New Case Study:See how Anthropic automated 95% of dependency reviews with Socket.Learn More
Socket
Sign inDemoInstall
Socket

@aws-sdk/client-securitylake

Package Overview
Dependencies
Maintainers
0
Versions
249
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@aws-sdk/client-securitylake - npm Package Compare versions

Comparing version 3.670.0 to 3.671.0

6

dist-types/commands/CreateAwsLogSourceCommand.d.ts

@@ -30,7 +30,7 @@ import { Command as $Command } from "@smithy/smithy-client";

/**
* <p>Adds a natively supported Amazon Web Service as an Amazon Security Lake source. Enables
* <p>Adds a natively supported Amazon Web Services service as an Amazon Security Lake source. Enables
* source types for member accounts in required Amazon Web Services Regions, based on the
* parameters you specify. You can choose any source type in any Region for either accounts
* that are part of a trusted organization or standalone accounts. Once you add an Amazon Web Service as a source, Security Lake starts collecting logs and events from it.</p>
* <p>You can use this API only to enable natively supported Amazon Web Services as a
* that are part of a trusted organization or standalone accounts. Once you add an Amazon Web Services service as a source, Security Lake starts collecting logs and events from it.</p>
* <p>You can use this API only to enable natively supported Amazon Web Services services as a
* source. Use <code>CreateCustomLogSource</code> to enable data collection from a custom

@@ -37,0 +37,0 @@ * source.</p>

@@ -39,3 +39,3 @@ import { Command as $Command } from "@smithy/smithy-client";

* <p>When you enable Security Lake, it starts ingesting security data after the
* <code>CreateAwsLogSource</code> call. This includes ingesting security data from
* <code>CreateAwsLogSource</code> call and after you create subscribers using the <code>CreateSubscriber</code> API. This includes ingesting security data from
* sources, storing data, and making data accessible to subscribers. Security Lake also enables

@@ -42,0 +42,0 @@ * all the existing settings and resources that it stores or maintains for your Amazon Web Services account in the current Region, including security log and event data. For

@@ -31,3 +31,3 @@ import { Command as $Command } from "@smithy/smithy-client";

* <p>Creates the specified notification subscription in Amazon Security Lake for the organization
* you specify.</p>
* you specify. The notification subscription is created for exceptions that cannot be resolved by Security Lake automatically.</p>
* @example

@@ -34,0 +34,0 @@ * Use a bare-bones client and the command you need to make an API call.

@@ -30,4 +30,4 @@ import { Command as $Command } from "@smithy/smithy-client";

/**
* <p>Creates a subscription permission for accounts that are already enabled in
* Amazon Security Lake. You can create a subscriber with access to data in the current Amazon Web Services Region.</p>
* <p>Creates a subscriber for accounts that are already enabled in Amazon Security Lake. You can
* create a subscriber with access to data in the current Amazon Web Services Region.</p>
* @example

@@ -34,0 +34,0 @@ * Use a bare-bones client and the command you need to make an API call.

@@ -30,3 +30,3 @@ import { Command as $Command } from "@smithy/smithy-client";

/**
* <p>Removes a natively supported Amazon Web Service as an Amazon Security Lake source. You
* <p>Removes a natively supported Amazon Web Services service as an Amazon Security Lake source. You
* can remove a source for one or more Regions. When you remove the source, Security Lake stops

@@ -33,0 +33,0 @@ * collecting data from that source in the specified Regions and accounts, and subscribers can

@@ -30,3 +30,3 @@ import { Command as $Command } from "@smithy/smithy-client";

/**
* <p>Deletes the specified notification subscription in Amazon Security Lake for the organization
* <p>Deletes the specified subscription notification in Amazon Security Lake for the organization
* you specify.</p>

@@ -33,0 +33,0 @@ * @example

@@ -30,3 +30,3 @@ import { Command as $Command } from "@smithy/smithy-client";

/**
* <p>Retrieves the details of exception notifications for the account in Amazon Security Lake.</p>
* <p>Retrieves the protocol and endpoint that were provided when subscribing to Amazon SNS topics for exception notifications.</p>
* @example

@@ -33,0 +33,0 @@ * Use a bare-bones client and the command you need to make an API call.

