@@ -19,6 +19,8 @@ package google.cloud.securitycenter.v1;
1919import "google/api/field_behavior.proto" ;
2020import "google/api/resource.proto" ;
2121import "google/cloud/securitycenter/v1/access.proto" ;
22+ import "google/cloud/securitycenter/v1/cloud_dlp_data_profile.proto" ;
23+ import "google/cloud/securitycenter/v1/cloud_dlp_inspection.proto" ;
2224import "google/cloud/securitycenter/v1/compliance.proto" ;
2325import "google/cloud/securitycenter/v1/connection.proto" ;
2426import "google/cloud/securitycenter/v1/contact_details.proto" ;
@@ -84,7 +86,8 @@ message Finding {
8486 // exploitable, and results in the direct ability to execute arbitrary code,
8587 // exfiltrate data, and otherwise gain additional access and privileges to
8688 // cloud resources and workloads. Examples include publicly accessible
87- // unprotected user data, public SSH access with weak or no passwords, etc.
89+ // unprotected user data and public SSH access with weak or no
90+ // passwords.
8891 //
8992 // Threat:
9093 // Indicates a threat that is able to access, modify, or delete data or
@@ -170,10 +173,12 @@ message Finding {
170173 SCC_ERROR = 5 ;
171174 }
172175
173- // The relative resource name of this finding. See:
174- // https://cloud.google.com/apis/design/resource_names#relative_resource_name
175- // Example:
176- // "organizations/{organization_id}/sources/{source_id}/findings/{finding_id}"
176+ // The [relative resource
177+ // name](https://cloud.google.com/apis/design/resource_names#relative_resource_name)
178+ // of the finding. Example:
179+ // "organizations/{organization_id}/sources/{source_id}/findings/{finding_id}",
180+ // "folders/{folder_id}/sources/{source_id}/findings/{finding_id}",
181+ // "projects/{project_id}/sources/{source_id}/findings/{finding_id}".
177182 string name = 1 ;
178183
179184 // The relative resource name of the source the finding belongs to. See:
@@ -247,11 +252,11 @@ message Finding {
247252 // The class of the finding.
248253 FindingClass finding_class = 17 ;
249254
250- // Represents what's commonly known as an Indicator of compromise (IoC) in
255+ // Represents what's commonly known as an *indicator of compromise* (IoC) in
251256 // computer forensics. This is an artifact observed on a network or in an
252257 // operating system that, with high confidence, indicates a computer
253- // intrusion.
254- // Reference: https://en.wikipedia.org/wiki/Indicator_of_compromise
258+ // intrusion. For more information, see [Indicator of
259+ // compromise]( https://en.wikipedia.org/wiki/Indicator_of_compromise).
255260 Indicator indicator = 18 ;
256261
257262 // Represents vulnerability-specific fields like CVE and CVSS scores.
@@ -272,17 +277,16 @@ message Finding {
272277 // See: https://attack.mitre.org
273278 MitreAttack mitre_attack = 25 ;
274279
275- // Access details associated to the Finding , such as more information on the
276- // caller, which method was accessed, from where, etc .
280+ // Access details associated with the finding , such as more information on the
281+ // caller, which method was accessed, and from where.
277282 Access access = 26 ;
278283
279284 // Contains information about the IP connection associated with the finding.
280285 repeated Connection connections = 31 ;
281286
282- // First known as mute_annotation. Records additional information about the
283- // mute operation e.g. mute config that muted the finding, user who muted the
284- // finding, etc. Unlike other attributes of a finding, a finding provider
285- // shouldn't set the value of mute.
287+ // Records additional information about the mute operation, for example, the
288+ // [mute configuration](/security-command-center/docs/how-to-mute-findings)
289+ // that muted the finding and the user who muted the finding.
286290 string mute_initiator = 28 ;
287291
288292 // Represents operating system processes associated with the Finding.
@@ -316,25 +320,25 @@ message Finding {
316320 // "Event Threat Detection" or "Security Health Analytics".
317321 string parent_display_name = 36 [(google.api.field_behavior ) = OUTPUT_ONLY ];
318322
319- // Contains more detail about the finding.
323+ // Contains more details about the finding.
320324 string description = 37 ;
321325
322- // Represents exfiltration associated with the Finding .
326+ // Represents exfiltrations associated with the finding .
323327 Exfiltration exfiltration = 38 ;
324328
325- // Represents IAM bindings associated with the Finding .
329+ // Represents IAM bindings associated with the finding .
326330 repeated IamBinding iam_bindings = 39 ;
327331
328- // Next steps associate to the finding.
332+ // Steps to address the finding.
329333 string next_steps = 40 ;
330334
331335 // Unique identifier of the module which generated the finding.
332336 // Example:
333337 // folders/598186756061/securityHealthAnalyticsSettings/customModules/56799441161885
334338 string module_name = 41 ;
335339
336- // Containers associated with the finding. containers provides information
337- // for both Kubernetes and non-Kubernetes containers.
340+ // Containers associated with the finding. This field provides information for
341+ // both Kubernetes and non-Kubernetes containers.
338342 repeated Container containers = 42 ;
339343
340344 // Kubernetes resources associated with the finding.
@@ -346,6 +350,13 @@ message Finding {
346350 // File associated with the finding.
347351 repeated File files = 46 ;
348352
349- // Kernel Rootkit signature.
353+ // Cloud Data Loss Prevention (Cloud DLP) inspection results that are
354+ // associated with the finding.
355+ CloudDlpInspection cloud_dlp_inspection = 48 ;
356+
357+ // Cloud DLP data profile that is associated with the finding.
358+ CloudDlpDataProfile cloud_dlp_data_profile = 49 ;
359+
360+ // Signature of the kernel rootkit.
350361 KernelRootkit kernel_rootkit = 50 ;
351362}
0 commit comments