Skip to main content

CCC-Complete (Policy) 0.1

Test results for this specific product, vendor, and version combination

VendorFINOS
ProductCCC-Complete (Policy)
Version0.1

Download Raw Results

Download the original OCSF or HTML result files used to generate this page

File NameDownload
azure-storage-account-ccc-test-container-1775043178-port
azure-storage-account-ccc-test-container-1775043178-service
azure-storage-account-combined
azure-storage-account-summary

Test Summary

Aggregate summary of all tests for this configuration result

Resources In Configuration1
Count of Tests82
Passing Tests46
Failing Tests36
Catalogs Tested

Test Mapping Summary

Summary of test mappings showing how event codes map to test requirements

Control CatalogTest RequirementMapped Tests (Event Code | Total | Passing | Failing)
CCC.Core
CCC.Core.CN01.AR01
When a port is exposed for non-SSH network traffic, all traffic MUST include a TLS handshake AND be encrypted using TLS 1.3 or higher.
Storage account enforces minimum TLS version
202
CCC.Core
CCC.Core.CN01.AR03
When the service receives unencrypted traffic, then it MUST either block the request or automatically redirect it to the secure equivalent.
Object storage policy prevents the use of unencrypted ports
202
CCC.Core
CCC.Core.CN01.AR08
When a service transmits data using TLS, mutual TLS (mTLS) MUST be implemented to require both client and server certificate authentication for all connections.
Storage account enforces mutual TLS - NotTested
202
CCC.Core
CCC.Core.CN02.AR01
When data is stored, it MUST be encrypted using the latest industry-standard encryption methods.
Object storage encryption compliance
220
CCC.Core
CCC.Core.CN03.AR01
When an entity attempts to modify the service through a user interface, the authentication process MUST require multiple identifying factors for authentication.
Object storage delete protection compliance
220
CCC.Core
CCC.Core.CN03.AR02
When an entity attempts to modify the service through an API endpoint, the authentication process MUST require a credential such as an API key or token AND originate from within the trust perimeter.
API modification requires credential and trust perimeter origin - NotTestable
220
CCC.Core
CCC.Core.CN03.AR03
When an entity attempts to view information on the service through a user interface, the authentication process MUST require multiple identifying factors from the user.
UI viewing requires multi-factor authentication - NotTestable
220
CCC.Core
CCC.Core.CN03.AR04
When an entity attempts to view information on the service through an API endpoint, the authentication process MUST require a credential such as an API key or token AND originate from within the trust perimeter.
API viewing requires credential and trust perimeter origin - NotTestable
220
CCC.Core
CCC.Core.CN04.AR01
When administrative access or configuration change is attempted on the service or a child resource, the service MUST log the client identity, time, and result of the attempt.
Object storage admin logging compliance
220
CCC.Core
CCC.Core.CN04.AR02
When any attempt is made to modify data on the service or a child resource, the service MUST log the client identity, time, and result of the attempt.
Object storage data modification logging compliance
202
CCC.Core
CCC.Core.CN04.AR03
When any attempt is made to read data on the service or a child resource, the service MUST log the client identity, time, and result of the attempt.
Data read logging compliance
202
CCC.Core
CCC.Core.CN05.AR01
When an attempt is made to modify data on the service or a child resource, the service MUST block requests from unauthorized entities.
Storage is not configured for public write access
220
CCC.Core
CCC.Core.CN05.AR02
When administrative access or configuration change is attempted on the service or a child resource, the service MUST refuse requests from unauthorized entities.
Unauthorized administrative access is blocked
220
CCC.Core
CCC.Core.CN05.AR03
When administrative access or configuration change is attempted on the service or a child resource in a multi-tenant environment, the service MUST refuse requests across tenant boundaries unless the origin is explicitly included in a pre-approved allowlist.
Cross-tenant access is blocked without explicit allowlist
220
CCC.Core
CCC.Core.CN05.AR04
When data is requested from outside the trust perimeter, the service MUST refuse requests from unauthorized entities.