@@ -30,3 +30,3 @@ import { Command as $Command } from "@smithy/smithy-client";

/**
* <p>Retrieves the log sources in the current Amazon Web Services Region.</p>
* <p>Retrieves the log sources.</p>
* @example

@@ -33,0 +33,0 @@ * Use a bare-bones client and the command you need to make an API call.

@@ -30,3 +30,3 @@ import { Command as $Command } from "@smithy/smithy-client";

/**
* <p>List all subscribers for the specific Amazon Security Lake account ID. You can retrieve a list
* <p>Lists all subscribers for the specific Amazon Security Lake account ID. You can retrieve a list
* of subscriptions associated with a specific organization or Amazon Web Services account.</p>

@@ -33,0 +33,0 @@ * @example

@@ -30,4 +30,13 @@ import { Command as $Command } from "@smithy/smithy-client";

/**
* <p>Specifies where to store your security data and for how long. You can add a rollup
* Region to consolidate data from multiple Amazon Web Services Regions.</p>
* <p>You can use <code>UpdateDataLake</code> to specify where to store your security data, how it should
* be encrypted at rest and for how long. You can add a <a href="https://docs.aws.amazon.com/security-lake/latest/userguide/manage-regions.html#add-rollup-region">Rollup
* Region</a> to consolidate data from multiple Amazon Web Services Regions, replace
* default encryption (SSE-S3) with <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#customer-cmk">Customer Manged Key</a>,
* or specify transition and expiration actions through storage <a href="https://docs.aws.amazon.com/security-lake/latest/userguide/lifecycle-management.html">Lifecycle management</a>. The <code>UpdateDataLake</code> API works as an "upsert" operation that performs an insert if the specified item or record does not exist, or an update if it
* already exists. Security Lake securely stores your data at rest using Amazon Web Services encryption solutions. For more details, see <a href="https://docs.aws.amazon.com/security-lake/latest/userguide/data-protection.html">Data protection in Amazon Security Lake</a>.</p>
* <p>For example, omitting the key <code>encryptionConfiguration</code> from a Region that is
* included in an update call that currently uses KMS will leave that Region's KMS key in
* place, but specifying <code>encryptionConfiguration: \{kmsKeyId: 'S3_MANAGED_KEY'\}</code>
* for that same Region will reset the key to <code>S3-managed</code>.</p>
* <p>For more details about lifecycle management and how to update retention settings for one or more Regions after enabling Security Lake, see the <a href="https://docs.aws.amazon.com/security-lake/latest/userguide/lifecycle-management.html">Amazon Security Lake User Guide</a>. </p>
* @example

@@ -34,0 +43,0 @@ * Use a bare-bones client and the command you need to make an API call.

@@ -22,7 +22,7 @@ /**

* <p>Security Lake automates the collection of security-related log and event data from
* integrated Amazon Web Services and third-party services. It also helps you manage
* integrated Amazon Web Services services and third-party services. It also helps you manage
* the lifecycle of data with customizable retention and replication settings. Security Lake
* converts ingested data into Apache Parquet format and a standard open-source schema called
* the Open Cybersecurity Schema Framework (OCSF).</p>
* <p>Other Amazon Web Services and third-party services can subscribe to the data that's stored in Security Lake for
* <p>Other Amazon Web Services services and third-party services can subscribe to the data that's stored in Security Lake for
* incident response and security data analytics.</p>

@@ -29,0 +29,0 @@ *

@@ -36,3 +36,3 @@ import { ExceptionOptionType as __ExceptionOptionType } from "@smithy/smithy-client";

/**
* <p>The AWS identity.</p>
* <p>The Amazon Web Services identity.</p>
* @public

@@ -42,3 +42,3 @@ */

/**
* <p>The AWS identity principal.</p>
* <p>The Amazon Web Services identity principal.</p>
* @public

@@ -48,3 +48,3 @@ */

/**
* <p>The external ID used to estalish trust relationship with the AWS identity.</p>
* <p>The external ID used to establish trust relationship with the Amazon Web Services identity.</p>
* @public

