[
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775674049,
      "created_time_dt": "2026-04-08T18:47:29Z",
      "desc": "Compliance test scenario: Service accepts TLS 1.3 encrypted traffic",
      "title": "Service accepts TLS 1.3 encrypted traffic",
      "types": [],
      "uid": "ccc-test-103-1775674049"
    },
    "message": "Service accepts TLS 1.3 encrypted traffic",
    "metadata": {
      "event_code": "Service accepts TLS 1.3 encrypted traffic",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@CCC.Core",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core.CN01",
        "@Behavioural",
        "@PerPort",
        "@tls",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": "https service on stgcfi20260408t173437z.blob.core.windows.net:443",
          "metadata": {
            "findings": [],
            "name": "stgcfi20260408t173437z.blob.core.windows.net",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "stgcfi20260408t173437z.blob.core.windows.net",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ an openssl s_client request using \"tls1_3\" to \"{portNumber}\" on \"{hostName}\" protocol \"{protocol}\"\n✓ I refer to \"{result}\" as \"connection\"\n✓ \"{connection}\" state is open\n✓ \"{connection.State}\" is \"open\"\n✓ I close connection \"{connection}\"\n✓ \"{connection}\" state is closed",
    "status_id": 1,
    "time": 1775674049,
    "time_dt": "2026-04-08T18:47:29Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775674049,
      "created_time_dt": "2026-04-08T18:47:29Z",
      "desc": "Compliance test scenario: Service rejects TLS 1.2 traffic",
      "title": "Service rejects TLS 1.2 traffic",
      "types": [],
      "uid": "ccc-test-109-1775674049"
    },
    "message": "Service rejects TLS 1.2 traffic",
    "metadata": {
      "event_code": "Service rejects TLS 1.2 traffic",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@CCC.Core",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core.CN01",
        "@Behavioural",
        "@PerPort",
        "@tls",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": "https service on stgcfi20260408t173437z.blob.core.windows.net:443",
          "metadata": {
            "findings": [],
            "name": "stgcfi20260408t173437z.blob.core.windows.net",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "stgcfi20260408t173437z.blob.core.windows.net",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ an openssl s_client request using \"tls1_2\" to \"{portNumber}\" on \"{hostName}\" protocol \"{protocol}\"\n✓ I refer to \"{result}\" as \"connection\"\n✓ we wait for a period of \"40\" ms\n✓ \"{connection.State}\" is \"closed\"",
    "status_id": 1,
    "time": 1775674049,
    "time_dt": "2026-04-08T18:47:29Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775674049,
      "created_time_dt": "2026-04-08T18:47:29Z",
      "desc": "Compliance test scenario: Service rejects TLS 1.1 traffic",
      "title": "Service rejects TLS 1.1 traffic",
      "types": [],
      "uid": "ccc-test-115-1775674049"
    },
    "message": "Service rejects TLS 1.1 traffic",
    "metadata": {
      "event_code": "Service rejects TLS 1.1 traffic",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@CCC.Core",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core.CN01",
        "@Behavioural",
        "@PerPort",
        "@tls",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": "https service on stgcfi20260408t173437z.blob.core.windows.net:443",
          "metadata": {
            "findings": [],
            "name": "stgcfi20260408t173437z.blob.core.windows.net",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "stgcfi20260408t173437z.blob.core.windows.net",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ an openssl s_client request using \"tls1_1\" to \"{portNumber}\" on \"{hostName}\" protocol \"{protocol}\"\n✓ I refer to \"{result}\" as \"connection\"\n✓ we wait for a period of \"40\" ms\n✓ \"{connection.State}\" is \"closed\"",
    "status_id": 1,
    "time": 1775674049,
    "time_dt": "2026-04-08T18:47:29Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775674049,
      "created_time_dt": "2026-04-08T18:47:29Z",
      "desc": "Compliance test scenario: Service rejects TLS 1.0 traffic",
      "title": "Service rejects TLS 1.0 traffic",
      "types": [],
      "uid": "ccc-test-121-1775674049"
    },
    "message": "Service rejects TLS 1.0 traffic",
    "metadata": {
      "event_code": "Service rejects TLS 1.0 traffic",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@CCC.Core",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core.CN01",
        "@Behavioural",
        "@PerPort",
        "@tls",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": "https service on stgcfi20260408t173437z.blob.core.windows.net:443",
          "metadata": {
            "findings": [],
            "name": "stgcfi20260408t173437z.blob.core.windows.net",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "stgcfi20260408t173437z.blob.core.windows.net",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ an openssl s_client request using \"tls1\" to \"{portNumber}\" on \"{hostName}\" protocol \"{protocol}\"\n✓ I refer to \"{result}\" as \"connection\"\n✓ we wait for a period of \"40\" ms\n✓ \"{connection.State}\" is \"closed\"",
    "status_id": 1,
    "time": 1775674049,
    "time_dt": "2026-04-08T18:47:29Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775674049,
      "created_time_dt": "2026-04-08T18:47:29Z",
      "desc": "Compliance test scenario: Verify SSL/TLS protocol support",
      "title": "Verify SSL/TLS protocol support",
      "types": [],
      "uid": "ccc-test-126-1775674049"
    },
    "message": "Verify SSL/TLS protocol support",
    "metadata": {
      "event_code": "Verify SSL/TLS protocol support",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@CCC.Core",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core.CN01",
        "@Behavioural",
        "@PerPort",
        "@tls",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": "https service on stgcfi20260408t173437z.blob.core.windows.net:443",
          "metadata": {
            "findings": [],
            "name": "stgcfi20260408t173437z.blob.core.windows.net",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "stgcfi20260408t173437z.blob.core.windows.net",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ \"report\" contains details of SSL Support type \"protocols\" for \"{hostName}\" on port \"{portNumber}\"\n✗ \"{report}\" is an array of objects which doesn't contain any of - Error: unwanted row found in array: map[finding:offered id:TLS1_2]\n⊘ \"{report}\" is an array of objects with at least the following contents (skipped)",
    "status_id": 1,
    "time": 1775674049,
    "time_dt": "2026-04-08T18:47:29Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775674055,
      "created_time_dt": "2026-04-08T18:47:35Z",
      "desc": "Compliance test scenario: Verify no known SSL/TLS vulnerabilities",
      "title": "Verify no known SSL/TLS vulnerabilities",
      "types": [],
      "uid": "ccc-test-130-1775674055"
    },
    "message": "Verify no known SSL/TLS vulnerabilities",
    "metadata": {
      "event_code": "Verify no known SSL/TLS vulnerabilities",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@CCC.Core",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core.CN01",
        "@Behavioural",
        "@PerPort",
        "@tls",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": "https service on stgcfi20260408t173437z.blob.core.windows.net:443",
          "metadata": {
            "findings": [],
            "name": "stgcfi20260408t173437z.blob.core.windows.net",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "stgcfi20260408t173437z.blob.core.windows.net",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ \"report\" contains details of SSL Support type \"vulnerable\" for \"{hostName}\" on port \"{portNumber}\"\n✓ \"{report}\" is an array of objects with at least the following contents",
    "status_id": 1,
    "time": 1775674055,
    "time_dt": "2026-04-08T18:47:35Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775674082,
      "created_time_dt": "2026-04-08T18:48:02Z",
      "desc": "Compliance test scenario: Verify TLS 1.3 only certificate validity",
      "title": "Verify TLS 1.3 only certificate validity",
      "types": [],
      "uid": "ccc-test-134-1775674082"
    },
    "message": "Verify TLS 1.3 only certificate validity",
    "metadata": {
      "event_code": "Verify TLS 1.3 only certificate validity",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@CCC.Core",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core.CN01",
        "@Behavioural",
        "@PerPort",
        "@tls",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": "https service on stgcfi20260408t173437z.blob.core.windows.net:443",
          "metadata": {
            "findings": [],
            "name": "stgcfi20260408t173437z.blob.core.windows.net",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "stgcfi20260408t173437z.blob.core.windows.net",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ \"report\" contains details of SSL Support type \"server-defaults\" for \"{hostName}\" on port \"{portNumber}\"\n✓ \"{report}\" is an array of objects with at least the following contents",
    "status_id": 1,
    "time": 1775674082,
    "time_dt": "2026-04-08T18:48:02Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775674095,
      "created_time_dt": "2026-04-08T18:48:15Z",
      "desc": "Compliance test scenario: HTTP redirects to HTTPS",
      "title": "HTTP redirects to HTTPS",
      "types": [],
      "uid": "ccc-test-275-1775674095"
    },
    "message": "HTTP redirects to HTTPS",
    "metadata": {
      "event_code": "HTTP redirects to HTTPS",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core",
        "@CCC.Core.CN01",
        "@PerPort",
        "@Behavioural",
        "@http",
        "@tls",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": "https service on stgcfi20260408t173437z.blob.core.windows.net:443",
          "metadata": {
            "findings": [],
            "name": "stgcfi20260408t173437z.blob.core.windows.net",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "stgcfi20260408t173437z.blob.core.windows.net",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a client connects to \"{hostName}\" with protocol \"http\" on port \"80\"\n✓ I refer to \"{result}\" as \"connection\"\n✓ \"{connection}\" is not an error\n✓ I transmit \"GET / HTTP/1.1\\r\\nHost: {hostName}\\r\\n\\r\\n\" to \"{connection}\"\n✓ I attach \"{connection}\" to the test output as \"HTTP response\"\n✗ \"{connection.Output}\" contains \"301\" - Error: expected {connection.Output} to contain '301', but got 'HTTP/1.1 400 The account being accessed does not support http.\r\nContent-Length: 287\r\nContent-Type: application/xml\r\nServer: Microsoft-HTTPAPI/2.0\r\nx-ms-request-id: c637e05c-901e-0000-1288-c790fb000000\r\nDate: Wed, 08 Apr 2026 18:48:15 GMT\r\n\r\n﻿\u003c?xml version=\"1.0\" encoding=\"utf-8\"?\u003e\u003cError\u003e\u003cCode\u003eAccountRequiresHttps\u003c/Code\u003e\u003cMessage\u003eThe account being accessed does not support http.\nRequestId:c637e05c-901e-0000-1288-c790fb000000\nTime:2026-04-08T18:48:15.6423229Z\u003c/Message\u003e\u003cAccountName\u003estgcfi20260408t173437z\u003c/AccountName\u003e\u003c/Error\u003e'\n⊘ I call \"{connection}\" with \"Close\" (skipped)\n⊘ \"{connection.State}\" is \"closed\" (skipped)",
    "status_id": 1,
    "time": 1775674095,
    "time_dt": "2026-04-08T18:48:15Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR03"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775674096,
      "created_time_dt": "2026-04-08T18:48:16Z",
      "desc": "Compliance test scenario: Only secure protocols are exposed",
      "title": "Only secure protocols are exposed",
      "types": [],
      "uid": "ccc-test-288-1775674096"
    },
    "message": "Only secure protocols are exposed",
    "metadata": {
      "event_code": "Only secure protocols are exposed",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core",
        "@CCC.Core.CN01",
        "@PerPort",
        "@Behavioural",
        "@tls",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": "https service on stgcfi20260408t173437z.blob.core.windows.net:443",
          "metadata": {
            "findings": [],
            "name": "stgcfi20260408t173437z.blob.core.windows.net",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "stgcfi20260408t173437z.blob.core.windows.net",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ \"report\" contains details of SSL Support type \"protocols\" for \"{hostName}\" on port \"{portNumber}\"\n✓ \"{report}\" is an array of objects with at least the following contents",
    "status_id": 1,
    "time": 1775674096,
    "time_dt": "2026-04-08T18:48:16Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR03"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775674101,
      "created_time_dt": "2026-04-08T18:48:21Z",
      "desc": "Compliance test scenario: Verify HTTPS uses IANA-assigned port 443",
      "title": "Verify HTTPS uses IANA-assigned port 443",
      "types": [],
      "uid": "ccc-test-368-1775674101"
    },
    "message": "Verify HTTPS uses IANA-assigned port 443",
    "metadata": {
      "event_code": "Verify HTTPS uses IANA-assigned port 443",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core",
        "@CCC.Core.CN01",
        "@Behavioural",
        "@PerPort",
        "@http",
        "@tls",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": "https service on stgcfi20260408t173437z.blob.core.windows.net:443",
          "metadata": {
            "findings": [],
            "name": "stgcfi20260408t173437z.blob.core.windows.net",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "stgcfi20260408t173437z.blob.core.windows.net",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ \"{portNumber}\" is \"443\"",
    "status_id": 1,
    "time": 1775674101,
    "time_dt": "2026-04-08T18:48:21Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR07"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775674101,
      "created_time_dt": "2026-04-08T18:48:21Z",
      "desc": "Compliance test scenario: Verify mTLS requires client certificate authentication",
      "title": "Verify mTLS requires client certificate authentication",
      "types": [],
      "uid": "ccc-test-422-1775674101"
    },
    "message": "Verify mTLS requires client certificate authentication",
