prancer-io / prancer-compliance-test

This repository includes cloud security policies for IaC and live resources.
https://www.prancer.io
39 stars 11 forks source link

Test evidence of https://github.com/prancer-io/prancer-compliance-test/pull/549 #551

Closed rezoan closed 1 year ago

rezoan commented 1 year ago

Templates:

rezoan commented 1 year ago

ARM CLI test output:

2023-02-25 01:27:11,443 - SNAPSHOTS COMPLETE:
2023-02-25 01:27:11,834 -   TESTID: PR-AZR-ARM-MNT-014
2023-02-25 01:27:11,835 -       SNAPSHOTID: ARM_TEMPLATE_SNAPSHOTiKXPJ7
2023-02-25 01:27:11,835 -       PATHS: 
2023-02-25 01:27:11,836 -            /activitylogalets/azuredeploy.json
2023-02-25 01:27:11,836 -            /activitylogalets/azuredeploy.parameters.json
2023-02-25 01:27:11,836 -       TITLE: Azure Activity log alert for create or update SQL server firewall rule should exist
2023-02-25 01:27:11,836 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update SQL server firewall rule does not exist. Creating an activity log alert for Create or update SQL server firewall rule gives insight into SQL server firewall rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 01:27:11,837 -       RULE: file(activitylogalerts.rego)
2023-02-25 01:27:11,837 -       ERROR: Azure Activity log alert for create or update SQL server firewall rule currently not exist
2023-02-25 01:27:11,837 -       REMEDIATION: Make sure resource of type 'microsoft.insights/activitylogalerts' has 'condition.allOf' property exist and allOf.field='operationname' has corresponding allOf.equals='microsoft.sql/servers/firewallrules/write' to fix the issue. Please find more details <a href='https://learn.microsoft.com/en-us/azure/templates/microsoft.insights/activitylogalerts?pivots=deployment-language-arm-template' target='_blank'>here</a>
2023-02-25 01:27:11,838 -       RESULT: failed
2023-02-25 01:27:11,991 -   TESTID: PR-AZR-ARM-MNT-015
2023-02-25 01:27:11,993 -       SNAPSHOTID: ARM_TEMPLATE_SNAPSHOTiKXPJ7
2023-02-25 01:27:11,993 -       PATHS: 
2023-02-25 01:27:11,993 -            /activitylogalets/azuredeploy.json
2023-02-25 01:27:11,993 -            /activitylogalets/azuredeploy.parameters.json
2023-02-25 01:27:11,994 -       TITLE: Azure Activity log alert for create or update network security group should exist
2023-02-25 01:27:11,994 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update network security group does not exist. Creating an activity log alert for Create or update network security group gives insight into network access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 01:27:11,994 -       RULE: file(activitylogalerts.rego)
2023-02-25 01:27:11,994 -       ERROR: Azure Activity log alert for create or update network security group currently not exist
2023-02-25 01:27:11,994 -       REMEDIATION: Make sure resource of type 'microsoft.insights/activitylogalerts' has 'condition.allOf' property exist and allOf.field='operationname' has corresponding allOf.equals='microsoft.network/networksecuritygroups/write' to fix the issue. Please find more details <a href='https://learn.microsoft.com/en-us/azure/templates/microsoft.insights/activitylogalerts?pivots=deployment-language-arm-template' target='_blank'>here</a>
2023-02-25 01:27:11,995 -       RESULT: failed
2023-02-25 01:27:12,153 -   TESTID: PR-AZR-ARM-MNT-016
2023-02-25 01:27:12,153 -       SNAPSHOTID: ARM_TEMPLATE_SNAPSHOTiKXPJ7
2023-02-25 01:27:12,154 -       PATHS: 
2023-02-25 01:27:12,154 -            /activitylogalets/azuredeploy.json
2023-02-25 01:27:12,154 -            /activitylogalets/azuredeploy.parameters.json
2023-02-25 01:27:12,154 -       TITLE: Azure Activity log alert for create or update network security group rule should exist
2023-02-25 01:27:12,155 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update network security group rule does not exist. Creating an activity log alert for Create or update network security group rule gives insight into network rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 01:27:12,155 -       RULE: file(activitylogalerts.rego)
2023-02-25 01:27:12,155 -       ERROR: Azure Activity log alert for create or update network security group rule currently not exist
2023-02-25 01:27:12,156 -       REMEDIATION: Make sure resource of type 'microsoft.insights/activitylogalerts' has 'condition.allOf' property exist and allOf.field='operationname' has corresponding allOf.equals='microsoft.network/networksecuritygroups/securityrules/write' to fix the issue. Please find more details <a href='https://learn.microsoft.com/en-us/azure/templates/microsoft.insights/activitylogalerts?pivots=deployment-language-arm-template' target='_blank'>here</a>
2023-02-25 01:27:12,157 -       RESULT: failed
2023-02-25 01:27:12,313 -   TESTID: PR-AZR-ARM-MNT-017
2023-02-25 01:27:12,314 -       SNAPSHOTID: ARM_TEMPLATE_SNAPSHOTiKXPJ7
2023-02-25 01:27:12,314 -       PATHS: 
2023-02-25 01:27:12,314 -            /activitylogalets/azuredeploy.json
2023-02-25 01:27:12,314 -            /activitylogalets/azuredeploy.parameters.json
2023-02-25 01:27:12,314 -       TITLE: Azure Activity log alert for create or update security solution should exist
2023-02-25 01:27:12,315 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update security solution does not exist. Creating an activity log alert for Create or update security solution gives insight into changes to the active security solutions and may reduce the time it takes to detect suspicious activity.
2023-02-25 01:27:12,315 -       RULE: file(activitylogalerts.rego)
2023-02-25 01:27:12,315 -       ERROR: Azure Activity log alert for create or update security solution currently not exist
2023-02-25 01:27:12,315 -       REMEDIATION: Make sure resource of type 'microsoft.insights/activitylogalerts' has 'condition.allOf' property exist and allOf.field='operationname' has corresponding allOf.equals='microsoft.security/securitysolutions/write' to fix the issue. Please find more details <a href='https://learn.microsoft.com/en-us/azure/templates/microsoft.insights/activitylogalerts?pivots=deployment-language-arm-template' target='_blank'>here</a>
2023-02-25 01:27:12,315 -       RESULT: failed
2023-02-25 01:27:12,487 -   TESTID: PR-AZR-ARM-MNT-018
2023-02-25 01:27:12,487 -       SNAPSHOTID: ARM_TEMPLATE_SNAPSHOTiKXPJ7
2023-02-25 01:27:12,488 -       PATHS: 
2023-02-25 01:27:12,488 -            /activitylogalets/azuredeploy.json
2023-02-25 01:27:12,488 -            /activitylogalets/azuredeploy.parameters.json
2023-02-25 01:27:12,488 -       TITLE: Azure Activity log alert for create policy assignment should exist
2023-02-25 01:27:12,488 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create policy assignment does not exist. Creating an activity log alert for Create policy assignment gives insight into changes done in azure policy - assignments and may reduce the time it takes to detect unsolicited changes.
2023-02-25 01:27:12,488 -       RULE: file(activitylogalerts.rego)
2023-02-25 01:27:12,488 -       ERROR: Azure Activity log alert for create policy assignment currently not exist
2023-02-25 01:27:12,488 -       REMEDIATION: Make sure resource of type 'microsoft.insights/activitylogalerts' has 'condition.allOf' property exist and allOf.field='operationname' has corresponding allOf.equals='microsoft.authorization/policyassignments/write' to fix the issue. Please find more details <a href='https://learn.microsoft.com/en-us/azure/templates/microsoft.insights/activitylogalerts?pivots=deployment-language-arm-template' target='_blank'>here</a>
2023-02-25 01:27:12,488 -       RESULT: failed
2023-02-25 01:27:12,646 -   TESTID: PR-AZR-ARM-MNT-019
2023-02-25 01:27:12,647 -       SNAPSHOTID: ARM_TEMPLATE_SNAPSHOTiKXPJ7
2023-02-25 01:27:12,647 -       PATHS: 
2023-02-25 01:27:12,647 -            /activitylogalets/azuredeploy.json
2023-02-25 01:27:12,648 -            /activitylogalets/azuredeploy.parameters.json
2023-02-25 01:27:12,648 -       TITLE: Azure Activity log alert for delete SQL server firewall rule should exist
2023-02-25 01:27:12,649 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete SQL server firewall rule does not exist. Creating an activity log alert for Delete SQL server firewall rule gives insight into SQL server firewall rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 01:27:12,649 -       RULE: file(activitylogalerts.rego)
2023-02-25 01:27:12,649 -       ERROR: Azure Activity log alert for delete SQL server firewall rule currently not exist
2023-02-25 01:27:12,650 -       REMEDIATION: Make sure resource of type 'microsoft.insights/activitylogalerts' has 'condition.allOf' property exist and allOf.field='operationname' has corresponding allOf.equals='microsoft.sql/servers/firewallrules/delete' to fix the issue. Please find more details <a href='https://learn.microsoft.com/en-us/azure/templates/microsoft.insights/activitylogalerts?pivots=deployment-language-arm-template' target='_blank'>here</a>
2023-02-25 01:27:12,650 -       RESULT: failed
2023-02-25 01:27:12,773 -   TESTID: PR-AZR-ARM-MNT-020
2023-02-25 01:27:12,774 -       SNAPSHOTID: ARM_TEMPLATE_SNAPSHOTiKXPJ7
2023-02-25 01:27:12,774 -       PATHS: 
2023-02-25 01:27:12,775 -            /activitylogalets/azuredeploy.json
2023-02-25 01:27:12,775 -            /activitylogalets/azuredeploy.parameters.json
2023-02-25 01:27:12,775 -       TITLE: Azure Activity log alert for delete network security group should exist
2023-02-25 01:27:12,775 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete network security group does not exist. Creating an activity log alert for the Delete network security group gives insight into network access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 01:27:12,775 -       RULE: file(activitylogalerts.rego)
2023-02-25 01:27:12,776 -       ERROR: Azure Activity log alert for delete network security group currently not exist
2023-02-25 01:27:12,776 -       REMEDIATION: Make sure resource of type 'microsoft.insights/activitylogalerts' has 'condition.allOf' property exist and allOf.field='operationname' has corresponding allOf.equals='microsoft.network/networksecuritygroups/delete' to fix the issue. Please find more details <a href='https://learn.microsoft.com/en-us/azure/templates/microsoft.insights/activitylogalerts?pivots=deployment-language-arm-template' target='_blank'>here</a>
2023-02-25 01:27:12,776 -       RESULT: failed
2023-02-25 01:27:12,943 -   TESTID: PR-AZR-ARM-MNT-021
2023-02-25 01:27:12,944 -       SNAPSHOTID: ARM_TEMPLATE_SNAPSHOTiKXPJ7
2023-02-25 01:27:12,944 -       PATHS: 
2023-02-25 01:27:12,944 -            /activitylogalets/azuredeploy.json
2023-02-25 01:27:12,945 -            /activitylogalets/azuredeploy.parameters.json
2023-02-25 01:27:12,945 -       TITLE: Azure Activity log alert for delete network security group rule should exist
2023-02-25 01:27:12,945 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete network security group rule does not exist. Creating an activity log alert for Delete network security group rule gives insight into network rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 01:27:12,945 -       RULE: file(activitylogalerts.rego)
2023-02-25 01:27:12,946 -       ERROR: Azure Activity log alert for delete network security group rule currently not exist
2023-02-25 01:27:12,946 -       REMEDIATION: Make sure resource of type 'microsoft.insights/activitylogalerts' has 'condition.allOf' property exist and allOf.field='operationname' has corresponding allOf.equals='microsoft.network/networksecuritygroups/securityrules/delete' to fix the issue. Please find more details <a href='https://learn.microsoft.com/en-us/azure/templates/microsoft.insights/activitylogalerts?pivots=deployment-language-arm-template' target='_blank'>here</a>
2023-02-25 01:27:12,946 -       RESULT: failed
2023-02-25 01:27:13,097 -   TESTID: PR-AZR-ARM-MNT-022
2023-02-25 01:27:13,098 -       SNAPSHOTID: ARM_TEMPLATE_SNAPSHOTiKXPJ7
2023-02-25 01:27:13,098 -       PATHS: 
2023-02-25 01:27:13,098 -            /activitylogalets/azuredeploy.json
2023-02-25 01:27:13,098 -            /activitylogalets/azuredeploy.parameters.json
2023-02-25 01:27:13,099 -       TITLE: Azure Activity log alert for delete security solution should exist
2023-02-25 01:27:13,099 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete security solution does not exist. Creating an activity log alert for Delete security solution gives insight into changes to the active security solutions and may reduce the time it takes to detect suspicious activity.
2023-02-25 01:27:13,099 -       RULE: file(activitylogalerts.rego)
2023-02-25 01:27:13,099 -       ERROR: Azure Activity log alert for delete security solution currently not exist
2023-02-25 01:27:13,099 -       REMEDIATION: Make sure resource of type 'microsoft.insights/activitylogalerts' has 'condition.allOf' property exist and allOf.field='operationname' has corresponding allOf.equals='microsoft.security/securitysolutions/delete' to fix the issue. Please find more details <a href='https://learn.microsoft.com/en-us/azure/templates/microsoft.insights/activitylogalerts?pivots=deployment-language-arm-template' target='_blank'>here</a>
2023-02-25 01:27:13,099 -       RESULT: failed
2023-02-25 01:27:13,213 -   TESTID: PR-AZR-ARM-MNT-023
2023-02-25 01:27:13,214 -       SNAPSHOTID: ARM_TEMPLATE_SNAPSHOTiKXPJ7
2023-02-25 01:27:13,214 -       PATHS: 
2023-02-25 01:27:13,214 -            /activitylogalets/azuredeploy.json
2023-02-25 01:27:13,214 -            /activitylogalets/azuredeploy.parameters.json
2023-02-25 01:27:13,214 -       TITLE: Azure Activity log alert for update security policy should exist
2023-02-25 01:27:13,215 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Update security policy does not exist. Creating an activity log alert for Update security policy gives insight into changes to security policy and may reduce the time it takes to detect suspicious activity.
2023-02-25 01:27:13,215 -       RULE: file(activitylogalerts.rego)
2023-02-25 01:27:13,215 -       ERROR: Azure Activity log alert for update security policy currently not exist
2023-02-25 01:27:13,215 -       REMEDIATION: Make sure resource of type 'microsoft.insights/activitylogalerts' has 'condition.allOf' property exist and allOf.field='operationname' has corresponding allOf.equals='microsoft.security/policies/write' to fix the issue. Please find more details <a href='https://learn.microsoft.com/en-us/azure/templates/microsoft.insights/activitylogalerts?pivots=deployment-language-arm-template' target='_blank'>here</a>
2023-02-25 01:27:13,215 -       RESULT: failed
2023-02-25 01:27:13,357 -   TESTID: PR-AZR-ARM-MNT-024
2023-02-25 01:27:13,358 -       SNAPSHOTID: ARM_TEMPLATE_SNAPSHOTiKXPJ7
2023-02-25 01:27:13,358 -       PATHS: 
2023-02-25 01:27:13,358 -            /activitylogalets/azuredeploy.json
2023-02-25 01:27:13,358 -            /activitylogalets/azuredeploy.parameters.json
2023-02-25 01:27:13,358 -       TITLE: Azure Activity log alert for delete policy assignment should exist
2023-02-25 01:27:13,358 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete policy assignment does not exist. Creating an activity log alert for Delete policy assignment gives insight into changes done in azure policy - assignments and may reduce the time it takes to detect unsolicited changes.
2023-02-25 01:27:13,359 -       RULE: file(activitylogalerts.rego)
2023-02-25 01:27:13,359 -       ERROR: Azure Activity log alert for delete policy assignment currently not exist
2023-02-25 01:27:13,359 -       REMEDIATION: Make sure resource of type 'microsoft.insights/activitylogalerts' has 'condition.allOf' property exist and allOf.field='operationname' has corresponding allOf.equals='microsoft.authorization/policyassignments/delete' to fix the issue. Please find more details <a href='https://learn.microsoft.com/en-us/azure/templates/microsoft.insights/activitylogalerts?pivots=deployment-language-arm-template' target='_blank'>here</a>
2023-02-25 01:27:13,360 -       RESULT: failed
2023-02-25 01:27:13,367 - VALIDATION COMPLETE:
2023-02-25 01:27:13,381 -  Run Stats: {
  "start": "2023-02-25 01:27:00",
  "end": "2023-02-25 01:27:13",
  "remote": false,
  "errors": [],
  "host": "ubuntu",
  "timestamp": "2023-02-25 01:27:00",
  "jsonsource": false,
  "database": 0,
  "container": "scenario-arm-remote",
  "INCLUDESNAPSHOTS": false,
  "SNAPHSHOTIDS": [],
  "INCLUDETESTS": true,
  "TESTIDS": [
    "PR-AZR-ARM-MNT-014",
    "PR-AZR-ARM-MNT-015",
    "PR-AZR-ARM-MNT-016",
    "PR-AZR-ARM-MNT-017",
    "PR-AZR-ARM-MNT-018",
    "PR-AZR-ARM-MNT-019",
    "PR-AZR-ARM-MNT-020",
    "PR-AZR-ARM-MNT-021",
    "PR-AZR-ARM-MNT-022",
    "PR-AZR-ARM-MNT-023",
    "PR-AZR-ARM-MNT-024"
  ],
  "ONLYSNAPSHOTS": false,
  "ONLYSNAPSHOTIDS": [],
  "session_id": "session_1677346020614",
  "run_type": "CRAWL_AND_COMPLIANCE",
  "log": null,
  "duration": "12 seconds"
}
rezoan commented 1 year ago

