You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
docs(client-auditmanager): This release adds documentation updates for Audit Manager. We provided examples of how to use the Custom_ prefix for the keywordValue attribute. We also provided more details about the DeleteAssessmentReport operation.
Copy file name to clipboardExpand all lines: clients/client-auditmanager/src/AuditManager.ts
+21-1
Original file line number
Diff line number
Diff line change
@@ -757,7 +757,27 @@ export class AuditManager extends AuditManagerClient {
757
757
}
758
758
759
759
/**
760
-
* <p> Deletes an assessment report from an assessment in Audit Manager. </p>
760
+
* <p>Deletes an assessment report in Audit Manager. </p>
761
+
* <p>When you run the <code>DeleteAssessmentReport</code> operation, Audit Manager attempts to delete the following data:</p>
762
+
* <ol>
763
+
* <li>
764
+
* <p>The specified assessment report that’s stored in your S3 bucket</p>
765
+
* </li>
766
+
* <li>
767
+
* <p>The associated metadata that’s stored in Audit Manager</p>
768
+
* </li>
769
+
* </ol>
770
+
* <p>If Audit Manager can’t access the assessment report in your S3 bucket, the report
771
+
* isn’t deleted. In this event, the <code>DeleteAssessmentReport</code> operation doesn’t
772
+
* fail. Instead, it proceeds to delete the associated metadata only. You must then delete the
773
+
* assessment report from the S3 bucket yourself. </p>
774
+
* <p>This scenario happens when Audit Manager receives a <code>403 (Forbidden)</code> or
775
+
* <code>404 (Not Found)</code> error from Amazon S3. To avoid this, make sure that
776
+
* your S3 bucket is available, and that you configured the correct permissions for Audit Manager to delete resources in your S3 bucket. For an example permissions policy that
777
+
* you can use, see <a href="https://docs.aws.amazon.com/audit-manager/latest/userguide/security_iam_id-based-policy-examples.html#full-administrator-access-assessment-report-destination">Assessment report destination permissions</a> in the <i>Audit Manager User Guide</i>. For information about the issues that could cause a <code>403
778
+
* (Forbidden)</code> or <code>404 (Not Found</code>) error from Amazon S3, see
779
+
* <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/ErrorResponses.html#ErrorCodeList">List of Error Codes</a> in the <i>Amazon Simple Storage Service API
* <p> Deletes an assessment report from an assessment in Audit Manager. </p>
25
+
* <p>Deletes an assessment report in Audit Manager. </p>
26
+
* <p>When you run the <code>DeleteAssessmentReport</code> operation, Audit Manager attempts to delete the following data:</p>
27
+
* <ol>
28
+
* <li>
29
+
* <p>The specified assessment report that’s stored in your S3 bucket</p>
30
+
* </li>
31
+
* <li>
32
+
* <p>The associated metadata that’s stored in Audit Manager</p>
33
+
* </li>
34
+
* </ol>
35
+
* <p>If Audit Manager can’t access the assessment report in your S3 bucket, the report
36
+
* isn’t deleted. In this event, the <code>DeleteAssessmentReport</code> operation doesn’t
37
+
* fail. Instead, it proceeds to delete the associated metadata only. You must then delete the
38
+
* assessment report from the S3 bucket yourself. </p>
39
+
* <p>This scenario happens when Audit Manager receives a <code>403 (Forbidden)</code> or
40
+
* <code>404 (Not Found)</code> error from Amazon S3. To avoid this, make sure that
41
+
* your S3 bucket is available, and that you configured the correct permissions for Audit Manager to delete resources in your S3 bucket. For an example permissions policy that
42
+
* you can use, see <a href="https://docs.aws.amazon.com/audit-manager/latest/userguide/security_iam_id-based-policy-examples.html#full-administrator-access-assessment-report-destination">Assessment report destination permissions</a> in the <i>Audit Manager User Guide</i>. For information about the issues that could cause a <code>403
43
+
* (Forbidden)</code> or <code>404 (Not Found</code>) error from Amazon S3, see
44
+
* <a href="https://docs.aws.amazon.com/AmazonS3/latest/API/ErrorResponses.html#ErrorCodeList">List of Error Codes</a> in the <i>Amazon Simple Storage Service API
45
+
* Reference</i>. </p>
26
46
* @example
27
47
* Use a bare-bones client and the command you need to make an API call.
