[
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775153019,
      "created_time_dt": "2026-04-02T18:03:39Z",
      "desc": "Compliance test scenario: Service accepts TLS 1.3 encrypted traffic",
      "title": "Service accepts TLS 1.3 encrypted traffic",
      "types": [],
      "uid": "ccc-test-103-1775153019"
    },
    "message": "Service accepts TLS 1.3 encrypted traffic",
    "metadata": {
      "event_code": "Service accepts TLS 1.3 encrypted traffic",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@CCC.Core",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core.CN01",
        "@Behavioural",
        "@PerPort",
        "@tls",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": "https service on stgcfi20260402t161720z.blob.core.windows.net:443",
          "metadata": {
            "findings": [],
            "name": "stgcfi20260402t161720z.blob.core.windows.net",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "stgcfi20260402t161720z.blob.core.windows.net",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ an openssl s_client request using \"tls1_3\" to \"{portNumber}\" on \"{hostName}\" protocol \"{protocol}\"\n✓ I refer to \"{result}\" as \"connection\"\n✓ \"{connection}\" state is open\n✓ \"{connection.State}\" is \"open\"\n✓ I close connection \"{connection}\"\n✓ \"{connection}\" state is closed",
    "status_id": 1,
    "time": 1775153019,
    "time_dt": "2026-04-02T18:03:39Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775153019,
      "created_time_dt": "2026-04-02T18:03:39Z",
      "desc": "Compliance test scenario: Service rejects TLS 1.2 traffic",
      "title": "Service rejects TLS 1.2 traffic",
      "types": [],
      "uid": "ccc-test-109-1775153019"
    },
    "message": "Service rejects TLS 1.2 traffic",
    "metadata": {
      "event_code": "Service rejects TLS 1.2 traffic",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@CCC.Core",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core.CN01",
        "@Behavioural",
        "@PerPort",
        "@tls",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": "https service on stgcfi20260402t161720z.blob.core.windows.net:443",
          "metadata": {
            "findings": [],
            "name": "stgcfi20260402t161720z.blob.core.windows.net",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "stgcfi20260402t161720z.blob.core.windows.net",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ an openssl s_client request using \"tls1_2\" to \"{portNumber}\" on \"{hostName}\" protocol \"{protocol}\"\n✓ I refer to \"{result}\" as \"connection\"\n✓ we wait for a period of \"40\" ms\n✓ \"{connection.State}\" is \"closed\"",
    "status_id": 1,
    "time": 1775153019,
    "time_dt": "2026-04-02T18:03:39Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775153019,
      "created_time_dt": "2026-04-02T18:03:39Z",
      "desc": "Compliance test scenario: Service rejects TLS 1.1 traffic",
      "title": "Service rejects TLS 1.1 traffic",
      "types": [],
      "uid": "ccc-test-115-1775153019"
    },
    "message": "Service rejects TLS 1.1 traffic",
    "metadata": {
      "event_code": "Service rejects TLS 1.1 traffic",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@CCC.Core",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core.CN01",
        "@Behavioural",
        "@PerPort",
        "@tls",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": "https service on stgcfi20260402t161720z.blob.core.windows.net:443",
          "metadata": {
            "findings": [],
            "name": "stgcfi20260402t161720z.blob.core.windows.net",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "stgcfi20260402t161720z.blob.core.windows.net",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ an openssl s_client request using \"tls1_1\" to \"{portNumber}\" on \"{hostName}\" protocol \"{protocol}\"\n✓ I refer to \"{result}\" as \"connection\"\n✓ we wait for a period of \"40\" ms\n✓ \"{connection.State}\" is \"closed\"",
    "status_id": 1,
    "time": 1775153019,
    "time_dt": "2026-04-02T18:03:39Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775153020,
      "created_time_dt": "2026-04-02T18:03:40Z",
      "desc": "Compliance test scenario: Service rejects TLS 1.0 traffic",
      "title": "Service rejects TLS 1.0 traffic",
      "types": [],
      "uid": "ccc-test-121-1775153020"
    },
    "message": "Service rejects TLS 1.0 traffic",
    "metadata": {
      "event_code": "Service rejects TLS 1.0 traffic",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@CCC.Core",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core.CN01",
        "@Behavioural",
        "@PerPort",
        "@tls",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": "https service on stgcfi20260402t161720z.blob.core.windows.net:443",
          "metadata": {
            "findings": [],
            "name": "stgcfi20260402t161720z.blob.core.windows.net",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "stgcfi20260402t161720z.blob.core.windows.net",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ an openssl s_client request using \"tls1\" to \"{portNumber}\" on \"{hostName}\" protocol \"{protocol}\"\n✓ I refer to \"{result}\" as \"connection\"\n✓ we wait for a period of \"40\" ms\n✓ \"{connection.State}\" is \"closed\"",
    "status_id": 1,
    "time": 1775153020,
    "time_dt": "2026-04-02T18:03:40Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775153020,
      "created_time_dt": "2026-04-02T18:03:40Z",
      "desc": "Compliance test scenario: Verify SSL/TLS protocol support",
      "title": "Verify SSL/TLS protocol support",
      "types": [],
      "uid": "ccc-test-126-1775153020"
    },
    "message": "Verify SSL/TLS protocol support",
    "metadata": {
      "event_code": "Verify SSL/TLS protocol support",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@CCC.Core",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core.CN01",
        "@Behavioural",
        "@PerPort",
        "@tls",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": "https service on stgcfi20260402t161720z.blob.core.windows.net:443",
          "metadata": {
            "findings": [],
            "name": "stgcfi20260402t161720z.blob.core.windows.net",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "stgcfi20260402t161720z.blob.core.windows.net",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ \"report\" contains details of SSL Support type \"protocols\" for \"{hostName}\" on port \"{portNumber}\"\n✗ \"{report}\" is an array of objects which doesn't contain any of - Error: unwanted row found in array: map[finding:offered id:TLS1_2]\n⊘ \"{report}\" is an array of objects with at least the following contents (skipped)",
    "status_id": 1,
    "time": 1775153020,
    "time_dt": "2026-04-02T18:03:40Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775153026,
      "created_time_dt": "2026-04-02T18:03:46Z",
      "desc": "Compliance test scenario: Verify no known SSL/TLS vulnerabilities",
      "title": "Verify no known SSL/TLS vulnerabilities",
      "types": [],
      "uid": "ccc-test-130-1775153026"
    },
    "message": "Verify no known SSL/TLS vulnerabilities",
    "metadata": {
      "event_code": "Verify no known SSL/TLS vulnerabilities",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@CCC.Core",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core.CN01",
        "@Behavioural",
        "@PerPort",
        "@tls",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": "https service on stgcfi20260402t161720z.blob.core.windows.net:443",
          "metadata": {
            "findings": [],
            "name": "stgcfi20260402t161720z.blob.core.windows.net",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "stgcfi20260402t161720z.blob.core.windows.net",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ \"report\" contains details of SSL Support type \"vulnerable\" for \"{hostName}\" on port \"{portNumber}\"\n✓ \"{report}\" is an array of objects with at least the following contents",
    "status_id": 1,
    "time": 1775153026,
    "time_dt": "2026-04-02T18:03:46Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775153056,
      "created_time_dt": "2026-04-02T18:04:16Z",
      "desc": "Compliance test scenario: Verify TLS 1.3 only certificate validity",
      "title": "Verify TLS 1.3 only certificate validity",
      "types": [],
      "uid": "ccc-test-134-1775153056"
    },
    "message": "Verify TLS 1.3 only certificate validity",
    "metadata": {
      "event_code": "Verify TLS 1.3 only certificate validity",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@CCC.Core",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core.CN01",
        "@Behavioural",
        "@PerPort",
        "@tls",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": "https service on stgcfi20260402t161720z.blob.core.windows.net:443",
          "metadata": {
            "findings": [],
            "name": "stgcfi20260402t161720z.blob.core.windows.net",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "stgcfi20260402t161720z.blob.core.windows.net",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ \"report\" contains details of SSL Support type \"server-defaults\" for \"{hostName}\" on port \"{portNumber}\"\n✓ \"{report}\" is an array of objects with at least the following contents",
    "status_id": 1,
    "time": 1775153056,
    "time_dt": "2026-04-02T18:04:16Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775153072,
      "created_time_dt": "2026-04-02T18:04:32Z",
      "desc": "Compliance test scenario: HTTP redirects to HTTPS",
      "title": "HTTP redirects to HTTPS",
      "types": [],
      "uid": "ccc-test-275-1775153072"
    },
    "message": "HTTP redirects to HTTPS",
    "metadata": {
      "event_code": "HTTP redirects to HTTPS",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core",
        "@CCC.Core.CN01",
        "@PerPort",
        "@Behavioural",
        "@http",
        "@tls",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": "https service on stgcfi20260402t161720z.blob.core.windows.net:443",
          "metadata": {
            "findings": [],
            "name": "stgcfi20260402t161720z.blob.core.windows.net",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "stgcfi20260402t161720z.blob.core.windows.net",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a client connects to \"{hostName}\" with protocol \"http\" on port \"80\"\n✓ I refer to \"{result}\" as \"connection\"\n✓ \"{connection}\" is not an error\n✓ I transmit \"GET / HTTP/1.1\\r\\nHost: {hostName}\\r\\n\\r\\n\" to \"{connection}\"\n✓ I attach \"{connection}\" to the test output as \"HTTP response\"\n✗ \"{connection.Output}\" contains \"301\" - Error: expected {connection.Output} to contain '301', but got 'HTTP/1.1 400 The account being accessed does not support http.\r\nContent-Length: 287\r\nContent-Type: application/xml\r\nx-ms-request-id: fc213b26-001e-0002-7fcb-c2d507000000\r\nDate: Thu, 02 Apr 2026 18:04:32 GMT\r\n\r\n﻿\u003c?xml version=\"1.0\" encoding=\"utf-8\"?\u003e\u003cError\u003e\u003cCode\u003eAccountRequiresHttps\u003c/Code\u003e\u003cMessage\u003eThe account being accessed does not support http.\nRequestId:fc213b26-001e-0002-7fcb-c2d507000000\nTime:2026-04-02T18:04:32.5604920Z\u003c/Message\u003e\u003cAccountName\u003estgcfi20260402t161720z\u003c/AccountName\u003e\u003c/Error\u003e'\n⊘ I call \"{connection}\" with \"Close\" (skipped)\n⊘ \"{connection.State}\" is \"closed\" (skipped)",
    "status_id": 1,
    "time": 1775153072,
    "time_dt": "2026-04-02T18:04:32Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR03"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775153073,
      "created_time_dt": "2026-04-02T18:04:33Z",
      "desc": "Compliance test scenario: Only secure protocols are exposed",
      "title": "Only secure protocols are exposed",
      "types": [],
      "uid": "ccc-test-288-1775153073"
    },
    "message": "Only secure protocols are exposed",
    "metadata": {
      "event_code": "Only secure protocols are exposed",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core",
        "@CCC.Core.CN01",
        "@PerPort",
        "@Behavioural",
        "@tls",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": "https service on stgcfi20260402t161720z.blob.core.windows.net:443",
          "metadata": {
            "findings": [],
            "name": "stgcfi20260402t161720z.blob.core.windows.net",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "stgcfi20260402t161720z.blob.core.windows.net",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ \"report\" contains details of SSL Support type \"protocols\" for \"{hostName}\" on port \"{portNumber}\"\n✓ \"{report}\" is an array of objects with at least the following contents",
    "status_id": 1,
    "time": 1775153073,
    "time_dt": "2026-04-02T18:04:33Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR03"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775153079,
      "created_time_dt": "2026-04-02T18:04:39Z",
      "desc": "Compliance test scenario: Verify HTTPS uses IANA-assigned port 443",
      "title": "Verify HTTPS uses IANA-assigned port 443",
      "types": [],
      "uid": "ccc-test-368-1775153079"
    },
    "message": "Verify HTTPS uses IANA-assigned port 443",
    "metadata": {
      "event_code": "Verify HTTPS uses IANA-assigned port 443",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core",
        "@CCC.Core.CN01",
        "@Behavioural",
        "@PerPort",
        "@http",
        "@tls",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": "https service on stgcfi20260402t161720z.blob.core.windows.net:443",
          "metadata": {
            "findings": [],
            "name": "stgcfi20260402t161720z.blob.core.windows.net",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "stgcfi20260402t161720z.blob.core.windows.net",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ \"{portNumber}\" is \"443\"",
    "status_id": 1,
    "time": 1775153079,
    "time_dt": "2026-04-02T18:04:39Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR07"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775153079,
      "created_time_dt": "2026-04-02T18:04:39Z",
      "desc": "Compliance test scenario: Verify mTLS requires client certificate authentication",
      "title": "Verify mTLS requires client certificate authentication",
      "types": [],
      "uid": "ccc-test-422-1775153079"
    },
    "message": "Verify mTLS requires client certificate authentication",
    "metadata": {
      "event_code": "Verify mTLS requires client certificate authentication",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@tls",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core",
        "@CCC.Core.CN01",
        "@Behavioural",
        "@PerPort",
        "@tls",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": "https service on stgcfi20260402t161720z.blob.core.windows.net:443",
          "metadata": {
            "findings": [],
