Skip to content

Commit ff576e7

Browse files
author
awstools
committed
docs(client-auditmanager): This release adds documentation updates for Audit Manager. We provided examples of how to use the Custom_ prefix for the keywordValue attribute. We also provided more details about the DeleteAssessmentReport operation.
1 parent 9a4c9f8 commit ff576e7

File tree

4 files changed

+110
-8
lines changed

4 files changed

+110
-8
lines changed

clients/client-auditmanager/src/AuditManager.ts

+21-1
Original file line numberDiff line numberDiff line change
@@ -757,7 +757,27 @@ export class AuditManager extends AuditManagerClient {
757757
}
758758

759759
/**
760-
* <p> Deletes an assessment report from an assessment in Audit Manager. </p>
760+
* <p>Deletes an assessment report in Audit Manager. </p>
761+
* <p>When you run the <code>DeleteAssessmentReport</code> operation, Audit Manager attempts to delete the following data:</p>
762+
* <ol>
763+
* <li>
764+
* <p>The specified assessment report that’s stored in your S3 bucket</p>
765+
* </li>
766+
* <li>
767+
* <p>The associated metadata that’s stored in Audit Manager</p>
768+
* </li>
769+
* </ol>
770+
* <p>If Audit Manager can’t access the assessment report in your S3 bucket, the report
771+
* isn’t deleted. In this event, the <code>DeleteAssessmentReport</code> operation doesn’t
772+
* fail. Instead, it proceeds to delete the associated metadata only. You must then delete the
773+
* assessment report from the S3 bucket yourself. </p>
774+
* <p>This scenario happens when Audit Manager receives a <code>403 (Forbidden)</code> or
775+
* <code>404 (Not Found)</code> error from Amazon S3. To avoid this, make sure that
776+
* your S3 bucket is available, and that you configured the correct permissions for Audit Manager to delete resources in your S3 bucket. For an example permissions policy that
777+
* you can use, see <a href="https://docs.aws.amazon.com/audit-manager/latest/userguide/security_iam_id-based-policy-examples.html#full-administrator-access-assessment-report-destination">Assessment report destination permissions</a> in the <i>Audit Manager User Guide</i>. For information about the issues that could cause a <code>403
778+
* (Forbidden)</code> or <code>404 (Not Found</code>) error from Amazon S3, see
779+
* <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/ErrorResponses.html#ErrorCodeList">List of Error Codes</a> in the <i>Amazon Simple Storage Service API
780+
* Reference</i>. </p>
761781
*/
762782
public deleteAssessmentReport(
763783
args: DeleteAssessmentReportCommandInput,

clients/client-auditmanager/src/commands/DeleteAssessmentReportCommand.ts

+21-1
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,27 @@ export interface DeleteAssessmentReportCommandInput extends DeleteAssessmentRepo
2222
export interface DeleteAssessmentReportCommandOutput extends DeleteAssessmentReportResponse, __MetadataBearer {}
2323