@@ -73,3 +73,4 @@ */

/**
* <p>The Security Lake logs source configuration file describes the information needed to generate Security Lake logs. </p>
* <p>To add a natively-supported Amazon Web Services service as a log source, use these
* parameters to specify the configuration settings for the log source. </p>
* @public

@@ -89,3 +90,3 @@ */

/**
* <p>The name for a Amazon Web Services source. This must be a Regionally unique value.</p>
* <p>The name for a Amazon Web Services source. </p>
* @public

@@ -95,3 +96,3 @@ */

/**
* <p>The version for a Amazon Web Services source. This must be a Regionally unique value.</p>
* <p>The version for a Amazon Web Services source. </p>
* @public

@@ -102,3 +103,4 @@ */

/**
* <p>Amazon Security Lake can collect logs and events from natively-supported Amazon Web Services services.</p>
* <p>Amazon Security Lake can collect logs and events from natively-supported Amazon Web Services
* services.</p>
* @public

@@ -170,3 +172,3 @@ */

/**
* <p>Lists all accounts in which enabling a natively supported Amazon Web Service as
* <p>Lists all accounts in which enabling a natively supported Amazon Web Services service as
* a Security Lake source failed. The failure occurred as these accounts are not part of an

@@ -245,3 +247,3 @@ * organization.</p>

/**
* <p>The configuration for the Glue Crawler for the third-party custom source.</p>
* <p>The configuration used for the Glue Crawler for a third-party custom source.</p>
* @public

@@ -268,3 +270,3 @@ */

/**
* <p>The configuration for the third-party custom source.</p>
* <p>The configuration used for the third-party custom source.</p>
* @public

@@ -274,3 +276,3 @@ */

/**
* <p>The configuration for the Glue Crawler for the third-party custom source.</p>
* <p>The configuration used for the Glue Crawler for a third-party custom source.</p>
* @public

@@ -291,3 +293,8 @@ */

* <p>Specify the name for a third-party custom source. This must be a Regionally unique
* value.</p>
* value. The <code>sourceName</code> you enter here, is used in the
* <code>LogProviderRole</code> name which follows the convention
* <code>AmazonSecurityLake-Provider-\{name of the custom source\}-\{region\}</code>. You must
* use a <code>CustomLogSource</code> name that is shorter than or equal to 20 characters.
* This ensures that the <code>LogProviderRole</code> name is below the 64 character
* limit.</p>
* @public

@@ -456,3 +463,3 @@ */

/**
* <p>The configuration for the third-party custom source.</p>
* <p>The configuration used for the third-party custom source.</p>
* @public

@@ -535,3 +542,3 @@ */

/**
* <p>The created third-party custom source.</p>
* <p>The third-party custom source that was created.</p>
* @public

@@ -547,3 +554,3 @@ */

/**
* <p>The id of KMS encryption key used by Amazon Security Lake to encrypt the Security Lake
* <p>The identifier of KMS encryption key used by Amazon Security Lake to encrypt the Security Lake
* object.</p>

@@ -796,3 +803,3 @@ * @public

/**
* <p>Retrieves the status of the configuration operation for an account in Amazon Security Lake.</p>
* <p>Retrieves the status of the <code>CreateDatalake</code> API call for an account in Amazon Security Lake.</p>
* @public

@@ -833,3 +840,3 @@ */

/**
* <p>The expiration period and time-to-live (TTL).</p>
* <p>The expiration period and time-to-live (TTL). It is the duration of time until which the exception message remains.</p>
* @public

@@ -879,3 +886,3 @@ */

* <p>The supported source types from which logs and events are collected in Amazon Security Lake.
* For a list of supported Amazon Web Services, see the <a href="https://docs.aws.amazon.com/security-lake/latest/userguide/internal-sources.html">Amazon Security Lake User Guide</a>.</p>
* For a list of supported Amazon Web Services services, see the <a href="https://docs.aws.amazon.com/security-lake/latest/userguide/internal-sources.html">Amazon Security Lake User Guide</a>.</p>
* @public

