Gets information about an audit mitigation task that is used to apply mitigation actions to a set of audit findings. Properties include the actions being applied, the audit checks to which they’re being applied, the task status, and aggregated task statistics.
See also: AWS API Documentation
See ‘aws help’ for descriptions of global parameters.
describe-audit-mitigation-actions-task
--task-id <value>
[--cli-input-json | --cli-input-yaml]
[--generate-cli-skeleton <value>]
[--cli-auto-prompt <value>]
--task-id
(string)
The unique identifier for the audit mitigation task.
--cli-input-json
| --cli-input-yaml
(string)
Reads arguments from the JSON string provided. The JSON string follows the format provided by --generate-cli-skeleton
. If other arguments are provided on the command line, those values will override the JSON-provided values. It is not possible to pass arbitrary binary values using a JSON-provided value as the string will be taken literally. This may not be specified along with --cli-input-yaml
.
--generate-cli-skeleton
(string)
Prints a JSON skeleton to standard output without sending an API request. If provided with no value or the value input
, prints a sample input JSON that can be used as an argument for --cli-input-json
. Similarly, if provided yaml-input
it will print a sample input YAML that can be used with --cli-input-yaml
. If provided with the value output
, it validates the command inputs and returns a sample output JSON for that command.
--cli-auto-prompt
(boolean)
Automatically prompt for CLI input parameters.
See ‘aws help’ for descriptions of global parameters.
To show the details of an audit mitigation actions task
The following describe-audit-mitigation-actions-task
example shows the details for the specified task, where the ResetPolicyVersionAction
was applied to a finding. The results include when the task started and ended, how many findings were targeted (and the outcome), and the definition of the action that is applied as part of this task.
aws iot describe-audit-mitigation-actions-task \
--task-id ResetPolicyTask01
Output:
{
"taskStatus": "COMPLETED",
"startTime": "2019-12-10T15:13:19.457000-08:00",
"endTime": "2019-12-10T15:13:19.947000-08:00",
"taskStatistics": {
"IOT_POLICY_OVERLY_PERMISSIVE_CHECK": {
"totalFindingsCount": 1,
"failedFindingsCount": 0,
"succeededFindingsCount": 1,
"skippedFindingsCount": 0,
"canceledFindingsCount": 0
}
},
"target": {
"findingIds": [
"ef4826b8-e55a-44b9-b460-5c485355371b"
]
},
"auditCheckToActionsMapping": {
"IOT_POLICY_OVERLY_PERMISSIVE_CHECK": [
"ResetPolicyVersionAction"
]
},
"actionsDefinition": [
{
"name": "ResetPolicyVersionAction",
"id": "1ea0b415-bef1-4a01-bd13-72fb63c59afb",
"roleArn": "arn:aws:iam::123456789012:role/service-role/ReplacePolicyVersionRole",
"actionParams": {
"replaceDefaultPolicyVersionParams": {
"templateName": "BLANK_POLICY"
}
}
}
]
}
For more information, see DescribeAuditMitigationActionsTask (Mitigation Action Commands) in the AWS IoT Developer Guide.
taskStatus -> (string)
The current status of the task.
startTime -> (timestamp)
The date and time when the task was started.
endTime -> (timestamp)
The date and time when the task was completed or canceled.
taskStatistics -> (map)
Aggregate counts of the results when the mitigation tasks were applied to the findings for this audit mitigation actions task.
key -> (string)
An audit check name. Checks must be enabled for your account. (Use
DescribeAccountAuditConfiguration
to see the list of all checks, including those that are enabled or useUpdateAccountAuditConfiguration
to select which checks are enabled.)value -> (structure)
Provides summary counts of how many tasks for findings are in a particular state. This information is included in the response from DescribeAuditMitigationActionsTask.
totalFindingsCount -> (long)
The total number of findings to which a task is being applied.
failedFindingsCount -> (long)
The number of findings for which at least one of the actions failed when applied.
succeededFindingsCount -> (long)
The number of findings for which all mitigation actions succeeded when applied.
skippedFindingsCount -> (long)
The number of findings skipped because of filter conditions provided in the parameters to the command.
canceledFindingsCount -> (long)
The number of findings to which the mitigation action task was canceled when applied.
target -> (structure)
Identifies the findings to which the mitigation actions are applied. This can be by audit checks, by audit task, or a set of findings.
auditTaskId -> (string)
If the task will apply a mitigation action to findings from a specific audit, this value uniquely identifies the audit.
findingIds -> (list)
If the task will apply a mitigation action to one or more listed findings, this value uniquely identifies those findings.
(string)
auditCheckToReasonCodeFilter -> (map)
Specifies a filter in the form of an audit check and set of reason codes that identify the findings from the audit to which the audit mitigation actions task apply.
key -> (string)
An audit check name. Checks must be enabled for your account. (Use
DescribeAccountAuditConfiguration
to see the list of all checks, including those that are enabled or useUpdateAccountAuditConfiguration
to select which checks are enabled.)value -> (list)
(string)
auditCheckToActionsMapping -> (map)
Specifies the mitigation actions that should be applied to specific audit checks.
key -> (string)
An audit check name. Checks must be enabled for your account. (Use
DescribeAccountAuditConfiguration
to see the list of all checks, including those that are enabled or useUpdateAccountAuditConfiguration
to select which checks are enabled.)value -> (list)
(string)
actionsDefinition -> (list)
Specifies the mitigation actions and their parameters that are applied as part of this task.
(structure)
Describes which changes should be applied as part of a mitigation action.
name -> (string)
A user-friendly name for the mitigation action.
id -> (string)
A unique identifier for the mitigation action.
roleArn -> (string)
The IAM role ARN used to apply this mitigation action.
actionParams -> (structure)
The set of parameters for this mitigation action. The parameters vary, depending on the kind of action you apply.
updateDeviceCertificateParams -> (structure)
Parameters to define a mitigation action that changes the state of the device certificate to inactive.
action -> (string)
The action that you want to apply to the device cerrtificate. The only supported value is
DEACTIVATE
.updateCACertificateParams -> (structure)
Parameters to define a mitigation action that changes the state of the CA certificate to inactive.
action -> (string)
The action that you want to apply to the CA cerrtificate. The only supported value is
DEACTIVATE
.addThingsToThingGroupParams -> (structure)
Parameters to define a mitigation action that moves devices associated with a certificate to one or more specified thing groups, typically for quarantine.
thingGroupNames -> (list)
The list of groups to which you want to add the things that triggered the mitigation action. You can add a thing to a maximum of 10 groups, but you cannot add a thing to more than one group in the same hierarchy.
(string)
overrideDynamicGroups -> (boolean)
Specifies if this mitigation action can move the things that triggered the mitigation action even if they are part of one or more dynamic things groups.
replaceDefaultPolicyVersionParams -> (structure)
Parameters to define a mitigation action that adds a blank policy to restrict permissions.
templateName -> (string)
The name of the template to be applied. The only supported value is
BLANK_POLICY
.enableIoTLoggingParams -> (structure)
Parameters to define a mitigation action that enables AWS IoT logging at a specified level of detail.
roleArnForLogging -> (string)
The ARN of the IAM role used for logging.
logLevel -> (string)
Specifies the types of information to be logged.
publishFindingToSnsParams -> (structure)
Parameters to define a mitigation action that publishes findings to Amazon SNS. You can implement your own custom actions in response to the Amazon SNS messages.
topicArn -> (string)
The ARN of the topic to which you want to publish the findings.