Prancer CSPM CLI test output:

2023-02-25 02:10:35,907 - SNAPSHOTS COMPLETE:
2023-02-25 02:10:36,192 -   TESTID: PR-AZR-CLD-MNT-014
2023-02-25 02:10:36,193 -       SNAPSHOTID: AZRSNP_29995
2023-02-25 02:10:36,193 -       PATHS: 
2023-02-25 02:10:36,194 -       TITLE: Azure Activity log alert for create or update SQL server firewall rule should exist
2023-02-25 02:10:36,194 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update SQL server firewall rule does not exist. Creating an activity log alert for Create or update SQL server firewall rule gives insight into SQL server firewall rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:10:36,194 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:10:36,195 -       ERROR: Azure Activity log alert for create or update SQL server firewall rule currently not exist
2023-02-25 02:10:36,195 -       REMEDIATION: 1. Log in to Azure Portal<br>2. Click on Monitor (Left Panel)<br>3. Select 'Alerts'<br>4. Click on Create > Alert rule<br>5. In 'Create an alert rule' page, choose the Scope as your Subscription and under the CONDITION section, choose 'Create/Update server firewall rule (Microsoft.Sql/servers/firewallRules)' and Other fields you can set based on your custom settings.<br>6. Click on Create
2023-02-25 02:10:36,195 -       RESULT: failed
2023-02-25 02:10:36,310 -   TESTID: PR-AZR-CLD-MNT-014
2023-02-25 02:10:36,310 -       SNAPSHOTID: AZRSNP_29996
2023-02-25 02:10:36,310 -       PATHS: 
2023-02-25 02:10:36,311 -       TITLE: Azure Activity log alert for create or update SQL server firewall rule should exist
2023-02-25 02:10:36,311 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update SQL server firewall rule does not exist. Creating an activity log alert for Create or update SQL server firewall rule gives insight into SQL server firewall rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:10:36,311 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:10:36,311 -       ERROR: Azure Activity log alert for create or update SQL server firewall rule currently not exist
2023-02-25 02:10:36,311 -       REMEDIATION: 1. Log in to Azure Portal<br>2. Click on Monitor (Left Panel)<br>3. Select 'Alerts'<br>4. Click on Create > Alert rule<br>5. In 'Create an alert rule' page, choose the Scope as your Subscription and under the CONDITION section, choose 'Create/Update server firewall rule (Microsoft.Sql/servers/firewallRules)' and Other fields you can set based on your custom settings.<br>6. Click on Create
2023-02-25 02:10:36,311 -       RESULT: failed
2023-02-25 02:10:36,397 -   TESTID: PR-AZR-CLD-MNT-015
2023-02-25 02:10:36,398 -       SNAPSHOTID: AZRSNP_29995
2023-02-25 02:10:36,398 -       PATHS: 
2023-02-25 02:10:36,398 -       TITLE: Azure Activity log alert for create or update network security group should exist
2023-02-25 02:10:36,398 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update network security group does not exist. Creating an activity log alert for Create or update network security group gives insight into network access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:10:36,399 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:10:36,399 -       ERROR: Azure Activity log alert for create or update network security group currently not exist
2023-02-25 02:10:36,399 -       REMEDIATION: 1. Log in to Azure Portal<br>2. Click on Monitor (Left Panel)<br>3. Select 'Alerts'<br>4. Click on Create > Alert rule<br>5. In 'Create an alert rule' page, choose the Scope as your Subscription and under the CONDITION section, choose 'Create or Update Network Security Group (Microsoft.Network/networkSecurityGroups)' and Other fields you can set based on your custom settings.<br>6. Click on Create
2023-02-25 02:10:36,399 -       RESULT: failed
2023-02-25 02:10:36,572 -   TESTID: PR-AZR-CLD-MNT-015
2023-02-25 02:10:36,572 -       SNAPSHOTID: AZRSNP_29996
2023-02-25 02:10:36,572 -       PATHS: 
2023-02-25 02:10:36,573 -       TITLE: Azure Activity log alert for create or update network security group should exist
2023-02-25 02:10:36,573 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update network security group does not exist. Creating an activity log alert for Create or update network security group gives insight into network access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:10:36,573 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:10:36,573 -       ERROR: Azure Activity log alert for create or update network security group currently not exist
2023-02-25 02:10:36,573 -       REMEDIATION: 1. Log in to Azure Portal<br>2. Click on Monitor (Left Panel)<br>3. Select 'Alerts'<br>4. Click on Create > Alert rule<br>5. In 'Create an alert rule' page, choose the Scope as your Subscription and under the CONDITION section, choose 'Create or Update Network Security Group (Microsoft.Network/networkSecurityGroups)' and Other fields you can set based on your custom settings.<br>6. Click on Create
2023-02-25 02:10:36,573 -       RESULT: failed
2023-02-25 02:10:36,709 -   TESTID: PR-AZR-CLD-MNT-016
2023-02-25 02:10:36,710 -       SNAPSHOTID: AZRSNP_29995
2023-02-25 02:10:36,710 -       PATHS: 
2023-02-25 02:10:36,710 -       TITLE: Azure Activity log alert for create or update network security group rule should exist
2023-02-25 02:10:36,711 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update network security group does not exist. Creating an activity log alert for Create or update network security group gives insight into network access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:10:36,711 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:10:36,711 -       ERROR: Azure Activity log alert for create or update network security group rule currently not exist
2023-02-25 02:10:36,711 -       REMEDIATION: 1. Log in to Azure Portal<br>2. Click on Monitor (Left Panel)<br>3. Select 'Alerts'<br>4. Click on Create > Alert rule<br>5. In 'Create an alert rule' page, choose the Scope as your Subscription and under the CONDITION section, choose 'Create or Update Security Rule (Microsoft.Network/networkSecurityGroups/securityRules)' and Other fields you can set based on your custom settings.<br>6. Click on Create
2023-02-25 02:10:36,711 -       RESULT: failed
2023-02-25 02:10:36,839 -   TESTID: PR-AZR-CLD-MNT-016
2023-02-25 02:10:36,839 -       SNAPSHOTID: AZRSNP_29996
2023-02-25 02:10:36,839 -       PATHS: 
2023-02-25 02:10:36,839 -       TITLE: Azure Activity log alert for create or update network security group rule should exist
2023-02-25 02:10:36,839 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update network security group does not exist. Creating an activity log alert for Create or update network security group gives insight into network access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:10:36,839 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:10:36,840 -       ERROR: Azure Activity log alert for create or update network security group rule currently not exist
2023-02-25 02:10:36,840 -       REMEDIATION: 1. Log in to Azure Portal<br>2. Click on Monitor (Left Panel)<br>3. Select 'Alerts'<br>4. Click on Create > Alert rule<br>5. In 'Create an alert rule' page, choose the Scope as your Subscription and under the CONDITION section, choose 'Create or Update Security Rule (Microsoft.Network/networkSecurityGroups/securityRules)' and Other fields you can set based on your custom settings.<br>6. Click on Create
2023-02-25 02:10:36,840 -       RESULT: failed
2023-02-25 02:10:36,957 -   TESTID: PR-AZR-CLD-MNT-017
2023-02-25 02:10:36,957 -       SNAPSHOTID: AZRSNP_29995
2023-02-25 02:10:36,957 -       PATHS: 
2023-02-25 02:10:36,957 -       TITLE: Azure Activity log alert for create or update security solution should exist
2023-02-25 02:10:36,958 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update security solution does not exist. Creating an activity log alert for Create or update security solution gives insight into changes to the active security solutions and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:10:36,958 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:10:36,958 -       ERROR: Azure Activity log alert for create or update security solution currently not exist
2023-02-25 02:10:36,958 -       REMEDIATION: 1. Log in to Azure Portal<br>2. Click on Monitor (Left Panel)<br>3. Select 'Alerts'<br>4. Click on Create > Alert rule<br>5. In 'Create an alert rule' page, choose the Scope as your Subscription and under the CONDITION section, choose 'Create or Update Security Solutions (Microsoft.Security/securitySolutions)' and Other fields you can set based on your custom settings.<br>6. Click on Create
2023-02-25 02:10:36,958 -       RESULT: failed
2023-02-25 02:10:37,082 -   TESTID: PR-AZR-CLD-MNT-017
2023-02-25 02:10:37,083 -       SNAPSHOTID: AZRSNP_29996
2023-02-25 02:10:37,083 -       PATHS: 
2023-02-25 02:10:37,083 -       TITLE: Azure Activity log alert for create or update security solution should exist
2023-02-25 02:10:37,083 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update security solution does not exist. Creating an activity log alert for Create or update security solution gives insight into changes to the active security solutions and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:10:37,083 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:10:37,083 -       ERROR: Azure Activity log alert for create or update security solution currently not exist
2023-02-25 02:10:37,084 -       REMEDIATION: 1. Log in to Azure Portal<br>2. Click on Monitor (Left Panel)<br>3. Select 'Alerts'<br>4. Click on Create > Alert rule<br>5. In 'Create an alert rule' page, choose the Scope as your Subscription and under the CONDITION section, choose 'Create or Update Security Solutions (Microsoft.Security/securitySolutions)' and Other fields you can set based on your custom settings.<br>6. Click on Create
2023-02-25 02:10:37,084 -       RESULT: failed
2023-02-25 02:10:37,268 -   TESTID: PR-AZR-CLD-MNT-018
2023-02-25 02:10:37,271 -       SNAPSHOTID: AZRSNP_29995
2023-02-25 02:10:37,271 -       PATHS: 
2023-02-25 02:10:37,272 -       TITLE: Azure Activity log alert for create policy assignment should exist
2023-02-25 02:10:37,273 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create policy assignment does not exist. Creating an activity log alert for Create policy assignment gives insight into changes done in azure policy - assignments and may reduce the time it takes to detect unsolicited changes.
2023-02-25 02:10:37,274 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:10:37,275 -       ERROR: Azure Activity log alert for create policy assignment currently not exist
2023-02-25 02:10:37,275 -       REMEDIATION: 1. Log in to Azure Portal<br>2. Click on Monitor (Left Panel)<br>3. Select 'Alerts'<br>4. Click on Create > Alert rule<br>5. In 'Create an alert rule' page, choose the Scope as your Subscription and under the CONDITION section, choose 'Create policy assignment (Microsoft.Authorization/policyAssignments)' and Other fields you can set based on your custom settings.<br>6. Click on Create
2023-02-25 02:10:37,276 -       RESULT: failed
2023-02-25 02:10:37,406 -   TESTID: PR-AZR-CLD-MNT-018
2023-02-25 02:10:37,407 -       SNAPSHOTID: AZRSNP_29996
2023-02-25 02:10:37,407 -       PATHS: 
2023-02-25 02:10:37,407 -       TITLE: Azure Activity log alert for create policy assignment should exist
2023-02-25 02:10:37,407 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create policy assignment does not exist. Creating an activity log alert for Create policy assignment gives insight into changes done in azure policy - assignments and may reduce the time it takes to detect unsolicited changes.
2023-02-25 02:10:37,408 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:10:37,408 -       ERROR: Azure Activity log alert for create policy assignment currently not exist
2023-02-25 02:10:37,408 -       REMEDIATION: 1. Log in to Azure Portal<br>2. Click on Monitor (Left Panel)<br>3. Select 'Alerts'<br>4. Click on Create > Alert rule<br>5. In 'Create an alert rule' page, choose the Scope as your Subscription and under the CONDITION section, choose 'Create policy assignment (Microsoft.Authorization/policyAssignments)' and Other fields you can set based on your custom settings.<br>6. Click on Create
2023-02-25 02:10:37,409 -       RESULT: failed
2023-02-25 02:10:37,529 -   TESTID: PR-AZR-CLD-MNT-019
2023-02-25 02:10:37,529 -       SNAPSHOTID: AZRSNP_29995
2023-02-25 02:10:37,529 -       PATHS: 
2023-02-25 02:10:37,530 -       TITLE: Azure Activity log alert for delete SQL server firewall rule should exist
2023-02-25 02:10:37,530 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete SQL server firewall rule does not exist. Creating an activity log alert for Delete SQL server firewall rule gives insight into SQL server firewall rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:10:37,530 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:10:37,530 -       ERROR: Azure Activity log alert for delete SQL server firewall rule currently not exist
2023-02-25 02:10:37,530 -       REMEDIATION: 1. Log in to Azure Portal<br>2. Click on Monitor (Left Panel)<br>3. Select 'Alerts'<br>4. Click on Create > Alert rule<br>5. In 'Create an alert rule' page, choose the Scope as your Subscription and under the CONDITION section, choose 'Delete server firewall rule (Microsoft.Sql/servers/firewallRules)' and Other fields you can set based on your custom settings.<br>6. Click on Create
2023-02-25 02:10:37,530 -       RESULT: failed
2023-02-25 02:10:37,653 -   TESTID: PR-AZR-CLD-MNT-019
2023-02-25 02:10:37,654 -       SNAPSHOTID: AZRSNP_29996
2023-02-25 02:10:37,654 -       PATHS: 
2023-02-25 02:10:37,654 -       TITLE: Azure Activity log alert for delete SQL server firewall rule should exist
2023-02-25 02:10:37,654 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete SQL server firewall rule does not exist. Creating an activity log alert for Delete SQL server firewall rule gives insight into SQL server firewall rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:10:37,654 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:10:37,655 -       ERROR: Azure Activity log alert for delete SQL server firewall rule currently not exist
2023-02-25 02:10:37,655 -       REMEDIATION: 1. Log in to Azure Portal<br>2. Click on Monitor (Left Panel)<br>3. Select 'Alerts'<br>4. Click on Create > Alert rule<br>5. In 'Create an alert rule' page, choose the Scope as your Subscription and under the CONDITION section, choose 'Delete server firewall rule (Microsoft.Sql/servers/firewallRules)' and Other fields you can set based on your custom settings.<br>6. Click on Create
2023-02-25 02:10:37,655 -       RESULT: failed
2023-02-25 02:10:37,814 -   TESTID: PR-AZR-CLD-MNT-020
2023-02-25 02:10:37,815 -       SNAPSHOTID: AZRSNP_29995
2023-02-25 02:10:37,816 -       PATHS: 
2023-02-25 02:10:37,817 -       TITLE: Azure Activity log alert for delete network security group should exist
2023-02-25 02:10:37,817 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete network security group does not exist. Creating an activity log alert for the Delete network security group gives insight into network access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:10:37,817 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:10:37,817 -       ERROR: Azure Activity log alert for delete network security group currently not exist
2023-02-25 02:10:37,818 -       REMEDIATION: 1. Log in to Azure Portal<br>2. Click on Monitor (Left Panel)<br>3. Select 'Alerts'<br>4. Click on Create > Alert rule<br>5. In 'Create an alert rule' page, choose the Scope as your Subscription and under the CONDITION section, choose 'Delete Network Security Group (Microsoft.Network/networkSecurityGroups)' and Other fields you can set based on your custom settings.<br>6. Click on Create
2023-02-25 02:10:37,818 -       RESULT: failed
2023-02-25 02:10:37,934 -   TESTID: PR-AZR-CLD-MNT-020
2023-02-25 02:10:37,934 -       SNAPSHOTID: AZRSNP_29996
2023-02-25 02:10:37,935 -       PATHS: 
2023-02-25 02:10:37,935 -       TITLE: Azure Activity log alert for delete network security group should exist
2023-02-25 02:10:37,935 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete network security group does not exist. Creating an activity log alert for the Delete network security group gives insight into network access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:10:37,935 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:10:37,935 -       ERROR: Azure Activity log alert for delete network security group currently not exist
2023-02-25 02:10:37,935 -       REMEDIATION: 1. Log in to Azure Portal<br>2. Click on Monitor (Left Panel)<br>3. Select 'Alerts'<br>4. Click on Create > Alert rule<br>5. In 'Create an alert rule' page, choose the Scope as your Subscription and under the CONDITION section, choose 'Delete Network Security Group (Microsoft.Network/networkSecurityGroups)' and Other fields you can set based on your custom settings.<br>6. Click on Create
2023-02-25 02:10:37,935 -       RESULT: failed
2023-02-25 02:10:38,058 -   TESTID: PR-AZR-CLD-MNT-021
2023-02-25 02:10:38,059 -       SNAPSHOTID: AZRSNP_29995
2023-02-25 02:10:38,059 -       PATHS: 
2023-02-25 02:10:38,059 -       TITLE: Azure Activity log alert for delete network security group rule should exist
2023-02-25 02:10:38,059 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete network security group rule does not exist. Creating an activity log alert for Delete network security group rule gives insight into network rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:10:38,059 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:10:38,059 -       ERROR: Azure Activity log alert for delete network security group rule currently not exist
2023-02-25 02:10:38,060 -       REMEDIATION: 1. Log in to Azure Portal<br>2. Click on Monitor (Left Panel)<br>3. Select 'Alerts'<br>4. Click on Create > Alert rule<br>5. In 'Create an alert rule' page, choose the Scope as your Subscription and under the CONDITION section, choose 'Delete Security Rule (Microsoft.Network/networkSecurityGroups/securityRules)' and Other fields you can set based on your custom settings.<br>6. Click on Create
2023-02-25 02:10:38,060 -       RESULT: failed
2023-02-25 02:10:38,215 -   TESTID: PR-AZR-CLD-MNT-021
2023-02-25 02:10:38,216 -       SNAPSHOTID: AZRSNP_29996
2023-02-25 02:10:38,217 -       PATHS: 
2023-02-25 02:10:38,217 -       TITLE: Azure Activity log alert for delete network security group rule should exist
2023-02-25 02:10:38,218 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete network security group rule does not exist. Creating an activity log alert for Delete network security group rule gives insight into network rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:10:38,218 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:10:38,219 -       ERROR: Azure Activity log alert for delete network security group rule currently not exist
2023-02-25 02:10:38,219 -       REMEDIATION: 1. Log in to Azure Portal<br>2. Click on Monitor (Left Panel)<br>3. Select 'Alerts'<br>4. Click on Create > Alert rule<br>5. In 'Create an alert rule' page, choose the Scope as your Subscription and under the CONDITION section, choose 'Delete Security Rule (Microsoft.Network/networkSecurityGroups/securityRules)' and Other fields you can set based on your custom settings.<br>6. Click on Create
2023-02-25 02:10:38,219 -       RESULT: failed
2023-02-25 02:10:38,343 -   TESTID: PR-AZR-CLD-MNT-022
2023-02-25 02:10:38,345 -       SNAPSHOTID: AZRSNP_29995
2023-02-25 02:10:38,347 -       PATHS: 
2023-02-25 02:10:38,348 -       TITLE: Azure Activity log alert for delete security solution should exist
2023-02-25 02:10:38,348 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete security solution does not exist. Creating an activity log alert for Delete security solution gives insight into changes to the active security solutions and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:10:38,349 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:10:38,349 -       ERROR: Azure Activity log alert for delete security solution currently not exist
2023-02-25 02:10:38,349 -       REMEDIATION: 1. Log in to Azure Portal<br>2. Click on Monitor (Left Panel)<br>3. Select 'Alerts'<br>4. Click on Create > Alert rule<br>5. In 'Create an alert rule' page, choose the Scope as your Subscription and under the CONDITION section, choose 'Delete Security Solutions (Microsoft.Security/securitySolutions)' and Other fields you can set based on your custom settings.<br>6. Click on Create
2023-02-25 02:10:38,349 -       RESULT: failed
2023-02-25 02:10:38,498 -   TESTID: PR-AZR-CLD-MNT-022
2023-02-25 02:10:38,498 -       SNAPSHOTID: AZRSNP_29996
2023-02-25 02:10:38,499 -       PATHS: 
2023-02-25 02:10:38,500 -       TITLE: Azure Activity log alert for delete security solution should exist
2023-02-25 02:10:38,500 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete security solution does not exist. Creating an activity log alert for Delete security solution gives insight into changes to the active security solutions and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:10:38,501 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:10:38,501 -       ERROR: Azure Activity log alert for delete security solution currently not exist
2023-02-25 02:10:38,501 -       REMEDIATION: 1. Log in to Azure Portal<br>2. Click on Monitor (Left Panel)<br>3. Select 'Alerts'<br>4. Click on Create > Alert rule<br>5. In 'Create an alert rule' page, choose the Scope as your Subscription and under the CONDITION section, choose 'Delete Security Solutions (Microsoft.Security/securitySolutions)' and Other fields you can set based on your custom settings.<br>6. Click on Create
2023-02-25 02:10:38,502 -       RESULT: failed
2023-02-25 02:10:38,653 -   TESTID: PR-AZR-CLD-MNT-023
2023-02-25 02:10:38,654 -       SNAPSHOTID: AZRSNP_29995
2023-02-25 02:10:38,654 -       PATHS: 
2023-02-25 02:10:38,654 -       TITLE: Azure Activity log alert for update security policy should exist
2023-02-25 02:10:38,654 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Update security policy does not exist. Creating an activity log alert for Update security policy gives insight into changes to security policy and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:10:38,654 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:10:38,655 -       ERROR: Azure Activity log alert for update security policy currently not exist
2023-02-25 02:10:38,655 -       REMEDIATION: 1. Log in to Azure Portal<br>2. Click on Monitor (Left Panel)<br>3. Select 'Alerts'<br>4. Click on Create > Alert rule<br>5. In 'Create an alert rule' page, choose the Scope as your Subscription and under the CONDITION section, choose 'Update security policy (Microsoft.Security/policies)' and Other fields you can set based on your custom settings.<br>6. Click on Create
2023-02-25 02:10:38,655 -       RESULT: failed
2023-02-25 02:10:38,817 -   TESTID: PR-AZR-CLD-MNT-023
2023-02-25 02:10:38,817 -       SNAPSHOTID: AZRSNP_29996
2023-02-25 02:10:38,817 -       PATHS: 
2023-02-25 02:10:38,817 -       TITLE: Azure Activity log alert for update security policy should exist
2023-02-25 02:10:38,817 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Update security policy does not exist. Creating an activity log alert for Update security policy gives insight into changes to security policy and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:10:38,818 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:10:38,818 -       ERROR: Azure Activity log alert for update security policy currently not exist
2023-02-25 02:10:38,818 -       REMEDIATION: 1. Log in to Azure Portal<br>2. Click on Monitor (Left Panel)<br>3. Select 'Alerts'<br>4. Click on Create > Alert rule<br>5. In 'Create an alert rule' page, choose the Scope as your Subscription and under the CONDITION section, choose 'Update security policy (Microsoft.Security/policies)' and Other fields you can set based on your custom settings.<br>6. Click on Create
2023-02-25 02:10:38,818 -       RESULT: failed
2023-02-25 02:10:38,926 -   TESTID: PR-AZR-CLD-MNT-024
2023-02-25 02:10:38,928 -       SNAPSHOTID: AZRSNP_29995
2023-02-25 02:10:38,929 -       PATHS: 
2023-02-25 02:10:38,930 -       TITLE: Azure Activity log alert for delete policy assignment should exist
2023-02-25 02:10:38,931 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete policy assignment does not exist. Creating an activity log alert for Delete policy assignment gives insight into changes done in azure policy - assignments and may reduce the time it takes to detect unsolicited changes.
2023-02-25 02:10:38,931 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:10:38,931 -       ERROR: Azure Activity log alert for delete policy assignment currently not exist
2023-02-25 02:10:38,931 -       REMEDIATION: 1. Log in to Azure Portal<br>2. Click on Monitor (Left Panel)<br>3. Select 'Alerts'<br>4. Click on Create > Alert rule<br>5. In 'Create an alert rule' page, choose the Scope as your Subscription and under the CONDITION section, choose 'Delete policy assignment (Microsoft.Authorization/policyAssignments)' and Other fields you can set based on your custom settings.<br>6. Click on Create
2023-02-25 02:10:38,931 -       RESULT: failed
2023-02-25 02:10:39,055 -   TESTID: PR-AZR-CLD-MNT-024
2023-02-25 02:10:39,056 -       SNAPSHOTID: AZRSNP_29996
2023-02-25 02:10:39,056 -       PATHS: 
2023-02-25 02:10:39,058 -       TITLE: Azure Activity log alert for delete policy assignment should exist
2023-02-25 02:10:39,059 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete policy assignment does not exist. Creating an activity log alert for Delete policy assignment gives insight into changes done in azure policy - assignments and may reduce the time it takes to detect unsolicited changes.
2023-02-25 02:10:39,061 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:10:39,062 -       ERROR: Azure Activity log alert for delete policy assignment currently not exist
2023-02-25 02:10:39,062 -       REMEDIATION: 1. Log in to Azure Portal<br>2. Click on Monitor (Left Panel)<br>3. Select 'Alerts'<br>4. Click on Create > Alert rule<br>5. In 'Create an alert rule' page, choose the Scope as your Subscription and under the CONDITION section, choose 'Delete policy assignment (Microsoft.Authorization/policyAssignments)' and Other fields you can set based on your custom settings.<br>6. Click on Create
2023-02-25 02:10:39,062 -       RESULT: failed
2023-02-25 02:10:39,078 - VALIDATION COMPLETE:
2023-02-25 02:10:39,085 -  Run Stats: {
  "start": "2023-02-25 01:30:49",
  "end": "2023-02-25 02:10:39",
  "remote": false,
  "errors": [],
  "host": "ubuntu",
  "timestamp": "2023-02-25 01:30:49",
  "jsonsource": false,
  "database": 0,
  "container": "scenario-azure",
  "CLEANING_REPOS": [],
  "INCLUDESNAPSHOTS": false,
  "SNAPHSHOTIDS": [],
  "INCLUDETESTS": true,
  "TESTIDS": [
    "PR-AZR-CLD-MNT-014",
    "PR-AZR-CLD-MNT-015",
    "PR-AZR-CLD-MNT-016",
    "PR-AZR-CLD-MNT-017",
    "PR-AZR-CLD-MNT-018",
    "PR-AZR-CLD-MNT-019",
    "PR-AZR-CLD-MNT-020",
    "PR-AZR-CLD-MNT-021",
    "PR-AZR-CLD-MNT-022",
    "PR-AZR-CLD-MNT-023",
    "PR-AZR-CLD-MNT-024"
  ],
  "ONLYSNAPSHOTS": false,
  "ONLYSNAPSHOTIDS": [],
  "session_id": "session_1677346249050",
  "run_type": "CRAWL_AND_COMPLIANCE",
  "log": null,
  "duration": "2390 seconds"
}
rezoan commented 1 year ago

