AWS SecurityHub

2026/04/13 - AWS SecurityHub - 4 updated api methods

Changes  Provide organizational unit scoping capability for GetFindingsV2, GetFindingStatisticsV2, GetResourcesV2, GetResourcesStatisticsV2 APIs.

GetFindingStatisticsV2 (updated) Link ¶
Changes (request)
{'Scopes': {'AwsOrganizations': [{'OrganizationId': 'string',
                                  'OrganizationalUnitId': 'string'}]}}

Returns aggregated statistical data about findings.

You can use the Scopes parameter to define the data boundary for the query. Currently, Scopes supports AwsOrganizations, which lets you aggregate findings from your entire organization or from specific organizational units. Only the delegated administrator account can use Scopes.

GetFindingStatisticsV2 uses securityhub:GetAdhocInsightResults in the Action element of an IAM policy statement. You must have permission to perform the securityhub:GetAdhocInsightResults action.

See also: AWS API Documentation

Request Syntax

client.get_finding_statistics_v2(
    GroupByRules=[
        {
            'Filters': {
                'CompositeFilters': [
                    {
                        'StringFilters': [
                            {
                                'FieldName': 'metadata.uid'|'activity_name'|'cloud.account.uid'|'cloud.provider'|'cloud.region'|'compliance.assessments.category'|'compliance.assessments.name'|'compliance.control'|'compliance.status'|'compliance.standards'|'finding_info.desc'|'finding_info.src_url'|'finding_info.title'|'finding_info.types'|'finding_info.uid'|'finding_info.related_events.traits.category'|'finding_info.related_events.uid'|'finding_info.related_events.product.uid'|'finding_info.related_events.title'|'metadata.product.name'|'metadata.product.uid'|'metadata.product.vendor_name'|'remediation.desc'|'remediation.references'|'resources.cloud_partition'|'resources.region'|'resources.type'|'resources.uid'|'severity'|'status'|'comment'|'vulnerabilities.fix_coverage'|'class_name'|'databucket.encryption_details.algorithm'|'databucket.encryption_details.key_uid'|'databucket.file.data_classifications.classifier_details.type'|'evidences.actor.user.account.uid'|'evidences.api.operation'|'evidences.api.response.error_message'|'evidences.api.service.name'|'evidences.connection_info.direction'|'evidences.connection_info.protocol_name'|'evidences.dst_endpoint.autonomous_system.name'|'evidences.dst_endpoint.location.city'|'evidences.dst_endpoint.location.country'|'evidences.src_endpoint.autonomous_system.name'|'evidences.src_endpoint.hostname'|'evidences.src_endpoint.location.city'|'evidences.src_endpoint.location.country'|'finding_info.analytic.name'|'malware.name'|'malware_scan_info.uid'|'malware.severity'|'resources.cloud_function.layers.uid_alt'|'resources.cloud_function.runtime'|'resources.cloud_function.user.uid'|'resources.device.encryption_details.key_uid'|'resources.device.image.uid'|'resources.image.architecture'|'resources.image.registry_uid'|'resources.image.repository_name'|'resources.image.uid'|'resources.subnet_info.uid'|'resources.vpc_uid'|'vulnerabilities.affected_code.file.path'|'vulnerabilities.affected_packages.name'|'vulnerabilities.cve.epss.score'|'vulnerabilities.cve.uid'|'vulnerabilities.related_vulnerabilities'|'cloud.account.name'|'vendor_attributes.severity',
                                'Filter': {
                                    'Value': 'string',
                                    'Comparison': 'EQUALS'|'PREFIX'|'NOT_EQUALS'|'PREFIX_NOT_EQUALS'|'CONTAINS'|'NOT_CONTAINS'|'CONTAINS_WORD'
                                }
                            },
                        ],
                        'DateFilters': [
                            {
                                'FieldName': 'finding_info.created_time_dt'|'finding_info.first_seen_time_dt'|'finding_info.last_seen_time_dt'|'finding_info.modified_time_dt'|'resources.image.created_time_dt'|'resources.image.last_used_time_dt'|'resources.modified_time_dt',
                                'Filter': {
                                    'Start': 'string',
                                    'End': 'string',
                                    'DateRange': {
                                        'Value': 123,
                                        'Unit': 'DAYS'
                                    }
                                }
                            },
                        ],
                        'BooleanFilters': [
                            {
                                'FieldName': 'compliance.assessments.meets_criteria'|'vulnerabilities.is_exploit_available'|'vulnerabilities.is_fix_available',
                                'Filter': {
                                    'Value': True|False
                                }
                            },
                        ],
                        'NumberFilters': [
                            {
                                'FieldName': 'activity_id'|'compliance.status_id'|'confidence_score'|'severity_id'|'status_id'|'finding_info.related_events_count'|'evidences.api.response.code'|'evidences.dst_endpoint.autonomous_system.number'|'evidences.dst_endpoint.port'|'evidences.src_endpoint.autonomous_system.number'|'evidences.src_endpoint.port'|'resources.image.in_use_count'|'vulnerabilities.cve.cvss.base_score'|'vendor_attributes.severity_id',
                                'Filter': {
                                    'Gte': 123.0,
                                    'Lte': 123.0,
                                    'Eq': 123.0,
                                    'Gt': 123.0,
                                    'Lt': 123.0
                                }
                            },
                        ],
                        'MapFilters': [
                            {
                                'FieldName': 'resources.tags'|'compliance.control_parameters'|'databucket.tags'|'finding_info.tags',
                                'Filter': {
                                    'Key': 'string',
                                    'Value': 'string',
                                    'Comparison': 'EQUALS'|'NOT_EQUALS'|'CONTAINS'|'NOT_CONTAINS'
                                }
                            },
                        ],
                        'IpFilters': [
                            {
                                'FieldName': 'evidences.dst_endpoint.ip'|'evidences.src_endpoint.ip',
                                'Filter': {
                                    'Cidr': 'string'
                                }
                            },
                        ],
                        'NestedCompositeFilters': {'... recursive ...'},
                        'Operator': 'AND'|'OR'
                    },
                ],
                'CompositeOperator': 'AND'|'OR'
            },
            'GroupByField': 'activity_name'|'cloud.account.uid'|'cloud.provider'|'cloud.region'|'compliance.assessments.name'|'compliance.status'|'compliance.control'|'finding_info.title'|'finding_info.related_events.traits.category'|'finding_info.types'|'metadata.product.name'|'metadata.product.uid'|'resources.type'|'resources.uid'|'severity'|'status'|'vulnerabilities.fix_coverage'|'class_name'|'vulnerabilities.affected_packages.name'|'finding_info.analytic.name'|'compliance.standards'|'cloud.account.name'|'vendor_attributes.severity'|'metadata.product.vendor_name'
        },
    ],
    Scopes={
        'AwsOrganizations': [
            {
                'OrganizationId': 'string',
                'OrganizationalUnitId': 'string'
            },
        ]
    },
    SortOrder='asc'|'desc',
    MaxStatisticResults=123
)
type GroupByRules:

list

param GroupByRules:

[REQUIRED]

Specifies how security findings should be aggregated and organized in the statistical analysis. It can accept up to 5 groupBy fields in a single call.

