REST Resource: folders.locations.findingSummaries

Resource: FindingSummary

The details for a finding.

JSON representation
{
  "findingCategory": string,
  "findingClass": enum (FindingClass),
  "severity": enum (Severity),
  "findingCount": string,
  "updateTime": string,
  "relatedFrameworks": [
    string
  ],
  "name": string
}
Fields
findingCategory

string

The category of the finding.

findingClass

enum (FindingClass)

The class of the finding.

severity

enum (Severity)

The severity of the finding.

findingCount

string (int64 format)

The count of the finding.

updateTime

string (Timestamp format)

Output only. The last updated time of the finding.

Uses RFC 3339, where generated output will always be Z-normalized and use 0, 3, 6 or 9 fractional digits. Offsets other than "Z" are also accepted. Examples: "2014-10-02T15:01:23Z", "2014-10-02T15:01:23.045123456Z" or "2014-10-02T15:01:23+05:30".

relatedFrameworks[]

string

Optional. The list of compliance frameworks that the finding belongs to.

name

string

Identifier. The name of the finding summary.

FindingClass

A finding is a record of assessment data like security, risk, health, or privacy.

Enums
FINDING_CLASS_UNSPECIFIED Default value. This value is unused.
THREAT The activity is unwanted or malicious.
VULNERABILITY A potential weakness in software that increases risk to confidentiality, integrity, and availability.
MISCONFIGURATION A potential weakness in a cloud resource or asset configuration that increases risk.
OBSERVATION A security observation that is for informational purposes.
SCC_ERROR An error that prevents Security Command Center from functioning properly.
POSTURE_VIOLATION A potential security risk that's due to a change in the security posture.
TOXIC_COMBINATION A combination of security issues that represent a more severe security problem when taken together.
SENSITIVE_DATA_RISK A potential security risk to data assets that contain sensitive data.
CHOKEPOINT A resource or resource group where high risk attack paths converge, based on attack path simulations (APS).

Methods

list

Lists the finding summary by category for a given scope.