Google Cloud Security Command Center V1 Client - Class Finding (2.0.2)

Reference documentation and code samples for the Google Cloud Security Command Center V1 Client class Finding.

Security Command Center finding.

A finding is a record of assessment data like security, risk, health, or privacy, that is ingested into Security Command Center for presentation, notification, analysis, policy testing, and enforcement. For example, a cross-site scripting (XSS) vulnerability in an App Engine application is a finding.

Generated from protobuf message google.cloud.securitycenter.v1.Finding

Namespace

Google \ Cloud \ SecurityCenter \ V1

Methods

__construct

Constructor.

Parameters
Name Description
data array

Optional. Data for populating the Message object.

↳ name string

The relative resource name of the finding. Example: "organizations/{organization_id}/sources/{source_id}/findings/{finding_id}", "folders/{folder_id}/sources/{source_id}/findings/{finding_id}", "projects/{project_id}/sources/{source_id}/findings/{finding_id}".

↳ parent string

The relative resource name of the source the finding belongs to. See: https://cloud.google.com/apis/design/resource_names#relative_resource_name This field is immutable after creation time. For example: "organizations/{organization_id}/sources/{source_id}"

↳ resource_name string

For findings on Google Cloud resources, the full resource name of the Google Cloud resource this finding is for. See: https://cloud.google.com/apis/design/resource_names#full_resource_name When the finding is for a non-Google Cloud resource, the resourceName can be a customer or partner defined string. This field is immutable after creation time.

↳ state int

The state of the finding.

↳ category string

The additional taxonomy group within findings from a given source. This field is immutable after creation time. Example: "XSS_FLASH_INJECTION"

↳ external_uri string

The URI that, if available, points to a web page outside of Security Command Center where additional information about the finding can be found. This field is guaranteed to be either empty or a well formed URL.

↳ source_properties array|Google\Protobuf\Internal\MapField

Source specific properties. These properties are managed by the source that writes the finding. The key names in the source_properties map must be between 1 and 255 characters, and must start with a letter and contain alphanumeric characters or underscores only.

↳ security_marks SecurityMarks

Output only. User specified security marks. These marks are entirely managed by the user and come from the SecurityMarks resource that belongs to the finding.

↳ event_time Google\Protobuf\Timestamp

The time the finding was first detected. If an existing finding is updated, then this is the time the update occurred. For example, if the finding represents an open firewall, this property captures the time the detector believes the firewall became open. The accuracy is determined by the detector. If the finding is later resolved, then this time reflects when the finding was resolved. This must not be set to a value greater than the current timestamp.

↳ create_time Google\Protobuf\Timestamp

The time at which the finding was created in Security Command Center.

↳ severity int

The severity of the finding. This field is managed by the source that writes the finding.

↳ canonical_name string

The canonical name of the finding. It's either "organizations/{organization_id}/sources/{source_id}/findings/{finding_id}", "folders/{folder_id}/sources/{source_id}/findings/{finding_id}" or "projects/{project_number}/sources/{source_id}/findings/{finding_id}", depending on the closest CRM ancestor of the resource associated with the finding.

↳ mute int

Indicates the mute state of a finding (either muted, unmuted or undefined). Unlike other attributes of a finding, a finding provider shouldn't set the value of mute.

↳ finding_class int

The class of the finding.

↳ indicator Indicator

Represents what's commonly known as an indicator of compromise (IoC) in computer forensics. This is an artifact observed on a network or in an operating system that, with high confidence, indicates a computer intrusion. For more information, see Indicator of compromise.

↳ vulnerability Vulnerability

Represents vulnerability-specific fields like CVE and CVSS scores. CVE stands for Common Vulnerabilities and Exposures (https://cve.mitre.org/about/)

↳ mute_update_time Google\Protobuf\Timestamp

Output only. The most recent time this finding was muted or unmuted.

↳ external_systems array|Google\Protobuf\Internal\MapField

Output only. Third party SIEM/SOAR fields within SCC, contains external system information and external system finding fields.

↳ mitre_attack MitreAttack

MITRE ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org

↳ access Access

Access details associated with the finding, such as more information on the caller, which method was accessed, and from where.

↳ connections array<Connection>

Contains information about the IP connection associated with the finding.

↳ mute_initiator string

Records additional information about the mute operation, for example, the mute configuration that muted the finding and the user who muted the finding.