  • (dict) --

    Defines the how the finding attribute should be grouped.

    • Filters (dict) --

      The criteria used to select which security findings should be included in the grouping operation.

      • CompositeFilters (list) --

        Enables the creation of complex filtering conditions by combining filter criteria.

        • (dict) --

          Enables the creation of filtering criteria for security findings.

          • StringFilters (list) --

            Enables filtering based on string field values.

            • (dict) --

              Enables filtering of security findings based on string field values in OCSF.

              • FieldName (string) --

                The name of the field.

              • Filter (dict) --

                A string filter for filtering Security Hub CSPM findings.

                • Value (string) --

                  The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub CSPM. If you provide security hub as the filter value, there's no match.

                • Comparison (string) --

                  The condition to apply to a string value when filtering Security Hub CSPM findings.

                  To search for values that have the filter value, use one of the following comparison operators:

                  • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

                  • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

                  • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

                  CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

                  To search for values that don’t have the filter value, use one of the following comparison operators:

                  • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

                  • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

                  • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

                  NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

                  You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

                  You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub CSPM first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

                  For example, for the following filters, Security Hub CSPM first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

                  • ResourceType PREFIX AwsIam

                  • ResourceType PREFIX AwsEc2

                  • ResourceType NOT_EQUALS AwsIamPolicy

                  • ResourceType NOT_EQUALS AwsEc2NetworkInterface

                  CONTAINS and NOT_CONTAINS operators can be used only with automation rules V1. CONTAINS_WORD operator is only supported in GetFindingsV2, GetFindingStatisticsV2, GetResourcesV2, and GetResourcesStatisticsV2 APIs. For more information, see Automation rules in the Security Hub CSPM User Guide.

          • DateFilters (list) --

            Enables filtering based on date and timestamp fields.

            • (dict) --

              Enables filtering of security findings based on date and timestamp fields in OCSF.

              • FieldName (string) --

                The name of the field.

              • Filter (dict) --

                A date filter for querying findings.

                • Start (string) --

                  A timestamp that provides the start date for the date filter.

                  For more information about the validation and formatting of timestamp fields in Security Hub CSPM, see Timestamps.

                • End (string) --

                  A timestamp that provides the end date for the date filter.

                  For more information about the validation and formatting of timestamp fields in Security Hub CSPM, see Timestamps.

                • DateRange (dict) --

                  A date range for the date filter.

                  • Value (integer) --

                    A date range value for the date filter.

                  • Unit (string) --

                    A date range unit for the date filter.

          • BooleanFilters (list) --

            Enables filtering based on boolean field values.

            • (dict) --

              Enables filtering of security findings based on boolean field values in OCSF.

              • FieldName (string) --

                The name of the field.

              • Filter (dict) --

                Boolean filter for querying findings.

                • Value (boolean) --

                  The value of the boolean.

          • NumberFilters (list) --

            Enables filtering based on numerical field values.

            • (dict) --

              Enables filtering of security findings based on numerical field values in OCSF.

              • FieldName (string) --

                The name of the field.

              • Filter (dict) --

                A number filter for querying findings.

                • Gte (float) --

                  The greater-than-equal condition to be applied to a single field when querying for findings.

                • Lte (float) --

                  The less-than-equal condition to be applied to a single field when querying for findings.

                • Eq (float) --

                  The equal-to condition to be applied to a single field when querying for findings.

                • Gt (float) --

                  The greater-than condition to be applied to a single field when querying for findings.

                • Lt (float) --

                  The less-than condition to be applied to a single field when querying for findings.

          • MapFilters (list) --

            Enables filtering based on map field values.

            • (dict) --

              Enables filtering of security findings based on map field values in OCSF.

              • FieldName (string) --

                The name of the field.

              • Filter (dict) --

                A map filter for filtering Security Hub CSPM findings. Each map filter provides the field to check for, the value to check for, and the comparison operator.

                • Key (string) --

                  The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

                • Value (string) --

                  The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

                • Comparison (string) --

                  The condition to apply to the key value when filtering Security Hub CSPM findings with a map filter.

                  To search for values that have the filter value, use one of the following comparison operators:

                  • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

                  • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

                  CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

                  To search for values that don't have the filter value, use one of the following comparison operators:

                  • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

                  • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

                  NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

                  CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

                  You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

                  CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub CSPM User Guide.

          • IpFilters (list) --

            A list of IP address filters that allowing you to filter findings based on IP address properties.

            • (dict) --

              The structure for filtering findings based on IP address attributes.

              • FieldName (string) --

                The name of the IP address field to filter on.

              • Filter (dict) --

                The IP filter for querying findings.

                • Cidr (string) --

                  A finding's CIDR value.

          • NestedCompositeFilters (list) --

            Provides an additional level of filtering, creating a three-layer nested structure. The first layer is a CompositeFilters array with a CompositeOperator ( AND/ OR). The second layer is a CompositeFilter object that contains direct filters and NestedCompositeFilters. The third layer is NestedCompositeFilters, which contains additional filter conditions.

          • Operator (string) --

            The logical operator used to combine multiple filter conditions.

      • CompositeOperator (string) --

        The logical operators used to combine the filtering on multiple CompositeFilters.

    • GroupByField (string) -- [REQUIRED]

      The attribute by which filtered findings should be grouped.

type Scopes:

dict

param Scopes:

Limits the results to findings from specific organizational units or from the delegated administrator's organization. Only the delegated administrator account can use this parameter. Other accounts receive an AccessDeniedException.

This parameter is optional. If you omit it, the delegated administrator sees statistics from all accounts across the entire organization. Other accounts see only statistics for their own findings.

You can specify up to 10 entries in Scopes.AwsOrganizations. If multiple entries are specified, the entries are combined using OR logic.

  • AwsOrganizations (list) --

    A list of Organizations scopes to include in the query results. Each entry in the list specifies an organization or organizational unit to include for the delegated administrator's account. If the list specifies multiple entries, the entries are combined using OR logic.

    • (dict) --

      Specifies an Organizations scope. Data from the specified organization or organizational unit is included in the response.

      To scope to a specific organizational unit, provide OrganizationalUnitId. You can optionally include OrganizationId. If you omit OrganizationId, Security Hub uses the caller's organization ID. To scope to the delegated administrator's entire organization, provide only OrganizationId.

      The organization ID and organizational unit must belong to the delegated administrator's own organization. Each request must use one scoping approach: either scope to the entire organization by providing an AwsOrganizationScope entry with only OrganizationId, or scope to specific organizational units by providing AwsOrganizationScope entries with OrganizationalUnitId. You can't combine both approaches in the same request.

      • OrganizationId (string) --

        The unique identifier (ID) of the organization (for example, o-abcd1234567890). The organization must be the delegated administrator's own organization. If you omit this value and provide OrganizationalUnitId, Security Hub uses the caller's organization ID.

