Reference documentation and code samples for the Google Cloud Security Command Center V1 Client class Finding.
Security Command Center finding.
A finding is a record of assessment data like security, risk, health, or privacy, that is ingested into Security Command Center for presentation, notification, analysis, policy testing, and enforcement. For example, a cross-site scripting (XSS) vulnerability in an App Engine application is a finding.
Generated from protobuf message google.cloud.securitycenter.v1.Finding
Namespace
Google \ Cloud \ SecurityCenter \ V1Methods
__construct
Constructor.
Parameters | |
---|---|
Name | Description |
data |
array
Optional. Data for populating the Message object. |
↳ name |
string
The relative resource name of the finding. Example: "organizations/{organization_id}/sources/{source_id}/findings/{finding_id}", "folders/{folder_id}/sources/{source_id}/findings/{finding_id}", "projects/{project_id}/sources/{source_id}/findings/{finding_id}". |
↳ parent |
string
The relative resource name of the source the finding belongs to. See: https://cloud.google.com/apis/design/resource_names#relative_resource_name This field is immutable after creation time. For example: "organizations/{organization_id}/sources/{source_id}" |
↳ resource_name |
string
For findings on Google Cloud resources, the full resource name of the Google Cloud resource this finding is for. See: https://cloud.google.com/apis/design/resource_names#full_resource_name When the finding is for a non-Google Cloud resource, the resourceName can be a customer or partner defined string. This field is immutable after creation time. |
↳ state |
int
The state of the finding. |
↳ category |
string
The additional taxonomy group within findings from a given source. This field is immutable after creation time. Example: "XSS_FLASH_INJECTION" |
↳ external_uri |
string
The URI that, if available, points to a web page outside of Security Command Center where additional information about the finding can be found. This field is guaranteed to be either empty or a well formed URL. |
↳ source_properties |
array|Google\Protobuf\Internal\MapField
Source specific properties. These properties are managed by the source that writes the finding. The key names in the source_properties map must be between 1 and 255 characters, and must start with a letter and contain alphanumeric characters or underscores only. |
↳ security_marks |
SecurityMarks
Output only. User specified security marks. These marks are entirely managed by the user and come from the SecurityMarks resource that belongs to the finding. |
↳ event_time |
Google\Protobuf\Timestamp
The time the finding was first detected. If an existing finding is updated, then this is the time the update occurred. For example, if the finding represents an open firewall, this property captures the time the detector believes the firewall became open. The accuracy is determined by the detector. If the finding is later resolved, then this time reflects when the finding was resolved. This must not be set to a value greater than the current timestamp. |
↳ create_time |
Google\Protobuf\Timestamp
The time at which the finding was created in Security Command Center. |
↳ severity |
int
The severity of the finding. This field is managed by the source that writes the finding. |
↳ canonical_name |
string
The canonical name of the finding. It's either "organizations/{organization_id}/sources/{source_id}/findings/{finding_id}", "folders/{folder_id}/sources/{source_id}/findings/{finding_id}" or "projects/{project_number}/sources/{source_id}/findings/{finding_id}", depending on the closest CRM ancestor of the resource associated with the finding. |
↳ mute |
int
Indicates the mute state of a finding (either muted, unmuted or undefined). Unlike other attributes of a finding, a finding provider shouldn't set the value of mute. |
↳ finding_class |
int
The class of the finding. |
↳ indicator |
Indicator
Represents what's commonly known as an indicator of compromise (IoC) in computer forensics. This is an artifact observed on a network or in an operating system that, with high confidence, indicates a computer intrusion. For more information, see Indicator of compromise. |
↳ vulnerability |
Vulnerability
Represents vulnerability-specific fields like CVE and CVSS scores. CVE stands for Common Vulnerabilities and Exposures (https://cve.mitre.org/about/) |
↳ mute_update_time |
Google\Protobuf\Timestamp
Output only. The most recent time this finding was muted or unmuted. |
↳ external_systems |
array|Google\Protobuf\Internal\MapField
Output only. Third party SIEM/SOAR fields within SCC, contains external system information and external system finding fields. |
↳ mitre_attack |
MitreAttack
MITRE ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org |
↳ access |
Access
Access details associated with the finding, such as more information on the caller, which method was accessed, and from where. |