↳ mute_info Finding\MuteInfo

Output only. The mute information regarding this finding.

↳ processes array<Process>

Represents operating system processes associated with the Finding.

↳ contacts array|Google\Protobuf\Internal\MapField

Output only. Map containing the points of contact for the given finding. The key represents the type of contact, while the value contains a list of all the contacts that pertain. Please refer to: https://cloud.google.com/resource-manager/docs/managing-notification-contacts#notification-categories { "security": { "contacts": [ { "email": "person1@company.com" }, { "email": "person2@company.com" } ] } }

↳ compliances array<Compliance>

Contains compliance information for security standards associated to the finding.

↳ parent_display_name string

Output only. The human readable display name of the finding source such as "Event Threat Detection" or "Security Health Analytics".

↳ description string

Contains more details about the finding.

↳ exfiltration Exfiltration

Represents exfiltrations associated with the finding.

↳ iam_bindings array<IamBinding>

Represents IAM bindings associated with the finding.

↳ next_steps string

Steps to address the finding.

↳ module_name string

Unique identifier of the module which generated the finding. Example: folders/598186756061/securityHealthAnalyticsSettings/customModules/56799441161885

↳ containers array<Container>

Containers associated with the finding. This field provides information for both Kubernetes and non-Kubernetes containers.

↳ kubernetes Kubernetes

Kubernetes resources associated with the finding.

↳ database Database

Database associated with the finding.

↳ attack_exposure AttackExposure

The results of an attack path simulation relevant to this finding.

↳ files array<File>

File associated with the finding.

↳ cloud_dlp_inspection CloudDlpInspection

Cloud Data Loss Prevention (Cloud DLP) inspection results that are associated with the finding.

↳ cloud_dlp_data_profile CloudDlpDataProfile

Cloud DLP data profile that is associated with the finding.

↳ kernel_rootkit KernelRootkit

Signature of the kernel rootkit.

↳ org_policies array<OrgPolicy>

Contains information about the org policies associated with the finding.

↳ application Application

Represents an application associated with the finding.

↳ backup_disaster_recovery BackupDisasterRecovery

Fields related to Backup and DR findings.

↳ security_posture SecurityPosture

The security posture associated with the finding.

↳ log_entries array<LogEntry>

Log entries that are relevant to the finding.

↳ load_balancers array<LoadBalancer>

The load balancers associated with the finding.

↳ cloud_armor CloudArmor

Fields related to Cloud Armor findings.

↳ notebook Notebook

Notebook associated with the finding.

↳ toxic_combination ToxicCombination

Contains details about a group of security issues that, when the issues occur together, represent a greater risk than when the issues occur independently. A group of such issues is referred to as a toxic combination. This field cannot be updated. Its value is ignored in all update requests.

↳ group_memberships array<GroupMembership>

Contains details about groups of which this finding is a member. A group is a collection of findings that are related in some way. This field cannot be updated. Its value is ignored in all update requests.

getName

The relative resource name of the finding. Example: "organizations/{organization_id}/sources/{source_id}/findings/{finding_id}", "folders/{folder_id}/sources/{source_id}/findings/{finding_id}", "projects/{project_id}/sources/{source_id}/findings/{finding_id}".

Returns
Type Description
string

setName

The relative resource name of the finding. Example: "organizations/{organization_id}/sources/{source_id}/findings/{finding_id}", "folders/{folder_id}/sources/{source_id}/findings/{finding_id}", "projects/{project_id}/sources/{source_id}/findings/{finding_id}".

Parameter
Name Description
var string
Returns
Type Description
$this

getParent

The relative resource name of the source the finding belongs to. See: https://cloud.google.com/apis/design/resource_names#relative_resource_name This field is immutable after creation time.

For example: "organizations/{organization_id}/sources/{source_id}"

Returns
Type Description
string

setParent

The relative resource name of the source the finding belongs to. See: https://cloud.google.com/apis/design/resource_names#relative_resource_name This field is immutable after creation time.

For example: "organizations/{organization_id}/sources/{source_id}"

Parameter
Name Description
var string
Returns
Type Description
$this

getResourceName

For findings on Google Cloud resources, the full resource name of the Google Cloud resource this finding is for. See: https://cloud.google.com/apis/design/resource_names#full_resource_name When the finding is for a non-Google Cloud resource, the resourceName can be a customer or partner defined string. This field is immutable after creation time.