2424
/**
25-
* <p> Deletes an assessment report from an assessment in Audit Manager. </p>
25+
* <p>Deletes an assessment report in Audit Manager. </p>
26+
* <p>When you run the <code>DeleteAssessmentReport</code> operation, Audit Manager attempts to delete the following data:</p>
27+
* <ol>
28+
* <li>
29+
* <p>The specified assessment report that’s stored in your S3 bucket</p>
30+
* </li>
31+
* <li>
32+
* <p>The associated metadata that’s stored in Audit Manager</p>
33+
* </li>
34+
* </ol>
35+
* <p>If Audit Manager can’t access the assessment report in your S3 bucket, the report
36+
* isn’t deleted. In this event, the <code>DeleteAssessmentReport</code> operation doesn’t
37+
* fail. Instead, it proceeds to delete the associated metadata only. You must then delete the
38+
* assessment report from the S3 bucket yourself. </p>
39+
* <p>This scenario happens when Audit Manager receives a <code>403 (Forbidden)</code> or
40+
* <code>404 (Not Found)</code> error from Amazon S3. To avoid this, make sure that
41+
* your S3 bucket is available, and that you configured the correct permissions for Audit Manager to delete resources in your S3 bucket. For an example permissions policy that
42+
* you can use, see <a href="https://docs.aws.amazon.com/audit-manager/latest/userguide/security_iam_id-based-policy-examples.html#full-administrator-access-assessment-report-destination">Assessment report destination permissions</a> in the <i>Audit Manager User Guide</i>. For information about the issues that could cause a <code>403
43+
* (Forbidden)</code> or <code>404 (Not Found</code>) error from Amazon S3, see
44+
* <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/ErrorResponses.html#ErrorCodeList">List of Error Codes</a> in the <i>Amazon Simple Storage Service API
45+
* Reference</i>. </p>
2646
* @example
2747
* Use a bare-bones client and the command you need to make an API call.
2848
* ```javascript

clients/client-auditmanager/src/models/models_0.ts

+65-3
Original file line numberDiff line numberDiff line change
@@ -1804,13 +1804,75 @@ export enum KeywordInputType {
18041804
*/
18051805
export interface SourceKeyword {
18061806
/**
1807-
* <p> The method of input for the keyword. </p>
1807+
* <p> The input method for the keyword. </p>
18081808
*/
18091809
keywordInputType?: KeywordInputType | string;
18101810

18111811
/**
1812-
* <p> The value of the keyword that's used to search CloudTrail logs, Config rules, Security Hub checks, and Amazon Web Services API names
1813-
* when mapping a control data source. </p>
1812+
* <p> The value of the keyword that's used when mapping a control data source. For example,
1813+
* this can be a CloudTrail event name, a rule name for Config, a
1814+
* Security Hub control, or the name of an Amazon Web Services API call. </p>
1815+
* <p>If you’re mapping a data source to a rule in Config, the
1816+
* <code>keywordValue</code> that you specify depends on the type of rule:</p>
1817+
* <ul>
1818+
* <li>
1819+
* <p>For <a href="https://docs.aws.amazon.com/config/latest/developerguide/evaluate-config_use-managed-rules.html">managed rules</a>, you can use the rule identifier as the
1820+
* <code>keywordValue</code>. You can find the rule identifier from the <a href="https://docs.aws.amazon.com/config/latest/developerguide/managed-rules-by-aws-config.html">list of Config managed rules</a>.</p>
1821+
* <ul>
1822+
* <li>
1823+
* <p>Managed rule name: <a href="https://docs.aws.amazon.com/config/latest/developerguide/s3-bucket-acl-prohibited.html">s3-bucket-acl-prohibited</a>
1824+
* </p>
1825+
* <p>
1826+
* <code>keywordValue</code>: <code>S3_BUCKET_ACL_PROHIBITED</code>
1827+
* </p>
1828+
* </li>
1829+
* </ul>
1830+
* </li>
1831+
* <li>
1832+
* <p>For <a href="https://docs.aws.amazon.com/config/latest/developerguide/evaluate-config_develop-rules.html">custom rules</a>, you form the <code>keywordValue</code>
1833+
* by adding the <code>Custom_</code> prefix to the rule name. This prefix distinguishes
1834+
* the rule from a managed rule.</p>
1835+
* <ul>
1836+
* <li>
1837+
* <p>Custom rule name: my-custom-config-rule</p>
1838+
* <p>
1839+
* <code>keywordValue</code>: <code>Custom_my-custom-config-rule</code>
1840+
* </p>
1841+
* </li>
1842+
* </ul>
1843+
* </li>
1844+
* <li>
1845+
* <p>For <a href="https://docs.aws.amazon.com/config/latest/developerguide/service-linked-awsconfig-rules.html">service-linked rules</a>, you form the
1846+
* <code>keywordValue</code> by adding the <code>Custom_</code> prefix to the rule
1847+
* name. In addition, you remove the suffix ID that appears at the end of the rule
1848+
* name.</p>
1849+
* <ul>
1850+
* <li>
1851+
* <p>Service-linked rule name:
1852+
* CustomRuleForAccount-conformance-pack-szsm1uv0w</p>
1853+
* <p>
1854+
* <code>keywordValue</code>:
1855+
* <code>Custom_CustomRuleForAccount-conformance-pack</code>
1856+
* </p>
1857+
* </li>
1858+
* <li>
1859+
* <p>Service-linked rule name: securityhub-api-gw-cache-encrypted-101104e1</p>
1860+
* <p>
1861+
* <code>keywordValue</code>:
1862+
* <code>Custom_securityhub-api-gw-cache-encrypted</code>
1863+
* </p>
1864+
* </li>
1865+
* <li>
1866+
* <p>Service-linked rule name:
1867+
* OrgConfigRule-s3-bucket-versioning-enabled-dbgzf8ba</p>
1868+
* <p>
1869+
* <code>keywordValue</code>:
1870+
* <code>Custom_OrgConfigRule-s3-bucket-versioning-enabled</code>
1871+
* </p>
1872+
* </li>
1873+
* </ul>
1874+
* </li>
1875+