Azure TF Prancer CLI test output

2023-02-25 02:25:19,155 - SNAPSHOTS COMPLETE:
2023-02-25 02:25:19,786 -   TESTID: PR-AZR-TRF-MNT-014
2023-02-25 02:25:19,789 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM36
2023-02-25 02:25:19,790 -       PATHS: 
2023-02-25 02:25:19,791 -            /azure/diagnosticsettings/terraform.tfvars
2023-02-25 02:25:19,791 -            /azure/diagnosticsettings/vars.tf
2023-02-25 02:25:19,792 -            /azure/diagnosticsettings/provider.tf
2023-02-25 02:25:19,792 -            /azure/diagnosticsettings/main.tf
2023-02-25 02:25:19,793 -       TITLE: Azure Activity log alert for create or update SQL server firewall rule should exist
2023-02-25 02:25:19,793 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update SQL server firewall rule does not exist. Creating an activity log alert for Create or update SQL server firewall rule gives insight into SQL server firewall rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:19,794 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:19,794 -       ERROR: Azure Activity log alert for create or update SQL server firewall rule currently not exist
2023-02-25 02:25:19,795 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.sql/servers/firewallrules/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:19,796 -       RESULT: failed
2023-02-25 02:25:20,138 -   TESTID: PR-AZR-TRF-MNT-014
2023-02-25 02:25:20,139 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM38
2023-02-25 02:25:20,140 -       PATHS: 
2023-02-25 02:25:20,141 -            /azure/mssql_servers/terraform.tfvars
2023-02-25 02:25:20,141 -            /azure/mssql_servers/vars.tf
2023-02-25 02:25:20,142 -            /azure/mssql_servers/provider.tf
2023-02-25 02:25:20,142 -            /azure/mssql_servers/main.tf
2023-02-25 02:25:20,143 -       TITLE: Azure Activity log alert for create or update SQL server firewall rule should exist
2023-02-25 02:25:20,144 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update SQL server firewall rule does not exist. Creating an activity log alert for Create or update SQL server firewall rule gives insight into SQL server firewall rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:20,144 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:20,145 -       ERROR: Azure Activity log alert for create or update SQL server firewall rule currently not exist
2023-02-25 02:25:20,145 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.sql/servers/firewallrules/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:20,146 -       RESULT: failed
2023-02-25 02:25:20,478 -   TESTID: PR-AZR-TRF-MNT-014
2023-02-25 02:25:20,479 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM41
2023-02-25 02:25:20,480 -       PATHS: 
2023-02-25 02:25:20,480 -            /azure/keyvaultsecret/terraform.tfvars
2023-02-25 02:25:20,481 -            /azure/keyvaultsecret/vars.tf
2023-02-25 02:25:20,482 -            /azure/keyvaultsecret/provider.tf
2023-02-25 02:25:20,482 -            /azure/keyvaultsecret/main.tf
2023-02-25 02:25:20,483 -       TITLE: Azure Activity log alert for create or update SQL server firewall rule should exist
2023-02-25 02:25:20,484 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update SQL server firewall rule does not exist. Creating an activity log alert for Create or update SQL server firewall rule gives insight into SQL server firewall rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:20,484 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:20,484 -       ERROR: Azure Activity log alert for create or update SQL server firewall rule currently not exist
2023-02-25 02:25:20,485 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.sql/servers/firewallrules/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:20,486 -       RESULT: failed
2023-02-25 02:25:20,793 -   TESTID: PR-AZR-TRF-MNT-014
2023-02-25 02:25:20,794 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM49
2023-02-25 02:25:20,795 -       PATHS: 
2023-02-25 02:25:20,795 -            /azure/storageaccounts/terraform.tfvars
2023-02-25 02:25:20,796 -            /azure/storageaccounts/vars.tf
2023-02-25 02:25:20,796 -            /azure/storageaccounts/provider.tf
2023-02-25 02:25:20,797 -            /azure/storageaccounts/main.tf
2023-02-25 02:25:20,797 -       TITLE: Azure Activity log alert for create or update SQL server firewall rule should exist
2023-02-25 02:25:20,800 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update SQL server firewall rule does not exist. Creating an activity log alert for Create or update SQL server firewall rule gives insight into SQL server firewall rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:20,803 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:20,804 -       ERROR: Azure Activity log alert for create or update SQL server firewall rule currently not exist
2023-02-25 02:25:20,805 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.sql/servers/firewallrules/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:20,806 -       RESULT: failed
2023-02-25 02:25:21,154 -   TESTID: PR-AZR-TRF-MNT-014
2023-02-25 02:25:21,158 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM54
2023-02-25 02:25:21,158 -       PATHS: 
2023-02-25 02:25:21,159 -            /azure/monitoring_alert/terraform.tfvars
2023-02-25 02:25:21,159 -            /azure/monitoring_alert/vars.tf
2023-02-25 02:25:21,160 -            /azure/monitoring_alert/provider.tf
2023-02-25 02:25:21,160 -            /azure/monitoring_alert/main.tf
2023-02-25 02:25:21,161 -       TITLE: Azure Activity log alert for create or update SQL server firewall rule should exist
2023-02-25 02:25:21,165 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update SQL server firewall rule does not exist. Creating an activity log alert for Create or update SQL server firewall rule gives insight into SQL server firewall rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:21,165 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:21,166 -       ERROR: Azure Activity log alert for create or update SQL server firewall rule currently not exist
2023-02-25 02:25:21,166 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.sql/servers/firewallrules/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:21,167 -       RESULT: failed
2023-02-25 02:25:21,588 -   TESTID: PR-AZR-TRF-MNT-015
2023-02-25 02:25:21,589 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM36
2023-02-25 02:25:21,590 -       PATHS: 
2023-02-25 02:25:21,590 -            /azure/diagnosticsettings/terraform.tfvars
2023-02-25 02:25:21,591 -            /azure/diagnosticsettings/vars.tf
2023-02-25 02:25:21,591 -            /azure/diagnosticsettings/provider.tf
2023-02-25 02:25:21,592 -            /azure/diagnosticsettings/main.tf
2023-02-25 02:25:21,593 -       TITLE: Azure Activity log alert for create or update network security group should exist
2023-02-25 02:25:21,593 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update network security group does not exist. Creating an activity log alert for Create or update network security group gives insight into network access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:21,594 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:21,594 -       ERROR: Azure Activity log alert for create or update network security group currently not exist
2023-02-25 02:25:21,594 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.network/networksecuritygroups/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:21,595 -       RESULT: failed
2023-02-25 02:25:21,932 -   TESTID: PR-AZR-TRF-MNT-015
2023-02-25 02:25:21,934 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM38
2023-02-25 02:25:21,936 -       PATHS: 
2023-02-25 02:25:21,937 -            /azure/mssql_servers/terraform.tfvars
2023-02-25 02:25:21,939 -            /azure/mssql_servers/vars.tf
2023-02-25 02:25:21,941 -            /azure/mssql_servers/provider.tf
2023-02-25 02:25:21,941 -            /azure/mssql_servers/main.tf
2023-02-25 02:25:21,942 -       TITLE: Azure Activity log alert for create or update network security group should exist
2023-02-25 02:25:21,943 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update network security group does not exist. Creating an activity log alert for Create or update network security group gives insight into network access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:21,943 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:21,944 -       ERROR: Azure Activity log alert for create or update network security group currently not exist
2023-02-25 02:25:21,944 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.network/networksecuritygroups/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:21,945 -       RESULT: failed
2023-02-25 02:25:22,267 -   TESTID: PR-AZR-TRF-MNT-015
2023-02-25 02:25:22,268 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM41
2023-02-25 02:25:22,269 -       PATHS: 
2023-02-25 02:25:22,270 -            /azure/keyvaultsecret/terraform.tfvars
2023-02-25 02:25:22,270 -            /azure/keyvaultsecret/vars.tf
2023-02-25 02:25:22,270 -            /azure/keyvaultsecret/provider.tf
2023-02-25 02:25:22,271 -            /azure/keyvaultsecret/main.tf
2023-02-25 02:25:22,271 -       TITLE: Azure Activity log alert for create or update network security group should exist
2023-02-25 02:25:22,272 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update network security group does not exist. Creating an activity log alert for Create or update network security group gives insight into network access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:22,272 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:22,273 -       ERROR: Azure Activity log alert for create or update network security group currently not exist
2023-02-25 02:25:22,273 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.network/networksecuritygroups/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:22,274 -       RESULT: failed
2023-02-25 02:25:22,601 -   TESTID: PR-AZR-TRF-MNT-015
2023-02-25 02:25:22,603 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM49
2023-02-25 02:25:22,604 -       PATHS: 
2023-02-25 02:25:22,605 -            /azure/storageaccounts/terraform.tfvars
2023-02-25 02:25:22,606 -            /azure/storageaccounts/vars.tf
2023-02-25 02:25:22,607 -            /azure/storageaccounts/provider.tf
2023-02-25 02:25:22,607 -            /azure/storageaccounts/main.tf
2023-02-25 02:25:22,608 -       TITLE: Azure Activity log alert for create or update network security group should exist
2023-02-25 02:25:22,609 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update network security group does not exist. Creating an activity log alert for Create or update network security group gives insight into network access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:22,609 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:22,610 -       ERROR: Azure Activity log alert for create or update network security group currently not exist
2023-02-25 02:25:22,611 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.network/networksecuritygroups/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:22,611 -       RESULT: failed
2023-02-25 02:25:22,907 -   TESTID: PR-AZR-TRF-MNT-015
2023-02-25 02:25:22,909 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM54
2023-02-25 02:25:22,909 -       PATHS: 
2023-02-25 02:25:22,910 -            /azure/monitoring_alert/terraform.tfvars
2023-02-25 02:25:22,910 -            /azure/monitoring_alert/vars.tf
2023-02-25 02:25:22,911 -            /azure/monitoring_alert/provider.tf
2023-02-25 02:25:22,911 -            /azure/monitoring_alert/main.tf
2023-02-25 02:25:22,912 -       TITLE: Azure Activity log alert for create or update network security group should exist
2023-02-25 02:25:22,912 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update network security group does not exist. Creating an activity log alert for Create or update network security group gives insight into network access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:22,913 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:22,914 -       ERROR: Azure Activity log alert for create or update network security group currently not exist
2023-02-25 02:25:22,914 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.network/networksecuritygroups/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:22,915 -       RESULT: failed
2023-02-25 02:25:23,228 -   TESTID: PR-AZR-TRF-MNT-016
2023-02-25 02:25:23,230 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM36
2023-02-25 02:25:23,230 -       PATHS: 
2023-02-25 02:25:23,231 -            /azure/diagnosticsettings/terraform.tfvars
2023-02-25 02:25:23,232 -            /azure/diagnosticsettings/vars.tf
2023-02-25 02:25:23,233 -            /azure/diagnosticsettings/provider.tf
2023-02-25 02:25:23,234 -            /azure/diagnosticsettings/main.tf
2023-02-25 02:25:23,234 -       TITLE: Azure Activity log alert for create or update network security group rule should exist
2023-02-25 02:25:23,235 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update network security group rule does not exist. Creating an activity log alert for Create or update network security group rule gives insight into network rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:23,235 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:23,235 -       ERROR: Azure Activity log alert for create or update network security group rule currently not exist
2023-02-25 02:25:23,236 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.network/networksecuritygroups/securityrules/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:23,236 -       RESULT: failed
2023-02-25 02:25:23,562 -   TESTID: PR-AZR-TRF-MNT-016
2023-02-25 02:25:23,564 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM38
2023-02-25 02:25:23,565 -       PATHS: 
2023-02-25 02:25:23,565 -            /azure/mssql_servers/terraform.tfvars
2023-02-25 02:25:23,566 -            /azure/mssql_servers/vars.tf
2023-02-25 02:25:23,567 -            /azure/mssql_servers/provider.tf
2023-02-25 02:25:23,567 -            /azure/mssql_servers/main.tf
2023-02-25 02:25:23,568 -       TITLE: Azure Activity log alert for create or update network security group rule should exist
2023-02-25 02:25:23,569 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update network security group rule does not exist. Creating an activity log alert for Create or update network security group rule gives insight into network rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:23,570 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:23,571 -       ERROR: Azure Activity log alert for create or update network security group rule currently not exist
2023-02-25 02:25:23,571 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.network/networksecuritygroups/securityrules/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:23,572 -       RESULT: failed
2023-02-25 02:25:23,904 -   TESTID: PR-AZR-TRF-MNT-016
2023-02-25 02:25:23,905 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM41
2023-02-25 02:25:23,907 -       PATHS: 
2023-02-25 02:25:23,908 -            /azure/keyvaultsecret/terraform.tfvars
2023-02-25 02:25:23,909 -            /azure/keyvaultsecret/vars.tf
2023-02-25 02:25:23,909 -            /azure/keyvaultsecret/provider.tf
2023-02-25 02:25:23,910 -            /azure/keyvaultsecret/main.tf
2023-02-25 02:25:23,910 -       TITLE: Azure Activity log alert for create or update network security group rule should exist
2023-02-25 02:25:23,911 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update network security group rule does not exist. Creating an activity log alert for Create or update network security group rule gives insight into network rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:23,911 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:23,912 -       ERROR: Azure Activity log alert for create or update network security group rule currently not exist
2023-02-25 02:25:23,913 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.network/networksecuritygroups/securityrules/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:23,913 -       RESULT: failed
2023-02-25 02:25:24,271 -   TESTID: PR-AZR-TRF-MNT-016
2023-02-25 02:25:24,273 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM49
2023-02-25 02:25:24,274 -       PATHS: 
2023-02-25 02:25:24,275 -            /azure/storageaccounts/terraform.tfvars
2023-02-25 02:25:24,275 -            /azure/storageaccounts/vars.tf
2023-02-25 02:25:24,276 -            /azure/storageaccounts/provider.tf
2023-02-25 02:25:24,279 -            /azure/storageaccounts/main.tf
2023-02-25 02:25:24,280 -       TITLE: Azure Activity log alert for create or update network security group rule should exist
2023-02-25 02:25:24,280 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update network security group rule does not exist. Creating an activity log alert for Create or update network security group rule gives insight into network rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:24,281 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:24,281 -       ERROR: Azure Activity log alert for create or update network security group rule currently not exist