Returns
Type Description
string

setResourceName

For findings on Google Cloud resources, the full resource name of the Google Cloud resource this finding is for. See: https://cloud.google.com/apis/design/resource_names#full_resource_name When the finding is for a non-Google Cloud resource, the resourceName can be a customer or partner defined string. This field is immutable after creation time.

Parameter
Name Description
var string
Returns
Type Description
$this

getState

The state of the finding.

Returns
Type Description
int

setState

The state of the finding.

Parameter
Name Description
var int
Returns
Type Description
$this

getCategory

The additional taxonomy group within findings from a given source.

This field is immutable after creation time. Example: "XSS_FLASH_INJECTION"

Returns
Type Description
string

setCategory

The additional taxonomy group within findings from a given source.

This field is immutable after creation time. Example: "XSS_FLASH_INJECTION"

Parameter
Name Description
var string
Returns
Type Description
$this

getExternalUri

The URI that, if available, points to a web page outside of Security Command Center where additional information about the finding can be found.

This field is guaranteed to be either empty or a well formed URL.

Returns
Type Description
string

setExternalUri

The URI that, if available, points to a web page outside of Security Command Center where additional information about the finding can be found.

This field is guaranteed to be either empty or a well formed URL.

Parameter
Name Description
var string
Returns
Type Description
$this

getSourceProperties

Source specific properties. These properties are managed by the source that writes the finding. The key names in the source_properties map must be between 1 and 255 characters, and must start with a letter and contain alphanumeric characters or underscores only.

Returns
Type Description
Google\Protobuf\Internal\MapField

setSourceProperties

Source specific properties. These properties are managed by the source that writes the finding. The key names in the source_properties map must be between 1 and 255 characters, and must start with a letter and contain alphanumeric characters or underscores only.

Parameter
Name Description
var array|Google\Protobuf\Internal\MapField
Returns
Type Description
$this

getSecurityMarks

Output only. User specified security marks. These marks are entirely managed by the user and come from the SecurityMarks resource that belongs to the finding.

Returns
Type Description
SecurityMarks|null

hasSecurityMarks

clearSecurityMarks

setSecurityMarks

Output only. User specified security marks. These marks are entirely managed by the user and come from the SecurityMarks resource that belongs to the finding.

Parameter
Name Description
var SecurityMarks
Returns
Type Description
$this

getEventTime

The time the finding was first detected. If an existing finding is updated, then this is the time the update occurred.

For example, if the finding represents an open firewall, this property captures the time the detector believes the firewall became open. The accuracy is determined by the detector. If the finding is later resolved, then this time reflects when the finding was resolved. This must not be set to a value greater than the current timestamp.

Returns
Type Description
Google\Protobuf\Timestamp|null

hasEventTime

clearEventTime

setEventTime

The time the finding was first detected. If an existing finding is updated, then this is the time the update occurred.

For example, if the finding represents an open firewall, this property captures the time the detector believes the firewall became open. The accuracy is determined by the detector. If the finding is later resolved, then this time reflects when the finding was resolved. This must not be set to a value greater than the current timestamp.

Parameter
Name Description
var Google\Protobuf\Timestamp
Returns
Type Description
$this

getCreateTime

The time at which the finding was created in Security Command Center.

Returns
Type Description
Google\Protobuf\Timestamp|null

hasCreateTime

clearCreateTime

setCreateTime

The time at which the finding was created in Security Command Center.

Parameter
Name Description
var Google\Protobuf\Timestamp
Returns
Type Description
$this

getSeverity

The severity of the finding. This field is managed by the source that writes the finding.

Returns
Type Description
int

setSeverity

The severity of the finding. This field is managed by the source that writes the finding.

Parameter
Name Description
var int
Returns
Type Description
$this

getCanonicalName

The canonical name of the finding. It's either "organizations/{organization_id}/sources/{source_id}/findings/{finding_id}", "folders/{folder_id}/sources/{source_id}/findings/{finding_id}" or "projects/{project_number}/sources/{source_id}/findings/{finding_id}", depending on the closest CRM ancestor of the resource associated with the finding.

Returns
Type Description
string

setCanonicalName

The canonical name of the finding. It's either "organizations/{organization_id}/sources/{source_id}/findings/{finding_id}", "folders/{folder_id}/sources/{source_id}/findings/{finding_id}" or "projects/{project_number}/sources/{source_id}/findings/{finding_id}", depending on the closest CRM ancestor of the resource associated with the finding.