      • OrganizationalUnitId (string) --

        The unique identifier (ID) of the organizational unit (OU) (for example, ou-ab12-cd345678). The OU must exist within the delegated administrator's own organization. When specified, the results include only data from accounts in this OU.

type SortOrder:

string

param SortOrder:

Orders the aggregation count in descending or ascending order. Descending order is the default.

type MaxStatisticResults:

integer

param MaxStatisticResults:

The maximum number of results to be returned.

rtype:

dict

returns:

Response Syntax

{
    'GroupByResults': [
        {
            'GroupByField': 'string',
            'GroupByValues': [
                {
                    'FieldValue': 'string',
                    'Count': 123
                },
            ]
        },
    ]
}

Response Structure

  • (dict) --

    • GroupByResults (list) --

      Aggregated statistics about security findings based on specified grouping criteria.

      • (dict) --

        Represents finding statistics grouped by GroupedByField.

        • GroupByField (string) --

          The attribute by which filtered security findings should be grouped.

        • GroupByValues (list) --

          An array of grouped values and their respective counts for each GroupByField.

          • (dict) --

            Represents individual aggregated results when grouping security findings for each GroupByField.

            • FieldValue (string) --

              The value of the field by which findings are grouped.

            • Count (integer) --

              The number of findings for a specific FieldValue and GroupByField.

GetFindingsV2 (updated) Link ¶
Changes (request)
{'Scopes': {'AwsOrganizations': [{'OrganizationId': 'string',
                                  'OrganizationalUnitId': 'string'}]}}

Returns a list of findings that match the specified criteria.

You can use the Scopes parameter to define the data boundary for the query. Currently, Scopes supports AwsOrganizations, which lets you retrieve findings from your entire organization or from specific organizational units. Only the delegated administrator account can use Scopes.

You can use the Filters parameter to refine results based on finding attributes. You can use Scopes and Filters independently or together. When both are provided, Scopes narrows the data set first, and then Filters refines results within that scoped data set.

GetFindings and GetFindingsV2 both use securityhub:GetFindings in the Action element of an IAM policy statement. You must have permission to perform the securityhub:GetFindings action.

See also: AWS API Documentation

Request Syntax

client.get_findings_v2(
    Filters={
        'CompositeFilters': [
            {
                'StringFilters': [
                    {
                        'FieldName': 'metadata.uid'|'activity_name'|'cloud.account.uid'|'cloud.provider'|'cloud.region'|'compliance.assessments.category'|'compliance.assessments.name'|'compliance.control'|'compliance.status'|'compliance.standards'|'finding_info.desc'|'finding_info.src_url'|'finding_info.title'|'finding_info.types'|'finding_info.uid'|'finding_info.related_events.traits.category'|'finding_info.related_events.uid'|'finding_info.related_events.product.uid'|'finding_info.related_events.title'|'metadata.product.name'|'metadata.product.uid'|'metadata.product.vendor_name'|'remediation.desc'|'remediation.references'|'resources.cloud_partition'|'resources.region'|'resources.type'|'resources.uid'|'severity'|'status'|'comment'|'vulnerabilities.fix_coverage'|'class_name'|'databucket.encryption_details.algorithm'|'databucket.encryption_details.key_uid'|'databucket.file.data_classifications.classifier_details.type'|'evidences.actor.user.account.uid'|'evidences.api.operation'|'evidences.api.response.error_message'|'evidences.api.service.name'|'evidences.connection_info.direction'|'evidences.connection_info.protocol_name'|'evidences.dst_endpoint.autonomous_system.name'|'evidences.dst_endpoint.location.city'|'evidences.dst_endpoint.location.country'|'evidences.src_endpoint.autonomous_system.name'|'evidences.src_endpoint.hostname'|'evidences.src_endpoint.location.city'|'evidences.src_endpoint.location.country'|'finding_info.analytic.name'|'malware.name'|'malware_scan_info.uid'|'malware.severity'|'resources.cloud_function.layers.uid_alt'|'resources.cloud_function.runtime'|'resources.cloud_function.user.uid'|'resources.device.encryption_details.key_uid'|'resources.device.image.uid'|'resources.image.architecture'|'resources.image.registry_uid'|'resources.image.repository_name'|'resources.image.uid'|'resources.subnet_info.uid'|'resources.vpc_uid'|'vulnerabilities.affected_code.file.path'|'vulnerabilities.affected_packages.name'|'vulnerabilities.cve.epss.score'|'vulnerabilities.cve.uid'|'vulnerabilities.related_vulnerabilities'|'cloud.account.name'|'vendor_attributes.severity',
                        'Filter': {
                            'Value': 'string',
                            'Comparison': 'EQUALS'|'PREFIX'|'NOT_EQUALS'|'PREFIX_NOT_EQUALS'|'CONTAINS'|'NOT_CONTAINS'|'CONTAINS_WORD'
                        }
                    },
                ],
                'DateFilters': [
                    {
                        'FieldName': 'finding_info.created_time_dt'|'finding_info.first_seen_time_dt'|'finding_info.last_seen_time_dt'|'finding_info.modified_time_dt'|'resources.image.created_time_dt'|'resources.image.last_used_time_dt'|'resources.modified_time_dt',
                        'Filter': {
                            'Start': 'string',
                            'End': 'string',
                            'DateRange': {
                                'Value': 123,
                                'Unit': 'DAYS'
                            }
                        }
                    },
                ],
                'BooleanFilters': [
                    {
                        'FieldName': 'compliance.assessments.meets_criteria'|'vulnerabilities.is_exploit_available'|'vulnerabilities.is_fix_available',
                        'Filter': {
                            'Value': True|False
                        }
                    },
                ],
                'NumberFilters': [
                    {
                        'FieldName': 'activity_id'|'compliance.status_id'|'confidence_score'|'severity_id'|'status_id'|'finding_info.related_events_count'|'evidences.api.response.code'|'evidences.dst_endpoint.autonomous_system.number'|'evidences.dst_endpoint.port'|'evidences.src_endpoint.autonomous_system.number'|'evidences.src_endpoint.port'|'resources.image.in_use_count'|'vulnerabilities.cve.cvss.base_score'|'vendor_attributes.severity_id',
                        'Filter': {
                            'Gte': 123.0,
                            'Lte': 123.0,
                            'Eq': 123.0,
                            'Gt': 123.0,
                            'Lt': 123.0
                        }
                    },
                ],
                'MapFilters': [
                    {
                        'FieldName': 'resources.tags'|'compliance.control_parameters'|'databucket.tags'|'finding_info.tags',
                        'Filter': {
                            'Key': 'string',
                            'Value': 'string',
                            'Comparison': 'EQUALS'|'NOT_EQUALS'|'CONTAINS'|'NOT_CONTAINS'
                        }
                    },
                ],
                'IpFilters': [
                    {
                        'FieldName': 'evidences.dst_endpoint.ip'|'evidences.src_endpoint.ip',
                        'Filter': {
                            'Cidr': 'string'
                        }
                    },
                ],
                'NestedCompositeFilters': {'... recursive ...'},
                'Operator': 'AND'|'OR'
            },
        ],
        'CompositeOperator': 'AND'|'OR'
    },
    Scopes={
        'AwsOrganizations': [
            {
                'OrganizationId': 'string',
                'OrganizationalUnitId': 'string'
            },
        ]
    },
    SortCriteria=[
        {
            'Field': 'string',
            'SortOrder': 'asc'|'desc'
        },
    ],
    NextToken='string',
    MaxResults=123
)
type Filters:

dict

param Filters:

The finding attributes used to define a condition to filter the returned OCSF findings. You can filter up to 10 composite filters. For each filter type inside of a composite filter, you can provide up to 20 filters.