    "metadata": {
      "event_code": "Verify mTLS requires client certificate authentication",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@tls",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core",
        "@CCC.Core.CN01",
        "@Behavioural",
        "@PerPort",
        "@tls",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": "https service on stgcfi20260408t173437z.blob.core.windows.net:443",
          "metadata": {
            "findings": [],
            "name": "stgcfi20260408t173437z.blob.core.windows.net",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "stgcfi20260408t173437z.blob.core.windows.net",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ \"report\" contains details of SSL Support type \"server-defaults\" for \"{hostName}\" on port \"{portNumber}\"\n✗ \"{report}\" is an array of objects with at least the following contents - Error: expected row not found: map[finding:required id:clientAuth]",
    "status_id": 1,
    "time": 1775674101,
    "time_dt": "2026-04-08T18:48:21Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR08"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775670034,
      "created_time_dt": "2026-04-08T17:40:34Z",
      "desc": "Compliance test scenario: Storage account enforces minimum TLS version",
      "title": "Storage account enforces minimum TLS version",
      "types": [],
      "uid": "ccc-test-138-1775670034"
    },
    "message": "Storage account enforces minimum TLS version",
    "metadata": {
      "event_code": "Storage account enforces minimum TLS version",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@CCC.Core",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core.CN01",
        "@Policy",
        "@PerService",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✗ I attempt policy check \"object-storage-tls-policy\" for control \"CCC.Core.CN01\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" - Error: policy check failed: Azure Storage Account TLS Policy Check: \n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775670034,
    "time_dt": "2026-04-08T17:40:34Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775670034,
      "created_time_dt": "2026-04-08T17:40:34Z",
      "desc": "Compliance test scenario: Object storage policy prevents the use of unencrypted ports",
      "title": "Object storage policy prevents the use of unencrypted ports",
      "types": [],
      "uid": "ccc-test-291-1775670034"
    },
    "message": "Object storage policy prevents the use of unencrypted ports",
    "metadata": {
      "event_code": "Object storage policy prevents the use of unencrypted ports",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core",
        "@CCC.Core.CN01",
        "@Policy",
        "@PerService",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✗ I attempt policy check \"object-storage-unencrypted-policy\" for control \"CCC.Core.CN01\" assessment requirement \"AR03\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" - Error: policy check failed: Azure Storage Unencrypted Traffic Block Check: \n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775670034,
    "time_dt": "2026-04-08T17:40:34Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR03"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775670035,
      "created_time_dt": "2026-04-08T17:40:35Z",
      "desc": "Compliance test scenario: Storage account enforces mutual TLS - NotTested",
      "title": "Storage account enforces mutual TLS - NotTested",
      "types": [],
      "uid": "ccc-test-430-1775670035"
    },
    "message": "Storage account enforces mutual TLS - NotTested",
    "metadata": {
      "event_code": "Storage account enforces mutual TLS - NotTested",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@tls",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core",
        "@CCC.Core.CN01",
        "@Policy",
        "@NotTested",
        "@PerService",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "Update",
    "status_code": "FAIL",
    "status_detail": "✓ no-op required",
    "status_id": 2,
    "time": 1775670035,
    "time_dt": "2026-04-08T17:40:35Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR08"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775670035,
      "created_time_dt": "2026-04-08T17:40:35Z",
      "desc": "Compliance test scenario: Verify objects are encrypted at rest",
      "title": "Verify objects are encrypted at rest",
      "types": [],
      "uid": "ccc-test-466-1775670035"
    },
    "message": "Verify objects are encrypted at rest",
    "metadata": {
      "event_code": "Verify objects are encrypted at rest",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN02",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ \"{result}\" is not an error\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"test-encryption-check={Timestamp}.txt\", and \"encryption test data\"\n✓ \"{result}\" is not an error\n✓ I refer to \"{result}\" as \"uploadResult\"\n✓ \"{uploadResult.Encryption}\" is not null\n✓ \"{uploadResult.EncryptionAlgorithm}\" is \"AES256\"\n✓ I attach \"{uploadResult}\" to the test output as \"Upload Result with Encryption Details\"",
    "status_id": 1,
    "time": 1775670035,
    "time_dt": "2026-04-08T17:40:35Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN02.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775670096,
      "created_time_dt": "2026-04-08T17:41:36Z",
      "desc": "Compliance test scenario: Object storage encryption compliance",
      "title": "Object storage encryption compliance",
      "types": [],
      "uid": "ccc-test-470-1775670096"
    },
    "message": "Object storage encryption compliance",
    "metadata": {
      "event_code": "Object storage encryption compliance",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN02",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I attempt policy check \"object-storage-encryption\" for control \"CCC.Core.CN02\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\"\n✓ \"{result}\" is true",
    "status_id": 1,
    "time": 1775670096,
    "time_dt": "2026-04-08T17:41:36Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN02.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775670097,
      "created_time_dt": "2026-04-08T17:41:37Z",
      "desc": "Compliance test scenario: Object storage delete protection compliance",
      "title": "Object storage delete protection compliance",
      "types": [],
      "uid": "ccc-test-492-1775670097"
    },
    "message": "Object storage delete protection compliance",
    "metadata": {
      "event_code": "Object storage delete protection compliance",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN03",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I attempt policy check \"object-storage-delete-protection\" for control \"CCC.Core.CN03\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\"\n✓ \"{result}\" is true",
    "status_id": 1,
    "time": 1775670097,
    "time_dt": "2026-04-08T17:41:37Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN03.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775670098,
      "created_time_dt": "2026-04-08T17:41:38Z",
      "desc": "Compliance test scenario: MFA requirement for destructive operations cannot be tested automatically",
      "title": "MFA requirement for destructive operations cannot be tested automatically",
      "types": [],
      "uid": "ccc-test-495-1775670098"
    },
    "message": "MFA requirement for destructive operations cannot be tested automatically",
    "metadata": {
      "event_code": "MFA requirement for destructive operations cannot be tested automatically",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN03",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural",
        "@object-storage",
        "@load-balancer"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775670098,
    "time_dt": "2026-04-08T17:41:38Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN03.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775670098,
      "created_time_dt": "2026-04-08T17:41:38Z",
      "desc": "Compliance test scenario: API modification requires credential and trust perimeter origin - NotTestable",
      "title": "API modification requires credential and trust perimeter origin - NotTestable",
      "types": [],
      "uid": "ccc-test-513-1775670098"
    },
    "message": "API modification requires credential and trust perimeter origin - NotTestable",
    "metadata": {
      "event_code": "API modification requires credential and trust perimeter origin - NotTestable",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN03",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@NotTestable",
        "@object-storage",
        "@load-balancer"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775670098,
    "time_dt": "2026-04-08T17:41:38Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN03.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775670098,
      "created_time_dt": "2026-04-08T17:41:38Z",
      "desc": "Compliance test scenario: UI viewing requires multi-factor authentication - NotTestable",
      "title": "UI viewing requires multi-factor authentication - NotTestable",
      "types": [],
      "uid": "ccc-test-529-1775670098"
    },
    "message": "UI viewing requires multi-factor authentication - NotTestable",
    "metadata": {
      "event_code": "UI viewing requires multi-factor authentication - NotTestable",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN03",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@NotTestable",
        "@object-storage",
        "@load-balancer"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775670098,
    "time_dt": "2026-04-08T17:41:38Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN03.AR03"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775670098,
      "created_time_dt": "2026-04-08T17:41:38Z",
      "desc": "Compliance test scenario: API viewing requires credential and trust perimeter origin - NotTestable",
      "title": "API viewing requires credential and trust perimeter origin - NotTestable",
      "types": [],
      "uid": "ccc-test-545-1775670098"
    },
    "message": "API viewing requires credential and trust perimeter origin - NotTestable",
    "metadata": {
      "event_code": "API viewing requires credential and trust perimeter origin - NotTestable",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN03",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@NotTestable",
        "@object-storage",
        "@load-balancer"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775670098,
    "time_dt": "2026-04-08T17:41:38Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN03.AR04"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775670098,
      "created_time_dt": "2026-04-08T17:41:38Z",
      "desc": "Compliance test scenario: Object storage admin logging compliance",
      "title": "Object storage admin logging compliance",
      "types": [],
      "uid": "ccc-test-589-1775670098"
    },
    "message": "Object storage admin logging compliance",
    "metadata": {
      "event_code": "Object storage admin logging compliance",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN04",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ I attempt policy check \"admin-logging\" for control \"CCC.Core.CN04\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\"\n✓ \"{result}\" is true",
    "status_id": 1,
    "time": 1775670098,
    "time_dt": "2026-04-08T17:41:38Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN04.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775670107,
      "created_time_dt": "2026-04-08T17:41:47Z",
      "desc": "Compliance test scenario: Verify admin actions are logged with identity and timestamp",
      "title": "Verify admin actions are logged with identity and timestamp",
      "types": [],
      "uid": "ccc-test-610-1775670107"
    },
    "message": "Verify admin actions are logged with identity and timestamp",
    "metadata": {
      "event_code": "Verify admin actions are logged with identity and timestamp",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN04",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"{ServiceType}\"\n✓ I refer to \"{result}\" as \"theService\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"logging\"\n✓ I refer to \"{result}\" as \"loggingService\"\n✓ I call \"{theService}\" with \"UpdateResourcePolicy\"\n✓ \"{result}\" is not an error\n✓ I attach \"{result}\" to the test output as \"Policy Update Result\"\n✓ we wait for a period of \"10000\" ms\n✓ I call \"{loggingService}\" with \"QueryAdminLogs\" using arguments \"{ResourceName}\" and \"{20}\"\n✓ \"{result}\" is not an error\n✓ I refer to \"{result}\" as \"adminLogs\"\n✓ I attach \"{adminLogs}\" to the test output as \"Admin Activity Logs\"\n✓ \"{adminLogs}\" is an array of objects with at least the following contents",
    "status_id": 1,
    "time": 1775670107,
    "time_dt": "2026-04-08T17:41:47Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN04.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775670120,
      "created_time_dt": "2026-04-08T17:42:00Z",
      "desc": "Compliance test scenario: Object storage data modification logging compliance",
      "title": "Object storage data modification logging compliance",
      "types": [],
      "uid": "ccc-test-641-1775670120"
    },
    "message": "Object storage data modification logging compliance",
    "metadata": {
      "event_code": "Object storage data modification logging compliance",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN04",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✗ I attempt policy check \"data-write-logging\" for control \"CCC.Core.CN04\" assessment requirement \"AR02\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" - Error: policy check failed: Azure Diagnostic Logging Write Configuration: \n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775670120,
    "time_dt": "2026-04-08T17:42:00Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN04.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775670121,
      "created_time_dt": "2026-04-08T17:42:01Z",
      "desc": "Compliance test scenario: Data read logging compliance",
      "title": "Data read logging compliance",
      "types": [],
      "uid": "ccc-test-692-1775670121"
    },
    "message": "Data read logging compliance",
    "metadata": {
      "event_code": "Data read logging compliance",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN04",
