Skip to content
This repository was archived by the owner on Sep 5, 2023. It is now read-only.

Commit e28b8e2

Browse files
feat(v1): add field severity to findings; add common resource helper; expose client tranport (#87)
* changes without context autosynth cannot find the source of changes triggered by earlier changes in this repository, or by version upgrades to tools such as linters. * chore(python): use BUILD_SPECIFIC_GCLOUD_PROJECT for samples https://github.com/googleapis/python-talent/blob/ef045e8eb348db36d7a2a611e6f26b11530d273b/samples/snippets/noxfile_config.py#L27-L32 `BUILD_SPECIFIC_GCLOUD_PROJECT` is an alternate project used for sample tests that do poorly with concurrent runs on the same project. Source-Author: Bu Sun Kim <[email protected]> Source-Date: Wed Sep 30 13:06:03 2020 -0600 Source-Repo: googleapis/synthtool Source-Sha: 9b0da5204ab90bcc36f8cd4e5689eff1a54cc3e4 Source-Link: googleapis/synthtool@9b0da52 * fix: switch all local LRO Go GAPIC deps to remote PiperOrigin-RevId: 338561467 Source-Author: Google APIs <[email protected]> Source-Date: Thu Oct 22 15:29:48 2020 -0700 Source-Repo: googleapis/googleapis Source-Sha: 7391e775fd3620c1306b9677bfbcf6221d42f3c3 Source-Link: googleapis/googleapis@7391e77 * chore: update grpc dependency to v1.33.1 PiperOrigin-RevId: 338646463 Source-Author: Google APIs <[email protected]> Source-Date: Fri Oct 23 03:57:15 2020 -0700 Source-Repo: googleapis/googleapis Source-Sha: 20b11dfe4538cd5da7b4c3dd7d2bf5b9922ff3ed Source-Link: googleapis/googleapis@20b11df * chore: upgrade to gapic-generator 0.35.9 PiperOrigin-RevId: 339292950 Source-Author: Google APIs <[email protected]> Source-Date: Tue Oct 27 11:32:46 2020 -0700 Source-Repo: googleapis/googleapis Source-Sha: 07d41a7e5cade45aba6f0d277c89722b48f2c956 Source-Link: googleapis/googleapis@07d41a7 * fix: remove client recv msg limit fix: add enums to `types/__init__.py` PiperOrigin-RevId: 347055288 Source-Author: Google APIs <[email protected]> Source-Date: Fri Dec 11 12:44:37 2020 -0800 Source-Repo: googleapis/googleapis Source-Sha: dd372aa22ded7a8ba6f0e03a80e06358a3fa0907 Source-Link: googleapis/googleapis@dd372aa * feat: added field severity to findings in v1 API Clients will now see a new field, severity, on findings. They will also be able to filter and group by severity on ListFinding and GroupFinding API calls. PiperOrigin-RevId: 347410691 Source-Author: Google APIs <[email protected]> Source-Date: Mon Dec 14 10:08:23 2020 -0800 Source-Repo: googleapis/googleapis Source-Sha: e9135d3cb8a99f77ee2ba3318ebc2c9b807581d0 Source-Link: googleapis/googleapis@e9135d3
1 parent 553dfbb commit e28b8e2

File tree

37 files changed

+2644
-1406
lines changed

37 files changed

+2644
-1406
lines changed

docs/securitycenter_v1/types.rst

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,3 +3,4 @@ Types for Google Cloud Securitycenter v1 API
33

44
.. automodule:: google.cloud.securitycenter_v1.types
55
:members:
6+
:show-inheritance:

docs/securitycenter_v1beta1/types.rst

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,3 +3,4 @@ Types for Google Cloud Securitycenter v1beta1 API
33

44
.. automodule:: google.cloud.securitycenter_v1beta1.types
55
:members:
6+
:show-inheritance:

docs/securitycenter_v1p1beta1/types.rst

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,3 +3,4 @@ Types for Google Cloud Securitycenter v1p1beta1 API
33

44
.. automodule:: google.cloud.securitycenter_v1p1beta1.types
55
:members:
6+
:show-inheritance:

google/cloud/securitycenter_v1/proto/finding.proto

Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,65 @@ message Finding {
5656
INACTIVE = 2;
5757
}
5858