↳ connections |
array<Connection>
Contains information about the IP connection associated with the finding. |
↳ mute_initiator |
string
Records additional information about the mute operation, for example, the mute configuration that muted the finding and the user who muted the finding. |
↳ mute_info |
Finding\MuteInfo
Output only. The mute information regarding this finding. |
↳ processes |
array<Process>
Represents operating system processes associated with the Finding. |
↳ contacts |
array|Google\Protobuf\Internal\MapField
Output only. Map containing the points of contact for the given finding. The key represents the type of contact, while the value contains a list of all the contacts that pertain. Please refer to: https://cloud.google.com/resource-manager/docs/managing-notification-contacts#notification-categories { "security": { "contacts": [ { "email": "person1@company.com" }, { "email": "person2@company.com" } ] } } |
↳ compliances |
array<Compliance>
Contains compliance information for security standards associated to the finding. |
↳ parent_display_name |
string
Output only. The human readable display name of the finding source such as "Event Threat Detection" or "Security Health Analytics". |
↳ description |
string
Contains more details about the finding. |
↳ exfiltration |
Exfiltration
Represents exfiltrations associated with the finding. |
↳ iam_bindings |
array<IamBinding>
Represents IAM bindings associated with the finding. |
↳ next_steps |
string
Steps to address the finding. |
↳ module_name |
string
Unique identifier of the module which generated the finding. Example: folders/598186756061/securityHealthAnalyticsSettings/customModules/56799441161885 |
↳ containers |
array<Container>
Containers associated with the finding. This field provides information for both Kubernetes and non-Kubernetes containers. |
↳ kubernetes |
Kubernetes
Kubernetes resources associated with the finding. |
↳ database |
Database
Database associated with the finding. |
↳ attack_exposure |
AttackExposure
The results of an attack path simulation relevant to this finding. |
↳ files |
array<File>
File associated with the finding. |
↳ cloud_dlp_inspection |
CloudDlpInspection
Cloud Data Loss Prevention (Cloud DLP) inspection results that are associated with the finding. |
↳ cloud_dlp_data_profile |
CloudDlpDataProfile
Cloud DLP data profile that is associated with the finding. |
↳ kernel_rootkit |
KernelRootkit
Signature of the kernel rootkit. |
↳ org_policies |
array<OrgPolicy>
Contains information about the org policies associated with the finding. |
↳ application |
Application
Represents an application associated with the finding. |
↳ backup_disaster_recovery |
BackupDisasterRecovery
Fields related to Backup and DR findings. |
↳ security_posture |
SecurityPosture
The security posture associated with the finding. |
↳ log_entries |
array<LogEntry>
Log entries that are relevant to the finding. |
↳ load_balancers |
array<LoadBalancer>
The load balancers associated with the finding. |
↳ cloud_armor |
CloudArmor
Fields related to Cloud Armor findings. |
↳ notebook |
Notebook
Notebook associated with the finding. |
↳ toxic_combination |
ToxicCombination
Contains details about a group of security issues that, when the issues occur together, represent a greater risk than when the issues occur independently. A group of such issues is referred to as a toxic combination. This field cannot be updated. Its value is ignored in all update requests. |
↳ group_memberships |
array<GroupMembership>
Contains details about groups of which this finding is a member. A group is a collection of findings that are related in some way. This field cannot be updated. Its value is ignored in all update requests. |
getName
The relative resource name of the finding. Example: "organizations/{organization_id}/sources/{source_id}/findings/{finding_id}", "folders/{folder_id}/sources/{source_id}/findings/{finding_id}", "projects/{project_id}/sources/{source_id}/findings/{finding_id}".
Returns | |
---|---|
Type | Description |
string |
setName
The relative resource name of the finding. Example: "organizations/{organization_id}/sources/{source_id}/findings/{finding_id}", "folders/{folder_id}/sources/{source_id}/findings/{finding_id}", "projects/{project_id}/sources/{source_id}/findings/{finding_id}".
Parameter | |
---|---|
Name | Description |
var |
string
|
Returns | |
---|---|
Type | Description |
$this |
getParent
The relative resource name of the source the finding belongs to. See: https://cloud.google.com/apis/design/resource_names#relative_resource_name This field is immutable after creation time.
For example: "organizations/{organization_id}/sources/{source_id}"
Returns | |
---|---|
Type | Description |
string |
setParent
The relative resource name of the source the finding belongs to. See: https://cloud.google.com/apis/design/resource_names#relative_resource_name This field is immutable after creation time.