@@ -889,3 +896,3 @@ */

/**
* <p>Amazon Security Lake supports log and event collection for natively supported Amazon Web Services. For more information, see the <a href="https://docs.aws.amazon.com/security-lake/latest/userguide/internal-sources.html">Amazon Security Lake User Guide</a>.</p>
* <p>Amazon Security Lake supports log and event collection for natively supported Amazon Web Services services. For more information, see the <a href="https://docs.aws.amazon.com/security-lake/latest/userguide/internal-sources.html">Amazon Security Lake User Guide</a>.</p>
* @public

@@ -942,4 +949,4 @@ */

/**
* <p>The supported Amazon Web Services from which logs and events are collected.
* Security Lake supports log and event collection for natively supported Amazon Web Services.</p>
* <p>The supported Amazon Web Services services from which logs and events are collected.
* Security Lake supports log and event collection for natively supported Amazon Web Services services.</p>
* @public

@@ -1009,3 +1016,3 @@ */

/**
* <p>Amazon Security Lake supports log and event collection for natively supported Amazon Web Services. For more information, see the <a href="https://docs.aws.amazon.com/security-lake/latest/userguide/source-management.html">Amazon Security Lake User Guide</a>.</p>
* <p>Amazon Security Lake supports log and event collection for natively supported Amazon Web Services services. For more information, see the <a href="https://docs.aws.amazon.com/security-lake/latest/userguide/source-management.html">Amazon Security Lake User Guide</a>.</p>
* @public

@@ -1092,3 +1099,3 @@ */

/**
* <p>The configurations for HTTPS subscriber notification.</p>
* <p>The configurations used for HTTPS subscriber notification.</p>
* @public

@@ -1127,3 +1134,3 @@ */

/**
* <p>The configurations for SQS subscriber notification.</p>
* <p>The configurations used for EventBridge subscriber notification.</p>
* @public

@@ -1154,3 +1161,3 @@ */

/**
* <p>The configurations for HTTPS subscriber notification.</p>
* <p>The configurations used for HTTPS subscriber notification.</p>
* @public

@@ -1286,3 +1293,3 @@ */

/**
* <p>The configuration for new accounts.</p>
* <p>The configuration used for new accounts in Security Lake.</p>
* @public

@@ -1348,4 +1355,4 @@ */

/**
* <p>Amazon Security Lake collects logs and events from supported Amazon Web Services and
* custom sources. For the list of supported Amazon Web Services, see the <a href="https://docs.aws.amazon.com/security-lake/latest/userguide/internal-sources.html">Amazon Security Lake User Guide</a>.</p>
* <p>Amazon Security Lake collects logs and events from supported Amazon Web Services services and
* custom sources. For the list of supported Amazon Web Services services, see the <a href="https://docs.aws.amazon.com/security-lake/latest/userguide/internal-sources.html">Amazon Security Lake User Guide</a>.</p>
* @public

@@ -1360,4 +1367,4 @@ */

/**
* <p>The supported Amazon Web Services from which logs and events are collected.
* Amazon Security Lake supports log and event collection for natively supported Amazon Web Services.</p>
* <p>The supported Amazon Web Services services from which logs and events are collected.
* Amazon Security Lake supports log and event collection for natively supported Amazon Web Services services.</p>
* @public

@@ -1642,3 +1649,3 @@ */

/**
* <p>Specify the Region or Regions that will contribute data to the rollup region.</p>
* <p>Specifies the Region or Regions that will contribute data to the rollup region.</p>
* @public

@@ -1761,3 +1768,3 @@ */

/**
* <p>The expiration period and time-to-live (TTL).</p>
* <p>The expiration period and time-to-live (TTL). It is the duration of time until which the exception message remains.</p>
* @public

@@ -1798,3 +1805,3 @@ */

/**
* <p>List the maximum number of failures in Security Lake.</p>
* <p>Lists the maximum number of failures in Security Lake.</p>
* @public

@@ -1804,3 +1811,3 @@ */

/**
* <p>List if there are more results available. The value of nextToken is a unique pagination
* <p>Lists if there are more results available. The value of nextToken is a unique pagination
* token for each page. Repeat the call using the returned token to retrieve the next page.