59+
// The severity of the finding.
60+
enum Severity {
61+
// This value is used for findings when a source doesn't write a severity
62+
// value.
63+
SEVERITY_UNSPECIFIED = 0;
64+
65+
// Vulnerability:
66+
// A critical vulnerability is easily discoverable by an external actor,
67+
// exploitable, and results in the direct ability to execute arbitrary code,
68+
// exfiltrate data, and otherwise gain additional access and privileges to
69+
// cloud resources and workloads. Examples include publicly accessible
70+
// unprotected user data, public SSH access with weak or no passwords, etc.
71+
//
72+
// Threat:
73+
// Indicates a threat that is able to access, modify, or delete data or
74+
// execute unauthorized code within existing resources.
75+
CRITICAL = 1;
76+
77+
// Vulnerability:
78+
// A high risk vulnerability can be easily discovered and exploited in
79+
// combination with other vulnerabilities in order to gain direct access and
80+
// the ability to execute arbitrary code, exfiltrate data, and otherwise
81+
// gain additional access and privileges to cloud resources and workloads.
82+
// An example is a database with weak or no passwords that is only
83+
// accessible internally. This database could easily be compromised by an
84+
// actor that had access to the internal network.
85+
//
86+
// Threat:
87+
// Indicates a threat that is able to create new computational resources in
88+
// an environment but not able to access data or execute code in existing
89+
// resources.
90+
HIGH = 2;
91+
92+
// Vulnerability:
93+
// A medium risk vulnerability could be used by an actor to gain access to
94+
// resources or privileges that enable them to eventually (through multiple
95+
// steps or a complex exploit) gain access and the ability to execute
96+
// arbitrary code or exfiltrate data. An example is a service account with
97+
// access to more projects than it should have. If an actor gains access to
98+
// the service account, they could potentially use that access to manipulate
99+
// a project the service account was not intended to.
100+
//
101+
// Threat:
102+
// Indicates a threat that is able to cause operational impact but may not
103+
// access data or execute unauthorized code.
104+
MEDIUM = 3;
105+
106+
// Vulnerability:
107+
// A low risk vulnerability hampers a security organization’s ability to
108+
// detect vulnerabilities or active threats in their deployment, or prevents
109+
// the root cause investigation of security issues. An example is monitoring
110+
// and logs being disabled for resource configurations and access.
111+
//
112+
// Threat:
113+
// Indicates a threat that has obtained minimal access to an environment but
114+
// is not able to access data, execute code, or create resources.
115+
LOW = 4;
116+
}
117+
59118
// The relative resource name of this finding. See:
60119
// https://cloud.google.com/apis/design/resource_names#relative_resource_name
61120
// Example:
@@ -110,4 +169,8 @@ message Finding {
110169

111170
// The time at which the finding was created in Security Command Center.
112171
google.protobuf.Timestamp create_time = 10;
172+
173+
// The severity of the finding. This field is managed by the source that
174+
// writes the finding.
175+
Severity severity = 12;
113176
}

google/cloud/securitycenter_v1/proto/notification_config.proto

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -78,14 +78,14 @@ message NotificationConfig {
7878
// The description of the notification config (max of 1024 characters).
7979
string description = 2;
8080

81-
// The PubSub topic to send notifications to. Its format is
81+
// The Pub/Sub topic to send notifications to. Its format is
8282
// "projects/[project_id]/topics/[topic]".
83-
string pubsub_topic = 3 [
84-
(google.api.resource_reference) = { type: "pubsub.googleapis.com/Topic" }
85-
];
83+
string pubsub_topic = 3 [(google.api.resource_reference) = {
84+
type: "pubsub.googleapis.com/Topic"
85+
}];
8686

8787
// Output only. The service account that needs "pubsub.topics.publish"
88-
// permission to publish to the PubSub topic.
88+
// permission to publish to the Pub/Sub topic.
8989
string service_account = 4 [(google.api.field_behavior) = OUTPUT_ONLY];
9090

9191
// The config for triggering notifications.

0 commit comments

Comments
 (0)