--- policy: /ce/ca/oracle/compute/default-security-list-does-not-restrict-all-traffic logic: /ce/ca/oracle/compute/default-security-list-does-not-restrict-all-traffic/prod.logic.yaml executionTime: 2026-05-02T12:07:21.623908283Z generationMs: 59 executionMs: 2433 rows: - id: sec-list-custom-1 match: true status: expected: INAPPLICABLE actual: INAPPLICABLE conditionIndex: expected: 199 actual: 199 conditionText: expected: not(extract('Name').startsWith('Default Security List for ')) actual: not(extract('Name').startsWith('Default Security List for ')) runtimeError: {} - id: sec-list-default-1 match: true status: expected: INCOMPLIANT actual: INCOMPLIANT conditionIndex: expected: 299 actual: 299 conditionText: expected: CA10O1__Oracle_IAAS_Security_List_Rules1__r.has(INCOMPLIANT) actual: CA10O1__Oracle_IAAS_Security_List_Rules1__r.has(INCOMPLIANT) runtimeError: {} - id: sec-list-default-2 match: true status: expected: INCOMPLIANT actual: INCOMPLIANT conditionIndex: expected: 299 actual: 299 conditionText: expected: CA10O1__Oracle_IAAS_Security_List_Rules1__r.has(INCOMPLIANT) actual: CA10O1__Oracle_IAAS_Security_List_Rules1__r.has(INCOMPLIANT) runtimeError: {} - id: sec-list-default-3 match: true status: expected: UNDETERMINED actual: UNDETERMINED conditionIndex: expected: 399 actual: 399 conditionText: expected: CA10O1__Oracle_IAAS_Security_List_Rules1__r.has(UNDETERMINED) actual: CA10O1__Oracle_IAAS_Security_List_Rules1__r.has(UNDETERMINED) runtimeError: {} - id: sec-list-default-4 match: true status: expected: INCOMPLIANT actual: INCOMPLIANT conditionIndex: expected: 299 actual: 299 conditionText: expected: CA10O1__Oracle_IAAS_Security_List_Rules1__r.has(INCOMPLIANT) actual: CA10O1__Oracle_IAAS_Security_List_Rules1__r.has(INCOMPLIANT) runtimeError: {} - id: sec-list-default-5 match: true status: expected: COMPLIANT actual: COMPLIANT conditionIndex: expected: 400 actual: 400 conditionText: expected: otherwise actual: otherwise runtimeError: {} usedFiles: - path: /ce/ca/oracle/compute/default-security-list-does-not-restrict-all-traffic/policy.yaml md5Hash: D26C37C13DE5EABC0E9E2178C2DDF90A content: |- --- names: full: "Oracle IAAS Default Security List allows unrestricted non-ICMP traffic" contextual: "IAAS Default Security List allows unrestricted non-ICMP traffic" description: > Ensure that Oracle IAAS default security lists do not allow non-ICMP traffic from or to the internet. Default security lists should not include ingress rules sourced from 0.0.0.0/0 or egress rules targeting 0.0.0.0/0, except for approved ICMP traffic. type: "COMPLIANCE_POLICY" categories: - "SECURITY" frameworkMappings: - "/frameworks/cis-oracle-v3.1.0/02/05" - "/frameworks/cloudaware/resource-security/network-exposure" similarPolicies: internal: - "dec-x-d3512f61" - path: /ce/ca/oracle/compute/default-security-list-does-not-restrict-all-traffic/prod.logic.yaml md5Hash: 18BCD8CA4E73A2C52D14D5A16EC77FCE content: | --- inputType: "CA10O1__CaOracleIaasSecurityList__c" testData: - file: test-data.json importExtracts: - file: /types/CA10O1__CaOracleIaasSecurityList__c/object.extracts.yaml conditions: - status: "INAPPLICABLE" currentStateMessage: "This is not a default security list." check: NOT: arg: STARTS_WITH: arg: EXTRACT: "Name" search: TEXT: "Default Security List for " - status: "INCOMPLIANT" currentStateMessage: "The default security list allows non-ICMP traffic to or from the internet." remediationMessage: "Remove non-ICMP ingress from 0.0.0.0/0 and non-ICMP egress to 0.0.0.0/0." check: RELATED_LIST_HAS: status: "INCOMPLIANT" relationshipName: "CA10O1__Oracle_IAAS_Security_List_Rules1__r" - status: "UNDETERMINED" currentStateMessage: "The default security list has rules with incomplete data required to evaluate internet access." check: RELATED_LIST_HAS: status: "UNDETERMINED" relationshipName: "CA10O1__Oracle_IAAS_Security_List_Rules1__r" otherwise: status: "COMPLIANT" currentStateMessage: "The default security list does not allow non-ICMP traffic to or from the internet." relatedLists: - relationshipName: "CA10O1__Oracle_IAAS_Security_List_Rules1__r" importExtracts: - file: /types/CA10O1__CaOracleIaasSecurityListRule__c/object.extracts.yaml conditions: - status: "INAPPLICABLE" currentStateMessage: "This is an ICMP rule." check: IS_EQUAL: left: EXTRACT: "CA10O1__protocol__c" right: TEXT: "ICMP" - status: "INCOMPLIANT" currentStateMessage: "This ingress rule allows non-ICMP traffic from 0.0.0.0/0." remediationMessage: "Remove this rule or restrict the source CIDR to approved addresses." check: AND: args: - IS_EQUAL: left: EXTRACT: "CA10O1__direction__c" right: TEXT: "Ingress" - IS_EQUAL: left: EXTRACT: "CA10O1__source__c" right: TEXT: "0.0.0.0/0" - status: "INCOMPLIANT" currentStateMessage: "This egress rule allows non-ICMP traffic to 0.0.0.0/0." remediationMessage: "Remove this rule or restrict the destination CIDR." check: AND: args: - IS_EQUAL: left: EXTRACT: "CA10O1__direction__c" right: TEXT: "Egress" - IS_EQUAL: left: EXTRACT: "CA10O1__destination__c" right: TEXT: "0.0.0.0/0" otherwise: status: "COMPLIANT" currentStateMessage: "This rule does not allow non-ICMP internet access covered by this policy." - path: /ce/ca/oracle/compute/default-security-list-does-not-restrict-all-traffic/test-data.json md5Hash: FD18DAE38AEFF9E37AC7ADE9CC9E237B content: | [ { "expectedResult": { "status": "INAPPLICABLE", "conditionIndex": "199", "conditionText": "not(extract('Name').startsWith('Default Security List for '))", "runtimeError": null }, "context": { "snapshotTime": "2026-04-12T00:00:00Z" }, "Id": "sec-list-custom-1", "Name": "Custom Security List", "CA10O1__disappearanceTime__c": null, "CA10O1__Oracle_IAAS_Virtual_Cloud_Networks__r": [], "CA10O1__Oracle_IAAS_Security_List_Rules1__r": [ { "Id": "rule-0", "CA10O1__disappearanceTime__c": null, "CA10O1__securityList__c": "sec-list-custom-1", "CA10O1__direction__c": "Ingress", "CA10O1__source__c": "0.0.0.0/0", "CA10O1__destination__c": "", "CA10O1__protocol__c": "TCP" } ] }, { "expectedResult": { "status": "INCOMPLIANT", "conditionIndex": "299", "conditionText": "CA10O1__Oracle_IAAS_Security_List_Rules1__r.has(INCOMPLIANT)", "runtimeError": null }, "context": { "snapshotTime": "2026-04-12T00:00:00Z" }, "Id": "sec-list-default-1", "Name": "Default Security List for vcn-1", "CA10O1__disappearanceTime__c": null, "CA10O1__Oracle_IAAS_Virtual_Cloud_Networks__r": [ { "Id": "vcn-1", "CA10O1__disappearanceTime__c": null, "CA10O1__defaultSecurityList__c": "sec-list-default-1" } ], "CA10O1__Oracle_IAAS_Security_List_Rules1__r": [ { "Id": "rule-1", "CA10O1__disappearanceTime__c": null, "CA10O1__securityList__c": "sec-list-default-1", "CA10O1__direction__c": "Ingress", "CA10O1__source__c": "0.0.0.0/0", "CA10O1__destination__c": "", "CA10O1__protocol__c": "TCP" } ] }, { "expectedResult": { "status": "INCOMPLIANT", "conditionIndex": "299", "conditionText": "CA10O1__Oracle_IAAS_Security_List_Rules1__r.has(INCOMPLIANT)", "runtimeError": null }, "context": { "snapshotTime": "2026-04-12T00:00:00Z" }, "Id": "sec-list-default-2", "Name": "Default Security List for vcn-2", "CA10O1__disappearanceTime__c": null, "CA10O1__Oracle_IAAS_Virtual_Cloud_Networks__r": [ { "Id": "vcn-2", "CA10O1__disappearanceTime__c": null, "CA10O1__defaultSecurityList__c": "sec-list-default-2" } ], "CA10O1__Oracle_IAAS_Security_List_Rules1__r": [ { "Id": "rule-2", "CA10O1__disappearanceTime__c": null, "CA10O1__securityList__c": "sec-list-default-2", "CA10O1__direction__c": "Ingress", "CA10O1__source__c": "10.0.0.0/24", "CA10O1__destination__c": "", "CA10O1__protocol__c": "ICMP" }, { "Id": "rule-3", "CA10O1__disappearanceTime__c": null, "CA10O1__securityList__c": "sec-list-default-2", "CA10O1__direction__c": "Egress", "CA10O1__source__c": "", "CA10O1__destination__c": "0.0.0.0/0", "CA10O1__protocol__c": "ALL" } ] }, { "expectedResult": { "status": "UNDETERMINED", "conditionIndex": "399", "conditionText": "CA10O1__Oracle_IAAS_Security_List_Rules1__r.has(UNDETERMINED)", "runtimeError": null }, "context": { "snapshotTime": "2026-04-12T00:00:00Z" }, "Id": "sec-list-default-3", "Name": "Default Security List for vcn-3", "CA10O1__disappearanceTime__c": null, "CA10O1__Oracle_IAAS_Virtual_Cloud_Networks__r": [ { "Id": "vcn-3", "CA10O1__disappearanceTime__c": null, "CA10O1__defaultSecurityList__c": "sec-list-default-3" } ], "CA10O1__Oracle_IAAS_Security_List_Rules1__r": [ { "Id": "rule-4", "CA10O1__disappearanceTime__c": null, "CA10O1__securityList__c": "sec-list-default-3", "CA10O1__direction__c": "Egress", "CA10O1__source__c": "", "CA10O1__destination__c": "", "CA10O1__protocol__c": "" } ] }, { "expectedResult": { "status": "INCOMPLIANT", "conditionIndex": "299", "conditionText": "CA10O1__Oracle_IAAS_Security_List_Rules1__r.has(INCOMPLIANT)", "runtimeError": null }, "context": { "snapshotTime": "2026-04-12T00:00:00Z" }, "Id": "sec-list-default-4", "Name": "Default Security List for vcn-4", "CA10O1__disappearanceTime__c": null, "CA10O1__Oracle_IAAS_Virtual_Cloud_Networks__r": [ { "Id": "vcn-4", "CA10O1__disappearanceTime__c": null, "CA10O1__defaultSecurityList__c": "sec-list-default-4" } ], "CA10O1__Oracle_IAAS_Security_List_Rules1__r": [ { "Id": "rule-5", "CA10O1__disappearanceTime__c": null, "CA10O1__securityList__c": "sec-list-default-4", "CA10O1__direction__c": "Ingress", "CA10O1__source__c": "10.0.0.0/24", "CA10O1__destination__c": "", "CA10O1__protocol__c": "TCP" }, { "Id": "rule-6", "CA10O1__disappearanceTime__c": null, "CA10O1__securityList__c": "sec-list-default-4", "CA10O1__direction__c": "Egress", "CA10O1__source__c": "", "CA10O1__destination__c": "0.0.0.0/0", "CA10O1__protocol__c": "TCP" } ] }, { "expectedResult": { "status": "COMPLIANT", "conditionIndex": "400", "conditionText": "otherwise", "runtimeError": null }, "context": { "snapshotTime": "2026-04-12T00:00:00Z" }, "Id": "sec-list-default-5", "Name": "Default Security List for vcn-5", "CA10O1__disappearanceTime__c": null, "CA10O1__Oracle_IAAS_Virtual_Cloud_Networks__r": [ { "Id": "vcn-5", "CA10O1__disappearanceTime__c": null, "CA10O1__defaultSecurityList__c": "sec-list-default-5" } ], "CA10O1__Oracle_IAAS_Security_List_Rules1__r": [ { "Id": "rule-7", "CA10O1__disappearanceTime__c": null, "CA10O1__securityList__c": "sec-list-default-5", "CA10O1__direction__c": "Ingress", "CA10O1__source__c": "0.0.0.0/0", "CA10O1__destination__c": "", "CA10O1__protocol__c": "ICMP" }, { "Id": "rule-8", "CA10O1__disappearanceTime__c": null, "CA10O1__securityList__c": "sec-list-default-5", "CA10O1__direction__c": "Egress", "CA10O1__source__c": "", "CA10O1__destination__c": "0.0.0.0/0", "CA10O1__protocol__c": "ICMP" } ] } ] - path: /types/CA10O1__CaOracleIaasSecurityList__c/object.extracts.yaml md5Hash: 0F4DFEF55C38BF80C91B032738EC4801 content: | --- extracts: - name: "Name" value: FIELD: path: "Name" undeterminedIf: isEmpty: "The security list name is not available." - path: /types/CA10O1__CaOracleIaasSecurityListRule__c/object.extracts.yaml md5Hash: F2549B6EBE1B78E0D2D7892372FD075A content: | --- extracts: - name: "CA10O1__direction__c" value: FIELD: path: "CA10O1__direction__c" undeterminedIf: isEmpty: "The security list rule direction is not available." - name: "CA10O1__source__c" value: FIELD: path: "CA10O1__source__c" - name: "CA10O1__destination__c" value: FIELD: path: "CA10O1__destination__c" - name: "CA10O1__protocol__c" value: FIELD: path: "CA10O1__protocol__c" undeterminedIf: isEmpty: "The security list rule protocol is not available." - name: "CA10O1__destinationPortMin__c" value: FIELD: path: "CA10O1__destinationPortMin__c" - name: "CA10O1__destinationPortMax__c" value: FIELD: path: "CA10O1__destinationPortMax__c" script: |- CREATE TEMP FUNCTION mock_ExpectedResult() RETURNS ARRAY >> DETERMINISTIC LANGUAGE js AS r""" return [ { "Id" : "sec-list-custom-1", "expectedResult" : { "status" : "INAPPLICABLE", "conditionIndex" : "199", "conditionText" : "not(extract('Name').startsWith('Default Security List for '))", "runtimeError" : null } }, { "Id" : "sec-list-default-1", "expectedResult" : { "status" : "INCOMPLIANT", "conditionIndex" : "299", "conditionText" : "CA10O1__Oracle_IAAS_Security_List_Rules1__r.has(INCOMPLIANT)", "runtimeError" : null } }, { "Id" : "sec-list-default-2", "expectedResult" : { "status" : "INCOMPLIANT", "conditionIndex" : "299", "conditionText" : "CA10O1__Oracle_IAAS_Security_List_Rules1__r.has(INCOMPLIANT)", "runtimeError" : null } }, { "Id" : "sec-list-default-3", "expectedResult" : { "status" : "UNDETERMINED", "conditionIndex" : "399", "conditionText" : "CA10O1__Oracle_IAAS_Security_List_Rules1__r.has(UNDETERMINED)", "runtimeError" : null } }, { "Id" : "sec-list-default-4", "expectedResult" : { "status" : "INCOMPLIANT", "conditionIndex" : "299", "conditionText" : "CA10O1__Oracle_IAAS_Security_List_Rules1__r.has(INCOMPLIANT)", "runtimeError" : null } }, { "Id" : "sec-list-default-5", "expectedResult" : { "status" : "COMPLIANT", "conditionIndex" : "400", "conditionText" : "otherwise", "runtimeError" : null } } ]; """; CREATE TEMP FUNCTION mock_CA10O1__CaOracleIaasSecurityList__c() RETURNS ARRAY >> DETERMINISTIC LANGUAGE js AS r""" return [ { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "Name" : "Custom Security List", "Id" : "sec-list-custom-1" }, { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "Name" : "Default Security List for vcn-1", "Id" : "sec-list-default-1" }, { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "Name" : "Default Security List for vcn-2", "Id" : "sec-list-default-2" }, { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "Name" : "Default Security List for vcn-3", "Id" : "sec-list-default-3" }, { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "Name" : "Default Security List for vcn-4", "Id" : "sec-list-default-4" }, { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "Name" : "Default Security List for vcn-5", "Id" : "sec-list-default-5" } ]; """; CREATE TEMP FUNCTION mock_CA10O1__CaOracleIaasSecurityListRule__c() RETURNS ARRAY >> DETERMINISTIC LANGUAGE js AS r""" return [ { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "CA10O1__protocol__c" : "TCP", "CA10O1__direction__c" : "Ingress", "CA10O1__source__c" : "0.0.0.0/0", "CA10O1__destination__c" : "", "CA10O1__securityList__c" : "sec-list-custom-1", "Id" : "rule-0" }, { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "CA10O1__protocol__c" : "TCP", "CA10O1__direction__c" : "Ingress", "CA10O1__source__c" : "0.0.0.0/0", "CA10O1__destination__c" : "", "CA10O1__securityList__c" : "sec-list-default-1", "Id" : "rule-1" }, { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "CA10O1__protocol__c" : "ICMP", "CA10O1__direction__c" : "Ingress", "CA10O1__source__c" : "10.0.0.0/24", "CA10O1__destination__c" : "", "CA10O1__securityList__c" : "sec-list-default-2", "Id" : "rule-2" }, { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "CA10O1__protocol__c" : "ALL", "CA10O1__direction__c" : "Egress", "CA10O1__source__c" : "", "CA10O1__destination__c" : "0.0.0.0/0", "CA10O1__securityList__c" : "sec-list-default-2", "Id" : "rule-3" }, { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "CA10O1__protocol__c" : "", "CA10O1__direction__c" : "Egress", "CA10O1__source__c" : "", "CA10O1__destination__c" : "", "CA10O1__securityList__c" : "sec-list-default-3", "Id" : "rule-4" }, { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "CA10O1__protocol__c" : "TCP", "CA10O1__direction__c" : "Ingress", "CA10O1__source__c" : "10.0.0.0/24", "CA10O1__destination__c" : "", "CA10O1__securityList__c" : "sec-list-default-4", "Id" : "rule-5" }, { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "CA10O1__protocol__c" : "TCP", "CA10O1__direction__c" : "Egress", "CA10O1__source__c" : "", "CA10O1__destination__c" : "0.0.0.0/0", "CA10O1__securityList__c" : "sec-list-default-4", "Id" : "rule-6" }, { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "CA10O1__protocol__c" : "ICMP", "CA10O1__direction__c" : "Ingress", "CA10O1__source__c" : "0.0.0.0/0", "CA10O1__destination__c" : "", "CA10O1__securityList__c" : "sec-list-default-5", "Id" : "rule-7" }, { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "CA10O1__protocol__c" : "ICMP", "CA10O1__direction__c" : "Egress", "CA10O1__source__c" : "", "CA10O1__destination__c" : "0.0.0.0/0", "CA10O1__securityList__c" : "sec-list-default-5", "Id" : "rule-8" } ]; """; CREATE TEMP FUNCTION process_CA10O1__CaOracleIaasSecurityList__c( obj STRUCT< CA10O1__disappearanceTime__c TIMESTAMP, Name STRING, Id STRING, CA10O1__Oracle_IAAS_Security_List_Rules1__r ARRAY >> >, snapshotTime TIMESTAMP ) RETURNS STRUCT DETERMINISTIC LANGUAGE js AS r""" var TextLib = new function () { this.normalize = function(arg) { return arg == null ? '' : arg.replace(/\s+/g, ' ').trim().toLowerCase(); }; this.isEmpty = function(arg) { return this.normalize(arg) == ''; }; this.isNotEmpty = function(arg) { return this.normalize(arg) != ''; }; this.equal = function(left, right) { return this.normalize(left) == this.normalize(right); }; this.notEqual = function(left, right) { return this.normalize(left) != this.normalize(right); }; this.startsWith = function(arg, substring) { return this.normalize(arg).startsWith(this.normalize(substring)); }; this.endsWith = function(arg, substring) { return this.normalize(arg).endsWith(this.normalize(substring)); }; this.contains = function(arg, substring) { return this.normalize(arg).includes(this.normalize(substring)); }; this.containsAll = function(arg, substrings) { if (substrings == null || substrings.length === 0) return false; let normalizedArg = this.normalize(arg); return substrings.every(sub => normalizedArg.includes(this.normalize(sub))); }; this.containsAny = function(arg, substrings) { if (substrings == null || substrings.length === 0) return false; let normalizedArg = this.normalize(arg); return substrings.some(sub => normalizedArg.includes(this.normalize(sub))); }; }(); var references1 = []; // condition[0], conditionIndex:[0..99] references1.push('Deleted From Oracle [CA10O1__disappearanceTime__c]: ' + obj.CA10O1__disappearanceTime__c); if (obj.CA10O1__disappearanceTime__c != null) { return {status: 'DISAPPEARED', conditionIndex: 99, conditionText: "isDisappeared(CA10O1__disappearanceTime__c)", currentStateMessage: "Object is deleted in the source", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}; } // condition[1], conditionIndex:[100..199] function fieldChecked4() { if (TextLib.isEmpty(obj.Name)) { throw new Error("UNDETERMINED condition:101", {cause: {status: 'UNDETERMINED', conditionIndex: 101, conditionText: "Name.isEmpty()", currentStateMessage: "The security list name is not available.", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}}); } return obj.Name; } function extract3() { if (!this.out) { this.out = fieldChecked4(); } return this.out; }; references1.push('Name [obj.Name]: ' + obj.Name); try { if (!TextLib.startsWith(extract3.call(extract3), 'Default Security List for ')) { return {status: 'INAPPLICABLE', conditionIndex: 199, conditionText: "not(extract('Name').startsWith('Default Security List for '))", currentStateMessage: "This is not a default security list.", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}; } } catch (err) { if (err.cause && err.cause.status) { return err.cause; } else { throw err; } } var count_CA10O1__Oracle_IAAS_Security_List_Rules1__r_INCOMPLIANT5 = 0; if (obj.CA10O1__Oracle_IAAS_Security_List_Rules1__r != null) { for (var i6 = 0; i6 < obj.CA10O1__Oracle_IAAS_Security_List_Rules1__r.length; i6++) { if (typeof(obj.CA10O1__Oracle_IAAS_Security_List_Rules1__r[i6].status) !