  • CompositeFilters (list) --

    Enables the creation of complex filtering conditions by combining filter criteria.

    • (dict) --

      Enables the creation of filtering criteria for security findings.

      • StringFilters (list) --

        Enables filtering based on string field values.

        • (dict) --

          Enables filtering of security findings based on string field values in OCSF.

          • FieldName (string) --

            The name of the field.

          • Filter (dict) --

            A string filter for filtering Security Hub CSPM findings.

            • Value (string) --

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub CSPM. If you provide security hub as the filter value, there's no match.

            • Comparison (string) --

              The condition to apply to a string value when filtering Security Hub CSPM findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub CSPM first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub CSPM first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules V1. CONTAINS_WORD operator is only supported in GetFindingsV2, GetFindingStatisticsV2, GetResourcesV2, and GetResourcesStatisticsV2 APIs. For more information, see Automation rules in the Security Hub CSPM User Guide.

      • DateFilters (list) --

        Enables filtering based on date and timestamp fields.

        • (dict) --

          Enables filtering of security findings based on date and timestamp fields in OCSF.

          • FieldName (string) --

            The name of the field.

          • Filter (dict) --

            A date filter for querying findings.

            • Start (string) --

              A timestamp that provides the start date for the date filter.

              For more information about the validation and formatting of timestamp fields in Security Hub CSPM, see Timestamps.

            • End (string) --

              A timestamp that provides the end date for the date filter.

              For more information about the validation and formatting of timestamp fields in Security Hub CSPM, see Timestamps.

            • DateRange (dict) --

              A date range for the date filter.

              • Value (integer) --

                A date range value for the date filter.

              • Unit (string) --

                A date range unit for the date filter.

      • BooleanFilters (list) --

        Enables filtering based on boolean field values.

        • (dict) --

          Enables filtering of security findings based on boolean field values in OCSF.

          • FieldName (string) --

            The name of the field.

          • Filter (dict) --

            Boolean filter for querying findings.

            • Value (boolean) --

              The value of the boolean.

      • NumberFilters (list) --

        Enables filtering based on numerical field values.

        • (dict) --

          Enables filtering of security findings based on numerical field values in OCSF.

          • FieldName (string) --

            The name of the field.

          • Filter (dict) --

            A number filter for querying findings.

            • Gte (float) --

              The greater-than-equal condition to be applied to a single field when querying for findings.

            • Lte (float) --

              The less-than-equal condition to be applied to a single field when querying for findings.

            • Eq (float) --

              The equal-to condition to be applied to a single field when querying for findings.

            • Gt (float) --

              The greater-than condition to be applied to a single field when querying for findings.

            • Lt (float) --

              The less-than condition to be applied to a single field when querying for findings.

      • MapFilters (list) --

        Enables filtering based on map field values.

        • (dict) --

          Enables filtering of security findings based on map field values in OCSF.

          • FieldName (string) --

            The name of the field.

          • Filter (dict) --

            A map filter for filtering Security Hub CSPM findings. Each map filter provides the field to check for, the value to check for, and the comparison operator.

            • Key (string) --

              The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

            • Value (string) --

              The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

            • Comparison (string) --

              The condition to apply to the key value when filtering Security Hub CSPM findings with a map filter.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

              • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

              CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

              To search for values that don't have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

              • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

              NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

              CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub CSPM User Guide.

      • IpFilters (list) --

        A list of IP address filters that allowing you to filter findings based on IP address properties.

        • (dict) --

          The structure for filtering findings based on IP address attributes.

          • FieldName (string) --

            The name of the IP address field to filter on.

          • Filter (dict) --

            The IP filter for querying findings.

            • Cidr (string) --

              A finding's CIDR value.

      • NestedCompositeFilters (list) --

        Provides an additional level of filtering, creating a three-layer nested structure. The first layer is a CompositeFilters array with a CompositeOperator ( AND/ OR). The second layer is a CompositeFilter object that contains direct filters and NestedCompositeFilters. The third layer is NestedCompositeFilters, which contains additional filter conditions.

      • Operator (string) --

        The logical operator used to combine multiple filter conditions.

  • CompositeOperator (string) --

    The logical operators used to combine the filtering on multiple CompositeFilters.

type Scopes:

dict

param Scopes:

Limits the results to findings from specific organizational units or from the delegated administrator's organization. Only the delegated administrator account can use this parameter. Other accounts receive an AccessDeniedException.

This parameter is optional. If you omit it, the delegated administrator sees findings from all accounts across the entire organization. Other accounts see only their own findings.

You can specify up to 10 entries in Scopes.AwsOrganizations. If multiple entries are specified, the entries are combined using OR logic.

  • AwsOrganizations (list) --

    A list of Organizations scopes to include in the query results. Each entry in the list specifies an organization or organizational unit to include for the delegated administrator's account. If the list specifies multiple entries, the entries are combined using OR logic.

    • (dict) --

      Specifies an Organizations scope. Data from the specified organization or organizational unit is included in the response.

      To scope to a specific organizational unit, provide OrganizationalUnitId. You can optionally include OrganizationId. If you omit OrganizationId, Security Hub uses the caller's organization ID. To scope to the delegated administrator's entire organization, provide only OrganizationId.

      The organization ID and organizational unit must belong to the delegated administrator's own organization. Each request must use one scoping approach: either scope to the entire organization by providing an AwsOrganizationScope entry with only OrganizationId, or scope to specific organizational units by providing AwsOrganizationScope entries with OrganizationalUnitId. You can't combine both approaches in the same request.

      • OrganizationId (string) --

        The unique identifier (ID) of the organization (for example, o-abcd1234567890). The organization must be the delegated administrator's own organization. If you omit this value and provide OrganizationalUnitId, Security Hub uses the caller's organization ID.

      • OrganizationalUnitId (string) --

        The unique identifier (ID) of the organizational unit (OU) (for example, ou-ab12-cd345678). The OU must exist within the delegated administrator's own organization. When specified, the results include only data from accounts in this OU.

type SortCriteria:

list

param SortCriteria:

The finding attributes used to sort the list of returned findings.

  • (dict) --

    A collection of finding attributes used to sort findings.

    • Field (string) --

      The finding attribute used to sort findings.

    • SortOrder (string) --

      The order used to sort findings.

type NextToken:

string

param NextToken:

The token required for pagination. On your first call, set the value of this parameter to NULL. For subsequent calls, to continue listing data, set the value of this parameter to the value returned in the previous response.

type MaxResults:

integer

param MaxResults:

The maximum number of results to return.

rtype:

dict

returns:

Response Syntax

{
    'Findings': [
        {...}|[...]|123|123.4|'string'|True|None,
    ],
    'NextToken': 'string'
}

Response Structure

  • (dict) --

    • Findings (list) --

      An array of security findings returned by the operation.

