aws/aes/domains/es-slow-logs",
            "Enabled": true
        },
        "AuditLogs": {
            "CloudWatchLogsLogGroupArn": "arn:aws:logs:us-east-1:111122223333:log-group:/aws/aes/domains/es-slow-logs",
            "Enabled": true
        }
    },
    "NodeToNodeEncryptionOptions": {
        "Enabled": true
    },
    "ServiceSoftwareOptions": {
        "AutomatedUpdateDate": "2022-04-28T14:08:37.000Z",
        "Cancellable": false,
        "CurrentVersion": "R20210331",
        "Description": "There is no software update available for this domain.",
        "NewVersion": "OpenSearch_1.0",
        "UpdateAvailable": false,
        "UpdateStatus": "COMPLETED",
        "OptionalDeployment": false
    },
    "VpcOptions": {
        "SecurityGroupIds": [
            "sg-2a3a4a5a"
        ],
        "SubnetIds": [
            "subnet-1a2a3a4a"
        ],
    }
}
```

# AwsRdssumber daya di ASFF
<a name="asff-resourcedetails-awsrds"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsRds` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsRdsDbCluster
<a name="asff-resourcedetails-awsrdsdbcluster"></a>

`AwsRdsDbCluster`Objek memberikan rincian tentang cluster database Amazon RDS.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsRdsDbCluster` objek. Untuk melihat deskripsi `AwsRdsDbCluster` atribut, lihat [AwsRdsDbClusterDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsRdsDbClusterDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsRdsDbCluster": {
    "ActivityStreamStatus": "stopped",
    "AllocatedStorage": 1,
    "AssociatedRoles": [
        {
        "RoleArn": "arn:aws:iam::777788889999:role/aws-service-role/rds.amazonaws.com/AWSServiceRoleForRDS",
        "Status": "PENDING"
        }
    ],
    "AutoMinorVersionUpgrade": true,
    "AvailabilityZones": [
        "us-east-1a",
        "us-east-1c",
        "us-east-1e"
    ],
    "BackupRetentionPeriod": 1,
    "ClusterCreateTime": "2020-06-22T17:40:12.322Z",
    "CopyTagsToSnapshot": true,
    "CrossAccountClone": false,
    "CustomEndpoints": [],
    "DatabaseName": "Sample name",
    "DbClusterIdentifier": "database-3",
    "DbClusterMembers": [
        {
        "DbClusterParameterGroupStatus": "in-sync",
        "DbInstanceIdentifier": "database-3-instance-1",
        "IsClusterWriter": true,
        "PromotionTier": 1,
        }
    ],
    "DbClusterOptionGroupMemberships": [],
    "DbClusterParameterGroup": "cluster-parameter-group",
    "DbClusterResourceId": "cluster-example",
    "DbSubnetGroup": "subnet-group",
    "DeletionProtection": false,
    "DomainMemberships": [],
    "Status": "modifying",
    "EnabledCloudwatchLogsExports": [
        "audit",
        "error",
        "general",
        "slowquery"
    ],
    "Endpoint": "database-3.cluster-example.us-east-1.rds.amazonaws.com",
    "Engine": "aurora-mysql",
    "EngineMode": "provisioned",
    "EngineVersion": "5.7.mysql_aurora.2.03.4",
    "HostedZoneId": "ZONE1",
    "HttpEndpointEnabled": false,
    "IamDatabaseAuthenticationEnabled": false,
    "KmsKeyId": "arn:aws:kms:us-east-1:777788889999:key/key1",
    "MasterUsername": "admin",
    "MultiAz": false,
    "Port": 3306,
    "PreferredBackupWindow": "04:52-05:22",
    "PreferredMaintenanceWindow": "sun:09:32-sun:10:02",
    "ReaderEndpoint": "database-3.cluster-ro-example.us-east-1.rds.amazonaws.com",
    "ReadReplicaIdentifiers": [],
    "Status": "Modifying",
    "StorageEncrypted": true,
    "VpcSecurityGroups": [
        {
            "Status": "active",
            "VpcSecurityGroupId": "sg-example-1"
        }
    ],
}
```