        "@tlp-red",
        "@Policy",
        "@object-storage",
        "@vpc"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✗ I attempt policy check \"data-read-logging\" for control \"CCC.Core.CN04\" assessment requirement \"AR03\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" - Error: policy check failed: Azure Diagnostic Logging Read Configuration: \n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775670121,
    "time_dt": "2026-04-08T17:42:01Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN04.AR03"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775670122,
      "created_time_dt": "2026-04-08T17:42:02Z",
      "desc": "Compliance test scenario: Verify data read operations are logged with identity and timestamp",
      "title": "Verify data read operations are logged with identity and timestamp",
      "types": [],
      "uid": "ccc-test-711-1775670122"
    },
    "message": "Verify data read operations are logged with identity and timestamp",
    "metadata": {
      "event_code": "Verify data read operations are logged with identity and timestamp",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN04",
        "@tlp-red",
        "@Behavioural",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"logging\"\n✓ I refer to \"{result}\" as \"loggingService\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"test-read-logging-object={Timestamp}.txt\", and \"test data for read logging verification\"\n✓ \"{result}\" is not an error\n✓ I refer to \"{result}\" as \"createResult\"\n✓ I call \"{storage}\" with \"ReadObject\" using arguments \"{ResourceName}\" and \"test-read-logging-object={Timestamp}.txt\"\n✓ \"{result}\" is not an error\n✓ I refer to \"{result}\" as \"readResult\"\n✓ I attach \"{readResult}\" to the test output as \"Object Read Result\"\n✓ we wait for a period of \"10000\" ms\n✓ I call \"{loggingService}\" with \"QueryDataReadLogs\" using arguments \"{ResourceName}\" and \"{20}\"\n✓ \"{result}\" is not an error\n✓ I refer to \"{result}\" as \"readLogs\"\n✓ I attach \"{readLogs}\" to the test output as \"Data Read Logs\"\n✗ \"{readLogs}\" is an array of objects with at least the following contents - Error: expected row not found: map[result:Succeeded]",
    "status_id": 1,
    "time": 1775670122,
    "time_dt": "2026-04-08T17:42:02Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN04.AR03"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775670138,
      "created_time_dt": "2026-04-08T17:42:18Z",
      "desc": "Compliance test scenario: Service prevents data modification by user with no access",
      "title": "Service prevents data modification by user with no access",
      "types": [],
      "uid": "ccc-test-775-1775670138"
    },
    "message": "Service prevents data modification by user with no access",
    "metadata": {
      "event_code": "Service prevents data modification by user with no access",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Destructive",
        "@Behavioural",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-no-write-access\", \"{UID}\", and \"none\"\n✓ I refer to \"{result}\" as \"testUserNoAccess\"\n✓ I attach \"{result}\" to the test output as \"no-access-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserNoAccess}\", and \"{false}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"test-cn05-unauthorized-modify={Timestamp}.txt\", and \"unauthorized data\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"no-access-create-error.txt\" (skipped)",
    "status_id": 1,
    "time": 1775670138,
    "time_dt": "2026-04-08T17:42:18Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN05.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775670381,
      "created_time_dt": "2026-04-08T17:46:21Z",
      "desc": "Compliance test scenario: Service allows data modification by user with write access",
      "title": "Service allows data modification by user with write access",
      "types": [],
      "uid": "ccc-test-790-1775670381"
    },
    "message": "Service allows data modification by user with write access",
    "metadata": {
      "event_code": "Service allows data modification by user with write access",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Destructive",
        "@Behavioural",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-write-access\", \"{UID}\", and \"write\"\n✓ I refer to \"{result}\" as \"testUserWrite\"\n✓ I attach \"{result}\" to the test output as \"write-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserWrite}\", and \"{true}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"test-cn05-authorized-modify={Timestamp}.txt\", and \"authorized data\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"write-create-object-result.json\" (skipped)",
    "status_id": 1,
    "time": 1775670381,
    "time_dt": "2026-04-08T17:46:21Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN05.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775670623,
      "created_time_dt": "2026-04-08T17:50:23Z",
      "desc": "Compliance test scenario: Storage is not configured for public write access",
      "title": "Storage is not configured for public write access",
      "types": [],
      "uid": "ccc-test-798-1775670623"
    },
    "message": "Storage is not configured for public write access",
    "metadata": {
      "event_code": "Storage is not configured for public write access",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I attempt policy check \"object-storage-block-public-write-access\" for control \"CCC.Core.CN05\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\"\n✓ \"{result}\" is true",
    "status_id": 1,
    "time": 1775670623,
    "time_dt": "2026-04-08T17:50:23Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN05.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775670624,
      "created_time_dt": "2026-04-08T17:50:24Z",
      "desc": "Compliance test scenario: Service prevents administrative action (creating a new bucket) by user with no access",
      "title": "Service prevents administrative action (creating a new bucket) by user with no access",
      "types": [],
      "uid": "ccc-test-877-1775670624"
    },
    "message": "Service prevents administrative action (creating a new bucket) by user with no access",
    "metadata": {
      "event_code": "Service prevents administrative action (creating a new bucket) by user with no access",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Destructive",
        "@Behavioural",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-no-admin-access\", \"{UID}\", and \"none\"\n✓ I refer to \"{result}\" as \"testUserNoAccess\"\n✓ I attach \"{result}\" to the test output as \"no-admin-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserNoAccess}\", and \"{false}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"CreateBucket\" using argument \"test-cn05-unauthorized-admin-container\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"no-admin-create-bucket-error.txt\" (skipped)",
    "status_id": 1,
    "time": 1775670624,
    "time_dt": "2026-04-08T17:50:24Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN05.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775670866,
      "created_time_dt": "2026-04-08T17:54:26Z",
      "desc": "Compliance test scenario: Service prevents administrative action (creating a new bucket) by user with read-only access",
      "title": "Service prevents administrative action (creating a new bucket) by user with read-only access",
      "types": [],
      "uid": "ccc-test-892-1775670866"
    },
    "message": "Service prevents administrative action (creating a new bucket) by user with read-only access",
    "metadata": {
      "event_code": "Service prevents administrative action (creating a new bucket) by user with read-only access",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Destructive",
        "@Behavioural",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-read-only-admin\", \"{UID}\", and \"read\"\n✓ I refer to \"{result}\" as \"testUserRead\"\n✓ I attach \"{result}\" to the test output as \"read-only-admin-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserRead}\", and \"{false}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"CreateBucket\" using argument \"test-cn05-read-only-create-container\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"read-only-create-bucket-error.txt\" (skipped)",
    "status_id": 1,
    "time": 1775670866,
    "time_dt": "2026-04-08T17:54:26Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN05.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671108,
      "created_time_dt": "2026-04-08T17:58:28Z",
      "desc": "Compliance test scenario: Service allows administrative action (creating a new bucket) by user with admin access",
      "title": "Service allows administrative action (creating a new bucket) by user with admin access",
      "types": [],
      "uid": "ccc-test-908-1775671108"
    },
    "message": "Service allows administrative action (creating a new bucket) by user with admin access",
    "metadata": {
      "event_code": "Service allows administrative action (creating a new bucket) by user with admin access",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-admin-access\", \"{UID}\", and \"admin\"\n✓ I refer to \"{result}\" as \"testUserAdmin\"\n✓ I attach \"{result}\" to the test output as \"admin-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserAdmin}\", and \"{true}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"CreateBucket\" using argument \"test-cn05-authorized-admin-container\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"admin-create-bucket-result.json\" (skipped)\n⊘ I call \"{storage}\" with \"DeleteBucket\" using argument \"test-cn05-authorized-admin-container\" (skipped)",
    "status_id": 1,
    "time": 1775671108,
    "time_dt": "2026-04-08T17:58:28Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN05.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671351,
      "created_time_dt": "2026-04-08T18:02:31Z",
      "desc": "Compliance test scenario: Unauthorized administrative access is blocked",
      "title": "Unauthorized administrative access is blocked",
      "types": [],
      "uid": "ccc-test-915-1775671351"
    },
    "message": "Unauthorized administrative access is blocked",
    "metadata": {
      "event_code": "Unauthorized administrative access is blocked",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775671351,
    "time_dt": "2026-04-08T18:02:31Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN05.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671351,
      "created_time_dt": "2026-04-08T18:02:31Z",
      "desc": "Compliance test scenario: Cross-tenant access is blocked without explicit allowlist",
      "title": "Cross-tenant access is blocked without explicit allowlist",
      "types": [],
      "uid": "ccc-test-933-1775671351"
    },
    "message": "Cross-tenant access is blocked without explicit allowlist",
    "metadata": {
      "event_code": "Cross-tenant access is blocked without explicit allowlist",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I attempt policy check \"object-storage-cross-tenant-block\" for control \"CCC.Core.CN05\" assessment requirement \"AR03\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\"\n✓ \"{result}\" is true",
    "status_id": 1,
    "time": 1775671351,
    "time_dt": "2026-04-08T18:02:31Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN05.AR03"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671352,
      "created_time_dt": "2026-04-08T18:02:32Z",
      "desc": "Compliance test scenario: External unauthorized data requests are blocked",
      "title": "External unauthorized data requests are blocked",
      "types": [],
      "uid": "ccc-test-949-1775671352"
    },
    "message": "External unauthorized data requests are blocked",
    "metadata": {
      "event_code": "External unauthorized data requests are blocked",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN05",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I attempt policy check \"object-storage-block-public-read\" for control \"CCC.Core.CN05\" assessment requirement \"AR04\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\"\n✓ \"{result}\" is true",
    "status_id": 1,
    "time": 1775671352,
    "time_dt": "2026-04-08T18:02:32Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN05.AR04"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671353,
      "created_time_dt": "2026-04-08T18:02:33Z",
      "desc": "Compliance test scenario: External requests do not reveal service existence - NotTested",
      "title": "External requests do not reveal service existence - NotTested",
      "types": [],
      "uid": "ccc-test-963-1775671353"
    },
    "message": "External requests do not reveal service existence - NotTested",
    "metadata": {
      "event_code": "External requests do not reveal service existence - NotTested",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN05",
        "@tlp-red",
        "@Policy",
        "@NotTested",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "Update",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ no-op required",
    "status_id": 2,
    "time": 1775671353,
    "time_dt": "2026-04-08T18:02:33Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN05.AR05"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671353,
      "created_time_dt": "2026-04-08T18:02:33Z",
      "desc": "Compliance test scenario: Service prevents data read by user with no access - Duplicate",
      "title": "Service prevents data read by user with no access - Duplicate",
      "types": [],
      "uid": "ccc-test-993-1775671353"
    },
    "message": "Service prevents data read by user with no access - Duplicate",
    "metadata": {
      "event_code": "Service prevents data read by user with no access - Duplicate",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN05",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Destructive",
        "@Behavioural",
        "@Duplicate",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775671353,
    "time_dt": "2026-04-08T18:02:33Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN05.AR06"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671353,
      "created_time_dt": "2026-04-08T18:02:33Z",
      "desc": "Compliance test scenario: All unauthorized requests are blocked - Duplicate",
      "title": "All unauthorized requests are blocked - Duplicate",
      "types": [],