Parameter
Name Description
var string
Returns
Type Description
$this

getMute

Indicates the mute state of a finding (either muted, unmuted or undefined). Unlike other attributes of a finding, a finding provider shouldn't set the value of mute.

Returns
Type Description
int

setMute

Indicates the mute state of a finding (either muted, unmuted or undefined). Unlike other attributes of a finding, a finding provider shouldn't set the value of mute.

Parameter
Name Description
var int
Returns
Type Description
$this

getFindingClass

The class of the finding.

Returns
Type Description
int

setFindingClass

The class of the finding.

Parameter
Name Description
var int
Returns
Type Description
$this

getIndicator

Represents what's commonly known as an indicator of compromise (IoC) in computer forensics. This is an artifact observed on a network or in an operating system that, with high confidence, indicates a computer intrusion. For more information, see Indicator of compromise.

Returns
Type Description
Indicator|null

hasIndicator

clearIndicator

setIndicator

Represents what's commonly known as an indicator of compromise (IoC) in computer forensics. This is an artifact observed on a network or in an operating system that, with high confidence, indicates a computer intrusion. For more information, see Indicator of compromise.

Parameter
Name Description
var Indicator
Returns
Type Description
$this

getVulnerability

Represents vulnerability-specific fields like CVE and CVSS scores.

CVE stands for Common Vulnerabilities and Exposures (https://cve.mitre.org/about/)

Returns
Type Description
Vulnerability|null

hasVulnerability

clearVulnerability

setVulnerability

Represents vulnerability-specific fields like CVE and CVSS scores.

CVE stands for Common Vulnerabilities and Exposures (https://cve.mitre.org/about/)

Parameter
Name Description
var Vulnerability
Returns
Type Description
$this

getMuteUpdateTime

Output only. The most recent time this finding was muted or unmuted.

Returns
Type Description
Google\Protobuf\Timestamp|null

hasMuteUpdateTime

clearMuteUpdateTime

setMuteUpdateTime

Output only. The most recent time this finding was muted or unmuted.

Parameter
Name Description
var Google\Protobuf\Timestamp
Returns
Type Description
$this

getExternalSystems

Output only. Third party SIEM/SOAR fields within SCC, contains external system information and external system finding fields.

Returns
Type Description
Google\Protobuf\Internal\MapField

setExternalSystems

Output only. Third party SIEM/SOAR fields within SCC, contains external system information and external system finding fields.

Parameter
Name Description
var array|Google\Protobuf\Internal\MapField
Returns
Type Description
$this

getMitreAttack

MITRE ATT&CK tactics and techniques related to this finding.

See: https://attack.mitre.org

Returns
Type Description
MitreAttack|null

hasMitreAttack

clearMitreAttack

setMitreAttack

MITRE ATT&CK tactics and techniques related to this finding.

See: https://attack.mitre.org

Parameter
Name Description
var MitreAttack
Returns
Type Description
$this

getAccess

Access details associated with the finding, such as more information on the caller, which method was accessed, and from where.

Returns
Type Description
Access|null

hasAccess

clearAccess

setAccess

Access details associated with the finding, such as more information on the caller, which method was accessed, and from where.

Parameter
Name Description
var Access
Returns
Type Description
$this

getConnections

Contains information about the IP connection associated with the finding.

Returns
Type Description
Google\Protobuf\Internal\RepeatedField

setConnections

Contains information about the IP connection associated with the finding.

Parameter
Name Description
var array<Connection>
Returns
Type Description
$this

getMuteInitiator

Records additional information about the mute operation, for example, the mute configuration that muted the finding and the user who muted the finding.

Returns
Type Description
string

setMuteInitiator

Records additional information about the mute operation, for example, the mute configuration that muted the finding and the user who muted the finding.

Parameter
Name Description
var string
Returns
Type Description
$this

getMuteInfo

Output only. The mute information regarding this finding.

Returns
Type Description
Finding\MuteInfo|null

hasMuteInfo

clearMuteInfo

setMuteInfo

Output only. The mute information regarding this finding.

Parameter
Name Description
var Finding\MuteInfo
Returns
Type Description
$this

getProcesses

Represents operating system processes associated with the Finding.