## AwsRdsDbClusterSnapshot
<a name="asff-resourcedetails-awsrdsdbclustersnapshot"></a>

`AwsRdsDbClusterSnapshot`Objek berisi informasi tentang snapshot cluster Amazon RDS DB.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsRdsDbClusterSnapshot` objek. Untuk melihat deskripsi `AwsRdsDbClusterSnapshot` atribut, lihat [AwsRdsDbClusterSnapshotDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsRdsDbClusterSnapshotDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsRdsDbClusterSnapshot": {
    "AllocatedStorage": 0,
    "AvailabilityZones": [
        "us-east-1a",
        "us-east-1d",
        "us-east-1e"
    ],
    "ClusterCreateTime": "2020-06-12T13:23:15.577Z",
    "DbClusterIdentifier": "database-2",
    "DbClusterSnapshotAttributes": [{
        "AttributeName": "restore",
        "AttributeValues": ["123456789012"]
    }],
    "DbClusterSnapshotIdentifier": "rds:database-2-2020-06-23-03-52",
    "Engine": "aurora",
    "EngineVersion": "5.6.10a",
    "IamDatabaseAuthenticationEnabled": false,
    "KmsKeyId": "arn:aws:kms:us-east-1:777788889999:key/key1",
    "LicenseModel": "aurora",
    "MasterUsername": "admin",
    "PercentProgress": 100,
    "Port": 0,
    "SnapshotCreateTime": "2020-06-22T17:40:12.322Z",
    "SnapshotType": "automated",
    "Status": "available",
    "StorageEncrypted": true,
    "VpcId": "vpc-faf7e380"
}
```

## AwsRdsDbInstance
<a name="asff-resourcedetails-awsrdsdbinstance"></a>

`AwsRdsDbInstance`Objek memberikan detail tentang instans Amazon RDS DB.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsRdsDbInstance` objek. Untuk melihat deskripsi `AwsRdsDbInstance` atribut, lihat [AwsRdsDbInstanceDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsRdsDbInstanceDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsRdsDbInstance": {
    "AllocatedStorage": 20,
    "AssociatedRoles": [],
    "AutoMinorVersionUpgrade": true,
    "AvailabilityZone": "us-east-1d",
    "BackupRetentionPeriod": 7,
    "CaCertificateIdentifier": "certificate1",
    "CharacterSetName": "",
    "CopyTagsToSnapshot": true,
    "DbClusterIdentifier": "",
    "DbInstanceArn": "arn:aws:rds:us-east-1:111122223333:db:database-1",
    "DbInstanceClass": "db.t2.micro",
    "DbInstanceIdentifier": "database-1",
    "DbInstancePort": 0,
    "DbInstanceStatus": "available",
    "DbiResourceId": "db-EXAMPLE123",
    "DbName": "",
    "DbParameterGroups": [
        {
            "DbParameterGroupName": "default.mysql5.7",
            "ParameterApplyStatus": "in-sync"
        }
    ],
    "DbSecurityGroups": [],                                                                                                                                                                                                 
    "DbSubnetGroup": {
        "DbSubnetGroupName": "my-group-123abc",
        "DbSubnetGroupDescription": "My subnet group",
        "VpcId": "vpc-example1",
        "SubnetGroupStatus": "Complete",
        "Subnets": [
            {
                "SubnetIdentifier": "subnet-123abc",
                "SubnetAvailabilityZone": {
                    "Name": "us-east-1d"
                },
                "SubnetStatus": "Active"
            },
            {
                "SubnetIdentifier": "subnet-456def",
                "SubnetAvailabilityZone": {
                    "Name": "us-east-1c"
                },
                "SubnetStatus": "Active"
            }
      ],
        "DbSubnetGroupArn": ""
    },
    "DeletionProtection": false,
    "DomainMemberships": [],
    "EnabledCloudWatchLogsExports": [],
    "Endpoint": {
        "address": "database-1.example.us-east-1.rds.amazonaws.com",
        "port": 3306,
        "hostedZoneId": "ZONEID1"
    },
    "Engine": "mysql",
    "EngineVersion": "5.7.22",
    "EnhancedMonitoringResourceArn": "arn:aws:logs:us-east-1:111122223333:log-group:Example:log-stream:db-EXAMPLE1",
    "IamDatabaseAuthenticationEnabled": false,
    "InstanceCreateTime": "2020-06-22T17:40:12.322Z",
    "Iops": "",
    "KmsKeyId": "",
    "LatestRestorableTime": "2020-06-24T05:50:00.000Z",
    "LicenseModel": "general-public-license",
    "ListenerEndpoint": "",
    "MasterUsername": "admin",
    "MaxAllocatedStorage": 1000,
    "MonitoringInterval": 60,
    "MonitoringRoleArn": "arn:aws:iam::111122223333:role/rds-monitoring-role",
    "MultiAz": false,
    "OptionGroupMemberships": [
        {
            "OptionGroupName": "default:mysql-5-7",
            "Status": "in-sync"
        }
    ],
    "PreferredBackupWindow": "03:57-04:27",
    "PreferredMaintenanceWindow": "thu:10:13-thu:10:43",
    "PendingModifiedValues": {
        "DbInstanceClass": "",
        "AllocatedStorage": "",
        "MasterUserPassword": "",
        "Port": "",
        "BackupRetentionPeriod": "",
        "MultiAZ": "",
        "EngineVersion": "",
        "LicenseModel": "",
        "Iops": "",
        "DbInstanceIdentifier": "",
        "StorageType": "",
        "CaCertificateIdentifier": "",
        "DbSubnetGroupName": "",
        "PendingCloudWatchLogsExports": "",
        "ProcessorFeatures": []
    },
    "PerformanceInsightsEnabled": false,
    "PerformanceInsightsKmsKeyId": "",
    "PerformanceInsightsRetentionPeriod": "",
    "ProcessorFeatures": [],
    "PromotionTier": "",
    "PubliclyAccessible": false,
    "ReadReplicaDBClusterIdentifiers": [],
    "ReadReplicaDBInstanceIdentifiers": [],
    "ReadReplicaSourceDBInstanceIdentifier": "",
    "SecondaryAvailabilityZone": "",
    "StatusInfos": [],
    "StorageEncrypted": false,
    "StorageType": "gp2",
    "TdeCredentialArn": "",
    "Timezone": "",
    "VpcSecurityGroups": [
        {
            "VpcSecurityGroupId": "sg-example1",
            "Status": "active"
        }
    ]
}
```

## AwsRdsDbSecurityGroup
<a name="asff-resourcedetails-awsrdsdbsecuritygroup"></a>

`AwsRdsDbSecurityGroup`Objek berisi informasi tentang Amazon Relational Database Service

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsRdsDbSecurityGroup` objek. Untuk melihat deskripsi `AwsRdsDbSecurityGroup` atribut, lihat [AwsRdsDbSecurityGroupDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsRdsDbSecurityGroupDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsRdsDbSecurityGroup": {
    "DbSecurityGroupArn": "arn:aws:rds:us-west-1:111122223333:secgrp:default",
    "DbSecurityGroupDescription": "default",
    "DbSecurityGroupName": "mysecgroup",
    "Ec2SecurityGroups": [
        {
          "Ec2SecurityGroupuId": "myec2group",
          "Ec2SecurityGroupName": "default",
          "Ec2SecurityGroupOwnerId": "987654321021",
          "Status": "authorizing"
        }
    ],
    "IpRanges": [
        {
          "Cidrip": "0.0.0.0/0",
          "Status": "authorizing"
        }
    ],
    "OwnerId": "123456789012",
    "VpcId": "vpc-1234567f"
}
```

## AwsRdsDbSnapshot
<a name="asff-resourcedetails-awsrdsdbsnapshot"></a>

`AwsRdsDbSnapshot`Objek berisi detail tentang snapshot cluster Amazon RDS DB.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsRdsDbSnapshot` objek. Untuk melihat deskripsi `AwsRdsDbSnapshot` atribut, lihat [AwsRdsDbSnapshotDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsRdsDbSnapshotDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsRdsDbSnapshot": {
    "DbSnapshotIdentifier": "rds:database-1-2020-06-22-17-41",
    "DbInstanceIdentifier": "database-1",
    "SnapshotCreateTime": "2020-06-22T17:41:29.967Z",
    "Engine": "mysql",
    "AllocatedStorage": 20,
    "Status": "available",
    "Port": 3306,
    "AvailabilityZone": "us-east-1d",
    "VpcId": "vpc-example1",
    "InstanceCreateTime": "2020-06-22T17:40:12.322Z",
    "MasterUsername": "admin",
    "EngineVersion": "5.7.22",
    "LicenseModel": "general-public-license",
    "SnapshotType": "automated",
    "Iops": null,
    "OptionGroupName": "default:mysql-5-7",
    "PercentProgress": 100,
    "SourceRegion": null,
    "SourceDbSnapshotIdentifier": "",
    "StorageType": "gp2",
    "TdeCredentialArn": "",
    "Encrypted": false,
    "KmsKeyId": "",
    "Timezone": "",
    "IamDatabaseAuthenticationEnabled": false,
    "ProcessorFeatures": [],
    "DbiResourceId": "db-resourceexample1"
}
```

