finding.proto 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339
  1. // Copyright 2022 Google LLC
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. syntax = "proto3";
  15. package google.cloud.securitycenter.v1;
  16. import "google/api/field_behavior.proto";
  17. import "google/api/resource.proto";
  18. import "google/cloud/securitycenter/v1/access.proto";
  19. import "google/cloud/securitycenter/v1/compliance.proto";
  20. import "google/cloud/securitycenter/v1/connection.proto";
  21. import "google/cloud/securitycenter/v1/contact_details.proto";
  22. import "google/cloud/securitycenter/v1/container.proto";
  23. import "google/cloud/securitycenter/v1/database.proto";
  24. import "google/cloud/securitycenter/v1/exfiltration.proto";
  25. import "google/cloud/securitycenter/v1/external_system.proto";
  26. import "google/cloud/securitycenter/v1/file.proto";
  27. import "google/cloud/securitycenter/v1/iam_binding.proto";
  28. import "google/cloud/securitycenter/v1/indicator.proto";
  29. import "google/cloud/securitycenter/v1/kubernetes.proto";
  30. import "google/cloud/securitycenter/v1/mitre_attack.proto";
  31. import "google/cloud/securitycenter/v1/process.proto";
  32. import "google/cloud/securitycenter/v1/security_marks.proto";
  33. import "google/cloud/securitycenter/v1/vulnerability.proto";
  34. import "google/protobuf/struct.proto";
  35. import "google/protobuf/timestamp.proto";
  36. option csharp_namespace = "Google.Cloud.SecurityCenter.V1";
  37. option go_package = "google.golang.org/genproto/googleapis/cloud/securitycenter/v1;securitycenter";
  38. option java_multiple_files = true;
  39. option java_package = "com.google.cloud.securitycenter.v1";
  40. option php_namespace = "Google\\Cloud\\SecurityCenter\\V1";
  41. option ruby_package = "Google::Cloud::SecurityCenter::V1";
  42. // Security Command Center finding.
  43. //
  44. // A finding is a record of assessment data like security, risk, health, or
  45. // privacy, that is ingested into Security Command Center for presentation,
  46. // notification, analysis, policy testing, and enforcement. For example, a
  47. // cross-site scripting (XSS) vulnerability in an App Engine application is a
  48. // finding.
  49. message Finding {
  50. option (google.api.resource) = {
  51. type: "securitycenter.googleapis.com/Finding"
  52. pattern: "organizations/{organization}/sources/{source}/findings/{finding}"
  53. pattern: "folders/{folder}/sources/{source}/findings/{finding}"
  54. pattern: "projects/{project}/sources/{source}/findings/{finding}"
  55. };
  56. // The state of the finding.
  57. enum State {
  58. // Unspecified state.
  59. STATE_UNSPECIFIED = 0;
  60. // The finding requires attention and has not been addressed yet.
  61. ACTIVE = 1;
  62. // The finding has been fixed, triaged as a non-issue or otherwise addressed
  63. // and is no longer active.
  64. INACTIVE = 2;
  65. }
  66. // The severity of the finding.
  67. enum Severity {
  68. // This value is used for findings when a source doesn't write a severity
  69. // value.
  70. SEVERITY_UNSPECIFIED = 0;
  71. // Vulnerability:
  72. // A critical vulnerability is easily discoverable by an external actor,
  73. // exploitable, and results in the direct ability to execute arbitrary code,
  74. // exfiltrate data, and otherwise gain additional access and privileges to
  75. // cloud resources and workloads. Examples include publicly accessible
  76. // unprotected user data, public SSH access with weak or no passwords, etc.
  77. //
  78. // Threat:
  79. // Indicates a threat that is able to access, modify, or delete data or
  80. // execute unauthorized code within existing resources.
  81. CRITICAL = 1;
  82. // Vulnerability:
  83. // A high risk vulnerability can be easily discovered and exploited in
  84. // combination with other vulnerabilities in order to gain direct access and
  85. // the ability to execute arbitrary code, exfiltrate data, and otherwise
  86. // gain additional access and privileges to cloud resources and workloads.
  87. // An example is a database with weak or no passwords that is only
  88. // accessible internally. This database could easily be compromised by an
  89. // actor that had access to the internal network.
  90. //
  91. // Threat:
  92. // Indicates a threat that is able to create new computational resources in
  93. // an environment but not able to access data or execute code in existing
  94. // resources.