            "name": "stgcfi20260402t161720z.blob.core.windows.net",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "stgcfi20260402t161720z.blob.core.windows.net",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ \"report\" contains details of SSL Support type \"server-defaults\" for \"{hostName}\" on port \"{portNumber}\"\n✗ \"{report}\" is an array of objects with at least the following contents - Error: expected row not found: map[finding:required id:clientAuth]",
    "status_id": 1,
    "time": 1775153079,
    "time_dt": "2026-04-02T18:04:39Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR08"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775149688,
      "created_time_dt": "2026-04-02T17:08:08Z",
      "desc": "Compliance test scenario: Storage account enforces minimum TLS version",
      "title": "Storage account enforces minimum TLS version",
      "types": [],
      "uid": "ccc-test-138-1775149688"
    },
    "message": "Storage account enforces minimum TLS version",
    "metadata": {
      "event_code": "Storage account enforces minimum TLS version",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@CCC.Core",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core.CN01",
        "@Policy",
        "@PerService",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✗ I attempt policy check \"object-storage-tls-policy\" for control \"CCC.Core.CN01\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" - Error: policy check failed: Azure Storage Account TLS Policy Check: \n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775149688,
    "time_dt": "2026-04-02T17:08:08Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775149690,
      "created_time_dt": "2026-04-02T17:08:10Z",
      "desc": "Compliance test scenario: Object storage policy prevents the use of unencrypted ports",
      "title": "Object storage policy prevents the use of unencrypted ports",
      "types": [],
      "uid": "ccc-test-291-1775149690"
    },
    "message": "Object storage policy prevents the use of unencrypted ports",
    "metadata": {
      "event_code": "Object storage policy prevents the use of unencrypted ports",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core",
        "@CCC.Core.CN01",
        "@Policy",
        "@PerService",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✗ I attempt policy check \"object-storage-unencrypted-policy\" for control \"CCC.Core.CN01\" assessment requirement \"AR03\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" - Error: policy check failed: Azure Storage Unencrypted Traffic Block Check: \n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775149690,
    "time_dt": "2026-04-02T17:08:10Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR03"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775149692,
      "created_time_dt": "2026-04-02T17:08:12Z",
      "desc": "Compliance test scenario: Storage account enforces mutual TLS - NotTested",
      "title": "Storage account enforces mutual TLS - NotTested",
      "types": [],
      "uid": "ccc-test-430-1775149692"
    },
    "message": "Storage account enforces mutual TLS - NotTested",
    "metadata": {
      "event_code": "Storage account enforces mutual TLS - NotTested",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@tls",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.Core",
        "@CCC.Core.CN01",
        "@Policy",
        "@NotTested",
        "@PerService",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "Update",
    "status_code": "FAIL",
    "status_detail": "✓ no-op required",
    "status_id": 2,
    "time": 1775149692,
    "time_dt": "2026-04-02T17:08:12Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN01.AR08"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775149692,
      "created_time_dt": "2026-04-02T17:08:12Z",
      "desc": "Compliance test scenario: Verify objects are encrypted at rest",
      "title": "Verify objects are encrypted at rest",
      "types": [],
      "uid": "ccc-test-466-1775149692"
    },
    "message": "Verify objects are encrypted at rest",
    "metadata": {
      "event_code": "Verify objects are encrypted at rest",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN02",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ \"{result}\" is not an error\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"test-encryption-check={Timestamp}.txt\", and \"encryption test data\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: failed to upload blob test-encryption-check=1775149692349.txt: PUT https://stgcfi20260402t161720z.blob.core.windows.net/ccc-test-container-20260402t161720z/test-encryption-check=1775149692349.txt\n--------------------------------------------------------------------------------\nRESPONSE 403: 403 This request is not authorized to perform this operation using this permission.\nERROR CODE: AuthorizationPermissionMismatch\n--------------------------------------------------------------------------------\n﻿\u003c?xml version=\"1.0\" encoding=\"utf-8\"?\u003e\u003cError\u003e\u003cCode\u003eAuthorizationPermissionMismatch\u003c/Code\u003e\u003cMessage\u003eThis request is not authorized to perform this operation using this permission.\nRequestId:0198eff3-f01e-0064-28c3-c29a27000000\nTime:2026-04-02T17:12:14.5066050Z\u003c/Message\u003e\u003c/Error\u003e\n--------------------------------------------------------------------------------\n\n⊘ I refer to \"{result}\" as \"uploadResult\" (skipped)\n⊘ \"{uploadResult.Encryption}\" is not null (skipped)\n⊘ \"{uploadResult.EncryptionAlgorithm}\" is \"AES256\" (skipped)\n⊘ I attach \"{uploadResult}\" to the test output as \"Upload Result with Encryption Details\" (skipped)",
    "status_id": 1,
    "time": 1775149692,
    "time_dt": "2026-04-02T17:08:12Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN02.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775149934,
      "created_time_dt": "2026-04-02T17:12:14Z",
      "desc": "Compliance test scenario: Object storage encryption compliance",
      "title": "Object storage encryption compliance",
      "types": [],
      "uid": "ccc-test-470-1775149934"
    },
    "message": "Object storage encryption compliance",
    "metadata": {
      "event_code": "Object storage encryption compliance",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN02",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I attempt policy check \"object-storage-encryption\" for control \"CCC.Core.CN02\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\"\n✓ \"{result}\" is true",
    "status_id": 1,
    "time": 1775149934,
    "time_dt": "2026-04-02T17:12:14Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN02.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775149935,
      "created_time_dt": "2026-04-02T17:12:15Z",
      "desc": "Compliance test scenario: Object storage delete protection compliance",
      "title": "Object storage delete protection compliance",
      "types": [],
      "uid": "ccc-test-492-1775149935"
    },
    "message": "Object storage delete protection compliance",
    "metadata": {
      "event_code": "Object storage delete protection compliance",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN03",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I attempt policy check \"object-storage-delete-protection\" for control \"CCC.Core.CN03\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\"\n✓ \"{result}\" is true",
    "status_id": 1,
    "time": 1775149935,
    "time_dt": "2026-04-02T17:12:15Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN03.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775149936,
      "created_time_dt": "2026-04-02T17:12:16Z",
      "desc": "Compliance test scenario: MFA requirement for destructive operations cannot be tested automatically",
      "title": "MFA requirement for destructive operations cannot be tested automatically",
      "types": [],
      "uid": "ccc-test-495-1775149936"
    },
    "message": "MFA requirement for destructive operations cannot be tested automatically",
    "metadata": {
      "event_code": "MFA requirement for destructive operations cannot be tested automatically",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN03",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural",
        "@object-storage",
        "@load-balancer"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775149936,
    "time_dt": "2026-04-02T17:12:16Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN03.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775149936,
      "created_time_dt": "2026-04-02T17:12:16Z",
      "desc": "Compliance test scenario: API modification requires credential and trust perimeter origin - NotTestable",
      "title": "API modification requires credential and trust perimeter origin - NotTestable",
      "types": [],
      "uid": "ccc-test-513-1775149936"
    },
    "message": "API modification requires credential and trust perimeter origin - NotTestable",
    "metadata": {
      "event_code": "API modification requires credential and trust perimeter origin - NotTestable",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN03",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@NotTestable",
        "@object-storage",
        "@load-balancer"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775149936,
    "time_dt": "2026-04-02T17:12:16Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN03.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775149936,
      "created_time_dt": "2026-04-02T17:12:16Z",
      "desc": "Compliance test scenario: UI viewing requires multi-factor authentication - NotTestable",
      "title": "UI viewing requires multi-factor authentication - NotTestable",
      "types": [],
      "uid": "ccc-test-529-1775149936"
    },
    "message": "UI viewing requires multi-factor authentication - NotTestable",
    "metadata": {
      "event_code": "UI viewing requires multi-factor authentication - NotTestable",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN03",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@NotTestable",
        "@object-storage",
        "@load-balancer"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775149936,
    "time_dt": "2026-04-02T17:12:16Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN03.AR03"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775149936,
      "created_time_dt": "2026-04-02T17:12:16Z",
      "desc": "Compliance test scenario: API viewing requires credential and trust perimeter origin - NotTestable",
      "title": "API viewing requires credential and trust perimeter origin - NotTestable",
      "types": [],
      "uid": "ccc-test-545-1775149936"
    },
    "message": "API viewing requires credential and trust perimeter origin - NotTestable",
    "metadata": {
      "event_code": "API viewing requires credential and trust perimeter origin - NotTestable",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN03",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@NotTestable",
        "@object-storage",
        "@load-balancer"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775149936,
    "time_dt": "2026-04-02T17:12:16Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN03.AR04"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775149936,
      "created_time_dt": "2026-04-02T17:12:16Z",
      "desc": "Compliance test scenario: Object storage admin logging compliance",
      "title": "Object storage admin logging compliance",
      "types": [],
      "uid": "ccc-test-589-1775149936"
    },
    "message": "Object storage admin logging compliance",
    "metadata": {
      "event_code": "Object storage admin logging compliance",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN04",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ I attempt policy check \"admin-logging\" for control \"CCC.Core.CN04\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\"\n✓ \"{result}\" is true",
    "status_id": 1,
    "time": 1775149936,
    "time_dt": "2026-04-02T17:12:16Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN04.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775149939,
      "created_time_dt": "2026-04-02T17:12:19Z",
      "desc": "Compliance test scenario: Verify admin actions are logged with identity and timestamp",
      "title": "Verify admin actions are logged with identity and timestamp",
      "types": [],
      "uid": "ccc-test-610-1775149939"
    },
    "message": "Verify admin actions are logged with identity and timestamp",
    "metadata": {
      "event_code": "Verify admin actions are logged with identity and timestamp",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN04",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"{ServiceType}\"\n✓ I refer to \"{result}\" as \"theService\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"logging\"\n✓ I refer to \"{result}\" as \"loggingService\"\n✓ I call \"{theService}\" with \"UpdateResourcePolicy\"\n✓ \"{result}\" is not an error\n✓ I attach \"{result}\" to the test output as \"Policy Update Result\"\n✓ we wait for a period of \"10000\" ms\n✓ I call \"{loggingService}\" with \"QueryAdminLogs\" using arguments \"{ResourceName}\" and \"{20}\"\n✓ \"{result}\" is not an error\n✓ I refer to \"{result}\" as \"adminLogs\"\n✓ I attach \"{adminLogs}\" to the test output as \"Admin Activity Logs\"\n✓ \"{adminLogs}\" is an array of objects with at least the following contents",
    "status_id": 1,
    "time": 1775149939,
    "time_dt": "2026-04-02T17:12:19Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN04.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775149953,
      "created_time_dt": "2026-04-02T17:12:33Z",
      "desc": "Compliance test scenario: Object storage data modification logging compliance",
      "title": "Object storage data modification logging compliance",
      "types": [],
      "uid": "ccc-test-641-1775149953"
    },
    "message": "Object storage data modification logging compliance",
    "metadata": {
      "event_code": "Object storage data modification logging compliance",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN04",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✗ I attempt policy check \"data-write-logging\" for control \"CCC.Core.CN04\" assessment requirement \"AR02\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" - Error: policy check failed: Azure Diagnostic Logging Write Configuration: \n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775149953,
    "time_dt": "2026-04-02T17:12:33Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN04.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775149954,
      "created_time_dt": "2026-04-02T17:12:34Z",
      "desc": "Compliance test scenario: Data read logging compliance",
      "title": "Data read logging compliance",
      "types": [],
      "uid": "ccc-test-692-1775149954"
    },
    "message": "Data read logging compliance",
    "metadata": {
      "event_code": "Data read logging compliance",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN04",
