本文為英文版的機器翻譯版本,如內容有任何歧義或不一致之處,概以英文版為準。
AwsEventBridge 資源 ASFF
以下是 AwsEventBridge
資源 AWS 的安全調查結果格式 (ASFF) 語法範例。
AWS Security Hub 將各種來源的調查結果標準化為 ASFF。如需 的背景資訊ASFF,請參閱 AWS 安全調查結果格式 (ASFF)。
AwsEventSchemasRegistry
AwsEventSchemasRegistry
物件提供有關 Amazon EventBridge 結構描述登錄檔的資訊。結構描述會定義傳送至 的事件結構 EventBridge。結構描述登錄檔是收集結構描述並以邏輯方式分組的容器。
下列範例顯示 AwsEventSchemasRegistry
物件 AWS 的安全調查結果格式 (ASFF)。若要檢視AwsEventSchemasRegistry
屬性的描述,請參閱 AWS Security Hub API 參考AwsEventSchemasRegistry中的 。
範例
"AwsEventSchemasRegistry": { "Description": "This is an example event schema registry.", "RegistryArn": "arn:aws:schemas:us-east-1:123456789012:registry/schema-registry", "RegistryName": "schema-registry" }
AwsEventsEndpoint
AwsEventsEndpoint
物件提供有關 Amazon EventBridge 全域端點的資訊。端點可以透過讓它具有區域容錯能力來改善應用程式的可用性。
下列範例顯示 AwsEventsEndpoint
物件 AWS 的安全調查結果格式 (ASFF)。若要檢視AwsEventsEndpoint
屬性的描述,請參閱 AWS Security Hub API 參考AwsEventsEndpointDetails中的 。
範例
"AwsEventsEndpoint": { "Arn": "arn:aws:events:us-east-1:123456789012:endpoint/my-endpoint", "Description": "This is a sample endpoint.", "EndpointId": "04k1exajoy.veo", "EndpointUrl": "https://04k1exajoy.veo.endpoint.events.amazonaws.com", "EventBuses": [ { "EventBusArn": "arn:aws:events:us-east-1:123456789012:event-bus/default" }, { "EventBusArn": "arn:aws:events:us-east-2:123456789012:event-bus/default" } ], "Name": "my-endpoint", "ReplicationConfig": { "State": "ENABLED" }, "RoleArn": "arn:aws:iam::123456789012:role/service-role/Amazon_EventBridge_Invoke_Event_Bus_1258925394", "RoutingConfig": { "FailoverConfig": { "Primary": { "HealthCheck": "arn:aws:route53:::healthcheck/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111" }, "Secondary": { "Route": "us-east-2" } } }, "State": "ACTIVE" }
AwsEventsEventbus
AwsEventsEventbus
物件提供有關 Amazon EventBridge 全域端點的資訊。端點可以透過讓它具有區域容錯能力來改善應用程式的可用性。
下列範例顯示 AwsEventsEventbus
物件 AWS 的安全調查結果格式 (ASFF)。若要檢視AwsEventsEventbus
屬性的描述,請參閱 AWS Security Hub API 參考AwsEventsEventbusDetails中的 。
範例
"AwsEventsEventbus": "Arn": "arn:aws:events:us-east-1:123456789012:event-bus/my-event-bus", "Name": "my-event-bus", "Policy": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"AllowAllAccountsFromOrganizationToPutEvents\",\"Effect\":\"Allow\",\"Principal\":\"*\",\"Action\":\"events:PutEvents\",\"Resource\":\"arn:aws:events:us-east-1:123456789012:event-bus/my-event-bus\",\"Condition\":{\"StringEquals\":{\"aws:PrincipalOrgID\":\"o-ki7yjtkjv5\"}}},{\"Sid\":\"AllowAccountToManageRulesTheyCreated\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::123456789012:root\"},\"Action\":[\"events:PutRule\",\"events:PutTargets\",\"events:DeleteRule\",\"events:RemoveTargets\",\"events:DisableRule\",\"events:EnableRule\",\"events:TagResource\",\"events:UntagResource\",\"events:DescribeRule\",\"events:ListTargetsByRule\",\"events:ListTagsForResource\"],\"Resource\":\"arn:aws:events:us-east-1:123456789012:rule/my-event-bus\",\"Condition\":{\"StringEqualsIfExists\":{\"events:creatorAccount\":\"123456789012\"}}}]}"