2023-02-25 02:25:24,281 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.network/networksecuritygroups/securityrules/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:24,282 -       RESULT: failed
2023-02-25 02:25:24,591 -   TESTID: PR-AZR-TRF-MNT-016
2023-02-25 02:25:24,593 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM54
2023-02-25 02:25:24,594 -       PATHS: 
2023-02-25 02:25:24,596 -            /azure/monitoring_alert/terraform.tfvars
2023-02-25 02:25:24,597 -            /azure/monitoring_alert/vars.tf
2023-02-25 02:25:24,598 -            /azure/monitoring_alert/provider.tf
2023-02-25 02:25:24,599 -            /azure/monitoring_alert/main.tf
2023-02-25 02:25:24,600 -       TITLE: Azure Activity log alert for create or update network security group rule should exist
2023-02-25 02:25:24,601 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update network security group rule does not exist. Creating an activity log alert for Create or update network security group rule gives insight into network rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:24,603 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:24,604 -       ERROR: Azure Activity log alert for create or update network security group rule currently not exist
2023-02-25 02:25:24,605 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.network/networksecuritygroups/securityrules/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:24,607 -       RESULT: failed
2023-02-25 02:25:24,930 -   TESTID: PR-AZR-TRF-MNT-017
2023-02-25 02:25:24,932 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM36
2023-02-25 02:25:24,933 -       PATHS: 
2023-02-25 02:25:24,934 -            /azure/diagnosticsettings/terraform.tfvars
2023-02-25 02:25:24,936 -            /azure/diagnosticsettings/vars.tf
2023-02-25 02:25:24,937 -            /azure/diagnosticsettings/provider.tf
2023-02-25 02:25:24,938 -            /azure/diagnosticsettings/main.tf
2023-02-25 02:25:24,939 -       TITLE: Azure Activity log alert for create or update security solution should exist
2023-02-25 02:25:24,941 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update security solution does not exist. Creating an activity log alert for Create or update security solution gives insight into changes to the active security solutions and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:24,941 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:24,942 -       ERROR: Azure Activity log alert for create or update security solution currently not exist
2023-02-25 02:25:24,943 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.security/securitysolutions/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:24,943 -       RESULT: failed
2023-02-25 02:25:25,321 -   TESTID: PR-AZR-TRF-MNT-017
2023-02-25 02:25:25,322 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM38
2023-02-25 02:25:25,323 -       PATHS: 
2023-02-25 02:25:25,323 -            /azure/mssql_servers/terraform.tfvars
2023-02-25 02:25:25,324 -            /azure/mssql_servers/vars.tf
2023-02-25 02:25:25,324 -            /azure/mssql_servers/provider.tf
2023-02-25 02:25:25,325 -            /azure/mssql_servers/main.tf
2023-02-25 02:25:25,325 -       TITLE: Azure Activity log alert for create or update security solution should exist
2023-02-25 02:25:25,326 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update security solution does not exist. Creating an activity log alert for Create or update security solution gives insight into changes to the active security solutions and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:25,326 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:25,327 -       ERROR: Azure Activity log alert for create or update security solution currently not exist
2023-02-25 02:25:25,327 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.security/securitysolutions/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:25,328 -       RESULT: failed
2023-02-25 02:25:25,679 -   TESTID: PR-AZR-TRF-MNT-017
2023-02-25 02:25:25,681 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM41
2023-02-25 02:25:25,682 -       PATHS: 
2023-02-25 02:25:25,682 -            /azure/keyvaultsecret/terraform.tfvars
2023-02-25 02:25:25,683 -            /azure/keyvaultsecret/vars.tf
2023-02-25 02:25:25,683 -            /azure/keyvaultsecret/provider.tf
2023-02-25 02:25:25,684 -            /azure/keyvaultsecret/main.tf
2023-02-25 02:25:25,685 -       TITLE: Azure Activity log alert for create or update security solution should exist
2023-02-25 02:25:25,685 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update security solution does not exist. Creating an activity log alert for Create or update security solution gives insight into changes to the active security solutions and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:25,686 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:25,686 -       ERROR: Azure Activity log alert for create or update security solution currently not exist
2023-02-25 02:25:25,687 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.security/securitysolutions/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:25,687 -       RESULT: failed
2023-02-25 02:25:26,046 -   TESTID: PR-AZR-TRF-MNT-017
2023-02-25 02:25:26,047 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM49
2023-02-25 02:25:26,047 -       PATHS: 
2023-02-25 02:25:26,048 -            /azure/storageaccounts/terraform.tfvars
2023-02-25 02:25:26,048 -            /azure/storageaccounts/vars.tf
2023-02-25 02:25:26,048 -            /azure/storageaccounts/provider.tf
2023-02-25 02:25:26,049 -            /azure/storageaccounts/main.tf
2023-02-25 02:25:26,050 -       TITLE: Azure Activity log alert for create or update security solution should exist
2023-02-25 02:25:26,051 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update security solution does not exist. Creating an activity log alert for Create or update security solution gives insight into changes to the active security solutions and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:26,052 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:26,052 -       ERROR: Azure Activity log alert for create or update security solution currently not exist
2023-02-25 02:25:26,053 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.security/securitysolutions/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:26,054 -       RESULT: failed
2023-02-25 02:25:26,432 -   TESTID: PR-AZR-TRF-MNT-017
2023-02-25 02:25:26,436 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM54
2023-02-25 02:25:26,437 -       PATHS: 
2023-02-25 02:25:26,439 -            /azure/monitoring_alert/terraform.tfvars
2023-02-25 02:25:26,440 -            /azure/monitoring_alert/vars.tf
2023-02-25 02:25:26,441 -            /azure/monitoring_alert/provider.tf
2023-02-25 02:25:26,443 -            /azure/monitoring_alert/main.tf
2023-02-25 02:25:26,443 -       TITLE: Azure Activity log alert for create or update security solution should exist
2023-02-25 02:25:26,446 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create or update security solution does not exist. Creating an activity log alert for Create or update security solution gives insight into changes to the active security solutions and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:26,446 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:26,447 -       ERROR: Azure Activity log alert for create or update security solution currently not exist
2023-02-25 02:25:26,447 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.security/securitysolutions/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:26,447 -       RESULT: failed
2023-02-25 02:25:26,939 -   TESTID: PR-AZR-TRF-MNT-018
2023-02-25 02:25:26,941 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM36
2023-02-25 02:25:26,941 -       PATHS: 
2023-02-25 02:25:26,942 -            /azure/diagnosticsettings/terraform.tfvars
2023-02-25 02:25:26,942 -            /azure/diagnosticsettings/vars.tf
2023-02-25 02:25:26,944 -            /azure/diagnosticsettings/provider.tf
2023-02-25 02:25:26,945 -            /azure/diagnosticsettings/main.tf
2023-02-25 02:25:26,946 -       TITLE: Azure Activity log alert for create policy assignment should exist
2023-02-25 02:25:26,946 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create policy assignment does not exist. Creating an activity log alert for Create policy assignment gives insight into changes done in azure policy - assignments and may reduce the time it takes to detect unsolicited changes.
2023-02-25 02:25:26,948 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:26,948 -       ERROR: Azure Activity log alert for create policy assignment currently not exist
2023-02-25 02:25:26,949 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.authorization/policyassignments/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:26,950 -       RESULT: failed
2023-02-25 02:25:27,470 -   TESTID: PR-AZR-TRF-MNT-018
2023-02-25 02:25:27,471 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM38
2023-02-25 02:25:27,472 -       PATHS: 
2023-02-25 02:25:27,472 -            /azure/mssql_servers/terraform.tfvars
2023-02-25 02:25:27,473 -            /azure/mssql_servers/vars.tf
2023-02-25 02:25:27,473 -            /azure/mssql_servers/provider.tf
2023-02-25 02:25:27,474 -            /azure/mssql_servers/main.tf
2023-02-25 02:25:27,475 -       TITLE: Azure Activity log alert for create policy assignment should exist
2023-02-25 02:25:27,476 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create policy assignment does not exist. Creating an activity log alert for Create policy assignment gives insight into changes done in azure policy - assignments and may reduce the time it takes to detect unsolicited changes.
2023-02-25 02:25:27,476 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:27,477 -       ERROR: Azure Activity log alert for create policy assignment currently not exist
2023-02-25 02:25:27,478 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.authorization/policyassignments/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:27,479 -       RESULT: failed
2023-02-25 02:25:27,809 -   TESTID: PR-AZR-TRF-MNT-018
2023-02-25 02:25:27,811 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM41
2023-02-25 02:25:27,812 -       PATHS: 
2023-02-25 02:25:27,812 -            /azure/keyvaultsecret/terraform.tfvars
2023-02-25 02:25:27,813 -            /azure/keyvaultsecret/vars.tf
2023-02-25 02:25:27,813 -            /azure/keyvaultsecret/provider.tf
2023-02-25 02:25:27,813 -            /azure/keyvaultsecret/main.tf
2023-02-25 02:25:27,814 -       TITLE: Azure Activity log alert for create policy assignment should exist
2023-02-25 02:25:27,814 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create policy assignment does not exist. Creating an activity log alert for Create policy assignment gives insight into changes done in azure policy - assignments and may reduce the time it takes to detect unsolicited changes.
2023-02-25 02:25:27,815 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:27,815 -       ERROR: Azure Activity log alert for create policy assignment currently not exist
2023-02-25 02:25:27,815 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.authorization/policyassignments/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:27,816 -       RESULT: failed
2023-02-25 02:25:28,271 -   TESTID: PR-AZR-TRF-MNT-018
2023-02-25 02:25:28,276 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM49
2023-02-25 02:25:28,277 -       PATHS: 
2023-02-25 02:25:28,277 -            /azure/storageaccounts/terraform.tfvars
2023-02-25 02:25:28,278 -            /azure/storageaccounts/vars.tf
2023-02-25 02:25:28,278 -            /azure/storageaccounts/provider.tf
2023-02-25 02:25:28,282 -            /azure/storageaccounts/main.tf
2023-02-25 02:25:28,282 -       TITLE: Azure Activity log alert for create policy assignment should exist
2023-02-25 02:25:28,282 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create policy assignment does not exist. Creating an activity log alert for Create policy assignment gives insight into changes done in azure policy - assignments and may reduce the time it takes to detect unsolicited changes.
2023-02-25 02:25:28,283 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:28,284 -       ERROR: Azure Activity log alert for create policy assignment currently not exist
2023-02-25 02:25:28,285 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.authorization/policyassignments/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:28,286 -       RESULT: failed
2023-02-25 02:25:28,667 -   TESTID: PR-AZR-TRF-MNT-018
2023-02-25 02:25:28,669 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM54
2023-02-25 02:25:28,673 -       PATHS: 
2023-02-25 02:25:28,674 -            /azure/monitoring_alert/terraform.tfvars
2023-02-25 02:25:28,675 -            /azure/monitoring_alert/vars.tf
2023-02-25 02:25:28,675 -            /azure/monitoring_alert/provider.tf
2023-02-25 02:25:28,676 -            /azure/monitoring_alert/main.tf
2023-02-25 02:25:28,677 -       TITLE: Azure Activity log alert for create policy assignment should exist
2023-02-25 02:25:28,677 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Create policy assignment does not exist. Creating an activity log alert for Create policy assignment gives insight into changes done in azure policy - assignments and may reduce the time it takes to detect unsolicited changes.
2023-02-25 02:25:28,678 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:28,678 -       ERROR: Azure Activity log alert for create policy assignment currently not exist
2023-02-25 02:25:28,679 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.authorization/policyassignments/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:28,680 -       RESULT: failed
2023-02-25 02:25:29,151 -   TESTID: PR-AZR-TRF-MNT-019
2023-02-25 02:25:29,153 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM36
2023-02-25 02:25:29,153 -       PATHS: 
2023-02-25 02:25:29,154 -            /azure/diagnosticsettings/terraform.tfvars
2023-02-25 02:25:29,155 -            /azure/diagnosticsettings/vars.tf
2023-02-25 02:25:29,155 -            /azure/diagnosticsettings/provider.tf
2023-02-25 02:25:29,157 -            /azure/diagnosticsettings/main.tf
2023-02-25 02:25:29,166 -       TITLE: Azure Activity log alert for delete SQL server firewall rule should exist
2023-02-25 02:25:29,167 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete SQL server firewall rule does not exist. Creating an activity log alert for Delete SQL server firewall rule gives insight into SQL server firewall rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:29,168 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:29,168 -       ERROR: Azure Activity log alert for delete SQL server firewall rule currently not exist
2023-02-25 02:25:29,169 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.sql/servers/firewallrules/delete' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:29,169 -       RESULT: failed
2023-02-25 02:25:29,613 -   TESTID: PR-AZR-TRF-MNT-019
2023-02-25 02:25:29,616 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM38
2023-02-25 02:25:29,618 -       PATHS: 
2023-02-25 02:25:29,619 -            /azure/mssql_servers/terraform.tfvars
2023-02-25 02:25:29,619 -            /azure/mssql_servers/vars.tf
2023-02-25 02:25:29,620 -            /azure/mssql_servers/provider.tf
2023-02-25 02:25:29,620 -            /azure/mssql_servers/main.tf
2023-02-25 02:25:29,621 -       TITLE: Azure Activity log alert for delete SQL server firewall rule should exist
2023-02-25 02:25:29,621 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete SQL server firewall rule does not exist. Creating an activity log alert for Delete SQL server firewall rule gives insight into SQL server firewall rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:29,622 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:29,622 -       ERROR: Azure Activity log alert for delete SQL server firewall rule currently not exist
2023-02-25 02:25:29,625 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.sql/servers/firewallrules/delete' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:29,625 -       RESULT: failed
2023-02-25 02:25:29,992 -   TESTID: PR-AZR-TRF-MNT-019
2023-02-25 02:25:29,993 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM41
2023-02-25 02:25:29,994 -       PATHS: 
2023-02-25 02:25:29,995 -            /azure/keyvaultsecret/terraform.tfvars
2023-02-25 02:25:29,995 -            /azure/keyvaultsecret/vars.tf
2023-02-25 02:25:29,996 -            /azure/keyvaultsecret/provider.tf
2023-02-25 02:25:29,996 -            /azure/keyvaultsecret/main.tf
2023-02-25 02:25:29,997 -       TITLE: Azure Activity log alert for delete SQL server firewall rule should exist
2023-02-25 02:25:29,997 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete SQL server firewall rule does not exist. Creating an activity log alert for Delete SQL server firewall rule gives insight into SQL server firewall rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:29,998 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:29,999 -       ERROR: Azure Activity log alert for delete SQL server firewall rule currently not exist