        "@tlp-red",
        "@Policy",
        "@object-storage",
        "@vpc"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✗ I attempt policy check \"data-read-logging\" for control \"CCC.Core.CN04\" assessment requirement \"AR03\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" - Error: policy check failed: Azure Diagnostic Logging Read Configuration: \n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775149954,
    "time_dt": "2026-04-02T17:12:34Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN04.AR03"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775149955,
      "created_time_dt": "2026-04-02T17:12:35Z",
      "desc": "Compliance test scenario: Verify data read operations are logged with identity and timestamp",
      "title": "Verify data read operations are logged with identity and timestamp",
      "types": [],
      "uid": "ccc-test-711-1775149955"
    },
    "message": "Verify data read operations are logged with identity and timestamp",
    "metadata": {
      "event_code": "Verify data read operations are logged with identity and timestamp",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN04",
        "@tlp-red",
        "@Behavioural",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"logging\"\n✓ I refer to \"{result}\" as \"loggingService\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"test-read-logging-object={Timestamp}.txt\", and \"test data for read logging verification\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: failed to upload blob test-read-logging-object=1775149955468.txt: PUT https://stgcfi20260402t161720z.blob.core.windows.net/ccc-test-container-20260402t161720z/test-read-logging-object=1775149955468.txt\n--------------------------------------------------------------------------------\nRESPONSE 403: 403 This request is not authorized to perform this operation using this permission.\nERROR CODE: AuthorizationPermissionMismatch\n--------------------------------------------------------------------------------\n﻿\u003c?xml version=\"1.0\" encoding=\"utf-8\"?\u003e\u003cError\u003e\u003cCode\u003eAuthorizationPermissionMismatch\u003c/Code\u003e\u003cMessage\u003eThis request is not authorized to perform this operation using this permission.\nRequestId:019a9f21-f01e-0064-31c4-c29a27000000\nTime:2026-04-02T17:16:37.5966033Z\u003c/Message\u003e\u003c/Error\u003e\n--------------------------------------------------------------------------------\n\n⊘ I refer to \"{result}\" as \"createResult\" (skipped)\n⊘ I call \"{storage}\" with \"ReadObject\" using arguments \"{ResourceName}\" and \"test-read-logging-object={Timestamp}.txt\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I refer to \"{result}\" as \"readResult\" (skipped)\n⊘ I attach \"{readResult}\" to the test output as \"Object Read Result\" (skipped)\n⊘ we wait for a period of \"10000\" ms (skipped)\n⊘ I call \"{loggingService}\" with \"QueryDataReadLogs\" using arguments \"{ResourceName}\" and \"{20}\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I refer to \"{result}\" as \"readLogs\" (skipped)\n⊘ I attach \"{readLogs}\" to the test output as \"Data Read Logs\" (skipped)\n⊘ \"{readLogs}\" is an array of objects with at least the following contents (skipped)",
    "status_id": 1,
    "time": 1775149955,
    "time_dt": "2026-04-02T17:12:35Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN04.AR03"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150197,
      "created_time_dt": "2026-04-02T17:16:37Z",
      "desc": "Compliance test scenario: Service prevents data modification by user with no access",
      "title": "Service prevents data modification by user with no access",
      "types": [],
      "uid": "ccc-test-775-1775150197"
    },
    "message": "Service prevents data modification by user with no access",
    "metadata": {
      "event_code": "Service prevents data modification by user with no access",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Destructive",
        "@Behavioural",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-no-write-access\", \"{UID}\", and \"none\"\n✓ I refer to \"{result}\" as \"testUserNoAccess\"\n✓ I attach \"{result}\" to the test output as \"no-access-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserNoAccess}\", and \"{false}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"test-cn05-unauthorized-modify={Timestamp}.txt\", and \"unauthorized data\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"no-access-create-error.txt\" (skipped)",
    "status_id": 1,
    "time": 1775150197,
    "time_dt": "2026-04-02T17:16:37Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN05.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150198,
      "created_time_dt": "2026-04-02T17:16:38Z",
      "desc": "Compliance test scenario: Service allows data modification by user with write access",
      "title": "Service allows data modification by user with write access",
      "types": [],
      "uid": "ccc-test-790-1775150198"
    },
    "message": "Service allows data modification by user with write access",
    "metadata": {
      "event_code": "Service allows data modification by user with write access",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Destructive",
        "@Behavioural",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-write-access\", \"{UID}\", and \"write\"\n✓ I refer to \"{result}\" as \"testUserWrite\"\n✓ I attach \"{result}\" to the test output as \"write-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserWrite}\", and \"{true}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"test-cn05-authorized-modify={Timestamp}.txt\", and \"authorized data\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"write-create-object-result.json\" (skipped)",
    "status_id": 1,
    "time": 1775150198,
    "time_dt": "2026-04-02T17:16:38Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN05.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150198,
      "created_time_dt": "2026-04-02T17:16:38Z",
      "desc": "Compliance test scenario: Storage is not configured for public write access",
      "title": "Storage is not configured for public write access",
      "types": [],
      "uid": "ccc-test-798-1775150198"
    },
    "message": "Storage is not configured for public write access",
    "metadata": {
      "event_code": "Storage is not configured for public write access",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I attempt policy check \"object-storage-block-public-write-access\" for control \"CCC.Core.CN05\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\"\n✓ \"{result}\" is true",
    "status_id": 1,
    "time": 1775150198,
    "time_dt": "2026-04-02T17:16:38Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN05.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150199,
      "created_time_dt": "2026-04-02T17:16:39Z",
      "desc": "Compliance test scenario: Service prevents administrative action (creating a new bucket) by user with no access",
      "title": "Service prevents administrative action (creating a new bucket) by user with no access",
      "types": [],
      "uid": "ccc-test-877-1775150199"
    },
    "message": "Service prevents administrative action (creating a new bucket) by user with no access",
    "metadata": {
      "event_code": "Service prevents administrative action (creating a new bucket) by user with no access",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Destructive",
        "@Behavioural",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-no-admin-access\", \"{UID}\", and \"none\"\n✓ I refer to \"{result}\" as \"testUserNoAccess\"\n✓ I attach \"{result}\" to the test output as \"no-admin-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserNoAccess}\", and \"{false}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"CreateBucket\" using argument \"test-cn05-unauthorized-admin-container\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"no-admin-create-bucket-error.txt\" (skipped)",
    "status_id": 1,
    "time": 1775150199,
    "time_dt": "2026-04-02T17:16:39Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN05.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150200,
      "created_time_dt": "2026-04-02T17:16:40Z",
      "desc": "Compliance test scenario: Service prevents administrative action (creating a new bucket) by user with read-only access",
      "title": "Service prevents administrative action (creating a new bucket) by user with read-only access",
      "types": [],
      "uid": "ccc-test-892-1775150200"
    },
    "message": "Service prevents administrative action (creating a new bucket) by user with read-only access",
    "metadata": {
      "event_code": "Service prevents administrative action (creating a new bucket) by user with read-only access",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Destructive",
        "@Behavioural",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-read-only-admin\", \"{UID}\", and \"read\"\n✓ I refer to \"{result}\" as \"testUserRead\"\n✓ I attach \"{result}\" to the test output as \"read-only-admin-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserRead}\", and \"{false}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"CreateBucket\" using argument \"test-cn05-read-only-create-container\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"read-only-create-bucket-error.txt\" (skipped)",
    "status_id": 1,
    "time": 1775150200,
    "time_dt": "2026-04-02T17:16:40Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN05.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150200,
      "created_time_dt": "2026-04-02T17:16:40Z",
      "desc": "Compliance test scenario: Service allows administrative action (creating a new bucket) by user with admin access",
      "title": "Service allows administrative action (creating a new bucket) by user with admin access",
      "types": [],
      "uid": "ccc-test-908-1775150200"
    },
    "message": "Service allows administrative action (creating a new bucket) by user with admin access",
    "metadata": {
      "event_code": "Service allows administrative action (creating a new bucket) by user with admin access",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-admin-access\", \"{UID}\", and \"admin\"\n✓ I refer to \"{result}\" as \"testUserAdmin\"\n✓ I attach \"{result}\" to the test output as \"admin-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserAdmin}\", and \"{true}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"CreateBucket\" using argument \"test-cn05-authorized-admin-container\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"admin-create-bucket-result.json\" (skipped)\n⊘ I call \"{storage}\" with \"DeleteBucket\" using argument \"test-cn05-authorized-admin-container\" (skipped)",
    "status_id": 1,
    "time": 1775150200,
    "time_dt": "2026-04-02T17:16:40Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN05.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150201,
      "created_time_dt": "2026-04-02T17:16:41Z",
      "desc": "Compliance test scenario: Unauthorized administrative access is blocked",
      "title": "Unauthorized administrative access is blocked",
      "types": [],
      "uid": "ccc-test-915-1775150201"
    },
    "message": "Unauthorized administrative access is blocked",
    "metadata": {
      "event_code": "Unauthorized administrative access is blocked",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775150201,
    "time_dt": "2026-04-02T17:16:41Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN05.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150201,
      "created_time_dt": "2026-04-02T17:16:41Z",
      "desc": "Compliance test scenario: Cross-tenant access is blocked without explicit allowlist",
      "title": "Cross-tenant access is blocked without explicit allowlist",
      "types": [],
      "uid": "ccc-test-933-1775150201"
    },
    "message": "Cross-tenant access is blocked without explicit allowlist",
    "metadata": {
      "event_code": "Cross-tenant access is blocked without explicit allowlist",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I attempt policy check \"object-storage-cross-tenant-block\" for control \"CCC.Core.CN05\" assessment requirement \"AR03\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\"\n✓ \"{result}\" is true",
    "status_id": 1,
    "time": 1775150201,
    "time_dt": "2026-04-02T17:16:41Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN05.AR03"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150202,
      "created_time_dt": "2026-04-02T17:16:42Z",
      "desc": "Compliance test scenario: External unauthorized data requests are blocked",
      "title": "External unauthorized data requests are blocked",
      "types": [],
      "uid": "ccc-test-949-1775150202"
    },
    "message": "External unauthorized data requests are blocked",
    "metadata": {
      "event_code": "External unauthorized data requests are blocked",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN05",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I attempt policy check \"object-storage-block-public-read\" for control \"CCC.Core.CN05\" assessment requirement \"AR04\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\"\n✓ \"{result}\" is true",
    "status_id": 1,
    "time": 1775150202,
    "time_dt": "2026-04-02T17:16:42Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN05.AR04"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150203,
      "created_time_dt": "2026-04-02T17:16:43Z",
      "desc": "Compliance test scenario: External requests do not reveal service existence - NotTested",
      "title": "External requests do not reveal service existence - NotTested",
      "types": [],
      "uid": "ccc-test-963-1775150203"
    },
    "message": "External requests do not reveal service existence - NotTested",
    "metadata": {
      "event_code": "External requests do not reveal service existence - NotTested",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN05",
        "@tlp-red",
        "@Policy",
        "@NotTested",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "Update",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ no-op required",
    "status_id": 2,
    "time": 1775150203,
    "time_dt": "2026-04-02T17:16:43Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN05.AR05"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150203,
      "created_time_dt": "2026-04-02T17:16:43Z",
      "desc": "Compliance test scenario: Service prevents data read by user with no access - Duplicate",
      "title": "Service prevents data read by user with no access - Duplicate",
      "types": [],
      "uid": "ccc-test-993-1775150203"
    },
    "message": "Service prevents data read by user with no access - Duplicate",
    "metadata": {
      "event_code": "Service prevents data read by user with no access - Duplicate",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN05",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Destructive",
