--- policy: /ce/ca/oracle/compute/instance-in-transit-encryption logic: /ce/ca/oracle/compute/instance-in-transit-encryption/prod.logic.yaml executionTime: 2026-05-02T12:07:22.850865437Z generationMs: 82 executionMs: 2349 rows: - id: test1 match: true status: expected: INCOMPLIANT actual: INCOMPLIANT conditionIndex: expected: 199 actual: 199 conditionText: expected: extract('CA10O1__bootVolumePvEncryptionInTransit__c') == 'Disabled' actual: extract('CA10O1__bootVolumePvEncryptionInTransit__c') == 'Disabled' runtimeError: {} - id: test2 match: true status: expected: COMPLIANT actual: COMPLIANT conditionIndex: expected: 299 actual: 299 conditionText: expected: extract('CA10O1__bootVolumePvEncryptionInTransit__c') == 'Enabled' actual: extract('CA10O1__bootVolumePvEncryptionInTransit__c') == 'Enabled' runtimeError: {} usedFiles: - path: /ce/ca/oracle/compute/instance-in-transit-encryption/policy.yaml md5Hash: 8BA8457831E1A72668A42774728BD55C content: | --- names: full: "Oracle IAAS Instance in-transit encryption is disabled" contextual: "Instance in-transit encryption is disabled" description: > Ensure that Oracle IAAS Instances use in-transit encryption for their boot volume attachment. In-transit encryption helps protect storage traffic between compute instances and boot volumes from unauthorized interception. type: "COMPLIANCE_POLICY" categories: - "SECURITY" frameworkMappings: - "/frameworks/cis-oracle-v3.1.0/03/03" - "/frameworks/cloudaware/resource-security/data-encryption" - path: /ce/ca/oracle/compute/instance-in-transit-encryption/prod.logic.yaml md5Hash: FEDC96598ED3EDC26591ED0937814512 content: | --- inputType: "CA10O1__CaOracleIaasInstance__c" testData: - file: "test-data.json" importExtracts: - file: "/types/CA10O1__CaOracleIaasInstance__c/object.extracts.yaml" conditions: - status: "INCOMPLIANT" currentStateMessage: "In-transit encryption is disabled for the boot volume attached to this instance." remediationMessage: "Enable in-transit encryption for the instance boot volume attachment." check: IS_EQUAL: left: EXTRACT: "CA10O1__bootVolumePvEncryptionInTransit__c" right: TEXT: "Disabled" - status: "COMPLIANT" currentStateMessage: "In-transit encryption is enabled for the boot volume attached to this instance." check: IS_EQUAL: left: EXTRACT: "CA10O1__bootVolumePvEncryptionInTransit__c" right: TEXT: "Enabled" otherwise: status: "UNDETERMINED" currentStateMessage: "Unexpected value in the boot volume in-transit encryption setting." - path: /ce/ca/oracle/compute/instance-in-transit-encryption/test-data.json md5Hash: 2AA79650B968F26C09FCA4113CA6887E content: | [ { "expectedResult": { "status": "INCOMPLIANT", "conditionIndex": "199", "conditionText": "extract('CA10O1__bootVolumePvEncryptionInTransit__c') == 'Disabled'", "runtimeError": null }, "context": { "snapshotTime": "2026-04-12T00:00:00Z" }, "Id": "test1", "CA10O1__disappearanceTime__c": null, "CA10O1__bootVolumePvEncryptionInTransit__c": "Disabled" }, { "expectedResult": { "status": "COMPLIANT", "conditionIndex": "299", "conditionText": "extract('CA10O1__bootVolumePvEncryptionInTransit__c') == 'Enabled'", "runtimeError": null }, "context": { "snapshotTime": "2026-04-12T00:00:00Z" }, "Id": "test2", "CA10O1__disappearanceTime__c": null, "CA10O1__bootVolumePvEncryptionInTransit__c": "Enabled" } ] - path: /types/CA10O1__CaOracleIaasInstance__c/object.extracts.yaml md5Hash: 0C380BCFB27869AC64860559F80FEA7E content: | --- extracts: - name: "CA10O1__instanceOptionsLegacyImdsEndpoints__c" value: FIELD: path: "CA10O1__instanceOptionsLegacyImdsEndpoints__c" - name: "CA10O1__platformConfigJson__c" value: FIELD: path: "CA10O1__platformConfigJson__c" undeterminedIf: isEmpty: "Instance platform configuration cannot be empty." - name: "caJsonFrom__platformConfigJson__c" value: