Subcomponents of the asset that was exfiltrated, like URIs used during
exfiltration, table names, databases, and filenames. For example, multiple
tables might have been exfiltrated from the same Cloud SQL instance, or
multiple files might have been exfiltrated from the same Cloud Storage
bucket.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThis webpage provides reference documentation for the \u003ccode\u003eExfilResource\u003c/code\u003e class within the Google Cloud Security Command Center v1 API.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eExfilResource\u003c/code\u003e class represents a resource from which data was exfiltrated or to which data was exfiltrated.\u003c/p\u003e\n"],["\u003cp\u003eThe latest version of the \u003ccode\u003eExfilResource\u003c/code\u003e API documentation available is version 3.24.0, but there are older versions of the documentation all the way down to 2.2.0.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eExfilResource\u003c/code\u003e class includes properties such as \u003ccode\u003eComponents\u003c/code\u003e (subcomponents of the exfiltrated asset) and \u003ccode\u003eName\u003c/code\u003e (the full resource name).\u003c/p\u003e\n"],["\u003cp\u003eThis class implements multiple interfaces including \u003ccode\u003eIMessage\u003c/code\u003e, \u003ccode\u003eIEquatable\u003c/code\u003e, \u003ccode\u003eIDeepCloneable\u003c/code\u003e, and \u003ccode\u003eIBufferMessage\u003c/code\u003e, and also inherits from object.\u003c/p\u003e\n"]]],[],null,[]]