Skip to content

Commit c926466

Browse files
author
awstools
committed
feat(client-guardduty): Add support for Runtime Monitoring for ECS and ECS-EC2.
1 parent 2fc7b07 commit c926466

22 files changed

+708
-168
lines changed

clients/client-guardduty/README.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,9 @@
77
AWS SDK for JavaScript GuardDuty Client for Node.js, Browser and React Native.
88

99
<p>Amazon GuardDuty is a continuous security monitoring service that analyzes and processes
10-
the following data sources: VPC flow logs, Amazon Web Services CloudTrail management event logs, CloudTrail S3 data event
11-
logs, EKS audit logs, DNS logs, and Amazon EBS volume data.
10+
the following foundational data sources - VPC flow logs, Amazon Web Services CloudTrail management event logs, CloudTrail S3 data event
11+
logs, EKS audit logs, DNS logs, Amazon EBS volume data, runtime activity belonging to container workloads, such
12+
as Amazon EKS, Amazon ECS (including Amazon Web Services Fargate), and Amazon EC2 instances.
1213
It uses threat intelligence
1314
feeds, such as lists of malicious IPs and domains, and machine learning to identify
1415
unexpected, potentially unauthorized, and malicious activity within your Amazon Web Services environment.

clients/client-guardduty/src/GuardDuty.ts

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1381,8 +1381,9 @@ export interface GuardDuty {
13811381
/**
13821382
* @public
13831383
* <p>Amazon GuardDuty is a continuous security monitoring service that analyzes and processes
1384-
* the following data sources: VPC flow logs, Amazon Web Services CloudTrail management event logs, CloudTrail S3 data event
1385-
* logs, EKS audit logs, DNS logs, and Amazon EBS volume data.
1384+
* the following foundational data sources - VPC flow logs, Amazon Web Services CloudTrail management event logs, CloudTrail S3 data event
1385+
* logs, EKS audit logs, DNS logs, Amazon EBS volume data, runtime activity belonging to container workloads, such
1386+
* as Amazon EKS, Amazon ECS (including Amazon Web Services Fargate), and Amazon EC2 instances.
13861387
* It uses threat intelligence
13871388
* feeds, such as lists of malicious IPs and domains, and machine learning to identify
13881389
* unexpected, potentially unauthorized, and malicious activity within your Amazon Web Services environment.

clients/client-guardduty/src/GuardDutyClient.ts

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -544,8 +544,9 @@ export interface GuardDutyClientResolvedConfig extends GuardDutyClientResolvedCo
544544
/**
545545
* @public
546546
* <p>Amazon GuardDuty is a continuous security monitoring service that analyzes and processes
547-
* the following data sources: VPC flow logs, Amazon Web Services CloudTrail management event logs, CloudTrail S3 data event
548-
* logs, EKS audit logs, DNS logs, and Amazon EBS volume data.
547+
* the following foundational data sources - VPC flow logs, Amazon Web Services CloudTrail management event logs, CloudTrail S3 data event
548+
* logs, EKS audit logs, DNS logs, Amazon EBS volume data, runtime activity belonging to container workloads, such
549+
* as Amazon EKS, Amazon ECS (including Amazon Web Services Fargate), and Amazon EC2 instances.
549550
* It uses threat intelligence
550551
* feeds, such as lists of malicious IPs and domains, and machine learning to identify
551552
* unexpected, potentially unauthorized, and malicious activity within your Amazon Web Services environment.

clients/client-guardduty/src/commands/CreateDetectorCommand.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -74,11 +74,11 @@ export interface CreateDetectorCommandOutput extends CreateDetectorResponse, __M
7474
* },
7575
* Features: [ // DetectorFeatureConfigurations
7676
* { // DetectorFeatureConfiguration
77-
* Name: "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS",
77+
* Name: "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS" || "RUNTIME_MONITORING",
7878
* Status: "ENABLED" || "DISABLED",
7979
* AdditionalConfiguration: [ // DetectorAdditionalConfigurations
8080
* { // DetectorAdditionalConfiguration
81-
* Name: "EKS_ADDON_MANAGEMENT",
81+
* Name: "EKS_ADDON_MANAGEMENT" || "ECS_FARGATE_AGENT_MANAGEMENT",
8282
* Status: "ENABLED" || "DISABLED",
8383
* },
8484
* ],