Returns
Type Description
Google\Protobuf\Internal\RepeatedField

setProcesses

Represents operating system processes associated with the Finding.

Parameter
Name Description
var array<Process>
Returns
Type Description
$this

getContacts

Output only. Map containing the points of contact for the given finding.

The key represents the type of contact, while the value contains a list of all the contacts that pertain. Please refer to: https://cloud.google.com/resource-manager/docs/managing-notification-contacts#notification-categories { "security": { "contacts": [ { "email": "person1@company.com" }, { "email": "person2@company.com" } ] } }

Returns
Type Description
Google\Protobuf\Internal\MapField

setContacts

Output only. Map containing the points of contact for the given finding.

The key represents the type of contact, while the value contains a list of all the contacts that pertain. Please refer to: https://cloud.google.com/resource-manager/docs/managing-notification-contacts#notification-categories { "security": { "contacts": [ { "email": "person1@company.com" }, { "email": "person2@company.com" } ] } }

Parameter
Name Description
var array|Google\Protobuf\Internal\MapField
Returns
Type Description
$this

getCompliances

Contains compliance information for security standards associated to the finding.

Returns
Type Description
Google\Protobuf\Internal\RepeatedField

setCompliances

Contains compliance information for security standards associated to the finding.

Parameter
Name Description
var array<Compliance>
Returns
Type Description
$this

getParentDisplayName

Output only. The human readable display name of the finding source such as "Event Threat Detection" or "Security Health Analytics".

Returns
Type Description
string

setParentDisplayName

Output only. The human readable display name of the finding source such as "Event Threat Detection" or "Security Health Analytics".

Parameter
Name Description
var string
Returns
Type Description
$this

getDescription

Contains more details about the finding.

Returns
Type Description
string

setDescription

Contains more details about the finding.

Parameter
Name Description
var string
Returns
Type Description
$this

getExfiltration

Represents exfiltrations associated with the finding.

Returns
Type Description
Exfiltration|null

hasExfiltration

clearExfiltration

setExfiltration

Represents exfiltrations associated with the finding.

Parameter
Name Description
var Exfiltration
Returns
Type Description
$this

getIamBindings

Represents IAM bindings associated with the finding.

Returns
Type Description
Google\Protobuf\Internal\RepeatedField

setIamBindings

Represents IAM bindings associated with the finding.

Parameter
Name Description
var array<IamBinding>
Returns
Type Description
$this

getNextSteps

Steps to address the finding.

Returns
Type Description
string

setNextSteps

Steps to address the finding.

Parameter
Name Description
var string
Returns
Type Description
$this

getModuleName

Unique identifier of the module which generated the finding.

Example: folders/598186756061/securityHealthAnalyticsSettings/customModules/56799441161885

Returns
Type Description
string

setModuleName

Unique identifier of the module which generated the finding.

Example: folders/598186756061/securityHealthAnalyticsSettings/customModules/56799441161885

Parameter
Name Description
var string
Returns
Type Description
$this

getContainers

Containers associated with the finding. This field provides information for both Kubernetes and non-Kubernetes containers.

Returns
Type Description
Google\Protobuf\Internal\RepeatedField

setContainers

Containers associated with the finding. This field provides information for both Kubernetes and non-Kubernetes containers.

Parameter
Name Description
var array<Container>
Returns
Type Description
$this

getKubernetes

Kubernetes resources associated with the finding.

Returns
Type Description
Kubernetes|null

hasKubernetes

clearKubernetes

setKubernetes

Kubernetes resources associated with the finding.

Parameter
Name Description
var Kubernetes
Returns
Type Description
$this

getDatabase

Database associated with the finding.

Returns
Type Description
Database|null

hasDatabase

clearDatabase

setDatabase

Database associated with the finding.

Parameter
Name Description
var Database
Returns
Type Description
$this

getAttackExposure

The results of an attack path simulation relevant to this finding.

Returns
Type Description
AttackExposure|null

hasAttackExposure

clearAttackExposure

setAttackExposure

The results of an attack path simulation relevant to this finding.

Parameter
Name Description
var AttackExposure
Returns
Type Description
$this

getFiles

File associated with the finding.

Returns
Type Description
Google\Protobuf\Internal\RepeatedField

setFiles

File associated with the finding.

Parameter
Name Description
var array<File>
Returns
Type Description
$this

getCloudDlpInspection

Cloud Data Loss Prevention (Cloud DLP) inspection results that are associated with the finding.