      "uid": "ccc-test-1000-1775671353"
    },
    "message": "All unauthorized requests are blocked - Duplicate",
    "metadata": {
      "event_code": "All unauthorized requests are blocked - Duplicate",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN05",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@Duplicate",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775671353,
    "time_dt": "2026-04-08T18:02:33Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN05.AR06"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671353,
      "created_time_dt": "2026-04-08T18:02:33Z",
      "desc": "Compliance test scenario: Object storage region compliance",
      "title": "Object storage region compliance",
      "types": [],
      "uid": "ccc-test-1036-1775671353"
    },
    "message": "Object storage region compliance",
    "metadata": {
      "event_code": "Object storage region compliance",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN06",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I attempt policy check \"object-storage-region\" for control \"CCC.Core.CN06\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\"\n✓ \"{result}\" is true",
    "status_id": 1,
    "time": 1775671353,
    "time_dt": "2026-04-08T18:02:33Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN06.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671354,
      "created_time_dt": "2026-04-08T18:02:34Z",
      "desc": "Compliance test scenario: Resource region can be retrieved for compliance verification",
      "title": "Resource region can be retrieved for compliance verification",
      "types": [],
      "uid": "ccc-test-1050-1775671354"
    },
    "message": "Resource region can be retrieved for compliance verification",
    "metadata": {
      "event_code": "Resource region can be retrieved for compliance verification",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN06",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural",
        "@object-storage",
        "@vpc"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"{ServiceType}\"\n✓ I refer to \"{result}\" as \"theService\"\n✓ I call \"{theService}\" with \"GetResourceRegion\" using argument \"{ResourceName}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: not yet implemented\n⊘ I refer to \"{result}\" as \"region\" (skipped)\n⊘ I attach \"{region}\" to the test output as \"Resource Region\" (skipped)\n⊘ \"{PermittedRegions}\" is an array of objects with at least the following contents (skipped)",
    "status_id": 1,
    "time": 1775671354,
    "time_dt": "2026-04-08T18:02:34Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN06.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671354,
      "created_time_dt": "2026-04-08T18:02:34Z",
      "desc": "Compliance test scenario: Child resource region compliance - NotTestable",
      "title": "Child resource region compliance - NotTestable",
      "types": [],
      "uid": "ccc-test-1072-1775671354"
    },
    "message": "Child resource region compliance - NotTestable",
    "metadata": {
      "event_code": "Child resource region compliance - NotTestable",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN06",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural",
        "@NotTestable",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775671354,
    "time_dt": "2026-04-08T18:02:34Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN06.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671354,
      "created_time_dt": "2026-04-08T18:02:34Z",
      "desc": "Compliance test scenario: Child resource region compliance - NotTestable",
      "title": "Child resource region compliance - NotTestable",
      "types": [],
      "uid": "ccc-test-1075-1775671354"
    },
    "message": "Child resource region compliance - NotTestable",
    "metadata": {
      "event_code": "Child resource region compliance - NotTestable",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN06",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@NotTestable",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775671354,
    "time_dt": "2026-04-08T18:02:34Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN06.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671354,
      "created_time_dt": "2026-04-08T18:02:34Z",
      "desc": "Compliance test scenario: Enumeration activities publish events to monitored channels",
      "title": "Enumeration activities publish events to monitored channels",
      "types": [],
      "uid": "ccc-test-1096-1775671354"
    },
    "message": "Enumeration activities publish events to monitored channels",
    "metadata": {
      "event_code": "Enumeration activities publish events to monitored channels",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN07",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✗ I attempt policy check \"enumeration-monitoring-policy\" for control \"CCC.Core.CN07\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" - Error: policy check failed: Azure Storage Enumeration Monitoring Policy Check: \n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775671354,
    "time_dt": "2026-04-08T18:02:34Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN07.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671355,
      "created_time_dt": "2026-04-08T18:02:35Z",
      "desc": "Compliance test scenario: Enumeration event publishing cannot be tested automatically - NotTestable",
      "title": "Enumeration event publishing cannot be tested automatically - NotTestable",
      "types": [],
      "uid": "ccc-test-1099-1775671355"
    },
    "message": "Enumeration event publishing cannot be tested automatically - NotTestable",
    "metadata": {
      "event_code": "Enumeration event publishing cannot be tested automatically - NotTestable",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN07",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural",
        "@NotTestable",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775671355,
    "time_dt": "2026-04-08T18:02:35Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN07.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671355,
      "created_time_dt": "2026-04-08T18:02:35Z",
      "desc": "Compliance test scenario: Enumeration activities are logged",
      "title": "Enumeration activities are logged",
      "types": [],
      "uid": "ccc-test-1122-1775671355"
    },
    "message": "Enumeration activities are logged",
    "metadata": {
      "event_code": "Enumeration activities are logged",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN07",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✗ I attempt policy check \"enumeration-logging-policy\" for control \"CCC.Core.CN07\" assessment requirement \"AR02\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" - Error: policy check failed: Azure Storage Enumeration Logging Policy Check: \n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775671355,
    "time_dt": "2026-04-08T18:02:35Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN07.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671356,
      "created_time_dt": "2026-04-08T18:02:36Z",
      "desc": "Compliance test scenario: Enumeration logging cannot be verified automatically - NotTestable",
      "title": "Enumeration logging cannot be verified automatically - NotTestable",
      "types": [],
      "uid": "ccc-test-1125-1775671356"
    },
    "message": "Enumeration logging cannot be verified automatically - NotTestable",
    "metadata": {
      "event_code": "Enumeration logging cannot be verified automatically - NotTestable",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN07",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural",
        "@NotTestable",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775671356,
    "time_dt": "2026-04-08T18:02:36Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN07.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671356,
      "created_time_dt": "2026-04-08T18:02:36Z",
      "desc": "Compliance test scenario: Object storage replication compliance",
      "title": "Object storage replication compliance",
      "types": [],
      "uid": "ccc-test-1160-1775671356"
    },
    "message": "Object storage replication compliance",
    "metadata": {
      "event_code": "Object storage replication compliance",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN08",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I attempt policy check \"object-storage-replication\" for control \"CCC.Core.CN08\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\"\n✓ \"{result}\" is true",
    "status_id": 1,
    "time": 1775671356,
    "time_dt": "2026-04-08T18:02:36Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN08.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671357,
      "created_time_dt": "2026-04-08T18:02:37Z",
      "desc": "Compliance test scenario: Bucket data is replicated to physically separate locations",
      "title": "Bucket data is replicated to physically separate locations",
      "types": [],
      "uid": "ccc-test-1171-1775671357"
    },
    "message": "Bucket data is replicated to physically separate locations",
    "metadata": {
      "event_code": "Bucket data is replicated to physically separate locations",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN08",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{storage}\" with \"GetReplicationStatus\" using argument \"{ResourceName}\"\n✓ I refer to \"{result}\" as \"replicationStatus\"\n✓ I refer to \"{replicationStatus.Locations}\" as \"locations\"\n✓ I attach \"{replicationStatus}\" to the test output as \"Replication Status\"\n✓ \"{locations}\" is an array of objects with length \"2\"\n✓ \"{PermittedRegions}\" is an array of objects with at least the following contents\n✓ \"{PermittedRegions}\" is an array of objects with at least the following contents",
    "status_id": 1,
    "time": 1775671357,
    "time_dt": "2026-04-08T18:02:37Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN08.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671357,
      "created_time_dt": "2026-04-08T18:02:37Z",
      "desc": "Compliance test scenario: Object storage replication status is visible",
      "title": "Object storage replication status is visible",
      "types": [],
      "uid": "ccc-test-1203-1775671357"
    },
    "message": "Object storage replication status is visible",
    "metadata": {
      "event_code": "Object storage replication status is visible",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN08",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I attempt policy check \"object-storage-replication-status\" for control \"CCC.Core.CN08\" assessment requirement \"AR02\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\"\n✓ \"{result}\" is true",
    "status_id": 1,
    "time": 1775671357,
    "time_dt": "2026-04-08T18:02:37Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN08.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671358,
      "created_time_dt": "2026-04-08T18:02:38Z",
      "desc": "Compliance test scenario: Replication status can be retrieved for monitoring",
      "title": "Replication status can be retrieved for monitoring",
      "types": [],
      "uid": "ccc-test-1212-1775671358"
    },
    "message": "Replication status can be retrieved for monitoring",
    "metadata": {
      "event_code": "Replication status can be retrieved for monitoring",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN08",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{storage}\" with \"GetReplicationStatus\" using argument \"{ResourceName}\"\n✓ I refer to \"{result}\" as \"replicationStatus\"\n✓ I attach \"{replicationStatus}\" to the test output as \"Replication Status\"\n✓ I refer to \"{replicationStatus.Locations}\" as \"locations\"\n✓ \"{locations}\" is an array of objects with at least the following contents",
    "status_id": 1,
    "time": 1775671358,
    "time_dt": "2026-04-08T18:02:38Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN08.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671358,
      "created_time_dt": "2026-04-08T18:02:38Z",
      "desc": "Compliance test scenario: Object storage access logging compliance",
      "title": "Object storage access logging compliance",
      "types": [],
      "uid": "ccc-test-1229-1775671358"
    },
    "message": "Object storage access logging compliance",
    "metadata": {
      "event_code": "Object storage access logging compliance",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN09",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✗ I attempt policy check \"object-storage-access-logging\" for control \"CCC.Core.CN09\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" - Error: policy check failed: Azure Storage Account Diagnostic Logging Configuration: \n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775671358,
    "time_dt": "2026-04-08T18:02:38Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN09.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671359,
      "created_time_dt": "2026-04-08T18:02:39Z",
      "desc": "Compliance test scenario: Disabling logs requires disabling the resource - NotTestable",
      "title": "Disabling logs requires disabling the resource - NotTestable",
      "types": [],
      "uid": "ccc-test-1246-1775671359"
    },
    "message": "Disabling logs requires disabling the resource - NotTestable",
    "metadata": {
      "event_code": "Disabling logs requires disabling the resource - NotTestable",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN09",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@NotTestable",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775671359,
    "time_dt": "2026-04-08T18:02:39Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN09.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671359,
      "created_time_dt": "2026-04-08T18:02:39Z",
      "desc": "Compliance test scenario: Redirecting logs requires halting the resource - NotTestable",
      "title": "Redirecting logs requires halting the resource - NotTestable",
      "types": [],
      "uid": "ccc-test-1261-1775671359"
    },
    "message": "Redirecting logs requires halting the resource - NotTestable",
    "metadata": {
      "event_code": "Redirecting logs requires halting the resource - NotTestable",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN09",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@NotTestable",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775671359,
