全部产品
Search
文档中心

云安全中心:DescribeSecureSuggestion - 查询安全风险处理建议详情

更新时间:Nov 25, 2024

查询安全分相关的安全风险的处理建议详情。

调试

您可以在OpenAPI Explorer中直接运行该接口,免去您计算签名的困扰。运行成功后,OpenAPI Explorer可以自动生成SDK代码示例。

授权信息

下表是API对应的授权信息,可以在RAM权限策略语句的Action元素中使用,用来给RAM用户或RAM角色授予调用此API的权限。具体说明如下:

  • 操作:是指具体的权限点。
  • 访问级别:是指每个操作的访问级别,取值为写入(Write)、读取(Read)或列出(List)。
  • 资源类型:是指操作中支持授权的资源类型。具体说明如下:
    • 对于必选的资源类型,用背景高亮的方式表示。
    • 对于不支持资源级授权的操作,用全部资源表示。
  • 条件关键字:是指云产品自身定义的条件关键字。
  • 关联操作:是指成功执行操作所需要的其他权限。操作者必须同时具备关联操作的权限,操作才能成功。
操作访问级别资源类型条件关键字关联操作
yundun-sas:DescribeSecureSuggestionget
*全部资源
*

请求参数

名称类型必填描述示例值
SourceIpstring

访问源的 IP 地址。

192.168.XX.XX
Langstring

请求和接收消息的语言类型,默认为 zh。取值:

  • zh:中文
  • en:英文
zh

返回参数

名称类型描述示例值
object
RequestIdstring

本次调用请求的 ID,是由阿里云为该请求生成的唯一标识符,可用于排查和定位问题。

676F80E3-4B3F-43DA-9CBB-5FF79F202AA2
TotalCountinteger

待加固的安全风险的总条数。

15
Suggestionsarray<object>

安全风险处理列表。

Suggestionobject
Pointsinteger

单个扣分项的扣分值。

40
SuggestTypestring

待处理的安全风险的类型。取值:

  • SS_REINFORCE:关键功能未配置(例如:恶意主机行为防御)
  • SS_ALARM:待处理告警
  • SS_VUL:待修复漏洞
  • SS_HC:基线问题
  • SS_AK:AK 泄露问题
  • SS_CLOUD_HC:云平台配置风险
  • OTHER:其他
SS_ALARM
Detailarray<object>

安全风险处理建议的详情。

Detailobject
Titlestring

安全风险待处理项的名称。

Website tamper-proofing capability not configured
Descriptionstring

安全风险处理建议的描述。

Malicious tampering of Web pages will affect your normal access to web page content, and may also lead to serious economic losses, brand losses, and even political risks. The webpage tamper-proof service can monitor the website directory in real time and restore the tampered files or directories through backup, so as to ensure that the website information of important systems is not tampered with maliciously and prevent the occurrence of horse hanging, black chain, illegal implantation of terrorist threats, pornography and other content.
SubTypestring

安全风险待处理项的类型。取值包含:

  • ALARM_HIGH:Unhandled Urgency Alerts
  • ALARM_MEDIUM:Unhandled Warning Alerts
  • ALARM_LOW:Unhandled Reminder Alerts
  • VUL_EMR_UNCHECK:Unchecked Urgent Vulnerabilities
  • VUL_EMR_UNFIX:Unfixed Urgent Vulnerabilities
  • VUL_WIN:Unfixed Windows Server Vulnerabilities
  • VUL_LINUX:Unfixed Linux Server Vulnerabilities
  • VUL_CMS:Unfixed CMS Vulnerabilities
  • ACCESSKEY_LEAK:AccessKey Leakage Risks
  • HC_WARN:Baseline Risks
  • HC_WEAK_EXPLOIT_WARN:There is a risk of weak passwords exposed by the public network.
  • HC_WEAK_PASSWORD_WARN:Risk of weak password
  • HC_HIGH_EXPLOIT_WARN:There is a high risk of invasion
  • HC_OTHER_WARN:Security Configuration risk
  • HC_DATABASE_WARN:Database has security risks
  • CLOUD_HC_SAS_OPEN:Security protection has not been installed on the server
  • CLOUD_HC_AEGIS_OFFLINE:Server protection status is offline
  • CLOUD_HC_ACCOUNT_DOUBLE_CHECK:Two-Factor Authentication not Enabled for Primary Account
  • CLOUD_HC_RDS:RDS-database security policy failed, security risks
  • CLOUD_HC_DDOS:Risks in Anti-DDoS Pro Back-to-Origin Settings
  • CLOUD_HC_HIGH_LEVEL:Cloud product configuration has high risk
  • CLOUD_HC_OTHER_LEVEL:Cloud product configuration has medium and low risk risks
  • OTHER_ATTACH:Attacks
  • OTHER_DATABASE_ATTACH:Database has security risks
  • REINFORCE_BASELINE:Config Assessment
  • REINFORCE_SUSPICIOUS:Antivirus
  • REINFORCE_ANALYSIS:Log Analysis
  • REINFORCE_AK_LEAK:AccessKey Leaked Intelligence Detection
  • REINFORCE_WEB_LOCK:Website tamper-proofing capability not configured
  • REINFORCE_BRUTE_FORCE:Anti brute force cracking
  • REINFORCE_XPRESS_INSTALL:One-click client installation
  • REINFORCE_RANSOMWARE:Enable anti-extortion strategy
  • REINFORCE_UNI_RANSOMWARE:Anti-ransomware for Databases
  • REINFORCE_VIRUS_SCHEDULE_SCAN:Periodic virus scan policies not configured
  • REINFORCE_IMAGE_REPO_SCAN:No container image scan range configured
  • REINFORCE_IMAGE_SCAN_TASK:Image security scan
  • REINFORCE_K8S_LOG_ANALYSIS:Container K8s threat detection is disabled
  • REINFORCE_CONTAINER_NETWORK:Container Visualization
REINFORCE_WEB_LOCK

示例

正常返回示例

JSON格式

{
  "RequestId": "676F80E3-4B3F-43DA-9CBB-5FF79F202AA2",
  "TotalCount": 15,
  "Suggestions": [
    {
      "Points": 40,
      "SuggestType": "SS_ALARM",
      "Detail": [
        {
          "Title": "Website tamper-proofing capability not configured",
          "Description": "Malicious tampering of Web pages will affect your normal access to web page content, and may also lead to serious economic losses, brand losses, and even political risks. The webpage tamper-proof service can monitor the website directory in real time and restore the tampered files or directories through backup, so as to ensure that the website information of important systems is not tampered with maliciously and prevent the occurrence of horse hanging, black chain, illegal implantation of terrorist threats, pornography and other content.",
          "SubType": "REINFORCE_WEB_LOCK"
        }
      ]
    }
  ]
}

错误码

HTTP status code错误码错误信息描述
400NoPermissionno permission无此服务的访问权限。
403NoPermissioncaller has no permission当前操作未被授权,请联系主账号在RAM控制台进行授权后再执行操作。
500ServerErrorServerError服务故障,请稍后重试!

访问错误中心查看更多错误码。

变更历史

变更时间变更内容概要操作
2024-05-15OpenAPI 错误码发生变更查看变更详情