2023-02-25 02:25:29,999 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.sql/servers/firewallrules/delete' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:30,000 -       RESULT: failed
2023-02-25 02:25:30,360 -   TESTID: PR-AZR-TRF-MNT-019
2023-02-25 02:25:30,361 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM49
2023-02-25 02:25:30,361 -       PATHS: 
2023-02-25 02:25:30,362 -            /azure/storageaccounts/terraform.tfvars
2023-02-25 02:25:30,362 -            /azure/storageaccounts/vars.tf
2023-02-25 02:25:30,363 -            /azure/storageaccounts/provider.tf
2023-02-25 02:25:30,363 -            /azure/storageaccounts/main.tf
2023-02-25 02:25:30,364 -       TITLE: Azure Activity log alert for delete SQL server firewall rule should exist
2023-02-25 02:25:30,365 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete SQL server firewall rule does not exist. Creating an activity log alert for Delete SQL server firewall rule gives insight into SQL server firewall rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:30,365 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:30,366 -       ERROR: Azure Activity log alert for delete SQL server firewall rule currently not exist
2023-02-25 02:25:30,366 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.sql/servers/firewallrules/delete' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:30,367 -       RESULT: failed
2023-02-25 02:25:30,784 -   TESTID: PR-AZR-TRF-MNT-019
2023-02-25 02:25:30,786 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM54
2023-02-25 02:25:30,786 -       PATHS: 
2023-02-25 02:25:30,788 -            /azure/monitoring_alert/terraform.tfvars
2023-02-25 02:25:30,790 -            /azure/monitoring_alert/vars.tf
2023-02-25 02:25:30,790 -            /azure/monitoring_alert/provider.tf
2023-02-25 02:25:30,790 -            /azure/monitoring_alert/main.tf
2023-02-25 02:25:30,791 -       TITLE: Azure Activity log alert for delete SQL server firewall rule should exist
2023-02-25 02:25:30,791 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete SQL server firewall rule does not exist. Creating an activity log alert for Delete SQL server firewall rule gives insight into SQL server firewall rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:30,791 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:30,792 -       ERROR: Azure Activity log alert for delete SQL server firewall rule currently not exist
2023-02-25 02:25:30,792 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.sql/servers/firewallrules/delete' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:30,793 -       RESULT: failed
2023-02-25 02:25:31,190 -   TESTID: PR-AZR-TRF-MNT-020
2023-02-25 02:25:31,194 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM36
2023-02-25 02:25:31,194 -       PATHS: 
2023-02-25 02:25:31,195 -            /azure/diagnosticsettings/terraform.tfvars
2023-02-25 02:25:31,195 -            /azure/diagnosticsettings/vars.tf
2023-02-25 02:25:31,195 -            /azure/diagnosticsettings/provider.tf
2023-02-25 02:25:31,196 -            /azure/diagnosticsettings/main.tf
2023-02-25 02:25:31,204 -       TITLE: Azure Activity log alert for delete network security group should exist
2023-02-25 02:25:31,205 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete network security group does not exist. Creating an activity log alert for the Delete network security group gives insight into network access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:31,207 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:31,209 -       ERROR: Azure Activity log alert for delete network security group currently not exist
2023-02-25 02:25:31,209 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.network/networksecuritygroups/delete' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:31,210 -       RESULT: failed
2023-02-25 02:25:31,671 -   TESTID: PR-AZR-TRF-MNT-020
2023-02-25 02:25:31,675 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM38
2023-02-25 02:25:31,675 -       PATHS: 
2023-02-25 02:25:31,676 -            /azure/mssql_servers/terraform.tfvars
2023-02-25 02:25:31,677 -            /azure/mssql_servers/vars.tf
2023-02-25 02:25:31,678 -            /azure/mssql_servers/provider.tf
2023-02-25 02:25:31,678 -            /azure/mssql_servers/main.tf
2023-02-25 02:25:31,679 -       TITLE: Azure Activity log alert for delete network security group should exist
2023-02-25 02:25:31,680 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete network security group does not exist. Creating an activity log alert for the Delete network security group gives insight into network access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:31,680 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:31,683 -       ERROR: Azure Activity log alert for delete network security group currently not exist
2023-02-25 02:25:31,685 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.network/networksecuritygroups/delete' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:31,685 -       RESULT: failed
2023-02-25 02:25:32,128 -   TESTID: PR-AZR-TRF-MNT-020
2023-02-25 02:25:32,129 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM41
2023-02-25 02:25:32,130 -       PATHS: 
2023-02-25 02:25:32,130 -            /azure/keyvaultsecret/terraform.tfvars
2023-02-25 02:25:32,130 -            /azure/keyvaultsecret/vars.tf
2023-02-25 02:25:32,130 -            /azure/keyvaultsecret/provider.tf
2023-02-25 02:25:32,131 -            /azure/keyvaultsecret/main.tf
2023-02-25 02:25:32,131 -       TITLE: Azure Activity log alert for delete network security group should exist
2023-02-25 02:25:32,132 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete network security group does not exist. Creating an activity log alert for the Delete network security group gives insight into network access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:32,132 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:32,133 -       ERROR: Azure Activity log alert for delete network security group currently not exist
2023-02-25 02:25:32,134 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.network/networksecuritygroups/delete' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:32,134 -       RESULT: failed
2023-02-25 02:25:32,573 -   TESTID: PR-AZR-TRF-MNT-020
2023-02-25 02:25:32,574 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM49
2023-02-25 02:25:32,574 -       PATHS: 
2023-02-25 02:25:32,575 -            /azure/storageaccounts/terraform.tfvars
2023-02-25 02:25:32,575 -            /azure/storageaccounts/vars.tf
2023-02-25 02:25:32,575 -            /azure/storageaccounts/provider.tf
2023-02-25 02:25:32,576 -            /azure/storageaccounts/main.tf
2023-02-25 02:25:32,576 -       TITLE: Azure Activity log alert for delete network security group should exist
2023-02-25 02:25:32,577 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete network security group does not exist. Creating an activity log alert for the Delete network security group gives insight into network access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:32,578 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:32,578 -       ERROR: Azure Activity log alert for delete network security group currently not exist
2023-02-25 02:25:32,579 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.network/networksecuritygroups/delete' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:32,579 -       RESULT: failed
2023-02-25 02:25:33,028 -   TESTID: PR-AZR-TRF-MNT-020
2023-02-25 02:25:33,031 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM54
2023-02-25 02:25:33,031 -       PATHS: 
2023-02-25 02:25:33,032 -            /azure/monitoring_alert/terraform.tfvars
2023-02-25 02:25:33,033 -            /azure/monitoring_alert/vars.tf
2023-02-25 02:25:33,033 -            /azure/monitoring_alert/provider.tf
2023-02-25 02:25:33,034 -            /azure/monitoring_alert/main.tf
2023-02-25 02:25:33,035 -       TITLE: Azure Activity log alert for delete network security group should exist
2023-02-25 02:25:33,035 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete network security group does not exist. Creating an activity log alert for the Delete network security group gives insight into network access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:33,036 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:33,041 -       ERROR: Azure Activity log alert for delete network security group currently not exist
2023-02-25 02:25:33,041 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.network/networksecuritygroups/delete' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:33,042 -       RESULT: failed
2023-02-25 02:25:33,590 -   TESTID: PR-AZR-TRF-MNT-021
2023-02-25 02:25:33,592 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM36
2023-02-25 02:25:33,594 -       PATHS: 
2023-02-25 02:25:33,595 -            /azure/diagnosticsettings/terraform.tfvars
2023-02-25 02:25:33,595 -            /azure/diagnosticsettings/vars.tf
2023-02-25 02:25:33,596 -            /azure/diagnosticsettings/provider.tf
2023-02-25 02:25:33,597 -            /azure/diagnosticsettings/main.tf
2023-02-25 02:25:33,597 -       TITLE: Azure Activity log alert for delete network security group rule should exist
2023-02-25 02:25:33,598 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete network security group rule does not exist. Creating an activity log alert for Delete network security group rule gives insight into network rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:33,598 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:33,599 -       ERROR: Azure Activity log alert for delete network security group rule currently not exist
2023-02-25 02:25:33,599 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.network/networksecuritygroups/securityrules/delete' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:33,600 -       RESULT: failed
2023-02-25 02:25:34,066 -   TESTID: PR-AZR-TRF-MNT-021
2023-02-25 02:25:34,067 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM38
2023-02-25 02:25:34,068 -       PATHS: 
2023-02-25 02:25:34,068 -            /azure/mssql_servers/terraform.tfvars
2023-02-25 02:25:34,069 -            /azure/mssql_servers/vars.tf
2023-02-25 02:25:34,069 -            /azure/mssql_servers/provider.tf
2023-02-25 02:25:34,069 -            /azure/mssql_servers/main.tf
2023-02-25 02:25:34,070 -       TITLE: Azure Activity log alert for delete network security group rule should exist
2023-02-25 02:25:34,070 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete network security group rule does not exist. Creating an activity log alert for Delete network security group rule gives insight into network rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:34,071 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:34,071 -       ERROR: Azure Activity log alert for delete network security group rule currently not exist
2023-02-25 02:25:34,073 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.network/networksecuritygroups/securityrules/delete' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:34,073 -       RESULT: failed
2023-02-25 02:25:34,518 -   TESTID: PR-AZR-TRF-MNT-021
2023-02-25 02:25:34,520 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM41
2023-02-25 02:25:34,524 -       PATHS: 
2023-02-25 02:25:34,525 -            /azure/keyvaultsecret/terraform.tfvars
2023-02-25 02:25:34,526 -            /azure/keyvaultsecret/vars.tf
2023-02-25 02:25:34,527 -            /azure/keyvaultsecret/provider.tf
2023-02-25 02:25:34,527 -            /azure/keyvaultsecret/main.tf
2023-02-25 02:25:34,528 -       TITLE: Azure Activity log alert for delete network security group rule should exist
2023-02-25 02:25:34,529 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete network security group rule does not exist. Creating an activity log alert for Delete network security group rule gives insight into network rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:34,530 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:34,530 -       ERROR: Azure Activity log alert for delete network security group rule currently not exist
2023-02-25 02:25:34,531 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.network/networksecuritygroups/securityrules/delete' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:34,531 -       RESULT: failed
2023-02-25 02:25:34,992 -   TESTID: PR-AZR-TRF-MNT-021
2023-02-25 02:25:34,998 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM49
2023-02-25 02:25:34,999 -       PATHS: 
2023-02-25 02:25:34,999 -            /azure/storageaccounts/terraform.tfvars
2023-02-25 02:25:35,009 -            /azure/storageaccounts/vars.tf
2023-02-25 02:25:35,010 -            /azure/storageaccounts/provider.tf
2023-02-25 02:25:35,011 -            /azure/storageaccounts/main.tf
2023-02-25 02:25:35,011 -       TITLE: Azure Activity log alert for delete network security group rule should exist
2023-02-25 02:25:35,011 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete network security group rule does not exist. Creating an activity log alert for Delete network security group rule gives insight into network rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:35,015 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:35,017 -       ERROR: Azure Activity log alert for delete network security group rule currently not exist
2023-02-25 02:25:35,017 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.network/networksecuritygroups/securityrules/delete' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:35,018 -       RESULT: failed
2023-02-25 02:25:35,514 -   TESTID: PR-AZR-TRF-MNT-021
2023-02-25 02:25:35,515 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM54
2023-02-25 02:25:35,515 -       PATHS: 
2023-02-25 02:25:35,516 -            /azure/monitoring_alert/terraform.tfvars
2023-02-25 02:25:35,516 -            /azure/monitoring_alert/vars.tf
2023-02-25 02:25:35,516 -            /azure/monitoring_alert/provider.tf
2023-02-25 02:25:35,517 -            /azure/monitoring_alert/main.tf
2023-02-25 02:25:35,517 -       TITLE: Azure Activity log alert for delete network security group rule should exist
2023-02-25 02:25:35,518 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete network security group rule does not exist. Creating an activity log alert for Delete network security group rule gives insight into network rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:35,519 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:35,520 -       ERROR: Azure Activity log alert for delete network security group rule currently not exist
2023-02-25 02:25:35,521 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.network/networksecuritygroups/securityrules/delete' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:35,521 -       RESULT: failed
2023-02-25 02:25:35,946 -   TESTID: PR-AZR-TRF-MNT-022
2023-02-25 02:25:35,948 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM36
2023-02-25 02:25:35,948 -       PATHS: 
2023-02-25 02:25:35,949 -            /azure/diagnosticsettings/terraform.tfvars
2023-02-25 02:25:35,950 -            /azure/diagnosticsettings/vars.tf
2023-02-25 02:25:35,951 -            /azure/diagnosticsettings/provider.tf
2023-02-25 02:25:35,951 -            /azure/diagnosticsettings/main.tf
2023-02-25 02:25:35,952 -       TITLE: Azure Activity log alert for delete network security group rule should exist
2023-02-25 02:25:35,953 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete network security group rule does not exist. Creating an activity log alert for Delete network security group rule gives insight into network rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:35,954 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:35,958 -       ERROR: Azure Activity log alert for delete security solution currently not exist
2023-02-25 02:25:35,959 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.security/securitysolutions/delete' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:35,962 -       RESULT: failed
2023-02-25 02:25:36,372 -   TESTID: PR-AZR-TRF-MNT-022
2023-02-25 02:25:36,374 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM38
2023-02-25 02:25:36,374 -       PATHS: 
2023-02-25 02:25:36,375 -            /azure/mssql_servers/terraform.tfvars
2023-02-25 02:25:36,376 -            /azure/mssql_servers/vars.tf
2023-02-25 02:25:36,377 -            /azure/mssql_servers/provider.tf
2023-02-25 02:25:36,377 -            /azure/mssql_servers/main.tf
2023-02-25 02:25:36,378 -       TITLE: Azure Activity log alert for delete network security group rule should exist
2023-02-25 02:25:36,378 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete network security group rule does not exist. Creating an activity log alert for Delete network security group rule gives insight into network rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:36,379 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:36,380 -       ERROR: Azure Activity log alert for delete security solution currently not exist