    "time_dt": "2026-04-08T18:02:39Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN09.AR03"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671359,
      "created_time_dt": "2026-04-08T18:02:39Z",
      "desc": "Compliance test scenario: Object storage replication destination compliance",
      "title": "Object storage replication destination compliance",
      "types": [],
      "uid": "ccc-test-1283-1775671359"
    },
    "message": "Object storage replication destination compliance",
    "metadata": {
      "event_code": "Object storage replication destination compliance",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN10",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I attempt policy check \"object-storage-replication-destination\" for control \"CCC.Core.CN10\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\"\n✓ \"{result}\" is true",
    "status_id": 1,
    "time": 1775671359,
    "time_dt": "2026-04-08T18:02:39Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN10.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671360,
      "created_time_dt": "2026-04-08T18:02:40Z",
      "desc": "Compliance test scenario: Replication destination trust cannot be verified automatically - NotTestable",
      "title": "Replication destination trust cannot be verified automatically - NotTestable",
      "types": [],
      "uid": "ccc-test-1286-1775671360"
    },
    "message": "Replication destination trust cannot be verified automatically - NotTestable",
    "metadata": {
      "event_code": "Replication destination trust cannot be verified automatically - NotTestable",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN10",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural",
        "@NotTestable",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775671360,
    "time_dt": "2026-04-08T18:02:40Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN10.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671360,
      "created_time_dt": "2026-04-08T18:02:40Z",
      "desc": "Compliance test scenario: Service prevents reading bucket with no access",
      "title": "Service prevents reading bucket with no access",
      "types": [],
      "uid": "ccc-test-1340-1775671360"
    },
    "message": "Service prevents reading bucket with no access",
    "metadata": {
      "event_code": "Service prevents reading bucket with no access",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN01",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-no-access\", \"{UID}\", and \"none\"\n✓ I refer to \"{result}\" as \"testUserNoAccess\"\n✓ I attach \"{result}\" to the test output as \"no-access-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserNoAccess}\", and \"{false}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"ListObjects\" using argument \"{ResourceName}\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"no-access-list-error.txt\" (skipped)",
    "status_id": 1,
    "time": 1775671360,
    "time_dt": "2026-04-08T18:02:40Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN01.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671602,
      "created_time_dt": "2026-04-08T18:06:42Z",
      "desc": "Compliance test scenario: Service allows reading bucket with read access",
      "title": "Service allows reading bucket with read access",
      "types": [],
      "uid": "ccc-test-1356-1775671602"
    },
    "message": "Service allows reading bucket with read access",
    "metadata": {
      "event_code": "Service allows reading bucket with read access",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN01",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-read\", \"{UID}\", and \"read\"\n✓ I refer to \"{result}\" as \"testUserRead\"\n✓ I attach \"{result}\" to the test output as \"read-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserRead}\", and \"{true}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I attach \"{result}\" to the test output as \"read-storage-service.json\" (skipped)\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"ListObjects\" using argument \"{ResourceName}\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"read-list-objects-result.json\" (skipped)",
    "status_id": 1,
    "time": 1775671602,
    "time_dt": "2026-04-08T18:06:42Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN01.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671844,
      "created_time_dt": "2026-04-08T18:10:44Z",
      "desc": "Compliance test scenario: Test policy for bucket access control",
      "title": "Test policy for bucket access control",
      "types": [],
      "uid": "ccc-test-1364-1775671844"
    },
    "message": "Test policy for bucket access control",
    "metadata": {
      "event_code": "Test policy for bucket access control",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN01",
        "@Policy"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I attempt policy check \"no-public-access\" for control \"CCC.ObjStor.CN01\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\"\n✓ \"{result}\" is true",
    "status_id": 1,
    "time": 1775671844,
    "time_dt": "2026-04-08T18:10:44Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN01.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775671845,
      "created_time_dt": "2026-04-08T18:10:45Z",
      "desc": "Compliance test scenario: Service prevents reading object with no access",
      "title": "Service prevents reading object with no access",
      "types": [],
      "uid": "ccc-test-1422-1775671845"
    },
    "message": "Service prevents reading object with no access",
    "metadata": {
      "event_code": "Service prevents reading object with no access",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN01",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"test-object={Timestamp}.txt\", and \"test content\"\n✓ \"{result}\" is not an error\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-no-access\", \"{UID}\", and \"none\"\n✓ I refer to \"{result}\" as \"testUserNoAccess\"\n✓ I attach \"{result}\" to the test output as \"no-access-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserNoAccess}\", and \"{false}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"ReadObject\" using arguments \"{ResourceName}\" and \"test-object={Timestamp}.txt\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"no-access-read-object-error.txt\" (skipped)",
    "status_id": 1,
    "time": 1775671845,
    "time_dt": "2026-04-08T18:10:45Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN01.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775672088,
      "created_time_dt": "2026-04-08T18:14:48Z",
      "desc": "Compliance test scenario: Service allows reading object with read access",
      "title": "Service allows reading object with read access",
      "types": [],
      "uid": "ccc-test-1440-1775672088"
    },
    "message": "Service allows reading object with read access",
    "metadata": {
      "event_code": "Service allows reading object with read access",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN01",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"test-object={Timestamp}.txt\", and \"test content\"\n✓ \"{result}\" is not an error\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-read\", \"{UID}\", and \"read\"\n✓ I refer to \"{result}\" as \"testUserRead\"\n✓ I attach \"{result}\" to the test output as \"read-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserRead}\", and \"{true}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I attach \"{result}\" to the test output as \"read-storage-service.json\" (skipped)\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"ReadObject\" using arguments \"{ResourceName}\" and \"test-object={Timestamp}.txt\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"read-read-object-result.json\" (skipped)",
    "status_id": 1,
    "time": 1775672088,
    "time_dt": "2026-04-08T18:14:48Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN01.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775672331,
      "created_time_dt": "2026-04-08T18:18:51Z",
      "desc": "Compliance test scenario: All unauthorized requests are blocked",
      "title": "All unauthorized requests are blocked",
      "types": [],
      "uid": "ccc-test-1450-1775672331"
    },
    "message": "All unauthorized requests are blocked",
    "metadata": {
      "event_code": "All unauthorized requests are blocked",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN01",
        "@Policy"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"test-object={Timestamp}.txt\", and \"test content\"\n✓ \"{result}\" is not an error\n✗ I attempt policy check \"object-storage-no-public-principals\" for control \"CCC.ObjStor.CN01\" assessment requirement \"AR02\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" - Error: policy check failed: Azure Storage RBAC in Use: \n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775672331,
    "time_dt": "2026-04-08T18:18:51Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN01.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775672334,
      "created_time_dt": "2026-04-08T18:18:54Z",
      "desc": "Compliance test scenario: Service prevents creating bucket with no access",
      "title": "Service prevents creating bucket with no access",
      "types": [],
      "uid": "ccc-test-1507-1775672334"
    },
    "message": "Service prevents creating bucket with no access",
    "metadata": {
      "event_code": "Service prevents creating bucket with no access",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN01",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-no-access\", \"{UID}\", and \"none\"\n✓ I refer to \"{result}\" as \"testUserNoAccess\"\n✓ I attach \"{result}\" to the test output as \"no-access-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserNoAccess}\", and \"{false}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"CreateBucket\" using argument \"test-bucket-no-access\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"no-access-create-bucket-error.txt\" (skipped)",
    "status_id": 1,
    "time": 1775672334,
    "time_dt": "2026-04-08T18:18:54Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN01.AR03"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775672576,
      "created_time_dt": "2026-04-08T18:22:56Z",
      "desc": "Compliance test scenario: Service allows creating bucket with write access",
      "title": "Service allows creating bucket with write access",
      "types": [],
      "uid": "ccc-test-1524-1775672576"
    },
    "message": "Service allows creating bucket with write access",
    "metadata": {
      "event_code": "Service allows creating bucket with write access",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN01",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-write\", \"{UID}\", and \"write\"\n✓ I refer to \"{result}\" as \"testUserWrite\"\n✓ I attach \"{result}\" to the test output as \"write-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserWrite}\", and \"{true}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I attach \"{result}\" to the test output as \"write-storage-service.json\" (skipped)\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"CreateBucket\" using argument \"test-bucket-write\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"write-create-bucket-result.json\" (skipped)\n⊘ I call \"{storage}\" with \"DeleteBucket\" using argument \"{result.ID}\" (skipped)",
    "status_id": 1,
    "time": 1775672576,
    "time_dt": "2026-04-08T18:22:56Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN01.AR03"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775672818,
      "created_time_dt": "2026-04-08T18:26:58Z",
      "desc": "Compliance test scenario: All unauthorized requests are blocked",
      "title": "All unauthorized requests are blocked",
      "types": [],
      "uid": "ccc-test-1532-1775672818"
    },
    "message": "All unauthorized requests are blocked",
    "metadata": {
      "event_code": "All unauthorized requests are blocked",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN01",
        "@Policy"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✗ I attempt policy check \"object-storage-no-public-principals\" for control \"CCC.ObjStor.CN01\" assessment requirement \"AR03\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" - Error: policy check failed: Azure Storage RBAC in Use: \n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775672818,
    "time_dt": "2026-04-08T18:26:58Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN01.AR03"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775672819,
      "created_time_dt": "2026-04-08T18:26:59Z",
      "desc": "Compliance test scenario: Service prevents writing object with read-only access",
      "title": "Service prevents writing object with read-only access",
      "types": [],
      "uid": "ccc-test-1592-1775672819"
    },
    "message": "Service prevents writing object with read-only access",
    "metadata": {
      "event_code": "Service prevents writing object with read-only access",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN01",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ \"{result}\" is not an error\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ \"{result}\" is not an error\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-read\", \"{UID}\", and \"read\"\n✓ I refer to \"{result}\" as \"testUserRead\"\n✓ I attach \"{result}\" to the test output as \"read-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserRead}\", and \"{true}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"test-write-object={Timestamp}.txt\", and \"test content\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"read-create-object-error.txt\" (skipped)",
    "status_id": 1,
    "time": 1775672819,
    "time_dt": "2026-04-08T18:26:59Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN01.AR04"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775673062,
      "created_time_dt": "2026-04-08T18:31:02Z",
      "desc": "Compliance test scenario: Service allows writing object with write access",
      "title": "Service allows writing object with write access",
      "types": [],
      "uid": "ccc-test-1610-1775673062"
    },
    "message": "Service allows writing object with write access",
    "metadata": {