        "@Behavioural",
        "@Duplicate",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775150203,
    "time_dt": "2026-04-02T17:16:43Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN05.AR06"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150203,
      "created_time_dt": "2026-04-02T17:16:43Z",
      "desc": "Compliance test scenario: All unauthorized requests are blocked - Duplicate",
      "title": "All unauthorized requests are blocked - Duplicate",
      "types": [],
      "uid": "ccc-test-1000-1775150203"
    },
    "message": "All unauthorized requests are blocked - Duplicate",
    "metadata": {
      "event_code": "All unauthorized requests are blocked - Duplicate",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN05",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@Duplicate",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775150203,
    "time_dt": "2026-04-02T17:16:43Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN05.AR06"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150203,
      "created_time_dt": "2026-04-02T17:16:43Z",
      "desc": "Compliance test scenario: Object storage region compliance",
      "title": "Object storage region compliance",
      "types": [],
      "uid": "ccc-test-1036-1775150203"
    },
    "message": "Object storage region compliance",
    "metadata": {
      "event_code": "Object storage region compliance",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN06",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I attempt policy check \"object-storage-region\" for control \"CCC.Core.CN06\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\"\n✓ \"{result}\" is true",
    "status_id": 1,
    "time": 1775150203,
    "time_dt": "2026-04-02T17:16:43Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN06.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150203,
      "created_time_dt": "2026-04-02T17:16:43Z",
      "desc": "Compliance test scenario: Resource region can be retrieved for compliance verification",
      "title": "Resource region can be retrieved for compliance verification",
      "types": [],
      "uid": "ccc-test-1050-1775150203"
    },
    "message": "Resource region can be retrieved for compliance verification",
    "metadata": {
      "event_code": "Resource region can be retrieved for compliance verification",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN06",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural",
        "@object-storage",
        "@vpc"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"{ServiceType}\"\n✓ I refer to \"{result}\" as \"theService\"\n✓ I call \"{theService}\" with \"GetResourceRegion\" using argument \"{ResourceName}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: not yet implemented\n⊘ I refer to \"{result}\" as \"region\" (skipped)\n⊘ I attach \"{region}\" to the test output as \"Resource Region\" (skipped)\n⊘ \"{PermittedRegions}\" is an array of objects with at least the following contents (skipped)",
    "status_id": 1,
    "time": 1775150203,
    "time_dt": "2026-04-02T17:16:43Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN06.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150203,
      "created_time_dt": "2026-04-02T17:16:43Z",
      "desc": "Compliance test scenario: Child resource region compliance - NotTestable",
      "title": "Child resource region compliance - NotTestable",
      "types": [],
      "uid": "ccc-test-1072-1775150203"
    },
    "message": "Child resource region compliance - NotTestable",
    "metadata": {
      "event_code": "Child resource region compliance - NotTestable",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN06",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural",
        "@NotTestable",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775150203,
    "time_dt": "2026-04-02T17:16:43Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN06.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150203,
      "created_time_dt": "2026-04-02T17:16:43Z",
      "desc": "Compliance test scenario: Child resource region compliance - NotTestable",
      "title": "Child resource region compliance - NotTestable",
      "types": [],
      "uid": "ccc-test-1075-1775150203"
    },
    "message": "Child resource region compliance - NotTestable",
    "metadata": {
      "event_code": "Child resource region compliance - NotTestable",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN06",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@NotTestable",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775150203,
    "time_dt": "2026-04-02T17:16:43Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN06.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150204,
      "created_time_dt": "2026-04-02T17:16:44Z",
      "desc": "Compliance test scenario: Enumeration activities publish events to monitored channels",
      "title": "Enumeration activities publish events to monitored channels",
      "types": [],
      "uid": "ccc-test-1096-1775150204"
    },
    "message": "Enumeration activities publish events to monitored channels",
    "metadata": {
      "event_code": "Enumeration activities publish events to monitored channels",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN07",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✗ I attempt policy check \"enumeration-monitoring-policy\" for control \"CCC.Core.CN07\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" - Error: policy check failed: Azure Storage Enumeration Monitoring Policy Check: \n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775150204,
    "time_dt": "2026-04-02T17:16:44Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN07.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150205,
      "created_time_dt": "2026-04-02T17:16:45Z",
      "desc": "Compliance test scenario: Enumeration event publishing cannot be tested automatically - NotTestable",
      "title": "Enumeration event publishing cannot be tested automatically - NotTestable",
      "types": [],
      "uid": "ccc-test-1099-1775150205"
    },
    "message": "Enumeration event publishing cannot be tested automatically - NotTestable",
    "metadata": {
      "event_code": "Enumeration event publishing cannot be tested automatically - NotTestable",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN07",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural",
        "@NotTestable",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775150205,
    "time_dt": "2026-04-02T17:16:45Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN07.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150205,
      "created_time_dt": "2026-04-02T17:16:45Z",
      "desc": "Compliance test scenario: Enumeration activities are logged",
      "title": "Enumeration activities are logged",
      "types": [],
      "uid": "ccc-test-1122-1775150205"
    },
    "message": "Enumeration activities are logged",
    "metadata": {
      "event_code": "Enumeration activities are logged",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN07",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✗ I attempt policy check \"enumeration-logging-policy\" for control \"CCC.Core.CN07\" assessment requirement \"AR02\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" - Error: policy check failed: Azure Storage Enumeration Logging Policy Check: \n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775150205,
    "time_dt": "2026-04-02T17:16:45Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN07.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150206,
      "created_time_dt": "2026-04-02T17:16:46Z",
      "desc": "Compliance test scenario: Enumeration logging cannot be verified automatically - NotTestable",
      "title": "Enumeration logging cannot be verified automatically - NotTestable",
      "types": [],
      "uid": "ccc-test-1125-1775150206"
    },
    "message": "Enumeration logging cannot be verified automatically - NotTestable",
    "metadata": {
      "event_code": "Enumeration logging cannot be verified automatically - NotTestable",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN07",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural",
        "@NotTestable",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775150206,
    "time_dt": "2026-04-02T17:16:46Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN07.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150206,
      "created_time_dt": "2026-04-02T17:16:46Z",
      "desc": "Compliance test scenario: Object storage replication compliance",
      "title": "Object storage replication compliance",
      "types": [],
      "uid": "ccc-test-1160-1775150206"
    },
    "message": "Object storage replication compliance",
    "metadata": {
      "event_code": "Object storage replication compliance",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN08",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I attempt policy check \"object-storage-replication\" for control \"CCC.Core.CN08\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\"\n✓ \"{result}\" is true",
    "status_id": 1,
    "time": 1775150206,
    "time_dt": "2026-04-02T17:16:46Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN08.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150207,
      "created_time_dt": "2026-04-02T17:16:47Z",
      "desc": "Compliance test scenario: Bucket data is replicated to physically separate locations",
      "title": "Bucket data is replicated to physically separate locations",
      "types": [],
      "uid": "ccc-test-1171-1775150207"
    },
    "message": "Bucket data is replicated to physically separate locations",
    "metadata": {
      "event_code": "Bucket data is replicated to physically separate locations",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN08",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{storage}\" with \"GetReplicationStatus\" using argument \"{ResourceName}\"\n✓ I refer to \"{result}\" as \"replicationStatus\"\n✓ I refer to \"{replicationStatus.Locations}\" as \"locations\"\n✓ I attach \"{replicationStatus}\" to the test output as \"Replication Status\"\n✓ \"{locations}\" is an array of objects with length \"2\"\n✓ \"{PermittedRegions}\" is an array of objects with at least the following contents\n✓ \"{PermittedRegions}\" is an array of objects with at least the following contents",
    "status_id": 1,
    "time": 1775150207,
    "time_dt": "2026-04-02T17:16:47Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN08.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150207,
      "created_time_dt": "2026-04-02T17:16:47Z",
      "desc": "Compliance test scenario: Object storage replication status is visible",
      "title": "Object storage replication status is visible",
      "types": [],
      "uid": "ccc-test-1203-1775150207"
    },
    "message": "Object storage replication status is visible",
    "metadata": {
      "event_code": "Object storage replication status is visible",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN08",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I attempt policy check \"object-storage-replication-status\" for control \"CCC.Core.CN08\" assessment requirement \"AR02\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\"\n✓ \"{result}\" is true",
    "status_id": 1,
    "time": 1775150207,
    "time_dt": "2026-04-02T17:16:47Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN08.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150208,
      "created_time_dt": "2026-04-02T17:16:48Z",
      "desc": "Compliance test scenario: Replication status can be retrieved for monitoring",
      "title": "Replication status can be retrieved for monitoring",
      "types": [],
      "uid": "ccc-test-1212-1775150208"
    },
    "message": "Replication status can be retrieved for monitoring",
    "metadata": {
      "event_code": "Replication status can be retrieved for monitoring",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN08",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{storage}\" with \"GetReplicationStatus\" using argument \"{ResourceName}\"\n✓ I refer to \"{result}\" as \"replicationStatus\"\n✓ I attach \"{replicationStatus}\" to the test output as \"Replication Status\"\n✓ I refer to \"{replicationStatus.Locations}\" as \"locations\"\n✓ \"{locations}\" is an array of objects with at least the following contents",
    "status_id": 1,
    "time": 1775150208,
    "time_dt": "2026-04-02T17:16:48Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN08.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150208,
      "created_time_dt": "2026-04-02T17:16:48Z",
      "desc": "Compliance test scenario: Object storage access logging compliance",
      "title": "Object storage access logging compliance",
      "types": [],
      "uid": "ccc-test-1229-1775150208"
    },
    "message": "Object storage access logging compliance",
    "metadata": {
      "event_code": "Object storage access logging compliance",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN09",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✗ I attempt policy check \"object-storage-access-logging\" for control \"CCC.Core.CN09\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" - Error: policy check failed: Azure Storage Account Diagnostic Logging Configuration: \n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775150208,
    "time_dt": "2026-04-02T17:16:48Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN09.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150209,
      "created_time_dt": "2026-04-02T17:16:49Z",
      "desc": "Compliance test scenario: Disabling logs requires disabling the resource - NotTestable",
      "title": "Disabling logs requires disabling the resource - NotTestable",
      "types": [],
      "uid": "ccc-test-1246-1775150209"
    },
    "message": "Disabling logs requires disabling the resource - NotTestable",
    "metadata": {
      "event_code": "Disabling logs requires disabling the resource - NotTestable",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN09",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@NotTestable",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775150209,
    "time_dt": "2026-04-02T17:16:49Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN09.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150209,
      "created_time_dt": "2026-04-02T17:16:49Z",
      "desc": "Compliance test scenario: Redirecting logs requires halting the resource - NotTestable",
      "title": "Redirecting logs requires halting the resource - NotTestable",
      "types": [],
      "uid": "ccc-test-1261-1775150209"
    },
    "message": "Redirecting logs requires halting the resource - NotTestable",
    "metadata": {
      "event_code": "Redirecting logs requires halting the resource - NotTestable",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN09",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@NotTestable",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775150209,