2023-02-25 02:25:36,380 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.security/securitysolutions/delete' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:36,381 -       RESULT: failed
2023-02-25 02:25:36,754 -   TESTID: PR-AZR-TRF-MNT-022
2023-02-25 02:25:36,755 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM41
2023-02-25 02:25:36,758 -       PATHS: 
2023-02-25 02:25:36,758 -            /azure/keyvaultsecret/terraform.tfvars
2023-02-25 02:25:36,759 -            /azure/keyvaultsecret/vars.tf
2023-02-25 02:25:36,759 -            /azure/keyvaultsecret/provider.tf
2023-02-25 02:25:36,759 -            /azure/keyvaultsecret/main.tf
2023-02-25 02:25:36,760 -       TITLE: Azure Activity log alert for delete network security group rule should exist
2023-02-25 02:25:36,760 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete network security group rule does not exist. Creating an activity log alert for Delete network security group rule gives insight into network rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:36,761 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:36,762 -       ERROR: Azure Activity log alert for delete security solution currently not exist
2023-02-25 02:25:36,762 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.security/securitysolutions/delete' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:36,763 -       RESULT: failed
2023-02-25 02:25:37,219 -   TESTID: PR-AZR-TRF-MNT-022
2023-02-25 02:25:37,222 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM49
2023-02-25 02:25:37,223 -       PATHS: 
2023-02-25 02:25:37,224 -            /azure/storageaccounts/terraform.tfvars
2023-02-25 02:25:37,224 -            /azure/storageaccounts/vars.tf
2023-02-25 02:25:37,225 -            /azure/storageaccounts/provider.tf
2023-02-25 02:25:37,225 -            /azure/storageaccounts/main.tf
2023-02-25 02:25:37,225 -       TITLE: Azure Activity log alert for delete network security group rule should exist
2023-02-25 02:25:37,226 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete network security group rule does not exist. Creating an activity log alert for Delete network security group rule gives insight into network rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:37,226 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:37,226 -       ERROR: Azure Activity log alert for delete security solution currently not exist
2023-02-25 02:25:37,227 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.security/securitysolutions/delete' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:37,227 -       RESULT: failed
2023-02-25 02:25:37,687 -   TESTID: PR-AZR-TRF-MNT-022
2023-02-25 02:25:37,688 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM54
2023-02-25 02:25:37,688 -       PATHS: 
2023-02-25 02:25:37,691 -            /azure/monitoring_alert/terraform.tfvars
2023-02-25 02:25:37,692 -            /azure/monitoring_alert/vars.tf
2023-02-25 02:25:37,692 -            /azure/monitoring_alert/provider.tf
2023-02-25 02:25:37,695 -            /azure/monitoring_alert/main.tf
2023-02-25 02:25:37,695 -       TITLE: Azure Activity log alert for delete network security group rule should exist
2023-02-25 02:25:37,696 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete network security group rule does not exist. Creating an activity log alert for Delete network security group rule gives insight into network rule access changes and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:37,696 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:37,697 -       ERROR: Azure Activity log alert for delete security solution currently not exist
2023-02-25 02:25:37,698 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.security/securitysolutions/delete' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:37,698 -       RESULT: failed
2023-02-25 02:25:38,173 -   TESTID: PR-AZR-TRF-MNT-023
2023-02-25 02:25:38,176 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM36
2023-02-25 02:25:38,177 -       PATHS: 
2023-02-25 02:25:38,177 -            /azure/diagnosticsettings/terraform.tfvars
2023-02-25 02:25:38,177 -            /azure/diagnosticsettings/vars.tf
2023-02-25 02:25:38,178 -            /azure/diagnosticsettings/provider.tf
2023-02-25 02:25:38,178 -            /azure/diagnosticsettings/main.tf
2023-02-25 02:25:38,178 -       TITLE: Azure Activity log alert for update security policy should exist
2023-02-25 02:25:38,179 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Update security policy does not exist. Creating an activity log alert for Update security policy gives insight into changes to security policy and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:38,179 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:38,179 -       ERROR: Azure Activity log alert for update security policy currently not exist
2023-02-25 02:25:38,179 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.security/policies/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:38,180 -       RESULT: failed
2023-02-25 02:25:38,635 -   TESTID: PR-AZR-TRF-MNT-023
2023-02-25 02:25:38,637 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM38
2023-02-25 02:25:38,637 -       PATHS: 
2023-02-25 02:25:38,638 -            /azure/mssql_servers/terraform.tfvars
2023-02-25 02:25:38,638 -            /azure/mssql_servers/vars.tf
2023-02-25 02:25:38,639 -            /azure/mssql_servers/provider.tf
2023-02-25 02:25:38,641 -            /azure/mssql_servers/main.tf
2023-02-25 02:25:38,642 -       TITLE: Azure Activity log alert for update security policy should exist
2023-02-25 02:25:38,643 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Update security policy does not exist. Creating an activity log alert for Update security policy gives insight into changes to security policy and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:38,644 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:38,644 -       ERROR: Azure Activity log alert for update security policy currently not exist
2023-02-25 02:25:38,644 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.security/policies/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:38,645 -       RESULT: failed
2023-02-25 02:25:39,087 -   TESTID: PR-AZR-TRF-MNT-023
2023-02-25 02:25:39,089 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM41
2023-02-25 02:25:39,089 -       PATHS: 
2023-02-25 02:25:39,090 -            /azure/keyvaultsecret/terraform.tfvars
2023-02-25 02:25:39,091 -            /azure/keyvaultsecret/vars.tf
2023-02-25 02:25:39,091 -            /azure/keyvaultsecret/provider.tf
2023-02-25 02:25:39,091 -            /azure/keyvaultsecret/main.tf
2023-02-25 02:25:39,092 -       TITLE: Azure Activity log alert for update security policy should exist
2023-02-25 02:25:39,092 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Update security policy does not exist. Creating an activity log alert for Update security policy gives insight into changes to security policy and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:39,092 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:39,093 -       ERROR: Azure Activity log alert for update security policy currently not exist
2023-02-25 02:25:39,094 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.security/policies/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:39,094 -       RESULT: failed
2023-02-25 02:25:39,486 -   TESTID: PR-AZR-TRF-MNT-023
2023-02-25 02:25:39,490 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM49
2023-02-25 02:25:39,491 -       PATHS: 
2023-02-25 02:25:39,491 -            /azure/storageaccounts/terraform.tfvars
2023-02-25 02:25:39,492 -            /azure/storageaccounts/vars.tf
2023-02-25 02:25:39,493 -            /azure/storageaccounts/provider.tf
2023-02-25 02:25:39,493 -            /azure/storageaccounts/main.tf
2023-02-25 02:25:39,494 -       TITLE: Azure Activity log alert for update security policy should exist
2023-02-25 02:25:39,494 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Update security policy does not exist. Creating an activity log alert for Update security policy gives insight into changes to security policy and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:39,495 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:39,495 -       ERROR: Azure Activity log alert for update security policy currently not exist
2023-02-25 02:25:39,496 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.security/policies/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:39,496 -       RESULT: failed
2023-02-25 02:25:39,861 -   TESTID: PR-AZR-TRF-MNT-023
2023-02-25 02:25:39,862 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM54
2023-02-25 02:25:39,863 -       PATHS: 
2023-02-25 02:25:39,863 -            /azure/monitoring_alert/terraform.tfvars
2023-02-25 02:25:39,864 -            /azure/monitoring_alert/vars.tf
2023-02-25 02:25:39,865 -            /azure/monitoring_alert/provider.tf
2023-02-25 02:25:39,865 -            /azure/monitoring_alert/main.tf
2023-02-25 02:25:39,866 -       TITLE: Azure Activity log alert for update security policy should exist
2023-02-25 02:25:39,867 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Update security policy does not exist. Creating an activity log alert for Update security policy gives insight into changes to security policy and may reduce the time it takes to detect suspicious activity.
2023-02-25 02:25:39,868 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:39,869 -       ERROR: Azure Activity log alert for update security policy currently not exist
2023-02-25 02:25:39,870 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.security/policies/write' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:39,871 -       RESULT: failed
2023-02-25 02:25:40,283 -   TESTID: PR-AZR-TRF-MNT-024
2023-02-25 02:25:40,285 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM36
2023-02-25 02:25:40,286 -       PATHS: 
2023-02-25 02:25:40,287 -            /azure/diagnosticsettings/terraform.tfvars
2023-02-25 02:25:40,287 -            /azure/diagnosticsettings/vars.tf
2023-02-25 02:25:40,288 -            /azure/diagnosticsettings/provider.tf
2023-02-25 02:25:40,289 -            /azure/diagnosticsettings/main.tf
2023-02-25 02:25:40,290 -       TITLE: Azure Activity log alert for delete policy assignment should exist
2023-02-25 02:25:40,290 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete policy assignment does not exist. Creating an activity log alert for Delete policy assignment gives insight into changes done in azure policy - assignments and may reduce the time it takes to detect unsolicited changes.
2023-02-25 02:25:40,297 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:40,298 -       ERROR: Azure Activity log alert for delete policy assignment currently not exist
2023-02-25 02:25:40,298 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.authorization/policyassignments/delete' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:40,299 -       RESULT: failed
2023-02-25 02:25:40,687 -   TESTID: PR-AZR-TRF-MNT-024
2023-02-25 02:25:40,689 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM38
2023-02-25 02:25:40,691 -       PATHS: 
2023-02-25 02:25:40,691 -            /azure/mssql_servers/terraform.tfvars
2023-02-25 02:25:40,692 -            /azure/mssql_servers/vars.tf
2023-02-25 02:25:40,693 -            /azure/mssql_servers/provider.tf
2023-02-25 02:25:40,694 -            /azure/mssql_servers/main.tf
2023-02-25 02:25:40,695 -       TITLE: Azure Activity log alert for delete policy assignment should exist
2023-02-25 02:25:40,695 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete policy assignment does not exist. Creating an activity log alert for Delete policy assignment gives insight into changes done in azure policy - assignments and may reduce the time it takes to detect unsolicited changes.
2023-02-25 02:25:40,696 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:40,696 -       ERROR: Azure Activity log alert for delete policy assignment currently not exist
2023-02-25 02:25:40,697 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.authorization/policyassignments/delete' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:40,697 -       RESULT: failed
2023-02-25 02:25:41,123 -   TESTID: PR-AZR-TRF-MNT-024
2023-02-25 02:25:41,125 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM41
2023-02-25 02:25:41,126 -       PATHS: 
2023-02-25 02:25:41,126 -            /azure/keyvaultsecret/terraform.tfvars
2023-02-25 02:25:41,127 -            /azure/keyvaultsecret/vars.tf
2023-02-25 02:25:41,127 -            /azure/keyvaultsecret/provider.tf
2023-02-25 02:25:41,128 -            /azure/keyvaultsecret/main.tf
2023-02-25 02:25:41,129 -       TITLE: Azure Activity log alert for delete policy assignment should exist
2023-02-25 02:25:41,129 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete policy assignment does not exist. Creating an activity log alert for Delete policy assignment gives insight into changes done in azure policy - assignments and may reduce the time it takes to detect unsolicited changes.
2023-02-25 02:25:41,130 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:41,131 -       ERROR: Azure Activity log alert for delete policy assignment currently not exist
2023-02-25 02:25:41,131 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.authorization/policyassignments/delete' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:41,132 -       RESULT: failed
2023-02-25 02:25:41,550 -   TESTID: PR-AZR-TRF-MNT-024
2023-02-25 02:25:41,552 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM49
2023-02-25 02:25:41,553 -       PATHS: 
2023-02-25 02:25:41,553 -            /azure/storageaccounts/terraform.tfvars
2023-02-25 02:25:41,554 -            /azure/storageaccounts/vars.tf
2023-02-25 02:25:41,554 -            /azure/storageaccounts/provider.tf
2023-02-25 02:25:41,555 -            /azure/storageaccounts/main.tf
2023-02-25 02:25:41,555 -       TITLE: Azure Activity log alert for delete policy assignment should exist
2023-02-25 02:25:41,556 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete policy assignment does not exist. Creating an activity log alert for Delete policy assignment gives insight into changes done in azure policy - assignments and may reduce the time it takes to detect unsolicited changes.
2023-02-25 02:25:41,557 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:41,557 -       ERROR: Azure Activity log alert for delete policy assignment currently not exist
2023-02-25 02:25:41,558 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.authorization/policyassignments/delete' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:41,560 -       RESULT: failed
2023-02-25 02:25:41,888 -   TESTID: PR-AZR-TRF-MNT-024
2023-02-25 02:25:41,890 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTPKZbM54
2023-02-25 02:25:41,891 -       PATHS: 
2023-02-25 02:25:41,892 -            /azure/monitoring_alert/terraform.tfvars
2023-02-25 02:25:41,893 -            /azure/monitoring_alert/vars.tf
2023-02-25 02:25:41,893 -            /azure/monitoring_alert/provider.tf
2023-02-25 02:25:41,894 -            /azure/monitoring_alert/main.tf
2023-02-25 02:25:41,894 -       TITLE: Azure Activity log alert for delete policy assignment should exist
2023-02-25 02:25:41,895 -       DESCRIPTION: This policy identifies the Azure accounts in which activity log alert for Delete policy assignment does not exist. Creating an activity log alert for Delete policy assignment gives insight into changes done in azure policy - assignments and may reduce the time it takes to detect unsolicited changes.
2023-02-25 02:25:41,896 -       RULE: file(activitylogalerts.rego)
2023-02-25 02:25:41,897 -       ERROR: Azure Activity log alert for delete policy assignment currently not exist
2023-02-25 02:25:41,899 -       REMEDIATION: In 'azurerm_monitor_activity_log_alert' resource, make sure 'criteria' block has at least one 'operation_name = microsoft.authorization/policyassignments/delete' to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_activity_log_alert#operation_name' target='_blank'>here</a> for details.
2023-02-25 02:25:41,900 -       RESULT: failed
2023-02-25 02:25:41,944 - VALIDATION COMPLETE:
2023-02-25 02:25:42,086 -  Run Stats: {
  "start": "2023-02-25 02:19:43",
  "end": "2023-02-25 02:25:42",
  "remote": false,
  "errors": [],
  "host": "ubuntu",
  "timestamp": "2023-02-25 02:19:43",
  "jsonsource": false,
  "database": 0,
  "container": "scenario-terraform-azure",
  "INCLUDESNAPSHOTS": false,
  "SNAPHSHOTIDS": [],
  "INCLUDETESTS": true,
  "TESTIDS": [
    "PR-AZR-TRF-MNT-014",
    "PR-AZR-TRF-MNT-015",
    "PR-AZR-TRF-MNT-016",
    "PR-AZR-TRF-MNT-017",
    "PR-AZR-TRF-MNT-018",
    "PR-AZR-TRF-MNT-019",
    "PR-AZR-TRF-MNT-020",
    "PR-AZR-TRF-MNT-021",
    "PR-AZR-TRF-MNT-022",
    "PR-AZR-TRF-MNT-023",
    "PR-AZR-TRF-MNT-024"
  ],
  "ONLYSNAPSHOTS": false,
  "ONLYSNAPSHOTIDS": [],
  "session_id": "session_1677349183817",
  "run_type": "CRAWL_AND_COMPLIANCE",
  "log": null,
  "duration": "358 seconds"
}
rezoan commented 1 year ago

