@@ -975,6 +975,7 @@ export const ViolationReason = {
975
975
TrafficInspectionCrossesAZBoundary : "TRAFFIC_INSPECTION_CROSSES_AZ_BOUNDARY" ,
976
976
UnexpectedFirewallRoutes : "UNEXPECTED_FIREWALL_ROUTES" ,
977
977
UnexpectedTargetGatewayRoutes : "UNEXPECTED_TARGET_GATEWAY_ROUTES" ,
978
+ WebACLConfigurationOrScopeOfUse : "WEB_ACL_CONFIGURATION_OR_SCOPE_OF_USE" ,
978
979
WebAclMissingRuleGroup : "WEB_ACL_MISSING_RULE_GROUP" ,
979
980
} as const ;
980
981
@@ -1511,9 +1512,7 @@ export interface SecurityServicePolicyData {
1511
1512
* <p>Example: <code>SECURITY_GROUPS_COMMON</code>
1512
1513
* </p>
1513
1514
* <p>
1514
- * <code>"\{\"type\":\"SECURITY_GROUPS_COMMON\",\"revertManualSecurityGroupChanges\":false,\"exclusiveResourceSecurityGroupManagement\":false,
1515
- * \"applyToAllEC2InstanceENIs\":false,\"securityGroups\":[\{\"id\":\"
1516
- * sg-000e55995d61a06bd\"\}]\}"</code>
1515
+ * <code>"\{\"type\":\"SECURITY_GROUPS_COMMON\",\"securityGroups\":[\{\"id\":\"sg-03b1f67d69ed00197\"\}],\"revertManualSecurityGroupChanges\":true,\"exclusiveResourceSecurityGroupManagement\":true,\"applyToAllEC2InstanceENIs\":false,\"includeSharedVPC\":true,\"enableSecurityGroupReferencesDistribution\":true\}"</code>
1517
1516
* </p>
1518
1517
* </li>
1519
1518
* <li>
@@ -1542,7 +1541,7 @@ export interface SecurityServicePolicyData {
1542
1541
* <p>Example: <code>SECURITY_GROUPS_CONTENT_AUDIT</code>
1543
1542
* </p>
1544
1543
* <p>
1545
- * <code>"\{\"type\":\"SECURITY_GROUPS_CONTENT_AUDIT\",\"securityGroups\":[\{\"id\":\"sg-000e55995d61a06bd \"\}],\"securityGroupAction\":\{\"type\":\"ALLOW\"\}\}"</code>
1544
+ * <code>"\{\"type\":\"SECURITY_GROUPS_CONTENT_AUDIT\",\"preManagedOptions\":[\{\"denyProtocolAllValue\":true\},\{\"auditSgDirection\":\{\"type\":\"ALL\"\}\} ],\" securityGroups\":[\{\"id\":\"sg-049b2393a25468971 \"\}],\"securityGroupAction\":\{\"type\":\"ALLOW\"\}\ }"</code>
1546
1545
* </p>
1547
1546
* <p>The security group action for content audit can be <code>ALLOW</code> or
1548
1547
* <code>DENY</code>. For <code>ALLOW</code>, all in-scope security group rules must
@@ -1554,7 +1553,7 @@ export interface SecurityServicePolicyData {
1554
1553
* <p>Example: <code>SECURITY_GROUPS_USAGE_AUDIT</code>
1555
1554
* </p>
1556
1555
* <p>
1557
- * <code>"\{\"type\":\"SECURITY_GROUPS_USAGE_AUDIT\",\"deleteUnusedSecurityGroups\":true,\"coalesceRedundantSecurityGroups\":true\}"</code>
1556
+ * <code>"\{\"type\":\"SECURITY_GROUPS_USAGE_AUDIT\",\"deleteUnusedSecurityGroups\":true,\"coalesceRedundantSecurityGroups\":true,\"optionalDelayForUnusedInMinutes\":60 \}"</code>
1558
1557
* </p>
1559
1558
* </li>
1560
1559
* <li>
@@ -1659,7 +1658,7 @@ export interface SecurityServicePolicyData {
1659
1658
* <p>Example: <code>WAFV2</code> - Firewall Manager support for WAF managed rule group versioning
1660
1659
* </p>
1661
1660
* <p>
1662