== 'undefined') { if (obj.CA10O1__Oracle_IAAS_Security_List_Rules1__r[i6].status == 'INCOMPLIANT') { count_CA10O1__Oracle_IAAS_Security_List_Rules1__r_INCOMPLIANT5 += obj.CA10O1__Oracle_IAAS_Security_List_Rules1__r[i6].count; } } else { if (obj.CA10O1__Oracle_IAAS_Security_List_Rules1__r[i6].result.status == 'INCOMPLIANT') { count_CA10O1__Oracle_IAAS_Security_List_Rules1__r_INCOMPLIANT5 += 1; } } } } // condition[2], conditionIndex:[200..299] references1.push('Related list [CA10O1__Oracle_IAAS_Security_List_Rules1__r] ' + (count_CA10O1__Oracle_IAAS_Security_List_Rules1__r_INCOMPLIANT5 > 0 ? 'has' : 'does not have') + ' objects in INCOMPLIANT status'); if (count_CA10O1__Oracle_IAAS_Security_List_Rules1__r_INCOMPLIANT5 > 0) { return {status: 'INCOMPLIANT', conditionIndex: 299, conditionText: "CA10O1__Oracle_IAAS_Security_List_Rules1__r.has(INCOMPLIANT)", currentStateMessage: "The default security list allows non-ICMP traffic to or from the internet.", currentStateReferences: references1.join('\n'), remediation: "Remove non-ICMP ingress from 0.0.0.0/0 and non-ICMP egress to 0.0.0.0/0.", runtimeError: null}; } var count_CA10O1__Oracle_IAAS_Security_List_Rules1__r_UNDETERMINED7 = 0; if (obj.CA10O1__Oracle_IAAS_Security_List_Rules1__r != null) { for (var i8 = 0; i8 < obj.CA10O1__Oracle_IAAS_Security_List_Rules1__r.length; i8++) { if (typeof(obj.CA10O1__Oracle_IAAS_Security_List_Rules1__r[i8].status) !== 'undefined') { if (obj.CA10O1__Oracle_IAAS_Security_List_Rules1__r[i8].status == 'UNDETERMINED') { count_CA10O1__Oracle_IAAS_Security_List_Rules1__r_UNDETERMINED7 += obj.CA10O1__Oracle_IAAS_Security_List_Rules1__r[i8].count; } } else { if (obj.CA10O1__Oracle_IAAS_Security_List_Rules1__r[i8].result.status == 'UNDETERMINED') { count_CA10O1__Oracle_IAAS_Security_List_Rules1__r_UNDETERMINED7 += 1; } } } } // condition[3], conditionIndex:[300..399] if (count_CA10O1__Oracle_IAAS_Security_List_Rules1__r_UNDETERMINED7 > 0) { return {status: 'UNDETERMINED', conditionIndex: 399, conditionText: "CA10O1__Oracle_IAAS_Security_List_Rules1__r.has(UNDETERMINED)", currentStateMessage: "The default security list has rules with incomplete data required to evaluate internet access.", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}; } return {status: 'COMPLIANT', conditionIndex: 400, conditionText: "otherwise", currentStateMessage: "The default security list does not allow non-ICMP traffic to or from the internet.", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}; """; CREATE TEMP FUNCTION process_CA10O1__Oracle_IAAS_Security_List_Rules1__r( obj STRUCT< CA10O1__disappearanceTime__c TIMESTAMP, CA10O1__protocol__c STRING, CA10O1__direction__c STRING, CA10O1__source__c STRING, CA10O1__destination__c STRING, CA10O1__securityList__c STRING, Id STRING >, snapshotTime TIMESTAMP ) RETURNS STRUCT DETERMINISTIC LANGUAGE js AS r""" var TextLib = new function () { this.normalize = function(arg) { return arg == null ? '' : arg.replace(/\s+/g, ' ').trim().toLowerCase(); }; this.isEmpty = function(arg) { return this.normalize(arg) == ''; }; this.isNotEmpty = function(arg) { return this.normalize(arg) != ''; }; this.equal = function(left, right) { return this.normalize(left) == this.normalize(right); }; this.notEqual = function(left, right) { return this.normalize(left) != this.normalize(right); }; this.startsWith = function(arg, substring) { return this.normalize(arg).startsWith(this.normalize(substring)); }; this.endsWith = function(arg, substring) { return this.normalize(arg).endsWith(this.normalize(substring)); }; this.contains = function(arg, substring) { return this.normalize(arg).includes(this.normalize(substring)); }; this.containsAll = function(arg, substrings) { if (substrings == null || substrings.length === 0) return false; let normalizedArg = this.normalize(arg); return substrings.every(sub => normalizedArg.includes(this.normalize(sub))); }; this.containsAny = function(arg, substrings) { if (substrings == null || substrings.length === 0) return false; let normalizedArg = this.normalize(arg); return substrings.some(sub => normalizedArg.includes(this.normalize(sub))); }; }(); var references1 = []; // condition[0], conditionIndex:[0..99] references1.push('Deleted From Oracle [CA10O1__disappearanceTime__c]: ' + obj.CA10O1__disappearanceTime__c); if (obj.CA10O1__disappearanceTime__c != null) { return {status: 'DISAPPEARED', conditionIndex: 99, conditionText: "isDisappeared(CA10O1__disappearanceTime__c)", currentStateMessage: "Object is deleted in the source", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}; } // condition[1], conditionIndex:[100..199] function fieldChecked4() { if (TextLib.isEmpty(obj.CA10O1__protocol__c)) { throw new Error("UNDETERMINED condition:101", {cause: {status: 'UNDETERMINED', conditionIndex: 101, conditionText: "CA10O1__protocol__c.isEmpty()", currentStateMessage: "The security list rule protocol is not available.", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}}); } return obj.CA10O1__protocol__c; } function extract3() { if (!this.out) { this.out = fieldChecked4(); } return this.out; }; references1.push('Protocol [obj.CA10O1__protocol__c]: ' + obj.CA10O1__protocol__c); try { if (TextLib.equal(extract3.call(extract3), 'ICMP')) { return {status: 'INAPPLICABLE', conditionIndex: 199, conditionText: "extract('CA10O1__protocol__c') == 'ICMP'", currentStateMessage: "This is an ICMP rule.", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}; } } catch (err) { if (err.cause && err.cause.status) { return err.cause; } else { throw err; } } // condition[2], conditionIndex:[200..299] function fieldChecked7() { if (TextLib.isEmpty(obj.CA10O1__direction__c)) { throw new Error("UNDETERMINED condition:201", {cause: {status: 'UNDETERMINED', conditionIndex: 201, conditionText: "CA10O1__direction__c.isEmpty()", currentStateMessage: "The security list rule direction is not available.", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}}); } return obj.CA10O1__direction__c; } function extract6() { if (!this.out) { this.out = fieldChecked7(); } return this.out; }; function extract9() { if (!this.out) { this.out = obj.CA10O1__source__c; } return this.out; }; references1.push('Direction [obj.CA10O1__direction__c]: ' + obj.CA10O1__direction__c); references1.push('Source [obj.CA10O1__source__c]: ' + obj.CA10O1__source__c); try { if (TextLib.equal(extract6.call(extract6), 'Ingress') && TextLib.equal(extract9.call(extract9), '0.0.0.0/0')) { return {status: 'INCOMPLIANT', conditionIndex: 299, conditionText: "extract('CA10O1__direction__c') == 'Ingress' && extract('CA10O1__source__c') == '0.0.0.0/0'", currentStateMessage: "This ingress rule allows non-ICMP traffic from 0.0.0.0/0.", currentStateReferences: references1.join('\n'), remediation: "Remove this rule or restrict the source CIDR to approved addresses.", runtimeError: null}; } } catch (err) { if (err.cause && err.cause.status) { return err.cause; } else { throw err; } } // condition[3], conditionIndex:[300..399] function fieldChecked13() { if (TextLib.isEmpty(obj.CA10O1__direction__c)) { throw new Error("UNDETERMINED condition:301", {cause: {status: 'UNDETERMINED', conditionIndex: 301, conditionText: "CA10O1__direction__c.isEmpty()", currentStateMessage: "The security list rule direction is not available.", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}}); } return obj.CA10O1__direction__c; } function extract12() { if (!this.out) { this.out = fieldChecked13(); } return this.out; }; function extract15() { if (!this.out) { this.out = obj.CA10O1__destination__c; } return this.out; }; references1.push('Destination [obj.CA10O1__destination__c]: ' + obj.CA10O1__destination__c); try { if (TextLib.equal(extract12.call(extract12), 'Egress') && TextLib.equal(extract15.call(extract15), '0.0.0.0/0')) { return {status: 'INCOMPLIANT', conditionIndex: 399, conditionText: "extract('CA10O1__direction__c') == 'Egress' && extract('CA10O1__destination__c') == '0.0.0.0/0'", currentStateMessage: "This egress rule allows non-ICMP traffic to 0.0.0.0/0.", currentStateReferences: references1.join('\n'), remediation: "Remove this rule or restrict the destination CIDR.", runtimeError: null}; } } catch (err) { if (err.cause && err.cause.status) { return err.cause; } else { throw err; } } return {status: 'COMPLIANT', conditionIndex: 400, conditionText: "otherwise", currentStateMessage: "This rule does not allow non-ICMP internet access covered by this policy.", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}; """; SELECT expectedResult.Id as Id, IF ( IFNULL(expectedResult.expectedResult.status, '') = IFNULL(sObject.result.status, '') AND IFNULL(expectedResult.expectedResult.conditionIndex, -1) = IFNULL(sObject.result.conditionIndex, -1) AND IFNULL(expectedResult.expectedResult.conditionText, '') = IFNULL(sObject.result.conditionText, '') AND IFNULL(expectedResult.expectedResult.runtimeError, '') = IFNULL(sObject.result.runtimeError, ''), "MATCH", "FAIL" ) as match, expectedResult.expectedResult.status as expectedStatus, sObject.result.status as actualStatus, expectedResult.expectedResult.conditionIndex as expectedConditionIndex, sObject.result.conditionIndex as actualConditionIndex, expectedResult.expectedResult.conditionText as expectedConditionText, sObject.result.conditionText as actualConditionText, expectedResult.expectedResult.runtimeError as expectedRuntimeError, sObject.result.runtimeError as actualRuntimeError FROM UNNEST(mock_ExpectedResult()) expectedResult LEFT JOIN ( SELECT sObject.CA10O1__disappearanceTime__c AS CA10O1__disappearanceTime__c, sObject.Name AS Name, sObject.Id AS Id, `CA10O1__Oracle_IAAS_Security_List_Rules1__r`.arr AS CA10O1__Oracle_IAAS_Security_List_Rules1__r, process_CA10O1__CaOracleIaasSecurityList__c( STRUCT( sObject.CA10O1__disappearanceTime__c AS CA10O1__disappearanceTime__c, sObject.Name AS Name, sObject.Id AS Id, `CA10O1__Oracle_IAAS_Security_List_Rules1__r`.arr AS CA10O1__Oracle_IAAS_Security_List_Rules1__r ), sObject.context.snapshotTime ) as result FROM UNNEST(mock_CA10O1__CaOracleIaasSecurityList__c()) AS sObject LEFT JOIN ( SELECT sObject.CA10O1__securityList__c, ARRAY_AGG( STRUCT( sObject.CA10O1__disappearanceTime__c AS CA10O1__disappearanceTime__c, sObject.CA10O1__protocol__c AS CA10O1__protocol__c, sObject.CA10O1__direction__c AS CA10O1__direction__c, sObject.CA10O1__source__c AS CA10O1__source__c, sObject.CA10O1__destination__c AS CA10O1__destination__c, sObject.CA10O1__securityList__c AS CA10O1__securityList__c, sObject.Id AS Id, process_CA10O1__Oracle_IAAS_Security_List_Rules1__r( STRUCT( sObject.CA10O1__disappearanceTime__c AS CA10O1__disappearanceTime__c, sObject.CA10O1__protocol__c AS CA10O1__protocol__c, sObject.CA10O1__direction__c AS CA10O1__direction__c, sObject.CA10O1__source__c AS CA10O1__source__c, sObject.CA10O1__destination__c AS CA10O1__destination__c, sObject.CA10O1__securityList__c AS CA10O1__securityList__c, sObject.Id AS Id ), sObject.context.snapshotTime ) as result ) ) AS arr FROM UNNEST(mock_CA10O1__CaOracleIaasSecurityListRule__c()) AS sObject GROUP BY sObject.CA10O1__securityList__c ) AS `CA10O1__Oracle_IAAS_Security_List_Rules1__r` ON sObject.Id = `CA10O1__Oracle_IAAS_Security_List_Rules1__r`.CA10O1__securityList__c ) sObject ON sObject.Id = expectedResult.Id;