External unauthorized data requests are blocked
220
CCC.Core
CCC.Core.CN05.AR05
When any request is made from outside the trust perimeter, the service MUST NOT provide any response that may indicate the service exists.
External requests do not reveal service existence - NotTested
202
CCC.Core
CCC.Core.CN05.AR06
When any request is made to the service or a child resource, the service MUST refuse requests from unauthorized entities.
All unauthorized requests are blocked - Duplicate
220
CCC.Core
CCC.Core.CN06.AR01
When the service is running, its region and availability zone MUST be included in a list of explicitly trusted or approved locations within the trust perimeter.
Object storage region compliance
220
CCC.Core
CCC.Core.CN06.AR02
When a child resource is deployed, its region and availability zone MUST be included in a list of explicitly trusted or approved locations within the trust perimeter.
Child resource region compliance - NotTestable
220
CCC.Core
CCC.Core.CN07.AR01
When enumeration activities are detected, the service MUST publish an event to a monitored channel which includes the client identity, time, and nature of the activity.
Enumeration activities publish events to monitored channels
202
CCC.Core
CCC.Core.CN07.AR02
When enumeration activities are detected, the service MUST log the client identity, time, and nature of the activity.
Enumeration activities are logged
202
CCC.Core
CCC.Core.CN08.AR01
When data is created or modified, the data MUST have a complete and recoverable duplicate that is stored in a physically separate data center.
Object storage replication compliance
220
CCC.Core
CCC.Core.CN08.AR02
When data is replicated into a second location, the service MUST be able to accurately represent the replication locations, replication status, and data synchronization status.
Object storage replication status is visible
220
CCC.Core
CCC.Core.CN09.AR01
When the service is operational, its logs and any child resource logs MUST NOT be accessible from the resource they record access to.
Object storage access logging compliance
202
CCC.Core
CCC.Core.CN09.AR02
When the service is operational, disabling the logs for the service or its child resources MUST NOT be possible without also disabling the corresponding resource.
Disabling logs requires disabling the resource - NotTestable
220
CCC.Core
CCC.Core.CN09.AR03
When the service is operational, any attempt to redirect logs for the service or its child resources MUST NOT be possible without halting operation of the corresponding resource and publishing corresponding events to monitored channels.
Redirecting logs requires halting the resource - NotTestable
220
CCC.Core
CCC.Core.CN10.AR01
When data is replicated, the service MUST ensure that replication only occurs to destinations that are explicitly included within the defined trust perimeter.
Object storage replication destination compliance
220
CCC.ObjStor
CCC.ObjStor.CN01.AR01
Description not available
Test policy for bucket access control
220
CCC.ObjStor
CCC.ObjStor.CN01.AR02
Description not available
All unauthorized requests are blocked
202
CCC.ObjStor
CCC.ObjStor.CN01.AR03
Description not available
All unauthorized requests are blocked
202
CCC.ObjStor
CCC.ObjStor.CN01.AR04
Description not available
All unauthorized requests are blocked
202
CCC.ObjStor
CCC.ObjStor.CN02.AR01
Description not available
Test policy for uniform access
202
CCC.ObjStor
CCC.ObjStor.CN02.AR02
Description not available
Uniform bucket-level access prevents object-level deny overrides - Duplicate
220
CCC.ObjStor
CCC.ObjStor.CN03.AR01
Description not available
Test policy for bucket soft delete
202
CCC.ObjStor
CCC.ObjStor.CN03.AR02
Description not available
Test policy for immutable bucket retention lock
202
CCC.ObjStor
CCC.ObjStor.CN04.AR01
Description not available
Test policy for default object retention
202
CCC.ObjStor
CCC.ObjStor.CN04.AR02
Description not available
Test policy for object retention enforcement
202
CCC.ObjStor
CCC.ObjStor.CN05.AR01
Description not available
Objects are stored with unique version identifiers
202
CCC.ObjStor
CCC.ObjStor.CN05.AR02
Description not available
Modified objects receive new version identifiers - Duplicate
220
CCC.ObjStor
CCC.ObjStor.CN05.AR03
Description not available
Previous object versions can be recovered
220
CCC.ObjStor
CCC.ObjStor.CN05.AR04
Description not available
Object versions are retained after deletion - Duplicate
220