For example: "organizations/{organization_id}/sources/{source_id}"
Parameter | |
---|---|
Name | Description |
var |
string
|
Returns | |
---|---|
Type | Description |
$this |
getResourceName
For findings on Google Cloud resources, the full resource name of the Google Cloud resource this finding is for. See: https://cloud.google.com/apis/design/resource_names#full_resource_name When the finding is for a non-Google Cloud resource, the resourceName can be a customer or partner defined string. This field is immutable after creation time.
Returns | |
---|---|
Type | Description |
string |
setResourceName
For findings on Google Cloud resources, the full resource name of the Google Cloud resource this finding is for. See: https://cloud.google.com/apis/design/resource_names#full_resource_name When the finding is for a non-Google Cloud resource, the resourceName can be a customer or partner defined string. This field is immutable after creation time.
Parameter | |
---|---|
Name | Description |
var |
string
|
Returns | |
---|---|
Type | Description |
$this |
getState
The state of the finding.
Returns | |
---|---|
Type | Description |
int |
setState
The state of the finding.
Parameter | |
---|---|
Name | Description |
var |
int
|
Returns | |
---|---|
Type | Description |
$this |
getCategory
The additional taxonomy group within findings from a given source.
This field is immutable after creation time. Example: "XSS_FLASH_INJECTION"
Returns | |
---|---|
Type | Description |
string |
setCategory
The additional taxonomy group within findings from a given source.
This field is immutable after creation time. Example: "XSS_FLASH_INJECTION"
Parameter | |
---|---|
Name | Description |
var |
string
|
Returns | |
---|---|
Type | Description |
$this |
getExternalUri
The URI that, if available, points to a web page outside of Security Command Center where additional information about the finding can be found.
This field is guaranteed to be either empty or a well formed URL.
Returns | |
---|---|
Type | Description |
string |
setExternalUri
The URI that, if available, points to a web page outside of Security Command Center where additional information about the finding can be found.
This field is guaranteed to be either empty or a well formed URL.
Parameter | |
---|---|
Name | Description |
var |
string
|
Returns | |
---|---|
Type | Description |
$this |
getSourceProperties
Source specific properties. These properties are managed by the source that writes the finding. The key names in the source_properties map must be between 1 and 255 characters, and must start with a letter and contain alphanumeric characters or underscores only.
Returns | |
---|---|
Type | Description |
Google\Protobuf\Internal\MapField |
setSourceProperties
Source specific properties. These properties are managed by the source that writes the finding. The key names in the source_properties map must be between 1 and 255 characters, and must start with a letter and contain alphanumeric characters or underscores only.
Parameter | |
---|---|
Name | Description |
var |
array|Google\Protobuf\Internal\MapField
|
Returns | |
---|---|
Type | Description |
$this |
getSecurityMarks
Output only. User specified security marks. These marks are entirely managed by the user and come from the SecurityMarks resource that belongs to the finding.
Returns | |
---|---|
Type | Description |
SecurityMarks|null |
hasSecurityMarks
clearSecurityMarks
setSecurityMarks
Output only. User specified security marks. These marks are entirely managed by the user and come from the SecurityMarks resource that belongs to the finding.
Parameter | |
---|---|
Name | Description |
var |
SecurityMarks
|
Returns | |
---|---|
Type | Description |
$this |
getEventTime
The time the finding was first detected. If an existing finding is updated, then this is the time the update occurred.
For example, if the finding represents an open firewall, this property captures the time the detector believes the firewall became open. The accuracy is determined by the detector. If the finding is later resolved, then this time reflects when the finding was resolved. This must not be set to a value greater than the current timestamp.
Returns | |
---|---|
Type | Description |
Google\Protobuf\Timestamp|null |
hasEventTime
clearEventTime
setEventTime
The time the finding was first detected. If an existing finding is updated, then this is the time the update occurred.
For example, if the finding represents an open firewall, this property captures the time the detector believes the firewall became open. The accuracy is determined by the detector. If the finding is later resolved, then this time reflects when the finding was resolved. This must not be set to a value greater than the current timestamp.
Parameter | |
---|---|
Name | Description |
var |
Google\Protobuf\Timestamp
|
Returns | |
---|---|
Type | Description |
$this |
getCreateTime
The time at which the finding was created in Security Command Center.