## AwsRdsEventSubscription
<a name="asff-resourcedetails-awsrdseventsubscription"></a>

`AwsRdsEventSubscription`Berisi rincian tentang langganan pemberitahuan acara RDS. Langganan memungkinkan RDS untuk memposting acara ke topik SNS.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsRdsEventSubscription` objek. Untuk melihat deskripsi `AwsRdsEventSubscription` atribut, lihat [AwsRdsEventSubscriptionDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsRdsEventSubscriptionDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsRdsEventSubscription": {
    "CustSubscriptionId": "myawsuser-secgrp",
    "CustomerAwsId": "111111111111",
    "Enabled": true,
    "EventCategoriesList": [
        "configuration change",
        "failure"
    ],
    "EventSubscriptionArn": "arn:aws:rds:us-east-1:111111111111:es:my-instance-events",
    "SnsTopicArn": "arn:aws:sns:us-east-1:111111111111:myawsuser-RDS",
    "SourceIdsList": [
        "si-sample",
        "mysqldb-rr"
    ],
    "SourceType": "db-security-group",
    "Status": "creating",
    "SubscriptionCreationTime": "2021-06-27T01:38:01.090Z"
}
```

# AwsRedshiftsumber daya di ASFF
<a name="asff-resourcedetails-awsredshift"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsRedshift` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsRedshiftCluster
<a name="asff-resourcedetails-awsredshiftcluster"></a>

`AwsRedshiftCluster`Objek berisi detail tentang cluster Amazon Redshift.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsRedshiftCluster` objek. Untuk melihat deskripsi `AwsRedshiftCluster` atribut, lihat [AwsRedshiftClusterDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsRedshiftClusterDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsRedshiftCluster": {
    "AllowVersionUpgrade": true,
    "AutomatedSnapshotRetentionPeriod": 1,
    "AvailabilityZone": "us-west-2d",
    "ClusterAvailabilityStatus": "Unavailable",
    "ClusterCreateTime": "2020-08-03T19:22:44.637Z",
    "ClusterIdentifier": "redshift-cluster-1",
    "ClusterNodes": [
        {
            "NodeRole": "LEADER",
            "PrivateIPAddress": "192.0.2.108",
            "PublicIPAddress": "198.51.100.29"
        },
        {
            "NodeRole": "COMPUTE-0",
            "PrivateIPAddress": "192.0.2.22",
            "PublicIPAddress": "198.51.100.63"
        },
        {
             "NodeRole": "COMPUTE-1",
             "PrivateIPAddress": "192.0.2.224",
             "PublicIPAddress": "198.51.100.226"
        }
        ],
    "ClusterParameterGroups": [
        { 
            "ClusterParameterStatusList": [
                {
                    "ParameterName": "max_concurrency_scaling_clusters",
                    "ParameterApplyStatus": "in-sync",
                    "ParameterApplyErrorDescription": "parameterApplyErrorDescription"
                },
                {
                    "ParameterName": "enable_user_activity_logging",
                    "ParameterApplyStatus": "in-sync",
                    "ParameterApplyErrorDescription": "parameterApplyErrorDescription"
                },
                {
                    "ParameterName": "auto_analyze",
                    "ParameterApplyStatus": "in-sync",
                    "ParameterApplyErrorDescription": "parameterApplyErrorDescription"
                },
                {
                    "ParameterName": "query_group",
                    "ParameterApplyStatus": "in-sync",
                    "ParameterApplyErrorDescription": "parameterApplyErrorDescription"
                },
                {
                    "ParameterName": "datestyle",
                    "ParameterApplyStatus": "in-sync",
                    "ParameterApplyErrorDescription": "parameterApplyErrorDescription"
                },
                {
                    "ParameterName": "extra_float_digits",
                    "ParameterApplyStatus": "in-sync",
                    "ParameterApplyErrorDescription": "parameterApplyErrorDescription"
                },
                {
                    "ParameterName": "search_path",
                    "ParameterApplyStatus": "in-sync",
                    "ParameterApplyErrorDescription": "parameterApplyErrorDescription"
                },
                {
                    "ParameterName": "statement_timeout",
                    "ParameterApplyStatus": "in-sync",
                    "ParameterApplyErrorDescription": "parameterApplyErrorDescription"
                },
                {
                    "ParameterName": "wlm_json_configuration",
                    "ParameterApplyStatus": "in-sync",
                    "ParameterApplyErrorDescription": "parameterApplyErrorDescription"
                },
                {
                    "ParameterName": "require_ssl",
                    "ParameterApplyStatus": "in-sync",
                    "ParameterApplyErrorDescription": "parameterApplyErrorDescription"
                },
                {
                    "ParameterName": "use_fips_ssl",
                    "ParameterApplyStatus": "in-sync",
                    "ParameterApplyErrorDescription": "parameterApplyErrorDescription"
                }
            ],
            "ParameterApplyStatus": "in-sync",
            "ParameterGroupName": "temp"
        }
    ], 
    "ClusterPublicKey": "JalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY Amazon-Redshift",
    "ClusterRevisionNumber": 17498,
    "ClusterSecurityGroups": [
        {
            "ClusterSecurityGroupName": "default",
            "Status": "active"
        }
    ],
    "ClusterSnapshotCopyStatus": {
        "DestinationRegion": "us-west-2",
        "ManualSnapshotRetentionPeriod": -1,
        "RetentionPeriod": 1,
        "SnapshotCopyGrantName": "snapshotCopyGrantName"
    },
    "ClusterStatus": "available",
    "ClusterSubnetGroupName": "default",
    "ClusterVersion": "1.0",
    "DBName": "dev",
    "DeferredMaintenanceWindows": [
        {
            "DeferMaintenanceEndTime": "2020-10-07T20:34:01.000Z",
            "DeferMaintenanceIdentifier": "deferMaintenanceIdentifier",
            "DeferMaintenanceStartTime": "2020-09-07T20:34:01.000Z"
        }
     ],
    "ElasticIpStatus": {
        "ElasticIp": "203.0.113.29",
        "Status": "active"
    },
    "ElasticResizeNumberOfNodeOptions": "4",  
    "Encrypted": false,
    "Endpoint": {
        "Address": "redshift-cluster-1.example.us-west-2.redshift.amazonaws.com",
        "Port": 5439
    },
    "EnhancedVpcRouting": false,
    "ExpectedNextSnapshotScheduleTime": "2020-10-13T20:34:01.000Z",
    "ExpectedNextSnapshotScheduleTimeStatus": "OnTrack",
    "HsmStatus": {
        "HsmClientCertificateIdentifier": "hsmClientCertificateIdentifier",
        "HsmConfigurationIdentifier": "hsmConfigurationIdentifier",
        "Status": "applying"
    },
    "IamRoles": [
        {
             "ApplyStatus": "in-sync",
             "IamRoleArn": "arn:aws:iam::111122223333:role/RedshiftCopyUnload"   
        }
    ],
    "KmsKeyId": "kmsKeyId",
    "LoggingStatus": {
        "BucketName": "amzn-s3-demo-bucket",
        "LastFailureMessage": "test message",
        "LastFailureTime": "2020-08-09T13:00:00.000Z",
        "LastSuccessfulDeliveryTime": "2020-08-08T13:00:00.000Z",
        "LoggingEnabled": true,
        "S3KeyPrefix": "/"
    },
    "MaintenanceTrackName": "current",
    "ManualSnapshotRetentionPeriod": -1,
    "MasterUsername": "awsuser",
    "NextMaintenanceWindowStartTime": "2020-08-09T13:00:00.000Z",
    "NodeType": "dc2.large",
    "NumberOfNodes": 2,
    "PendingActions": [],
    "PendingModifiedValues": {
        "AutomatedSnapshotRetentionPeriod": 0,
        "ClusterIdentifier": "clusterIdentifier",
        "ClusterType": "clusterType",
        "ClusterVersion": "clusterVersion",
        "EncryptionType": "None",
        "EnhancedVpcRouting": false,
        "MaintenanceTrackName": "maintenanceTrackName",
        "MasterUserPassword": "masterUserPassword",
        "NodeType": "dc2.large",
        "NumberOfNodes": 1,
        "PubliclyAccessible": true
    },
    "PreferredMaintenanceWindow": "sun:13:00-sun:13:30",
    "PubliclyAccessible": true,
    "ResizeInfo": {
        "AllowCancelResize": true,
        "ResizeType": "ClassicResize"
    },
    "RestoreStatus": {
        "CurrentRestoreRateInMegaBytesPerSecond": 15,
        "ElapsedTimeInSeconds": 120,
        "EstimatedTimeToCompletionInSeconds": 100,
        "ProgressInMegaBytes": 10,
        "SnapshotSizeInMegaBytes": 1500,
        "Status": "restoring"
    },
    "SnapshotScheduleIdentifier": "snapshotScheduleIdentifier",
    "SnapshotScheduleState": "ACTIVE",
     "VpcId": "vpc-example",
    "VpcSecurityGroups": [
        {
            "Status": "active",
            "VpcSecurityGroupId": "sg-example"
        }
    ]
}
```

