Starts a task that applies a set of mitigation actions to the specified target.
Requires permission to access the StartAuditMitigationActionsTask action.
See also: AWS API Documentation
See ‘aws help’ for descriptions of global parameters.
start-audit-mitigation-actions-task
--task-id <value>
--target <value>
--audit-check-to-actions-mapping <value>
[--client-request-token <value>]
[--cli-input-json | --cli-input-yaml]
[--generate-cli-skeleton <value>]
--task-id (string)
A unique identifier for the task. You can use this identifier to check the status of the task or to cancel it.
--target (structure)
Specifies the audit findings to which the mitigation actions are applied. You can apply them to a type of audit check, to all findings from an audit, or to a specific set of findings.
auditTaskId -> (string)
If the task will apply a mitigation action to findings from a specific audit, this value uniquely identifies the audit.
findingIds -> (list)
If the task will apply a mitigation action to one or more listed findings, this value uniquely identifies those findings.
(string)
auditCheckToReasonCodeFilter -> (map)
Specifies a filter in the form of an audit check and set of reason codes that identify the findings from the audit to which the audit mitigation actions task apply.
key -> (string)
An audit check name. Checks must be enabled for your account. (Use
DescribeAccountAuditConfigurationto see the list of all checks, including those that are enabled or useUpdateAccountAuditConfigurationto select which checks are enabled.)value -> (list)
(string)
Shorthand Syntax:
auditTaskId=string,findingIds=string,string,auditCheckToReasonCodeFilter={KeyName1=string,string,KeyName2=string,string}
JSON Syntax:
{
"auditTaskId": "string",
"findingIds": ["string", ...],
"auditCheckToReasonCodeFilter": {"string": ["string", ...]
...}
}
--audit-check-to-actions-mapping (map)
For an audit check, specifies which mitigation actions to apply. Those actions must be defined in your Amazon Web Services accounts.
key -> (string)
An audit check name. Checks must be enabled for your account. (Use
DescribeAccountAuditConfigurationto see the list of all checks, including those that are enabled or useUpdateAccountAuditConfigurationto select which checks are enabled.)value -> (list)
(string)
Shorthand Syntax:
KeyName1=string,string,KeyName2=string,string
JSON Syntax:
{"string": ["string", ...]
...}
--client-request-token (string)
Each audit mitigation task must have a unique client request token. If you try to start a new task with the same token as a task that already exists, an exception occurs. If you omit this value, a unique client request token is generated automatically.
--cli-input-json | --cli-input-yaml (string)
Reads arguments from the JSON string provided. The JSON string follows the format provided by --generate-cli-skeleton. If other arguments are provided on the command line, those values will override the JSON-provided values. It is not possible to pass arbitrary binary values using a JSON-provided value as the string will be taken literally. This may not be specified along with --cli-input-yaml.
--generate-cli-skeleton (string)
Prints a JSON skeleton to standard output without sending an API request. If provided with no value or the value input, prints a sample input JSON that can be used as an argument for --cli-input-json. Similarly, if provided yaml-input it will print a sample input YAML that can be used with --cli-input-yaml. If provided with the value output, it validates the command inputs and returns a sample output JSON for that command.
See ‘aws help’ for descriptions of global parameters.
To apply a mitigation action to the findings from an audit
The following start-audit-mitigation-actions-task example applies the ResetPolicyVersionAction action (which clears the policy) to the specified single finding.
aws iot start-audit-mitigation-actions-task \
--task-id "myActionsTaskId" \
--target "findingIds=[\"0edbaaec-2fe1-4cf5-abc9-d4c3e51f7464\"]" \
--audit-check-to-actions-mapping "IOT_POLICY_OVERLY_PERMISSIVE_CHECK=[\"ResetPolicyVersionAction\"]" \
--client-request-token "adhadhahda"
Output:
{
"taskId": "myActionsTaskId"
}
For more information, see StartAuditMitigationActionsTask (Mitigation Action Commands) in the AWS IoT Developer Guide.
taskId -> (string)
The unique identifier for the audit mitigation task. This matches the
taskIdthat you specified in the request.