    "time_dt": "2026-04-02T17:16:49Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN09.AR03"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150209,
      "created_time_dt": "2026-04-02T17:16:49Z",
      "desc": "Compliance test scenario: Object storage replication destination compliance",
      "title": "Object storage replication destination compliance",
      "types": [],
      "uid": "ccc-test-1283-1775150209"
    },
    "message": "Object storage replication destination compliance",
    "metadata": {
      "event_code": "Object storage replication destination compliance",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN10",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I attempt policy check \"object-storage-replication-destination\" for control \"CCC.Core.CN10\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\"\n✓ \"{result}\" is true",
    "status_id": 1,
    "time": 1775150209,
    "time_dt": "2026-04-02T17:16:49Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN10.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150210,
      "created_time_dt": "2026-04-02T17:16:50Z",
      "desc": "Compliance test scenario: Replication destination trust cannot be verified automatically - NotTestable",
      "title": "Replication destination trust cannot be verified automatically - NotTestable",
      "types": [],
      "uid": "ccc-test-1286-1775150210"
    },
    "message": "Replication destination trust cannot be verified automatically - NotTestable",
    "metadata": {
      "event_code": "Replication destination trust cannot be verified automatically - NotTestable",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@CCC.Core",
        "@CCC.Core.CN10",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural",
        "@NotTestable",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775150210,
    "time_dt": "2026-04-02T17:16:50Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.Core.CN10.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150210,
      "created_time_dt": "2026-04-02T17:16:50Z",
      "desc": "Compliance test scenario: Service prevents reading bucket with no access",
      "title": "Service prevents reading bucket with no access",
      "types": [],
      "uid": "ccc-test-1340-1775150210"
    },
    "message": "Service prevents reading bucket with no access",
    "metadata": {
      "event_code": "Service prevents reading bucket with no access",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN01",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-no-access\", \"{UID}\", and \"none\"\n✓ I refer to \"{result}\" as \"testUserNoAccess\"\n✓ I attach \"{result}\" to the test output as \"no-access-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserNoAccess}\", and \"{false}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"ListObjects\" using argument \"{ResourceName}\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"no-access-list-error.txt\" (skipped)",
    "status_id": 1,
    "time": 1775150210,
    "time_dt": "2026-04-02T17:16:50Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN01.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150211,
      "created_time_dt": "2026-04-02T17:16:51Z",
      "desc": "Compliance test scenario: Service allows reading bucket with read access",
      "title": "Service allows reading bucket with read access",
      "types": [],
      "uid": "ccc-test-1356-1775150211"
    },
    "message": "Service allows reading bucket with read access",
    "metadata": {
      "event_code": "Service allows reading bucket with read access",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN01",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-read\", \"{UID}\", and \"read\"\n✓ I refer to \"{result}\" as \"testUserRead\"\n✓ I attach \"{result}\" to the test output as \"read-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserRead}\", and \"{true}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I attach \"{result}\" to the test output as \"read-storage-service.json\" (skipped)\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"ListObjects\" using argument \"{ResourceName}\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"read-list-objects-result.json\" (skipped)",
    "status_id": 1,
    "time": 1775150211,
    "time_dt": "2026-04-02T17:16:51Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN01.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150211,
      "created_time_dt": "2026-04-02T17:16:51Z",
      "desc": "Compliance test scenario: Test policy for bucket access control",
      "title": "Test policy for bucket access control",
      "types": [],
      "uid": "ccc-test-1364-1775150211"
    },
    "message": "Test policy for bucket access control",
    "metadata": {
      "event_code": "Test policy for bucket access control",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN01",
        "@Policy"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I attempt policy check \"no-public-access\" for control \"CCC.ObjStor.CN01\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\"\n✓ \"{result}\" is true",
    "status_id": 1,
    "time": 1775150211,
    "time_dt": "2026-04-02T17:16:51Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN01.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150212,
      "created_time_dt": "2026-04-02T17:16:52Z",
      "desc": "Compliance test scenario: Service prevents reading object with no access",
      "title": "Service prevents reading object with no access",
      "types": [],
      "uid": "ccc-test-1422-1775150212"
    },
    "message": "Service prevents reading object with no access",
    "metadata": {
      "event_code": "Service prevents reading object with no access",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN01",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"test-object={Timestamp}.txt\", and \"test content\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: failed to upload blob test-object=1775150212789.txt: PUT https://stgcfi20260402t161720z.blob.core.windows.net/ccc-test-container-20260402t161720z/test-object=1775150212789.txt\n--------------------------------------------------------------------------------\nRESPONSE 403: 403 This request is not authorized to perform this operation using this permission.\nERROR CODE: AuthorizationPermissionMismatch\n--------------------------------------------------------------------------------\n﻿\u003c?xml version=\"1.0\" encoding=\"utf-8\"?\u003e\u003cError\u003e\u003cCode\u003eAuthorizationPermissionMismatch\u003c/Code\u003e\u003cMessage\u003eThis request is not authorized to perform this operation using this permission.\nRequestId:019c5208-f01e-0064-27c5-c29a27000000\nTime:2026-04-02T17:20:54.9551967Z\u003c/Message\u003e\u003c/Error\u003e\n--------------------------------------------------------------------------------\n\n⊘ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-no-access\", \"{UID}\", and \"none\" (skipped)\n⊘ I refer to \"{result}\" as \"testUserNoAccess\" (skipped)\n⊘ I attach \"{result}\" to the test output as \"no-access-user-identity.json\" (skipped)\n⊘ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserNoAccess}\", and \"{false}\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"ReadObject\" using arguments \"{ResourceName}\" and \"test-object={Timestamp}.txt\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"no-access-read-object-error.txt\" (skipped)",
    "status_id": 1,
    "time": 1775150212,
    "time_dt": "2026-04-02T17:16:52Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN01.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150454,
      "created_time_dt": "2026-04-02T17:20:54Z",
      "desc": "Compliance test scenario: Service allows reading object with read access",
      "title": "Service allows reading object with read access",
      "types": [],
      "uid": "ccc-test-1440-1775150454"
    },
    "message": "Service allows reading object with read access",
    "metadata": {
      "event_code": "Service allows reading object with read access",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN01",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"test-object={Timestamp}.txt\", and \"test content\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: failed to upload blob test-object=1775150454964.txt: PUT https://stgcfi20260402t161720z.blob.core.windows.net/ccc-test-container-20260402t161720z/test-object=1775150454964.txt\n--------------------------------------------------------------------------------\nRESPONSE 403: 403 This request is not authorized to perform this operation using this permission.\nERROR CODE: AuthorizationPermissionMismatch\n--------------------------------------------------------------------------------\n﻿\u003c?xml version=\"1.0\" encoding=\"utf-8\"?\u003e\u003cError\u003e\u003cCode\u003eAuthorizationPermissionMismatch\u003c/Code\u003e\u003cMessage\u003eThis request is not authorized to perform this operation using this permission.\nRequestId:019e2456-f01e-0064-69c5-c29a27000000\nTime:2026-04-02T17:24:57.1604812Z\u003c/Message\u003e\u003c/Error\u003e\n--------------------------------------------------------------------------------\n\n⊘ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-read\", \"{UID}\", and \"read\" (skipped)\n⊘ I refer to \"{result}\" as \"testUserRead\" (skipped)\n⊘ I attach \"{result}\" to the test output as \"read-user-identity.json\" (skipped)\n⊘ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserRead}\", and \"{true}\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"read-storage-service.json\" (skipped)\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"ReadObject\" using arguments \"{ResourceName}\" and \"test-object={Timestamp}.txt\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"read-read-object-result.json\" (skipped)",
    "status_id": 1,
    "time": 1775150454,
    "time_dt": "2026-04-02T17:20:54Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN01.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150697,
      "created_time_dt": "2026-04-02T17:24:57Z",
      "desc": "Compliance test scenario: All unauthorized requests are blocked",
      "title": "All unauthorized requests are blocked",
      "types": [],
      "uid": "ccc-test-1450-1775150697"
    },
    "message": "All unauthorized requests are blocked",
    "metadata": {
      "event_code": "All unauthorized requests are blocked",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN01",
        "@Policy"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"test-object={Timestamp}.txt\", and \"test content\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: failed to upload blob test-object=1775150697169.txt: PUT https://stgcfi20260402t161720z.blob.core.windows.net/ccc-test-container-20260402t161720z/test-object=1775150697169.txt\n--------------------------------------------------------------------------------\nRESPONSE 403: 403 This request is not authorized to perform this operation using this permission.\nERROR CODE: AuthorizationPermissionMismatch\n--------------------------------------------------------------------------------\n﻿\u003c?xml version=\"1.0\" encoding=\"utf-8\"?\u003e\u003cError\u003e\u003cCode\u003eAuthorizationPermissionMismatch\u003c/Code\u003e\u003cMessage\u003eThis request is not authorized to perform this operation using this permission.\nRequestId:019fb362-f01e-0064-6ec6-c29a27000000\nTime:2026-04-02T17:28:59.2990033Z\u003c/Message\u003e\u003c/Error\u003e\n--------------------------------------------------------------------------------\n\n⊘ I attempt policy check \"object-storage-no-public-principals\" for control \"CCC.ObjStor.CN01\" assessment requirement \"AR02\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" (skipped)\n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775150697,
    "time_dt": "2026-04-02T17:24:57Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN01.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150939,
      "created_time_dt": "2026-04-02T17:28:59Z",
      "desc": "Compliance test scenario: Service prevents creating bucket with no access",
      "title": "Service prevents creating bucket with no access",
      "types": [],
      "uid": "ccc-test-1507-1775150939"
    },
    "message": "Service prevents creating bucket with no access",
    "metadata": {
      "event_code": "Service prevents creating bucket with no access",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN01",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-no-access\", \"{UID}\", and \"none\"\n✓ I refer to \"{result}\" as \"testUserNoAccess\"\n✓ I attach \"{result}\" to the test output as \"no-access-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserNoAccess}\", and \"{false}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"CreateBucket\" using argument \"test-bucket-no-access\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"no-access-create-bucket-error.txt\" (skipped)",
    "status_id": 1,
    "time": 1775150939,
    "time_dt": "2026-04-02T17:28:59Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN01.AR03"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150939,
      "created_time_dt": "2026-04-02T17:28:59Z",
      "desc": "Compliance test scenario: Service allows creating bucket with write access",
      "title": "Service allows creating bucket with write access",
      "types": [],
      "uid": "ccc-test-1524-1775150939"
    },
    "message": "Service allows creating bucket with write access",
    "metadata": {
      "event_code": "Service allows creating bucket with write access",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN01",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-write\", \"{UID}\", and \"write\"\n✓ I refer to \"{result}\" as \"testUserWrite\"\n✓ I attach \"{result}\" to the test output as \"write-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserWrite}\", and \"{true}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I attach \"{result}\" to the test output as \"write-storage-service.json\" (skipped)\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"CreateBucket\" using argument \"test-bucket-write\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"write-create-bucket-result.json\" (skipped)\n⊘ I call \"{storage}\" with \"DeleteBucket\" using argument \"{result.ID}\" (skipped)",
    "status_id": 1,
    "time": 1775150939,
    "time_dt": "2026-04-02T17:28:59Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN01.AR03"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150940,
      "created_time_dt": "2026-04-02T17:29:00Z",
      "desc": "Compliance test scenario: All unauthorized requests are blocked",
      "title": "All unauthorized requests are blocked",
      "types": [],
      "uid": "ccc-test-1532-1775150940"
    },
    "message": "All unauthorized requests are blocked",
    "metadata": {
      "event_code": "All unauthorized requests are blocked",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN01",