# AwsRoute53sumber daya di ASFF
<a name="asff-resourcedetails-awsroute53"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsRoute53` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsRoute53HostedZone
<a name="asff-resourcedetails-awsroute53hostedzone"></a>

`AwsRoute53HostedZone`Objek memberikan informasi tentang zona yang dihosting Amazon Route 53, termasuk empat server nama yang ditetapkan ke zona yang dihosting. Zona yang dihosting mewakili kumpulan catatan yang dapat dikelola bersama, milik nama domain induk tunggal.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsRoute53HostedZone` objek. Untuk melihat deskripsi `AwsRoute53HostedZone` atribut, lihat [AwsRoute53 HostedZoneDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsRoute53HostedZoneDetails.html) di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsRoute53HostedZone": {
    "HostedZone": {
        "Id": "Z06419652JEMGO9TA2XKL",
        "Name": "asff.testing",
        "Config": {
            "Comment": "This is an example comment."
        }
    },
    "NameServers": [
        "ns-470.awsdns-32.net",
        "ns-1220.awsdns-12.org",
        "ns-205.awsdns-13.com",
        "ns-1960.awsdns-51.co.uk"
    ],
    "QueryLoggingConfig": {
        "CloudWatchLogsLogGroupArn": {
            "CloudWatchLogsLogGroupArn": "arn:aws:logs:us-east-1:123456789012:log-group:asfftesting:*",
            "Id": "a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
            "HostedZoneId": "Z00932193AF5H180PPNZD"
        }
    },
    "Vpcs": [
        {
            "Id": "vpc-05d7c6e36bc03ea76",
            "Region": "us-east-1"
        }
    ]
}
```

# AwsS3sumber daya di ASFF
<a name="asff-resourcedetails-awss3"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsS3` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsS3AccessPoint
<a name="asff-resourcedetails-awss3accesspoint"></a>

`AwsS3AccessPoint`memberikan informasi tentang jalur akses Amazon S3. Titik akses S3 diberi nama titik akhir jaringan yang dilampirkan ke bucket S3 yang dapat Anda gunakan untuk melakukan operasi objek S3.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsS3AccessPoint` objek. *Untuk melihat deskripsi `AwsS3AccessPoint` atribut, lihat [AWSS3 AccessPointDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsS3AccessPointDetails.html) di Referensi API.AWS Security Hub *

**Contoh**

```
"AwsS3AccessPoint": {
        "AccessPointArn": "arn:aws:s3:us-east-1:123456789012:accesspoint/asff-access-point",
        "Alias": "asff-access-point-hrzrlukc5m36ft7okagglf3gmwluquse1b-s3alias",
        "Bucket": "amzn-s3-demo-bucket",
        "BucketAccountId": "123456789012",
        "Name": "asff-access-point",
        "NetworkOrigin": "VPC",
        "PublicAccessBlockConfiguration": {
            "BlockPublicAcls": true,
            "BlockPublicPolicy": true,
            "IgnorePublicAcls": true,
            "RestrictPublicBuckets": true
        },
        "VpcConfiguration": {
            "VpcId": "vpc-1a2b3c4d5e6f1a2b3"
        }
}
```

## AwsS3AccountPublicAccessBlock
<a name="asff-resourcedetails-awss3accountpublicaccessblock"></a>

`AwsS3AccountPublicAccessBlock`memberikan informasi tentang konfigurasi Blok Akses Publik Amazon S3 untuk akun.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsS3AccountPublicAccessBlock` objek. *Untuk melihat deskripsi `AwsS3AccountPublicAccessBlock` atribut, lihat [AWSS3 AccountPublicAccessBlockDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsS3AccountPublicAccessBlockDetails.html) di Referensi API.AWS Security Hub *

**Contoh**

```
"AwsS3AccountPublicAccessBlock": {
    "BlockPublicAcls": true,
    "BlockPublicPolicy": true,
    "IgnorePublicAcls": false,
    "RestrictPublicBuckets": true
}
```

## AwsS3Bucket
<a name="asff-resourcedetails-awss3bucket"></a>

`AwsS3Bucket`Objek tersebut memberikan detail tentang bucket Amazon S3.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsS3Bucket` objek. *Untuk melihat deskripsi `AwsS3Bucket` atribut, lihat [AWSS3 BucketDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsS3BucketDetails.html) di Referensi API.AWS Security Hub *

**Contoh**