- * <code>"\{\"type \":\"WAFV2\",\"preProcessRuleGroups\":[\{\"ruleGroupArn\":null ,\"overrideAction\":\{\"type\":\"NONE\"\},\"managedRuleGroupIdentifier \":\{\"versionEnabled\": true,\"version \":\"Version_2.0\",\"vendorName\":\"AWS\",\" managedRuleGroupName\":\"AWSManagedRulesCommonRuleSet\"\} ,\"ruleGroupType \":\"ManagedRuleGroup \",\"excludeRules \":[\{\"name\":\"NoUserAgent_HEADER\"\}] \}],\"postProcessRuleGroups\":[],\"defaultAction\":\{\"type\":\"ALLOW\"\},\"overrideCustomerWebACLAssociation \":false ,\"loggingConfiguration \":\{\"logDestinationConfigs \":[\"arn:aws:firehose:us-west-2:12345678912:deliverystream/aws-waf-logs-fms-admin-destination\"] ,\"redactedFields \":[\{\"redactedFieldType\":\"SingleHeader\" ,\"redactedFieldValue \":\"Cookies\"\},\{\"redactedFieldType \":\"Method\"\}]\} \ }"</code>
1661
+ * <code>"\{\"preProcessRuleGroups \":[\{\"ruleGroupType\":\"ManagedRuleGroup\" ,\"overrideAction\":\{\"type\":\"NONE\"\},\"sampledRequestsEnabled \":true,\"managedRuleGroupIdentifier \":\{\" managedRuleGroupName\":\"AWSManagedRulesAdminProtectionRuleSet\" ,\"vendorName \":\"AWS \",\"managedRuleGroupConfigs \":null\} \}],\"postProcessRuleGroups\":[],\"defaultAction\":\{\"type\":\"ALLOW\"\},\"customRequestHandling \":null ,\"tokenDomains \":null,\"customResponse \":null ,\"type \":\"WAFV2\",\"overrideCustomerWebACLAssociation\":false ,\"sampledRequestsEnabledForDefaultActions \":true,\"optimizeUnassociatedWebACL\":true,\"webACLSource \":\"RETROFIT_EXISTING\" \ }"</code>
1663
1662
* </p>
1664
1663
* <p>
1665
1664
* To use a specific version of a WAF managed rule group in your Firewall Manager policy, you must set <code>versionEnabled</code> to <code>true</code>, and set <code>version</code> to the version you'd like to use. If you don't set <code>versionEnabled</code> to <code>true</code>, or if you omit <code>versionEnabled</code>, then Firewall Manager uses the default version of the WAF managed rule group.
@@ -1683,9 +1682,7 @@ export interface SecurityServicePolicyData {
1683
1682
* <p>Example: <code>WAF Classic</code>
1684
1683
* </p>
1685
1684
* <p>
1686
- * <code>"\{\"type\": \"WAF\", \"ruleGroups\":
1687
- * [\{\"id\":\"12345678-1bcd-9012-efga-0987654321ab\", \"overrideAction\" : \{\"type\":
1688
- * \"COUNT\"\}\}], \"defaultAction\": \{\"type\": \"BLOCK\"\}\ }"</code>
1685
+ * <code>"\{\"ruleGroups\":[\{\"id\":\"78cb36c0-1b5e-4d7d-82b2-cf48d3ad9659\",\"overrideAction\":\{\"type\":\"NONE\"\}\}],\"overrideCustomerWebACLAssociation\":true,\"defaultAction\":\{\"type\":\"ALLOW\"\},\"type\":\"WAF\"\ }"</code>
1689
1686
* </p>
1690
1687
* </li>
1691
1688
* </ul>
@@ -2305,6 +2302,9 @@ export interface GetViolationDetailsRequest {
2305
2302
* <p>The ID of the Firewall Manager policy that you want the details for. You can get violation details for the following policy types:</p>
2306
2303
* <ul>
2307
2304
* <li>
2305
+ * <p>WAF</p>
2306
+ * </li>
2307
+ * <li>
2308
2308
* <p>DNS Firewall</p>
2309
2309
* </li>
2310
2310
* <li>
@@ -2342,6 +2342,7 @@ export interface GetViolationDetailsRequest {
2342
2342
/**
2343
2343
* <p>The resource type. This is in the format shown in the <a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-template-resource-type-ref.html">Amazon Web Services Resource Types Reference</a>.
