---
title: Getting Started with Datadog
description: Datadog, the leading service for cloud-scale monitoring.
breadcrumbs: Docs > Infrastructure > Datadog Resource Catalog
---

# aws_auditmanager_assessmentframework{% #aws_auditmanager_assessmentframework %}

## `account_id`{% #account_id %}

**Type**: `STRING`

## `arn`{% #arn %}

**Type**: `STRING`**Provider name**: `arn`**Description**: The Amazon Resource Name (ARN) of the framework.

## `compliance_type`{% #compliance_type %}

**Type**: `STRING`**Provider name**: `complianceType`**Description**: The compliance type that the framework supports, such as CIS or HIPAA.

## `control_sets`{% #control_sets %}

**Type**: `UNORDERED_LIST_STRUCT`**Provider name**: `controlSets`**Description**: The control sets that are associated with the framework.

- `controls`**Type**: `UNORDERED_LIST_STRUCT`**Provider name**: `controls`**Description**: The list of controls within the control set.
  - `action_plan_instructions`**Type**: `STRING`**Provider name**: `actionPlanInstructions`**Description**: The recommended actions to carry out if the control isn't fulfilled.
  - `action_plan_title`**Type**: `STRING`**Provider name**: `actionPlanTitle`**Description**: The title of the action plan for remediating the control.
  - `arn`**Type**: `STRING`**Provider name**: `arn`**Description**: The Amazon Resource Name (ARN) of the control.
  - `control_mapping_sources`**Type**: `UNORDERED_LIST_STRUCT`**Provider name**: `controlMappingSources`**Description**: The data mapping sources for the control.
    - `source_description`**Type**: `STRING`**Provider name**: `sourceDescription`**Description**: The description of the source.
    - `source_frequency`**Type**: `STRING`**Provider name**: `sourceFrequency`**Description**: Specifies how often evidence is collected from the control mapping source.
    - `source_id`**Type**: `STRING`**Provider name**: `sourceId`**Description**: The unique identifier for the source.
    - `source_keyword`**Type**: `STRUCT`**Provider name**: `sourceKeyword`
      - `keyword_input_type`**Type**: `STRING`**Provider name**: `keywordInputType`**Description**: The input method for the keyword.
        - `SELECT_FROM_LIST` is used when mapping a data source for automated evidence.
          - When `keywordInputType` is `SELECT_FROM_LIST`, a keyword must be selected to collect automated evidence. For example, this keyword can be a CloudTrail event name, a rule name for Config, a Security Hub control, or the name of an Amazon Web Services API call.
        - `UPLOAD_FILE` and `INPUT_TEXT` are only used when mapping a data source for manual evidence.
          - When `keywordInputType` is `UPLOAD_FILE`, a file must be uploaded as manual evidence.
          - When `keywordInputType` is `INPUT_TEXT`, text must be entered as manual evidence.
      - `keyword_value`**Type**: `STRING`**Provider name**: `keywordValue`**Description**: The value of the keyword that's used when mapping a control data source. For example, this can be a CloudTrail event name, a rule name for Config, a Security Hub control, or the name of an Amazon Web Services API call. If you're mapping a data source to a rule in Config, the `keywordValue` that you specify depends on the type of rule:
        - For [managed rules](https://docs.aws.amazon.com/config/latest/developerguide/evaluate-config_use-managed-rules.html), you can use the rule identifier as the `keywordValue`. You can find the rule identifier from the [list of Config managed rules](https://docs.aws.amazon.com/config/latest/developerguide/managed-rules-by-aws-config.html). For some rules, the rule identifier is different from the rule name. For example, the rule name `restricted-ssh` has the following rule identifier: `INCOMING_SSH_DISABLED`. Make sure to use the rule identifier, not the rule name. Keyword example for managed rules:
          - Managed rule name: [s3-bucket-acl-prohibited](https://docs.aws.amazon.com/config/latest/developerguide/s3-bucket-acl-prohibited.html) `keywordValue`: `S3_BUCKET_ACL_PROHIBITED`
        - For [custom rules](https://docs.aws.amazon.com/config/latest/developerguide/evaluate-config_develop-rules.html), you form the `keywordValue` by adding the `Custom_` prefix to the rule name. This prefix distinguishes the custom rule from a managed rule. Keyword example for custom rules:
          - Custom rule name: my-custom-config-rule `keywordValue`: `Custom_my-custom-config-rule`
        - For [service-linked rules](https://docs.aws.amazon.com/config/latest/developerguide/service-linked-awsconfig-rules.html), you form the `keywordValue` by adding the `Custom_` prefix to the rule name. In addition, you remove the suffix ID that appears at the end of the rule name. Keyword examples for service-linked rules:
          - Service-linked rule name: CustomRuleForAccount-conformance-pack-szsm1uv0w `keywordValue`: `Custom_CustomRuleForAccount-conformance-pack`
          - Service-linked rule name: OrgConfigRule-s3-bucket-versioning-enabled-dbgzf8ba `keywordValue`: `Custom_OrgConfigRule-s3-bucket-versioning-enabled`
The `keywordValue` is case sensitive. If you enter a value incorrectly, Audit Manager might not recognize the data source mapping. As a result, you might not successfully collect evidence from that data source as intended. Keep in mind the following requirements, depending on the data source type that you're using.
        1. For Config:
           - For managed rules, make sure that the `keywordValue` is the rule identifier in `ALL_CAPS_WITH_UNDERSCORES`. For example, `CLOUDWATCH_LOG_GROUP_ENCRYPTED`. For accuracy, we recommend that you reference the list of [supported Config managed rules](https://docs.aws.amazon.com/audit-manager/latest/userguide/control-data-sources-config.html).
           - For custom rules, make sure that the `keywordValue` has the `Custom_` prefix followed by the custom rule name. The format of the custom rule name itself may vary. For accuracy, we recommend that you visit the [Config console](https://console.aws.amazon.com/config/) to verify your custom rule name.
        1. For Security Hub: The format varies for Security Hub control names. For accuracy, we recommend that you reference the list of [supported Security Hub controls](https://docs.aws.amazon.com/audit-manager/latest/userguide/control-data-sources-ash.html).
        1. For Amazon Web Services API calls: Make sure that the `keywordValue` is written as `serviceprefix_ActionName`. For example, `iam_ListGroups`. For accuracy, we recommend that you reference the list of [supported API calls](https://docs.aws.amazon.com/audit-manager/latest/userguide/control-data-sources-api.html).
        1. For CloudTrail: Make sure that the `keywordValue` is written as `serviceprefix_ActionName`. For example, `cloudtrail_StartLogging`. For accuracy, we recommend that you review the Amazon Web Services service prefix and action names in the [Service Authorization Reference](https://docs.aws.amazon.com/service-authorization/latest/reference/reference_policies_actions-resources-contextkeys.html).
    - `source_name`**Type**: `STRING`**Provider name**: `sourceName`**Description**: The name of the source.
    - `source_set_up_option`**Type**: `STRING`**Provider name**: `sourceSetUpOption`**Description**: The setup option for the data source. This option reflects if the evidence collection method is automated or manual. If you don't provide a value for `sourceSetUpOption`, Audit Manager automatically infers and populates the correct value based on the `sourceType` that you specify.
    - `source_type`**Type**: `STRING`**Provider name**: `sourceType`**Description**: Specifies which type of data source is used to collect evidence.
      - The source can be an individual data source type, such as `AWS_Cloudtrail`, `AWS_Config`, `AWS_Security_Hub`, `AWS_API_Call`, or `MANUAL`.
      - The source can also be a managed grouping of data sources, such as a `Core_Control` or a `Common_Control`.
    - `troubleshooting_text`**Type**: `STRING`**Provider name**: `troubleshootingText`**Description**: The instructions for troubleshooting the control.
  - `control_sources`**Type**: `STRING`**Provider name**: `controlSources`**Description**: The data source types that determine where Audit Manager collects evidence from for the control.
  - `created_at`**Type**: `TIMESTAMP`**Provider name**: `createdAt`**Description**: The time when the control was created.
  - `created_by`**Type**: `STRING`**Provider name**: `createdBy`**Description**: The user or role that created the control.
  - `description`**Type**: `STRING`**Provider name**: `description`**Description**: The description of the control.
  - `id`**Type**: `STRING`**Provider name**: `id`**Description**: The unique identifier for the control.
  - `last_updated_at`**Type**: `TIMESTAMP`**Provider name**: `lastUpdatedAt`**Description**: The time when the control was most recently updated.
  - `last_updated_by`**Type**: `STRING`**Provider name**: `lastUpdatedBy`**Description**: The user or role that most recently updated the control.
  - `name`**Type**: `STRING`**Provider name**: `name`**Description**: The name of the control.
  - `state`**Type**: `STRING`**Provider name**: `state`**Description**: The state of the control. The `END_OF_SUPPORT` state is applicable to standard controls only. This state indicates that the standard control can still be used to collect evidence, but Audit Manager is no longer updating or maintaining that control.
  - `testing_information`**Type**: `STRING`**Provider name**: `testingInformation`**Description**: The steps that you should follow to determine if the control has been satisfied.
  - `type`**Type**: `STRING`**Provider name**: `type`**Description**: Specifies whether the control is a standard control or a custom control.
- `id`**Type**: `STRING`**Provider name**: `id`**Description**: The identifier of the control set in the assessment. This is the control set name in a plain string format.
- `name`**Type**: `STRING`**Provider name**: `name`**Description**: The name of the control set.