Resource Summary

Summary of all resources mentioned in OCSF results

Resource NameResource TypeControl CatalogsTotal TestsPassingFailing
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage824636

Test Results

OCSF test results filtered for entries with CCC compliance mappings

StatusFindingResource NameResource TypeMessageTest Requirements
FAIL
Storage account enforces minimum TLS version
✓ a cloud api for "{Instance}" in "api" ✗ I attempt policy check "object-storage-tls-policy" for control "CCC.Core.CN01" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Storage Account TLS Policy Check: ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Storage account enforces minimum TLS version
FAIL
Object storage policy prevents the use of unencrypted ports
✗ I attempt policy check "object-storage-unencrypted-policy" for control "CCC.Core.CN01" assessment requirement "AR03" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Storage Unencrypted Traffic Block Check: ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Object storage policy prevents the use of unencrypted ports
FAIL
Storage account enforces mutual TLS - NotTested
✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Storage account enforces mutual TLS - NotTested
PASS
Object storage encryption compliance
✓ a cloud api for "{Instance}" in "api" ✓ I attempt policy check "object-storage-encryption" for control "CCC.Core.CN02" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" ✓ "{result}" is true
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Object storage encryption compliance
PASS
Object storage delete protection compliance
✓ a cloud api for "{Instance}" in "api" ✓ I attempt policy check "object-storage-delete-protection" for control "CCC.Core.CN03" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" ✓ "{result}" is true
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Object storage delete protection compliance
PASS
API modification requires credential and trust perimeter origin - NotTestable
✓ a cloud api for "{Instance}" in "api" ✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
API modification requires credential and trust perimeter origin - NotTestable
PASS
UI viewing requires multi-factor authentication - NotTestable
✓ a cloud api for "{Instance}" in "api" ✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
UI viewing requires multi-factor authentication - NotTestable
PASS
API viewing requires credential and trust perimeter origin - NotTestable
✓ a cloud api for "{Instance}" in "api" ✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
API viewing requires credential and trust perimeter origin - NotTestable
PASS
Object storage admin logging compliance
✓ I attempt policy check "admin-logging" for control "CCC.Core.CN04" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" ✓ "{result}" is true
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Object storage admin logging compliance
FAIL
Object storage data modification logging compliance
✓ a cloud api for "{Instance}" in "api" ✗ I attempt policy check "data-write-logging" for control "CCC.Core.CN04" assessment requirement "AR02" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Diagnostic Logging Write Configuration: ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Object storage data modification logging compliance
FAIL
Data read logging compliance
✓ a cloud api for "{Instance}" in "api" ✗ I attempt policy check "data-read-logging" for control "CCC.Core.CN04" assessment requirement "AR03" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Diagnostic Logging Read Configuration: ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Data read logging compliance
PASS
Storage is not configured for public write access
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ I call "{api}" with "GetServiceAPI" using argument "iam" ✓ I refer to "{result}" as "iamService" ✓ I attempt policy check "object-storage-block-public-write-access" for control "CCC.Core.CN05" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" ✓ "{result}" is true
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Storage is not configured for public write access
PASS
Unauthorized administrative access is blocked
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ I call "{api}" with "GetServiceAPI" using argument "iam" ✓ I refer to "{result}" as "iamService" ✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Unauthorized administrative access is blocked
PASS
Cross-tenant access is blocked without explicit allowlist
✓ a cloud api for "{Instance}" in "api" ✓ I attempt policy check "object-storage-cross-tenant-block" for control "CCC.Core.CN05" assessment requirement "AR03" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" ✓ "{result}" is true
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Cross-tenant access is blocked without explicit allowlist
PASS
External unauthorized data requests are blocked
✓ a cloud api for "{Instance}" in "api" ✓ I attempt policy check "object-storage-block-public-read" for control "CCC.Core.CN05" assessment requirement "AR04" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" ✓ "{result}" is true
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
External unauthorized data requests are blocked
FAIL
External requests do not reveal service existence - NotTested
✓ a cloud api for "{Instance}" in "api" ✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
External requests do not reveal service existence - NotTested
PASS
All unauthorized requests are blocked - Duplicate
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ I call "{api}" with "GetServiceAPI" using argument "iam" ✓ I refer to "{result}" as "iamService" ✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
All unauthorized requests are blocked - Duplicate
PASS
Object storage region compliance
✓ a cloud api for "{Instance}" in "api" ✓ I attempt policy check "object-storage-region" for control "CCC.Core.CN06" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" ✓ "{result}" is true
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Object storage region compliance
PASS
Child resource region compliance - NotTestable
✓ a cloud api for "{Instance}" in "api" ✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Child resource region compliance - NotTestable
FAIL
Enumeration activities publish events to monitored channels
