选择您的 Cookie 首选项

我们使用必要 Cookie 和类似工具提供我们的网站和服务。我们使用性能 Cookie 收集匿名统计数据,以便我们可以了解客户如何使用我们的网站并进行改进。必要 Cookie 无法停用,但您可以单击“自定义”或“拒绝”来拒绝性能 Cookie。

如果您同意,AWS 和经批准的第三方还将使用 Cookie 提供有用的网站功能、记住您的首选项并显示相关内容,包括相关广告。要接受或拒绝所有非必要 Cookie,请单击“接受”或“拒绝”。要做出更详细的选择,请单击“自定义”。

Macie 调查结果的亚马逊 EventBridge 事件架构

聚焦模式
Macie 调查结果的亚马逊 EventBridge 事件架构 - Amazon Macie

本文属于机器翻译版本。若本译文内容与英语原文存在差异,则一律以英文原文为准。

本文属于机器翻译版本。若本译文内容与英语原文存在差异,则一律以英文原文为准。

为了支持与其他应用程序、服务和系统(例如监控或事件管理系统)的集成,Amazon Macie 会自动将调查结果 EventBridge 作为事件发布给亚马逊。 EventBridge,前身为 Amazon CloudWatch Events,是一种无服务器事件总线服务,可将来自应用程序和其他应用程序的实时数据流传输 AWS 服务 到 AWS Lambda 函数、亚马逊简单通知服务主题和 Amazon Kinesis 流等目标。要了解更多信息 EventBridge,请参阅 Amazon EventBridge 用户指南

注意

如果您当前使用 CloudWatch 事件,请注意 EventBridge 和 CloudWatch 事件是相同的底层服务和 API。但是, EventBridge 包括其他功能,使您能够接收来自软件即服务 (SaaS) 应用程序和您自己的应用程序的事件。由于基础服务和 API 相同,因此 Macie 发现的事件架构也相同。

Macie 会自动发布所有新调查发现和现有策略的后续调查发现的事件,但使用抑制规则自动存档的调查发现除外。这些事件是符合 AWS 事件 EventBridge 架构的 JSON 对象。每个事件都包含特定调查发现的 JSON 表示。由于数据结构化为 EventBridge 事件,因此您可以使用其他应用程序、服务和工具更轻松地监控、处理发现并根据发现采取行动。要详细了解 Macie 如何以及何时发布有关调查发现的事件,请参阅 为调查发现配置发布设置

Macie 调查发现的事件架构

以下示例显示了亚马逊 Macie EventBridge 搜索结果的亚马逊事件架构。有关调查发现事件中包含字段的详细描述,请参阅 Amazon Macie API 引用中的调查发现。调查发现事件的结构和字段与 Amazon Macie API 的 Finding 对象非常接近。

{ "version": "0", "id": "event ID", "detail-type": "Macie Finding", "source": "aws.macie", "account": "AWS 账户 ID (string)", "time": "event timestamp (string)", "region": "AWS 区域 (string)", "resources": [ <-- ARNs of the resources involved in the event --> ], "detail": { <-- Details of a policy or sensitive data finding --> }, "policyDetails": null, <-- Additional details of a policy finding or null for a sensitive data finding --> "sample": Boolean, "archived": Boolean }

策略调查发现事件示例

以下示例使用示例数据演示策略调查结果的 Amazon EventBridge 事件中对象和字段的结构和性质。在此示例中,该事件报告了后续出现的现有策略调查发现:Amazon Macie 检测到禁用阻止 S3 存储桶公开访问设置。以下字段和值可帮助您确定情况是否如此:

  • type 字段设置为 Policy:IAMUser/S3BlockPublicAccessDisabled

  • createdAtupdatedAt 字段的值不同。此指标表明,该事件报告了现有策略调查发现的后续发生。如果事件报告了新调查发现,则这些字段的值将相同。

  • count 字段设置为 2,表示这是调查发现的第二次出现。

  • category 字段设置为 POLICY

  • classificationDetails 字段值为 null,这有助于将此策略调查发现事件与敏感数据调查发现事件区分开来。对于敏感数据调查发现,此值将是一组对象和字段,这些对象和字段提供有关敏感数据的查找方式及数据内容。