Returns | |
---|---|
Type | Description |
Google\Protobuf\Timestamp|null |
hasCreateTime
clearCreateTime
setCreateTime
The time at which the finding was created in Security Command Center.
Parameter | |
---|---|
Name | Description |
var |
Google\Protobuf\Timestamp
|
Returns | |
---|---|
Type | Description |
$this |
getSeverity
The severity of the finding. This field is managed by the source that writes the finding.
Returns | |
---|---|
Type | Description |
int |
setSeverity
The severity of the finding. This field is managed by the source that writes the finding.
Parameter | |
---|---|
Name | Description |
var |
int
|
Returns | |
---|---|
Type | Description |
$this |
getCanonicalName
The canonical name of the finding. It's either "organizations/{organization_id}/sources/{source_id}/findings/{finding_id}", "folders/{folder_id}/sources/{source_id}/findings/{finding_id}" or "projects/{project_number}/sources/{source_id}/findings/{finding_id}", depending on the closest CRM ancestor of the resource associated with the finding.
Returns | |
---|---|
Type | Description |
string |
setCanonicalName
The canonical name of the finding. It's either "organizations/{organization_id}/sources/{source_id}/findings/{finding_id}", "folders/{folder_id}/sources/{source_id}/findings/{finding_id}" or "projects/{project_number}/sources/{source_id}/findings/{finding_id}", depending on the closest CRM ancestor of the resource associated with the finding.
Parameter | |
---|---|
Name | Description |
var |
string
|
Returns | |
---|---|
Type | Description |
$this |
getMute
Indicates the mute state of a finding (either muted, unmuted or undefined). Unlike other attributes of a finding, a finding provider shouldn't set the value of mute.
Returns | |
---|---|
Type | Description |
int |
setMute
Indicates the mute state of a finding (either muted, unmuted or undefined). Unlike other attributes of a finding, a finding provider shouldn't set the value of mute.
Parameter | |
---|---|
Name | Description |
var |
int
|
Returns | |
---|---|
Type | Description |
$this |
getFindingClass
The class of the finding.
Returns | |
---|---|
Type | Description |
int |
setFindingClass
The class of the finding.
Parameter | |
---|---|
Name | Description |
var |
int
|
Returns | |
---|---|
Type | Description |
$this |
getIndicator
Represents what's commonly known as an indicator of compromise (IoC) in computer forensics. This is an artifact observed on a network or in an operating system that, with high confidence, indicates a computer intrusion. For more information, see Indicator of compromise.
Returns | |
---|---|
Type | Description |
Indicator|null |
hasIndicator
clearIndicator
setIndicator
Represents what's commonly known as an indicator of compromise (IoC) in computer forensics. This is an artifact observed on a network or in an operating system that, with high confidence, indicates a computer intrusion. For more information, see Indicator of compromise.
Parameter | |
---|---|
Name | Description |
var |
Indicator
|
Returns | |
---|---|
Type | Description |
$this |
getVulnerability
Represents vulnerability-specific fields like CVE and CVSS scores.
CVE stands for Common Vulnerabilities and Exposures (https://cve.mitre.org/about/)
Returns | |
---|---|
Type | Description |
Vulnerability|null |
hasVulnerability
clearVulnerability
setVulnerability
Represents vulnerability-specific fields like CVE and CVSS scores.
CVE stands for Common Vulnerabilities and Exposures (https://cve.mitre.org/about/)
Parameter | |
---|---|
Name | Description |
var |
Vulnerability
|
Returns | |
---|---|
Type | Description |
$this |
getMuteUpdateTime
Output only. The most recent time this finding was muted or unmuted.
Returns | |
---|---|
Type | Description |
Google\Protobuf\Timestamp|null |
hasMuteUpdateTime
clearMuteUpdateTime
setMuteUpdateTime
Output only. The most recent time this finding was muted or unmuted.
Parameter | |
---|---|
Name | Description |
var |
Google\Protobuf\Timestamp
|
Returns | |
---|---|
Type | Description |
$this |
getExternalSystems
Output only. Third party SIEM/SOAR fields within SCC, contains external system information and external system finding fields.
Returns | |
---|---|
Type | Description |
Google\Protobuf\Internal\MapField |
setExternalSystems
Output only. Third party SIEM/SOAR fields within SCC, contains external system information and external system finding fields.