```
"AwsS3Bucket": {
    "AccessControlList": "{\"grantSet\":null,\"grantList\":[{\"grantee\":{\"id\":\"4df55416215956920d9d056aa8b99803a294ea221222bb668b55a8c6bca81094\",\"displayName\":null},\"permission\":\"FullControl\"},{\"grantee\":\"AllUsers\",\"permission\":\"ReadAcp\"},{\"grantee\":\"AuthenticatedUsers\",\"permission\":\"ReadAcp\"}",,
    "BucketLifecycleConfiguration": {
       "Rules": [
           {
               "AbortIncompleteMultipartUpload": {
                   "DaysAfterInitiation": 5
               },
               "ExpirationDate": "2021-11-10T00:00:00.000Z",
               "ExpirationInDays": 365,
               "ExpiredObjectDeleteMarker": false,
               "Filter": {
                   "Predicate": {
                       "Operands": [
                           {
                               "Prefix": "tmp/",
                               "Type": "LifecyclePrefixPredicate"
                           },
                           {
                               "Tag": {
                                   "Key": "ArchiveAge",
                                   "Value": "9m"
                               },
                               "Type": "LifecycleTagPredicate"
                           }
                       ],
                       "Type": "LifecycleAndOperator"
                   }
               },
               "ID": "Move rotated logs to Glacier",
               "NoncurrentVersionExpirationInDays": -1,
               "NoncurrentVersionTransitions": [
                   {
                       "Days": 2,
                       "StorageClass": "GLACIER"
                   }
               ],
               "Prefix": "rotated/",
               "Status": "Enabled",
               "Transitions": [
                   {
                       "Date": "2020-11-10T00:00:00.000Z",
                       "Days": 100,
                       "StorageClass": "GLACIER"
                   }
               ]
           }
       ]
    },
    "BucketLoggingConfiguration": {
    	"DestinationBucketName": "s3serversideloggingbucket-123456789012",
    	"LogFilePrefix": "buckettestreadwrite23435/"
    },
    "BucketName": "amzn-s3-demo-bucket",
    "BucketNotificationConfiguration": {
    	"Configurations": [{
    		"Destination": "arn:aws:lambda:us-east-1:123456789012:function:s3_public_write",
    		"Events": [
    			"s3:ObjectCreated:Put"
    		],
    		"Filter": {
    			"S3KeyFilter": {
    				"FilterRules": [
    				{
    					"Name": "AffS3BucketNotificationConfigurationS3KeyFilterRuleName.PREFIX",
    					"Value": "pre"
    				},
    				{
    					"Name": "AffS3BucketNotificationConfigurationS3KeyFilterRuleName.SUFFIX",
    					"Value": "suf"
    				},
    				]
    			}
    		},
    		"Type": "LambdaConfiguration"
    	}]
    },
    "BucketVersioningConfiguration": {
    	"IsMfaDeleteEnabled": true,
    	"Status": "Off"
    },
    "BucketWebsiteConfiguration": {
    	"ErrorDocument": "error.html",
    	"IndexDocumentSuffix": "index.html",
    	"RedirectAllRequestsTo": {
    		"HostName": "example.com",
    		"Protocol": "http"
    	},
    	"RoutingRules": [{
    		"Condition": {
    			"HttpErrorCodeReturnedEquals": "Redirected",
    			"KeyPrefixEquals": "index"
    					},
    		"Redirect": {
    			"HostName": "example.com",
    			"HttpRedirectCode": "401",
    			"Protocol": "HTTP",
    			"ReplaceKeyPrefixWith": "string",
    			"ReplaceKeyWith": "string"
    		}
    	}]
    },
    "CreatedAt": "2007-11-30T01:46:56.000Z",
    "ObjectLockConfiguration": {
    	"ObjectLockEnabled": "Enabled",
    	"Rule": {
    		"DefaultRetention": {
    			"Days": null,
    			"Mode": "GOVERNANCE",
    			"Years": 12
    		},
    	},
    },
    "OwnerId": "AIDACKCEVSQ6C2EXAMPLE",
    "OwnerName": "s3bucketowner",
    "PublicAccessBlockConfiguration": {
        "BlockPublicAcls": true,
        "BlockPublicPolicy": true,
        "IgnorePublicAcls": true,
        "RestrictPublicBuckets": true,
    },
    "ServerSideEncryptionConfiguration": {
        "Rules": [
            {
                "ApplyServerSideEncryptionByDefault": {
                    "SSEAlgorithm": "AES256",
                    "KMSMasterKeyID": "12345678-abcd-abcd-abcd-123456789012"
                }
            }
        ]
     }
}
```

## AwsS3Object
<a name="asff-resourcedetails-awss3object"></a>

`AwsS3Object`Objek memberikan informasi tentang objek Amazon S3.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsS3Object` objek. *Untuk melihat deskripsi `AwsS3Object` atribut, lihat [AWSS3 ObjectDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsS3ObjectDetails.html) di Referensi API.AWS Security Hub *

**Contoh**

```
"AwsS3Object": {
    "ContentType": "text/html",
    "ETag": "\"30a6ec7e1a9ad79c203d05a589c8b400\"",
    "LastModified": "2012-04-23T18:25:43.511Z",
    "ServerSideEncryption": "aws:kms",
    "SSEKMSKeyId": "arn:aws:kms:us-west-2:123456789012:key/4dff8393-e225-4793-a9a0-608ec069e5a7",
    "VersionId": "ws31OurgOOjH_HHllIxPE35P.MELYaYh"
}
```

# AwsSageMakersumber daya di ASFF
<a name="asff-resourcedetails-awssagemaker"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsSageMaker` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsSageMakerNotebookInstance
<a name="asff-resourcedetails-awssagemakernotebookinstance"></a>

`AwsSageMakerNotebookInstance`Objek menyediakan informasi tentang instance notebook Amazon SageMaker AI, yang merupakan instance komputasi pembelajaran mesin yang menjalankan Aplikasi Notebook Jupyter.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsSageMakerNotebookInstance` objek. Untuk melihat deskripsi `AwsSageMakerNotebookInstance` atribut, lihat [AwsSageMakerNotebookInstanceDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsSageMakerNotebookInstanceDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsSageMakerNotebookInstance": {
    "DirectInternetAccess": "Disabled",
    "InstanceMetadataServiceConfiguration": {
    	"MinimumInstanceMetadataServiceVersion": "1",
    },
    "InstanceType": "ml.t2.medium",
    "LastModifiedTime": "2022-09-09 22:48:32.012000+00:00",
    "NetworkInterfaceId": "eni-06c09ac2541a1bed3",
    "NotebookInstanceArn": "arn:aws:sagemaker:us-east-1:001098605940:notebook-instance/sagemakernotebookinstancerootaccessdisabledcomplia-8myjcyofzixm",
    "NotebookInstanceName": "SagemakerNotebookInstanceRootAccessDisabledComplia-8MYjcyofZiXm",
    "NotebookInstanceStatus": "InService",
    "PlatformIdentifier": "notebook-al1-v1",
    "RoleArn": "arn:aws:iam::001098605940:role/sechub-SageMaker-1-scenar-SageMakerCustomExecution-1R0X32HGC38IW",
    "RootAccess": "Disabled",
    "SecurityGroups": [
    	"sg-06b347359ab068745"
    ],
    "SubnetId": "subnet-02c0deea5fa64578e",
    "Url": "sagemakernotebookinstancerootaccessdisabledcomplia-8myjcyofzixm.notebook.us-east-1.sagemaker.aws",
    "VolumeSizeInGB": 5
}
```

# AwsSecretsManagersumber daya di ASFF
<a name="asff-resourcedetails-awssecretsmanager"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsSecretsManager` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsSecretsManagerSecret
<a name="asff-resourcedetails-awssecretsmanagersecret"></a>