✓ a cloud api for "{Instance}" in "api" ✗ I attempt policy check "enumeration-monitoring-policy" for control "CCC.Core.CN07" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Storage Enumeration Monitoring Policy Check: ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Enumeration activities publish events to monitored channels
FAIL
Enumeration activities are logged
✓ a cloud api for "{Instance}" in "api" ✗ I attempt policy check "enumeration-logging-policy" for control "CCC.Core.CN07" assessment requirement "AR02" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Storage Enumeration Logging Policy Check: ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Enumeration activities are logged
PASS
Object storage replication compliance
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ I attempt policy check "object-storage-replication" for control "CCC.Core.CN08" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" ✓ "{result}" is true
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Object storage replication compliance
PASS
Object storage replication status is visible
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ I attempt policy check "object-storage-replication-status" for control "CCC.Core.CN08" assessment requirement "AR02" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" ✓ "{result}" is true
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Object storage replication status is visible
FAIL
Object storage access logging compliance
✓ a cloud api for "{Instance}" in "api" ✗ I attempt policy check "object-storage-access-logging" for control "CCC.Core.CN09" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Storage Account Diagnostic Logging Configuration: ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Object storage access logging compliance
PASS
Disabling logs requires disabling the resource - NotTestable
✓ a cloud api for "{Instance}" in "api" ✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Disabling logs requires disabling the resource - NotTestable
PASS
Redirecting logs requires halting the resource - NotTestable
✓ a cloud api for "{Instance}" in "api" ✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Redirecting logs requires halting the resource - NotTestable
PASS
Object storage replication destination compliance
✓ a cloud api for "{Instance}" in "api" ✓ I attempt policy check "object-storage-replication-destination" for control "CCC.Core.CN10" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" ✓ "{result}" is true
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Object storage replication destination compliance
PASS
Test policy for bucket access control
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ I call "{api}" with "GetServiceAPI" using argument "iam" ✓ I refer to "{result}" as "iamService" ✓ I attempt policy check "no-public-access" for control "CCC.ObjStor.CN01" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" ✓ "{result}" is true
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Test policy for bucket access control
CCC.ObjStor.CN01.AR01
FAIL
All unauthorized requests are blocked
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ I call "{api}" with "GetServiceAPI" using argument "iam" ✓ I refer to "{result}" as "iamService" ✓ I call "{storage}" with "CreateObject" using arguments "{ResourceName}", "test-object={Timestamp}.txt", and "test content" ✗ "{result}" is not an error - Error: expected {result} to not be an error, but got: failed to upload blob test-object=1775046164302.txt: PUT https://storagecfitest1775043178.blob.core.windows.net/ccc-test-container-1775043178/test-object=1775046164302.txt -------------------------------------------------------------------------------- RESPONSE 403: 403 This request is not authorized to perform this operation using this permission. ERROR CODE: AuthorizationPermissionMismatch -------------------------------------------------------------------------------- <?xml version="1.0" encoding="utf-8"?><Error><Code>AuthorizationPermissionMismatch</Code><Message>This request is not authorized to perform this operation using this permission. RequestId:cc408d5d-e01e-0003-6ed2-c1c301000000 Time:2026-04-01T12:26:46.4217644Z</Message></Error> -------------------------------------------------------------------------------- ⊘ I attempt policy check "object-storage-no-public-principals" for control "CCC.ObjStor.CN01" assessment requirement "AR02" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" (skipped) ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
All unauthorized requests are blocked
CCC.ObjStor.CN01.AR02
FAIL
All unauthorized requests are blocked
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ I call "{api}" with "GetServiceAPI" using argument "iam" ✓ I refer to "{result}" as "iamService" ✗ I attempt policy check "object-storage-no-public-principals" for control "CCC.ObjStor.CN01" assessment requirement "AR03" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Storage RBAC in Use: ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
All unauthorized requests are blocked
CCC.ObjStor.CN01.AR03
FAIL
All unauthorized requests are blocked
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ "{result}" is not an error ✓ I call "{api}" with "GetServiceAPI" using argument "iam" ✓ I refer to "{result}" as "iamService" ✓ "{result}" is not an error ✗ I attempt policy check "object-storage-no-public-principals" for control "CCC.ObjStor.CN01" assessment requirement "AR04" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Storage RBAC in Use: ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
All unauthorized requests are blocked
CCC.ObjStor.CN01.AR04
FAIL
Test policy for uniform access
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ I call "{api}" with "GetServiceAPI" using argument "iam" ✓ I refer to "{result}" as "iamService" ✗ I attempt policy check "uniform-bucket-level-access" for control "CCC.ObjStor.CN02" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Blob Uniform Access Check: query execution failed: exit status 1 Output: ERROR: AADSTS700024: Client assertion is not within its valid time range. Current time: 2026-04-01T12:42:58.6161680Z, assertion valid from 2026-04-01T11:32:59.0000000Z, expiry time of assertion 2026-04-01T11:37:59.0000000Z. Review the documentation at https://learn.microsoft.com/entra/identity-platform/certificate-credentials . Trace ID: 52ed7894-f1f6-47b6-9683-c0d71b491400 Correlation ID: 059544d3-5f50-4738-b39e-a1b8d88f8e19 Timestamp: 2026-04-01 12:42:58Z Run the command below to authenticate interactively; additional arguments may be added as needed: az logout az login ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Test policy for uniform access