ARM test output 2nd phase:

2023-02-26 06:06:47,627 - SNAPSHOTS COMPLETE:
2023-02-26 06:06:48,217 -   TESTID: PR-AZR-ARM-MNT-025
2023-02-26 06:06:48,218 -       SNAPSHOTID: ARM_TEMPLATE_SNAPSHOTaooDu36
2023-02-26 06:06:48,218 -       PATHS: 
2023-02-26 06:06:48,219 -            /eventhub/azuredeploy.json
2023-02-26 06:06:48,220 -       TITLE: Azure Event Hub Namespaces diagnostic logs should be enabled
2023-02-26 06:06:48,220 -       DESCRIPTION: Diagnostic settings for Azure Event Hub Namespaces used to stream resource logs to a Log Analytics workspace. this policy will identify any Azure Event Hub Namespaces which has this diagnostic settings missing or misconfigured.
2023-02-26 06:06:48,220 -       RULE: file(diagnosticsettings.rego)
2023-02-26 06:06:48,221 -       ERROR: Azure Event Hub Namespaces diagnostics logging is currently not enabled
2023-02-26 06:06:48,221 -       REMEDIATION: Make sure your 'microsoft.insights/diagnosticsettings' resource has property logs[].enabled = true to fix the issue for scope 'microsoft.eventHub/namespaces'. Please visit <a href='https://docs.microsoft.com/en-us/azure/templates/microsoft.insights/diagnosticsettings' target='_blank'>here</a> for more details
2023-02-26 06:06:48,222 -       RESULT: failed
2023-02-26 06:06:48,456 -   TESTID: PR-AZR-ARM-VM-006
2023-02-26 06:06:48,457 -       SNAPSHOTID: ARM_TEMPLATE_SNAPSHOTaooDu32
2023-02-26 06:06:48,457 -       PATHS: 
2023-02-26 06:06:48,457 -            /VM/log_analytic_agent/vm.azuredeploy.json
2023-02-26 06:06:48,457 -            /VM/log_analytic_agent/vm.azuredeploy.parameters.json
2023-02-26 06:06:48,457 -       TITLE: Azure Backup should be enabled for Virtual Machines
2023-02-26 06:06:48,457 -       DESCRIPTION: Ensure protection of your Azure Virtual Machines by enabling Azure Backup. Azure Backup is a secure and cost effective data protection solution for Azure.
2023-02-26 06:06:48,458 -       RULE: file(vm.rego)
2023-02-26 06:06:48,458 -       ERROR: 'microsoft.recoveryservices/vaults/backupfabrics/protectioncontainers/protecteditems' resource need to be exist and configured for 'microsoft.compute/virtualmachines'
2023-02-26 06:06:48,458 -       REMEDIATION: Make sure 'microsoft.compute/virtualmachines' is configured with 'microsoft.recoveryservices/vaults/backupfabrics/protectioncontainers/protecteditems' to fix the issue.<br>Please visit <a href='https://learn.microsoft.com/en-us/azure/templates/microsoft.recoveryservices/vaults/backupfabrics/protectioncontainers/protecteditems?pivots=deployment-language-arm-template' target='_blank'>here</a> for more details.
2023-02-26 06:06:48,458 -       RESULT: failed
2023-02-26 06:06:48,538 -   TESTID: PR-AZR-ARM-VM-006
2023-02-26 06:06:48,539 -       SNAPSHOTID: ARM_TEMPLATE_SNAPSHOTaooDu34
2023-02-26 06:06:48,539 -       PATHS: 
2023-02-26 06:06:48,539 -            /VM/vm.azuredeploy.json
2023-02-26 06:06:48,539 -            /VM/Linux-vm.azuredeploy.parameters.json
2023-02-26 06:06:48,539 -       TITLE: Azure Backup should be enabled for Virtual Machines
2023-02-26 06:06:48,540 -       DESCRIPTION: Ensure protection of your Azure Virtual Machines by enabling Azure Backup. Azure Backup is a secure and cost effective data protection solution for Azure.
2023-02-26 06:06:48,540 -       RULE: file(vm.rego)
2023-02-26 06:06:48,540 -       ERROR: 'microsoft.recoveryservices/vaults/backupfabrics/protectioncontainers/protecteditems' resource need to be exist and configured for 'microsoft.compute/virtualmachines'
2023-02-26 06:06:48,540 -       REMEDIATION: Make sure 'microsoft.compute/virtualmachines' is configured with 'microsoft.recoveryservices/vaults/backupfabrics/protectioncontainers/protecteditems' to fix the issue.<br>Please visit <a href='https://learn.microsoft.com/en-us/azure/templates/microsoft.recoveryservices/vaults/backupfabrics/protectioncontainers/protecteditems?pivots=deployment-language-arm-template' target='_blank'>here</a> for more details.
2023-02-26 06:06:48,540 -       RESULT: failed
2023-02-26 06:06:48,658 -   TESTID: PR-AZR-ARM-VM-006
2023-02-26 06:06:48,659 -       SNAPSHOTID: ARM_TEMPLATE_SNAPSHOTaooDu35
2023-02-26 06:06:48,659 -       PATHS: 
2023-02-26 06:06:48,659 -            /VM/vm.azuredeploy.json
2023-02-26 06:06:48,660 -            /VM/win-vm.azuredeploy.parameters.json
2023-02-26 06:06:48,660 -       TITLE: Azure Backup should be enabled for Virtual Machines
2023-02-26 06:06:48,660 -       DESCRIPTION: Ensure protection of your Azure Virtual Machines by enabling Azure Backup. Azure Backup is a secure and cost effective data protection solution for Azure.
2023-02-26 06:06:48,660 -       RULE: file(vm.rego)
2023-02-26 06:06:48,661 -       ERROR: 'microsoft.recoveryservices/vaults/backupfabrics/protectioncontainers/protecteditems' resource need to be exist and configured for 'microsoft.compute/virtualmachines'
2023-02-26 06:06:48,661 -       REMEDIATION: Make sure 'microsoft.compute/virtualmachines' is configured with 'microsoft.recoveryservices/vaults/backupfabrics/protectioncontainers/protecteditems' to fix the issue.<br>Please visit <a href='https://learn.microsoft.com/en-us/azure/templates/microsoft.recoveryservices/vaults/backupfabrics/protectioncontainers/protecteditems?pivots=deployment-language-arm-template' target='_blank'>here</a> for more details.
2023-02-26 06:06:48,661 -       RESULT: failed
2023-02-26 06:06:48,799 -   TESTID: PR-AZR-ARM-VM-006
2023-02-26 06:06:48,800 -       SNAPSHOTID: ARM_TEMPLATE_SNAPSHOTaooDu45
2023-02-26 06:06:48,800 -       PATHS: 
2023-02-26 06:06:48,800 -            /azurefirewall/azuredeploy.json
2023-02-26 06:06:48,800 -            /azurefirewall/azuredeploy.parameters.json
2023-02-26 06:06:48,801 -       TITLE: Azure Backup should be enabled for Virtual Machines
2023-02-26 06:06:48,801 -       DESCRIPTION: Ensure protection of your Azure Virtual Machines by enabling Azure Backup. Azure Backup is a secure and cost effective data protection solution for Azure.
2023-02-26 06:06:48,801 -       RULE: file(vm.rego)
2023-02-26 06:06:48,801 -       ERROR: 'microsoft.recoveryservices/vaults/backupfabrics/protectioncontainers/protecteditems' resource need to be exist and configured for 'microsoft.compute/virtualmachines'
2023-02-26 06:06:48,801 -       REMEDIATION: Make sure 'microsoft.compute/virtualmachines' is configured with 'microsoft.recoveryservices/vaults/backupfabrics/protectioncontainers/protecteditems' to fix the issue.<br>Please visit <a href='https://learn.microsoft.com/en-us/azure/templates/microsoft.recoveryservices/vaults/backupfabrics/protectioncontainers/protecteditems?pivots=deployment-language-arm-template' target='_blank'>here</a> for more details.
2023-02-26 06:06:48,802 -       RESULT: failed
2023-02-26 06:06:48,909 -   TESTID: PR-AZR-ARM-VM-006
2023-02-26 06:06:48,910 -       SNAPSHOTID: ARM_TEMPLATE_SNAPSHOTaooDu47
2023-02-26 06:06:48,910 -       PATHS: 
2023-02-26 06:06:48,910 -            /ad-application-workloads/azuredeploy.json
2023-02-26 06:06:48,910 -            /ad-application-workloads/azuredeploy.parameters.json
2023-02-26 06:06:48,910 -       TITLE: Azure Backup should be enabled for Virtual Machines
2023-02-26 06:06:48,911 -       DESCRIPTION: Ensure protection of your Azure Virtual Machines by enabling Azure Backup. Azure Backup is a secure and cost effective data protection solution for Azure.
2023-02-26 06:06:48,911 -       RULE: file(vm.rego)
2023-02-26 06:06:48,911 -       ERROR: 'microsoft.recoveryservices/vaults/backupfabrics/protectioncontainers/protecteditems' resource need to be exist and configured for 'microsoft.compute/virtualmachines'
2023-02-26 06:06:48,911 -       REMEDIATION: Make sure 'microsoft.compute/virtualmachines' is configured with 'microsoft.recoveryservices/vaults/backupfabrics/protectioncontainers/protecteditems' to fix the issue.<br>Please visit <a href='https://learn.microsoft.com/en-us/azure/templates/microsoft.recoveryservices/vaults/backupfabrics/protectioncontainers/protecteditems?pivots=deployment-language-arm-template' target='_blank'>here</a> for more details.
2023-02-26 06:06:48,911 -       RESULT: failed
2023-02-26 06:06:48,918 - VALIDATION COMPLETE:
2023-02-26 06:06:48,936 -  Run Stats: {
  "start": "2023-02-26 06:06:35",
  "end": "2023-02-26 06:06:48",
  "remote": false,
  "errors": [],
  "host": "ubuntu",
  "timestamp": "2023-02-26 06:06:35",
  "jsonsource": false,
  "database": 0,
  "container": "scenario-arm-remote",
  "INCLUDESNAPSHOTS": false,
  "SNAPHSHOTIDS": [],
  "INCLUDETESTS": true,
  "TESTIDS": [
    "PR-AZR-ARM-MNT-025",
    "PR-AZR-ARM-MNT-026",
    "PR-AZR-ARM-VM-006"
  ],
  "ONLYSNAPSHOTS": false,
  "ONLYSNAPSHOTIDS": [],
  "session_id": "session_1677449195509",
  "run_type": "CRAWL_AND_COMPLIANCE",
  "log": null,
  "duration": "13 seconds"
}
rezoan commented 1 year ago