@@ -1819,3 +1826,3 @@ * Keep all other arguments unchanged.</p>

/**
* <p>Lists the failures that cannot be retried in the current Region.</p>
* <p>Lists the failures that cannot be retried.</p>
* @public

@@ -1825,3 +1832,3 @@ */

/**
* <p>List if there are more results available. The value of nextToken is a unique pagination
* <p>Lists if there are more results available. The value of nextToken is a unique pagination
* token for each page. Repeat the call using the returned token to retrieve the next page.

@@ -1912,3 +1919,3 @@ * Keep all other arguments unchanged.</p>

/**
* <p>The AWS identity used to access your data.</p>
* <p>The Amazon Web Services identity used to access your data.</p>
* @public

@@ -1928,4 +1935,4 @@ */

/**
* <p>The supported Amazon Web Services from which logs and events are collected. For
* the list of supported Amazon Web Services, see the <a href="https://docs.aws.amazon.com/security-lake/latest/userguide/internal-sources.html">Amazon Security Lake User Guide</a>.</p>
* <p>The supported Amazon Web Services services from which logs and events are collected. For
* the list of supported Amazon Web Services services, see the <a href="https://docs.aws.amazon.com/security-lake/latest/userguide/internal-sources.html">Amazon Security Lake User Guide</a>.</p>
* @public

@@ -2026,3 +2033,3 @@ */

/**
* <p>The time-to-live (TTL) for the exception message to remain.</p>
* <p>The time-to-live (TTL) for the exception message to remain. It is the duration of time until which the exception message remains. </p>
* @public

@@ -2029,0 +2036,0 @@ */

@@ -254,7 +254,7 @@ import { HttpHandlerOptions as __HttpHandlerOptions } from "@smithy/types";

* <p>Security Lake automates the collection of security-related log and event data from
* integrated Amazon Web Services and third-party services. It also helps you manage
* integrated Amazon Web Services services and third-party services. It also helps you manage
* the lifecycle of data with customizable retention and replication settings. Security Lake
* converts ingested data into Apache Parquet format and a standard open-source schema called
* the Open Cybersecurity Schema Framework (OCSF).</p>
* <p>Other Amazon Web Services and third-party services can subscribe to the data that's stored in Security Lake for
* <p>Other Amazon Web Services services and third-party services can subscribe to the data that's stored in Security Lake for
* incident response and security data analytics.</p>

@@ -261,0 +261,0 @@ * @public

@@ -205,7 +205,7 @@ import { HostHeaderInputConfig, HostHeaderResolvedConfig } from "@aws-sdk/middleware-host-header";

* <p>Security Lake automates the collection of security-related log and event data from
* integrated Amazon Web Services and third-party services. It also helps you manage
* integrated Amazon Web Services services and third-party services. It also helps you manage
* the lifecycle of data with customizable retention and replication settings. Security Lake
* converts ingested data into Apache Parquet format and a standard open-source schema called
* the Open Cybersecurity Schema Framework (OCSF).</p>
* <p>Other Amazon Web Services and third-party services can subscribe to the data that's stored in Security Lake for
* <p>Other Amazon Web Services services and third-party services can subscribe to the data that's stored in Security Lake for
* incident response and security data analytics.</p>

@@ -212,0 +212,0 @@ * @public

{
"name": "@aws-sdk/client-securitylake",
"description": "AWS SDK for JavaScript Securitylake Client for Node.js, Browser and React Native",
"version": "3.670.0",
"version": "3.671.0",
"scripts": {

@@ -6,0 +6,0 @@ "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",

@@ -29,7 +29,7 @@ <!-- generated file, do not edit directly -->

<p>Security Lake automates the collection of security-related log and event data from
integrated Amazon Web Services and third-party services. It also helps you manage
integrated Amazon Web Services services and third-party services. It also helps you manage
the lifecycle of data with customizable retention and replication settings. Security Lake
converts ingested data into Apache Parquet format and a standard open-source schema called
the Open Cybersecurity Schema Framework (OCSF).</p>
<p>Other Amazon Web Services and third-party services can subscribe to the data that's stored in Security Lake for
<p>Other Amazon Web Services services and third-party services can subscribe to the data that's stored in Security Lake for
incident response and security data analytics.</p>

@@ -36,0 +36,0 @@

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc