HEX
Server: Apache
System: Linux vps-cdc32557.vps.ovh.ca 5.15.0-156-generic #166-Ubuntu SMP Sat Aug 9 00:02:46 UTC 2025 x86_64
User: hanode (1017)
PHP: 7.4.33
Disabled: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare,
Upload Files
File: //usr/lib/python3/dist-packages/awscli/examples/securityhub/batch-import-findings.rst
**To update a finding**

The following ``batch-import-findings`` example updates a finding. ::

    aws securityhub batch-import-findings \
         --findings '
            [{
                "AwsAccountId": "123456789012",
                "CreatedAt": "2020-05-27T17:05:54.832Z",
                "Description": "Vulnerability in a CloudTrail trail",
                "FindingProviderFields": {
                    "Severity": {
                        "Label": "LOW",
                        "Original": "10"
                    },
                    "Types": [
                        "Software and Configuration Checks/Vulnerabilities/CVE"
                    ]
                },
                "GeneratorId": "TestGeneratorId",
                "Id": "Id1",
                "ProductArn": "arn:aws:securityhub:us-west-1:123456789012:product/123456789012/default",
                "Resources": [
                    {
                        "Id": "arn:aws:cloudtrail:us-west-1:123456789012:trail/TrailName",
                        "Partition": "aws",
                        "Region": "us-west-1",
                        "Type": "AwsCloudTrailTrail"
                    }
                ],
                "SchemaVersion": "2018-10-08",
                "Title": "CloudTrail trail vulnerability",
                "UpdatedAt": "2020-06-02T16:05:54.832Z"
            }]'

Output::

    {
        "FailedCount": 0,
        "SuccessCount": 1,
        "FailedFindings": []
    }

For more information, see `Using BatchImportFindings to create and update findings <https://docs.aws.amazon.com/securityhub/latest/userguide/finding-update-batchimportfindings.html>`__ in the *AWS Security Hub User Guide*.