`AwsSecretsManagerSecret`Objek memberikan rincian tentang rahasia Secrets Manager.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsSecretsManagerSecret` objek. Untuk melihat deskripsi `AwsSecretsManagerSecret` atribut, lihat [AwsSecretsManagerSecretDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsSecretsManagerSecretDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsSecretsManagerSecret": {
    "RotationRules": {
        "AutomaticallyAfterDays": 30
    },
    "RotationOccurredWithinFrequency": true,
    "KmsKeyId": "kmsKeyId",
    "RotationEnabled": true,
    "RotationLambdaArn": "arn:aws:lambda:us-west-2:777788889999:function:MyTestRotationLambda",
    "Deleted": false,
    "Name": "MyTestDatabaseSecret",
    "Description": "My test database secret"
}
```

# AwsSnssumber daya di ASFF
<a name="asff-resourcedetails-awssns"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsSns` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsSnsTopic
<a name="asff-resourcedetails-awssnstopic"></a>

`AwsSnsTopic`Objek berisi rincian tentang topik Amazon Simple Notification Service.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsSnsTopic` objek. Untuk melihat deskripsi `AwsSnsTopic` atribut, lihat [AwsSnsTopicDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsSnsTopicDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsSnsTopic": {
    "ApplicationSuccessFeedbackRoleArn": "arn:aws:iam::123456789012:role/ApplicationSuccessFeedbackRoleArn",                        
    "FirehoseFailureFeedbackRoleArn": "arn:aws:iam::123456789012:role/FirehoseFailureFeedbackRoleArn",
    "FirehoseSuccessFeedbackRoleArn": "arn:aws:iam::123456789012:role/FirehoseSuccessFeedbackRoleArn",
    "HttpFailureFeedbackRoleArn": "arn:aws:iam::123456789012:role/HttpFailureFeedbackRoleArn",
    "HttpSuccessFeedbackRoleArn": "arn:aws:iam::123456789012:role/HttpSuccessFeedbackRoleArn",                         
    "KmsMasterKeyId": "alias/ExampleAlias",
    "Owner": "123456789012",
    "SqsFailureFeedbackRoleArn": "arn:aws:iam::123456789012:role/SqsFailureFeedbackRoleArn",
    "SqsSuccessFeedbackRoleArn": "arn:aws:iam::123456789012:role/SqsSuccessFeedbackRoleArn",                         
    "Subscription": {
         "Endpoint": "http://sampleendpoint.com",
         "Protocol": "http"
    },
    "TopicName": "SampleTopic"
}
```

# AwsSqssumber daya di ASFF
<a name="asff-resourcedetails-awssqs"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsSqs` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsSqsQueue
<a name="asff-resourcedetails-awssqsqueue"></a>

`AwsSqsQueue`Objek berisi informasi tentang antrian Amazon Simple Queue Service.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsSqsQueue` objek. Untuk melihat deskripsi `AwsSqsQueue` atribut, lihat [AwsSqsQueueDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsSqsQueueDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsSqsQueue": {
    "DeadLetterTargetArn": "arn:aws:sqs:us-west-2:123456789012:queue/target",
    "KmsDataKeyReusePeriodSeconds": 60,,
    "KmsMasterKeyId": "1234abcd-12ab-34cd-56ef-1234567890ab",
    "QueueName": "sample-queue"
}
```

# AwsSsmsumber daya di ASFF
<a name="asff-resourcedetails-awsssm"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsSsm` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsSsmPatchCompliance
<a name="asff-resourcedetails-awsssmpatchcompliance"></a>

`AwsSsmPatchCompliance`Objek memberikan informasi tentang status patch pada instance berdasarkan baseline patch yang digunakan untuk menambal instance.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsSsmPatchCompliance` objek. Untuk melihat deskripsi `AwsSsmPatchCompliance` atribut, lihat [AwsSsmPatchComplianceDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsSsmPatchComplianceDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsSsmPatchCompliance": {
    "Patch": {
        "ComplianceSummary": {
            "ComplianceType": "Patch",
            "CompliantCriticalCount": 0,
            "CompliantHighCount": 0,
            "CompliantInformationalCount": 0,
            "CompliantLowCount": 0,
            "CompliantMediumCount": 0,
            "CompliantUnspecifiedCount": 461,
            "ExecutionType": "Command",
            "NonCompliantCriticalCount": 0,
            "NonCompliantHighCount": 0,
            "NonCompliantInformationalCount": 0,
            "NonCompliantLowCount": 0,
            "NonCompliantMediumCount": 0,
            "NonCompliantUnspecifiedCount": 0,
            "OverallSeverity": "UNSPECIFIED",
            "PatchBaselineId": "pb-0c5b2769ef7cbe587",
            "PatchGroup": "ExamplePatchGroup",
            "Status": "COMPLIANT"
        }
    }
}
```

# AwsStepFunctionssumber daya di ASFF
<a name="asff-resourcedetails-awsstepfunctions"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsStepFunctions` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsStepFunctionStateMachine
<a name="asff-resourcedetails-awsstepfunctionstatemachine"></a>

`AwsStepFunctionStateMachine`Objek memberikan informasi tentang mesin AWS Step Functions negara, yang merupakan alur kerja yang terdiri dari serangkaian langkah yang digerakkan oleh peristiwa.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsStepFunctionStateMachine` objek. Untuk melihat deskripsi `AwsStepFunctionStateMachine` atribut, lihat [AwsStepFunctionStateMachine](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsStepFunctionStateMachineDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsStepFunctionStateMachine": {
    "StateMachineArn": "arn:aws:states:us-east-1:123456789012:stateMachine:StepFunctionsLogDisableNonCompliantResource-fQLujTeXvwsb",
    "Name": "StepFunctionsLogDisableNonCompliantResource-fQLujTeXvwsb",
    "Status": "ACTIVE",
    "RoleArn": "arn:aws:iam::123456789012:role/teststepfunc-StatesExecutionRole-1PNM71RVO1UKT",
    "Type": "STANDARD",
    "LoggingConfiguration": {
        "Level": "OFF",
        "IncludeExecutionData": false
    },
    "TracingConfiguration": {
        "Enabled": false
    }
}
```

# AwsWafsumber daya di ASFF
<a name="asff-resourcedetails-awswaf"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsWaf` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsWafRateBasedRule
<a name="asff-resourcedetails-awswafratebasedrule"></a>

`AwsWafRateBasedRule`Objek berisi rincian tentang aturan AWS WAF berbasis tarif untuk sumber daya global. Aturan AWS WAF berbasis tarif menyediakan pengaturan untuk menunjukkan kapan harus mengizinkan, memblokir, atau menghitung permintaan. Aturan berbasis tarif mencakup jumlah permintaan yang tiba selama periode waktu tertentu.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsWafRateBasedRule` objek. Untuk melihat deskripsi `AwsWafRateBasedRule` atribut, lihat [AwsWafRateBasedRuleDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsWafRateBasedRuleDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsWafRateBasedRule":{
    "MatchPredicates" : [{
        "DataId" : "391b7a7e-5f00-40d2-b114-3f27ceacbbb0",
        "Negated" : "True",
        "Type" : "IPMatch" ,
    }],
    "MetricName" : "MetricName",
    "Name" : "Test",
    "RateKey" : "IP",
    "RateLimit" : 235000,
    "RuleId" : "5dfb4085-f103-4ec6-b39a-d4a0dae5f47f"
}
```