请注意,sample 字段值设置为 true。此值强调这是文档中所使用的示例事件。

{ "version": "0", "id": "0948ba87-d3b8-c6d4-f2da-732a1example", "detail-type": "Macie Finding", "source": "aws.macie", "account": "123456789012", "time": "2024-04-30T23:12:15Z", "region":"us-east-1", "resources": [], "detail": { "schemaVersion": "1.0", "id": "64b917aa-3843-014c-91d8-937ffexample", "accountId": "123456789012", "partition": "aws", "region": "us-east-1", "type": "Policy:IAMUser/S3BlockPublicAccessDisabled", "title": "Block public access settings are disabled for the S3 bucket", "description": "All bucket-level block public access settings were disabled for the S3 bucket. Access to the bucket is controlled by account-level block public access settings, access control lists (ACLs), and the bucket’s bucket policy.", "severity": { "score": 3, "description": "High" }, "createdAt": "2024-04-29T15:46:02Z", "updatedAt": "2024-04-30T23:12:15Z", "count": 2, "resourcesAffected": { "s3Bucket": { "arn": "arn:aws:s3:::amzn-s3-demo-bucket1", "name": "amzn-s3-demo-bucket1", "createdAt": "2020-04-03T20:46:56.000Z", "owner":{ "displayName": "johndoe", "id": "7009a8971cd538e11f6b6606438875e7c86c5b672f46db45460ddcd08example" }, "tags": [ { "key": "Division", "value": "HR" }, { "key": "Team", "value": "Recruiting" } ], "defaultServerSideEncryption": { "encryptionType": "aws:kms", "kmsMasterKeyId": "arn:aws:kms:us-east-1:123456789012:key/1234abcd-12ab-34cd-56ef-1234567890ab" }, "publicAccess": { "permissionConfiguration": { "bucketLevelPermissions": { "accessControlList": { "allowsPublicReadAccess": false, "allowsPublicWriteAccess": false }, "bucketPolicy": { "allowsPublicReadAccess": false, "allowsPublicWriteAccess": false }, "blockPublicAccess": { "ignorePublicAcls": false, "restrictPublicBuckets": false, "blockPublicAcls": false, "blockPublicPolicy": false } }, "accountLevelPermissions": { "blockPublicAccess": { "ignorePublicAcls": true, "restrictPublicBuckets": true, "blockPublicAcls": true, "blockPublicPolicy": true } } }, "effectivePermission": "NOT_PUBLIC" }, "allowsUnencryptedObjectUploads": "FALSE" }, "s3Object": null }, "category": "POLICY", "classificationDetails": null, "policyDetails": { "action": { "actionType": "AWS_API_CALL", "apiCallDetails": { "api": "PutBucketPublicAccessBlock", "apiServiceName": "s3.amazonaws.com", "firstSeen": "2024-04-29T15:46:02.401Z", "lastSeen": "2024-04-30T23:12:15.401Z" } }, "actor": { "userIdentity": { "type": "AssumedRole", "assumedRole": { "principalId": "AROA1234567890EXAMPLE:AssumedRoleSessionName", "arn": "arn:aws:sts::123456789012:assumed-role/RoleToBeAssumed/MySessionName", "accountId": "111122223333", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": false, "creationDate": "2024-04-29T10:25:43.511Z" }, "sessionIssuer": { "type": "Role", "principalId": "AROA1234567890EXAMPLE", "arn": "arn:aws:iam::123456789012:role/RoleToBeAssumed", "accountId": "123456789012", "userName": "RoleToBeAssumed" } } }, "root": null, "iamUser": null, "federatedUser": null, "awsAccount": null, "awsService": null }, "ipAddressDetails":{ "ipAddressV4": "192.0.2.0", "ipOwner": { "asn": "-1", "asnOrg": "ExampleFindingASNOrg", "isp": "ExampleFindingISP", "org": "ExampleFindingORG" }, "ipCountry": { "code": "US", "name": "United States" }, "ipCity": { "name": "Ashburn" }, "ipGeoLocation": { "lat": 39.0481, "lon": -77.4728 } }, "domainDetails": null } }, "sample": true, "archived": false } }

敏感数据调查发现事件示例

以下示例使用示例数据来演示敏感数据发现的 Amazon EventBridge 事件中对象和字段的结构和性质。在此示例中,该事件报告了一项新调查发现的敏感数据:Amazon Macie 在 S3 对象中发现了多个类别和类型的敏感数据。以下字段和值可帮助您确定情况是否如此:

  • type 字段设置为 SensitiveData:S3Object/Multiple

  • createdAtupdatedAt 字段值相同。与策略调查发现不同的是,敏感数据调查发现总是如此。所有敏感数据调查发现均被视为新调查发现。

  • count 字段设置为 1,表示这是一项新调查发现。与策略调查发现不同的是,敏感数据调查发现总是如此。所有敏感数据调查发现都被认为具有唯一性(新)。

  • category 字段设置为 CLASSIFICATION

  • policyDetails 字段值为 null,这有助于将敏感数据调查发现事件与策略调查发现事件区分开来。对于策略调查发现,此值将是一组对象和字段,这些对象和字段提供有关 S3 存储桶可能违反策略、安全性或隐私问题的信息。