      "event_code": "Service allows writing object with write access",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN01",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ \"{result}\" is not an error\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ \"{result}\" is not an error\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-write\", \"{UID}\", and \"write\"\n✓ I refer to \"{result}\" as \"testUserWrite\"\n✓ I attach \"{result}\" to the test output as \"write-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserWrite}\", and \"{true}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I attach \"{result}\" to the test output as \"write-storage-service.json\" (skipped)\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"test-write-object={Timestamp}.txt\", and \"test content\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"write-create-object-result.json\" (skipped)",
    "status_id": 1,
    "time": 1775673062,
    "time_dt": "2026-04-08T18:31:02Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN01.AR04"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775673304,
      "created_time_dt": "2026-04-08T18:35:04Z",
      "desc": "Compliance test scenario: All unauthorized requests are blocked",
      "title": "All unauthorized requests are blocked",
      "types": [],
      "uid": "ccc-test-1620-1775673304"
    },
    "message": "All unauthorized requests are blocked",
    "metadata": {
      "event_code": "All unauthorized requests are blocked",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN01",
        "@Policy"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ \"{result}\" is not an error\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ \"{result}\" is not an error\n✗ I attempt policy check \"object-storage-no-public-principals\" for control \"CCC.ObjStor.CN01\" assessment requirement \"AR04\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" - Error: policy check failed: Azure Storage RBAC in Use: \n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775673304,
    "time_dt": "2026-04-08T18:35:04Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN01.AR04"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775673305,
      "created_time_dt": "2026-04-08T18:35:05Z",
      "desc": "Compliance test scenario: Service enforces uniform bucket-level access by rejecting object-level permissions",
      "title": "Service enforces uniform bucket-level access by rejecting object-level permissions",
      "types": [],
      "uid": "ccc-test-1674-1775673305"
    },
    "message": "Service enforces uniform bucket-level access by rejecting object-level permissions",
    "metadata": {
      "event_code": "Service enforces uniform bucket-level access by rejecting object-level permissions",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN02",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"test-object={Timestamp}.txt\", and \"test data\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: failed to upload blob test-object=1775673305596.txt: AzureCLICredential: ERROR: AADSTS700024: Client assertion is not within its valid time range. Current time: 2026-04-08T18:35:06.0038260Z, assertion valid from 2026-04-08T17:37:53.0000000Z, expiry time of assertion 2026-04-08T17:42:53.0000000Z. Review the documentation at https://learn.microsoft.com/entra/identity-platform/certificate-credentials . Trace ID: 4549b10f-2eb7-4906-9af9-03b39e491400 Correlation ID: 1d2f5a44-bfc0-4b1f-94b3-cf890635e117 Timestamp: 2026-04-08 18:35:06Z\nRun the command below to authenticate interactively; additional arguments may be added as needed:\naz logout\naz login\n\n⊘ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-read\", \"{UID}\", and \"read\" (skipped)\n⊘ I refer to \"{result}\" as \"testUserRead\" (skipped)\n⊘ I attach \"{result}\" to the test output as \"read-user-identity.json\" (skipped)\n⊘ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserRead}\", and \"{true}\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"ReadObject\" using arguments \"{ResourceName}\" and \"test-object={Timestamp}.txt\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I call \"{storage}\" with \"SetObjectPermission\" using arguments \"{ResourceName}\", \"test-object={Timestamp}.txt\", and \"none\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"set-object-permission-error.txt\" (skipped)\n⊘ I call \"{userStorage}\" with \"ReadObject\" using arguments \"{ResourceName}\" and \"test-object={Timestamp}.txt\" (skipped)\n⊘ \"{result}\" is not an error (skipped)",
    "status_id": 1,
    "time": 1775673305,
    "time_dt": "2026-04-08T18:35:05Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN02.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775673306,
      "created_time_dt": "2026-04-08T18:35:06Z",
      "desc": "Compliance test scenario: Test policy for uniform access",
      "title": "Test policy for uniform access",
      "types": [],
      "uid": "ccc-test-1682-1775673306"
    },
    "message": "Test policy for uniform access",
    "metadata": {
      "event_code": "Test policy for uniform access",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN02",
        "@Policy"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✗ I attempt policy check \"uniform-bucket-level-access\" for control \"CCC.ObjStor.CN02\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" - Error: policy check failed: Azure Blob Uniform Access Check: query execution failed: exit status 1\nOutput: ERROR: AADSTS700024: Client assertion is not within its valid time range. Current time: 2026-04-08T18:35:06.8631348Z, assertion valid from 2026-04-08T17:37:53.0000000Z, expiry time of assertion 2026-04-08T17:42:53.0000000Z. Review the documentation at https://learn.microsoft.com/entra/identity-platform/certificate-credentials . Trace ID: ab09e371-d8db-4951-abad-bc2c234a2e00 Correlation ID: b567dbef-fa9d-4a57-aa5a-004ad8939956 Timestamp: 2026-04-08 18:35:06Z\nRun the command below to authenticate interactively; additional arguments may be added as needed:\naz logout\naz login\n\n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775673306,
    "time_dt": "2026-04-08T18:35:06Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN02.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775673307,
      "created_time_dt": "2026-04-08T18:35:07Z",
      "desc": "Compliance test scenario: Service enforces uniform bucket-level access denial",
      "title": "Service enforces uniform bucket-level access denial",
      "types": [],
      "uid": "ccc-test-1737-1775673307"
    },
    "message": "Service enforces uniform bucket-level access denial",
    "metadata": {
      "event_code": "Service enforces uniform bucket-level access denial",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN02",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"test-object={Timestamp}.txt\", and \"test data\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: failed to upload blob test-object=1775673307093.txt: AzureCLICredential: ERROR: AADSTS700024: Client assertion is not within its valid time range. Current time: 2026-04-08T18:35:07.4515245Z, assertion valid from 2026-04-08T17:37:53.0000000Z, expiry time of assertion 2026-04-08T17:42:53.0000000Z. Review the documentation at https://learn.microsoft.com/entra/identity-platform/certificate-credentials . Trace ID: 46499c48-1e1d-43e5-85a3-5a6bc5bc3f00 Correlation ID: f1dc21cb-d3ef-44b5-b22d-639d2a5fb3c3 Timestamp: 2026-04-08 18:35:07Z\nRun the command below to authenticate interactively; additional arguments may be added as needed:\naz logout\naz login\n\n⊘ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-no-access\", \"{UID}\", and \"none\" (skipped)\n⊘ I refer to \"{result}\" as \"testUserNoAccess\" (skipped)\n⊘ I attach \"{result}\" to the test output as \"no-access-user-identity.json\" (skipped)\n⊘ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserNoAccess}\", and \"{false}\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"ReadObject\" using arguments \"{ResourceName}\" and \"test-object={Timestamp}.txt\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I call \"{storage}\" with \"SetObjectPermission\" using arguments \"{ResourceName}\", \"test-object={Timestamp}.txt\", and \"read\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"set-object-permission-error.txt\" (skipped)\n⊘ I call \"{userStorage}\" with \"ReadObject\" using arguments \"{ResourceName}\" and \"test-object={Timestamp}.txt\" (skipped)\n⊘ \"{result}\" is an error (skipped)",
    "status_id": 1,
    "time": 1775673307,
    "time_dt": "2026-04-08T18:35:07Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN02.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775673307,
      "created_time_dt": "2026-04-08T18:35:07Z",
      "desc": "Compliance test scenario: Uniform bucket-level access prevents object-level deny overrides - Duplicate",
      "title": "Uniform bucket-level access prevents object-level deny overrides - Duplicate",
      "types": [],
      "uid": "ccc-test-1744-1775673307"
    },
    "message": "Uniform bucket-level access prevents object-level deny overrides - Duplicate",
    "metadata": {
      "event_code": "Uniform bucket-level access prevents object-level deny overrides - Duplicate",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN02",
        "@Policy",
        "@Duplicate",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775673307,
    "time_dt": "2026-04-08T18:35:07Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN02.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775673307,
      "created_time_dt": "2026-04-08T18:35:07Z",
      "desc": "Compliance test scenario: Service supports bucket soft delete and recovery",
      "title": "Service supports bucket soft delete and recovery",
      "types": [],
      "uid": "ccc-test-1798-1775673307"
    },
    "message": "Service supports bucket soft delete and recovery",
    "metadata": {
      "event_code": "Service supports bucket soft delete and recovery",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN03",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{storage}\" with \"CreateBucket\" using argument \"ccc-test-soft-delete\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: failed to create container: failed to create container ccc-test-soft-delete: AzureCLICredential: ERROR: AADSTS700024: Client assertion is not within its valid time range. Current time: 2026-04-08T18:35:07.9848824Z, assertion valid from 2026-04-08T17:37:53.0000000Z, expiry time of assertion 2026-04-08T17:42:53.0000000Z. Review the documentation at https://learn.microsoft.com/entra/identity-platform/certificate-credentials . Trace ID: 4683d8a7-b571-4cdd-97c0-19d35d630100 Correlation ID: b8c86d63-92bd-40f0-b0a1-62df8e76fc57 Timestamp: 2026-04-08 18:35:07Z\nRun the command below to authenticate interactively; additional arguments may be added as needed:\naz logout\naz login\n\n⊘ I refer to \"{result}\" as \"testBucket\" (skipped)\n⊘ I attach \"{result}\" to the test output as \"created-bucket.json\" (skipped)\n⊘ I call \"{storage}\" with \"DeleteBucket\" using argument \"ccc-test-soft-delete\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I call \"{storage}\" with \"ListDeletedBuckets\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"deleted-buckets.json\" (skipped)\n? \"{result}\" should have length greater than \"0\" (undefined)\n⊘ I call \"{storage}\" with \"RestoreBucket\" using argument \"ccc-test-soft-delete\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I call \"{storage}\" with \"ListBuckets\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"restored-buckets.json\" (skipped)\n⊘ I call \"{storage}\" with \"DeleteBucket\" using argument \"ccc-test-soft-delete\" (skipped)\n⊘ \"{result}\" is not an error (skipped)",
    "status_id": 1,
    "time": 1775673307,
    "time_dt": "2026-04-08T18:35:07Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN03.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775673308,
      "created_time_dt": "2026-04-08T18:35:08Z",
      "desc": "Compliance test scenario: Test policy for bucket soft delete",
      "title": "Test policy for bucket soft delete",
      "types": [],
      "uid": "ccc-test-1804-1775673308"
    },
    "message": "Test policy for bucket soft delete",
    "metadata": {
      "event_code": "Test policy for bucket soft delete",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN03",
        "@Policy"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✗ I attempt policy check \"bucket-soft-delete\" for control \"CCC.ObjStor.CN03\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" - Error: policy check failed: Azure Blob Soft Delete Check: query execution failed: exit status 1\nOutput: ERROR: AADSTS700024: Client assertion is not within its valid time range. Current time: 2026-04-08T18:35:08.7540070Z, assertion valid from 2026-04-08T17:37:53.0000000Z, expiry time of assertion 2026-04-08T17:42:53.0000000Z. Review the documentation at https://learn.microsoft.com/entra/identity-platform/certificate-credentials . Trace ID: 741de93f-4a6c-4004-8d16-6b5b8c62a200 Correlation ID: 42c75dce-6be7-403c-be9d-a250b992c870 Timestamp: 2026-04-08 18:35:08Z\nRun the command below to authenticate interactively; additional arguments may be added as needed:\naz logout\naz login\n\n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775673308,
    "time_dt": "2026-04-08T18:35:08Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN03.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775673308,
      "created_time_dt": "2026-04-08T18:35:08Z",
      "desc": "Compliance test scenario: Service prevents modification of locked retention policy",
      "title": "Service prevents modification of locked retention policy",
      "types": [],
      "uid": "ccc-test-1846-1775673308"
    },
    "message": "Service prevents modification of locked retention policy",
    "metadata": {