      • (:ref:`document<document>`) --

    • NextToken (string) --

      The pagination token to use to request the next page of results. Otherwise, this parameter is null.

GetResourcesStatisticsV2 (updated) Link ¶
Changes (request)
{'Scopes': {'AwsOrganizations': [{'OrganizationId': 'string',
                                  'OrganizationalUnitId': 'string'}]}}

Retrieves statistical information about Amazon Web Services resources and their associated security findings.

You can use the Scopes parameter to define the data boundary for the query. Currently, Scopes supports AwsOrganizations, which lets you aggregate resources from your entire organization or from specific organizational units. Only the delegated administrator account can use Scopes.

See also: AWS API Documentation

Request Syntax

client.get_resources_statistics_v2(
    GroupByRules=[
        {
            'GroupByField': 'AccountId'|'Region'|'ResourceCategory'|'ResourceType'|'ResourceName'|'FindingsSummary.FindingType',
            'Filters': {
                'CompositeFilters': [
                    {
                        'StringFilters': [
                            {
                                'FieldName': 'ResourceGuid'|'ResourceId'|'AccountId'|'Region'|'ResourceCategory'|'ResourceType'|'ResourceName'|'FindingsSummary.FindingType'|'FindingsSummary.ProductName',
                                'Filter': {
                                    'Value': 'string',
                                    'Comparison': 'EQUALS'|'PREFIX'|'NOT_EQUALS'|'PREFIX_NOT_EQUALS'|'CONTAINS'|'NOT_CONTAINS'|'CONTAINS_WORD'
                                }
                            },
                        ],
                        'DateFilters': [
                            {
                                'FieldName': 'ResourceDetailCaptureTime'|'ResourceCreationTime',
                                'Filter': {
                                    'Start': 'string',
                                    'End': 'string',
                                    'DateRange': {
                                        'Value': 123,
                                        'Unit': 'DAYS'
                                    }
                                }
                            },
                        ],
                        'NumberFilters': [
                            {
                                'FieldName': 'FindingsSummary.TotalFindings'|'FindingsSummary.Severities.Other'|'FindingsSummary.Severities.Fatal'|'FindingsSummary.Severities.Critical'|'FindingsSummary.Severities.High'|'FindingsSummary.Severities.Medium'|'FindingsSummary.Severities.Low'|'FindingsSummary.Severities.Informational'|'FindingsSummary.Severities.Unknown',
                                'Filter': {
                                    'Gte': 123.0,
                                    'Lte': 123.0,
                                    'Eq': 123.0,
                                    'Gt': 123.0,
                                    'Lt': 123.0
                                }
                            },
                        ],
                        'MapFilters': [
                            {
                                'FieldName': 'ResourceTags',
                                'Filter': {
                                    'Key': 'string',
                                    'Value': 'string',
                                    'Comparison': 'EQUALS'|'NOT_EQUALS'|'CONTAINS'|'NOT_CONTAINS'
                                }
                            },
                        ],
                        'NestedCompositeFilters': {'... recursive ...'},
                        'Operator': 'AND'|'OR'
                    },
                ],
                'CompositeOperator': 'AND'|'OR'
            }
        },
    ],
    Scopes={
        'AwsOrganizations': [
            {
                'OrganizationId': 'string',
                'OrganizationalUnitId': 'string'
            },
        ]
    },
    SortOrder='asc'|'desc',
    MaxStatisticResults=123
)
type GroupByRules:

list

param GroupByRules:

[REQUIRED]

How resource statistics should be aggregated and organized in the response.

  • (dict) --

    Defines the configuration for organizing and categorizing Amazon Web Services resources based on associated security findings.

    • GroupByField (string) -- [REQUIRED]

      Specifies the attribute that resources should be grouped by.

    • Filters (dict) --

      The criteria used to select resources and associated security findings.

      • CompositeFilters (list) --

        A collection of complex filtering conditions that can be applied to Amazon Web Services resources.

        • (dict) --

          Enables the creation of criteria for Amazon Web Services resources in Security Hub CSPM.

          • StringFilters (list) --

            Enables filtering based on string field values.

            • (dict) --

              Enables filtering of Amazon Web Services resources based on string field values.

              • FieldName (string) --

                The name of the field.

              • Filter (dict) --

                A string filter for filtering Security Hub CSPM findings.

                • Value (string) --

                  The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub CSPM. If you provide security hub as the filter value, there's no match.

                • Comparison (string) --

                  The condition to apply to a string value when filtering Security Hub CSPM findings.

                  To search for values that have the filter value, use one of the following comparison operators:

                  • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

                  • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

                  • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

                  CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

                  To search for values that don’t have the filter value, use one of the following comparison operators:

                  • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

                  • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

                  • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

                  NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

                  You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

                  You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub CSPM first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

                  For example, for the following filters, Security Hub CSPM first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

                  • ResourceType PREFIX AwsIam

                  • ResourceType PREFIX AwsEc2

                  • ResourceType NOT_EQUALS AwsIamPolicy

                  • ResourceType NOT_EQUALS AwsEc2NetworkInterface

                  CONTAINS and NOT_CONTAINS operators can be used only with automation rules V1. CONTAINS_WORD operator is only supported in GetFindingsV2, GetFindingStatisticsV2, GetResourcesV2, and GetResourcesStatisticsV2 APIs. For more information, see Automation rules in the Security Hub CSPM User Guide.

          • DateFilters (list) --

            Enables filtering based on date and timestamp field values.

            • (dict) --

              Enables the filtering of Amazon Web Services resources based on date and timestamp attributes.

              • FieldName (string) --

                The name of the field.

              • Filter (dict) --

                A date filter for querying findings.

                • Start (string) --

                  A timestamp that provides the start date for the date filter.

                  For more information about the validation and formatting of timestamp fields in Security Hub CSPM, see Timestamps.

                • End (string) --

                  A timestamp that provides the end date for the date filter.

                  For more information about the validation and formatting of timestamp fields in Security Hub CSPM, see Timestamps.

                • DateRange (dict) --

                  A date range for the date filter.

                  • Value (integer) --

                    A date range value for the date filter.

                  • Unit (string) --

                    A date range unit for the date filter.

          • NumberFilters (list) --

            Enables filtering based on numerical field values.

            • (dict) --

              Enables filtering of Amazon Web Services resources based on numerical values.

              • FieldName (string) --

                The name of the field.

              • Filter (dict) --

                A number filter for querying findings.

                • Gte (float) --

                  The greater-than-equal condition to be applied to a single field when querying for findings.

                • Lte (float) --

                  The less-than-equal condition to be applied to a single field when querying for findings.

                • Eq (float) --

                  The equal-to condition to be applied to a single field when querying for findings.

                • Gt (float) --

                  The greater-than condition to be applied to a single field when querying for findings.

