Validates a Device Defender security profile behaviors specification.
See also: AWS API Documentation
See ‘aws help’ for descriptions of global parameters.
validate-security-profile-behaviors
--behaviors <value>
[--cli-input-json | --cli-input-yaml]
[--generate-cli-skeleton <value>]
--behaviors
(list)
Specifies the behaviors that, when violated by a device (thing), cause an alert.
(structure)
A Device Defender security profile behavior.
name -> (string)
The name you’ve given to the behavior.
metric -> (string)
What is measured by the behavior.
metricDimension -> (structure)
The dimension for a metric in your behavior. For example, using a
TOPIC_FILTER
dimension, you can narrow down the scope of the metric to only MQTT topics where the name matches the pattern specified in the dimension. This can’t be used with custom metrics.dimensionName -> (string)
A unique identifier for the dimension.
operator -> (string)
Defines how the
dimensionValues
of a dimension are interpreted. For example, for dimension type TOPIC_FILTER, theIN
operator, a message will be counted only if its topic matches one of the topic filters. WithNOT_IN
operator, a message will be counted only if it doesn’t match any of the topic filters. The operator is optional: if it’s not provided (isnull
), it will be interpreted asIN
.criteria -> (structure)
The criteria that determine if a device is behaving normally in regard to the
metric
.comparisonOperator -> (string)
The operator that relates the thing measured (
metric
) to the criteria (containing avalue
orstatisticalThreshold
). Valid operators include:
string-list
:in-set
andnot-in-set
number-list
:in-set
andnot-in-set
ip-address-list
:in-cidr-set
andnot-in-cidr-set
number
:less-than
,less-than-equals
,greater-than
, andgreater-than-equals
value -> (structure)
The value to be compared with the
metric
.count -> (long)
If the
comparisonOperator
calls for a numeric value, use this to specify that numeric value to be compared with themetric
.cidrs -> (list)
If the
comparisonOperator
calls for a set of CIDRs, use this to specify that set to be compared with themetric
.(string)
ports -> (list)
If the
comparisonOperator
calls for a set of ports, use this to specify that set to be compared with themetric
.(integer)
number -> (double)
The numeral value of a metric.
numbers -> (list)
The numeral values of a metric.
(double)
strings -> (list)
The string values of a metric.
(string)
durationSeconds -> (integer)
Use this to specify the time duration over which the behavior is evaluated, for those criteria that have a time dimension (for example,
NUM_MESSAGES_SENT
). For astatisticalThreshhold
metric comparison, measurements from all devices are accumulated over this time duration before being used to calculate percentiles, and later, measurements from an individual device are also accumulated over this time duration before being given a percentile rank. Cannot be used with list-based metric datatypes.consecutiveDatapointsToAlarm -> (integer)
If a device is in violation of the behavior for the specified number of consecutive datapoints, an alarm occurs. If not specified, the default is 1.
consecutiveDatapointsToClear -> (integer)
If an alarm has occurred and the offending device is no longer in violation of the behavior for the specified number of consecutive datapoints, the alarm is cleared. If not specified, the default is 1.
statisticalThreshold -> (structure)
A statistical ranking (percentile)that indicates a threshold value by which a behavior is determined to be in compliance or in violation of the behavior.
statistic -> (string)
The percentile that resolves to a threshold value by which compliance with a behavior is determined. Metrics are collected over the specified period (
durationSeconds
) from all reporting devices in your account and statistical ranks are calculated. Then, the measurements from a device are collected over the same period. If the accumulated measurements from the device fall above or below (comparisonOperator
) the value associated with the percentile specified, then the device is considered to be in compliance with the behavior, otherwise a violation occurs.mlDetectionConfig -> (structure)
The configuration of an ML Detect
confidenceLevel -> (string)
The sensitivity of anomalous behavior evaluation. Can be
Low
,Medium
, orHigh
.suppressAlerts -> (boolean)
Suppresses alerts.