## AwsWafRegionalRateBasedRule
<a name="asff-resourcedetails-awswafregionalratebasedrule"></a>

`AwsWafRegionalRateBasedRule`Objek berisi rincian tentang aturan berbasis tarif untuk sumber daya Regional. Aturan berbasis tarif menyediakan pengaturan untuk menunjukkan kapan harus mengizinkan, memblokir, atau menghitung permintaan. Aturan berbasis tarif mencakup jumlah permintaan yang tiba selama periode waktu tertentu.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsWafRegionalRateBasedRule` objek. Untuk melihat deskripsi `AwsWafRegionalRateBasedRule` atribut, lihat [AwsWafRegionalRateBasedRuleDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsWafRegionalRateBasedRuleDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsWafRegionalRateBasedRule":{
    "MatchPredicates" : [{
        "DataId" : "391b7a7e-5f00-40d2-b114-3f27ceacbbb0",
        "Negated" : "True",
        "Type" : "IPMatch" ,
    }],
    "MetricName" : "MetricName",
    "Name" : "Test",
    "RateKey" : "IP",
    "RateLimit" : 235000,
    "RuleId" : "5dfb4085-f103-4ec6-b39a-d4a0dae5f47f"
}
```

## AwsWafRegionalRule
<a name="asff-resourcedetails-awswafregionalrule"></a>

`AwsWafRegionalRule`Objek memberikan rincian tentang aturan AWS WAF Regional. Aturan ini mengidentifikasi permintaan web yang ingin Anda izinkan, blokir, atau hitung.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsWafRegionalRule` objek. Untuk melihat deskripsi `AwsWafRegionalRule` atribut, lihat [AwsWafRegionalRuleDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsWafRegionalRuleDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsWafRegionalRule": { 
    "MetricName": "SampleWAF_Rule__Metric_1",
    "Name": "bb-waf-regional-rule-not-empty-conditions-compliant",
    "RuleId": "8f651760-24fa-40a6-a9ed-4b60f1de95fe",
    "PredicateList": [{
        "DataId": "127d9346-e607-4e93-9286-c1296fb5445a",
        "Negated": false,
        "Type": "GeoMatch"
    }]
}
```

## AwsWafRegionalRuleGroup
<a name="asff-resourcedetails-awswafregionalrulegroup"></a>

`AwsWafRegionalRuleGroup`Objek memberikan rincian tentang kelompok aturan AWS WAF Regional. Grup aturan adalah kumpulan aturan standar yang Anda tambahkan ke daftar kontrol akses web (web ACL).

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsWafRegionalRuleGroup` objek. Untuk melihat deskripsi `AwsWafRegionalRuleGroup` atribut, lihat [AwsWafRegionalRuleGroupDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsWafRegionalRuleGroupDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsWafRegionalRuleGroup": { 
    "MetricName": "SampleWAF_Metric_1",
    "Name": "bb-WAFClassicRuleGroupWithRuleCompliant",
    "RuleGroupId": "2012ca6d-e66d-4d9b-b766-bfb03ad77cfb",
    "Rules": [{
        "Action": {
            "Type": "ALLOW"
        }
    }],
        "Priority": 1,
        "RuleId": "cdd225da-32cf-4773-8dc5-3bca3ed9c19c",
        "Type": "REGULAR"
}
```

## AwsWafRegionalWebAcl
<a name="asff-resourcedetails-awswafregionalwebacl"></a>

`AwsWafRegionalWebAcl`memberikan rincian tentang daftar kontrol akses web AWS WAF Regional (web ACL). ACL web berisi aturan yang mengidentifikasi permintaan yang ingin Anda izinkan, blokir, atau hitung.

Berikut ini adalah contoh `AwsWafRegionalWebAcl` temuan dalam AWS Security Finding Format (ASFF). Untuk melihat deskripsi `AwsApiGatewayV2Stage` atribut, lihat [AwsWafRegionalWebAclDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsWafRegionalWebAclDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsWafRegionalWebAcl": {
    "DefaultAction": "ALLOW",
    "MetricName" : "web-regional-webacl-metric-1",
    "Name": "WebACL_123",
    "RulesList": [
        {
            "Action": {
                "Type": "Block"
            },
            "Priority": 3,
            "RuleId": "24445857-852b-4d47-bd9c-61f05e4d223c",
            "Type": "REGULAR",
            "ExcludedRules": [
                {
                    "ExclusionType": "Exclusion",
                    "RuleId": "Rule_id_1"
                }
            ],
            "OverrideAction": {
                "Type": "OVERRIDE"
            }
        }
    ],
    "WebAclId": "443c76f4-2e72-4c89-a2ee-389d501c1f67"
}
```

## AwsWafRule
<a name="asff-resourcedetails-awswafrule"></a>

`AwsWafRule`memberikan informasi tentang suatu AWS WAF aturan. AWS WAF Aturan mengidentifikasi permintaan web yang ingin Anda izinkan, blokir, atau hitung.

Berikut ini adalah contoh `AwsWafRule` temuan dalam AWS Security Finding Format (ASFF). Untuk melihat deskripsi `AwsApiGatewayV2Stage` atribut, lihat [AwsWafRuleDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsWafRuleDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsWafRule": {
    "MetricName": "AwsWafRule_Metric_1",
    "Name": "AwsWafRule_Name_1",
    "PredicateList": [{
        "DataId": "cdd225da-32cf-4773-1dc2-3bca3ed9c19c",
        "Negated": false,
        "Type": "GeoMatch"
    }],
    "RuleId": "8f651760-24fa-40a6-a9ed-4b60f1de953e"
}
```

## AwsWafRuleGroup
<a name="asff-resourcedetails-awswafrulegroup"></a>

`AwsWafRuleGroup`memberikan informasi tentang kelompok AWS WAF aturan. Grup AWS WAF aturan adalah kumpulan aturan yang telah ditentukan sebelumnya yang Anda tambahkan ke daftar kontrol akses web (web ACL).

Berikut ini adalah contoh `AwsWafRuleGroup` temuan dalam AWS Security Finding Format (ASFF). Untuk melihat deskripsi `AwsApiGatewayV2Stage` atribut, lihat [AwsWafRuleGroupDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsWafRuleGroupDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsWafRuleGroup": {
    "MetricName": "SampleWAF_Metric_1",
    "Name": "bb-WAFRuleGroupWithRuleCompliant",
    "RuleGroupId": "2012ca6d-e66d-4d9b-b766-bfb03ad77cfb",
    "Rules": [{
        "Action": {
            "Type": "ALLOW",
        },
        "Priority": 1,
        "RuleId": "cdd225da-32cf-4773-8dc5-3bca3ed9c19c",
        "Type": "REGULAR"
    }]
}
```

## AwsWafv2RuleGroup
<a name="asff-resourcedetails-awswafv2rulegroup"></a>

`AwsWafv2RuleGroup`Objek memberikan rincian tentang grup aturan AWS WAF V2.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsWafv2RuleGroup` objek. Untuk melihat deskripsi `AwsWafv2RuleGroup` atribut, lihat [AwsWafv2 RuleGroupDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsWafv2RuleGroupDetails.html) di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsWafv2RuleGroup": {
    "Arn": "arn:aws:wafv2:us-east-1:123456789012:global/rulegroup/wafv2rulegroupasff/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
    "Capacity": 1000,
    "Description": "Resource for ASFF",
    "Id": "a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
    "Name": "wafv2rulegroupasff",
    "Rules": [{
    	"Action": {
    	"Allow": {
    		"CustomRequestHandling": {
    			"InsertHeaders": [
    				{
    				"Name": "AllowActionHeader1Name",
    				"Value": "AllowActionHeader1Value"
    				},
    				{
    				"Name": "AllowActionHeader2Name",
    				"Value": "AllowActionHeader2Value"
    				}
    			]
    		}
    	},
    	"Name": "RuleOne",
    	"Priority": 1,
    	"VisibilityConfig": {
    		"CloudWatchMetricsEnabled": true,
    		"MetricName": "rulegroupasff",
    		"SampledRequestsEnabled": false
    	}
    }],
    "VisibilityConfig": {
    	"CloudWatchMetricsEnabled": true,
    	"MetricName": "rulegroupasff",
    	"SampledRequestsEnabled": false
    }
}
```

## AwsWafWebAcl
<a name="asff-resourcedetails-awswafwebacl"></a>

`AwsWafWebAcl`Objek memberikan rincian tentang ACL AWS WAF web.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsWafWebAcl` objek. Untuk melihat deskripsi `AwsWafWebAcl` atribut, lihat [AwsWafWebAclDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsWafWebAclDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsWafWebAcl": {
    "DefaultAction": "ALLOW",
    "Name": "MyWafAcl",
    "Rules": [
        {
            "Action": {
                "Type": "ALLOW"
            },
            "ExcludedRules": [
                {
                    "RuleId": "5432a230-0113-5b83-bbb2-89375c5bfa98"
                }
            ],
            "OverrideAction": {
                "Type": "NONE"
            },
            "Priority": 1,
            "RuleId": "5432a230-0113-5b83-bbb2-89375c5bfa98",
            "Type": "REGULAR"
        }
    ],
    "WebAclId": "waf-1234567890"
}
```