clients/client-guardduty/src/commands/DescribeOrganizationConfigurationCommand.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -85,11 +85,11 @@ export interface DescribeOrganizationConfigurationCommandOutput
8585
* // },
8686
* // Features: [ // OrganizationFeaturesConfigurationsResults
8787
* // { // OrganizationFeatureConfigurationResult
88-
* // Name: "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS",
88+
* // Name: "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS" || "RUNTIME_MONITORING",
8989
* // AutoEnable: "NEW" || "NONE" || "ALL",
9090
* // AdditionalConfiguration: [ // OrganizationAdditionalConfigurationResults
9191
* // { // OrganizationAdditionalConfigurationResult
92-
* // Name: "EKS_ADDON_MANAGEMENT",
92+
* // Name: "EKS_ADDON_MANAGEMENT" || "ECS_FARGATE_AGENT_MANAGEMENT",
9393
* // AutoEnable: "NEW" || "NONE" || "ALL",
9494
* // },
9595
* // ],

clients/client-guardduty/src/commands/GetCoverageStatisticsCommand.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ export interface GetCoverageStatisticsCommandOutput extends GetCoverageStatistic
5252
* FilterCriteria: { // CoverageFilterCriteria
5353
* FilterCriterion: [ // CoverageFilterCriterionList
5454
* { // CoverageFilterCriterion
55-
* CriterionKey: "ACCOUNT_ID" || "CLUSTER_NAME" || "RESOURCE_TYPE" || "COVERAGE_STATUS" || "ADDON_VERSION" || "MANAGEMENT_TYPE" || "EKS_CLUSTER_NAME",
55+
* CriterionKey: "ACCOUNT_ID" || "CLUSTER_NAME" || "RESOURCE_TYPE" || "COVERAGE_STATUS" || "ADDON_VERSION" || "MANAGEMENT_TYPE" || "EKS_CLUSTER_NAME" || "ECS_CLUSTER_NAME" || "AGENT_VERSION" || "INSTANCE_ID" || "CLUSTER_ARN",
5656
* FilterCondition: { // CoverageFilterCondition
5757
* Equals: [ // Equals
5858
* "STRING_VALUE",

clients/client-guardduty/src/commands/GetDetectorCommand.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91,12 +91,12 @@ export interface GetDetectorCommandOutput extends GetDetectorResponse, __Metadat
9191
* // },
9292
* // Features: [ // DetectorFeatureConfigurationsResults
9393
* // { // DetectorFeatureConfigurationResult
94-
* // Name: "FLOW_LOGS" || "CLOUD_TRAIL" || "DNS_LOGS" || "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS",
94+
* // Name: "FLOW_LOGS" || "CLOUD_TRAIL" || "DNS_LOGS" || "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS" || "RUNTIME_MONITORING",
9595
* // Status: "ENABLED" || "DISABLED",
9696
* // UpdatedAt: new Date("TIMESTAMP"),
9797
* // AdditionalConfiguration: [ // DetectorAdditionalConfigurationResults
9898
* // { // DetectorAdditionalConfigurationResult
99-
* // Name: "EKS_ADDON_MANAGEMENT",
99+
* // Name: "EKS_ADDON_MANAGEMENT" || "ECS_FARGATE_AGENT_MANAGEMENT",
100100
* // Status: "ENABLED" || "DISABLED",
101101
* // UpdatedAt: new Date("TIMESTAMP"),
102102
* // },

clients/client-guardduty/src/commands/GetMemberDetectorsCommand.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -89,12 +89,12 @@ export interface GetMemberDetectorsCommandOutput extends GetMemberDetectorsRespo
8989
* // },
9090
* // Features: [ // MemberFeaturesConfigurationsResults
9191
* // { // MemberFeaturesConfigurationResult
92-
* // Name: "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS",
92+
* // Name: "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS" || "RUNTIME_MONITORING",
9393
* // Status: "ENABLED" || "DISABLED",
9494
* // UpdatedAt: new Date("TIMESTAMP"),
9595
* // AdditionalConfiguration: [ // MemberAdditionalConfigurationResults
9696
* // { // MemberAdditionalConfigurationResult
97-
* // Name: "EKS_ADDON_MANAGEMENT",
97+
* // Name: "EKS_ADDON_MANAGEMENT" || "ECS_FARGATE_AGENT_MANAGEMENT",
9898
* // Status: "ENABLED" || "DISABLED",
9999
* // UpdatedAt: new Date("TIMESTAMP"),
100100
* // },