        "@Policy"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✗ I attempt policy check \"object-storage-no-public-principals\" for control \"CCC.ObjStor.CN01\" assessment requirement \"AR03\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" - Error: policy check failed: Azure Storage RBAC in Use: \n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775150940,
    "time_dt": "2026-04-02T17:29:00Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN01.AR03"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150942,
      "created_time_dt": "2026-04-02T17:29:02Z",
      "desc": "Compliance test scenario: Service prevents writing object with read-only access",
      "title": "Service prevents writing object with read-only access",
      "types": [],
      "uid": "ccc-test-1592-1775150942"
    },
    "message": "Service prevents writing object with read-only access",
    "metadata": {
      "event_code": "Service prevents writing object with read-only access",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN01",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ \"{result}\" is not an error\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ \"{result}\" is not an error\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-read\", \"{UID}\", and \"read\"\n✓ I refer to \"{result}\" as \"testUserRead\"\n✓ I attach \"{result}\" to the test output as \"read-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserRead}\", and \"{true}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"test-write-object={Timestamp}.txt\", and \"test content\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"read-create-object-error.txt\" (skipped)",
    "status_id": 1,
    "time": 1775150942,
    "time_dt": "2026-04-02T17:29:02Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN01.AR04"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150942,
      "created_time_dt": "2026-04-02T17:29:02Z",
      "desc": "Compliance test scenario: Service allows writing object with write access",
      "title": "Service allows writing object with write access",
      "types": [],
      "uid": "ccc-test-1610-1775150942"
    },
    "message": "Service allows writing object with write access",
    "metadata": {
      "event_code": "Service allows writing object with write access",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN01",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ \"{result}\" is not an error\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ \"{result}\" is not an error\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-write\", \"{UID}\", and \"write\"\n✓ I refer to \"{result}\" as \"testUserWrite\"\n✓ I attach \"{result}\" to the test output as \"write-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserWrite}\", and \"{true}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I attach \"{result}\" to the test output as \"write-storage-service.json\" (skipped)\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"test-write-object={Timestamp}.txt\", and \"test content\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"write-create-object-result.json\" (skipped)",
    "status_id": 1,
    "time": 1775150942,
    "time_dt": "2026-04-02T17:29:02Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN01.AR04"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150943,
      "created_time_dt": "2026-04-02T17:29:03Z",
      "desc": "Compliance test scenario: All unauthorized requests are blocked",
      "title": "All unauthorized requests are blocked",
      "types": [],
      "uid": "ccc-test-1620-1775150943"
    },
    "message": "All unauthorized requests are blocked",
    "metadata": {
      "event_code": "All unauthorized requests are blocked",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN01",
        "@Policy"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ \"{result}\" is not an error\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ \"{result}\" is not an error\n✗ I attempt policy check \"object-storage-no-public-principals\" for control \"CCC.ObjStor.CN01\" assessment requirement \"AR04\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" - Error: policy check failed: Azure Storage RBAC in Use: \n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775150943,
    "time_dt": "2026-04-02T17:29:03Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN01.AR04"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775150944,
      "created_time_dt": "2026-04-02T17:29:04Z",
      "desc": "Compliance test scenario: Service enforces uniform bucket-level access by rejecting object-level permissions",
      "title": "Service enforces uniform bucket-level access by rejecting object-level permissions",
      "types": [],
      "uid": "ccc-test-1674-1775150944"
    },
    "message": "Service enforces uniform bucket-level access by rejecting object-level permissions",
    "metadata": {
      "event_code": "Service enforces uniform bucket-level access by rejecting object-level permissions",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN02",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"test-object={Timestamp}.txt\", and \"test data\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: failed to upload blob test-object=1775150944556.txt: PUT https://stgcfi20260402t161720z.blob.core.windows.net/ccc-test-container-20260402t161720z/test-object=1775150944556.txt\n--------------------------------------------------------------------------------\nRESPONSE 403: 403 This request is not authorized to perform this operation using this permission.\nERROR CODE: AuthorizationPermissionMismatch\n--------------------------------------------------------------------------------\n﻿\u003c?xml version=\"1.0\" encoding=\"utf-8\"?\u003e\u003cError\u003e\u003cCode\u003eAuthorizationPermissionMismatch\u003c/Code\u003e\u003cMessage\u003eThis request is not authorized to perform this operation using this permission.\nRequestId:01a158ce-f01e-0064-27c6-c29a27000000\nTime:2026-04-02T17:33:06.7138406Z\u003c/Message\u003e\u003c/Error\u003e\n--------------------------------------------------------------------------------\n\n⊘ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-read\", \"{UID}\", and \"read\" (skipped)\n⊘ I refer to \"{result}\" as \"testUserRead\" (skipped)\n⊘ I attach \"{result}\" to the test output as \"read-user-identity.json\" (skipped)\n⊘ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserRead}\", and \"{true}\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"ReadObject\" using arguments \"{ResourceName}\" and \"test-object={Timestamp}.txt\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I call \"{storage}\" with \"SetObjectPermission\" using arguments \"{ResourceName}\", \"test-object={Timestamp}.txt\", and \"none\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"set-object-permission-error.txt\" (skipped)\n⊘ I call \"{userStorage}\" with \"ReadObject\" using arguments \"{ResourceName}\" and \"test-object={Timestamp}.txt\" (skipped)\n⊘ \"{result}\" is not an error (skipped)",
    "status_id": 1,
    "time": 1775150944,
    "time_dt": "2026-04-02T17:29:04Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN02.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775151186,
      "created_time_dt": "2026-04-02T17:33:06Z",
      "desc": "Compliance test scenario: Test policy for uniform access",
      "title": "Test policy for uniform access",
      "types": [],
      "uid": "ccc-test-1682-1775151186"
    },
    "message": "Test policy for uniform access",
    "metadata": {
      "event_code": "Test policy for uniform access",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN02",
        "@Policy"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I attempt policy check \"uniform-bucket-level-access\" for control \"CCC.ObjStor.CN02\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\"\n✓ \"{result}\" is true",
    "status_id": 1,
    "time": 1775151186,
    "time_dt": "2026-04-02T17:33:06Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN02.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775151187,
      "created_time_dt": "2026-04-02T17:33:07Z",
      "desc": "Compliance test scenario: Service enforces uniform bucket-level access denial",
      "title": "Service enforces uniform bucket-level access denial",
      "types": [],
      "uid": "ccc-test-1737-1775151187"
    },
    "message": "Service enforces uniform bucket-level access denial",
    "metadata": {
      "event_code": "Service enforces uniform bucket-level access denial",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN02",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"test-object={Timestamp}.txt\", and \"test data\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: failed to upload blob test-object=1775151187643.txt: PUT https://stgcfi20260402t161720z.blob.core.windows.net/ccc-test-container-20260402t161720z/test-object=1775151187643.txt\n--------------------------------------------------------------------------------\nRESPONSE 403: 403 This request is not authorized to perform this operation using this permission.\nERROR CODE: AuthorizationPermissionMismatch\n--------------------------------------------------------------------------------\n﻿\u003c?xml version=\"1.0\" encoding=\"utf-8\"?\u003e\u003cError\u003e\u003cCode\u003eAuthorizationPermissionMismatch\u003c/Code\u003e\u003cMessage\u003eThis request is not authorized to perform this operation using this permission.\nRequestId:01a31dbf-f01e-0064-24c7-c29a27000000\nTime:2026-04-02T17:37:09.7421095Z\u003c/Message\u003e\u003c/Error\u003e\n--------------------------------------------------------------------------------\n\n⊘ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-no-access\", \"{UID}\", and \"none\" (skipped)\n⊘ I refer to \"{result}\" as \"testUserNoAccess\" (skipped)\n⊘ I attach \"{result}\" to the test output as \"no-access-user-identity.json\" (skipped)\n⊘ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserNoAccess}\", and \"{false}\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"ReadObject\" using arguments \"{ResourceName}\" and \"test-object={Timestamp}.txt\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I call \"{storage}\" with \"SetObjectPermission\" using arguments \"{ResourceName}\", \"test-object={Timestamp}.txt\", and \"read\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"set-object-permission-error.txt\" (skipped)\n⊘ I call \"{userStorage}\" with \"ReadObject\" using arguments \"{ResourceName}\" and \"test-object={Timestamp}.txt\" (skipped)\n⊘ \"{result}\" is an error (skipped)",
    "status_id": 1,
    "time": 1775151187,
    "time_dt": "2026-04-02T17:33:07Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN02.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775151429,
      "created_time_dt": "2026-04-02T17:37:09Z",
      "desc": "Compliance test scenario: Uniform bucket-level access prevents object-level deny overrides - Duplicate",
      "title": "Uniform bucket-level access prevents object-level deny overrides - Duplicate",
      "types": [],
      "uid": "ccc-test-1744-1775151429"
    },
    "message": "Uniform bucket-level access prevents object-level deny overrides - Duplicate",
    "metadata": {
      "event_code": "Uniform bucket-level access prevents object-level deny overrides - Duplicate",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN02",
        "@Policy",
        "@Duplicate",
        "@object-storage"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775151429,
    "time_dt": "2026-04-02T17:37:09Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN02.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775151429,
      "created_time_dt": "2026-04-02T17:37:09Z",
      "desc": "Compliance test scenario: Service supports bucket soft delete and recovery",
      "title": "Service supports bucket soft delete and recovery",
      "types": [],
      "uid": "ccc-test-1798-1775151429"
    },
    "message": "Service supports bucket soft delete and recovery",
    "metadata": {
      "event_code": "Service supports bucket soft delete and recovery",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN03",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{storage}\" with \"CreateBucket\" using argument \"ccc-test-soft-delete\"\n✓ \"{result}\" is not an error\n✓ I refer to \"{result}\" as \"testBucket\"\n✓ I attach \"{result}\" to the test output as \"created-bucket.json\"\n✓ I call \"{storage}\" with \"DeleteBucket\" using argument \"ccc-test-soft-delete\"\n✓ \"{result}\" is not an error\n✓ I call \"{storage}\" with \"ListDeletedBuckets\"\n✓ \"{result}\" is not an error\n✓ I attach \"{result}\" to the test output as \"deleted-buckets.json\"\n? \"{result}\" should have length greater than \"0\" (undefined)\n⊘ I call \"{storage}\" with \"RestoreBucket\" using argument \"ccc-test-soft-delete\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I call \"{storage}\" with \"ListBuckets\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"restored-buckets.json\" (skipped)\n⊘ I call \"{storage}\" with \"DeleteBucket\" using argument \"ccc-test-soft-delete\" (skipped)\n⊘ \"{result}\" is not an error (skipped)",
    "status_id": 1,
    "time": 1775151429,
    "time_dt": "2026-04-02T17:37:09Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN03.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775151430,
      "created_time_dt": "2026-04-02T17:37:10Z",
      "desc": "Compliance test scenario: Test policy for bucket soft delete",
      "title": "Test policy for bucket soft delete",
      "types": [],
      "uid": "ccc-test-1804-1775151430"
    },
    "message": "Test policy for bucket soft delete",
    "metadata": {
      "event_code": "Test policy for bucket soft delete",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN03",
        "@Policy"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I attempt policy check \"bucket-soft-delete\" for control \"CCC.ObjStor.CN03\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\"\n✓ \"{result}\" is true",
    "status_id": 1,
    "time": 1775151430,
    "time_dt": "2026-04-02T17:37:10Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN03.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775151432,
      "created_time_dt": "2026-04-02T17:37:12Z",
      "desc": "Compliance test scenario: Service prevents modification of locked retention policy",
      "title": "Service prevents modification of locked retention policy",
      "types": [],
      "uid": "ccc-test-1846-1775151432"
    },
    "message": "Service prevents modification of locked retention policy",
    "metadata": {