Terraform test output 2nd phase:

2023-02-26 06:16:55,164 - SNAPSHOTS COMPLETE:
2023-02-26 06:16:55,608 -   TESTID: PR-AZR-TRF-MNT-025
2023-02-26 06:16:55,611 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTRqoCL56
2023-02-26 06:16:55,611 -       PATHS: 
2023-02-26 06:16:55,612 -            /azure/eventhub/variables.tf
2023-02-26 06:16:55,612 -            /azure/eventhub/main.tf
2023-02-26 06:16:55,612 -       TITLE: Azure Event Hub Namespaces diagnostic logs should be enabled
2023-02-26 06:16:55,613 -       DESCRIPTION: Diagnostic settings for Azure Event Hub Namespaces used to stream resource logs to a Log Analytics workspace. this policy will identify any Azure Event Hub Namespaces which has this diagnostic settings missing or misconfigured.
2023-02-26 06:16:55,613 -       RULE: file(diagnosticsettings.rego)
2023-02-26 06:16:55,614 -       ERROR: azurerm_eventhub_namespace's azurerm_monitor_diagnostic_setting and its property block 'log' need to be exist. its currently missing from the resource.
2023-02-26 06:16:55,614 -       REMEDIATION: In 'azurerm_monitor_diagnostic_setting' resource, make sure 'log' block exist and 'target_resource_id' contains id of target 'azurerm_eventhub_namespace' resource to fix the issue. please visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_diagnostic_setting#log' target='_blank'>here</a> for details.
2023-02-26 06:16:55,614 -       RESULT: failed
2023-02-26 06:16:55,952 -   TESTID: PR-AZR-TRF-MNT-026
2023-02-26 06:16:55,952 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTRqoCL52
2023-02-26 06:16:55,953 -       PATHS: 
2023-02-26 06:16:55,953 -            /azure/recovery_services_vault/variables.tf
2023-02-26 06:16:55,953 -            /azure/recovery_services_vault/main.tf
2023-02-26 06:16:55,953 -       TITLE: Ensure Recovery Services Vault Diagnostic Settings stream to Log Analytics workspace
2023-02-26 06:16:55,954 -       DESCRIPTION: Audit Diagnostic Settings for Recovery Services Vault to stream to Log Analytics workspace for Resource specific categories. If any of the Resource specific categories are not enabled, Recovery Services Vault is put on audit.
2023-02-26 06:16:55,954 -       RULE: file(diagnosticsettings.rego)
2023-02-26 06:16:55,954 -       ERROR: azurerm_recovery_services_vault's diagnostics logging azurerm_monitor_diagnostic_setting dont have any 'workspaceId' property configured.
2023-02-26 06:16:55,955 -       REMEDIATION: In 'azurerm_monitor_diagnostic_setting' resource, make sure 'log' block exist and 'target_resource_id' contains id of target 'azurerm_recovery_services_vault' resource and property log_analytics_workspace_id contains the id of target log analytics workspace to fix the issue. please visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/monitor_diagnostic_setting#log' target='_blank'>here</a> for details.
2023-02-26 06:16:55,955 -       RESULT: failed
2023-02-26 06:16:56,108 -   TESTID: PR-AZR-TRF-EGR-004
2023-02-26 06:16:56,109 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTRqoCL55
2023-02-26 06:16:56,109 -       PATHS: 
2023-02-26 06:16:56,109 -            /azure/eventgrid/variables.tf
2023-02-26 06:16:56,109 -            /azure/eventgrid/providers.tf
2023-02-26 06:16:56,109 -            /azure/eventgrid/outputs.tf
2023-02-26 06:16:56,109 -            /azure/eventgrid/main.tf
2023-02-26 06:16:56,109 -       TITLE: Azure Event Grid topics should have private endpoints configured
2023-02-26 06:16:56,109 -       DESCRIPTION: Private endpoints lets you connect your virtual network to Azure services without a public IP address at the source or destination. By mapping private endpoints to your resources, they'll be protected against data leakage risks. Learn more at: https://aka.ms/privateendpoints.
2023-02-26 06:16:56,110 -       RULE: file(eventgrid.rego)
2023-02-26 06:16:56,110 -       ERROR: azurerm_eventgrid_topic should have link with azurerm_private_endpoint and azurerm_private_endpoint's private_service_connection either need to have 'private_connection_resource_id' or 'private_connection_resource_alias' property. Seems there is no link established or mentioed properties are missing.
2023-02-26 06:16:56,110 -       REMEDIATION: 'azurerm_eventgrid_topic' resource need to have a link with 'azurerm_private_endpoint', set 'id' of 'azurerm_eventgrid_topic' to property 'private_connection_resource_id' under 'azurerm_private_endpoint' resources 'private_service_connection' block to fix the issue. Visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/private_endpoint#private_connection_resource_id' target='_blank'>here</a> for details.
2023-02-26 06:16:56,110 -       RESULT: failed
2023-02-26 06:16:56,365 -   TESTID: PR-AZR-TRF-VM-010
2023-02-26 06:16:56,366 -       SNAPSHOTID: TRF_TEMPLATE_SNAPSHOTRqoCL43
2023-02-26 06:16:56,366 -       PATHS: 
2023-02-26 06:16:56,366 -            /azure/vm/terraform.tfvars
2023-02-26 06:16:56,366 -            /azure/vm/vars.tf
2023-02-26 06:16:56,366 -            /azure/vm/provider.tf
2023-02-26 06:16:56,366 -            /azure/vm/main.tf
2023-02-26 06:16:56,367 -       TITLE: Azure Backup should be enabled for Virtual Machines
2023-02-26 06:16:56,367 -       DESCRIPTION: Ensure protection of your Azure Virtual Machines by enabling Azure Backup. Azure Backup is a secure and cost effective data protection solution for Azure.
2023-02-26 06:16:56,367 -       RULE: file(vm.rego)
2023-02-26 06:16:56,367 -       ERROR: 'azurerm_backup_protected_vm' resource need to be exist and configured for 'azurerm_virtual_machine'
2023-02-26 06:16:56,367 -       REMEDIATION: In 'azurerm_backup_protected_vm' resource, make sure 'source_vm_id' has id of target 'azurerm_virtual_machine' to fix the issue. Please visit <a href='https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/backup_protected_vm#source_vm_id' target='_blank'>here</a> for details.
2023-02-26 06:16:56,368 -       RESULT: failed
2023-02-26 06:16:56,374 - VALIDATION COMPLETE:
2023-02-26 06:16:56,426 -  Run Stats: {
  "start": "2023-02-26 06:14:58",
  "end": "2023-02-26 06:16:56",
  "remote": false,
  "errors": [],
  "host": "ubuntu",
  "timestamp": "2023-02-26 06:14:58",
  "jsonsource": false,
  "database": 0,
  "container": "scenario-terraform-azure",
  "INCLUDESNAPSHOTS": false,
  "SNAPHSHOTIDS": [],
  "INCLUDETESTS": true,
  "TESTIDS": [
    "PR-AZR-TRF-MNT-025",
    "PR-AZR-TRF-MNT-026",
    "PR-AZR-TRF-EGR-004",
    "PR-AZR-TRF-EHB-004",
    "PR-AZR-TRF-VM-010"
  ],
  "ONLYSNAPSHOTS": false,
  "ONLYSNAPSHOTIDS": [],
  "session_id": "session_1677449698617",
  "run_type": "CRAWL_AND_COMPLIANCE",
  "log": null,
  "duration": "117 seconds"
}