clients/client-guardduty/src/commands/GetRemainingFreeTrialDaysCommand.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ export interface GetRemainingFreeTrialDaysCommandOutput extends GetRemainingFree
8181
* // },
8282
* // Features: [ // FreeTrialFeatureConfigurationsResults
8383
* // { // FreeTrialFeatureConfigurationResult
84-
* // Name: "FLOW_LOGS" || "CLOUD_TRAIL" || "DNS_LOGS" || "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS",
84+
* // Name: "FLOW_LOGS" || "CLOUD_TRAIL" || "DNS_LOGS" || "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS" || "FARGATE_RUNTIME_MONITORING" || "EC2_RUNTIME_MONITORING",
8585
* // FreeTrialDaysRemaining: Number("int"),
8686
* // },
8787
* // ],

clients/client-guardduty/src/commands/GetUsageStatisticsCommand.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ export interface GetUsageStatisticsCommandOutput extends GetUsageStatisticsRespo
6161
* "STRING_VALUE",
6262
* ],
6363
* Features: [ // UsageFeatureList
64-
* "FLOW_LOGS" || "CLOUD_TRAIL" || "DNS_LOGS" || "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "LAMBDA_NETWORK_LOGS" || "EKS_RUNTIME_MONITORING",
64+
* "FLOW_LOGS" || "CLOUD_TRAIL" || "DNS_LOGS" || "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "LAMBDA_NETWORK_LOGS" || "EKS_RUNTIME_MONITORING" || "FARGATE_RUNTIME_MONITORING" || "EC2_RUNTIME_MONITORING",
6565
* ],
6666
* },
6767
* Unit: "STRING_VALUE",
@@ -110,7 +110,7 @@ export interface GetUsageStatisticsCommandOutput extends GetUsageStatisticsRespo
110110
* // ],
111111
* // SumByFeature: [ // UsageFeatureResultList
112112
* // { // UsageFeatureResult
113-
* // Feature: "FLOW_LOGS" || "CLOUD_TRAIL" || "DNS_LOGS" || "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "LAMBDA_NETWORK_LOGS" || "EKS_RUNTIME_MONITORING",
113+
* // Feature: "FLOW_LOGS" || "CLOUD_TRAIL" || "DNS_LOGS" || "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "LAMBDA_NETWORK_LOGS" || "EKS_RUNTIME_MONITORING" || "FARGATE_RUNTIME_MONITORING" || "EC2_RUNTIME_MONITORING",
114114
* // Total: {
115115
* // Amount: "STRING_VALUE",
116116
* // Unit: "STRING_VALUE",

