HEX
Server: LiteSpeed
System: Linux s3604.bom1.stableserver.net 4.18.0-513.11.1.lve.el8.x86_64 #1 SMP Thu Jan 18 16:21:02 UTC 2024 x86_64
User: dmstechonline (1480)
PHP: 7.4.33
Disabled: NONE
Upload Files
File: //usr/lib/python3.6/site-packages/awscli/examples/securityhub/batch-import-findings.rst
**To update a finding**

The following ``batch-import-findings`` example updates a finding. ::

    aws securityhub batch-import-findings \
         --findings '
            [{
                "AwsAccountId": "123456789012",
                "CreatedAt": "2020-05-27T17:05:54.832Z",
                "Description": "Vulnerability in a CloudTrail trail",
                "GeneratorId": "TestGeneratorId",
                "Id": "Id1",
                "ProductArn": "arn:aws:securityhub:us-west-1:123456789012:product/123456789012/default",
                "Resources": [
                    {
                        "Id": "arn:aws:cloudtrail:us-west-1:123456789012:trail/TrailName",
                        "Partition": "aws",
                        "Region": "us-west-1",
                        "Type": "AwsCloudTrailTrail"
                    }
                ],
                "SchemaVersion": "2018-10-08",
                "Severity": {
                    "Label": "LOW",
                    "Product": 10
                },
                "Title": "CloudTrail trail vulnerability",
                "Types": [
                    "Software and Configuration Checks/Vulnerabilities/CVE"
                ],
                "UpdatedAt": "2020-06-02T16:05:54.832Z"
            }]'

Output::

    {
        "FailedCount": 0,
        "SuccessCount": 1,
        "FailedFindings": []
    }

For more information, see `Using BatchImportFindings to create and update findings <https://docs.aws.amazon.com/securityhub/latest/userguide/finding-update-batchimportfindings.html>`__ in the *AWS Security Hub User Guide*.