JSON_FROM: arg: EXTRACT: "CA10O1__platformConfigJson__c" undeterminedIf: isInvalid: "Platform configuration JSON is invalid." isEmpty: "Platform configuration JSON is empty." - name: "CA10O1__bootVolumePvEncryptionInTransit__c" value: FIELD: path: "CA10O1__bootVolumePvEncryptionInTransit__c" undeterminedIf: isEmpty: "The boot volume in-transit encryption option cannot be empty." - name: "CA10O1__sourceDetailsKmsKeyOcid__c" value: FIELD: path: "CA10O1__sourceDetailsKmsKeyOcid__c" script: |- CREATE TEMP FUNCTION mock_ExpectedResult() RETURNS ARRAY >> DETERMINISTIC LANGUAGE js AS r""" return [ { "Id" : "test1", "expectedResult" : { "status" : "INCOMPLIANT", "conditionIndex" : "199", "conditionText" : "extract('CA10O1__bootVolumePvEncryptionInTransit__c') == 'Disabled'", "runtimeError" : null } }, { "Id" : "test2", "expectedResult" : { "status" : "COMPLIANT", "conditionIndex" : "299", "conditionText" : "extract('CA10O1__bootVolumePvEncryptionInTransit__c') == 'Enabled'", "runtimeError" : null } } ]; """; CREATE TEMP FUNCTION mock_CA10O1__CaOracleIaasInstance__c() RETURNS ARRAY >> DETERMINISTIC LANGUAGE js AS r""" return [ { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "CA10O1__bootVolumePvEncryptionInTransit__c" : "Disabled", "Id" : "test1" }, { "context" : { "snapshotTime" : new Date("2026-04-12T00:00:00Z") }, "CA10O1__bootVolumePvEncryptionInTransit__c" : "Enabled", "Id" : "test2" } ]; """; CREATE TEMP FUNCTION process_CA10O1__CaOracleIaasInstance__c( obj STRUCT< CA10O1__disappearanceTime__c TIMESTAMP, CA10O1__bootVolumePvEncryptionInTransit__c STRING, Id STRING >, snapshotTime TIMESTAMP ) RETURNS STRUCT DETERMINISTIC LANGUAGE js AS r""" var TextLib = new function () { this.normalize = function(arg) { return arg == null ? '' : arg.replace(/\s+/g, ' ').trim().toLowerCase(); }; this.isEmpty = function(arg) { return this.normalize(arg) == ''; }; this.isNotEmpty = function(arg) { return this.normalize(arg) != ''; }; this.equal = function(left, right) { return this.normalize(left) == this.normalize(right); }; this.notEqual = function(left, right) { return this.normalize(left) != this.normalize(right); }; this.startsWith = function(arg, substring) { return this.normalize(arg).startsWith(this.normalize(substring)); }; this.endsWith = function(arg, substring) { return this.normalize(arg).endsWith(this.normalize(substring)); }; this.contains = function(arg, substring) { return this.normalize(arg).includes(this.normalize(substring)); }; this.containsAll = function(arg, substrings) { if (substrings == null || substrings.length === 0) return false; let normalizedArg = this.normalize(arg); return substrings.every(sub => normalizedArg.includes(this.normalize(sub))); }; this.containsAny = function(arg, substrings) { if (substrings == null || substrings.length === 0) return false; let normalizedArg = this.normalize(arg); return substrings.some(sub => normalizedArg.includes(this.normalize(sub))); }; }(); var references1 = []; // condition[0], conditionIndex:[0..99] references1.push('Deleted From Oracle [CA10O1__disappearanceTime__c]: ' + obj.CA10O1__disappearanceTime__c); if (obj.CA10O1__disappearanceTime__c != null) { return {status: 'DISAPPEARED', conditionIndex: 99, conditionText: "isDisappeared(CA10O1__disappearanceTime__c)", currentStateMessage: "Object is deleted in the source", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}; } // condition[1], conditionIndex:[100..199] function fieldChecked4() { if (TextLib.isEmpty(obj.CA10O1__bootVolumePvEncryptionInTransit__c)) { throw new Error("UNDETERMINED condition:101", {cause: {status: 'UNDETERMINED', conditionIndex: 101, conditionText: "CA10O1__bootVolumePvEncryptionInTransit__c.isEmpty()", currentStateMessage: "The boot volume in-transit encryption option cannot