xref: /aosp_15_r20/external/googleapis/google/cloud/securitycenter/v1/exfiltration.proto (revision d5c09012810ac0c9f33fe448fb6da8260d444cc9)
1*d5c09012SAndroid Build Coastguard Worker// Copyright 2023 Google LLC
2*d5c09012SAndroid Build Coastguard Worker//
3*d5c09012SAndroid Build Coastguard Worker// Licensed under the Apache License, Version 2.0 (the "License");
4*d5c09012SAndroid Build Coastguard Worker// you may not use this file except in compliance with the License.
5*d5c09012SAndroid Build Coastguard Worker// You may obtain a copy of the License at
6*d5c09012SAndroid Build Coastguard Worker//
7*d5c09012SAndroid Build Coastguard Worker//     http://www.apache.org/licenses/LICENSE-2.0
8*d5c09012SAndroid Build Coastguard Worker//
9*d5c09012SAndroid Build Coastguard Worker// Unless required by applicable law or agreed to in writing, software
10*d5c09012SAndroid Build Coastguard Worker// distributed under the License is distributed on an "AS IS" BASIS,
11*d5c09012SAndroid Build Coastguard Worker// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12*d5c09012SAndroid Build Coastguard Worker// See the License for the specific language governing permissions and
13*d5c09012SAndroid Build Coastguard Worker// limitations under the License.
14*d5c09012SAndroid Build Coastguard Worker
15*d5c09012SAndroid Build Coastguard Workersyntax = "proto3";
16*d5c09012SAndroid Build Coastguard Worker
17*d5c09012SAndroid Build Coastguard Workerpackage google.cloud.securitycenter.v1;
18*d5c09012SAndroid Build Coastguard Worker
19*d5c09012SAndroid Build Coastguard Workeroption csharp_namespace = "Google.Cloud.SecurityCenter.V1";
20*d5c09012SAndroid Build Coastguard Workeroption go_package = "cloud.google.com/go/securitycenter/apiv1/securitycenterpb;securitycenterpb";
21*d5c09012SAndroid Build Coastguard Workeroption java_multiple_files = true;
22*d5c09012SAndroid Build Coastguard Workeroption java_outer_classname = "ExfiltrationProto";
23*d5c09012SAndroid Build Coastguard Workeroption java_package = "com.google.cloud.securitycenter.v1";
24*d5c09012SAndroid Build Coastguard Workeroption php_namespace = "Google\\Cloud\\SecurityCenter\\V1";
25*d5c09012SAndroid Build Coastguard Workeroption ruby_package = "Google::Cloud::SecurityCenter::V1";
26*d5c09012SAndroid Build Coastguard Worker
27*d5c09012SAndroid Build Coastguard Worker// Exfiltration represents a data exfiltration attempt from one or more sources
28*d5c09012SAndroid Build Coastguard Worker// to one or more targets. The `sources` attribute lists the sources of the
29*d5c09012SAndroid Build Coastguard Worker// exfiltrated data. The `targets` attribute lists the destinations the data was
30*d5c09012SAndroid Build Coastguard Worker// copied to.
31*d5c09012SAndroid Build Coastguard Workermessage Exfiltration {
32*d5c09012SAndroid Build Coastguard Worker  // If there are multiple sources, then the data is considered "joined" between
33*d5c09012SAndroid Build Coastguard Worker  // them. For instance, BigQuery can join multiple tables, and each
34*d5c09012SAndroid Build Coastguard Worker  // table would be considered a source.
35*d5c09012SAndroid Build Coastguard Worker  repeated ExfilResource sources = 1;
36*d5c09012SAndroid Build Coastguard Worker
37*d5c09012SAndroid Build Coastguard Worker  // If there are multiple targets, each target would get a complete copy of the
38*d5c09012SAndroid Build Coastguard Worker  // "joined" source data.
39*d5c09012SAndroid Build Coastguard Worker  repeated ExfilResource targets = 2;
40*d5c09012SAndroid Build Coastguard Worker
41*d5c09012SAndroid Build Coastguard Worker  // Total exfiltrated bytes processed for the entire job.
42*d5c09012SAndroid Build Coastguard Worker  int64 total_exfiltrated_bytes = 3;
43*d5c09012SAndroid Build Coastguard Worker}
44*d5c09012SAndroid Build Coastguard Worker
45*d5c09012SAndroid Build Coastguard Worker// Resource where data was exfiltrated from or exfiltrated to.
46*d5c09012SAndroid Build Coastguard Workermessage ExfilResource {
47*d5c09012SAndroid Build Coastguard Worker  // The resource's [full resource
48*d5c09012SAndroid Build Coastguard Worker  // name](https://cloud.google.com/apis/design/resource_names#full_resource_name).
49*d5c09012SAndroid Build Coastguard Worker  string name = 1;
50*d5c09012SAndroid Build Coastguard Worker
51*d5c09012SAndroid Build Coastguard Worker  // Subcomponents of the asset that was exfiltrated, like URIs used during
52*d5c09012SAndroid Build Coastguard Worker  // exfiltration, table names, databases, and filenames. For example, multiple
53*d5c09012SAndroid Build Coastguard Worker  // tables might have been exfiltrated from the same Cloud SQL instance, or
54*d5c09012SAndroid Build Coastguard Worker  // multiple files might have been exfiltrated from the same Cloud Storage
55*d5c09012SAndroid Build Coastguard Worker  // bucket.
56*d5c09012SAndroid Build Coastguard Worker  repeated string components = 2;
57*d5c09012SAndroid Build Coastguard Worker}
58