clients/client-guardduty/src/commands/ListCoverageCommand.ts

Lines changed: 26 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ export interface ListCoverageCommandOutput extends ListCoverageResponse, __Metad
5454
* FilterCriteria: { // CoverageFilterCriteria
5555
* FilterCriterion: [ // CoverageFilterCriterionList
5656
* { // CoverageFilterCriterion
57-
* CriterionKey: "ACCOUNT_ID" || "CLUSTER_NAME" || "RESOURCE_TYPE" || "COVERAGE_STATUS" || "ADDON_VERSION" || "MANAGEMENT_TYPE" || "EKS_CLUSTER_NAME",
57+
* CriterionKey: "ACCOUNT_ID" || "CLUSTER_NAME" || "RESOURCE_TYPE" || "COVERAGE_STATUS" || "ADDON_VERSION" || "MANAGEMENT_TYPE" || "EKS_CLUSTER_NAME" || "ECS_CLUSTER_NAME" || "AGENT_VERSION" || "INSTANCE_ID" || "CLUSTER_ARN",
5858
* FilterCondition: { // CoverageFilterCondition
5959
* Equals: [ // Equals
6060
* "STRING_VALUE",
@@ -67,7 +67,7 @@ export interface ListCoverageCommandOutput extends ListCoverageResponse, __Metad
6767
* ],
6868
* },
6969
* SortCriteria: { // CoverageSortCriteria
70-
* AttributeName: "ACCOUNT_ID" || "CLUSTER_NAME" || "COVERAGE_STATUS" || "ISSUE" || "ADDON_VERSION" || "UPDATED_AT" || "EKS_CLUSTER_NAME",
70+
* AttributeName: "ACCOUNT_ID" || "CLUSTER_NAME" || "COVERAGE_STATUS" || "ISSUE" || "ADDON_VERSION" || "UPDATED_AT" || "EKS_CLUSTER_NAME" || "ECS_CLUSTER_NAME" || "INSTANCE_ID",
7171
* OrderBy: "ASC" || "DESC",
7272
* },
7373
* };
@@ -88,9 +88,31 @@ export interface ListCoverageCommandOutput extends ListCoverageResponse, __Metad
8888
* // AddonVersion: "STRING_VALUE",
8989
* // AddonStatus: "STRING_VALUE",
9090
* // },
91-
* // ManagementType: "AUTO_MANAGED" || "MANUAL",
91+
* // ManagementType: "AUTO_MANAGED" || "MANUAL" || "DISABLED",
92+
* // },
93+
* // ResourceType: "EKS" || "ECS" || "EC2",
94+
* // EcsClusterDetails: { // CoverageEcsClusterDetails
95+
* // ClusterName: "STRING_VALUE",
96+
* // FargateDetails: { // FargateDetails
97+
* // Issues: [ // Issues
98+
* // "STRING_VALUE",
99+
* // ],
100+
* // ManagementType: "AUTO_MANAGED" || "MANUAL" || "DISABLED",
101+
* // },
102+
* // ContainerInstanceDetails: { // ContainerInstanceDetails
103+
* // CoveredContainerInstances: Number("long"),
104+
* // CompatibleContainerInstances: Number("long"),
105+
* // },
106+
* // },
107+
* // Ec2InstanceDetails: { // CoverageEc2InstanceDetails
108+
* // InstanceId: "STRING_VALUE",
109+
* // InstanceType: "STRING_VALUE",
110+
* // ClusterArn: "STRING_VALUE",
111+
* // AgentDetails: { // AgentDetails
112+
* // Version: "STRING_VALUE",
113+
* // },
114+
* // ManagementType: "AUTO_MANAGED" || "MANUAL" || "DISABLED",
92115
* // },
93-
* // ResourceType: "EKS",
94116
* // },
95117
* // CoverageStatus: "HEALTHY" || "UNHEALTHY",
96118
* // Issue: "STRING_VALUE",

clients/client-guardduty/src/commands/ListIPSetsCommand.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ import {
1515
} from "@smithy/types";
1616

1717
import { GuardDutyClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../GuardDutyClient";
18-
import { ListIPSetsRequest, ListIPSetsResponse } from "../models/models_0";
18+
import { ListIPSetsRequest, ListIPSetsResponse } from "../models/models_1";
1919
import { de_ListIPSetsCommand, se_ListIPSetsCommand } from "../protocols/Aws_restJson1";
2020

2121
/**

clients/client-guardduty/src/commands/ListInvitationsCommand.ts

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,8 @@ import {
1515
} from "@smithy/types";
1616

1717
import { GuardDutyClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../GuardDutyClient";
18-
import { ListInvitationsRequest, ListInvitationsResponse } from "../models/models_0";
18+
import { ListInvitationsRequest } from "../models/models_0";
19+
import { ListInvitationsResponse } from "../models/models_1";
1920
import { de_ListInvitationsCommand, se_ListInvitationsCommand } from "../protocols/Aws_restJson1";
2021

2122
/**

clients/client-guardduty/src/commands/ListMembersCommand.ts

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,7 @@ import {
1515
} from "@smithy/types";
1616

1717
import { GuardDutyClientResolvedConfig, ServiceInputTypes, ServiceOutputTypes } from "../GuardDutyClient";
18-
import { ListMembersRequest } from "../models/models_0";
19-
import { ListMembersResponse } from "../models/models_1";
18+
import { ListMembersRequest, ListMembersResponse } from "../models/models_1";
2019
import { de_ListMembersCommand, se_ListMembersCommand } from "../protocols/Aws_restJson1";
2120