* <p> The value of the keyword that's used to search CloudTrail logs, Config rules, Security Hub checks, and Amazon Web Services API names
1813
-
* when mapping a control data source. </p>
1812
+
* <p> The value of the keyword that's used when mapping a control data source. For example,
1813
+
* this can be a CloudTrail event name, a rule name for Config, a
1814
+
* Security Hub control, or the name of an Amazon Web Services API call. </p>
1815
+
* <p>If you’re mapping a data source to a rule in Config, the
1816
+
* <code>keywordValue</code> that you specify depends on the type of rule:</p>
1817
+
* <ul>
1818
+
* <li>
1819
+
* <p>For <a href="https://docs.aws.amazon.com/config/latest/developerguide/evaluate-config_use-managed-rules.html">managed rules</a>, you can use the rule identifier as the
1820
+
* <code>keywordValue</code>. You can find the rule identifier from the <a href="https://docs.aws.amazon.com/config/latest/developerguide/managed-rules-by-aws-config.html">list of Config managed rules</a>.</p>
* <p>For <a href="https://docs.aws.amazon.com/config/latest/developerguide/evaluate-config_develop-rules.html">custom rules</a>, you form the <code>keywordValue</code>
1833
+
* by adding the <code>Custom_</code> prefix to the rule name. This prefix distinguishes
Copy file name to clipboardExpand all lines: codegen/sdk-codegen/aws-models/auditmanager.json
+3-3
Original file line number
Diff line number
Diff line change
@@ -3295,7 +3295,7 @@
3295
3295
}
3296
3296
],
3297
3297
"traits": {
3298
-
"smithy.api#documentation": "<p> Deletes an assessment report from an assessment in Audit Manager. </p>",
3298
+
"smithy.api#documentation": "<p>Deletes an assessment report in Audit Manager. </p>\n <p>When you run the <code>DeleteAssessmentReport</code> operation, Audit Manager attempts to delete the following data:</p>\n <ol>\n <li>\n <p>The specified assessment report that’s stored in your S3 bucket</p>\n </li>\n <li>\n <p>The associated metadata that’s stored in Audit Manager</p>\n </li>\n </ol>\n <p>If Audit Manager can’t access the assessment report in your S3 bucket, the report\n isn’t deleted. In this event, the <code>DeleteAssessmentReport</code> operation doesn’t\n fail. Instead, it proceeds to delete the associated metadata only. You must then delete the\n assessment report from the S3 bucket yourself. </p>\n <p>This scenario happens when Audit Manager receives a <code>403 (Forbidden)</code> or\n <code>404 (Not Found)</code> error from Amazon S3. To avoid this, make sure that\n your S3 bucket is available, and that you configured the correct permissions for Audit Manager to delete resources in your S3 bucket. For an example permissions policy that\n you can use, see <a href=\"https://docs.aws.amazon.com/audit-manager/latest/userguide/security_iam_id-based-policy-examples.html#full-administrator-access-assessment-report-destination\">Assessment report destination permissions</a> in the <i>Audit Manager User Guide</i>. For information about the issues that could cause a <code>403\n (Forbidden)</code> or <code>404 (Not Found</code>) error from Amazon S3, see\n <a href=\"https://docs.aws.amazon.com/AmazonS3/latest/API/ErrorResponses.html#ErrorCodeList\">List of Error Codes</a> in the <i>Amazon Simple Storage Service API\n Reference</i>. </p>",
"smithy.api#documentation": "<p> The value of the keyword that's used to search CloudTrail logs, Config rules, Security Hub checks, and Amazon Web Services API names\n when mapping a control data source. </p>"
6752
+
"smithy.api#documentation": "<p> The value of the keyword that's used when mapping a control data source. For example,\n this can be a CloudTrail event name, a rule name for Config, a\n Security Hub control, or the name of an Amazon Web Services API call. </p>\n <p>If you’re mapping a data source to a rule in Config, the\n <code>keywordValue</code> that you specify depends on the type of rule:</p>\n <ul>\n <li>\n <p>For <a href=\"https://docs.aws.amazon.com/config/latest/developerguide/evaluate-config_use-managed-rules.html\">managed rules</a>, you can use the rule identifier as the\n <code>keywordValue</code>. You can find the rule identifier from the <a href=\"https://docs.aws.amazon.com/config/latest/developerguide/managed-rules-by-aws-config.html\">list of Config managed rules</a>.</p>\n <ul>\n <li>\n <p>Managed rule name: <a href=\"https://docs.aws.amazon.com/config/latest/developerguide/s3-bucket-acl-prohibited.html\">s3-bucket-acl-prohibited</a>\n </p>\n <p>\n <code>keywordValue</code>: <code>S3_BUCKET_ACL_PROHIBITED</code>\n </p>\n </li>\n </ul>\n </li>\n <li>\n <p>For <a href=\"https://docs.aws.amazon.com/config/latest/developerguide/evaluate-config_develop-rules.html\">custom rules</a>, you form the <code>keywordValue</code>\n by adding the <code>Custom_</code> prefix to the rule name. This prefix distinguishes\n the rule from a managed rule.</p>\n <ul>\n <li>\n <p>Custom rule name: my-custom-config-rule</p>\n <p>\n <code>keywordValue</code>: <code>Custom_my-custom-config-rule</code>\n </p>\n </li>\n </ul>\n </li>\n <li>\n <p>For <a href=\"https://docs.aws.amazon.com/config/latest/developerguide/service-linked-awsconfig-rules.html\">service-linked rules</a>, you form the\n <code>keywordValue</code> by adding the <code>Custom_</code> prefix to the rule\n name. In addition, you remove the suffix ID that appears at the end of the rule\n name.</p>\n <ul>\n <li>\n <p>Service-linked rule name:\n CustomRuleForAccount-conformance-pack-szsm1uv0w</p>\n <p>\n <code>keywordValue</code>:\n <code>Custom_CustomRuleForAccount-conformance-pack</code>\n </p>\n </li>\n <li>\n <p>Service-linked rule name: securityhub-api-gw-cache-encrypted-101104e1</p>\n <p>\n <code>keywordValue</code>:\n <code>Custom_securityhub-api-gw-cache-encrypted</code>\n </p>\n </li>\n <li>\n <p>Service-linked rule name:\n OrgConfigRule-s3-bucket-versioning-enabled-dbgzf8ba</p>\n <p>\n <code>keywordValue</code>:\n <code>Custom_OrgConfigRule-s3-bucket-versioning-enabled</code>\n </p>\n </li>\n </ul>\n </li>\n </ul>"
0 commit comments