  95. HIGH = 2;
  96. // Vulnerability:
  97. // A medium risk vulnerability could be used by an actor to gain access to
  98. // resources or privileges that enable them to eventually (through multiple
  99. // steps or a complex exploit) gain access and the ability to execute
  100. // arbitrary code or exfiltrate data. An example is a service account with
  101. // access to more projects than it should have. If an actor gains access to
  102. // the service account, they could potentially use that access to manipulate
  103. // a project the service account was not intended to.
  104. //
  105. // Threat:
  106. // Indicates a threat that is able to cause operational impact but may not
  107. // access data or execute unauthorized code.
  108. MEDIUM = 3;
  109. // Vulnerability:
  110. // A low risk vulnerability hampers a security organization's ability to
  111. // detect vulnerabilities or active threats in their deployment, or prevents
  112. // the root cause investigation of security issues. An example is monitoring
  113. // and logs being disabled for resource configurations and access.
  114. //
  115. // Threat:
  116. // Indicates a threat that has obtained minimal access to an environment but
  117. // is not able to access data, execute code, or create resources.
  118. LOW = 4;
  119. }
  120. // Mute state a finding can be in.
  121. enum Mute {
  122. // Unspecified.
  123. MUTE_UNSPECIFIED = 0;
  124. // Finding has been muted.
  125. MUTED = 1;
  126. // Finding has been unmuted.
  127. UNMUTED = 2;
  128. // Finding has never been muted/unmuted.
  129. UNDEFINED = 4;
  130. }
  131. // Represents what kind of Finding it is.
  132. enum FindingClass {
  133. // Unspecified finding class.
  134. FINDING_CLASS_UNSPECIFIED = 0;
  135. // Describes unwanted or malicious activity.
  136. THREAT = 1;
  137. // Describes a potential weakness in software that increases risk to
  138. // Confidentiality & Integrity & Availability.
  139. VULNERABILITY = 2;
  140. // Describes a potential weakness in cloud resource/asset configuration that
  141. // increases risk.
  142. MISCONFIGURATION = 3;
  143. // Describes a security observation that is for informational purposes.
  144. OBSERVATION = 4;
  145. // Describes an error that prevents some SCC functionality.
  146. SCC_ERROR = 5;
  147. }
  148. // The relative resource name of this finding. See:
  149. // https://cloud.google.com/apis/design/resource_names#relative_resource_name
  150. // Example:
  151. // "organizations/{organization_id}/sources/{source_id}/findings/{finding_id}"
  152. string name = 1;
  153. // The relative resource name of the source the finding belongs to. See:
  154. // https://cloud.google.com/apis/design/resource_names#relative_resource_name
  155. // This field is immutable after creation time.
  156. // For example:
  157. // "organizations/{organization_id}/sources/{source_id}"
  158. string parent = 2;
  159. // For findings on Google Cloud resources, the full resource
  160. // name of the Google Cloud resource this finding is for. See:
  161. // https://cloud.google.com/apis/design/resource_names#full_resource_name
  162. // When the finding is for a non-Google Cloud resource, the resourceName can
  163. // be a customer or partner defined string. This field is immutable after
  164. // creation time.
  165. string resource_name = 3;
  166. // The state of the finding.
  167. State state = 4;
  168. // The additional taxonomy group within findings from a given source.
  169. // This field is immutable after creation time.
  170. // Example: "XSS_FLASH_INJECTION"
  171. string category = 5;
  172. // The URI that, if available, points to a web page outside of Security
  173. // Command Center where additional information about the finding can be found.
  174. // This field is guaranteed to be either empty or a well formed URL.
  175. string external_uri = 6;
  176. // Source specific properties. These properties are managed by the source
  177. // that writes the finding. The key names in the source_properties map must be
  178. // between 1 and 255 characters, and must start with a letter and contain
  179. // alphanumeric characters or underscores only.
  180. map<string, google.protobuf.Value> source_properties = 7;
  181. // Output only. User specified security marks. These marks are entirely
  182. // managed by the user and come from the SecurityMarks resource that belongs
  183. // to the finding.
  184. SecurityMarks security_marks = 8 [(google.api.field_behavior) = OUTPUT_ONLY];
  185. // The time the finding was first detected. If an existing finding is updated,
  186. // then this is the time the update occurred.
  187. // For example, if the finding represents an open firewall, this property
  188. // captures the time the detector believes the firewall became open. The
  189. // accuracy is determined by the detector. If the finding is later resolved,
  190. // then this time reflects when the finding was resolved. This must not
  191. // be set to a value greater than the current timestamp.
