logging.proto 4.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146
  1. // Copyright 2022 Google LLC
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. syntax = "proto3";
  15. package cloud.kubernetes.security.containersecurity_logging;
  16. import "google/protobuf/timestamp.proto";
  17. option csharp_namespace = "Google.Cloud.Kubernetes.Security.ContainerSecurity.Logging";
  18. option go_package = "google.golang.org/genproto/googleapis/cloud/kubernetes/security/containersecurity_logging;containersecurity_logging";
  19. option java_multiple_files = true;
  20. option java_outer_classname = "ContainerSecurityLoggingProto";
  21. option java_package = "com.google.cloud.kubernetes.security.containersecurity.logging";
  22. option php_namespace = "Google\\Cloud\\Kubernetes\\Security\\ContainerSecurity\\Logging";
  23. option ruby_package = "Google::Cloud::Kubernetes::Security::ContainerSecurity::Logging";
  24. // Identifies a package vulnerability found within a workload.
  25. message Vulnerability {
  26. // package name where vulnerability detected
  27. string package_name = 1;
  28. // affected package version
  29. string affected_package_version = 2;
  30. // title of vulnerability assigned by CVE
  31. string cve_id = 3;
  32. // cpe_uri where vulnerability detected
  33. string cpe_uri = 4;
  34. // assigned severity for vulnerability
  35. Severity severity = 5;
  36. // overall CVSS score
  37. float cvss_score = 6;
  38. // detailed CVSS score, format `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N`
  39. string cvss_vector = 7;
  40. // cpe_uri where vulnerability is fixed
  41. string fixed_cpe_uri = 8;
  42. // type of package (os, maven, go)
  43. string package_type = 9;
  44. // package name where vulnerability is fixed
  45. string fixed_package = 10;
  46. // fixed package version
  47. string fixed_package_version = 11;
  48. // detailed description
  49. string description = 12;
  50. // reference URL for source CVE database
  51. repeated string related_urls = 13;
  52. // affected images
  53. repeated string affected_images = 14;
  54. }
  55. // A security concern for an asset(i.e cluster, workload, etc). Each finding
  56. // corresponds to a type of security concern. A finding is created during the
  57. // scan of an asset by any one of the GKE Security Posture features that are
  58. // enabled.
  59. message Finding {
  60. // The current state of the finding(e.g still active, has been fixed etc).
  61. enum State {
  62. // Default value, only used to determine that nothing was specified.
  63. STATE_UNSPECIFIED = 0;
  64. // Active state means that the finding exists on the asset.
  65. ACTIVE = 1;
  66. // Remediated means that the finding has been fixed on the asset.
  67. REMEDIATED = 2;
  68. }
  69. // Fully qualified resource name of the k8s resource, e.g.:
  70. // {api}/{version}/namespaces/{namespace}/{kind}/{workload name}
  71. string resource_name = 1;
  72. // The type of security finding this is.
  73. FindingType type = 2;
  74. // State determines whether the finding still exists or has been resolved.
  75. State state = 3;
  76. // The human readable representation of the specific security finding.
  77. // e.g. RUN_AS_NONROOT, CVE_ID_0 etc depending on the type.
  78. string finding = 4;
  79. // Severity determines the recommended actions for this finding.
  80. Severity severity = 5;
  81. // The time this finding was found/remediated.
  82. google.protobuf.Timestamp event_time = 6;
  83. // Specific details about the security finding if there are any.
  84. oneof details {
  85. Vulnerability vulnerability = 7;
  86. }
  87. }
  88. // FindingType is an enumeration of all possible finding types in GKE Security
  89. // Posture.
  90. enum FindingType {
  91. // Default value, unspecified.
  92. FINDING_TYPE_UNSPECIFIED = 0;
  93. // Workload misconfiguration policy audit.
  94. FINDING_TYPE_MISCONFIG = 1;
  95. // Workload vulnerabilities scanning.
  96. FINDING_TYPE_VULNERABILITY = 2;
  97. }
  98. // Severity is an enumeration of all the possible severities of a violation.
  99. enum Severity {
  100. // Default value, only used to determine that nothing was specified.
  101. SEVERITY_UNSPECIFIED = 0;
  102. // SEVERITY_CRITICAL recommends taking action immediately.
  103. SEVERITY_CRITICAL = 1;
  104. // SEVERITY_HIGH recommends taking action if possible.
  105. SEVERITY_HIGH = 2;
  106. // SEVERITY_MEDIUM recommends investigation.
  107. SEVERITY_MEDIUM = 3;
  108. // SEVERITY_LOW recommends being aware of the problem.
  109. SEVERITY_LOW = 4;
  110. }