                • Lt (float) --

                  The less-than condition to be applied to a single field when querying for findings.

          • MapFilters (list) --

            Enables filtering based on map-based field values.

            • (dict) --

              Enables filtering of Amazon Web Services resources based on key-value map attributes.

              • FieldName (string) --

                The name of the field.

              • Filter (dict) --

                A map filter for filtering Security Hub CSPM findings. Each map filter provides the field to check for, the value to check for, and the comparison operator.

                • Key (string) --

                  The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

                • Value (string) --

                  The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

                • Comparison (string) --

                  The condition to apply to the key value when filtering Security Hub CSPM findings with a map filter.

                  To search for values that have the filter value, use one of the following comparison operators:

                  • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

                  • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

                  CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

                  To search for values that don't have the filter value, use one of the following comparison operators:

                  • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

                  • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

                  NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

                  CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

                  You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

                  CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub CSPM User Guide.

          • NestedCompositeFilters (list) --

            Provides an additional level of filtering, creating a three-layer nested structure. The first layer is a CompositeFilters array with a CompositeOperator ( AND/ OR). The second layer is a CompositeFilter object that contains direct filters and NestedCompositeFilters. The third layer is NestedCompositeFilters, which contains additional filter conditions.

          • Operator (string) --

            The logical operator used to combine multiple filter conditions.

      • CompositeOperator (string) --

        The logical operator used to combine multiple filter conditions in the structure.

type Scopes:

dict

param Scopes:

Limits the results to resources from specific organizational units or from the delegated administrator's organization. Only the delegated administrator account can use this parameter. Other accounts receive an AccessDeniedException.

This parameter is optional. If you omit it, the delegated administrator sees statistics from all accounts across the entire organization. Other accounts see only statistics for their own resources.

You can specify up to 10 entries in Scopes.AwsOrganizations. If multiple entries are specified, the entries are combined using OR logic.

  • AwsOrganizations (list) --

    A list of Organizations scopes to include in the query results. Each entry in the list specifies an organization or organizational unit to include for the delegated administrator's account. If the list specifies multiple entries, the entries are combined using OR logic.

    • (dict) --

      Specifies an Organizations scope. Data from the specified organization or organizational unit is included in the response.

      To scope to a specific organizational unit, provide OrganizationalUnitId. You can optionally include OrganizationId. If you omit OrganizationId, Security Hub uses the caller's organization ID. To scope to the delegated administrator's entire organization, provide only OrganizationId.

      The organization ID and organizational unit must belong to the delegated administrator's own organization. Each request must use one scoping approach: either scope to the entire organization by providing an AwsOrganizationScope entry with only OrganizationId, or scope to specific organizational units by providing AwsOrganizationScope entries with OrganizationalUnitId. You can't combine both approaches in the same request.

      • OrganizationId (string) --

        The unique identifier (ID) of the organization (for example, o-abcd1234567890). The organization must be the delegated administrator's own organization. If you omit this value and provide OrganizationalUnitId, Security Hub uses the caller's organization ID.

      • OrganizationalUnitId (string) --

        The unique identifier (ID) of the organizational unit (OU) (for example, ou-ab12-cd345678). The OU must exist within the delegated administrator's own organization. When specified, the results include only data from accounts in this OU.

type SortOrder:

string

param SortOrder:

Sorts aggregated statistics.

type MaxStatisticResults:

integer

param MaxStatisticResults:

The maximum number of results to be returned.

rtype:

dict

returns:

Response Syntax

{
    'GroupByResults': [
        {
            'GroupByField': 'string',
            'GroupByValues': [
                {
                    'FieldValue': 'string',
                    'Count': 123
                },
            ]
        },
    ]
}

Response Structure

  • (dict) --

    • GroupByResults (list) --

      The aggregated statistics about resources based on the specified grouping rule.

      • (dict) --

        Represents finding statistics grouped by GroupedByField.

        • GroupByField (string) --

          The attribute by which filtered security findings should be grouped.

        • GroupByValues (list) --

          An array of grouped values and their respective counts for each GroupByField.

          • (dict) --

            Represents individual aggregated results when grouping security findings for each GroupByField.

            • FieldValue (string) --

              The value of the field by which findings are grouped.

            • Count (integer) --

              The number of findings for a specific FieldValue and GroupByField.

GetResourcesV2 (updated) Link ¶
Changes (request)
{'Scopes': {'AwsOrganizations': [{'OrganizationId': 'string',
                                  'OrganizationalUnitId': 'string'}]}}

Returns a list of resources.

You can use the Scopes parameter to define the data boundary for the query. Currently, Scopes supports AwsOrganizations, which lets you retrieve resources from your entire organization or from specific organizational units. Only the delegated administrator account can use Scopes.

You can use the Filters parameter to refine results based on resource attributes. You can use Scopes and Filters independently or together. When both are provided, Scopes narrows the data set first, and then Filters refines results within that scoped data set.

See also: AWS API Documentation

Request Syntax

client.get_resources_v2(
    Filters={
        'CompositeFilters': [
            {
                'StringFilters': [
                    {
                        'FieldName': 'ResourceGuid'|'ResourceId'|'AccountId'|'Region'|'ResourceCategory'|'ResourceType'|'ResourceName'|'FindingsSummary.FindingType'|'FindingsSummary.ProductName',
                        'Filter': {
                            'Value': 'string',
                            'Comparison': 'EQUALS'|'PREFIX'|'NOT_EQUALS'|'PREFIX_NOT_EQUALS'|'CONTAINS'|'NOT_CONTAINS'|'CONTAINS_WORD'
                        }
                    },
                ],
                'DateFilters': [
                    {
                        'FieldName': 'ResourceDetailCaptureTime'|'ResourceCreationTime',
                        'Filter': {
                            'Start': 'string',
                            'End': 'string',
                            'DateRange': {
                                'Value': 123,
                                'Unit': 'DAYS'
                            }
                        }
                    },
                ],
                'NumberFilters': [
                    {
                        'FieldName': 'FindingsSummary.TotalFindings'|'FindingsSummary.Severities.Other'|'FindingsSummary.Severities.Fatal'|'FindingsSummary.Severities.Critical'|'FindingsSummary.Severities.High'|'FindingsSummary.Severities.Medium'|'FindingsSummary.Severities.Low'|'FindingsSummary.Severities.Informational'|'FindingsSummary.Severities.Unknown',
                        'Filter': {
                            'Gte': 123.0,
                            'Lte': 123.0,
                            'Eq': 123.0,
                            'Gt': 123.0,
                            'Lt': 123.0
                        }
                    },
                ],
                'MapFilters': [
                    {
                        'FieldName': 'ResourceTags',
                        'Filter': {
                            'Key': 'string',
                            'Value': 'string',
                            'Comparison': 'EQUALS'|'NOT_EQUALS'|'CONTAINS'|'NOT_CONTAINS'
                        }
                    },
                ],
                'NestedCompositeFilters': {'... recursive ...'},
                'Operator': 'AND'|'OR'
            },
        ],
        'CompositeOperator': 'AND'|'OR'
    },
    Scopes={
        'AwsOrganizations': [
            {
                'OrganizationId': 'string',
                'OrganizationalUnitId': 'string'
            },
        ]
    },
    SortCriteria=[
        {
            'Field': 'string',
            'SortOrder': 'asc'|'desc'
        },
    ],
    NextToken='string',
    MaxResults=123
)
type Filters:

dict

param Filters:

Filters resources based on a set of criteria.

