Skip to main content

πŸ§ͺ test-data.json

  • Contextual name: πŸ§ͺ test-data.json
  • ID: /ce/ca/azure/subscription/microsoft-defender-for-key-vault/test-data.json

Used In​

LogicPolicyFlags
🧠 prod.logic.yaml πŸŸ’πŸ“ Azure Subscription Microsoft Defender For Key Vault is not set to On 🟒🟒 x3

Content​

Open File

[
{
"expectedResult": {
"status": "INCOMPLIANT",
"conditionIndex": "199",
"conditionText": "CA10Z1__Azure_SQL_Server_Vulnerability_Assessmnt__r.has(INCOMPLIANT)",
"runtimeError": null
},
"context": {
"snapshotTime": "2024-06-10T19:35:50Z"
},
"Id": "test1",
"CA10Z1__Azure_SQL_Server_Vulnerability_Assessmnt__r": [
{
"Id": "test1_1",
"CA10Z1__disappearanceTime__c": null,
"CA10Z1__pricingTier__c": "Free",
"CA10Z1__name__c": "KeyVaults",
"CA10Z1__subscription__c": "test1"
}
]
},
{
"expectedResult": {
"status": "COMPLIANT",
"conditionIndex": "299",
"conditionText": "CA10Z1__Azure_SQL_Server_Vulnerability_Assessmnt__r.has(COMPLIANT)",
"runtimeError": null
},
"context": {
"snapshotTime": "2024-06-10T19:35:50Z"
},
"Id": "test2",
"CA10Z1__Azure_SQL_Server_Vulnerability_Assessmnt__r": [
{
"Id": "test2_1",
"CA10Z1__disappearanceTime__c": null,
"CA10Z1__pricingTier__c": "Standard",
"CA10Z1__name__c": "KeyVaults",
"CA10Z1__subscription__c": "test2"
}
]
},
{
"expectedResult": {
"status": "INCOMPLIANT",
"conditionIndex": "300",
"conditionText": "otherwise",
"runtimeError": null
},
"context": {
"snapshotTime": "2024-06-10T19:35:50Z"
},
"Id": "test3",
"CA10Z1__Azure_SQL_Server_Vulnerability_Assessmnt__r": []
},
{
"expectedResult": {
"status": "INCOMPLIANT",
"conditionIndex": "300",
"conditionText": "otherwise",
"runtimeError": null
},
"context": {
"snapshotTime": "2024-06-10T19:35:50Z"
},
"Id": "test4",
"CA10Z1__Azure_SQL_Server_Vulnerability_Assessmnt__r": [
{
"Id": "test4_1",
"CA10Z1__disappearanceTime__c": null,
"CA10Z1__pricingTier__c": "Standard",
"CA10Z1__name__c": "VirtualMachines",
"CA10Z1__subscription__c": "test4"
}
]
}
]