12345678910111213141516171819202122232425262728293031323334353637383940 |
- // Copyright 2021 Google LLC
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- syntax = "proto3";
- package google.cloud.securitycenter.v1;
- import "google/api/annotations.proto";
- option go_package = "google.golang.org/genproto/googleapis/cloud/securitycenter/v1;securitycenter";
- option java_multiple_files = true;
- option java_outer_classname = "IndicatorProto";
- option java_package = "com.google.cloud.securitycenter.v1";
- option csharp_namespace = "Google.Cloud.SecurityCenter.V1";
- option php_namespace = "Google\\Cloud\\SecurityCenter\\V1";
- option ruby_package = "Google::Cloud::SecurityCenter::V1";
- // Represents what's commonly known as an Indicator of compromise (IoC) in
- // computer forensics. This is an artifact observed on a network or in an
- // operating system that, with high confidence, indicates a computer intrusion.
- // Reference: https://en.wikipedia.org/wiki/Indicator_of_compromise
- message Indicator {
- // List of ip addresses associated to the Finding.
- repeated string ip_addresses = 1;
- // List of domains associated to the Finding.
- repeated string domains = 2;
- }
|