  • CompositeFilters (list) --

    A collection of complex filtering conditions that can be applied to Amazon Web Services resources.

    • (dict) --

      Enables the creation of criteria for Amazon Web Services resources in Security Hub CSPM.

      • StringFilters (list) --

        Enables filtering based on string field values.

        • (dict) --

          Enables filtering of Amazon Web Services resources based on string field values.

          • FieldName (string) --

            The name of the field.

          • Filter (dict) --

            A string filter for filtering Security Hub CSPM findings.

            • Value (string) --

              The string filter value. Filter values are case sensitive. For example, the product name for control-based findings is Security Hub CSPM. If you provide security hub as the filter value, there's no match.

            • Comparison (string) --

              The condition to apply to a string value when filtering Security Hub CSPM findings.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, the filter Title CONTAINS CloudFront matches findings that have a Title that includes the string CloudFront.

              • To search for values that exactly match the filter value, use EQUALS. For example, the filter AwsAccountId EQUALS 123456789012 only matches findings that have an account ID of 123456789012.

              • To search for values that start with the filter value, use PREFIX. For example, the filter ResourceRegion PREFIX us matches findings that have a ResourceRegion that starts with us. A ResourceRegion that starts with a different value, such as af, ap, or ca, doesn't match.

              CONTAINS, EQUALS, and PREFIX filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Title CONTAINS CloudFront OR Title CONTAINS CloudWatch match a finding that includes either CloudFront, CloudWatch, or both strings in the title.

              To search for values that don’t have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, the filter Title NOT_CONTAINS CloudFront matches findings that have a Title that excludes the string CloudFront.

              • To search for values other than the filter value, use NOT_EQUALS. For example, the filter AwsAccountId NOT_EQUALS 123456789012 only matches findings that have an account ID other than 123456789012.

              • To search for values that don't start with the filter value, use PREFIX_NOT_EQUALS. For example, the filter ResourceRegion PREFIX_NOT_EQUALS us matches findings with a ResourceRegion that starts with a value other than us.

              NOT_CONTAINS, NOT_EQUALS, and PREFIX_NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Title NOT_CONTAINS CloudFront AND Title NOT_CONTAINS CloudWatch match a finding that excludes both CloudFront and CloudWatch in the title.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can't provide both an EQUALS filter and a NOT_EQUALS or PREFIX_NOT_EQUALS filter on the same field. Combining filters in this way returns an error. CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can combine PREFIX filters with NOT_EQUALS or PREFIX_NOT_EQUALS filters for the same field. Security Hub CSPM first processes the PREFIX filters, and then the NOT_EQUALS or PREFIX_NOT_EQUALS filters.

              For example, for the following filters, Security Hub CSPM first identifies findings that have resource types that start with either AwsIam or AwsEc2. It then excludes findings that have a resource type of AwsIamPolicy and findings that have a resource type of AwsEc2NetworkInterface.

              • ResourceType PREFIX AwsIam

              • ResourceType PREFIX AwsEc2

              • ResourceType NOT_EQUALS AwsIamPolicy

              • ResourceType NOT_EQUALS AwsEc2NetworkInterface

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules V1. CONTAINS_WORD operator is only supported in GetFindingsV2, GetFindingStatisticsV2, GetResourcesV2, and GetResourcesStatisticsV2 APIs. For more information, see Automation rules in the Security Hub CSPM User Guide.

      • DateFilters (list) --

        Enables filtering based on date and timestamp field values.

        • (dict) --

          Enables the filtering of Amazon Web Services resources based on date and timestamp attributes.

          • FieldName (string) --

            The name of the field.

          • Filter (dict) --

            A date filter for querying findings.

            • Start (string) --

              A timestamp that provides the start date for the date filter.

              For more information about the validation and formatting of timestamp fields in Security Hub CSPM, see Timestamps.

            • End (string) --

              A timestamp that provides the end date for the date filter.

              For more information about the validation and formatting of timestamp fields in Security Hub CSPM, see Timestamps.

            • DateRange (dict) --

              A date range for the date filter.

              • Value (integer) --

                A date range value for the date filter.

              • Unit (string) --

                A date range unit for the date filter.

      • NumberFilters (list) --

        Enables filtering based on numerical field values.

        • (dict) --

          Enables filtering of Amazon Web Services resources based on numerical values.

          • FieldName (string) --

            The name of the field.

          • Filter (dict) --

            A number filter for querying findings.

            • Gte (float) --

              The greater-than-equal condition to be applied to a single field when querying for findings.

            • Lte (float) --

              The less-than-equal condition to be applied to a single field when querying for findings.

            • Eq (float) --

              The equal-to condition to be applied to a single field when querying for findings.

            • Gt (float) --

              The greater-than condition to be applied to a single field when querying for findings.

            • Lt (float) --

              The less-than condition to be applied to a single field when querying for findings.

      • MapFilters (list) --

        Enables filtering based on map-based field values.

        • (dict) --

          Enables filtering of Amazon Web Services resources based on key-value map attributes.

          • FieldName (string) --

            The name of the field.

          • Filter (dict) --

            A map filter for filtering Security Hub CSPM findings. Each map filter provides the field to check for, the value to check for, and the comparison operator.

            • Key (string) --

              The key of the map filter. For example, for ResourceTags, Key identifies the name of the tag. For UserDefinedFields, Key is the name of the field.

            • Value (string) --

              The value for the key in the map filter. Filter values are case sensitive. For example, one of the values for a tag called Department might be Security. If you provide security as the filter value, then there's no match.

            • Comparison (string) --

              The condition to apply to the key value when filtering Security Hub CSPM findings with a map filter.

              To search for values that have the filter value, use one of the following comparison operators:

              • To search for values that include the filter value, use CONTAINS. For example, for the ResourceTags field, the filter Department CONTAINS Security matches findings that include the value Security for the Department tag. In the same example, a finding with a value of Security team for the Department tag is a match.

              • To search for values that exactly match the filter value, use EQUALS. For example, for the ResourceTags field, the filter Department EQUALS Security matches findings that have the value Security for the Department tag.

              CONTAINS and EQUALS filters on the same field are joined by OR. A finding matches if it matches any one of those filters. For example, the filters Department CONTAINS Security OR Department CONTAINS Finance match a finding that includes either Security, Finance, or both values.

              To search for values that don't have the filter value, use one of the following comparison operators:

              • To search for values that exclude the filter value, use NOT_CONTAINS. For example, for the ResourceTags field, the filter Department NOT_CONTAINS Finance matches findings that exclude the value Finance for the Department tag.

              • To search for values other than the filter value, use NOT_EQUALS. For example, for the ResourceTags field, the filter Department NOT_EQUALS Finance matches findings that don’t have the value Finance for the Department tag.

