Slide 31
Slide 31 text
# フィールド名 データ型 サンプル値
1 metadata struct {product={version=2018-10-08, feature={uid=security-control/Config.1, name=Security Hub},
uid=arn:aws:securityhub:ap-northeast-1::product/aws/securityhub, vendor_name=AWS, name=Security Hub},
profiles=[cloud], version=1.0.0-rc.2}
2 time bigint 1707066633390
3 confidence int -
4 cloud struct {account_uid=123456789012, region=ap-northeast-1, provider=AWS}
5 resources array [{type=AwsAccount, uid=AWS::::Account:123456789012, cloud_partition=aws, region=ap-northeast-1,
labels=null, details=null, criticality=null}]
6 finding struct {created_time=1707066633390, uid=arn:aws:securityhub:ap-northeast-1:123456789012:security-
control/Config.1/finding/0a33f265-e171-4523-91ea-111bd9c3f4a8, desc=This AWS control checks whether the
Config service is enabled in the account for the local region and is recording all resources., title=AWS Config should
be enabled, modified_time=1707066633390, first_seen_time=1707066633390, last_seen_time=1707066637257,
related_events=null, types=[Software and Configuration Checks/Industry and Regulatory Standards],
remediation={desc=For information on how to correct this issue, consult the AWS Security Hub controls
documentation., kb_articles=[https://docs.aws.amazon.com/console/securityhub/Config.1/remediation]},
src_url=null}
7 compliance struct {status=FAILED, requirements=[CIS AWS Foundations Benchmark v1.2.0/2.5, CIS AWS Foundations Benchmark
v1.4.0/3.5, NIST.800-53.r5 CM-3, NIST.800-53.r5 CM-6(1), NIST.800-53.r5 CM-8, NIST.800-53.r5 CM-8(2), PCI
DSS v3.2.1/10.5.2, PCI DSS v3.2.1/11.5], status_detail=null}
8 malware array -
9 process struct {name=null, pid=null, file={path=null, type_id=0, name=''}, parent_process=null, created_time=null,
terminated_time=null}
10 vulnerbilities array -
11 class_name string Security Finding
12 class_uid int 2001
Security Hub Findings のスキーマ定義(1/2)
31