      "event_code": "Service prevents modification of locked retention policy",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN03",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{storage}\" with \"GetBucketRetentionDurationDays\" using argument \"{ResourceName}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: failed to get container properties: AzureCLICredential: ERROR: AADSTS700024: Client assertion is not within its valid time range. Current time: 2026-04-08T18:35:09.3417776Z, assertion valid from 2026-04-08T17:37:53.0000000Z, expiry time of assertion 2026-04-08T17:42:53.0000000Z. Review the documentation at https://learn.microsoft.com/entra/identity-platform/certificate-credentials . Trace ID: 6601f236-9ffb-4ed0-a028-c8e1e7400d00 Correlation ID: ed93c3bd-8f28-4036-bc2b-a9c9b410e1d5 Timestamp: 2026-04-08 18:35:09Z\nRun the command below to authenticate interactively; additional arguments may be added as needed:\naz logout\naz login\n\n⊘ I refer to \"{result}\" as \"originalRetention\" (skipped)\n⊘ I attach \"{result}\" to the test output as \"original-retention-days.txt\" (skipped)\n⊘ \"{result}\" should be greater than \"0\" (skipped)\n⊘ I call \"{storage}\" with \"SetBucketRetentionDurationDays\" using arguments \"{ResourceName}\" and \"1\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"set-retention-error.txt\" (skipped)\n⊘ I call \"{storage}\" with \"GetBucketRetentionDurationDays\" using argument \"{ResourceName}\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n? \"{result}\" should equal \"{originalRetention}\" (undefined)",
    "status_id": 1,
    "time": 1775673308,
    "time_dt": "2026-04-08T18:35:08Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN03.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775673309,
      "created_time_dt": "2026-04-08T18:35:09Z",
      "desc": "Compliance test scenario: Test policy for immutable bucket retention lock",
      "title": "Test policy for immutable bucket retention lock",
      "types": [],
      "uid": "ccc-test-1852-1775673309"
    },
    "message": "Test policy for immutable bucket retention lock",
    "metadata": {
      "event_code": "Test policy for immutable bucket retention lock",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN03",
        "@Policy"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✗ I attempt policy check \"bucket-retention-lock\" for control \"CCC.ObjStor.CN03\" assessment requirement \"AR02\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" - Error: policy check failed: Azure Blob Immutability Policy Lock Check: query execution failed: exit status 1\nOutput: ERROR: AADSTS700024: Client assertion is not within its valid time range. Current time: 2026-04-08T18:35:10.1984253Z, assertion valid from 2026-04-08T17:37:53.0000000Z, expiry time of assertion 2026-04-08T17:42:53.0000000Z. Review the documentation at https://learn.microsoft.com/entra/identity-platform/certificate-credentials . Trace ID: a8e4659a-f962-44fa-85a6-12ac926c0000 Correlation ID: f6d6b4ad-3960-4595-afbf-891df83978e0 Timestamp: 2026-04-08 18:35:10Z\nRun the command below to authenticate interactively; additional arguments may be added as needed:\naz logout\naz login\n\n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775673309,
    "time_dt": "2026-04-08T18:35:09Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN03.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775673310,
      "created_time_dt": "2026-04-08T18:35:10Z",
      "desc": "Compliance test scenario: Service applies default retention policy to newly uploaded object",
      "title": "Service applies default retention policy to newly uploaded object",
      "types": [],
      "uid": "ccc-test-1911-1775673310"
    },
    "message": "Service applies default retention policy to newly uploaded object",
    "metadata": {
      "event_code": "Service applies default retention policy to newly uploaded object",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN04",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-write\", \"{UID}\", and \"write\"\n✓ I refer to \"{result}\" as \"testUserWrite\"\n✓ I attach \"{result}\" to the test output as \"write-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserWrite}\", and \"{true}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"test-retention-object={Timestamp}.txt\", and \"protected data\" (skipped)\n⊘ I attach \"{result}\" to the test output as \"uploaded-object.json\" (skipped)\n⊘ I call \"{userStorage}\" with \"GetObjectRetentionDurationDays\" using arguments \"{ResourceName}\" and \"test-retention-object={Timestamp}.txt\" (skipped)\n⊘ \"{result}\" should be greater than \"1\" (skipped)",
    "status_id": 1,
    "time": 1775673310,
    "time_dt": "2026-04-08T18:35:10Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN04.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775673552,
      "created_time_dt": "2026-04-08T18:39:12Z",
      "desc": "Compliance test scenario: Service enforces retention policy on newly created objects",
      "title": "Service enforces retention policy on newly created objects",
      "types": [],
      "uid": "ccc-test-1922-1775673552"
    },
    "message": "Service enforces retention policy on newly created objects",
    "metadata": {
      "event_code": "Service enforces retention policy on newly created objects",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN04",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"immediate-delete-test={Timestamp}.txt\", and \"test content\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: failed to upload blob immediate-delete-test=1775673552900.txt: AzureCLICredential: ERROR: AADSTS700024: Client assertion is not within its valid time range. Current time: 2026-04-08T18:39:13.3820455Z, assertion valid from 2026-04-08T17:37:53.0000000Z, expiry time of assertion 2026-04-08T17:42:53.0000000Z. Review the documentation at https://learn.microsoft.com/entra/identity-platform/certificate-credentials . Trace ID: 1878ce1e-a386-4d6c-81d7-3f536e474500 Correlation ID: fb579ac3-e0f4-4c58-ae78-509789e6b2ec Timestamp: 2026-04-08 18:39:13Z\nRun the command below to authenticate interactively; additional arguments may be added as needed:\naz logout\naz login\n\n⊘ I call \"{storage}\" with \"DeleteObject\" using arguments \"{ResourceName}\" and \"immediate-delete-test={Timestamp}.txt\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"immediate-delete-error.txt\" (skipped)",
    "status_id": 1,
    "time": 1775673552,
    "time_dt": "2026-04-08T18:39:12Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN04.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775673553,
      "created_time_dt": "2026-04-08T18:39:13Z",
      "desc": "Compliance test scenario: Service validates retention period meets minimum requirements",
      "title": "Service validates retention period meets minimum requirements",
      "types": [],
      "uid": "ccc-test-1932-1775673553"
    },
    "message": "Service validates retention period meets minimum requirements",
    "metadata": {
      "event_code": "Service validates retention period meets minimum requirements",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN04",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"retention-period-test={Timestamp}.txt\", and \"compliance data\"\n✓ I call \"{storage}\" with \"GetObjectRetentionDurationDays\" using arguments \"{ResourceName}\" and \"retention-period-test={Timestamp}.txt\"\n✗ \"{result}\" should be greater than \"1\" - Error: cannot parse {result} as number: strconv.ParseFloat: parsing \"failed to get blob properties: AzureCLICredential: ERROR: AADSTS700024: Client assertion is not within its valid time range. Current time: 2026-04-08T18:39:14.7711109Z, assertion valid from 2026-04-08T17:37:53.0000000Z, expiry time of assertion 2026-04-08T17:42:53.0000000Z. Review the documentation at https://learn.microsoft.com/entra/identity-platform/certificate-credentials . Trace ID: 2f27d4bb-74d6-4b6e-b065-7f0a8e920100 Correlation ID: e6a2f61c-3300-45e4-9ee8-be7d431df845 Timestamp: 2026-04-08 18:39:14Z\\nRun the command below to authenticate interactively; additional arguments may be added as needed:\\naz logout\\naz login\\n\": invalid syntax\n⊘ I attach \"{result}\" to the test output as \"retention-period-days.json\" (skipped)",
    "status_id": 1,
    "time": 1775673553,
    "time_dt": "2026-04-08T18:39:13Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN04.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775673554,
      "created_time_dt": "2026-04-08T18:39:14Z",
      "desc": "Compliance test scenario: Test policy for default object retention",
      "title": "Test policy for default object retention",
      "types": [],
      "uid": "ccc-test-1940-1775673554"
    },
    "message": "Test policy for default object retention",
    "metadata": {
      "event_code": "Test policy for default object retention",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN04",
        "@Policy"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✗ I attempt policy check \"object-default-retention\" for control \"CCC.ObjStor.CN04\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" - Error: policy check failed: Azure Blob Default Immutability Policy Check: query execution failed: exit status 1\nOutput: ERROR: AADSTS700024: Client assertion is not within its valid time range. Current time: 2026-04-08T18:39:15.6727884Z, assertion valid from 2026-04-08T17:37:53.0000000Z, expiry time of assertion 2026-04-08T17:42:53.0000000Z. Review the documentation at https://learn.microsoft.com/entra/identity-platform/certificate-credentials . Trace ID: a9f0a44e-2c38-4568-b592-9743e1e81100 Correlation ID: dd794153-e0c7-4854-b75c-94e4f01c83e3 Timestamp: 2026-04-08 18:39:15Z\nRun the command below to authenticate interactively; additional arguments may be added as needed:\naz logout\naz login\n\n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775673554,
    "time_dt": "2026-04-08T18:39:14Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN04.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775673555,
      "created_time_dt": "2026-04-08T18:39:15Z",
      "desc": "Compliance test scenario: Service prevents object deletion by write user during retention period",
      "title": "Service prevents object deletion by write user during retention period",
      "types": [],
      "uid": "ccc-test-2028-1775673555"
    },
    "message": "Service prevents object deletion by write user during retention period",
    "metadata": {
      "event_code": "Service prevents object deletion by write user during retention period",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN04",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-write\", \"{UID}\", and \"write\"\n✓ I refer to \"{result}\" as \"testUserWrite\"\n✓ I attach \"{result}\" to the test output as \"write-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserWrite}\", and \"{true}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"protected-object={Timestamp}.txt\", and \"immutable data\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"protected-object.json\" (skipped)\n⊘ I call \"{userStorage}\" with \"DeleteObject\" using arguments \"{ResourceName}\" and \"protected-object={Timestamp}.txt\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"delete-protected-error.txt\" (skipped)\n? \"{result}\" should contain one of \"retention, locked, immutable, protected\" (undefined)",
    "status_id": 1,
    "time": 1775673555,
    "time_dt": "2026-04-08T18:39:15Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN04.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775673798,
      "created_time_dt": "2026-04-08T18:43:18Z",
      "desc": "Compliance test scenario: Service prevents object deletion by admin user during retention period",
      "title": "Service prevents object deletion by admin user during retention period",
      "types": [],
      "uid": "ccc-test-2039-1775673798"
    },
    "message": "Service prevents object deletion by admin user during retention period",
    "metadata": {
      "event_code": "Service prevents object deletion by admin user during retention period",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN04",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"admin-protected-object={Timestamp}.txt\", and \"compliance data\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: failed to upload blob admin-protected-object=1775673798250.txt: AzureCLICredential: ERROR: AADSTS700024: Client assertion is not within its valid time range. Current time: 2026-04-08T18:43:18.7499682Z, assertion valid from 2026-04-08T17:37:53.0000000Z, expiry time of assertion 2026-04-08T17:42:53.0000000Z. Review the documentation at https://learn.microsoft.com/entra/identity-platform/certificate-credentials . Trace ID: dd5c4c89-6032-414a-972d-143c30030f00 Correlation ID: a9b87fb0-3a13-483e-833e-9e8489c31bc6 Timestamp: 2026-04-08 18:43:18Z\nRun the command below to authenticate interactively; additional arguments may be added as needed:\naz logout\naz login\n\n⊘ I call \"{storage}\" with \"DeleteObject\" using arguments \"{ResourceName}\" and \"admin-protected-object={Timestamp}.txt\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"admin-delete-protected-error.txt\" (skipped)",
    "status_id": 1,
    "time": 1775673798,
    "time_dt": "2026-04-08T18:43:18Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN04.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775673798,
      "created_time_dt": "2026-04-08T18:43:18Z",
      "desc": "Compliance test scenario: Service prevents object modification during retention period",
      "title": "Service prevents object modification during retention period",
      "types": [],
      "uid": "ccc-test-2057-1775673798"
    },
    "message": "Service prevents object modification during retention period",
    "metadata": {
      "event_code": "Service prevents object modification during retention period",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN04",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-write\", \"{UID}\", and \"write\"\n✓ I refer to \"{result}\" as \"testUserWrite\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserWrite}\", and \"{true}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"modify-test-object={Timestamp}.txt\", and \"original content\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"original-object.json\" (skipped)\n⊘ I call \"{userStorage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"modify-test-object={Timestamp}.txt\", and \"modified content\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"modify-protected-error.txt\" (skipped)\n? \"{result}\" should contain one of \"retention, locked, immutable, protected, exists\" (undefined)",
    "status_id": 1,
    "time": 1775673798,
    "time_dt": "2026-04-08T18:43:18Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN04.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775674041,
      "created_time_dt": "2026-04-08T18:47:21Z",
      "desc": "Compliance test scenario: Service allows object read access during retention period",
      "title": "Service allows object read access during retention period",
      "types": [],
      "uid": "ccc-test-2076-1775674041"
    },