Parameter | |
---|---|
Name | Description |
var |
array|Google\Protobuf\Internal\MapField
|
Returns | |
---|---|
Type | Description |
$this |
getMitreAttack
MITRE ATT&CK tactics and techniques related to this finding.
Returns | |
---|---|
Type | Description |
MitreAttack|null |
hasMitreAttack
clearMitreAttack
setMitreAttack
MITRE ATT&CK tactics and techniques related to this finding.
Parameter | |
---|---|
Name | Description |
var |
MitreAttack
|
Returns | |
---|---|
Type | Description |
$this |
getAccess
Access details associated with the finding, such as more information on the caller, which method was accessed, and from where.
Returns | |
---|---|
Type | Description |
Access|null |
hasAccess
clearAccess
setAccess
Access details associated with the finding, such as more information on the caller, which method was accessed, and from where.
Parameter | |
---|---|
Name | Description |
var |
Access
|
Returns | |
---|---|
Type | Description |
$this |
getConnections
Contains information about the IP connection associated with the finding.
Returns | |
---|---|
Type | Description |
Google\Protobuf\Internal\RepeatedField |
setConnections
Contains information about the IP connection associated with the finding.
Parameter | |
---|---|
Name | Description |
var |
array<Connection>
|
Returns | |
---|---|
Type | Description |
$this |
getMuteInitiator
Records additional information about the mute operation, for example, the mute configuration that muted the finding and the user who muted the finding.
Returns | |
---|---|
Type | Description |
string |
setMuteInitiator
Records additional information about the mute operation, for example, the mute configuration that muted the finding and the user who muted the finding.
Parameter | |
---|---|
Name | Description |
var |
string
|
Returns | |
---|---|
Type | Description |
$this |
getMuteInfo
Output only. The mute information regarding this finding.
Returns | |
---|---|
Type | Description |
Finding\MuteInfo|null |
hasMuteInfo
clearMuteInfo
setMuteInfo
Output only. The mute information regarding this finding.
Parameter | |
---|---|
Name | Description |
var |
Finding\MuteInfo
|
Returns | |
---|---|
Type | Description |
$this |
getProcesses
Represents operating system processes associated with the Finding.
Returns | |
---|---|
Type | Description |
Google\Protobuf\Internal\RepeatedField |
setProcesses
Represents operating system processes associated with the Finding.
Parameter | |
---|---|
Name | Description |
var |
array<Process>
|
Returns | |
---|---|
Type | Description |
$this |
getContacts
Output only. Map containing the points of contact for the given finding.
The key represents the type of contact, while the value contains a list of all the contacts that pertain. Please refer to: https://cloud.google.com/resource-manager/docs/managing-notification-contacts#notification-categories { "security": { "contacts": [ { "email": "person1@company.com" }, { "email": "person2@company.com" } ] } }
Returns | |
---|---|
Type | Description |
Google\Protobuf\Internal\MapField |
setContacts
Output only. Map containing the points of contact for the given finding.
The key represents the type of contact, while the value contains a list of all the contacts that pertain. Please refer to: https://cloud.google.com/resource-manager/docs/managing-notification-contacts#notification-categories { "security": { "contacts": [ { "email": "person1@company.com" }, { "email": "person2@company.com" } ] } }
Parameter | |
---|---|
Name | Description |
var |
array|Google\Protobuf\Internal\MapField
|
Returns | |
---|---|
Type | Description |
$this |
getCompliances
Contains compliance information for security standards associated to the finding.
Returns | |
---|---|
Type | Description |
Google\Protobuf\Internal\RepeatedField |
setCompliances
Contains compliance information for security standards associated to the finding.
Parameter | |
---|---|
Name | Description |
var |
array<Compliance>
|
Returns | |
---|---|
Type | Description |
$this |
getParentDisplayName
Output only. The human readable display name of the finding source such as "Event Threat Detection" or "Security Health Analytics".
Returns | |
---|---|
Type | Description |
string |
setParentDisplayName
Output only. The human readable display name of the finding source such as "Event Threat Detection" or "Security Health Analytics".
Parameter | |
---|---|
Name | Description |
var |
string
|
Returns | |
---|---|
Type | Description |
$this |
getDescription
Contains more details about the finding.
Returns | |
---|---|
Type | Description |
string |
setDescription
Contains more details about the finding.
Parameter | |
---|---|
Name | Description |
var |
string
|
Returns | |
---|---|
Type | Description |
$this |
getExfiltration
Represents exfiltrations associated with the finding.