请注意,sample 字段值设置为 true。此值强调这是文档中所使用的示例事件。

{ "version": "0", "id": "14ddd0b1-7c90-b9e3-8a68-6a408example", "detail-type": "Macie Finding", "source": "aws.macie", "account": "123456789012", "time": "2024-04-20T08:19:10Z", "region": "us-east-1", "resources": [], "detail": { "schemaVersion": "1.0", "id": "4ed45d06-c9b9-4506-ab7f-18a57example", "accountId": "123456789012", "partition": "aws", "region": "us-east-1", "type": "SensitiveData:S3Object/Multiple", "title": "The S3 object contains multiple categories of sensitive data", "description": "The S3 object contains more than one category of sensitive data.", "severity": { "score": 3, "description": "High" }, "createdAt": "2024-04-20T18:19:10Z", "updatedAt": "2024-04-20T18:19:10Z", "count": 1, "resourcesAffected": { "s3Bucket": { "arn": "arn:aws:s3:::amzn-s3-demo-bucket2", "name": "amzn-s3-demo-bucket2", "createdAt": "2020-05-15T20:46:56.000Z", "owner": { "displayName": "johndoe", "id": "7009a8971cd538e11f6b6606438875e7c86c5b672f46db45460ddcd08example" }, "tags":[ { "key":"Division", "value":"HR" }, { "key":"Team", "value":"Recruiting" } ], "defaultServerSideEncryption": { "encryptionType": "aws:kms", "kmsMasterKeyId": "arn:aws:kms:us-east-1:123456789012:key/1234abcd-12ab-34cd-56ef-1234567890ab" }, "publicAccess": { "permissionConfiguration": { "bucketLevelPermissions": { "accessControlList": { "allowsPublicReadAccess": false, "allowsPublicWriteAccess": false }, "bucketPolicy":{ "allowsPublicReadAccess": false, "allowsPublicWriteAccess": false }, "blockPublicAccess": { "ignorePublicAcls": true, "restrictPublicBuckets": true, "blockPublicAcls": true, "blockPublicPolicy": true } }, "accountLevelPermissions": { "blockPublicAccess": { "ignorePublicAcls": false, "restrictPublicBuckets": false, "blockPublicAcls": false, "blockPublicPolicy": false } } }, "effectivePermission": "NOT_PUBLIC" }, "allowsUnencryptedObjectUploads": "TRUE" }, "s3Object":{ "bucketArn": "arn:aws:s3:::amzn-s3-demo-bucket2", "key": "2024 Sourcing.csv", "path": "amzn-s3-demo-bucket2/2024 Sourcing.csv", "extension": "csv", "lastModified": "2024-04-19T22:08:25.000Z", "versionId": "", "serverSideEncryption": { "encryptionType": "aws:kms", "kmsMasterKeyId": "arn:aws:kms:us-east-1:123456789012:key/1234abcd-12ab-34cd-56ef-1234567890ab" }, "size": 4750, "storageClass": "STANDARD", "tags":[ { "key":"Division", "value":"HR" }, { "key":"Team", "value":"Recruiting" } ], "publicAccess": false, "etag": "6bb7fd4fa9d36d6b8fb8882caexample" } }, "category": "CLASSIFICATION", "classificationDetails": { "jobArn": "arn:aws:macie2:us-east-1:123456789012:classification-job/3ce05dbb7ec5505def334104bexample", "jobId": "3ce05dbb7ec5505def334104bexample", "result": { "status": { "code": "COMPLETE", "reason": null }, "sizeClassified": 4750, "mimeType": "text/csv", "additionalOccurrences": true, "sensitiveData": [ { "category": "PERSONAL_INFORMATION", "totalCount": 65, "detections": [ { "type": "USA_SOCIAL_SECURITY_NUMBER", "count": 30, "occurrences": { "lineRanges": null, "offsetRanges": null, "pages": null, "records": null, "cells": [ { "row": 2, "column": 1, "columnName": "SSN", "cellReference": null }, { "row": 3, "column": 1, "columnName": "SSN", "cellReference": null }, { "row": 4, "column": 1, "columnName": "SSN", "cellReference": null } ] } }, { "type": "NAME", "count": 35, "occurrences": { "lineRanges": null, "offsetRanges": null, "pages": null, "records": null, "cells": [ { "row": 2, "column": 3, "columnName": "Name", "cellReference": null }, { "row": 3, "column": 3, "columnName": "Name", "cellReference": null } ] } } ] }, { "category": "FINANCIAL_INFORMATION", "totalCount": 30, "detections": [ { "type": "CREDIT_CARD_NUMBER", "count": 30, "occurrences": { "lineRanges": null, "offsetRanges": null, "pages": null, "records": null, "cells": [ { "row": 2, "column": 14, "columnName": "CCN", "cellReference": null }, { "row": 3, "column": 14, "columnName": "CCN", "cellReference": null } ] } } ] } ], "customDataIdentifiers": { "totalCount": 0, "detections": [] } }, "detailedResultsLocation": "s3://macie-data-discovery-results/AWSLogs/123456789012/Macie/us-east-1/3ce05dbb7ec5505def334104bexample/d48bf16d-0deb-3e49-9d8c-d407cexample.jsonl.gz", "originType": "SENSITIVE_DATA_DISCOVERY_JOB" }, "policyDetails": null, "sample": true, "archived": false } }
隐私网站条款Cookie 首选项
© 2025, Amazon Web Services, Inc. 或其附属公司。保留所有权利。