## `control_sources`{% #control_sources %}

**Type**: `STRING`**Provider name**: `controlSources`**Description**: The control data sources where Audit Manager collects evidence from.

## `created_at`{% #created_at %}

**Type**: `TIMESTAMP`**Provider name**: `createdAt`**Description**: The time when the framework was created.

## `created_by`{% #created_by %}

**Type**: `STRING`**Provider name**: `createdBy`**Description**: The user or role that created the framework.

## `description`{% #description %}

**Type**: `STRING`**Provider name**: `description`**Description**: The description of the framework.

## `id`{% #id %}

**Type**: `STRING`**Provider name**: `id`**Description**: The unique identifier for the framework.

## `last_updated_at`{% #last_updated_at %}

**Type**: `TIMESTAMP`**Provider name**: `lastUpdatedAt`**Description**: The time when the framework was most recently updated.

## `last_updated_by`{% #last_updated_by %}

**Type**: `STRING`**Provider name**: `lastUpdatedBy`**Description**: The user or role that most recently updated the framework.

## `logo`{% #logo %}

**Type**: `STRING`**Provider name**: `logo`**Description**: The logo that's associated with the framework.

## `name`{% #name %}

**Type**: `STRING`**Provider name**: `name`**Description**: The name of the framework.

## `tags`{% #tags %}

**Type**: `UNORDERED_LIST_STRING`

## `type`{% #type %}

**Type**: `STRING`**Provider name**: `type`**Description**: Specifies whether the framework is a standard framework or a custom framework.