## AwsWafv2WebAcl
<a name="asff-resourcedetails-awswafv2webacl"></a>

`AwsWafv2WebAcl`Objek memberikan rincian tentang ACL web AWS WAF V2.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsWafv2WebAcl` objek. Untuk melihat deskripsi `AwsWafv2WebAcl` atribut, lihat [AwsWafv2 WebAclDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsWafv2WebAclDetails.html) di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsWafv2WebAcl": {
    "Arn": "arn:aws:wafv2:us-east-1:123456789012:regional/webacl/WebACL-RoaD4QexqSxG/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111",
    "Capacity": 1326,
    "CaptchaConfig": {
    	"ImmunityTimeProperty": {
    		"ImmunityTime": 500
    	}
    },
    "DefaultAction": {
    	"Block": {}
    },
    "Description": "Web ACL for JsonBody testing",
    "ManagedbyFirewallManager": false,
    "Name": "WebACL-RoaD4QexqSxG",
    "Rules": [{
    	"Action": {
    		"RuleAction": {
    			"Block": {}
    		}
    	},
    	"Name": "TestJsonBodyRule",
    	"Priority": 1,
    	"VisibilityConfig": {
    		"SampledRequestsEnabled": true,
    		"CloudWatchMetricsEnabled": true,
    		"MetricName": "JsonBodyMatchMetric"
    	}
    }],
    "VisibilityConfig": {
    	"SampledRequestsEnabled": true,
    	"CloudWatchMetricsEnabled": true,
    	"MetricName": "TestingJsonBodyMetric"
    }
}
```

# AwsXraysumber daya di ASFF
<a name="asff-resourcedetails-awsxray"></a>

Berikut ini adalah contoh sintaks AWS Security Finding Format (ASFF) untuk `AwsXray` sumber daya.

AWS Security Hub CSPM menormalkan temuan dari berbagai sumber menjadi ASFF. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

## AwsXrayEncryptionConfig
<a name="asff-resourcedetails-awsxrayencryptionconfig"></a>

`AwsXrayEncryptionConfig`Objek berisi informasi tentang konfigurasi enkripsi untuk AWS X-Ray.

Contoh berikut menunjukkan AWS Security Finding Format (ASFF) untuk `AwsXrayEncryptionConfig` objek. Untuk melihat deskripsi `AwsXrayEncryptionConfig` atribut, lihat [AwsXrayEncryptionConfigDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_AwsXrayEncryptionConfigDetails.html)di *Referensi AWS Security Hub API*.

**Contoh**

```
"AwsXRayEncryptionConfig":{
    "KeyId": "arn:aws:kms:us-east-2:222222222222:key/example-key",
    "Status": "UPDATING",
    "Type":"KMS"
}
```

# CodeRepositoryobjek di ASFF
<a name="asff-resourcedetails-coderepository"></a>

`CodeRepository`Objek menyediakan informasi tentang repositori kode eksternal yang Anda sambungkan ke AWS sumber daya dan mengkonfigurasi Amazon Inspector untuk memindai kerentanan.

Contoh berikut menunjukkan sintaks AWS Security Finding Format (ASFF) untuk objek. `CodeRepository` Untuk melihat deskripsi `CodeRepository` atribut, lihat [CodeRepositoryDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_CodeRepositoryDetails.html)di *Referensi AWS Security Hub API*. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

**Contoh**

```
"CodeRepository": {
    "ProviderType": "GITLAB_SELF_MANAGED",
    "ProjectName": "projectName",
    "CodeSecurityIntegrationArn": "arn:aws:inspector2:us-east-1:123456789012:codesecurity-integration/00000000-0000-0000-0000-000000000000"
}
```

# Containerobjek di ASFF
<a name="asff-resourcedetails-container"></a>

Contoh berikut menunjukkan sintaks AWS Security Finding Format (ASFF) untuk objek. `Container` Untuk melihat deskripsi `Container` atribut, lihat [ContainerDetails](https://docs.aws.amazon.com/securityhub/1.0/APIReference/API_ContainerDetails.html)di *Referensi AWS Security Hub API*. Untuk informasi latar belakang tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

**Contoh**

```
"Container": {
    "ContainerRuntime": "docker",
    "ImageId": "image12",
    "ImageName": "1111111/knotejs@sha256:372131c9fef111111111111115f4ed3ea5f9dce4dc3bd34ce21846588a3",
    "LaunchedAt": "2018-09-29T01:25:54Z",
    "Name": "knote",
    "Privileged": true,
    "VolumeMounts": [{
        "Name": "vol-03909e9",
        "MountPath": "/mnt/etc"
    }]
}
```

# Otherobjek di ASFF
<a name="asff-resourcedetails-other"></a>

Dalam AWS Security Finding Format (ASFF), `Other` objek menentukan bidang dan nilai kustom. Untuk informasi lebih lanjut tentang ASFF, lihat[AWS Format Pencarian Keamanan (ASFF)](securityhub-findings-format.md).

Dengan menggunakan `Other` objek, Anda dapat menentukan bidang dan nilai kustom untuk sumber daya. Anda dapat menggunakan `Other` objek untuk kasus-kasus berikut:
+ Jenis sumber daya tidak memiliki `Details` objek yang sesuai. Untuk menentukan detail sumber daya, gunakan `Other` objek.
+ `Details`Objek untuk jenis sumber daya tidak menyertakan semua atribut yang ingin Anda tentukan. Dalam hal ini, gunakan `Details` objek untuk jenis sumber daya untuk menentukan atribut yang tersedia. Gunakan `Other` objek untuk menentukan atribut yang tidak ada dalam objek tipe-spesifik`Details`.
+ Jenis sumber daya bukan salah satu jenis yang disediakan. Dalam hal ini, atur `Resource.Type` ke `Other` dan gunakan `Other` objek untuk menentukan detailnya.

**Jenis:** Peta hingga 50 pasangan nilai kunci

Setiap pasangan kunci-nilai harus memenuhi persyaratan berikut.
+ Kunci harus berisi kurang dari 128 karakter.
+ Nilai harus mengandung kurang dari 1.024 karakter.