CCC.ObjStor.CN02.AR01
PASS
Uniform bucket-level access prevents object-level deny overrides - Duplicate
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ I call "{api}" with "GetServiceAPI" using argument "iam" ✓ I refer to "{result}" as "iamService" ✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Uniform bucket-level access prevents object-level deny overrides - Duplicate
CCC.ObjStor.CN02.AR02
FAIL
Test policy for bucket soft delete
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✗ I attempt policy check "bucket-soft-delete" for control "CCC.ObjStor.CN03" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Blob Soft Delete Check: query execution failed: exit status 1 Output: ERROR: AADSTS700024: Client assertion is not within its valid time range. Current time: 2026-04-01T12:43:01.0015056Z, assertion valid from 2026-04-01T11:32:59.0000000Z, expiry time of assertion 2026-04-01T11:37:59.0000000Z. Review the documentation at https://learn.microsoft.com/entra/identity-platform/certificate-credentials . Trace ID: a6441681-f874-4c4e-8438-2d0ccb260c00 Correlation ID: b94a6db1-1334-450f-8797-89a479094410 Timestamp: 2026-04-01 12:43:01Z Run the command below to authenticate interactively; additional arguments may be added as needed: az logout az login ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Test policy for bucket soft delete
CCC.ObjStor.CN03.AR01
FAIL
Test policy for immutable bucket retention lock
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✗ I attempt policy check "bucket-retention-lock" for control "CCC.ObjStor.CN03" assessment requirement "AR02" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Blob Immutability Policy Lock Check: query execution failed: exit status 1 Output: ERROR: AADSTS700024: Client assertion is not within its valid time range. Current time: 2026-04-01T12:43:02.6736890Z, assertion valid from 2026-04-01T11:32:59.0000000Z, expiry time of assertion 2026-04-01T11:37:59.0000000Z. Review the documentation at https://learn.microsoft.com/entra/identity-platform/certificate-credentials . Trace ID: 2ebbfacb-fbd1-4eea-bea8-5690fa430900 Correlation ID: 23ab2cd7-e6e7-40df-b685-a43fe101a3cc Timestamp: 2026-04-01 12:43:02Z Run the command below to authenticate interactively; additional arguments may be added as needed: az logout az login ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Test policy for immutable bucket retention lock
CCC.ObjStor.CN03.AR02
FAIL
Test policy for default object retention
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ I call "{api}" with "GetServiceAPI" using argument "iam" ✓ I refer to "{result}" as "iamService" ✗ I attempt policy check "object-default-retention" for control "CCC.ObjStor.CN04" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Blob Default Immutability Policy Check: query execution failed: exit status 1 Output: ERROR: AADSTS700024: Client assertion is not within its valid time range. Current time: 2026-04-01T12:47:07.5073091Z, assertion valid from 2026-04-01T11:32:59.0000000Z, expiry time of assertion 2026-04-01T11:37:59.0000000Z. Review the documentation at https://learn.microsoft.com/entra/identity-platform/certificate-credentials . Trace ID: d279db72-baf0-475c-97b4-6524c8c60300 Correlation ID: e1f13500-6b34-42c8-b895-5322b3e1e218 Timestamp: 2026-04-01 12:47:07Z Run the command below to authenticate interactively; additional arguments may be added as needed: az logout az login ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Test policy for default object retention
CCC.ObjStor.CN04.AR01
FAIL
Test policy for object retention enforcement
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ I call "{api}" with "GetServiceAPI" using argument "iam" ✓ I refer to "{result}" as "iamService" ✗ I attempt policy check "object-retention-enforcement" for control "CCC.ObjStor.CN04" assessment requirement "AR02" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Blob Object Retention Enforcement Check: query execution failed: exit status 1 Output: ERROR: AADSTS700024: Client assertion is not within its valid time range. Current time: 2026-04-01T12:55:14.7375633Z, assertion valid from 2026-04-01T11:32:59.0000000Z, expiry time of assertion 2026-04-01T11:37:59.0000000Z. Review the documentation at https://learn.microsoft.com/entra/identity-platform/certificate-credentials . Trace ID: fc41409f-8f97-4fa9-a831-f58ef1340f00 Correlation ID: 88400164-6227-4ac7-a8ab-f87474f854a5 Timestamp: 2026-04-01 12:55:14Z Run the command below to authenticate interactively; additional arguments may be added as needed: az logout az login ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Test policy for object retention enforcement
CCC.ObjStor.CN04.AR02
FAIL
Objects are stored with unique version identifiers
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✗ I attempt policy check "object-storage-versioning" for control "CCC.ObjStor.CN05" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Blob Versioning Configuration: query execution failed: exit status 1 Output: ERROR: AADSTS700024: Client assertion is not within its valid time range. Current time: 2026-04-01T12:55:16.5866754Z, assertion valid from 2026-04-01T11:32:59.0000000Z, expiry time of assertion 2026-04-01T11:37:59.0000000Z. Review the documentation at https://learn.microsoft.com/entra/identity-platform/certificate-credentials . Trace ID: d7da925a-8ff9-406d-8c98-083c6d210b00 Correlation ID: 519631d6-ddf2-43d2-a76b-a4d21aeea010 Timestamp: 2026-04-01 12:55:16Z Run the command below to authenticate interactively; additional arguments may be added as needed: az logout az login ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Objects are stored with unique version identifiers
CCC.ObjStor.CN05.AR01
PASS
Modified objects receive new version identifiers - Duplicate
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Modified objects receive new version identifiers - Duplicate
CCC.ObjStor.CN05.AR02
PASS
Previous object versions can be recovered
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Previous object versions can be recovered
CCC.ObjStor.CN05.AR03
PASS
Object versions are retained after deletion - Duplicate
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Object versions are retained after deletion - Duplicate
CCC.ObjStor.CN05.AR04
FAIL
Storage account enforces minimum TLS version