Returns
Type Description
CloudDlpInspection|null

hasCloudDlpInspection

clearCloudDlpInspection

setCloudDlpInspection

Cloud Data Loss Prevention (Cloud DLP) inspection results that are associated with the finding.

Parameter
Name Description
var CloudDlpInspection
Returns
Type Description
$this

getCloudDlpDataProfile

Cloud DLP data profile that is associated with the finding.

Returns
Type Description
CloudDlpDataProfile|null

hasCloudDlpDataProfile

clearCloudDlpDataProfile

setCloudDlpDataProfile

Cloud DLP data profile that is associated with the finding.

Parameter
Name Description
var CloudDlpDataProfile
Returns
Type Description
$this

getKernelRootkit

Signature of the kernel rootkit.

Returns
Type Description
KernelRootkit|null

hasKernelRootkit

clearKernelRootkit

setKernelRootkit

Signature of the kernel rootkit.

Parameter
Name Description
var KernelRootkit
Returns
Type Description
$this

getOrgPolicies

Contains information about the org policies associated with the finding.

Returns
Type Description
Google\Protobuf\Internal\RepeatedField

setOrgPolicies

Contains information about the org policies associated with the finding.

Parameter
Name Description
var array<OrgPolicy>
Returns
Type Description
$this

getApplication

Represents an application associated with the finding.

Returns
Type Description
Application|null

hasApplication

clearApplication

setApplication

Represents an application associated with the finding.

Parameter
Name Description
var Application
Returns
Type Description
$this

getBackupDisasterRecovery

Fields related to Backup and DR findings.

Returns
Type Description
BackupDisasterRecovery|null

hasBackupDisasterRecovery

clearBackupDisasterRecovery

setBackupDisasterRecovery

Fields related to Backup and DR findings.

Parameter
Name Description
var BackupDisasterRecovery
Returns
Type Description
$this

getSecurityPosture

The security posture associated with the finding.

Returns
Type Description
SecurityPosture|null

hasSecurityPosture

clearSecurityPosture

setSecurityPosture

The security posture associated with the finding.

Parameter
Name Description
var SecurityPosture
Returns
Type Description
$this

getLogEntries

Log entries that are relevant to the finding.

Returns
Type Description
Google\Protobuf\Internal\RepeatedField

setLogEntries

Log entries that are relevant to the finding.

Parameter
Name Description
var array<LogEntry>
Returns
Type Description
$this

getLoadBalancers

The load balancers associated with the finding.

Returns
Type Description
Google\Protobuf\Internal\RepeatedField

setLoadBalancers

The load balancers associated with the finding.

Parameter
Name Description
var array<LoadBalancer>
Returns
Type Description
$this

getCloudArmor

Fields related to Cloud Armor findings.

Returns
Type Description
CloudArmor|null

hasCloudArmor

clearCloudArmor

setCloudArmor

Fields related to Cloud Armor findings.

Parameter
Name Description
var CloudArmor
Returns
Type Description
$this

getNotebook

Notebook associated with the finding.

Returns
Type Description
Notebook|null

hasNotebook

clearNotebook

setNotebook

Notebook associated with the finding.

Parameter
Name Description
var Notebook
Returns
Type Description
$this

getToxicCombination

Contains details about a group of security issues that, when the issues occur together, represent a greater risk than when the issues occur independently. A group of such issues is referred to as a toxic combination.

This field cannot be updated. Its value is ignored in all update requests.

Returns
Type Description
ToxicCombination|null

hasToxicCombination

clearToxicCombination

setToxicCombination

Contains details about a group of security issues that, when the issues occur together, represent a greater risk than when the issues occur independently. A group of such issues is referred to as a toxic combination.

This field cannot be updated. Its value is ignored in all update requests.

Parameter
Name Description
var ToxicCombination
Returns
Type Description
$this

getGroupMemberships

Contains details about groups of which this finding is a member. A group is a collection of findings that are related in some way.

This field cannot be updated. Its value is ignored in all update requests.

Returns
Type Description
Google\Protobuf\Internal\RepeatedField

setGroupMemberships

Contains details about groups of which this finding is a member. A group is a collection of findings that are related in some way.

This field cannot be updated. Its value is ignored in all update requests.

Parameter
Name Description
var array<GroupMembership>
Returns
Type Description
$this