    "message": "Service allows object read access during retention period",
    "metadata": {
      "event_code": "Service allows object read access during retention period",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN04",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"readable-protected-object={Timestamp}.txt\", and \"readable data\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: failed to upload blob readable-protected-object=1775674041403.txt: AzureCLICredential: ERROR: AADSTS700024: Client assertion is not within its valid time range. Current time: 2026-04-08T18:47:21.7830571Z, assertion valid from 2026-04-08T17:37:53.0000000Z, expiry time of assertion 2026-04-08T17:42:53.0000000Z. Review the documentation at https://learn.microsoft.com/entra/identity-platform/certificate-credentials . Trace ID: ae214633-721c-4e8e-bf3b-bbbe7ff50100 Correlation ID: 4c56d1d0-c18e-4baa-9833-330cc6058526 Timestamp: 2026-04-08 18:47:21Z\nRun the command below to authenticate interactively; additional arguments may be added as needed:\naz logout\naz login\n\n⊘ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-read\", \"{UID}\", and \"read\" (skipped)\n⊘ I refer to \"{result}\" as \"testUserRead\" (skipped)\n⊘ I attach \"{result}\" to the test output as \"read-user-identity.json\" (skipped)\n⊘ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserRead}\", and \"{true}\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"ReadObject\" using arguments \"{ResourceName}\" and \"readable-protected-object={Timestamp}.txt\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I refer to \"{result}\" as \"readResult\" (skipped)\n⊘ I attach \"{result}\" to the test output as \"read-protected-object.json\" (skipped)\n⊘ \"{readResult.Name}\" is \"readable-protected-object={Timestamp}.txt\" (skipped)",
    "status_id": 1,
    "time": 1775674041,
    "time_dt": "2026-04-08T18:47:21Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN04.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775674041,
      "created_time_dt": "2026-04-08T18:47:21Z",
      "desc": "Compliance test scenario: Test policy for object retention enforcement",
      "title": "Test policy for object retention enforcement",
      "types": [],
      "uid": "ccc-test-2084-1775674041"
    },
    "message": "Test policy for object retention enforcement",
    "metadata": {
      "event_code": "Test policy for object retention enforcement",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN04",
        "@Policy"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✗ I attempt policy check \"object-retention-enforcement\" for control \"CCC.ObjStor.CN04\" assessment requirement \"AR02\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" - Error: policy check failed: Azure Blob Object Retention Enforcement Check: query execution failed: exit status 1\nOutput: ERROR: AADSTS700024: Client assertion is not within its valid time range. Current time: 2026-04-08T18:47:22.4276460Z, assertion valid from 2026-04-08T17:37:53.0000000Z, expiry time of assertion 2026-04-08T17:42:53.0000000Z. Review the documentation at https://learn.microsoft.com/entra/identity-platform/certificate-credentials . Trace ID: bd229009-8104-4142-9d16-22b83e160e00 Correlation ID: b2e22624-ae73-4104-9bfe-b3552df72033 Timestamp: 2026-04-08 18:47:22Z\nRun the command below to authenticate interactively; additional arguments may be added as needed:\naz logout\naz login\n\n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775674041,
    "time_dt": "2026-04-08T18:47:21Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN04.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775674042,
      "created_time_dt": "2026-04-08T18:47:22Z",
      "desc": "Compliance test scenario: Service enables versioning and objects receive unique version identifiers",
      "title": "Service enables versioning and objects receive unique version identifiers",
      "types": [],
      "uid": "ccc-test-2118-1775674042"
    },
    "message": "Service enables versioning and objects receive unique version identifiers",
    "metadata": {
      "event_code": "Service enables versioning and objects receive unique version identifiers",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@CCC.ObjStor.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{storage}\" with \"IsBucketVersioningEnabled\" using argument \"{ResourceName}\"\n✓ \"{result}\" is true\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"versioned-object.txt\", and \"test content\"\n✓ I refer to \"{result}\" as \"createdObject\"\n? \"{createdObject.VersionID}\" is not empty (undefined)\n⊘ I attach \"{result}\" to the test output as \"versioned-object.json\" (skipped)",
    "status_id": 1,
    "time": 1775674042,
    "time_dt": "2026-04-08T18:47:22Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN05.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775674043,
      "created_time_dt": "2026-04-08T18:47:23Z",
      "desc": "Compliance test scenario: Objects are stored with unique version identifiers",
      "title": "Objects are stored with unique version identifiers",
      "types": [],
      "uid": "ccc-test-2124-1775674043"
    },
    "message": "Objects are stored with unique version identifiers",
    "metadata": {
      "event_code": "Objects are stored with unique version identifiers",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@CCC.ObjStor.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✗ I attempt policy check \"object-storage-versioning\" for control \"CCC.ObjStor.CN05\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" - Error: policy check failed: Azure Blob Versioning Configuration: query execution failed: exit status 1\nOutput: ERROR: AADSTS700024: Client assertion is not within its valid time range. Current time: 2026-04-08T18:47:23.7701422Z, assertion valid from 2026-04-08T17:37:53.0000000Z, expiry time of assertion 2026-04-08T17:42:53.0000000Z. Review the documentation at https://learn.microsoft.com/entra/identity-platform/certificate-credentials . Trace ID: c5501534-9fb7-433d-b264-b1108dee5300 Correlation ID: 5ca64cb6-d458-4410-97e4-09325628e601 Timestamp: 2026-04-08 18:47:23Z\nRun the command below to authenticate interactively; additional arguments may be added as needed:\naz logout\naz login\n\n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775674043,
    "time_dt": "2026-04-08T18:47:23Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN05.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775674043,
      "created_time_dt": "2026-04-08T18:47:23Z",
      "desc": "Compliance test scenario: Modified objects receive new version identifiers",
      "title": "Modified objects receive new version identifiers",
      "types": [],
      "uid": "ccc-test-2156-1775674043"
    },
    "message": "Modified objects receive new version identifiers",
    "metadata": {
      "event_code": "Modified objects receive new version identifiers",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@CCC.ObjStor.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"version-test-object={Timestamp}.txt\", and \"original content\"\n✓ I refer to \"{result.VersionID}\" as \"version1\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"version-test-object={Timestamp}.txt\", and \"modified content\"\n✓ I refer to \"{result.VersionID}\" as \"version2\"\n? \"{version1}\" is not equal to \"{version2}\" (undefined)",
    "status_id": 1,
    "time": 1775674043,
    "time_dt": "2026-04-08T18:47:23Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN05.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775674045,
      "created_time_dt": "2026-04-08T18:47:25Z",
      "desc": "Compliance test scenario: Modified objects receive new version identifiers - Duplicate",
      "title": "Modified objects receive new version identifiers - Duplicate",
      "types": [],
      "uid": "ccc-test-2161-1775674045"
    },
    "message": "Modified objects receive new version identifiers - Duplicate",
    "metadata": {
      "event_code": "Modified objects receive new version identifiers - Duplicate",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@CCC.ObjStor.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@Duplicate"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775674045,
    "time_dt": "2026-04-08T18:47:25Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN05.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775674045,
      "created_time_dt": "2026-04-08T18:47:25Z",
      "desc": "Compliance test scenario: Modified objects receive new version identifiers",
      "title": "Modified objects receive new version identifiers",
      "types": [],
      "uid": "ccc-test-2202-1775674045"
    },
    "message": "Modified objects receive new version identifiers",
    "metadata": {
      "event_code": "Modified objects receive new version identifiers",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@CCC.ObjStor.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"version-test-object={Timestamp}.txt\", and \"original content\"\n✓ I refer to \"{result.VersionID}\" as \"version1\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"version-test-object={Timestamp}.txt\", and \"modified content\"\n✓ I refer to \"{result.VersionID}\" as \"version2\"\n✓ I call \"{storage}\" with \"ReadObjectAtVersion\" using arguments \"{ResourceName}\", \"version-test-object={Timestamp}.txt\", and \"{version1}\"\n✓ I attach \"{result}\" to the test output as \"original-content.json\"\n✗ \"{result.Data}\" contains \"original content\" - Error: expected {result.Data} to contain 'original content', but got '\u003cnil\u003e'\n⊘ I call \"{storage}\" with \"ReadObjectAtVersion\" using arguments \"{ResourceName}\", \"version-test-object={Timestamp}.txt\", and \"{version2}\" (skipped)\n⊘ \"{result.Data}\" contains \"modified content\" (skipped)\n⊘ I attach \"{result}\" to the test output as \"modified-content.json\" (skipped)",
    "status_id": 1,
    "time": 1775674045,
    "time_dt": "2026-04-08T18:47:25Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN05.AR03"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775674046,
      "created_time_dt": "2026-04-08T18:47:26Z",
      "desc": "Compliance test scenario: Previous object versions can be recovered",
      "title": "Previous object versions can be recovered",
      "types": [],
      "uid": "ccc-test-2207-1775674046"
    },
    "message": "Previous object versions can be recovered",
    "metadata": {
      "event_code": "Previous object versions can be recovered",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@CCC.ObjStor.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775674046,
    "time_dt": "2026-04-08T18:47:26Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN05.AR03"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775674046,
      "created_time_dt": "2026-04-08T18:47:26Z",
      "desc": "Compliance test scenario: Deleted object data can be reloaded from previous version",
      "title": "Deleted object data can be reloaded from previous version",
      "types": [],
      "uid": "ccc-test-2251-1775674046"
    },
    "message": "Deleted object data can be reloaded from previous version",
    "metadata": {
      "event_code": "Deleted object data can be reloaded from previous version",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@CCC.ObjStor.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"recover-deleted-object={Timestamp}.txt\", and \"data to retain\"\n✓ I refer to \"{result.VersionID}\" as \"retainedVersionId\"\n✓ I call \"{storage}\" with \"DeleteObject\" using arguments \"{ResourceName}\" and \"recover-deleted-object={Timestamp}.txt\"\n✓ I call \"{storage}\" with \"ReadObjectAtVersion\" using arguments \"{ResourceName}\", \"recover-deleted-object={Timestamp}.txt\", and \"{retainedVersionId}\"\n✗ \"{result.Data}\" contains \"data to retain\" - Error: expected {result.Data} to contain 'data to retain', but got '\u003cnil\u003e'\n⊘ I attach \"{result}\" to the test output as \"recovered-deleted-version.json\" (skipped)",
    "status_id": 1,
    "time": 1775674046,
    "time_dt": "2026-04-08T18:47:26Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN05.AR04"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775674048,
      "created_time_dt": "2026-04-08T18:47:28Z",
      "desc": "Compliance test scenario: Deleted object version remains in version list",
      "title": "Deleted object version remains in version list",
      "types": [],
      "uid": "ccc-test-2261-1775674048"
    },
    "message": "Deleted object version remains in version list",
    "metadata": {
      "event_code": "Deleted object version remains in version list",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@CCC.ObjStor.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"list-deleted-versions-object={Timestamp}.txt\", and \"versioned data\"\n✓ I refer to \"{result.VersionID}\" as \"listedVersionId\"\n✓ I call \"{storage}\" with \"DeleteObject\" using arguments \"{ResourceName}\" and \"list-deleted-versions-object={Timestamp}.txt\"\n✓ I call \"{storage}\" with \"ListObjectVersions\" using arguments \"{ResourceName}\" and \"list-deleted-versions-object={Timestamp}.txt\"\n✗ \"{result}\" is an array of objects with at least the following contents - Error: field {result} is not an array\n⊘ I attach \"{result}\" to the test output as \"versions-after-delete.json\" (skipped)",
    "status_id": 1,
    "time": 1775674048,
    "time_dt": "2026-04-08T18:47:28Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN05.AR04"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775674049,
      "created_time_dt": "2026-04-08T18:47:29Z",
      "desc": "Compliance test scenario: Object versions are retained after deletion - Duplicate",
      "title": "Object versions are retained after deletion - Duplicate",
      "types": [],
      "uid": "ccc-test-2266-1775674049"
    },
    "message": "Object versions are retained after deletion - Duplicate",
    "metadata": {
      "event_code": "Object versions are retained after deletion - Duplicate",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@CCC.ObjStor.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@Duplicate"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260408t173437z/providers/Microsoft.Storage/storageAccounts/stgcfi20260408t173437z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775674049,
    "time_dt": "2026-04-08T18:47:29Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN05.AR04"
        ]
      }
    }
  }
]