OBJECT
SecurityRule
link GraphQL Schema definition
- type SecurityRule implements HyperLinked, Node, NodeVersion {
- # Category of the generated finding
- SecurityFindingCategory! @deprecated( reason: "category is being replaced by policyClass" ) :
- SecurityChangeLogConnection! :
- # Cloud provider of this policy
- SecurityCloudProvider! :
- # Get list of controls related to this rule.
- SecurityControlsConnection :
- # The author of the rule
- SecurityUserInfo :
- # The time this rule was created
- DateTime! :
- # Brief description about this rule
- LocalizedString :
- # Name of this rule
- LocalizedString! :
- # Indicated the rule is enabled for this organization
- Boolean! :
- # Get list of current findings generated from this rule.
- #
- # Arguments
- # after: Return records after the given cursor, as per GraphQL
- # Relay spec
- # filter: Optional filter
- # first: Return first N records in a paged response, as per
- # GraphQL Relay spec
- # sort: Sort order for results in the connection
- (
- String, :
- SecurityFindingsFilterInput, :
- Int, :
- QuerySort!] : [
- ): SecurityFindingsConnection!
- # Get list of frameworks related to this rule.
- SecurityFrameworksConnection :
- # Optional hyperlink(s) to visualize specific rule data in detail
- HyperLink!] : [
- # Node-compatible opaque global identifier
- ID! :
- # The last time this rule was successfully updated
- DateTime! :
- # Opaque version string for this graph node instance
- ID! :
- # Classes of the rule
- SecurityPolicyClass!] : [
- # Cloud provider of this rule
- String! @deprecated( reason: "Use cloudProvider field instead" ) :
- # Resources related to the rule
- SecurityResource!] : [
- String! :
- # Specific cloud provider service that is monitored by this rule
- String! :
- # The severity of the generated finding e.g. Critical, High, Medium or Low
- SecurityFindingSeverity! :
- # Source of the generated finding. Accepted only Native and Custom.
- SecurityComplianceSource! :
- # Suggested action for a rule.
- LocalizedString :
- # Get list of tags related to this rule.
- #
- # Arguments
- # key: [Not documented]
- String!]): [Tag!] ( : [
- # List of triggers for this rule
- SecurityTrigger!] : [
- # Type of the generated finding e.g. Violation, Threat, Anomaly
- SecurityFindingType! :
- # Query used to detect violations in customer's cloud account inventory state
- SecurityRuleQuery! :
- # Query used for visualization in customer's cloud account inventory
- SecurityRuleQuery :
- }