2344
2344
* Supported resource types are:
2345
+ * <code>AWS::WAFv2::WebACL</code>,
2345
2346
* <code>AWS::EC2::Instance</code>,
2346
2347
* <code>AWS::EC2::NetworkInterface</code>,
2347
2348
* <code>AWS::EC2::SecurityGroup</code>,
@@ -4257,6 +4258,42 @@ export interface ThirdPartyFirewallMissingSubnetViolation {
4257
4258
TargetViolationReason ?: string ;
4258
4259
}
4259
4260
4261
+ /**
4262
+ * <p>The violation details for a web ACL whose configuration is incompatible with the Firewall Manager policy. </p>
4263
+ * @public
4264
+ */
4265
+ export interface WebACLHasIncompatibleConfigurationViolation {
4266
+ /**
4267
+ * <p>The Amazon Resource Name (ARN) of the web ACL. </p>
4268
+ * @public
4269
+ */
4270
+ WebACLArn ?: string ;
4271
+
4272
+ /**
4273
+ * <p>Information about the problems that Firewall Manager encountered with the web ACL configuration. </p>
4274
+ * @public
4275
+ */
4276
+ Description ?: string ;
4277
+ }
4278
+
4279
+ /**
4280
+ * <p>The violation details for a web ACL that's associated with at least one resource that's out of scope of the Firewall Manager policy. </p>
4281
+ * @public
4282
+ */
4283
+ export interface WebACLHasOutOfScopeResourcesViolation {
4284
+ /**
4285
+ * <p>The Amazon Resource Name (ARN) of the web ACL. </p>
4286
+ * @public
4287
+ */
4288
+ WebACLArn ?: string ;
4289
+
4290
+ /**
4291
+ * <p>An array of Amazon Resource Name (ARN) for the resources that are out of scope of the policy and are associated with the web ACL. </p>
4292
+ * @public
4293
+ */
4294
+ OutOfScopeResourceList ?: string [ ] ;
4295
+ }
4296
+
4260
4297
/**
4261
4298
* <p>Violation detail based on resource type.</p>
4262
4299
* @public
@@ -4413,6 +4450,18 @@ export interface ResourceViolation {
4413
4450
* @public
4414
4451
*/
4415
4452
PossibleRemediationActions ?: PossibleRemediationActions ;
4453
+
4454
+ /**
4455
+ * <p>The violation details for a web ACL whose configuration is incompatible with the Firewall Manager policy. </p>
4456
+ * @public
4457
+ */
4458
+ WebACLHasIncompatibleConfigurationViolation ?: WebACLHasIncompatibleConfigurationViolation ;
4459
+
4460
+ /**
4461
+ * <p>The violation details for a web ACL that's associated with at least one resource that's out of scope of the Firewall Manager policy. </p>
4462
+ * @public
4463
+ */
4464
+ WebACLHasOutOfScopeResourcesViolation ?: WebACLHasOutOfScopeResourcesViolation ;
4416
4465
}
4417
4466
4418
4467
/**
0 commit comments