✓ a cloud api for "{Instance}" in "api" ✗ I attempt policy check "object-storage-tls-policy" for control "CCC.Core.CN01" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Storage Account TLS Policy Check: ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Storage account enforces minimum TLS version
FAIL
Object storage policy prevents the use of unencrypted ports
✗ I attempt policy check "object-storage-unencrypted-policy" for control "CCC.Core.CN01" assessment requirement "AR03" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Storage Unencrypted Traffic Block Check: ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Object storage policy prevents the use of unencrypted ports
FAIL
Storage account enforces mutual TLS - NotTested
✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Storage account enforces mutual TLS - NotTested
PASS
Object storage encryption compliance
✓ a cloud api for "{Instance}" in "api" ✓ I attempt policy check "object-storage-encryption" for control "CCC.Core.CN02" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" ✓ "{result}" is true
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Object storage encryption compliance
PASS
Object storage delete protection compliance
✓ a cloud api for "{Instance}" in "api" ✓ I attempt policy check "object-storage-delete-protection" for control "CCC.Core.CN03" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" ✓ "{result}" is true
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Object storage delete protection compliance
PASS
API modification requires credential and trust perimeter origin - NotTestable
✓ a cloud api for "{Instance}" in "api" ✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
API modification requires credential and trust perimeter origin - NotTestable
PASS
UI viewing requires multi-factor authentication - NotTestable
✓ a cloud api for "{Instance}" in "api" ✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
UI viewing requires multi-factor authentication - NotTestable
PASS
API viewing requires credential and trust perimeter origin - NotTestable
✓ a cloud api for "{Instance}" in "api" ✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
API viewing requires credential and trust perimeter origin - NotTestable
PASS
Object storage admin logging compliance
✓ I attempt policy check "admin-logging" for control "CCC.Core.CN04" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" ✓ "{result}" is true
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Object storage admin logging compliance
FAIL
Object storage data modification logging compliance
✓ a cloud api for "{Instance}" in "api" ✗ I attempt policy check "data-write-logging" for control "CCC.Core.CN04" assessment requirement "AR02" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Diagnostic Logging Write Configuration: ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Object storage data modification logging compliance
FAIL
Data read logging compliance
✓ a cloud api for "{Instance}" in "api" ✗ I attempt policy check "data-read-logging" for control "CCC.Core.CN04" assessment requirement "AR03" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Diagnostic Logging Read Configuration: ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Data read logging compliance
PASS
Storage is not configured for public write access
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ I call "{api}" with "GetServiceAPI" using argument "iam" ✓ I refer to "{result}" as "iamService" ✓ I attempt policy check "object-storage-block-public-write-access" for control "CCC.Core.CN05" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" ✓ "{result}" is true
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Storage is not configured for public write access
PASS
Unauthorized administrative access is blocked
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ I call "{api}" with "GetServiceAPI" using argument "iam" ✓ I refer to "{result}" as "iamService" ✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Unauthorized administrative access is blocked
PASS
Cross-tenant access is blocked without explicit allowlist
✓ a cloud api for "{Instance}" in "api" ✓ I attempt policy check "object-storage-cross-tenant-block" for control "CCC.Core.CN05" assessment requirement "AR03" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" ✓ "{result}" is true
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Cross-tenant access is blocked without explicit allowlist
PASS
External unauthorized data requests are blocked
✓ a cloud api for "{Instance}" in "api" ✓ I attempt policy check "object-storage-block-public-read" for control "CCC.Core.CN05" assessment requirement "AR04" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" ✓ "{result}" is true
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
External unauthorized data requests are blocked
FAIL
External requests do not reveal service existence - NotTested
✓ a cloud api for "{Instance}" in "api" ✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
External requests do not reveal service existence - NotTested
PASS
All unauthorized requests are blocked - Duplicate
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ I call "{api}" with "GetServiceAPI" using argument "iam" ✓ I refer to "{result}" as "iamService" ✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
All unauthorized requests are blocked - Duplicate
PASS
Object storage region compliance
✓ a cloud api for "{Instance}" in "api" ✓ I attempt policy check "object-storage-region" for control "CCC.Core.CN06" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" ✓ "{result}" is true
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Object storage region compliance
PASS
Child resource region compliance - NotTestable
✓ a cloud api for "{Instance}" in "api" ✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Child resource region compliance - NotTestable
FAIL
Enumeration activities publish events to monitored channels
✓ a cloud api for "{Instance}" in "api" ✗ I attempt policy check "enumeration-monitoring-policy" for control "CCC.Core.CN07" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Storage Enumeration Monitoring Policy Check: ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Enumeration activities publish events to monitored channels
FAIL
Enumeration activities are logged
