Querying the Report of a Check Item in a Security Configuration Check
Function
This API is used to query the report of a check item in a security configuration check.
URI
GET /v5/{project_id}/baseline/check-rule/detail
Parameter |
Mandatory |
Type |
Description |
---|---|---|---|
project_id |
Yes |
String |
Project ID |
Parameter |
Mandatory |
Type |
Description |
---|---|---|---|
enterprise_project_id |
No |
String |
Enterprise project ID |
check_name |
Yes |
String |
Name of the configuration check (baseline), for example, SSH, CentOS 7, and Windows. |
check_type |
Yes |
String |
Baseline type. You can obtain the value by calling API /v5/{project_id}/baseline/risk-configs. Note that the values for check_type and check_name are the same for Linux servers. For example, they can both be set to SSH or CentOS 7. For Windows servers, the values for check_type and check_name are different. For example, check_type can be set to Windows Server 2019 R2 or Windows Server 2016 R2, while check_name can be set to Windows. |
check_rule_id |
Yes |
String |
Check item ID, which can be obtained from the return data of this API: /v5/{project_id}/baseline/risk-config/{check_name}/check-rules |
standard |
Yes |
String |
hw_standard: Cloud security practice standard |
host_id |
No |
String |
Host ID |
Request Parameters
Parameter |
Mandatory |
Type |
Description |
---|---|---|---|
X-Auth-Token |
Yes |
String |
IAM token, which can be obtained by calling the IAM API used to obtain an IAM token. The value of X-Subject-Token in the response header is the IAM token. |
Response Parameters
Status code: 200
Parameter |
Type |
Description |
---|---|---|
description |
String |
Description of the current check item (detection rule). |
reference |
String |
Basis for the check item (rule) setting |
audit |
String |
Audit description of the check item (rule) |
remediation |
String |
Modification suggestions for the check item (rule) |
check_info_list |
Array of CheckRuleCheckCaseResponseInfo objects |
Test cases |
Example Requests
This API is used to query the report of the configuration check items whose baseline name is SSH, check item ID is 1.12, check standard is cloud security practice standard, and enterprise project ID is xxx.
GET https://{endpoint}/v5/{project_id}/baseline/check-rule/detail?standard=hw_standard&enterprise_project_id=xxx&check_name=SSH&check_type=SSH&check_rule_id=1.12
Example Responses
Status code: 200
configuration item check report
{"audit":"Run the following commands and verify that ClientAliveInterval is smaller than 300 and ClientAliveCountMax is 3 or less: #grep '^ClientAliveInterval' /etc/ssh/sshd_config ClientAliveInterval 300(default is 0) #grep '^ClientAliveCountMax' /etc/ssh/sshd_config ClientAliveCountMax 0(default is 3)","description":"The two options ClientAliveInterval and ClientAliveCountMax control the timeout of SSH sessions. The ClientAliveInterval parameter sets a timeout interval in seconds after which if no data has been received from the client, sshd will send a message through the encrypted channel to request a response from the client. The ClientAliveCountMax parameter sets the number of client alive messages which may be sent without sshd receiving any messages back from the client. For example, if the ClientAliveInterval is set to 15s and the ClientAliveCountMax is set to 3, unresponsive SSH clients will be disconnected after approximately 45s.","reference":"","remediation":"Edit the /etc/ssh/sshd_config file to set the parameter as follows: ClientAliveInterval 300 ClientAliveCountMax 0"}
Status Codes
Status Code |
Description |
---|---|
200 |
configuration item check report |
Error Codes
See Error Codes.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.