      "event_code": "Service prevents modification of locked retention policy",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN03",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{storage}\" with \"GetBucketRetentionDurationDays\" using argument \"{ResourceName}\"\n✓ \"{result}\" is not an error\n✓ I refer to \"{result}\" as \"originalRetention\"\n✓ I attach \"{result}\" to the test output as \"original-retention-days.txt\"\n✗ \"{result}\" should be greater than \"0\" - Error: expected {result} (0) to be greater than 0\n⊘ I call \"{storage}\" with \"SetBucketRetentionDurationDays\" using arguments \"{ResourceName}\" and \"1\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"set-retention-error.txt\" (skipped)\n⊘ I call \"{storage}\" with \"GetBucketRetentionDurationDays\" using argument \"{ResourceName}\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n? \"{result}\" should equal \"{originalRetention}\" (undefined)",
    "status_id": 1,
    "time": 1775151432,
    "time_dt": "2026-04-02T17:37:12Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN03.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775151432,
      "created_time_dt": "2026-04-02T17:37:12Z",
      "desc": "Compliance test scenario: Test policy for immutable bucket retention lock",
      "title": "Test policy for immutable bucket retention lock",
      "types": [],
      "uid": "ccc-test-1852-1775151432"
    },
    "message": "Test policy for immutable bucket retention lock",
    "metadata": {
      "event_code": "Test policy for immutable bucket retention lock",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN03",
        "@Policy"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I attempt policy check \"bucket-retention-lock\" for control \"CCC.ObjStor.CN03\" assessment requirement \"AR02\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\"\n✓ \"{result}\" is true",
    "status_id": 1,
    "time": 1775151432,
    "time_dt": "2026-04-02T17:37:12Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN03.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775151434,
      "created_time_dt": "2026-04-02T17:37:14Z",
      "desc": "Compliance test scenario: Service applies default retention policy to newly uploaded object",
      "title": "Service applies default retention policy to newly uploaded object",
      "types": [],
      "uid": "ccc-test-1911-1775151434"
    },
    "message": "Service applies default retention policy to newly uploaded object",
    "metadata": {
      "event_code": "Service applies default retention policy to newly uploaded object",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN04",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-write\", \"{UID}\", and \"write\"\n✓ I refer to \"{result}\" as \"testUserWrite\"\n✓ I attach \"{result}\" to the test output as \"write-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserWrite}\", and \"{true}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"test-retention-object={Timestamp}.txt\", and \"protected data\" (skipped)\n⊘ I attach \"{result}\" to the test output as \"uploaded-object.json\" (skipped)\n⊘ I call \"{userStorage}\" with \"GetObjectRetentionDurationDays\" using arguments \"{ResourceName}\" and \"test-retention-object={Timestamp}.txt\" (skipped)\n⊘ \"{result}\" should be greater than \"1\" (skipped)",
    "status_id": 1,
    "time": 1775151434,
    "time_dt": "2026-04-02T17:37:14Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN04.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775151434,
      "created_time_dt": "2026-04-02T17:37:14Z",
      "desc": "Compliance test scenario: Service enforces retention policy on newly created objects",
      "title": "Service enforces retention policy on newly created objects",
      "types": [],
      "uid": "ccc-test-1922-1775151434"
    },
    "message": "Service enforces retention policy on newly created objects",
    "metadata": {
      "event_code": "Service enforces retention policy on newly created objects",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN04",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"immediate-delete-test={Timestamp}.txt\", and \"test content\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: failed to upload blob immediate-delete-test=1775151434581.txt: PUT https://stgcfi20260402t161720z.blob.core.windows.net/ccc-test-container-20260402t161720z/immediate-delete-test=1775151434581.txt\n--------------------------------------------------------------------------------\nRESPONSE 403: 403 This request is not authorized to perform this operation using this permission.\nERROR CODE: AuthorizationPermissionMismatch\n--------------------------------------------------------------------------------\n﻿\u003c?xml version=\"1.0\" encoding=\"utf-8\"?\u003e\u003cError\u003e\u003cCode\u003eAuthorizationPermissionMismatch\u003c/Code\u003e\u003cMessage\u003eThis request is not authorized to perform this operation using this permission.\nRequestId:01a51baf-f01e-0064-59c7-c29a27000000\nTime:2026-04-02T17:41:16.6369970Z\u003c/Message\u003e\u003c/Error\u003e\n--------------------------------------------------------------------------------\n\n⊘ I call \"{storage}\" with \"DeleteObject\" using arguments \"{ResourceName}\" and \"immediate-delete-test={Timestamp}.txt\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"immediate-delete-error.txt\" (skipped)",
    "status_id": 1,
    "time": 1775151434,
    "time_dt": "2026-04-02T17:37:14Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN04.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775151676,
      "created_time_dt": "2026-04-02T17:41:16Z",
      "desc": "Compliance test scenario: Service validates retention period meets minimum requirements",
      "title": "Service validates retention period meets minimum requirements",
      "types": [],
      "uid": "ccc-test-1932-1775151676"
    },
    "message": "Service validates retention period meets minimum requirements",
    "metadata": {
      "event_code": "Service validates retention period meets minimum requirements",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN04",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"retention-period-test={Timestamp}.txt\", and \"compliance data\"\n✓ I call \"{storage}\" with \"GetObjectRetentionDurationDays\" using arguments \"{ResourceName}\" and \"retention-period-test={Timestamp}.txt\"\n✗ \"{result}\" should be greater than \"1\" - Error: cannot parse {result} as number: strconv.ParseFloat: parsing \"failed to get blob properties: HEAD https://stgcfi20260402t161720z.blob.core.windows.net/ccc-test-container-20260402t161720z/retention-period-test=1775151676645.txt\\n--------------------------------------------------------------------------------\\nRESPONSE 403: 403 This request is not authorized to perform this operation using this permission.\\nERROR CODE: AuthorizationPermissionMismatch\\n--------------------------------------------------------------------------------\\nResponse contained no body\\n--------------------------------------------------------------------------------\\n\": invalid syntax\n⊘ I attach \"{result}\" to the test output as \"retention-period-days.json\" (skipped)",
    "status_id": 1,
    "time": 1775151676,
    "time_dt": "2026-04-02T17:41:16Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN04.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775152160,
      "created_time_dt": "2026-04-02T17:49:20Z",
      "desc": "Compliance test scenario: Test policy for default object retention",
      "title": "Test policy for default object retention",
      "types": [],
      "uid": "ccc-test-1940-1775152160"
    },
    "message": "Test policy for default object retention",
    "metadata": {
      "event_code": "Test policy for default object retention",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN04",
        "@Policy"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✗ I attempt policy check \"object-default-retention\" for control \"CCC.ObjStor.CN04\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" - Error: policy check failed: Azure Blob Default Immutability Policy Check: \n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775152160,
    "time_dt": "2026-04-02T17:49:20Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN04.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775152161,
      "created_time_dt": "2026-04-02T17:49:21Z",
      "desc": "Compliance test scenario: Service prevents object deletion by write user during retention period",
      "title": "Service prevents object deletion by write user during retention period",
      "types": [],
      "uid": "ccc-test-2028-1775152161"
    },
    "message": "Service prevents object deletion by write user during retention period",
    "metadata": {
      "event_code": "Service prevents object deletion by write user during retention period",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN04",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-write\", \"{UID}\", and \"write\"\n✓ I refer to \"{result}\" as \"testUserWrite\"\n✓ I attach \"{result}\" to the test output as \"write-user-identity.json\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserWrite}\", and \"{true}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"protected-object={Timestamp}.txt\", and \"immutable data\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"protected-object.json\" (skipped)\n⊘ I call \"{userStorage}\" with \"DeleteObject\" using arguments \"{ResourceName}\" and \"protected-object={Timestamp}.txt\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"delete-protected-error.txt\" (skipped)\n? \"{result}\" should contain one of \"retention, locked, immutable, protected\" (undefined)",
    "status_id": 1,
    "time": 1775152161,
    "time_dt": "2026-04-02T17:49:21Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN04.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775152162,
      "created_time_dt": "2026-04-02T17:49:22Z",
      "desc": "Compliance test scenario: Service prevents object deletion by admin user during retention period",
      "title": "Service prevents object deletion by admin user during retention period",
      "types": [],
      "uid": "ccc-test-2039-1775152162"
    },
    "message": "Service prevents object deletion by admin user during retention period",
    "metadata": {
      "event_code": "Service prevents object deletion by admin user during retention period",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN04",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"admin-protected-object={Timestamp}.txt\", and \"compliance data\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: failed to upload blob admin-protected-object=1775152162393.txt: PUT https://stgcfi20260402t161720z.blob.core.windows.net/ccc-test-container-20260402t161720z/admin-protected-object=1775152162393.txt\n--------------------------------------------------------------------------------\nRESPONSE 403: 403 This request is not authorized to perform this operation using this permission.\nERROR CODE: AuthorizationPermissionMismatch\n--------------------------------------------------------------------------------\n﻿\u003c?xml version=\"1.0\" encoding=\"utf-8\"?\u003e\u003cError\u003e\u003cCode\u003eAuthorizationPermissionMismatch\u003c/Code\u003e\u003cMessage\u003eThis request is not authorized to perform this operation using this permission.\nRequestId:01aa2d31-f01e-0064-0ac9-c29a27000000\nTime:2026-04-02T17:53:24.4380478Z\u003c/Message\u003e\u003c/Error\u003e\n--------------------------------------------------------------------------------\n\n⊘ I call \"{storage}\" with \"DeleteObject\" using arguments \"{ResourceName}\" and \"admin-protected-object={Timestamp}.txt\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"admin-delete-protected-error.txt\" (skipped)",
    "status_id": 1,
    "time": 1775152162,
    "time_dt": "2026-04-02T17:49:22Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN04.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775152404,
      "created_time_dt": "2026-04-02T17:53:24Z",
      "desc": "Compliance test scenario: Service prevents object modification during retention period",
      "title": "Service prevents object modification during retention period",
      "types": [],
      "uid": "ccc-test-2057-1775152404"
    },
    "message": "Service prevents object modification during retention period",
    "metadata": {
      "event_code": "Service prevents object modification during retention period",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN04",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-write\", \"{UID}\", and \"write\"\n✓ I refer to \"{result}\" as \"testUserWrite\"\n✓ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserWrite}\", and \"{true}\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: Error calling {api}.GetServiceAPIWithIdentity: reflect: Call using *fmt.wrapError as type *iam.Identity\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"modify-test-object={Timestamp}.txt\", and \"original content\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"original-object.json\" (skipped)\n⊘ I call \"{userStorage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"modify-test-object={Timestamp}.txt\", and \"modified content\" (skipped)\n⊘ \"{result}\" is an error (skipped)\n⊘ I attach \"{result}\" to the test output as \"modify-protected-error.txt\" (skipped)\n? \"{result}\" should contain one of \"retention, locked, immutable, protected, exists\" (undefined)",
    "status_id": 1,
    "time": 1775152404,
    "time_dt": "2026-04-02T17:53:24Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN04.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775152405,
      "created_time_dt": "2026-04-02T17:53:25Z",
      "desc": "Compliance test scenario: Service allows object read access during retention period",
      "title": "Service allows object read access during retention period",
      "types": [],
      "uid": "ccc-test-2076-1775152405"
    },
    "message": "Service allows object read access during retention period",
    "metadata": {
      "event_code": "Service allows object read access during retention period",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN04",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"readable-protected-object={Timestamp}.txt\", and \"readable data\"\n✗ \"{result}\" is not an error - Error: expected {result} to not be an error, but got: failed to upload blob readable-protected-object=1775152405049.txt: PUT https://stgcfi20260402t161720z.blob.core.windows.net/ccc-test-container-20260402t161720z/readable-protected-object=1775152405049.txt\n--------------------------------------------------------------------------------\nRESPONSE 403: 403 This request is not authorized to perform this operation using this permission.\nERROR CODE: AuthorizationPermissionMismatch\n--------------------------------------------------------------------------------\n﻿\u003c?xml version=\"1.0\" encoding=\"utf-8\"?\u003e\u003cError\u003e\u003cCode\u003eAuthorizationPermissionMismatch\u003c/Code\u003e\u003cMessage\u003eThis request is not authorized to perform this operation using this permission.\nRequestId:01abc75c-f01e-0064-49ca-c29a27000000\nTime:2026-04-02T17:57:27.0986795Z\u003c/Message\u003e\u003c/Error\u003e\n--------------------------------------------------------------------------------\n\n⊘ I call \"{iamService}\" with \"ProvisionUserWithAccess\" using arguments \"test-user-read\", \"{UID}\", and \"read\" (skipped)\n⊘ I refer to \"{result}\" as \"testUserRead\" (skipped)\n⊘ I attach \"{result}\" to the test output as \"read-user-identity.json\" (skipped)\n⊘ I call \"{api}\" with \"GetServiceAPIWithIdentity\" using arguments \"object-storage\", \"{testUserRead}\", and \"{true}\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I refer to \"{result}\" as \"userStorage\" (skipped)\n⊘ I call \"{userStorage}\" with \"ReadObject\" using arguments \"{ResourceName}\" and \"readable-protected-object={Timestamp}.txt\" (skipped)\n⊘ \"{result}\" is not an error (skipped)\n⊘ I refer to \"{result}\" as \"readResult\" (skipped)\n⊘ I attach \"{result}\" to the test output as \"read-protected-object.json\" (skipped)\n⊘ \"{readResult.Name}\" is \"readable-protected-object={Timestamp}.txt\" (skipped)",