✓ a cloud api for "{Instance}" in "api" ✗ I attempt policy check "enumeration-logging-policy" for control "CCC.Core.CN07" assessment requirement "AR02" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Storage Enumeration Logging Policy Check: ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Enumeration activities are logged
PASS
Object storage replication compliance
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ I attempt policy check "object-storage-replication" for control "CCC.Core.CN08" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" ✓ "{result}" is true
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Object storage replication compliance
PASS
Object storage replication status is visible
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ I attempt policy check "object-storage-replication-status" for control "CCC.Core.CN08" assessment requirement "AR02" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" ✓ "{result}" is true
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Object storage replication status is visible
FAIL
Object storage access logging compliance
✓ a cloud api for "{Instance}" in "api" ✗ I attempt policy check "object-storage-access-logging" for control "CCC.Core.CN09" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Storage Account Diagnostic Logging Configuration: ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Object storage access logging compliance
PASS
Disabling logs requires disabling the resource - NotTestable
✓ a cloud api for "{Instance}" in "api" ✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Disabling logs requires disabling the resource - NotTestable
PASS
Redirecting logs requires halting the resource - NotTestable
✓ a cloud api for "{Instance}" in "api" ✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Redirecting logs requires halting the resource - NotTestable
PASS
Object storage replication destination compliance
✓ a cloud api for "{Instance}" in "api" ✓ I attempt policy check "object-storage-replication-destination" for control "CCC.Core.CN10" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" ✓ "{result}" is true
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Object storage replication destination compliance
PASS
Test policy for bucket access control
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ I call "{api}" with "GetServiceAPI" using argument "iam" ✓ I refer to "{result}" as "iamService" ✓ I attempt policy check "no-public-access" for control "CCC.ObjStor.CN01" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" ✓ "{result}" is true
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Test policy for bucket access control
CCC.ObjStor.CN01.AR01
FAIL
All unauthorized requests are blocked
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ I call "{api}" with "GetServiceAPI" using argument "iam" ✓ I refer to "{result}" as "iamService" ✓ I call "{storage}" with "CreateObject" using arguments "{ResourceName}", "test-object={Timestamp}.txt", and "test content" ✗ "{result}" is not an error - Error: expected {result} to not be an error, but got: failed to upload blob test-object=1775046164302.txt: PUT https://storagecfitest1775043178.blob.core.windows.net/ccc-test-container-1775043178/test-object=1775046164302.txt -------------------------------------------------------------------------------- RESPONSE 403: 403 This request is not authorized to perform this operation using this permission. ERROR CODE: AuthorizationPermissionMismatch -------------------------------------------------------------------------------- <?xml version="1.0" encoding="utf-8"?><Error><Code>AuthorizationPermissionMismatch</Code><Message>This request is not authorized to perform this operation using this permission. RequestId:cc408d5d-e01e-0003-6ed2-c1c301000000 Time:2026-04-01T12:26:46.4217644Z</Message></Error> -------------------------------------------------------------------------------- ⊘ I attempt policy check "object-storage-no-public-principals" for control "CCC.ObjStor.CN01" assessment requirement "AR02" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" (skipped) ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
All unauthorized requests are blocked
CCC.ObjStor.CN01.AR02
FAIL
All unauthorized requests are blocked
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ I call "{api}" with "GetServiceAPI" using argument "iam" ✓ I refer to "{result}" as "iamService" ✗ I attempt policy check "object-storage-no-public-principals" for control "CCC.ObjStor.CN01" assessment requirement "AR03" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Storage RBAC in Use: ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
All unauthorized requests are blocked
CCC.ObjStor.CN01.AR03
FAIL
All unauthorized requests are blocked
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ "{result}" is not an error ✓ I call "{api}" with "GetServiceAPI" using argument "iam" ✓ I refer to "{result}" as "iamService" ✓ "{result}" is not an error ✗ I attempt policy check "object-storage-no-public-principals" for control "CCC.ObjStor.CN01" assessment requirement "AR04" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Storage RBAC in Use: ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
All unauthorized requests are blocked
CCC.ObjStor.CN01.AR04
FAIL
Test policy for uniform access
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ I call "{api}" with "GetServiceAPI" using argument "iam" ✓ I refer to "{result}" as "iamService" ✗ I attempt policy check "uniform-bucket-level-access" for control "CCC.ObjStor.CN02" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Blob Uniform Access Check: query execution failed: exit status 1 Output: ERROR: AADSTS700024: Client assertion is not within its valid time range. Current time: 2026-04-01T12:42:58.6161680Z, assertion valid from 2026-04-01T11:32:59.0000000Z, expiry time of assertion 2026-04-01T11:37:59.0000000Z. Review the documentation at https://learn.microsoft.com/entra/identity-platform/certificate-credentials . Trace ID: 52ed7894-f1f6-47b6-9683-c0d71b491400 Correlation ID: 059544d3-5f50-4738-b39e-a1b8d88f8e19 Timestamp: 2026-04-01 12:42:58Z Run the command below to authenticate interactively; additional arguments may be added as needed: az logout az login ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Test policy for uniform access
CCC.ObjStor.CN02.AR01
PASS
Uniform bucket-level access prevents object-level deny overrides - Duplicate