Returns | |
---|---|
Type | Description |
Exfiltration|null |
hasExfiltration
clearExfiltration
setExfiltration
Represents exfiltrations associated with the finding.
Parameter | |
---|---|
Name | Description |
var |
Exfiltration
|
Returns | |
---|---|
Type | Description |
$this |
getIamBindings
Represents IAM bindings associated with the finding.
Returns | |
---|---|
Type | Description |
Google\Protobuf\Internal\RepeatedField |
setIamBindings
Represents IAM bindings associated with the finding.
Parameter | |
---|---|
Name | Description |
var |
array<IamBinding>
|
Returns | |
---|---|
Type | Description |
$this |
getNextSteps
Steps to address the finding.
Returns | |
---|---|
Type | Description |
string |
setNextSteps
Steps to address the finding.
Parameter | |
---|---|
Name | Description |
var |
string
|
Returns | |
---|---|
Type | Description |
$this |
getModuleName
Unique identifier of the module which generated the finding.
Example: folders/598186756061/securityHealthAnalyticsSettings/customModules/56799441161885
Returns | |
---|---|
Type | Description |
string |
setModuleName
Unique identifier of the module which generated the finding.
Example: folders/598186756061/securityHealthAnalyticsSettings/customModules/56799441161885
Parameter | |
---|---|
Name | Description |
var |
string
|
Returns | |
---|---|
Type | Description |
$this |
getContainers
Containers associated with the finding. This field provides information for both Kubernetes and non-Kubernetes containers.
Returns | |
---|---|
Type | Description |
Google\Protobuf\Internal\RepeatedField |
setContainers
Containers associated with the finding. This field provides information for both Kubernetes and non-Kubernetes containers.
Parameter | |
---|---|
Name | Description |
var |
array<Container>
|
Returns | |
---|---|
Type | Description |
$this |
getKubernetes
Kubernetes resources associated with the finding.
Returns | |
---|---|
Type | Description |
Kubernetes|null |
hasKubernetes
clearKubernetes
setKubernetes
Kubernetes resources associated with the finding.
Parameter | |
---|---|
Name | Description |
var |
Kubernetes
|
Returns | |
---|---|
Type | Description |
$this |
getDatabase
Database associated with the finding.
Returns | |
---|---|
Type | Description |
Database|null |
hasDatabase
clearDatabase
setDatabase
Database associated with the finding.
Parameter | |
---|---|
Name | Description |
var |
Database
|
Returns | |
---|---|
Type | Description |
$this |
getAttackExposure
The results of an attack path simulation relevant to this finding.
Returns | |
---|---|
Type | Description |
AttackExposure|null |
hasAttackExposure
clearAttackExposure
setAttackExposure
The results of an attack path simulation relevant to this finding.
Parameter | |
---|---|
Name | Description |
var |
AttackExposure
|
Returns | |
---|---|
Type | Description |
$this |
getFiles
File associated with the finding.
Returns | |
---|---|
Type | Description |
Google\Protobuf\Internal\RepeatedField |
setFiles
File associated with the finding.
Parameter | |
---|---|
Name | Description |
var |
array<File>
|
Returns | |
---|---|
Type | Description |
$this |
getCloudDlpInspection
Cloud Data Loss Prevention (Cloud DLP) inspection results that are associated with the finding.
Returns | |
---|---|
Type | Description |
CloudDlpInspection|null |
hasCloudDlpInspection
clearCloudDlpInspection
setCloudDlpInspection
Cloud Data Loss Prevention (Cloud DLP) inspection results that are associated with the finding.
Parameter | |
---|---|
Name | Description |
var |
CloudDlpInspection
|
Returns | |
---|---|
Type | Description |
$this |
getCloudDlpDataProfile
Cloud DLP data profile that is associated with the finding.
Returns | |
---|---|
Type | Description |
CloudDlpDataProfile|null |
hasCloudDlpDataProfile
clearCloudDlpDataProfile
setCloudDlpDataProfile
Cloud DLP data profile that is associated with the finding.
Parameter | |
---|---|
Name | Description |
var |
CloudDlpDataProfile
|
Returns | |
---|---|
Type | Description |
$this |
getKernelRootkit
Signature of the kernel rootkit.
Returns | |
---|---|
Type | Description |
KernelRootkit|null |
hasKernelRootkit
clearKernelRootkit
setKernelRootkit
Signature of the kernel rootkit.