    "status_id": 1,
    "time": 1775152405,
    "time_dt": "2026-04-02T17:53:25Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN04.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775152647,
      "created_time_dt": "2026-04-02T17:57:27Z",
      "desc": "Compliance test scenario: Test policy for object retention enforcement",
      "title": "Test policy for object retention enforcement",
      "types": [],
      "uid": "ccc-test-2084-1775152647"
    },
    "message": "Test policy for object retention enforcement",
    "metadata": {
      "event_code": "Test policy for object retention enforcement",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@CCC.ObjStor.CN04",
        "@Policy"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"iam\"\n✓ I refer to \"{result}\" as \"iamService\"\n✓ I attempt policy check \"object-retention-enforcement\" for control \"CCC.ObjStor.CN04\" assessment requirement \"AR02\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\"\n✓ \"{result}\" is true",
    "status_id": 1,
    "time": 1775152647,
    "time_dt": "2026-04-02T17:57:27Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN04.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775152648,
      "created_time_dt": "2026-04-02T17:57:28Z",
      "desc": "Compliance test scenario: Service enables versioning and objects receive unique version identifiers",
      "title": "Service enables versioning and objects receive unique version identifiers",
      "types": [],
      "uid": "ccc-test-2118-1775152648"
    },
    "message": "Service enables versioning and objects receive unique version identifiers",
    "metadata": {
      "event_code": "Service enables versioning and objects receive unique version identifiers",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@CCC.ObjStor.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{storage}\" with \"IsBucketVersioningEnabled\" using argument \"{ResourceName}\"\n✓ \"{result}\" is true\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"versioned-object.txt\", and \"test content\"\n✓ I refer to \"{result}\" as \"createdObject\"\n? \"{createdObject.VersionID}\" is not empty (undefined)\n⊘ I attach \"{result}\" to the test output as \"versioned-object.json\" (skipped)",
    "status_id": 1,
    "time": 1775152648,
    "time_dt": "2026-04-02T17:57:28Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN05.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775152890,
      "created_time_dt": "2026-04-02T18:01:30Z",
      "desc": "Compliance test scenario: Objects are stored with unique version identifiers",
      "title": "Objects are stored with unique version identifiers",
      "types": [],
      "uid": "ccc-test-2124-1775152890"
    },
    "message": "Objects are stored with unique version identifiers",
    "metadata": {
      "event_code": "Objects are stored with unique version identifiers",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@CCC.ObjStor.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✗ I attempt policy check \"object-storage-versioning\" for control \"CCC.ObjStor.CN05\" assessment requirement \"AR01\" for service \"{ServiceType}\" on resource \"{ResourceName}\" and provider \"{Provider}\" - Error: policy check failed: Azure Blob Versioning Configuration: query execution failed: exit status 1\nOutput: ERROR: AADSTS700024: Client assertion is not within its valid time range. Current time: 2026-04-02T18:01:31.3611355Z, assertion valid from 2026-04-02T17:06:31.0000000Z, expiry time of assertion 2026-04-02T17:11:31.0000000Z. Review the documentation at https://learn.microsoft.com/entra/identity-platform/certificate-credentials . Trace ID: da0ef73d-3f48-4736-b0b9-831371b30b00 Correlation ID: c17c56a0-f042-49fc-96b5-100b03386a5e Timestamp: 2026-04-02 18:01:31Z\nRun the command below to authenticate interactively; additional arguments may be added as needed:\naz logout\naz login\n\n⊘ \"{result}\" is true (skipped)",
    "status_id": 1,
    "time": 1775152890,
    "time_dt": "2026-04-02T18:01:30Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN05.AR01"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775152891,
      "created_time_dt": "2026-04-02T18:01:31Z",
      "desc": "Compliance test scenario: Modified objects receive new version identifiers",
      "title": "Modified objects receive new version identifiers",
      "types": [],
      "uid": "ccc-test-2156-1775152891"
    },
    "message": "Modified objects receive new version identifiers",
    "metadata": {
      "event_code": "Modified objects receive new version identifiers",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@CCC.ObjStor.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"version-test-object={Timestamp}.txt\", and \"original content\"\n✓ I refer to \"{result.VersionID}\" as \"version1\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"version-test-object={Timestamp}.txt\", and \"modified content\"\n✓ I refer to \"{result.VersionID}\" as \"version2\"\n? \"{version1}\" is not equal to \"{version2}\" (undefined)",
    "status_id": 1,
    "time": 1775152891,
    "time_dt": "2026-04-02T18:01:31Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN05.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775153014,
      "created_time_dt": "2026-04-02T18:03:34Z",
      "desc": "Compliance test scenario: Modified objects receive new version identifiers - Duplicate",
      "title": "Modified objects receive new version identifiers - Duplicate",
      "types": [],
      "uid": "ccc-test-2161-1775153014"
    },
    "message": "Modified objects receive new version identifiers - Duplicate",
    "metadata": {
      "event_code": "Modified objects receive new version identifiers - Duplicate",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@CCC.ObjStor.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@Duplicate"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775153014,
    "time_dt": "2026-04-02T18:03:34Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN05.AR02"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775153014,
      "created_time_dt": "2026-04-02T18:03:34Z",
      "desc": "Compliance test scenario: Modified objects receive new version identifiers",
      "title": "Modified objects receive new version identifiers",
      "types": [],
      "uid": "ccc-test-2202-1775153014"
    },
    "message": "Modified objects receive new version identifiers",
    "metadata": {
      "event_code": "Modified objects receive new version identifiers",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@CCC.ObjStor.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"version-test-object={Timestamp}.txt\", and \"original content\"\n✓ I refer to \"{result.VersionID}\" as \"version1\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"version-test-object={Timestamp}.txt\", and \"modified content\"\n✓ I refer to \"{result.VersionID}\" as \"version2\"\n✓ I call \"{storage}\" with \"ReadObjectAtVersion\" using arguments \"{ResourceName}\", \"version-test-object={Timestamp}.txt\", and \"{version1}\"\n✓ I attach \"{result}\" to the test output as \"original-content.json\"\n✗ \"{result.Data}\" contains \"original content\" - Error: expected {result.Data} to contain 'original content', but got '\u003cnil\u003e'\n⊘ I call \"{storage}\" with \"ReadObjectAtVersion\" using arguments \"{ResourceName}\", \"version-test-object={Timestamp}.txt\", and \"{version2}\" (skipped)\n⊘ \"{result.Data}\" contains \"modified content\" (skipped)\n⊘ I attach \"{result}\" to the test output as \"modified-content.json\" (skipped)",
    "status_id": 1,
    "time": 1775153014,
    "time_dt": "2026-04-02T18:03:34Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN05.AR03"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775153016,
      "created_time_dt": "2026-04-02T18:03:36Z",
      "desc": "Compliance test scenario: Previous object versions can be recovered",
      "title": "Previous object versions can be recovered",
      "types": [],
      "uid": "ccc-test-2207-1775153016"
    },
    "message": "Previous object versions can be recovered",
    "metadata": {
      "event_code": "Previous object versions can be recovered",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@CCC.ObjStor.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775153016,
    "time_dt": "2026-04-02T18:03:36Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN05.AR03"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775153016,
      "created_time_dt": "2026-04-02T18:03:36Z",
      "desc": "Compliance test scenario: Deleted object data can be reloaded from previous version",
      "title": "Deleted object data can be reloaded from previous version",
      "types": [],
      "uid": "ccc-test-2251-1775153016"
    },
    "message": "Deleted object data can be reloaded from previous version",
    "metadata": {
      "event_code": "Deleted object data can be reloaded from previous version",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@CCC.ObjStor.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"recover-deleted-object={Timestamp}.txt\", and \"data to retain\"\n✓ I refer to \"{result.VersionID}\" as \"retainedVersionId\"\n✓ I call \"{storage}\" with \"DeleteObject\" using arguments \"{ResourceName}\" and \"recover-deleted-object={Timestamp}.txt\"\n✓ I call \"{storage}\" with \"ReadObjectAtVersion\" using arguments \"{ResourceName}\", \"recover-deleted-object={Timestamp}.txt\", and \"{retainedVersionId}\"\n✗ \"{result.Data}\" contains \"data to retain\" - Error: expected {result.Data} to contain 'data to retain', but got '\u003cnil\u003e'\n⊘ I attach \"{result}\" to the test output as \"recovered-deleted-version.json\" (skipped)",
    "status_id": 1,
    "time": 1775153016,
    "time_dt": "2026-04-02T18:03:36Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN05.AR04"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775153018,
      "created_time_dt": "2026-04-02T18:03:38Z",
      "desc": "Compliance test scenario: Deleted object version remains in version list",
      "title": "Deleted object version remains in version list",
      "types": [],
      "uid": "ccc-test-2261-1775153018"
    },
    "message": "Deleted object version remains in version list",
    "metadata": {
      "event_code": "Deleted object version remains in version list",
      "product": {
        "name": "CCC-Complete (Behavioural)",
        "uid": "CCC-Complete (Behavioural)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@CCC.ObjStor.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Behavioural"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Medium",
    "severity_id": 3,
    "status": "New",
    "status_code": "FAIL",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ I call \"{storage}\" with \"CreateObject\" using arguments \"{ResourceName}\", \"list-deleted-versions-object={Timestamp}.txt\", and \"versioned data\"\n✓ I refer to \"{result.VersionID}\" as \"listedVersionId\"\n✓ I call \"{storage}\" with \"DeleteObject\" using arguments \"{ResourceName}\" and \"list-deleted-versions-object={Timestamp}.txt\"\n✓ I call \"{storage}\" with \"ListObjectVersions\" using arguments \"{ResourceName}\" and \"list-deleted-versions-object={Timestamp}.txt\"\n✗ \"{result}\" is an array of objects with at least the following contents - Error: field {result} is not an array\n⊘ I attach \"{result}\" to the test output as \"versions-after-delete.json\" (skipped)",
    "status_id": 1,
    "time": 1775153018,
    "time_dt": "2026-04-02T18:03:38Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN05.AR04"
        ]
      }
    }
  },
  {
    "activity_id": 1,
    "activity_name": "Test",
    "category_name": "Findings",
    "category_uid": 2,
    "class_name": "Compliance Finding",
    "class_uid": 2004,
    "finding_info": {
      "created_time": 1775153019,
      "created_time_dt": "2026-04-02T18:03:39Z",
      "desc": "Compliance test scenario: Object versions are retained after deletion - Duplicate",
      "title": "Object versions are retained after deletion - Duplicate",
      "types": [],
      "uid": "ccc-test-2266-1775153019"
    },
    "message": "Object versions are retained after deletion - Duplicate",
    "metadata": {
      "event_code": "Object versions are retained after deletion - Duplicate",
      "product": {
        "name": "CCC-Complete (Policy)",
        "uid": "CCC-Complete (Policy)",
        "vendor_name": "FINOS",
        "version": "0.1"
      },
      "profiles": [
        "@PerService",
        "@object-storage",
        "@CCC.ObjStor",
        "@CCC.ObjStor.CN05",
        "@tlp-clear",
        "@tlp-green",
        "@tlp-amber",
        "@tlp-red",
        "@Policy",
        "@Duplicate"
      ],
      "version": "1.4.0"
    },
    "resources": [
      {
        "cloud_partition": "azure",
        "data": {
          "details": " service on :",
          "metadata": {
            "findings": [],
            "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
            "region": "eastus",
            "status": "ACTIVE",
            "tags": [],
            "type": "object-storage"
          }
        },
        "group": {
          "name": "object-storage"
        },
        "name": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z",
        "region": "eastus",
        "type": "object-storage",
        "uid": "/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_20260402t161720z/providers/Microsoft.Storage/storageAccounts/stgcfi20260402t161720z"
      }
    ],
    "severity": "Informational",
    "severity_id": 1,
    "status": "New",
    "status_code": "PASS",
    "status_detail": "✓ a cloud api for \"{Instance}\" in \"api\"\n✓ I call \"{api}\" with \"GetServiceAPI\" using argument \"object-storage\"\n✓ I refer to \"{result}\" as \"storage\"\n✓ no-op required",
    "status_id": 1,
    "time": 1775153019,
    "time_dt": "2026-04-02T18:03:39Z",
    "type_name": "Compliance Finding: Test",
    "type_uid": 200401,
    "unmapped": {
      "compliance": {
        "CCC": [
          "CCC.ObjStor.CN05.AR04"
        ]
      }
    }
  }
]