  192. google.protobuf.Timestamp event_time = 9;
  193. // The time at which the finding was created in Security Command Center.
  194. google.protobuf.Timestamp create_time = 10;
  195. // The severity of the finding. This field is managed by the source that
  196. // writes the finding.
  197. Severity severity = 12;
  198. // The canonical name of the finding. It's either
  199. // "organizations/{organization_id}/sources/{source_id}/findings/{finding_id}",
  200. // "folders/{folder_id}/sources/{source_id}/findings/{finding_id}" or
  201. // "projects/{project_number}/sources/{source_id}/findings/{finding_id}",
  202. // depending on the closest CRM ancestor of the resource associated with the
  203. // finding.
  204. string canonical_name = 14;
  205. // Indicates the mute state of a finding (either muted, unmuted
  206. // or undefined). Unlike other attributes of a finding, a finding provider
  207. // shouldn't set the value of mute.
  208. Mute mute = 15;
  209. // The class of the finding.
  210. FindingClass finding_class = 17;
  211. // Represents what's commonly known as an Indicator of compromise (IoC) in
  212. // computer forensics. This is an artifact observed on a network or in an
  213. // operating system that, with high confidence, indicates a computer
  214. // intrusion.
  215. // Reference: https://en.wikipedia.org/wiki/Indicator_of_compromise
  216. Indicator indicator = 18;
  217. // Represents vulnerability specific fields like cve, cvss scores etc.
  218. // CVE stands for Common Vulnerabilities and Exposures
  219. // (https://cve.mitre.org/about/)
  220. Vulnerability vulnerability = 20;
  221. // Output only. The most recent time this finding was muted or unmuted.
  222. google.protobuf.Timestamp mute_update_time = 21 [(google.api.field_behavior) = OUTPUT_ONLY];
  223. // Output only. Third party SIEM/SOAR fields within SCC, contains external system
  224. // information and external system finding fields.
  225. map<string, ExternalSystem> external_systems = 22 [(google.api.field_behavior) = OUTPUT_ONLY];
  226. // MITRE ATT&CK tactics and techniques related to this finding.
  227. // See: https://attack.mitre.org
  228. MitreAttack mitre_attack = 25;
  229. // Access details associated to the Finding, such as more information on the
  230. // caller, which method was accessed, from where, etc.
  231. Access access = 26;
  232. // Contains information about the IP connection associated with the finding.
  233. repeated Connection connections = 31;
  234. // First known as mute_annotation. Records additional information about the
  235. // mute operation e.g. mute config that muted the finding, user who muted the
  236. // finding, etc. Unlike other attributes of a finding, a finding provider
  237. // shouldn't set the value of mute.
  238. string mute_initiator = 28;
  239. // Represents operating system processes associated with the Finding.
  240. repeated Process processes = 30;
  241. // Output only. Map containing the points of contact for the given finding. The key
  242. // represents the type of contact, while the value contains a list of all the
  243. // contacts that pertain. Please refer to:
  244. // https://cloud.google.com/resource-manager/docs/managing-notification-contacts#notification-categories
  245. //
  246. // {
  247. // "security": {
  248. // "contacts": [
  249. // {
  250. // "email": "person1@company.com"
  251. // },
  252. // {
  253. // "email": "person2@company.com"
  254. // }
  255. // ]
  256. // }
  257. // }
  258. map<string, ContactDetails> contacts = 33 [(google.api.field_behavior) = OUTPUT_ONLY];
  259. // Contains compliance information for security standards associated to the
  260. // finding.
  261. repeated Compliance compliances = 34;
  262. // Output only. The human readable display name of the finding source such as
  263. // "Event Threat Detection" or "Security Health Analytics".
  264. string parent_display_name = 36 [(google.api.field_behavior) = OUTPUT_ONLY];
  265. // Contains more detail about the finding.
  266. string description = 37;
  267. // Represents exfiltration associated with the Finding.
  268. Exfiltration exfiltration = 38;
  269. // Represents IAM bindings associated with the Finding.
  270. repeated IamBinding iam_bindings = 39;
  271. // Next steps associate to the finding.
  272. string next_steps = 40;
  273. // Containers associated with the finding. containers provides information
  274. // for both Kubernetes and non-Kubernetes containers.
  275. repeated Container containers = 42;
  276. // Kubernetes resources associated with the finding.
  277. Kubernetes kubernetes = 43;
  278. // Database associated with the finding.
  279. Database database = 44;
  280. // File associated with the finding.
  281. repeated File files = 46;
  282. }