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ I call "{api}" with "GetServiceAPI" using argument "iam" ✓ I refer to "{result}" as "iamService" ✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Uniform bucket-level access prevents object-level deny overrides - Duplicate
CCC.ObjStor.CN02.AR02
FAIL
Test policy for bucket soft delete
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✗ I attempt policy check "bucket-soft-delete" for control "CCC.ObjStor.CN03" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Blob Soft Delete Check: query execution failed: exit status 1 Output: ERROR: AADSTS700024: Client assertion is not within its valid time range. Current time: 2026-04-01T12:43:01.0015056Z, assertion valid from 2026-04-01T11:32:59.0000000Z, expiry time of assertion 2026-04-01T11:37:59.0000000Z. Review the documentation at https://learn.microsoft.com/entra/identity-platform/certificate-credentials . Trace ID: a6441681-f874-4c4e-8438-2d0ccb260c00 Correlation ID: b94a6db1-1334-450f-8797-89a479094410 Timestamp: 2026-04-01 12:43:01Z Run the command below to authenticate interactively; additional arguments may be added as needed: az logout az login ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Test policy for bucket soft delete
CCC.ObjStor.CN03.AR01
FAIL
Test policy for immutable bucket retention lock
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✗ I attempt policy check "bucket-retention-lock" for control "CCC.ObjStor.CN03" assessment requirement "AR02" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Blob Immutability Policy Lock Check: query execution failed: exit status 1 Output: ERROR: AADSTS700024: Client assertion is not within its valid time range. Current time: 2026-04-01T12:43:02.6736890Z, assertion valid from 2026-04-01T11:32:59.0000000Z, expiry time of assertion 2026-04-01T11:37:59.0000000Z. Review the documentation at https://learn.microsoft.com/entra/identity-platform/certificate-credentials . Trace ID: 2ebbfacb-fbd1-4eea-bea8-5690fa430900 Correlation ID: 23ab2cd7-e6e7-40df-b685-a43fe101a3cc Timestamp: 2026-04-01 12:43:02Z Run the command below to authenticate interactively; additional arguments may be added as needed: az logout az login ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Test policy for immutable bucket retention lock
CCC.ObjStor.CN03.AR02
FAIL
Test policy for default object retention
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ I call "{api}" with "GetServiceAPI" using argument "iam" ✓ I refer to "{result}" as "iamService" ✗ I attempt policy check "object-default-retention" for control "CCC.ObjStor.CN04" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Blob Default Immutability Policy Check: query execution failed: exit status 1 Output: ERROR: AADSTS700024: Client assertion is not within its valid time range. Current time: 2026-04-01T12:47:07.5073091Z, assertion valid from 2026-04-01T11:32:59.0000000Z, expiry time of assertion 2026-04-01T11:37:59.0000000Z. Review the documentation at https://learn.microsoft.com/entra/identity-platform/certificate-credentials . Trace ID: d279db72-baf0-475c-97b4-6524c8c60300 Correlation ID: e1f13500-6b34-42c8-b895-5322b3e1e218 Timestamp: 2026-04-01 12:47:07Z Run the command below to authenticate interactively; additional arguments may be added as needed: az logout az login ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Test policy for default object retention
CCC.ObjStor.CN04.AR01
FAIL
Test policy for object retention enforcement
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ I call "{api}" with "GetServiceAPI" using argument "iam" ✓ I refer to "{result}" as "iamService" ✗ I attempt policy check "object-retention-enforcement" for control "CCC.ObjStor.CN04" assessment requirement "AR02" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Blob Object Retention Enforcement Check: query execution failed: exit status 1 Output: ERROR: AADSTS700024: Client assertion is not within its valid time range. Current time: 2026-04-01T12:55:14.7375633Z, assertion valid from 2026-04-01T11:32:59.0000000Z, expiry time of assertion 2026-04-01T11:37:59.0000000Z. Review the documentation at https://learn.microsoft.com/entra/identity-platform/certificate-credentials . Trace ID: fc41409f-8f97-4fa9-a831-f58ef1340f00 Correlation ID: 88400164-6227-4ac7-a8ab-f87474f854a5 Timestamp: 2026-04-01 12:55:14Z Run the command below to authenticate interactively; additional arguments may be added as needed: az logout az login ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Test policy for object retention enforcement
CCC.ObjStor.CN04.AR02
FAIL
Objects are stored with unique version identifiers
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✗ I attempt policy check "object-storage-versioning" for control "CCC.ObjStor.CN05" assessment requirement "AR01" for service "{ServiceType}" on resource "{ResourceName}" and provider "{Provider}" - Error: policy check failed: Azure Blob Versioning Configuration: query execution failed: exit status 1 Output: ERROR: AADSTS700024: Client assertion is not within its valid time range. Current time: 2026-04-01T12:55:16.5866754Z, assertion valid from 2026-04-01T11:32:59.0000000Z, expiry time of assertion 2026-04-01T11:37:59.0000000Z. Review the documentation at https://learn.microsoft.com/entra/identity-platform/certificate-credentials . Trace ID: d7da925a-8ff9-406d-8c98-083c6d210b00 Correlation ID: 519631d6-ddf2-43d2-a76b-a4d21aeea010 Timestamp: 2026-04-01 12:55:16Z Run the command below to authenticate interactively; additional arguments may be added as needed: az logout az login ⊘ "{result}" is true (skipped)
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Objects are stored with unique version identifiers
CCC.ObjStor.CN05.AR01
PASS
Modified objects receive new version identifiers - Duplicate
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Modified objects receive new version identifiers - Duplicate
CCC.ObjStor.CN05.AR02
PASS
Previous object versions can be recovered
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Previous object versions can be recovered
CCC.ObjStor.CN05.AR03
PASS
Object versions are retained after deletion - Duplicate
✓ a cloud api for "{Instance}" in "api" ✓ I call "{api}" with "GetServiceAPI" using argument "object-storage" ✓ I refer to "{result}" as "storage" ✓ no-op required
/subscriptions/c1cedd8e-bf91-4d7d-a4cc-45700402a2a1/resourceGroups/cfi_test_1775043178/providers/Microsoft.Storage/storageAccounts/storagecfitest1775043178
object-storage
Object versions are retained after deletion - Duplicate
CCC.ObjStor.CN05.AR04