* </ul>
18141876
*/
18151877
keywordValue?: string;
18161878
}

codegen/sdk-codegen/aws-models/auditmanager.json

+3-3
Original file line numberDiff line numberDiff line change
@@ -3295,7 +3295,7 @@
32953295
}
32963296
],
32973297
"traits": {
3298-
"smithy.api#documentation": "<p> Deletes an assessment report from an assessment in Audit Manager. </p>",
3298+
"smithy.api#documentation": "<p>Deletes an assessment report in Audit Manager. </p>\n <p>When you run the <code>DeleteAssessmentReport</code> operation, Audit Manager attempts to delete the following data:</p>\n <ol>\n <li>\n <p>The specified assessment report that’s stored in your S3 bucket</p>\n </li>\n <li>\n <p>The associated metadata that’s stored in Audit Manager</p>\n </li>\n </ol>\n <p>If Audit Manager can’t access the assessment report in your S3 bucket, the report\n isn’t deleted. In this event, the <code>DeleteAssessmentReport</code> operation doesn’t\n fail. Instead, it proceeds to delete the associated metadata only. You must then delete the\n assessment report from the S3 bucket yourself. </p>\n <p>This scenario happens when Audit Manager receives a <code>403 (Forbidden)</code> or\n <code>404 (Not Found)</code> error from Amazon S3. To avoid this, make sure that\n your S3 bucket is available, and that you configured the correct permissions for Audit Manager to delete resources in your S3 bucket. For an example permissions policy that\n you can use, see <a href=\"https://docs.aws.amazon.com/audit-manager/latest/userguide/security_iam_id-based-policy-examples.html#full-administrator-access-assessment-report-destination\">Assessment report destination permissions</a> in the <i>Audit Manager User Guide</i>. For information about the issues that could cause a <code>403\n (Forbidden)</code> or <code>404 (Not Found</code>) error from Amazon S3, see\n <a href=\"https://docs.aws.amazon.com/AmazonS3/latest/API/ErrorResponses.html#ErrorCodeList\">List of Error Codes</a> in the <i>Amazon Simple Storage Service API\n Reference</i>. </p>",
32993299
"smithy.api#http": {
33003300
"method": "DELETE",
33013301
"uri": "/assessments/{assessmentId}/reports/{assessmentReportId}",
@@ -6743,13 +6743,13 @@
67436743
"keywordInputType": {
67446744
"target": "com.amazonaws.auditmanager#KeywordInputType",
67456745
"traits": {
6746-
"smithy.api#documentation": "<p> The method of input for the keyword. </p>"
6746+
"smithy.api#documentation": "<p> The input method for the keyword. </p>"
67476747
}
67486748
},
67496749
"keywordValue": {
67506750
"target": "com.amazonaws.auditmanager#KeywordValue",
67516751
"traits": {
6752-
"smithy.api#documentation": "<p> The value of the keyword that's used to search CloudTrail logs, Config rules, Security Hub checks, and Amazon Web Services API names\n when mapping a control data source. </p>"
6752+
"smithy.api#documentation": "<p> The value of the keyword that's used when mapping a control data source. For example,\n this can be a CloudTrail event name, a rule name for Config, a\n Security Hub control, or the name of an Amazon Web Services API call. </p>\n <p>If you’re mapping a data source to a rule in Config, the\n <code>keywordValue</code> that you specify depends on the type of rule:</p>\n <ul>\n <li>\n <p>For <a href=\"https://docs.aws.amazon.com/config/latest/developerguide/evaluate-config_use-managed-rules.html\">managed rules</a>, you can use the rule identifier as the\n <code>keywordValue</code>. You can find the rule identifier from the <a href=\"https://docs.aws.amazon.com/config/latest/developerguide/managed-rules-by-aws-config.html\">list of Config managed rules</a>.</p>\n <ul>\n <li>\n <p>Managed rule name: <a href=\"https://docs.aws.amazon.com/config/latest/developerguide/s3-bucket-acl-prohibited.html\">s3-bucket-acl-prohibited</a>\n </p>\n <p>\n <code>keywordValue</code>: <code>S3_BUCKET_ACL_PROHIBITED</code>\n </p>\n </li>\n </ul>\n </li>\n <li>\n <p>For <a href=\"https://docs.aws.amazon.com/config/latest/developerguide/evaluate-config_develop-rules.html\">custom rules</a>, you form the <code>keywordValue</code>\n by adding the <code>Custom_</code> prefix to the rule name. This prefix distinguishes\n the rule from a managed rule.</p>\n <ul>\n <li>\n <p>Custom rule name: my-custom-config-rule</p>\n <p>\n <code>keywordValue</code>: <code>Custom_my-custom-config-rule</code>\n </p>\n </li>\n </ul>\n </li>\n <li>\n <p>For <a href=\"https://docs.aws.amazon.com/config/latest/developerguide/service-linked-awsconfig-rules.html\">service-linked rules</a>, you form the\n <code>keywordValue</code> by adding the <code>Custom_</code> prefix to the rule\n name. In addition, you remove the suffix ID that appears at the end of the rule\n name.</p>\n <ul>\n <li>\n <p>Service-linked rule name:\n CustomRuleForAccount-conformance-pack-szsm1uv0w</p>\n <p>\n <code>keywordValue</code>:\n <code>Custom_CustomRuleForAccount-conformance-pack</code>\n </p>\n </li>\n <li>\n <p>Service-linked rule name: securityhub-api-gw-cache-encrypted-101104e1</p>\n <p>\n <code>keywordValue</code>:\n <code>Custom_securityhub-api-gw-cache-encrypted</code>\n </p>\n </li>\n <li>\n <p>Service-linked rule name:\n OrgConfigRule-s3-bucket-versioning-enabled-dbgzf8ba</p>\n <p>\n <code>keywordValue</code>:\n <code>Custom_OrgConfigRule-s3-bucket-versioning-enabled</code>\n </p>\n </li>\n </ul>\n </li>\n </ul>"
67536753
}
67546754
}
67556755
},

0 commit comments

Comments
 (0)