Parameter | |
---|---|
Name | Description |
var |
KernelRootkit
|
Returns | |
---|---|
Type | Description |
$this |
getOrgPolicies
Contains information about the org policies associated with the finding.
Returns | |
---|---|
Type | Description |
Google\Protobuf\Internal\RepeatedField |
setOrgPolicies
Contains information about the org policies associated with the finding.
Parameter | |
---|---|
Name | Description |
var |
array<OrgPolicy>
|
Returns | |
---|---|
Type | Description |
$this |
getApplication
Represents an application associated with the finding.
Returns | |
---|---|
Type | Description |
Application|null |
hasApplication
clearApplication
setApplication
Represents an application associated with the finding.
Parameter | |
---|---|
Name | Description |
var |
Application
|
Returns | |
---|---|
Type | Description |
$this |
getBackupDisasterRecovery
Fields related to Backup and DR findings.
Returns | |
---|---|
Type | Description |
BackupDisasterRecovery|null |
hasBackupDisasterRecovery
clearBackupDisasterRecovery
setBackupDisasterRecovery
Fields related to Backup and DR findings.
Parameter | |
---|---|
Name | Description |
var |
BackupDisasterRecovery
|
Returns | |
---|---|
Type | Description |
$this |
getSecurityPosture
The security posture associated with the finding.
Returns | |
---|---|
Type | Description |
SecurityPosture|null |
hasSecurityPosture
clearSecurityPosture
setSecurityPosture
The security posture associated with the finding.
Parameter | |
---|---|
Name | Description |
var |
SecurityPosture
|
Returns | |
---|---|
Type | Description |
$this |
getLogEntries
Log entries that are relevant to the finding.
Returns | |
---|---|
Type | Description |
Google\Protobuf\Internal\RepeatedField |
setLogEntries
Log entries that are relevant to the finding.
Parameter | |
---|---|
Name | Description |
var |
array<LogEntry>
|
Returns | |
---|---|
Type | Description |
$this |
getLoadBalancers
The load balancers associated with the finding.
Returns | |
---|---|
Type | Description |
Google\Protobuf\Internal\RepeatedField |
setLoadBalancers
The load balancers associated with the finding.
Parameter | |
---|---|
Name | Description |
var |
array<LoadBalancer>
|
Returns | |
---|---|
Type | Description |
$this |
getCloudArmor
Fields related to Cloud Armor findings.
Returns | |
---|---|
Type | Description |
CloudArmor|null |
hasCloudArmor
clearCloudArmor
setCloudArmor
Fields related to Cloud Armor findings.
Parameter | |
---|---|
Name | Description |
var |
CloudArmor
|
Returns | |
---|---|
Type | Description |
$this |
getNotebook
Notebook associated with the finding.
Returns | |
---|---|
Type | Description |
Notebook|null |
hasNotebook
clearNotebook
setNotebook
Notebook associated with the finding.
Parameter | |
---|---|
Name | Description |
var |
Notebook
|
Returns | |
---|---|
Type | Description |
$this |
getToxicCombination
Contains details about a group of security issues that, when the issues occur together, represent a greater risk than when the issues occur independently. A group of such issues is referred to as a toxic combination.
This field cannot be updated. Its value is ignored in all update requests.
Returns | |
---|---|
Type | Description |
ToxicCombination|null |
hasToxicCombination
clearToxicCombination
setToxicCombination
Contains details about a group of security issues that, when the issues occur together, represent a greater risk than when the issues occur independently. A group of such issues is referred to as a toxic combination.
This field cannot be updated. Its value is ignored in all update requests.
Parameter | |
---|---|
Name | Description |
var |
ToxicCombination
|
Returns | |
---|---|
Type | Description |
$this |
getGroupMemberships
Contains details about groups of which this finding is a member. A group is a collection of findings that are related in some way.
This field cannot be updated. Its value is ignored in all update requests.
Returns | |
---|---|
Type | Description |
Google\Protobuf\Internal\RepeatedField |
setGroupMemberships
Contains details about groups of which this finding is a member. A group is a collection of findings that are related in some way.
This field cannot be updated. Its value is ignored in all update requests.
Parameter | |
---|---|
Name | Description |
var |
array<GroupMembership>
|
Returns | |
---|---|
Type | Description |
$this |