              NOT_CONTAINS and NOT_EQUALS filters on the same field are joined by AND. A finding matches only if it matches all of those filters. For example, the filters Department NOT_CONTAINS Security AND Department NOT_CONTAINS Finance match a finding that excludes both the Security and Finance values.

              CONTAINS filters can only be used with other CONTAINS filters. NOT_CONTAINS filters can only be used with other NOT_CONTAINS filters.

              You can’t have both a CONTAINS filter and a NOT_CONTAINS filter on the same field. Similarly, you can’t have both an EQUALS filter and a NOT_EQUALS filter on the same field. Combining filters in this way returns an error.

              CONTAINS and NOT_CONTAINS operators can be used only with automation rules. For more information, see Automation rules in the Security Hub CSPM User Guide.

      • NestedCompositeFilters (list) --

        Provides an additional level of filtering, creating a three-layer nested structure. The first layer is a CompositeFilters array with a CompositeOperator ( AND/ OR). The second layer is a CompositeFilter object that contains direct filters and NestedCompositeFilters. The third layer is NestedCompositeFilters, which contains additional filter conditions.

      • Operator (string) --

        The logical operator used to combine multiple filter conditions.

  • CompositeOperator (string) --

    The logical operator used to combine multiple filter conditions in the structure.

type Scopes:

dict

param Scopes:

Limits the results to resources from specific organizational units or from the delegated administrator's organization. Only the delegated administrator account can use this parameter. Other accounts receive an AccessDeniedException.

This parameter is optional. If you omit it, the delegated administrator sees resources from all accounts across the entire organization. Other accounts see only their own resources.

You can specify up to 10 entries in Scopes.AwsOrganizations. If multiple entries are specified, the entries are combined using OR logic.

  • AwsOrganizations (list) --

    A list of Organizations scopes to include in the query results. Each entry in the list specifies an organization or organizational unit to include for the delegated administrator's account. If the list specifies multiple entries, the entries are combined using OR logic.

    • (dict) --

      Specifies an Organizations scope. Data from the specified organization or organizational unit is included in the response.

      To scope to a specific organizational unit, provide OrganizationalUnitId. You can optionally include OrganizationId. If you omit OrganizationId, Security Hub uses the caller's organization ID. To scope to the delegated administrator's entire organization, provide only OrganizationId.

      The organization ID and organizational unit must belong to the delegated administrator's own organization. Each request must use one scoping approach: either scope to the entire organization by providing an AwsOrganizationScope entry with only OrganizationId, or scope to specific organizational units by providing AwsOrganizationScope entries with OrganizationalUnitId. You can't combine both approaches in the same request.

      • OrganizationId (string) --

        The unique identifier (ID) of the organization (for example, o-abcd1234567890). The organization must be the delegated administrator's own organization. If you omit this value and provide OrganizationalUnitId, Security Hub uses the caller's organization ID.

      • OrganizationalUnitId (string) --

        The unique identifier (ID) of the organizational unit (OU) (for example, ou-ab12-cd345678). The OU must exist within the delegated administrator's own organization. When specified, the results include only data from accounts in this OU.

type SortCriteria:

list

param SortCriteria:

The resource attributes used to sort the list of returned resources.

  • (dict) --

    A collection of finding attributes used to sort findings.

    • Field (string) --

      The finding attribute used to sort findings.

    • SortOrder (string) --

      The order used to sort findings.

type NextToken:

string

param NextToken:

The token required for pagination. On your first call, set the value of this parameter to NULL. For subsequent calls, to continue listing data, set the value of this parameter to the value returned in the previous response.

type MaxResults:

integer

param MaxResults:

The maximum number of results to return.

rtype:

dict

returns:

Response Syntax

{
    'Resources': [
        {
            'ResourceGuid': 'string',
            'ResourceId': 'string',
            'AccountId': 'string',
            'Region': 'string',
            'ResourceCategory': 'Compute'|'Database'|'Storage'|'Code'|'AI/ML'|'Identity'|'Network'|'Other',
            'ResourceType': 'string',
            'ResourceName': 'string',
            'ResourceCreationTimeDt': 'string',
            'ResourceDetailCaptureTimeDt': 'string',
            'FindingsSummary': [
                {
                    'FindingType': 'string',
                    'ProductName': 'string',
                    'TotalFindings': 123,
                    'Severities': {
                        'Other': 123,
                        'Fatal': 123,
                        'Critical': 123,
                        'High': 123,
                        'Medium': 123,
                        'Low': 123,
                        'Informational': 123,
                        'Unknown': 123
                    }
                },
            ],
            'ResourceTags': [
                {
                    'Key': 'string',
                    'Value': 'string'
                },
            ],
            'ResourceConfig': {...}|[...]|123|123.4|'string'|True|None
        },
    ],
    'NextToken': 'string'
}

Response Structure

  • (dict) --

    • Resources (list) --

      An array of resources returned by the operation.

      • (dict) --

        Provides comprehensive details about an Amazon Web Services resource and its associated security findings.

        • ResourceGuid (string) --

          The global identifier used to identify a resource.

        • ResourceId (string) --

          The unique identifier for a resource.

        • AccountId (string) --

          The Amazon Web Services account that owns the resource.

        • Region (string) --

          The Amazon Web Services Region where the resource is located.

        • ResourceCategory (string) --

          The grouping where the resource belongs.

        • ResourceType (string) --

          The type of resource.

        • ResourceName (string) --

          The name of the resource.

        • ResourceCreationTimeDt (string) --

          The time when the resource was created.

        • ResourceDetailCaptureTimeDt (string) --

          The timestamp when information about the resource was captured.

        • FindingsSummary (list) --

          An aggregated view of security findings associated with a resource.

          • (dict) --

            A list of summaries for all finding types on a resource.

            • FindingType (string) --

              The category or classification of the security finding.

            • ProductName (string) --

              The name of the product associated with the security finding.

            • TotalFindings (integer) --

              The total count of security findings.

            • Severities (dict) --

              A breakdown of security findings by their severity levels.

              • Other (integer) --

                The number of findings not in any of the severity categories.

              • Fatal (integer) --

                The number of findings with a severity level of fatal.

              • Critical (integer) --

                The number of findings with a severity level of critical.

              • High (integer) --

                The number of findings with a severity level of high.

              • Medium (integer) --

                The number of findings with a severity level of medium.

              • Low (integer) --

                The number of findings with a severity level of low.

              • Informational (integer) --

                The number of findings that provide security-related information.

              • Unknown (integer) --

                The number of findings with a severity level cannot be determined.

        • ResourceTags (list) --

          The key-value pairs associated with a resource.

          • (dict) --

            Represents tag information associated with Amazon Web Services resources.

            • Key (string) --

              The identifier or name of the tag.

            • Value (string) --

              The data associated with the tag key.

        • ResourceConfig (:ref:`document<document>`) --

          The configuration details of a resource.

    • NextToken (string) --

      The pagination token to use to request the next page of results. Otherwise, this parameter is null.