2221
/**

clients/client-guardduty/src/commands/UpdateDetectorCommand.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,11 +68,11 @@ export interface UpdateDetectorCommandOutput extends UpdateDetectorResponse, __M
6868
* },
6969
* Features: [ // DetectorFeatureConfigurations
7070
* { // DetectorFeatureConfiguration
71-
* Name: "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS",
71+
* Name: "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS" || "RUNTIME_MONITORING",
7272
* Status: "ENABLED" || "DISABLED",
7373
* AdditionalConfiguration: [ // DetectorAdditionalConfigurations
7474
* { // DetectorAdditionalConfiguration
75-
* Name: "EKS_ADDON_MANAGEMENT",
75+
* Name: "EKS_ADDON_MANAGEMENT" || "ECS_FARGATE_AGENT_MANAGEMENT",
7676
* Status: "ENABLED" || "DISABLED",
7777
* },
7878
* ],

clients/client-guardduty/src/commands/UpdateMemberDetectorsCommand.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -69,11 +69,11 @@ export interface UpdateMemberDetectorsCommandOutput extends UpdateMemberDetector
6969
* },
7070
* Features: [ // MemberFeaturesConfigurations
7171
* { // MemberFeaturesConfiguration
72-
* Name: "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS",
72+
* Name: "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS" || "RUNTIME_MONITORING",
7373
* Status: "ENABLED" || "DISABLED",
7474
* AdditionalConfiguration: [ // MemberAdditionalConfigurations
7575
* { // MemberAdditionalConfiguration
76-
* Name: "EKS_ADDON_MANAGEMENT",
76+
* Name: "EKS_ADDON_MANAGEMENT" || "ECS_FARGATE_AGENT_MANAGEMENT",
7777
* Status: "ENABLED" || "DISABLED",
7878
* },
7979
* ],

clients/client-guardduty/src/commands/UpdateOrganizationConfigurationCommand.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -75,11 +75,11 @@ export interface UpdateOrganizationConfigurationCommandOutput
7575
* },
7676
* Features: [ // OrganizationFeaturesConfigurations
7777
* { // OrganizationFeatureConfiguration
78-
* Name: "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS",
78+
* Name: "S3_DATA_EVENTS" || "EKS_AUDIT_LOGS" || "EBS_MALWARE_PROTECTION" || "RDS_LOGIN_EVENTS" || "EKS_RUNTIME_MONITORING" || "LAMBDA_NETWORK_LOGS" || "RUNTIME_MONITORING",
7979
* AutoEnable: "NEW" || "NONE" || "ALL",
8080
* AdditionalConfiguration: [ // OrganizationAdditionalConfigurations
8181
* { // OrganizationAdditionalConfiguration
82-
* Name: "EKS_ADDON_MANAGEMENT",
82+
* Name: "EKS_ADDON_MANAGEMENT" || "ECS_FARGATE_AGENT_MANAGEMENT",
8383
* AutoEnable: "NEW" || "NONE" || "ALL",
8484
* },
8585
* ],

clients/client-guardduty/src/index.ts

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,9 @@
22
/* eslint-disable */
33
/**
44
* <p>Amazon GuardDuty is a continuous security monitoring service that analyzes and processes
5-
* the following data sources: VPC flow logs, Amazon Web Services CloudTrail management event logs, CloudTrail S3 data event
6-
* logs, EKS audit logs, DNS logs, and Amazon EBS volume data.
5+
* the following foundational data sources - VPC flow logs, Amazon Web Services CloudTrail management event logs, CloudTrail S3 data event
6+
* logs, EKS audit logs, DNS logs, Amazon EBS volume data, runtime activity belonging to container workloads, such
7+
* as Amazon EKS, Amazon ECS (including Amazon Web Services Fargate), and Amazon EC2 instances.
78
* It uses threat intelligence
89
* feeds, such as lists of malicious IPs and domains, and machine learning to identify
910
* unexpected, potentially unauthorized, and malicious activity within your Amazon Web Services environment.

0 commit comments

Comments
 (0)