JSON Syntax:
[
{
"name": "string",
"metric": "string",
"metricDimension": {
"dimensionName": "string",
"operator": "IN"|"NOT_IN"
},
"criteria": {
"comparisonOperator": "less-than"|"less-than-equals"|"greater-than"|"greater-than-equals"|"in-cidr-set"|"not-in-cidr-set"|"in-port-set"|"not-in-port-set"|"in-set"|"not-in-set",
"value": {
"count": long,
"cidrs": ["string", ...],
"ports": [integer, ...],
"number": double,
"numbers": [double, ...],
"strings": ["string", ...]
},
"durationSeconds": integer,
"consecutiveDatapointsToAlarm": integer,
"consecutiveDatapointsToClear": integer,
"statisticalThreshold": {
"statistic": "string"
},
"mlDetectionConfig": {
"confidenceLevel": "LOW"|"MEDIUM"|"HIGH"
}
},
"suppressAlerts": true|false
}
...
]
--cli-input-json
| --cli-input-yaml
(string)
Reads arguments from the JSON string provided. The JSON string follows the format provided by --generate-cli-skeleton
. If other arguments are provided on the command line, those values will override the JSON-provided values. It is not possible to pass arbitrary binary values using a JSON-provided value as the string will be taken literally. This may not be specified along with --cli-input-yaml
.
--generate-cli-skeleton
(string)
Prints a JSON skeleton to standard output without sending an API request. If provided with no value or the value input
, prints a sample input JSON that can be used as an argument for --cli-input-json
. Similarly, if provided yaml-input
it will print a sample input YAML that can be used with --cli-input-yaml
. If provided with the value output
, it validates the command inputs and returns a sample output JSON for that command.
See ‘aws help’ for descriptions of global parameters.
Example 1: To validate the behaviors parameters for a security profile
The following validate-security-profile-behaviors
example validates a well-formed and correct set of behaviors for an AWS IoT Device Defender security profile.
aws iot validate-security-profile-behaviors \
--behaviors "[{\"name\":\"CellularBandwidth\",\"metric\":\"aws:message-byte-size\",\"criteria\":{\"comparisonOperator\":\"greater-than\",\"value\":{\"count\":128},\"consecutiveDatapointsToAlarm\":1,\"consecutiveDatapointsToClear\":1}},{\"name\":\"Authorization\",\"metric\":\"aws:num-authorization-failures\",\"criteria\":{\"comparisonOperator\":\"greater-than\",\"value\":{\"count\":12},\"durationSeconds\":300,\"consecutiveDatapointsToAlarm\":1,\"consecutiveDatapointsToClear\":1}}]"
Output:
{
"valid": true,
"validationErrors": []
}
Example 2: To validate incorrect behaviors parameters for a security profile
The following validate-security-profile-behaviors
example validates a set of behaviors that contains an error for an AWS IoT Device Defender security profile.
aws iot validate-security-profile-behaviors \
--behaviors "[{\"name\":\"CellularBandwidth\",\"metric\":\"aws:message-byte-size\",\"criteria\":{\"comparisonOperator\":\"greater-than\",\"value\":{\"count\":128},\"consecutiveDatapointsToAlarm\":1,\"consecutiveDatapointsToClear\":1}},{\"name\":\"Authorization\",\"metric\":\"aws:num-authorization-failures\",\"criteria\":{\"comparisonOperator\":\"greater-than\",\"value\":{\"count\":12},\"durationSeconds\":300,\"consecutiveDatapointsToAlarm\":100000,\"consecutiveDatapointsToClear\":1}}]"
Output:
{
"valid": false,
"validationErrors": [
{
"errorMessage": "Behavior Authorization is malformed. consecutiveDatapointsToAlarm 100000 should be in range[1,10]"
}
]
}
For more information, see Detect Commands in the AWS IoT Developer Guide.
valid -> (boolean)
True if the behaviors were valid.
validationErrors -> (list)
The list of any errors found in the behaviors.
(structure)
Information about an error found in a behavior specification.
errorMessage -> (string)
The description of an error found in the behaviors.