be empty.", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}}); } return obj.CA10O1__bootVolumePvEncryptionInTransit__c; } function extract3() { if (!this.out) { this.out = fieldChecked4(); } return this.out; }; references1.push('Boot Volume: PV Encryption In Transit [obj.CA10O1__bootVolumePvEncryptionInTransit__c]: ' + obj.CA10O1__bootVolumePvEncryptionInTransit__c); try { if (TextLib.equal(extract3.call(extract3), 'Disabled')) { return {status: 'INCOMPLIANT', conditionIndex: 199, conditionText: "extract('CA10O1__bootVolumePvEncryptionInTransit__c') == 'Disabled'", currentStateMessage: "In-transit encryption is disabled for the boot volume attached to this instance.", currentStateReferences: references1.join('\n'), remediation: "Enable in-transit encryption for the instance boot volume attachment.", runtimeError: null}; } } catch (err) { if (err.cause && err.cause.status) { return err.cause; } else { throw err; } } // condition[2], conditionIndex:[200..299] function fieldChecked7() { if (TextLib.isEmpty(obj.CA10O1__bootVolumePvEncryptionInTransit__c)) { throw new Error("UNDETERMINED condition:201", {cause: {status: 'UNDETERMINED', conditionIndex: 201, conditionText: "CA10O1__bootVolumePvEncryptionInTransit__c.isEmpty()", currentStateMessage: "The boot volume in-transit encryption option cannot be empty.", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}}); } return obj.CA10O1__bootVolumePvEncryptionInTransit__c; } function extract6() { if (!this.out) { this.out = fieldChecked7(); } return this.out; }; try { if (TextLib.equal(extract6.call(extract6), 'Enabled')) { return {status: 'COMPLIANT', conditionIndex: 299, conditionText: "extract('CA10O1__bootVolumePvEncryptionInTransit__c') == 'Enabled'", currentStateMessage: "In-transit encryption is enabled for the boot volume attached to this instance.", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}; } } catch (err) { if (err.cause && err.cause.status) { return err.cause; } else { throw err; } } return {status: 'UNDETERMINED', conditionIndex: 300, conditionText: "otherwise", currentStateMessage: "Unexpected value in the boot volume in-transit encryption setting.", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}; """; SELECT expectedResult.Id as Id, IF ( IFNULL(expectedResult.expectedResult.status, '') = IFNULL(sObject.result.status, '') AND IFNULL(expectedResult.expectedResult.conditionIndex, -1) = IFNULL(sObject.result.conditionIndex, -1) AND IFNULL(expectedResult.expectedResult.conditionText, '') = IFNULL(sObject.result.conditionText, '') AND IFNULL(expectedResult.expectedResult.runtimeError, '') = IFNULL(sObject.result.runtimeError, ''), "MATCH", "FAIL" ) as match, expectedResult.expectedResult.status as expectedStatus, sObject.result.status as actualStatus, expectedResult.expectedResult.conditionIndex as expectedConditionIndex, sObject.result.conditionIndex as actualConditionIndex, expectedResult.expectedResult.conditionText as expectedConditionText, sObject.result.conditionText as actualConditionText, expectedResult.expectedResult.runtimeError as expectedRuntimeError, sObject.result.runtimeError as actualRuntimeError FROM UNNEST(mock_ExpectedResult()) expectedResult LEFT JOIN ( SELECT sObject.CA10O1__disappearanceTime__c AS CA10O1__disappearanceTime__c, sObject.CA10O1__bootVolumePvEncryptionInTransit__c AS CA10O1__bootVolumePvEncryptionInTransit__c, sObject.Id AS Id, process_CA10O1__CaOracleIaasInstance__c( STRUCT( sObject.CA10O1__disappearanceTime__c AS CA10O1__disappearanceTime__c, sObject.CA10O1__bootVolumePvEncryptionInTransit__c AS CA10O1__bootVolumePvEncryptionInTransit__c, sObject.Id AS Id ), sObject.context.snapshotTime ) as result FROM UNNEST(mock_CA10O1__CaOracleIaasInstance__c()) AS sObject ) sObject ON sObject.Id = expectedResult.Id;